Smarter Gov Tech, Stronger MerITocracy
This page is not built out yet. If you are seeing this page, please contact an administrator.

The Situation Report: Retooling the Military Draft for a High-Tech Future

If you are or ever were a male between the ages of 18 and 25, then you’ve heard of the Selective Service System. For those of you who don’t know what I’m talking about, that’s the independent Federal agency tasked with managing the registration of all males eligible to be drafted into the military during times of national crisis.

But the Selective Service today is a far cry from the system that was first started in 1917 during World War I in Europe. The world has evolved from trench warfare to cyber warfare and, as a result, the guiding principles behind how the nation encourages national service and the extraordinary process of drafting military-age males into service during times of war are evolving as well.

In a virtually unnoticed message to Congress this month, President Donald Trump outlined his new guiding principles for reforming the Selective Service process, as called for by the 2017 National Defense Authorization Act. And the Trump approach calls for a renewed focus on “critical skills.”

America hasn’t relied upon the draft since the Vietnam War. For the past 44 years, the nation has benefited from the development of a professional military of all volunteers with a wide variety of professional skills and life experiences. But the world is arguably more dangerous today than at any other time during those 44 years, and the threat of miscalculation leading to a major global conflagration—from nuclear war on the Korean peninsula to major power conflicts in Europe and Asia—is increasing.

But just as the nature of war has changed, so have the needs of the military. In the unlikely event of a future draft, the Trump administration is advising the Selective Service “to create pathways through service that leverage enhanced, empowered, and experienced expertise across the spectrum of science, technology, engineering, mathematics, national security, cyber linguistics and foreign language, education, health care, and the medical professions,” according to Trump’s report.

Trump’s guidance also recommends that the Selective Service improve opportunities for individuals to access “critical education and technical training opportunities via the U.S. Armed Forces, federal and private sector.”

It’s unclear, however, if Trump’s guidance would lead to a more capable high-tech military in the event of a draft. The U.S. military is already more highly educated than the population in general, holding a higher percentage of bachelor’s degrees and high school diplomas. In addition, former Secretary of Defense Ash Carter once complained that half of the 21 million Americans aged 17 to 21 were unable to meet military entrance exam requirements.

The situation gets worse. Federal and state data shows that more than 25 percent of all college freshmen in the U.S. require some form of remedial coursework. At two-year community colleges, that percentage can be as high as 60 percent. American students just aren’t keeping up with the world around them. That may spell problems for U.S. competitiveness, but it very well may spell catastrophe for U.S. military effectiveness on the high-tech battlefields of the future.

Is there a bright spot in the government’s plan to make military service more attractive to STEM graduates? Yes. Silicon Valley is notorious for pulling jobs out from beneath the feet of young graduates. Tech companies have eliminated more than 413,000 jobs since 2012, including 96,000 just last year. Annual job growth in Silicon Valley decreased to 3.5 percent, or 26,700 new jobs, in 2016. This compares to the 6 percent annual gain of 42,300 jobs in 2015, and the 6.4 percent gain in 2014.

Of course, not all tech companies have been cutting back. IBM CEO Ginni Rometty, for example, said she plans to hire 25,000 tech pros in the next four years. But if the world keeps spiraling out of control, Big Blue may have to wait for most of those people to finish their tours of duty.

The Situation Report: What NASA Can Teach Us About Government’s Innovation Potential

The private sector innovation marketing machine is at it again. Congress should fund a new digital startup within the General Services Administration to focus solely on cybersecurity, according to a new set of policy recommendations released this week by the Information Technology Innovation Foundation.

“The goal of this initiative would be to incorporate private-sector knowledge and nongovernment culture into high-impact, high-priority federal government cybersecurity projects,” according to ITIF’s recommendation. “Members of this team could serve short-term stints based on new projects, agency needs, and available funding.”

There’s only one problem with this idea: It is based on a myth—the myth that the Federal workforce is incapable of matching the passion, ingenuity, and innovative spirit that has formed the centerpiece of the Federal contractor community’s marketing pitch for the past two decades. The government doesn’t need “nongovernment culture” to improve cybersecurity. What it needs is to recruit a workforce with a long-term vision of service and innovators driven not by the prospect of living a life of success but of living a life of meaning.

Nowhere is this example more apparent than at NASA. Take, for example, NASA’s Voyager 2 program. NASA scientists and engineers have been working on Voyager 2 for 40 years. It’s the only spacecraft to have ever visited Uranus and Neptune, and is currently making its way to interstellar space. The technical achievements recorded during missions to photograph Uranus, Neptune, and Neptune’s moons are without parallel and were done by career NASA employees.

Engineers predicted storms weeks in advance on a planet more than 2 billion miles from Earth and advised where to point the spacecraft’s cameras. They also re-coded the cameras to produce sharp images in a place with little sunlight and as the spacecraft flew by at more than 35,000 mph. And it was all done with a 160 bits per second data link operating with the equivalent power of a refrigerator lightbulb.

What Can NASA Teach Us?

There’s no denying that NASA has had its ups and downs. But there’s also no denying that its successes far outpace its failures. Taking on missions where minor mistakes could destroy years of work requires a special kind of passion, leadership, and thirst for innovation.

And there may be something to the fact that the agency continues to place at the top of the Federal Employee Viewpoint Survey and the Partnership for Public Service’s Best Places to Work in the Federal Government rankings. The agency also ranked as the No. 1 “most attractive” employer for engineering students, according to global research and advisory firm Universum, and was named the second “Happiest Company in America” by CareerBliss rankings.

“The hundreds of employee reviews on employment websites tell the stories of employees who are fulfilled by the innovative, challenging, results-driven environment,” wrote Marta Wilson, a leading  expert in leadership effectiveness, organizational improvement, and transformation strategy. “The most repeated theme among the reviews is: the people. The employees, both past and present, mention the pleasure of working in teams with their co-workers and leaders.”

Edward Spear is a perfect example. He is one of the unsung heroes working behind the scenes to put John Glenn into space. He’s also the grandfather of MeriTalk reporter Morgan Lynch, who shared his story with The Situation Report.

Edward Spear at NASA, circa 1980. Spear passed away in 2016. (Photo: Morgan Lynch)

It was the night before NASA would launch the first American into orbit, and the engineer who was tasked with coding the computer chips that programmed the launch wasn’t finished. The 31-year-old, Edward Spear, had returned from serving as an engineer for the U.S. Army in Korea 10 years before and now he was serving his country again at NASA.

A couple of hours before the morning’s launch on Feb. 20, 1962, Spear was satisfied with his work. He rushed the computer chips over to the launch site, only a couple of buildings away in Cape Canaveral, Fla. He returned to his desk, leaned back and tried to fall asleep, so tired that he didn’t mind missing the historic launch. Minutes later, a friend shook him awake and dragged him to the roof of the audience building to watch the rocket take off. Spear wasn’t nervous. The launch would be successful because he and his team had done their jobs well.

“He totally geeked out on the idea of working at NASA,” said Lynch. “He had a tie with rockets and satellites on it. He thought working at NASA was the coolest job in the world. And he probably thought that getting a job at NASA was the equivalent of ‘making it.’ ”

Is cybersecurity more difficult than putting John Glenn into space and getting him home safely? Is cybersecurity more technologically challenging than controlling a spacecraft, its code, and its sensitive instrumentation from 2 billion miles away? Is cybersecurity so overwhelmingly difficult that only private sector innovators are capable of succeeding? What is it about the culture of Silicon Valley today that makes it superior to the workforce culture that produced some of mankind’s greatest technological achievements?

The answer is nothing. The private sector’s innovation superiority is a myth. NASA is proof of that. The government doesn’t need techies who view service as a sacrifice to be endured for a couple of years. What really makes NASA different is the commitment of a workforce to a lifelong mission that is measured not in stock options, but in meaningful achievement.

Those people still exist.

Look Who’s MeriTalking: Cameron Chehreh on Modernization and Data Centers

MeriTalk sat down with Cameron Chehreh, chief technology officer at Dell EMC Federal, at the MeriTalk Data Center Brainstorm to discuss how Federal IT modernization efforts will affect agency data centers and operations.

MeriTalk: How critical are the recent government IT modernization efforts to data center modernization and optimization?

Cameron Chehreh: They are completely interlinked–very critical. The government is at a pivotal point. We are spending a tremendous amount of the budget on legacy IT and what people call commodity IT, or what I call mission IT. At the end of the day, IT must support the mission. Because of the current budget strain, it’s vital that modernization happens now, and there is great opportunity due to new innovation. This isn’t just about implementing new technology–it’s also about reducing our facilities’ environmental footprint, reducing costs, and creating agility for the workforce. And, we’re fundamentally changing the IT procurement business model. Agencies can now acquire technology leveraging “as-a-service” models with operating funds versus capital funds. They can “pay by the drink” and ensure they only buy what they need to meet their mission objectives. The recent modernization efforts are critical to data center modernization and optimization.

