Informed

Standard security clearance levels

  • Confidential: For information that could cause damage to national security.
  • Secret: For information that could cause “serious” damage to national security.
  • Top Secret: For information where unauthorized disclosure could cause “exceptionally grave” damage to national security. 

Special handling and access 

  • Sensitive Compartmented Information (SCI): A category for intelligence sources, methods, and processes. Access is restricted to specific “compartments” and requires an additional special adjudication process beyond a standard Top Secret clearance.
  • Special Access Programs (SAPs): For highly sensitive projects and programs. These have their own access restrictions in addition to the standard clearance level.
  • Yankee White: An administrative nickname for the DoD program for personnel who will have direct or indirect access to the President or Vice President. This requires a specific background investigation, like the Tier 5 (SSBI), for certain critical and non-critical sensitive positions. 

Access for former presidents

  • A former president’s access to classified information after leaving office is not automatic and is determined by the sitting president on a case-by-case basis, often as a matter of courtesy.
  • This access is not part of a formal security clearance system and is decided by the current president. 

  • President of the United States does not have a formal, standard security clearance in the same way federal employees or military personnel do. Instead, the President’s access to classified information is a right derived directly from the 
    office of the Presidency itself. 
    The President is the ultimate declassification and classification authority, meaning they inherently have access to all levels of national security information based on their constitutional position, not an adjudicated security clearance process. 

    Standard Security Clearance Levels
    While the president operates outside of the standard process, other government officials and staff require specific clearances. The three primary classification levels, corresponding to increasing sensitivity of information, are: 
    Confidential: Unauthorized disclosure could cause damage to national security.
    Secret: Unauthorized disclosure could cause serious damage to national security.
    Top Secret: Unauthorized disclosure could cause exceptionally grave damage to national security. 

    Additional Access Categories
    Beyond the primary levels, access to certain highly sensitive information requires additional screening and authorization categories: 
    Sensitive Compartmented Information (SCI): This covers intelligence sources, methods, and specific intelligence activities.
    Special Access Programs (SAPs): These are established for information considered exceptionally vulnerable, such as specific stealth technology or highly sensitive projects.
    Restricted Data (RD): This is a category specifically for nuclear weapons design and stockpile information, established by the Atomic Energy Act.
    Yankee White: This is not a classification level itself, but rather a stringent background investigation required for any personnel working directly with the President and Vice President. 

    Post-Presidency Access
    Upon leaving office, a former president’s automatic access to classified information ends. Any access after that point is granted as a courtesy by the sitting president and can be revoked at their discretion. 

  • Obtaining a U.S. government security clearance is a multi-step process that you cannot initiate on your own; you must be sponsored by an eligible federal government agency or a cleared contractor

    The general process involves the following stages:

    1. Sponsorship and Conditional Offer
    The process begins after you receive and accept a conditional offer of employment for a position that requires access to classified information. The hiring organization’s Facility Security Officer (FSO) or Clearance Coordinator will initiate the formal process. 

    2. Application Submission
    You will be required to complete a comprehensive electronic questionnaire, typically the Standard Form 86 (SF-86), for National Security Positions, via the e-QIP system. This form requires extensive personal information, including: 
    Employment and residence history (often for the past 10 years).
    Foreign travel and contacts.
    Criminal record, drug use, and alcohol-related incidents.
    Financial information, including debts and credit history.
    Personal references, co-workers, and neighbors who can verify your character and conduct. 
    You must also submit fingerprints and sign releases authorizing the government to conduct record checks. Honesty throughout this process is paramount, as misrepresenting or falsifying information can result in denial or prosecution. 

    3. Background Investigation
    The completed application and supporting documents are submitted to an investigative agency, such as the Defense Counterintelligence and Security Agency (DCSA). Investigators will verify and corroborate the information you provided through various methods: 
    Database and record checks: This includes checks against law enforcement, court, and credit databases.
    Interviews: Investigators may interview your references, current and former supervisors, and neighbors.
    Personal interview: An investigator will conduct an in-person interview with you to review your form, clarify inconsistencies, and resolve any potential security concerns.
    Polygraph/Medical exams: For certain sensitive positions (e.g., TS/SCI access for intelligence agencies), a polygraph test or psychological evaluation may be required. 

