Retired Army Colonel John Mills
👤 PersonAppearances Over Time
Podcast Appearances
Yeah, please don't get me going on NSA approved devices. You've got to be kidding me. You know, yeah, if you want yesterday's product delivered tomorrow, yes, we'll go to NSA approved solutions, okay?
Yeah, please don't get me going on NSA approved devices. You've got to be kidding me. You know, yeah, if you want yesterday's product delivered tomorrow, yes, we'll go to NSA approved solutions, okay?
The trend is absolutely use of commercial products, and that's including behind the firewall, including for... Now, again, there's different levels. Unclassified, we still are behind a firewall when you do unclassified. Then the intelligence community rejects this concept of secret, so they just jumped to the top secret and compartmented, but the Department of Defense still calls something secret.
The trend is absolutely use of commercial products, and that's including behind the firewall, including for... Now, again, there's different levels. Unclassified, we still are behind a firewall when you do unclassified. Then the intelligence community rejects this concept of secret, so they just jumped to the top secret and compartmented, but the Department of Defense still calls something secret.
The trend is absolutely use of commercial products, and that's including behind the firewall, including for... Now, again, there's different levels. Unclassified, we still are behind a firewall when you do unclassified. Then the intelligence community rejects this concept of secret, so they just jumped to the top secret and compartmented, but the Department of Defense still calls something secret.
So, we have unclassified networks which are still beyond the firewall, you have secret and then for the super double top secret people pretending that nobody's ever listening to them when everything has been broken into anyway, you got the top secret, okay? So, it's utterly ridiculous and a charade, but the trend is commercial product.
So, we have unclassified networks which are still beyond the firewall, you have secret and then for the super double top secret people pretending that nobody's ever listening to them when everything has been broken into anyway, you got the top secret, okay? So, it's utterly ridiculous and a charade, but the trend is commercial product.
So, we have unclassified networks which are still beyond the firewall, you have secret and then for the super double top secret people pretending that nobody's ever listening to them when everything has been broken into anyway, you got the top secret, okay? So, it's utterly ridiculous and a charade, but the trend is commercial product.
And there's been, well, I believe the DNI and both John Ratcliffe both said this was an approved product. Now, it really is. And NSA, the DNI, which supposedly works for the DNI. Yes, they are essentially the, I think it's NSPD 38. They're essentially in charge of the top secret networks. And they farm out JWICs to the bottom feeders at DIA to manage. But yeah, this was an approved product.
And there's been, well, I believe the DNI and both John Ratcliffe both said this was an approved product. Now, it really is. And NSA, the DNI, which supposedly works for the DNI. Yes, they are essentially the, I think it's NSPD 38. They're essentially in charge of the top secret networks. And they farm out JWICs to the bottom feeders at DIA to manage. But yeah, this was an approved product.
And there's been, well, I believe the DNI and both John Ratcliffe both said this was an approved product. Now, it really is. And NSA, the DNI, which supposedly works for the DNI. Yes, they are essentially the, I think it's NSPD 38. They're essentially in charge of the top secret networks. And they farm out JWICs to the bottom feeders at DIA to manage. But yeah, this was an approved product.
And we used many approved products behind the firewall. And a lot of these commercial solutions are good. The basic concept with cybersecurity, though, is also... You have to presume breach, even at the highest levels of supposedly... Again, I'm not releasing anything classified here. I'm just saying you have to presume breach at all times.
And we used many approved products behind the firewall. And a lot of these commercial solutions are good. The basic concept with cybersecurity, though, is also... You have to presume breach, even at the highest levels of supposedly... Again, I'm not releasing anything classified here. I'm just saying you have to presume breach at all times.
And we used many approved products behind the firewall. And a lot of these commercial solutions are good. The basic concept with cybersecurity, though, is also... You have to presume breach, even at the highest levels of supposedly... Again, I'm not releasing anything classified here. I'm just saying you have to presume breach at all times.
Well, I think this really explains a lot of this into, you know, you want to, you know, yes, it's a political haymaking exercise on people like Schiff and Swalwell, who've been absolute liars. Swalwell, who was sleeping with a foreign agent and still has access to top secret information for some reason. But the...
Well, I think this really explains a lot of this into, you know, you want to, you know, yes, it's a political haymaking exercise on people like Schiff and Swalwell, who've been absolute liars. Swalwell, who was sleeping with a foreign agent and still has access to top secret information for some reason. But the...
Well, I think this really explains a lot of this into, you know, you want to, you know, yes, it's a political haymaking exercise on people like Schiff and Swalwell, who've been absolute liars. Swalwell, who was sleeping with a foreign agent and still has access to top secret information for some reason. But the...
So, the high-value targeting process was a very successful process used by Stan McChrystal and an interagency JSOC-led team to really, well, actually take that back. Sometimes it was under a DSS and a DSSS to CIA as the lead, but extremely successful process, okay? And he's talked about it in open forums on a number of occasions and he's been asked a number of times.
So, the high-value targeting process was a very successful process used by Stan McChrystal and an interagency JSOC-led team to really, well, actually take that back. Sometimes it was under a DSS and a DSSS to CIA as the lead, but extremely successful process, okay? And he's talked about it in open forums on a number of occasions and he's been asked a number of times.
So, the high-value targeting process was a very successful process used by Stan McChrystal and an interagency JSOC-led team to really, well, actually take that back. Sometimes it was under a DSS and a DSSS to CIA as the lead, but extremely successful process, okay? And he's talked about it in open forums on a number of occasions and he's been asked a number of times.