MT: If legislation like Rep. Will Hurd’s, R-Texas, Modernizing Government Technology Act is reintroduced and passed, what does that mean for agencies? And what kinds of preparations will agencies need to do to access those funds?

CC:  I would advocate for the Act, as it would give agency leaders access to the capital necessary to modernize. But, when you talk to a lot of agency leaders and people who have been in government for a long time, it’s important to understand many also have the opportunity to use working capital funds at an agency level. Congress could help agencies by giving them more flexibility in how they spend these funds. If an IT director wants to spend on, let’s say, a converged piece of infrastructure versus something else and it’s within the budgetary constraints, they should be afforded the opportunity to and empowered to make that choice.

MT: Without a legally mandated modernization fund, how much harder would it be for agencies to get these data centers optimized?

CC: Many agencies have done an excellent job, even without the fund, beginning modernization efforts. I think if we can build the proper agreement, and the right management structure, a governmentwide IT modernization fund will significantly help agencies accelerate transformation so they can reach their goals.

MT: In your experience, what are Federal agencies saying that they need the most?

CC: The first piece, I think, is about technology education. Industry partners can play an important role here, proactively educating customers on the options to meet the mission. The second piece is access to modern skill sets. We have a very interesting, dynamic workforce today. We have a young generation that’s coming into the workforce with brilliant ideas, and new expectations about how technology works. We have to be able to foster an integrated ability to take advantage of the infusion of these news ideas, against the security backdrop that our experienced workforce understands and prioritizes. So those modern skill sets are really, really vital.

The last piece requires that we take another look at a lot of the business and IT processes that support mission enablement. IT has to be highly responsive as a service provider. Many IT teams today aren’t structured to be service providers and respond effectively to requirements that depend upon that agility. As Federal IT departments pivot to be able to meet these new goals, the shared services model will grow and prove itself with the mission stakeholders.

MT: As a member of the private sector, what are you doing to help prepare and partner with government agencies to achieve this modernization?

CC: There are several things we’ve been doing at Dell EMC. First, we have significantly expanded our technology portfolio through the acquisition of EMC. We’re all living in a digital economy. Companies like Uber, Snapchat, and Airbnb are disrupting entire industries. When you recognize this, the ability to be able to transform yourself is vital. We passionately believe that at Dell EMC, so that’s one aspect.

The other aspect is that we’ve innovated and transformed our business model. Customers can still buy individual, discrete products or capabilities from us, but we’ve also moved in a bold new direction to deliver solutions and as-a-service offerings. Customers can acquire more complete offerings that they can simply and rapidly deploy, accelerating time and value. We are working side by side with our customers as they modernize and move forward.

 

 

 

 

 

The Weekend Reader–April 14

Industry Insider: What’s Happening in IT

MeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from CenturyLink, Level 3 Communications, Hilton Software, and more.

 

Global Cyber Norms Insufficient to Prevent Future Election Hacks

As the State Department works to gain international support for its cybersecurity framework, experts said that global norms and deterrence won’t be enough to convince state actors not to influence elections through cyber means in the future.

 

 

 

OMB Issues Agency Reform Plan Based on March Executive Order

The Office of Management and Budget unveiled its plan to reorganize Federal agencies, called the “Comprehensive Plan for Reforming the Federal Government and Reducing the Federal Civilian Workforce,” which responds to President Trump’s March 13 executive order to OMB. The plan requires agencies to take immediate action on reducing their workforce and saving money, and submit a long term plan for maximizing worker performance by the end of June. Agencies will also be required to submit an Agency Reform Plan within 180 days to modernize and streamline operations.

New Leadership Coming to VA-DoD Interoperability Office

John Short, the program executive for the VistA Evolution program at the Department of Veterans Affairs, has been tapped to take over as the acting deputy director of the DOD/VA Interagency Program Office responsible for ensuring electronic health record sharing between the VA and the Pentagon.

 

 

Geospatial-Intelligence Agency to Work With 18F to Lure Tech Talent

The National Geospatial-Intelligence Agency needs to attract new tech talent with new ideas and a desire to work on something bigger and more important than the next popular dating app. One of the ways the agency hopes to do that is by continuing to work with the government’s own in-house innovation shop, 18F.

 

Rethinking Shared Services in Government

The problems associated with an antiquated government infrastructure replete with duplication and redundancies of mission and support services have been well documented. A 2011 Government Accountability Office report discussed the operation of 661 information technology investments in human resources management alone. More recently, at my request as a staffer on the Oversight and Government Reform Committee, GAO surveyed the sorry state of Federal IT and recounted how, among many other examples, portions of our nuclear alert system were running upon an IBM Series 1 mainframe.

Federal agencies rely on decades-old, obsolete technologies to support critical mission programs, essential functions, and daily operations. Collectively, GAO reports that agencies are spending on average three-fourths of their operations and maintenance budgets keeping these legacy systems functional; some agencies are spending more than 90 percent. Costs are going through the roof; after all, where can you find qualified COBOL programmers anymore?

Agencies are reluctant to cede control over these services, even as cyber thefts of government and citizen data happen on a more frequent basis. Even where agencies do modernize, the issues with a cumbersome acquisition system and the lack of capable IT staff create unacceptable risks for CIO’s seeking to maintain critical business functions. IT Modernization has become a critical path for agencies seeking to improve their services to citizens, enhance government operations, and strengthen cybersecurity.

Many are of the view that government adoption of shared services is one answer to this problem. By consolidating common agency requirements under one roof, the thinking goes, and making those services available to other agencies to share the expense, government can focus more on mission IT and save money.

But how best to operationalize such a shared services vision? There are many challenges with this vision. One is the issue of scale. Government is an immense organization. Current shared services infrastructure cannot possibly meet the demand.

And what about competition and evolving IT? Shared services could result in “government monopolies” based upon a single platform vendor, with attendant data lock-in and lack of transparency. Locking agencies into existing technologies without a competitive process will ensure that agencies get obsolete-out-of-the-box solutions with uncompetitive pricing.

Because of these issues, the current hesitation with adopting shared services is completely understandable. In part, that hesitancy is well grounded, because it is based upon the poor results that shared services have achieved to date.

For example, how can agencies ensure they are getting competitively priced services from another government agency? In the absence of competition, and absent a common cost taxonomy across government for charge back purposes, how much should agencies be charged?

Existing shared services providers have had great difficulty highlighting savings successes due to limited cost data transparency and the absence of standardized performance benchmarks. In 2014, the Office of Management and Budget established shared services as a cross-agency priority (CAP) goal to address some of these concerns. The OMB enterprisewide shared services strategy includes such considerations as improving mission-support operations, strategic sourcing, smarter information technology delivery, and customer service.

What we need is a working and pragmatic shared services model with cost transparency and scalability. Government needs to step back from the old vision of large government owned data centers offering cookie-cutter, end-to-end monolithic shared services, such as financial management or ERP. This is a workable vision of shared service because such an approach will rarely map completely against the structure and culture of individual agencies, which often balk at having to adopt a sub-optimized solution. The private sector has already moved past this model to a more horizontal view of shared “micro-services”- called “Everything-as-a-Service” or XaaS.

Because many government IT systems running back-, mid-, and front-office processes have become hamstrung by accumulated technical debt and dependencies, a “leapfrog” strategy would allow widespread adoption of modular mini “app-like” XaaS offerings. This approach would allow agencies to reorient common business capabilities as a suite of micro-services that are chosen and tailored by each individual agency into broader, more customized agency service offerings.

Micro services would encompass more granular common IT building blocks, such as identity management, agile development, help desk, or IT asset management. Acquisition could occur using a governmentwide service catalogue, perhaps as part of the GSA Schedule.

Any agency with a specific expertise–for example, OPM for human resources; Treasury for Financial management; or VA for healthcare–could host “suites” of micro-XaaS service offerings tailored to their specific domains and using their existing resources. Agencies could choose which specific “app-like” micro-service offerings to build their own tailored “100% IT solution” using simple standardized interagency service-level agreements.

Agencies could charge for these XaaS micro-offerings using the Economy Act as a “fee for service” model, or else through interagency memorandums of understanding. XaaS would require broader adoption of open API’s, thereby expediting the goals of transparency and data sharing required by the DATA Act.

With a few technical upgrades and strategically deployed APIs, the customer service module in an agency’s ERP system that is used exclusively to support external customers could now be leveraged by other departments, as well as by IT for help-desk queries, HR for internal customers, and coordination for vendor support.

Micro-service based XaaS casts IT modernization in an entirely new light. What was primarily a technical process of IT Modernization could be transformed into a broader operational and business process “reform effort”–designed to create greater efficiencies and to engage citizen and agency employees in far more productive ways.