    4. Adjudication
    Once the investigation is complete, the gathered information is sent to an adjudicating authority (e.g., the Department of Defense Consolidated Adjudication Facility, or DoD CAF). An adjudicator evaluates all the material based on 13 established adjudicative guidelines to determine if you are eligible for access to classified information, weighing the “whole person” and any mitigating factors. 

    5. Clearance Determination
    The adjudicating authority makes a final determination to grant or deny the security clearance. The sponsoring agency is then notified of the decision and proceeds with a final job offer if the determination is favorable. 

    6. Ongoing Maintenance
    Once a clearance is granted, you are subject to continuous vetting (CV) or periodic reinvestigations (every 5-15 years, depending on the clearance level). You are required to self-report any significant life changes or potential security concerns to your security officer. 

  • Trusted Workforce 2.0 (TW 2.0) is a U.S. government-wide initiative to reform and modernize the entire personnel vetting process for federal employees and contractors. Led by the Office of the Director of National Intelligence (ODNI) and the Office of Personnel Management (OPM), the primary goal is to create a more efficient, secure, and mobile system for determining the trustworthiness of personnel

    Key Goals and Reforms
    Shift to Continuous Vetting (CV): The most significant change is the transition from periodic reinvestigations (which occurred every 5-10 years) to a system of automated, ongoing record checks. This allows security officials to be alerted to potential security concerns (e.g., criminal activity, suspicious financial transactions, foreign contacts) in near real-time, reducing risk and allowing for proactive intervention.
    Enhanced Workforce Mobility and Reciprocity: TW 2.0 aims to make security clearances and background investigation eligibility “portable” across different federal agencies, reducing redundant vetting processes and speeding up onboarding for new positions.
    Streamlined and Standardized Processes: The initiative includes a new, consolidated Personnel Vetting Questionnaire (PVQ) that replaces multiple legacy forms, making the application process simpler and more consistent across the government. It also condenses all investigations into three intuitive risk tiers (Low, Moderate, and High).
    IT Modernization: The National Background Investigation Services (NBIS) system is the intended technological backbone of TW 2.0, a new secure IT system designed to manage and connect all vetting data, automate processes, and replace outdated legacy systems.
    Improved Guidance on Sensitive Topics: New policies offer clearer guidance on issues like past marijuana use and mental health counseling to reduce stigma and ensure the government can recruit and retain diverse talent without unnecessary hurdles. 

    Implementation and Current Status
    The initiative, which began in 2018, is being implemented in phases, with full government-wide implementation expected by March 30, 2026. 
    Phase 1 focused on reducing the large backlog of background investigations and consolidating most investigative functions under the Defense Counterintelligence and Security Agency (DCSA).
    Phase 2 finalized the core policies and successfully transitioned the entire national security workforce into continuous vetting programs.
    Phase 3, which is currently underway, emphasizes agency-level execution, expanding continuous vetting to include non-sensitive public trust positions, and deploying shared services via NBIS. 
    While significant progress has been made, challenges remain, particularly with the full development and deployment of the NBIS IT system and ensuring consistent implementation across all agencies. 











    ‘Trusted Workforce 2.0’ ushers in new era of personnel vetting, but big challenges remain

    Federal News Network


    Observations on the Implementation of the Trusted Workforce 2.0 Personnel Vetting …

    Government Accountability Office (GAO) (.gov)


    Continuous Vetting – Defense Counterintelligence and Security Agency

    DCSA (.mil)


    Show all



































































Global Corporations

Corporate corruption in 2025 has seen high-profile convictions in bribery cases, such as the conviction of a Swiss commodities trader and its former CEO in January 2025

. It has also been shaped by new enforcement guidance, like the U.S. Commodity Futures Trading Commission’s (CFTC) advisory on self-reporting and cooperation credit in February 2025, and new legislation like the Combating Global Corruption Act of 2025 in January 2025. Technological advancements, especially the use of AI, are becoming a focus for both combating corruption and for companies’ internal compliance efforts. 