The Transformation Agenda: More Modern, More Secure

The June 2015 breach of the Office of Personnel Management’s (OPM) employee records demonstrated a real vulnerability in Federal IT. With legacy systems dominating the Federal landscape, securing sensitive government data has become very nearly impossible. Fortunately, Congress and the Trump Administration seem to be coalescing around a straightforward crisis response plan: IT systems modernization.

Last year’s stalled $3.1 billion revolving capital fund for IT modernization is once again on the radar, as Rep. Will Hurd, R-Texas, and Gerry Connolly, D-Virginia, plan to re-introduce the Modernizing Government Technology (MGT) Act.  According to Hurd, there’s “widespread support” for the measure. In addition, early drafts of President Trump’s planned cybersecurity executive order show that the administration clearly views IT modernization and data center consolidation across the government as keys to improving cybersecurity.

Combine these trends with the new authorities granted to Federal CIOs under the Federal Information Technology Acquisition Reform Act (FITARA), and what you get is real opportunity for progress.

Modernizing the data center is critical to ensuring Federal agencies are prepared to handle new and emerging threats. The Software Defined Data Center (SDDC) is a good example. The SDDC gives agencies more direct control over data security by compartmentalizing the environment, so that a breach of one data group doesn’t necessarily mean a breach of all data groups.

And, the SDDC comes with security components built into the infrastructure, eliminating the IT cybersecurity operations silo and increasing visibility.

Reducing data center complexity also makes it easier to develop a strong Data Loss Prevention (DLP) strategy. A DLP strategy provides agencies with the tools they need to safeguard their data by detecting and blocking potential data leaks. It identifies where important data is stored to protect the data from threats, and ensures users are not sending sensitive information that could jeopardize the network.

As Feds optimize and modernize, new computing models and resources will be key – converged infrastructure, flash storage, hybrid cloud, and more.

Learn more about the Modern Data Center:  https://www.emc.com/collateral/white-papers/emc-modern-data-center-whitepaper.pdf.

Modernizing to improve security is one thing Washington can agree on today. Let’s take the steps we need to move forward.

By: Steve Harris, Senior Vice President and General Manager, Dell EMC Federal

The Weekend Reader–April 7

Industry Insider: What’s Happening in IT

MeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from CenturyLink, EagleForce Associates, U.S. Army, and more.

 

Federal Government Needs New Approach to Hiring Cyber Talent

The government needs to create and fund new hiring programs to fill Federal cyber vacancies, according to experts testifying before the House IT Subcommittee on Tuesday. During the hearing, IT subcommittee chairman Will Hurd, R-Texas, floated the idea of creating a Cyber National Guard that would pull workers from the private sector for short stints of work in the government.

 

Trump’s Border Wall Probably Won’t Be One Long Barrier, DHS Secretary Says

President Donald Trump ran his campaign on the promise of a wall that would run the length of the U.S.-Mexico border. While Secretary of Homeland Security John Kelly still does not know what the wall will look like, he said it will probably not resemble the single concrete partition the president discussed.

 

 

States, Broadband Providers React to Congress’ Rollback of Internet Privacy Rules

The House and Senate voted last week to repeal regulations adopted in October by the Federal Communications Commission under former President Barack Obama requiring Internet service providers to do more to protect customers’ privacy. When the FCC changed leadership during the start of the Trump administration, the agency began to cut back on Internet privacy rules, saying that broadband providers don’t need to be held to a higher standard than other online venues when it comes to consumer privacy.

Federal Standards May Obstruct Cyber Threat Info-sharing

Agencies at the state and local level need to adopt cybersecurity practices that cater to their individual needs, according to many of the experts who testified at a Senate hearing. Patricia Hoffman, acting assistant secretary of DOE’s Office of Electricity Delivery and Energy Reliability, stated that the agency does not have a single model for cybersecurity regulations, but rather recommends certain components that could contribute to a successful cyber strategy.

The Situation Report: Is the CIO Job at VA About to Lose Its Influence?

It is a truly stunning detail overlooked by most observers during the confirmation process of David Shulkin to become secretary of Veterans Affairs. The VA is going to hire a chief health informatics officer (CHIO) to lead the agency’s electronic health record strategy.

According to VA documents provided to the Senate Committee on Veterans Affairs, Shulkin’s VA is doing something truly revolutionary: Rather than rely solely on another industry CIO hotshot or a Silicon Valley parachutist, the agency is recruiting a CHIO “with extensive commercial EHR experience to help VHA craft an informed EHR strategy.”

CHIOs are often physicians, nurses with extensive IT training and experience, or longtime health industry professionals with specialized training.

All of the attention right now is on Shulkin’s planned July 1 decision on whether to replace VA’s decades-old EHR platform known as the Veterans Health Information Systems Technology Architecture, or VistA, with a commercial system. But bringing in a CHIO signals a significant shift of approach at VA, which has historically relied upon either technology policy expertise (career civil servant Stephen Warren) or technology industry expertise (former Johnson & Johnson CIO LaVerne Council) to help guide its technology decisions.

But under Shulkin—a board-certified physician who has held chief executive positions at major medical centers around the country—the biggest technology decision facing VA and its implementation will be guided not by a technology policy wonk or an industry technophile, but by a practicing physician, nurse, or IT professional with specialized health care training.

This is the result of a long-overdue acknowledgement that reforming the massive VA health care technology infrastructure cannot be accomplished through the traditional CIO office. VA’s CIO office has its hands full spending 90 percent of its budget on legacy system maintenance (compared to 60 percent in the private sector). The idea of hiring a senior CHIO to lead strategic agencywide technology decisions is a clear message from Shulkin that technology and program management expertise alone cannot solve VA’s most pressing IT problems.

A relatively new concept, the CHIO post is not unheard of in government. Karen DeSalvo, former National Coordinator for Health IT at the Department of Health and Human Services, created a new CHIO post in 2015. And the position is by no means new to VA—there are dozens of CHIOs employed at regional and local VA medical centers. And many of them are physicians.

What qualifications must a CHIO have?

Well, this isn’t your standard CxO role. VA hiring documents call for the following:

Fully licensed physician or nurse informatics executive, or an individual with a master’s degree or higher in a health care-related field or health care administration relevant to this role.

Nurse applicants must have a master’s degree or higher in a health care-related field or health care administration relevant to this role.

Degree, certification, fellowship or other formal training/academic courses in health informatics preferred.

Leadership experience in health care.

Ability to understand and bridge information technology and health care disciplines.

What does a CHIO at the VA do?

Although the job description is quite lengthy, there are two particular sections that clearly set the CHIO apart from the traditional agency CIO.

Manage complex issues and oversee programs to identify trends in clinical practice, delivery models/environments, and their interrelation with electronic health records, bar code technology, emerging health technologies, health information exchange, and health information standards programs internal and external to VHA. Devise methods and tools to monitor, on an ongoing basis, trends in clinical practice and health informatics. Determine knowledge acquisition and management requirements and provide subject matter expertise in the design and application of automated methods and tools to enhance clinical practice, veterans’ use of health technology and health data exchange.

Use clinical expertise and current knowledge of clinical aspects of health care delivery to evaluate the clinical significance and quality of information that is processed (captured, transmitted, and stored) by advanced technology systems. Evaluate outcomes of electronic health record utilization and health information exchange that impact changes in nursing/medical/clinical practice for various patient groups/populations.

Shulkin may be on to something here. Imagine—asking a a health care professional with technology chops to guide technology strategy for improving health care for veterans. If the VA had done this years ago, it might not be facing the monumental technology challenges that continue to stand in the way of real progress.

The Road to 2018: Modern, Efficient Federal Data Centers

Earlier this year, the House of Representatives unanimously passed the Energy Efficient Government Technology Act (HR 306), which requires agencies to deploy energy-efficient technology in their data centers. Under the bill, every agency must use advanced power management tools – building information modeling, energy-efficient data center strategies, and more to reduce the data center footprint.

This new Act, if passed in the Senate, will help reinforce the established Data Center Optimization Initiative (DCOI), which, among other things, requires agencies to improve power usage effectiveness in data centers by 2018.

This reinforcement could not have come at a better time. At MeriTalk’s Data Center Brainstorm in late March, Dave Powner, Director of IT Issues, GAO, said only 120 of the 4,600 agency owned and operated data centers currently have power usage monitoring technology installed. You can’t manage what you don’t measure.

To meet the 2018 DCOI targets for energy efficiency, server utilization, and other key metrics, agencies will need to make significant changes. What’s needed?

The first building block is converged infrastructure, which combines multiple data center components into a single, optimized package – reducing floor space, energy costs, numbers of servers, and more.

The second building block is a hybrid-cloud environment, with both on and off-premise workloads. After moving data points out of a physical center and into the cloud, the need for physical equipment diminishes. As the ratio of operating systems to physical servers increases, overall energy usage and rack count decreases.

The third building block is flash-based storage. Flash memory allows agencies to access their data quickly and consistently – with fewer numbers of drives than ever before. Fewer drives means less floor space, reduced energy costs cooling requirements, and improved server utilization.

All of these technology building blocks deliver significant, measurable savings – improvements in PUE, virtualization, server and facility utilization, and more – and will support Federal efforts to meet the mandated 2018 goals for Federal data centers.

Learn more about the Modern Data Center: https://www.emc.com/collateral/white-papers/emc-modern-data-center-whitepaper.pdf.

By: Cameron Chehreh, Chief Operating Officer, Chief Technology Officer & VP, Dell EMC Federal

The Weekend Reader–March 31

Industry Insider: What’s Happening in IT

MeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from Environmental Alternatives, DHS S&T, U.S. Naval Surface Warfare Center, and more.

Is FITARA Failing? Federal CIOs Still Say They Don’t Have Authority Over IT Acquisitions

More than two years after Congress passed the Federal Information Technology Acquisition Reform Act—the biggest overhaul of Federal IT acquisition in decades—most Federal chief information officers say they still don’t have the authority necessary to manage technology throughout their agencies.

 

 

FCC Changes IT Priorities Along With New Administration

The IT team at the Federal Communications Commission has been working to re-prioritize its projects to align with the goals of the agency’s new leadership, which has forced officials to make tough decisions about modernization. David Bray, the chief information officer at the FCC, and his team presented the projects that they are working on to Chairman Ajit Pai earlier this month to get his opinion on where the team should focus its efforts. Pai wants the IT team to focus on the development and back-end technology for the FCC’s actions including Mobility Fund Phase II and Connect America Fund Phase II, which serve to bring broadband to underserved areas.

Agencies Urged to Start Bug Bounty Programs

After the huge success of the Hack the Pentagon bug bounty program, members of the Department of Defense and participating organizations are calling on other government agencies to copy the DoD program to improve cybersecurity.

 

 

 

Trump’s Regulation Limit Hits Transportation Department Head-On

The Department of Transportation is holding off on creating new rules for automated vehicles and unmanned aerial systems because of President Donald Trump’s limit on new regulations, according to DOT officials. DOT has worked on a proposed rulemaking that would require cars to include vehicle to vehicle (V2V) communications, which would allow cars to talk to one another and avoid collisions.

The Situation Report: James Comey’s Cyber Strategy Ushering In Big Changes for Bureau

The organizational changes flowing around in James Comey’s head aren’t new or revolutionary. But they are for the FBI, and they could fundamentally alter what it means to be an FBI agent.

The changes are in line with experiments already underway at the Defense Department and the NSA—encouraging agents to spend time working in the private sector, bringing in private sector experts to perform tours of duty inside the bureau, and potentially building an internal university to develop the future cyber talent the FBI needs now and in the future.

“Should we make the barrier between us and the private sector semi-permeable?” Comey pondered during a keynote presentation Wednesday night at the Intelligence and National Security Alliance’s Leadership Dinner. “Our minds are open to all of these things.”

INSA Leadership Dinner with FBI Director James B. Comey Jr. on March 29, 2017.

With six years left in his tenure as FBI director, Comey has already kick-started a transformation effort that firmly embraces the digital changes swirling through the ranks of what is arguably one of the government’s most insular cultures. First and foremost among those transformation efforts is the way in which the bureau assigns cases. The modern digital age has completely obliterated the traditional concept of assigning cases to the nearest FBI field office. The physical manifestation of a crime or terrorist event “isn’t all that meaningful” in the age of the Internet and nation-state sponsored cyber espionage.

“We now assign computer intrusion work, whether that’s a nation-state, whether it involves a criminal syndicate, whether it involves a criminal syndicate working for a nation-state, whether it involves hacktivists or somebody else—sort of the motley crew of people engaged in intrusions—we assign it based on talent,” Comey said.

But the FBI “is not blind to physical manifestation” when it comes to criminal investigations, said Comey. Although the bureau assigns the threat to the appropriate talent, up to four other field offices are often enlisted to play supporting roles. One such office is known as a Strat office (for strategic) and the other type of office is referred to as a Tac office (for tactical).

“And then we [conduct] air traffic control from Washington,” Comey said. “This has had a great effect inside the FBI because it has fostered an intense competition among field offices to generate and demonstrate the talent against various dimensions of the threat.”

From a recruiting standpoint, the bureau may also need to open its mind to FBI agents who don’t carry weapons. Comey acknowledged the challenges the bureau faces when it searches the cyber talent pool for individuals who not only present specialized technical talent but must also be physically fit enough to “run, fight, and shoot” and be a person of high integrity.

“That collection of attributes is rare in nature,” Comey said.

“So we stare at the pool of talent and we have two reactions to the pool. We can’t compete on money. You in the private sector have more money. We acknowledge that to the people we are trying to recruit. But then we also make sure that they understand life with you is soulless and empty,” he said, to lots of laughter.

Kidding aside, Comey did raise some serious questions about what the future FBI agent might look like. “Do we really need gun-carrying agents making up an entire squad?” he asked. “Now we have squads of eight around the country. Should we instead have two special agents and six something elses?”

The Situation Report: When a Social Media Scandal Isn’t About Social Media

My Marine Corps has a problem. And it isn’t about social media, how long it will take male Marines to accept women in the ranks, or how Marines “treat each other” off the battlefield.

No, the recent scandal involving the Facebook group Marines United–a secretive, invitation-only group of current and former Marines that has shared compromising photos of female Marines without their permission—is a symptom of deep cultural bias that has always directly targeted women and has been enhanced by the rise of social media.

This is why the response of the Commandant of the Marine Corps, Gen. Robert Neller, has been so disappointing. By constantly referencing “fellow Marines” and “social media policy” instead of extreme bias against women, he deflects from the real issue.

“I mean, c’mon guys. They just want to do their job. Let them do their job,” Neller said during a Pentagon press briefing when the scandal first broke.

Shortly after Neller’s appearance at the Pentagon, the Marine Corps referred to the problem as “cyber misconduct”—another clear attempt to deflect from the real, much more difficult problem of violence against women.

The deflections continued, reaching as far as the House Armed Services Committee on March 21 when the Military Personnel Subcommittee held a hearing on the “Social Media Policies of the Military Services.” For a few minutes, it appeared as if the deflection had worked. The media seating area in the committee hearing room was virtually empty. Military.com reporter Hope Hodge Seck captured the scene in a tweet from the hearing.

But one lawmaker saw through the ruse. Rep. Jackie Speier, D-Calif., blasted the committee during her opening remarks for not tackling the real issues at stake.

“I have to say, I’m very disappointed in the topic of this hearing,” Speier said. “Framing the issue as military social media policies frankly misses the point. No one has ever gone on Facebook, looked at nonconsensually posted intimate photos, typed a rape threat, and then stopped and said, ‘Oh, I better not make rape threats! That’s against the military’s social media policy.’ ”

I asked James LaPorta, a fellow Marine and one of the journalists who helped uncover the activities of the Marines United Facebook page, what he thought about the constant deflections and what I see as an unwillingness to address the issue of violence and bias against women. His thoughtful response raises even deeper questions about the root causes of the problem now infecting the entire military.

“Social media policy is only one step to addressing this problem and let’s be realistic, this issue of exploiting women online will not completely be eradicated,” LaPorta said. “I think this issue stems mainly from decades of military culture, alienation between genders that’s more than just the debate of women in combat, but even how the different genders are tested and promoted.”

As LaPorta rightfully points out, there are a lot of issues that feed the root causes of the sexism that reared its ugly head in the form of Marines United. It is up to senior military leaders to now confront the problem head-on without deflecting the public’s attention away from the cancer that is violence and bias against women.

“I’m not sure the problem can be solved,” LaPorta acknowledged. “I hope that it could. The only thing I know is that somewhere along the way, members who engaged in the exploitation of women lost their sense of decency. Perhaps that’s a failure of leadership, a failure of institution or family, but at some point it’s the individual that needs to be held accountable.”

The latest public relations effort on Twitter by the Marine Corps involves a speech by Sergeant Major Brad Kasal that focuses on the rightful place in history earned by generations of Marines—male and female—and reinforces the ethos that stands like a steel rod behind the words Semper Fidelis.

But let’s be honest. As much as the Marines United scandal isn’t about social media or cyber misconduct, it also has never been about the performance and faithfulness of Marines on the battlefield. It’s time to stop deflecting our attention away from the real problem.

The Weekend Reader–March 24

Industry Insider: What’s Happening in IT

MeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from Xgility, GSA, U.S. Army Medical Command, and more.

 

Data Center Consolidation Deadline May Be Extended–But for How Long?

The deadline for Federal agencies to close all of their data centers by 2018 will probably be extended for an unspecified amount of time, according to Dave Powner, director of IT issues at the Government Accountability Office. The Federal Information Technology Acquisition Reform Act requires agencies to close their data centers by 2018. The most recent FITARA scorecard, released Dec. 6, indicates that the consolidation process is moving slowly. Twelve of the 24 graded agencies received a C or worse in the data center consolidation category.