Key legal and enforcement developments

  • New guidance: The CFTC introduced a new advisory in February 2025 that provides a three-tiered system for self-reporting and a four-tiered system for cooperation credit, along with a mitigation credit matrix.
  • Legislative action: The Combating Global Corruption Act of 2025 was introduced in January 2025, requiring the State Department to annually rank foreign countries based on their efforts to eliminate corruption.
  • DOJ guidelines: The U.S. Department of Justice updated its Foreign Corrupt Practices Act (FCPA) guidelines in June 2025, which may affect enforcement in areas like national security, infrastructure, and energy.
  • Increased focus on technology: The OECD Global Anti-Corruption & Integrity Forum in March 2025 highlighted how technologies like AI, data analytics, and digital forensics can be used to combat corruption and improve integrity. 

Notable cases and investigations

  • Swiss commodities trader: In January 2025, Swiss commodities trader Trafigura and its former CEO were convicted for bribing an Angolan official in a case that was the first of its kind in Switzerland.
  • Pharmaceutical company: In June 2025, an Indiana-based pharmaceutical company, Inotiv Inc., disclosed that the SEC had concluded its FCPA investigation into the company’s non-human primate importation practices without recommending enforcement action.
  • U.S. politician’s family member: In April 2025, the wife of a former U.S. Senator was convicted for her role in a corruption scheme involving bribery and influence peddling related to Egyptian officials. 

Emerging trends

  • Digital asset fraud: Despite challenges in tracking precise figures, evidence suggests that fraud involving cryptocurrencies and other digital assets remained a significant issue in 2025.
  • Social media ad fraud: Meta is reportedly focusing on reducing the revenue from fraudulent ads to meet specific targets by the end of 2025. 

  • 2025, corporate corruption continues to pose a severe global economic threat, with major developments centered on 
    shifting enforcement priorities and the increasing role of technology in both committing and combating financial crime. The US Department of Justice (DOJ) altered its approach to the Foreign Corrupt Practices Act (FCPA), while international bodies introduced new regulations to address evolving threats. 

    Global Trends and Statistics
    Economic Impact Corporate fraud and corruption globally account for estimated annual losses of at least $2.6 trillion, or about 5% of the global GDP.
    Technological Influence Fraud schemes are becoming more sophisticated through the use of Artificial Intelligence (AI), while anti-fraud professionals are exploring how to use data analytics and AI to detect and prevent these crimes.
    Vulnerable Sectors Industries such as construction, extraction, life sciences, and finance remain particularly vulnerable to corruption and bribery schemes.
    Transparency International (TI) The 2024 Corruption Perceptions Index (CPI), published in February 2025, indicated that 148 out of 180 countries have stagnated or declined in their anti-corruption efforts since 2012. The U.S. and Canada were noted as “significant decliners” over the past decade. 

    Key Enforcement Developments in 2025

    United States
    Enforcement efforts were significantly impacted by policy changes introduced by the new administration: 
    FCPA Enforcement Shift A Presidential executive order in February 2025 initially paused most FCPA enforcement for 180 days to review its impact on U.S. economic competitiveness. New DOJ guidelines were issued in June 2025, resuming enforcement with a focus on misconduct tied to national security, cartels, transnational criminal organizations, and schemes that specifically harm U.S. companies abroad.
    Major Prosecutions The DOJ continued to pursue large-scale fraud cases, including a significant healthcare fraud takedown in June that charged over 300 defendants in schemes totaling more than $14.6 billion.
    Company Self-Reporting New guidance from the DOJ and the Commodity Futures Trading Commission (CFTC) emphasized the benefits for companies that self-report misconduct and cooperate with investigations, potentially receiving reduced penalties. 

    United Kingdom
    The UK implemented the “failure to prevent fraud” offense under the Economic Crime and Corporate Transparency Act, effective September 2025, which creates new compliance obligations for large organizations. The Serious Fraud Office (SFO) announced a new international taskforce with Switzerland and France to target bribery and corruption. 

    International
    High-Profile Convictions In January 2025, Swiss trading company Trafigura and a former executive were convicted of corruption for bribing an Angolan official to secure oil contracts.
    Regional Focus China announced it would ramp up its anti-corruption campaign, focusing on finance, state-owned enterprises, and energy sectors. India also saw an increase in corporate fraud cases related to an influx of private capital and digitalization.
    OECD Efforts The OECD continued to work with member nations to strengthen anti-bribery mechanisms, evaluating the implementation of anti-corruption conventions in several countries throughout the year. 