Almost Human: IBM is Making Super-Secure, Cognitive Cloud a Reality

Big Blue is on a roll. The company on Monday announced a new data center in China, upping its cloud footprint to 51 data centers in 20 countries and signaling a continued enterprisewide push to make cloud computing a central component of its business moving forward.

 

 

House Has Qualms About FBI’s Facial Recognition Database

The FBI has been using facial recognition technology since 2010. Its Next Generation Identification-Interstate Photo System contains millions of photos of Americans, which FBI officers use during criminal investigations. The Government Accountability Office found that the database, which cost $1.2 billion to create, correctly returns matches 86 percent of the time. The National Institute of Standards and Technology requires facial recognition returns to be correct 85 percent of the time.

Data Analytics Can Rectify Soaring Fraudulent Payment Rate in Federal Agencies

Federal agencies are hemorrhaging billions of dollars every year due to fraud, waste, and improper payments, according to the Government Accountability Office. And the problem may be getting worse, with the governmentwide improper payment rate reaching $144 billion in fiscal year 2016. To put those percentages in perspective, GAO found that $44 billion of Federal improper payments in FY 2016 were caused by insufficient documentation. Another $34 billion were the result of the inability to authenticate eligibility, meaning an improper payment was made because agencies lacked databases or other resources to help determine someone’s eligibility status.

 

Look Who’s MeriTalking: Fighting Fraud, Waste, and Abuse With Big Data

MeriTalk recently spoke with Alan Ford, director of Teradata Government Systems. He delved into fraud, waste, and abuse in the government–why it happens and how big data and machine learning can play a role in stopping this $300 billion-a-year problem.

MeriTalk: Why do we see fraud, waste, and abuse continue to rise–especially related to Medicare and Medicaid–when reducing them has been a sustained priority?

Alan Ford (Photo: LinkedIn)

Alan Ford: Medicare and Medicaid, specifically, are classified as high-risk programs by the Federal government as they have a greater vulnerability to fraud, waste, and abuse mismanagement. There are a couple of reasons for this. First, traditionally, the penalties in this area have been low relative to other crimes and they are nonviolent crimes, so deterrence is low. Second, the system operates in a pay-first, check-later fashion, making it more susceptible to abuse because barriers to entry are low and the perpetrators are often long gone once the fraud is discovered. Third, Medicare and Medicaid are vital programs, so any changes to make fraud detection easier have to be done without interrupting the delivery of lawful recipients’ services.

Medicare and Medicaid comprise just one area of fraud, waste, and abuse. There are many more similar use cases including Federal student loans, defense contractors, disaster relief requests, and mortgages. Many of the same issues that put Medicare and Medicaid at risk apply to these other areas as well.

MeriTalk: Where has the greatest progress been made in stopping or reducing government fraud, waste, and abuse? Are there specific programs that you can cite as best practices?

AF: The more data that is made available for analysis, the better the chances that agencies can generate adequate levels of information to drive the detection of fraud, waste, and abuse. Data sharing across Federal and state barriers enables new insight into fraudulent activity, which is difficult to achieve when data are kept siloed. Data sharing is a major opportunity for agencies to become more effective.

As an example, the Health Care Fraud Prevention and Enforcement Action Team (HEAT), a joint task force among Health and Human Services (HHS), the Department of Justice (DoJ), and the Office of Inspector General (OIG), was created to share data and information. Since its inception in 2009, it has detected and collected more than $7 billion of fraudulent monies and convicted almost 2,000 different defendants–very effective work.

Another best practice program  has originated from the Centers for Medicare & Medicaid Services’ (CMS) Integrated Data Repository (IDR), one of the largest and most successful fraud and health care information repositories in the Federal government. It is based on a high-volume data warehouse, including information such as Medicare beneficiary data, provider data, contract information, and risk scores. The combination of these data sources into one integrated environment empowers organizations such as HEAT to use the data to generate new insight. Teradata has helped CMS run and operate IDR for more than 10 years with extraordinary results.

MeriTalk: What role can and must big data and analytics play in reducing the incidence of fraud, waste, and abuse–including preventing improper payments and determining accurate eligibility for and enrollment in specific Federal programs?

AF: Big data analytics are important because they create so much valuable insight from available data–structured and unstructured. We need analytical techniques that are sophisticated, but easy enough to use so analysts performing investigations can access and combine these different data types.

For example, the Social Security Administration is using disability claim information and looking at medical taxonomies and expected diagnoses to re-create decision-making processes to assist in identifying fraudulent claims. They could benefit from techniques and systems to transform raw, unstructured claim data into meaningful and useful information.

MeriTalk: Much of the focus has been on looking backward to identify instances that have already occurred. What types of technologies are helping agencies to identify and prevent fraud and abuse before it happens?

AF: Agencies need to act predictively rather than reactively. Many organizations are focused on determining what happened in the past and why. Predictive tools are available today that give agencies this ability.

Agencies need to combine today’s predictive analytic technologies with near-real time data ingest to determine what is happening now or is likely to happen in the near future. Tools that allow for individuals to provision new data sets without significant IT intervention and combine unstructured and traditional data are required to move agencies into being predictive, agile, and proactive. Again, the technology exists now.

MeriTalk: How is machine learning factoring into fraud, waste, and abuse identification and prevention initiatives? What’s next for machine learning in this area?

AF: Wherever the capabilities exist to integrate sensor data and Internet of Things (IoT) data for analytical work, there is an opportunity to leverage machine learning as well. Machine learning is great at sifting through enormous data sets and looking for outliers and insight we cannot get elsewhere as quickly or effectively.

For example, we need to apply machine learning to activities like modern aircraft maintenance. A fighter jet may have thousands of sensors collecting data in microsecond intervals resulting in a terabyte or two of data from just one flight. Machine algorithms can sift through huge data sets collected across an entire fleet and flag relevant outliers for a human to investigate. Applying advanced analytics to this data can identify operational trends and circumstances that can predict part and equipment failure before it happens. Engaging in this “condition-based maintenance” can prevent inefficient and wasteful use of repair and inventory resources and head off catastrophic failures before they occur.

MeriTalk: What hurdles remain in achieving real-time identification of suspect transactions or behaviors? How can agencies best address them, especially in this time of doing less with more?

AF: There are three big hurdles. First is reducing the lag between an event and detection of the event. To remove the hurdle, analysts need better, quicker access to important data.

Second is opening the world of advanced analytics to the people who are doing the investigations–fraud analysts. They need access to advanced analytical tools with pre-existing complex algorithms that enable them to plug parameters into them, rather than having to know how to write the algorithms themselves. These tools exist, but agencies have to identify them and get them into the hands of their analysts.

Third is enabling the ability to reach across various data platforms to combine data sets with greater ease. We need solutions that enable users to access and combine data regardless of where they reside and the disparate platforms involved. Again, these tools exist, but agencies need to procure and employ them.

MeriTalk: How are Teradata and its solutions helping Federal agencies attack the fraud, waste, and abuse challenge?

AF: Teradata has been helping government agency customers for more than 20 years with traditional techniques like data warehousing to combine data across multiple subject areas into a single integrated data model, enabling greater insight. We have health care solutions across the Federal and state government, such as CMS and its IDR. Several states use data warehousing tax solutions to identify tax fraud, mistakes in filings, and more. And finally, we support an enterprise data warehouse at the Postal System to help the organization run its operations more efficiently.

We also have leading-edge solutions involving advanced analytics of nontraditional data. For example, USTRANSCOM has a data warehouse that helps with materiel logistics, but also employs advanced analytics for optimizing cargo transport across available transport vehicles in the military. USTRANSCOM uses its system to marry cargo needing transport with partially loaded flights or even empty training missions to reduce the overall number of flights and optimize the efficiency of planned trips.

The Air Force and Navy use advanced Teradata analytics for pre-emptive maintenance in identifying precursor conditions of equipment failures. For example, if sensor data identifies excessive vibration in a turbine, it could indicate an imminent bearing failure. Proactive repair of the vibration or proactive replacement of affected parts helps to prevent a future broader failure.

Today and in the near future, Teradata increasingly plays a major IT and analytics consulting role, leveraging valuable intellectual property and innovative solutions from thousands of customer engagements. The technology landscape has become so complex that few organizations can operate at peak effectiveness without expert consulting guidance.

The Weekend Reader–March 17

Industry Insider: What’s Happening in IT

MeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from DHS S&T, SETI, DISA, ADI Energy, and more.

 

Trump’s Budget Cuts ‘Low-Value’ Programs, Seeks Tech Results

The proposed budget cuts civilian agency spending by 5 percent and would lead to a drastic reduction in the size of the Federal workforce. But a more telling aspect of the budget blueprint is its focus on accountability and performance. Federal IT programs (and all other programs, for that matter) will need to demonstrate measurable return on their investments if they want the Trump administration to continue funding them.

 

Russian Intelligence Officers Among 4 Indicted for Yahoo Email Hack

The Department of Justice released an indictment of four men involved in the 2016 hack of Yahoo email accounts, two of whom were acting in their capacity as Russian intelligence and security officers. “The defendants include two officers of the Russian Federal Security Service, an intelligence and law enforcement agency of the Russian Federation, and two criminal hackers with whom they conspired to accomplish these intrusions,” said U.S. acting assistant attorney general Mary McCord.

Trump’s Pick For White House Cyber Post Faces Growing Industry Distrust

President Donald Trump picked a National Security Agency official to lead White House cybersecurity policy issues during a time when NSA surveillance powers are up for discussion and bad blood exists between the NSA and industry. Rob Joyce began serving as the chief of the National Security Agency’s Tailored Access Operations organization in April 2013 and will work for the Trump administration on managing cybersecurity efforts, according to multiple reports.

FAA Airs Concerns About Privacy, Drone Regulation

The Federal Aviation Administration has not established any rules for commercial companies that collect and retain personal information, according to Earl Lawrence, director of the FAA’s Office of Unmanned Aircraft Systems. Several commercial companies have added unmanned aircraft systems, or drones, to their delivery fleets. These devices, furnished with cameras, have the ability to photograph people and their possessions. For example, a drone could photograph the license plates of cars at a health clinic and sell the information to insurance companies.

The Situation Report: Inside Trump’s New Cybersecurity Framework

The Situation Report’s Rhode Island Avenue listening post has picked up strong signals that President Donald Trump’s executive order on cybersecurity may still be weeks, if not months, away from hitting the street in final form.

After leaking two draft versions in rapid succession (the first of which was not even close to being ready for prime time), the White House finds itself struggling to define the metrics it will use to hold agency leaders accountable. After 15 separate reports and 175 detailed recommendations, the metrics that will be used to determine agency adherence to the National Institute of Standards and Technology’s Cybersecurity Framework remain “something that we’ll know when we see them,” according to Thomas Bossert, the assistant to the President for Homeland Security and Counterterrorism.

The building blocks for those metrics will be increased reporting by agency heads on how they are applying the NIST Framework to manage their risk.

“We’re going to go through a thoughtful approach that requires Federal departments and agencies to adopt and implement the cybersecurity framework developed by NIST and any subsequent iteration of that document,” Bossert said, speaking at an event Wednesday sponsored by the Center for Strategic and International Studies in Washington, D.C. “Reporting your known and unmitigated risk will be a requirement moving forward.”

Agencies will be required to submit a report through the Department of Homeland Security and the Office of Management and Budget that will detail their progress leveraging the NIST framework. “The idea there is to collectively render determinations on the adequacy of those mitigation strategies as management tactics, but also then it’s going to have to be done in some way that it [provides] a scorecard,” Bossert said.

But unlike the reports agencies currently generate under the Federal Information Security Management Act (FISMA), the new NIST framework scorecards will “probably not” be made public, according to Bossert. “The idea is to defend our crown jewels from a national security perspective and that will inherently be something that we don’t want to reveal to the public or our enemies.”

Although the metrics do not yet exist, Bossert pointed to the Office of Personnel Management as an example of how Federal cybersecurity will not be handled. “We all now know that an antiquated hardware system and an antiquated database software system holding millions and millions of important records to our national security was a bad approach,” Bossert said. “That was known and unmitigated risk, contemplated through the lens of one agency who had responsibility for their enterprise. It now needs to be looked at through the lens of the security of our nation and it has to be examined in addition to each agency…it has to be examined at a White House level to make sure that we’ve got a collective.”

According to Bossert, DHS will play a central “managed service provider role” as it works with agencies to identify risks, enforce standards, and deploy security protections across the government. And that will mean a greater reliance on private sector contractors and services.

“They’re going to have to reach out and get those resources from private industry and be receptive to that revolving door to some degree,” Bossert said.

“We can’t have resident in 190 or more Federal agencies the same level of zeal, passion, capacity, and capability that we can have in centralized places that provide managed services. I don’t think we would have the right money, the right skill set, and I think it would probably be a mistake for a lot of reasons,” he said. “So with DHS and with OMB helping us assess risk, we will then task back out to the departments and agencies, and we will rely heavily on private industry. I think that’s the only way to get and retain talent.”

Look Who’s MeriTalking: Yogesh Khanna

MeriTalk recently spoke with Yogesh Khanna, chief technology officer at CSRA, to discuss the roles of Federal CIOs and CTOs, the impact of the political landscape, and pivotal IT investments and strategies. CSRA brings together government IT professionals, emerging technologies, and cutting-edge industry advisers to deliver a broad range of innovative, next-generation IT solutions, and professional services.

MeriTalk: Recent years have brought significant expansion to the realm of Federal IT decision-makers. How are you seeing the roles of Federal CIOs and CTOs change? How might these roles continue to evolve or transform in the Trump administration?

Yogesh Khanna (Photo: LinkedIn)

Yogesh Khanna: Historically, the CIO’s role has been to focus internally and show that the enterprise has the necessary IT agility, security, and economics to run its business and support its mission. The CTO, on the other hand, has usually focused on bringing the most compelling technologies and innovations to clients. I don’t expect to see these distinct roles change under the Trump administration, but based on policies and executive orders, their priorities will most certainly change.

MeriTalk: Consolidation appears to be an important theme in the new administration. The latest draft of the president’s cybersecurity executive order calls for transitioning all Federal agencies to shared services for email, cloud computing, and cybersecurity. Another executive order in the works would direct agency heads to quickly develop plans for reorganizing their agencies with an eye toward privatization and eliminating redundancy through consolidation. What should agencies and their IT leaders be doing today to prepare for this new era?

YK: Consolidation is not new for Federal IT. That said, there are a few steps that IT leaders should take to prepare for future initiatives. First, have an inventory of current assets–hard assets and the software and applications that run on top of that infrastructure. As you pivot from a consolidated environment into cloud or a shared environment, you must have a governance structure, know the security posture of every workload, and determine what makes sense to put in a cloud versus what does not.

Second, develop the right strategy for leveraging the consumption-based market and understand where the market is going and where the competitors are so you can buy the right solution and services at the right cost.

Third, once you decide that you want to buy, focus on performance metrics. You’re essentially going from a CapEx [capital expenditures] model to an OpEx [operating expenses]; for the latter, you must have a solid definition of service and your SLA [service-level agreement].

Finally, create and make a complete catalog of available services visible to internal buyers. The CIO is the focal point that enables people to buy services, but the idea is to push the mechanics of acquisition to the end consumers of those services.

MeriTalk: Speed and agility are also administration priorities. What IT investments and strategies should agencies embrace to boost both capabilities?

YK: Go with cloud, but ensure you have the mechanisms to exit a specific cloud, as well. That’s the only way you’re able to take advantage of the rates available from multiple cloud environments. Having the exit strategy up front results in greater agility.

MeriTalk: What are your predictions for the Modernizing Government Technology Act? (What changes might be made upon reintroduction to address the Congressional Budget Office score awarded in December? What do you predict for timing of the signed act?)

YK: Since last year we’ve been working closely with Rep. Will Hurd, R-Texas, Rep. Gerry Connolly, D-Va., and other key leaders in this space to support the Modernizing Government Technology Act and we have big hopes that this will be the Congress that passes it into law. The Federal government is sitting on a lot of legacy–legacy of infrastructure, platforms, networks, and application services that run on top of old infrastructure. The reality is that it costs taxpayers dearly to maintain something that is not very well supported by the vendor community.

CSRA strongly supports the Modernizing Government Technology Act, as does the industry at large. This act is good for the government and for the taxpayer as it is the fiscally responsible thing to do.

MeriTalk: What is the single best investment that an agency can make today to jump-start the creation of a future-ready infrastructure?

YK: To me, a future-ready infrastructure is something that is highly virtualized, automated, and secure and can scale up or down to meet the varying requirements of a particular agency. These key attributes fundamentally equate to cloud.

Our guidance to our clients to be able to effectively deliver the right services to their stakeholders (whether internal or external) is to consider the flexibility and agility they need, while keeping in mind that their longer-term requirements might be unknown. Going with cloud is the best single investment an agency can make to ensure it is future-ready.

MeriTalk: What are you advising Federal agency IT leaders in terms of strategies for success and how is CSRA positioned to help them succeed?

YK: The evolving IT landscape will present a lot of options to our clients. We believe there is a power of choice that our clients must retain. There is a very healthy marketplace that has emerged and services are becoming less differentiated because they’ve gone the path of commoditization. Because of that competition, services are constantly being improved–becoming more secure and stable, and less expensive.