How to Sit With The Mafia 🛟🇺🇸🎵💙

Gaining attention from the Mafia is typically not something a person actively pursues, but rather a result of being involved in specific criminal activities or living within a Mafia-controlled area and demonstrating certain traits

. The Mafia is a secret society, and individuals who seek their attention generally do so through existing connections and a demonstrated history of criminal reliability, not through public or obvious actions. 

Key ways a person might gain their notice include:

  • Criminal Prowess: Engaging in successful criminal enterprises, such as smuggling, dealing drugs, or violence, makes individuals stand out as potential “earners” or enforcers.
  • Reputation for Silence: The willingness to keep silent under police pressure is a crucial trait. Individuals who do not talk about their crimes and can keep secrets attract attention.
  • Connections: Most people do not contact the Mafia directly. Instead, a connected associate or member (a “patron”) identifies potential talent and vouches for them, initiating a long vetting process.
  • Geographical and Ethnic Background:Historically, origin and location play a significant role. Growing up in a neighborhood where the Mafia operates and being of Italian heritage were often prerequisites for membership in the American or Sicilian Mafia.
  • Willingness to Commit Violence: Demonstrating a willingness to use violence on command, potentially including murder, is a key indicator of loyalty and utility.
  • Reliability and Respect: Potential associates are expected to follow all rules, pay tribute on time, be a go-getter, and not attract unnecessary attention from law enforcement. 

It’s important to understand that the Mafia is a sophisticated, highly secretive criminal organization, and attempting to gain their attention in real life is extremely dangerous and illegal, with potentially severe consequences. 

Gaining attention from the real-world Mafia is not a straightforward process and typically occurs within a specific criminal environment through demonstrated competence and a shared connection

. It is a secret society, and members often strive to avoid drawing attention to themselves or their activities. 

The process is generally initiated by existing members, not outsiders, and involves several factors:

  • Criminal Activity: The primary way to gain notice is by being a successful criminal, especially in areas where the Mafia operates (e.g., extortion, labor racketeering, illegal gambling, loan sharking).
  • Reputation for Reliability: Prospective members must be seen as loyal, trustworthy, and able to “keep their mouth shut” under police pressure.
  • Connections/Sponsorship: You generally cannot simply walk up and apply. The only way in is to know someone who is already a trusted associate or member who can vouch for you and present you to the family. This “patron” takes responsibility for the recruit’s behavior.
  • Willingness to use Violence: A readiness to commit violence on command is a key trait that attracts attention from organized criminal groups always looking for enforcers.
  • Heritage (for specific groups): For the traditional Sicilian or Italian-American Mafia, having Italian heritage has historically been a strict requirement for full membership, although this can vary by specific organization and era. 

It is important to understand that the Mafia is a dangerous, illegal organization involved in serious crimes, and associating with such groups carries extreme risks, including violence, imprisonment, and death. Law enforcement agencies like the FBI actively investigate and prosecute organized crime. 

Mafia Confessions

Make It Bold | Be About It | Talk About It 💙 #HUSTLR 🛡I spent 20 Years serving the United States of America. BMCRamsey, Surfman374. It was an amazing career as a Ready for Operations Inspector, Chief of Operations for the Largest Enlisted Unit in the Coast Guard, Small Arms Instructor, Federal Law Enforcement Officer (Boarding Officer) Surfman. I Graduated Airforce NCOA, USCG Chiefs Academy Altus Tendo. Instructor Development School, Advanced Outdoor Film and Production School, and from 2005-2021 held a 100Ton MMD Captian License. I received the Associations for Rescue’s at Sea Gold Medal in Washington D.C. along with numerous other Medals and Awards for Rescues 100’s of 1000’s in 20 years serving. Yes I’m 100% Percent Disabled 100% Service Connected 100% Combat Related don’t let it stop me. Life is yours enjoy it create it Daily. Proud Retired Chief Loving Man, Veteran, and Father. #DepartmentofHomelandSecurity MLEA U.S. Coast Guard Boarding Officers & Boarding Team Members. It’s #SetStandard #TacticsTechniques #TheUseofForce God Bless my prayers for #FLEO’s Every Believer U.S. Department of Homeland Security #surfman374 #tripledigithunter #chief #LEO #LifeMatters #protectandserve ❤️🤍💙”God Bless Founder #DMR @surfman374 rigsreefclassicspearfishing.com founder creator only one doing it all DavidM Ramsey Portland Texas Single Solo Ops never normal

This Thing of Ours (Cosa Nostra): a mob family, or the entire mob. through the eye: a message job through the eye to say “We’re watching you!” through the mouth: a message job through the mouth to indicate that someone WAS a rat. underboss: the second in command to the boss.

Mafia Confession: “King of Bootleggers” Murder (True Crime; Prohibition Mob War and Trial)

Book by Nicholas Anthony Parisi

Mafia Confession: The “King of Bootleggers” Murder Silver Medal Winner – Reader’s Favorite Awards When alleged mob hitman Giuseppe “Joe” Parisi gunned down Carlo Siniscalchi-the ruthless “King of Bootleggers”-as his limousine idled at the curb, he set off one of the bloodiest Mafia vendettas in New England history. … 

Mafia confessions, often made by informants or as part of plea deals, have been crucial in providing law enforcement with inside information on organized crime and securing convictions against high-ranking figures

. Key figures who broke the code of silence (“omertà”) include Joseph Valachi, Tommaso Buscetta, and Salvatore “Sammy the Bull” Gravano. 

Notable Mafia Confessions

  • Joseph Valachi: In 1963, Valachi became the first American mobster to publicly acknowledge the existence of the Mafia and provide details about its structure and customs during Senate hearings. His testimony, detailed in his memoirs The Valachi Papers, offered an unprecedented look into the inner workings of the Genovese and Lucchese crime families and shattered the myth of an unbreakable code of silence.
  • Tommaso Buscetta: A high-ranking Sicilian Mafia member, Buscetta became an informant in the 1980s and provided an insider’s view into La Cosa Nostra during trials in Italy and New York. His testimony was instrumental in the “Pizza Connection” trial, which exposed a multi-billion dollar international heroin smuggling operation, and helped law enforcement understand the organization’s rules and hierarchy.
  • Salvatore “Sammy the Bull” Gravano: As the underboss of the Gambino crime family, Gravano’s testimony was crucial in the conviction of John Gotti, the “Teflon Don”, in 1992. Gravano admitted to involvement in numerous murders as part of his plea deal, and his detailed confession led to Gotti’s life sentence and significantly disrupted the Gambino family’s operations.
  • Anthony “Gaspipe” Casso: The boss of New York’s Lucchese crime family, Casso’s confessions, detailed in the book Gaspipe: Confessions of a Mafia Boss by Philip Carlo, provided insight into the violence and power dynamics of the life. His revelations included intricate details of illegal enterprises, such as extortions and murders.
  • Giuseppe “Joseph” Parisi: An alleged mob hitman during the Prohibition era, Parisi’s jailhouse diary and trial transcripts formed the basis of the book Mafia Confession: “King of Bootleggers” Murder. This true crime account offers a rare look into an early 20th-century gang war and the Genovese Crime Family’s ties in New England. 

Make it Bold 💙🎵🇺🇸🛟👌

Make It Bold | Be About It | Talk About It 💙 #HUSTLR 🛡I spent 20 Years serving the United States of America. BMCRamsey, Surfman374. It was an amazing career as a Ready for Operations Inspector, Chief of Operations for the Largest Enlisted Unit in the Coast Guard, Small Arms Instructor, Federal Law Enforcement Officer (Boarding Officer) Surfman. I Graduated Airforce NCOA, USCG Chiefs Academy Altus Tendo. Instructor Development School, Advanced Outdoor Film and Production School, and from 2005-2021 held a 100Ton MMD Captian License. I received the Associations for Rescue’s at Sea Gold Medal in Washington D.C. along with numerous other Medals and Awards for Rescues 100’s of 1000’s in 20 years serving. Yes I’m 100% Percent Disabled 100% Service Connected 100% Combat Related don’t let it stop me. Life is yours enjoy it create it Daily. Proud Retired Chief Loving Man, Veteran, and Father. #DepartmentofHomelandSecurity MLEA U.S. Coast Guard Boarding Officers & Boarding Team Members. It’s #SetStandard #TacticsTechniques #TheUseofForce God Bless my prayers for #FLEO’s Every Believer U.S. Department of Homeland Security #surfman374 #tripledigithunter #chief #LEO #LifeMatters #protectandserve ❤️🤍💙”God Bless Founder #DMR @surfman374

rigsreefclassicspearfishing.com