Our role as a systems integrator is to deliver the power of that choice and allow agencies to consume the best performance at the best price with a hybrid IT environment, leveraging multiple providers and benefiting from the healthy competition and innovation. We can give them that flexibility while also affording them the ability to have a single view of their entire enterprise where workloads may be running in multiple IT environments or clouds, including their own private environment that sits behind their firewall.

MeriTalk: I understand that last fall CSRA launched a new Integrated Technology Center. What is the role of the center and what unique advantages does it deliver to Federal agencies and their IT leadership?

YK: We built an integrated technology center in Bossier [City], La., that is part data center, part service center, and part development center. The data center can host a set of services, servers, and platforms that can serve as the underlying infrastructure for us to deliver shared services to many of our clients. The service center is where we have our network operations and security operations center–people monitoring our clients’ infrastructure and delivering help desk services. The development center is where we’re leveraging the university ecosystem in the south-central region to bring high-level talent that can develop the next generation of services and applications.

Bringing together these resources in one place enables us to deliver a set of services that are very competitive, highly secure, and are at a price point that is appealing to Federal agencies.

MeriTalk: What would you suggest as required reading for today’s CIOs?

YK: On my reading list is Be the Business by Martha Heller. It is a set of anecdotes from CIOs and CTOs of leading Fortune 500 companies and enterprises that highlight the need for leaders to understand technology and business, as well as have financial and legal acumen.

I also plan to read Disrupt You by Jay Samit. The book is about transforming yourself. How do you master your own personal transformation both in life and in business?

The Eightfold Path to Data Analytics Enlightenment

The Buddhist Eightfold Path offers eight guides to achieve spiritual enlightenment and cease suffering. With due respect to Buddhism, I offer eight paths to reach an enhanced, enlightened state for your data analytics efforts–a state that eases suffering, and provides deeper, more impactful experiences, both today, and with ever-increasing data volumes.

We hear a great deal about big data and the exponential growth in data resulting from social media, email, Twitter, machine logs, and IoT devices. Recent estimates from IBM state that 90 percent of the data in existence today is less than two years old and that we are creating 2.5 quintillion bytes of data per day.

The hard truth is that today’s data analytic systems are struggling just to keep up with their traditional, structured data streams. And they have not yet begun to leverage the exponential growth in semi-structured data.

Legacy issues caused by an overload of traditional batch Extract, Transform, and Load-Data Warehouse-Business Intelligence (ETL-DW-BI) architectures for structured data analytics include:

  • Slow data loading and data transformation;
  • Multiple data stages from landing to staging to target, with slow data movement and costly replication;
  • Heterogeneous and uncooperative database formats;
  • Long delays in adding and leveraging new data; and
  • Brittle target data models that support existing reporting, but limit addition of new reports and analytics.

But it is possible to ease this suffering and achieve a higher level of data analytics capability–perhaps even nirvana. Herewith, the Eightfold Path to Data Analytics Enlightenment:

      1. Share the load. Disrupt legacy IT ecosystems with distributed processing frameworks. Reduced costs and performance gains of distributed clusters are undeniable. The intelligence community was an early adopter of distributed processing and an active contributor to the Apache Hadoop ecosystem. Overloaded data ingestion, ETL, and transformation streams are now being improved with distributed Apache Spark solutions at the Defense Intelligence Agency, Centers of Medicare and Medicaid Services, and the Department of Homeland Security.
      2. Jump in the Lake. Exploit emerging Data Lake (NoSQL) architectures in harmony with structured data stores–to land and exploit more data, more quickly. Early euphoria around HDFS and NoSQL stores improperly proposed replacing the data warehouses. The best practice is to complement your data warehouse with Data Lakes. This architecture rapidly lands data that users explore with serverless database query services, using “schema-on-read” tools like AWS Athena, without building metadata. The DHS Neptune Data Framework implements this design pattern to speed time to insight and feed more data stores in classified settings.
      3. Lease Cloud Services. Leverage the growing collection of cloud Platform-as-a-Service (PaaS) offerings in addition to cloud IaaS to jump-start your analytics. Many analytic cloud services are elastic, lowering overall cost when not in use. Services include the core services needed for a traditional ETL-DW-BI solution including managed relational databases, NoSQL repositories, and data warehouses; serverless data preparation and data query; and BI reporting and dashboards. FINRA uses AWS analytic cloud services to ensure the integrity of financial markets and to protect investors. And 17 intelligence agencies use C2S, an AWS cloud platform that provides storage, compute, and elastic analytic services.
      4. Move up the Analytics Value Chain. Extend your reporting and dashboards with predictive analytics to forecast outcomes, embed analytics in decision-making processes, and apply prescriptive analytics to initiate actions for more desirable outcomes. Federal agencies that distribute large benefits have successfully used both predictive and prescriptive analytics to detect and prevent fraud: IRS prevents income tax fraud, CMS detects Medicare insurance fraud, and USDA SNAP reduces food benefit trafficking. All agencies can benefit from these tools for fraud detection, budget forecasting, financial management, safety, risk assessment, compliance, and scientific research.
      5. Provision and Empower Everyone. Invest in self-service data preparation, data analysis, and data visualization tools to reduce the time to insight. The days of large, specialized teams of ETL developers, data modelers, data architects, data scientists, and BI developers are dwindling. Agencies need to provision business analysts, executives, data analysts, researchers, and subject matter experts of all abilities. Users need access to data and tools–according to their abilities and need to know. This pervasive leverage of data resources will result in significant mission impacts. The U.S. Census Center for Applied Technology created such a culture of data exploration and entrepreneurs.
      6. Curate your Data. Adopt data governance policies and data management tools to capture, share, and leverage metadata. Support informal exploration of your Data Lake resources with tools that track lineage and manage access–but do not impose structure because different users may impose a different schema for a different analytical purpose. DHS, law enforcement, and the intelligence community all use rigorous data lineage to ensure data veracity in legal, investigative, and security operations.
      7. Discover Your Data. Supply your team with discovery tools that leverage statistical analysis, artificial intelligence, data visualization, and geospatial display to find patterns and meaning in data. Exploratory analysis by end-users can identify interesting patterns that extend BI reports and dashboards. A new category of automated discovery tools is emerging with the potential to find patterns of value automatically. Extend your ETL-DW-BI platform with these Modern BI tools. FAA, VA, DHS, and U.S. courts all use modern BI tools like Tableau, Microsoft PowerBI, and QlikView to explore and visualize data.
      8. Commit to Open Source. Embrace Open Source tools like Apache Hadoop and Spark that have created disruptive improvements to data analytics. For example, Accumulo provides high-speed access to big data stores. Adopt open source data science algorithms and packages like R and Python, and data platforms. Become active in the open source community; your agency can even launch its own open source project like the NSA did with Accumulo.

These eight paths may improve the data analytics suffering seen in large ETL-DW-BI projects. No project needs to adopt them all to achieve improvements, but the adoption of any path will benefit every project. Each of these eight paths offers opportunities to improve performance, optimize, innovate, and achieve real mission impacts with data analytics.

The Weekend Reader–March 10

Industry Insider: What’s Happening in IT

MeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from DHS S&T, GrammaTech, Kestrel Technology, and more.

 

Messaging App Used at White House Had Critical Vulnerabilities, Report Finds

A cybersecurity firm found critical vulnerabilities in a messaging application used by White House staffers, which could have allowed malicious hackers access to their conversations. IOActive began conducting its investigation into Confide’s vulnerabilities in February and found that hackers could impersonate another user by hijacking an account session or guessing passwords, learn the contact information of all or specific Confide users, become an intermediary in a conversation and decrypt messages, and alter the contents of messages and attachments.

92% of Federal Websites Fail to Meet Standards, ITIF Report Finds

Ninety-two percent of the most popular Federal websites fail to meet standards in either security, speed, mobile friendliness, or accessibility, according to a study released Wednesday by the Information Technology and Innovation Foundation. But industry experts say agencies can do better by moving to the cloud.

 

 

 

WikiLeaks Unlocks Alleged Vault of CIA Hacking Secrets

According to the leaked documents, the CIA has the ability to hack iPhones, Android devices, smart vehicles, and Samsung smart televisions. The agency’s method of hacking smart TVs was developed in tandem with the United Kingdom’s MI5. Labeled “Weeping Angel,” this type of hack can turn on a smart television’s audio system and record someone’s conversation while he or she thinks the machine is off. “Weeping Angel” also suppresses the device’s LED lights to improve the look of the “Fake-Off” mode.

2017–The Year Blockchain Takes on Health Care

Major innovations in blockchain for health data are likely to happen this year with the help of Federal agencies, industry experts say, even though applications for the technology have yet to reach mass markets. A blockchain is a data structure that can be time-stamped and signed using a private key to prevent tampering. It was most popularly used to create the digital currency Bitcoin but is increasingly expanding into other industries.

The Situation Report: Why the CIA Is Not Spying on Your Television

Let’s face it, any leak of classified information that reveals a new electronic surveillance capability of the U.S. intelligence community is almost immediately met with a chorus of weeping angels decrying the evil tendencies of intelligence apparatchiks bent on violating the privacy of average Americans.

As a former intelligence officer, I always chuckle listening to the news reports (I’m listening to one by CNN’s Jake Tapper right now as I type this) warning Americans that the private details of their lives are at risk from the horde of three-letter agencies in and around Washington, D.C. I laugh because of the absurdity of thinking that the CIA or any other agency of the U.S. government has the manpower, time, or interest in spying on you while you watch a movie in your living room.

The other reason I laugh—and this is much more important—is because there is very little thought ever given by mainstream journalists or pundits as to the significance of the devices being targeted. As a former intelligence professional, the first thing I ask is, “what intelligence target would hacking such a device give me access to?” Well, the answer I’m looking for in this case is pretty simple. And no, the CIA doesn’t care what Jake Tapper is watching on television late at night when (on the rare occasion) he’s not actually on TV.

For example, since the news broke that WikiLeaks published thousands of documents detailing the CIA’s hacking arsenal targeting iPhones, driverless cars, and smart TVs, has anybody wondered why the CIA would focus on iPhones and Samsung Smart TVs? Let’s look at where the data leads us.

Smart TV shipments worldwide by region. (Source: Statista.com)

You don’t have to be an intelligence officer to know that China is Apple’s most important market when it comes to iPhone sales. Sure, sales in China recently tanked, but that doesn’t mean our intelligence agencies should ignore the fact that Apple sold nearly 45 million iPhones in China last year. And the rumored major redesign of the iPhone is directed squarely at taking more of the market share in China.

You also don’t need to be the CIA director to know that Samsung dominates the smart TV market, especially in Europe and China. The latest sales figures indicate that smart TV manufacturers shipped more than 11 million smart TVs to China—nearly three times the number sold in the U.S.

News Flash: The United States has a vital national interest in spying on China. They are among our most important potential adversaries on the world stage. I just hope the CIA is working on similar exploits for smartphones manufactured by OPPO, Huawei, and Vivo, and China’s newest smart TV players like Xiaomi, Alibaba, Hisense, and Baidu. Because Chinese politicians and senior Army officers are surely busy disposing of their Samsung TVs right about now.

Silicon Valley and the Government Market: How Can the Government Modernize Faster?

The red tape and hassle associated with doing business with the government are legendary. Government buys at the speed of glaciers; in the meantime, technology evolves at the speed of Moore’s Law (that is, really fast).

This creates a huge problem. While nobody expects the government to be agile or innovative, we at least expect the government to have down the technology basics–rudimentary cybersecurity, basic response times, and some form of understandable citizen interfaces.

Unfortunately, none of this is happening. Government lags years behind the private sector with its IT infrastructure. Innovation is desperately needed to leapfrog the government from COBOL-based mainframes.

Agencies have taken note of this innovation gap. Several are addressing it head-on with new outreach efforts and agile procurement techniques. In terms of innovation outreach, DOD, DHS, and others are opening liaison offices in Silicon Valley, Austin, Boston, and Research Triangle.

These DOD offices are intended to make DOD a more transparent and attractive potential market for emerging technology companies.

These outreach efforts may or may not pay off. The DiUX initiatives had the direct personal visibility of former Defense Secretary Ash Carter, a scientist by training and avocation. Whether Secretary James Mattis assigns a similar focus upon these programs is unclear.

Other recent developments directly target the cumbersome process of procurement. These efforts focus on speeding up contracting and making monies available to innovative companies using streamlined procurement procedures. Here I must get a bit nerdy.

Two new sections in the National Defense Authorization Act promote a new fast-track process for innovators to highlight their capabilities within the Federal marketplace.

These provisions, called Section 880 of FY2017 NDAA, and Section 897 of this year’s NDAA, establish new and streamlined program authorities. Section 880 establishes pilot programs at DHS and GSA to acquire innovative technology up to a cap of $10 million using general solicitation competition procedures. What that means is that agencies are now empowered to carry out a pilot program (called a “commercial solutions opening pilot program”) that is acquired through a competitive selection of proposals resulting from a general solicitation and the peer review of such proposals. Think of this as an agency “shark tank” with a same-day funding decision.

Acquisitions can occur using streamlined procedures (think contract award within 30 days of agency “shark tank”). Using these streamlined procedures, the agencies would be able to accelerate the transition of new technological solutions into operational use by the agency users. These are perfectly legal, and are competitive procedures under the Competition in Contracting Act. Guidance on the use of these procedures is in process now at GSA and DHS.

This year, the NDAA took this innovative approach a step further. In Section 896 of this year’s NDAA, this programs’ use of merit-based selection procedures was expanded to encompass all pilot programs, as well as the Small Business Innovative Research Program and the Small Business Technology Transfer Program.

Deeming the use of this form of accelerated review and approval for innovative proposals to meet the requirements of competitive procedures under CICA and the FAR is huge. It legally authorizes agencies to step back from the usual, cumbersome forms of open market procurements and greatly streamline both the time and effort required to get under contract.

Industry should support these innovative approaches for innovative companies. And innovative companies should be aware of these fast-track developments as a back-door channel into the Federal market. How else will the innovations of Silicon Valley become an integral part of government?

 

The Weekend Reader For March 3

Industry Insider: What’s Happening in IT

MeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from DHS S&T, Department of Defense, Clemson University, Bastille Networks, and more.

NSA Director Wants to Contract Companies to Build Future Cyber Weapons

Rogers said Friday at an event co-sponsored by AFCEA International and the U.S. Naval Institute that he questions whether developing all cyber weapons within government is sustainable. The alternative, which Rogers said could be a reality within the next five to 10 years, would be for Cyber Command to tell companies exactly what type of weapon the agency needed to be built and allow the companies to manufacture it.

 

New Bill Would Give NIST Authority in Cybersecurity Framework Execution

The bill, titled “NIST Cybersecurity Framework, Assessment, and Auditing Act of 2017,” requires that NIST provide the Office of Management and Budget with guidance within six months of the bill’s adoption that agencies can use to incorporate the NIST Cybersecurity Framework into their security posture. NIST will also be required to establish a Federal working group within three months, which will develop metrics for Federal framework effectiveness.

DHS Edges Closer to Long-Awaited Biometric System for Tracking Visa Overstays

Nearly 13 years and several missed deadlines later, the goal of achieving that fully integrated system remains elusive for the Department of Homeland Security, according to a new report by the Government Accountability Office. More than 500,000 visitors overstay their visas every year, according to 2015 data released by U.S. Customs and Border Protection. CBP said it would release its 2016 overstay report by Feb. 28, but as of press time had not done so.

 

Insider Threat Programs Miss the Human Side of the Problem

Stopping insider threats relies more on addressing human problems than technological ones, according to Bill Evanina, national counterintelligence executive and director of the U.S. National Counterintelligence and Security Center.

 

 

 

 

The Weekend Reader-Feb. 24

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from GDIT, Department of Defense, BAE Systems, KBRwyle, Raytheon, QED Secure Solutions, and more.

White House Use of Encrypted Communication App Skirts Records Management Laws

Multiple reports surfaced this month that White House employees close to President Donald Trump have been using Confide to prevent the type of email hacking and release of information that occurred at the Democratic National Committee. Confide encrypts messages from end to end, allowing only the sender and receiver to read them. Once the message is read, it disappears.

 

IG Report Slams 18F for Rogue Security Practices

The General Services Administration’s 18F “routinely disregarded and circumvented” long-established GSA IT security and acquisition policies for every major system it operated, according to a new inspector general report. The audit found that none of 18F’s 18 information systems had proper authorizations to operate within GSA. In addition, 86 percent of 18F’s software items were not submitted for review by the GSA chief information officer.

 

Hitachi Systems Visualizes the Story of a Crime

Police departments now have the ability to view potential suspects’ activities on a map that’s integrated with social media accounts and public records in real time or close to it, thanks to new visualization and analytics technologies.

 

 

Response Planning is Key to Surviving a Hack

When government agencies face a network breach, having a planned response protocol in place can make all the difference, according to industry experts. “The first thing that they have to do is they have to really take a hard look at their incident response protocol,” said Rob Potter, vice president of public sector at Symantec. He added that recovering from a breach can become significantly harder without a response plan in place.

The Situation Report: The Coming Drone Wars and Why France Will Win

The Situation Report has picked up strong signals from our network of Middle East listening posts that the same drones many of us are buying online and flying around local parks are now being outfitted with improvised explosive devices and other weapons by the Islamic State and other terrorist groups.

The use of drones for military purposes dates back to Desert Storm in 1991. Since then, unmanned aerial systems, as they are known officially, have revolutionized our military’s ability to carry out direct strikes around the world and to conduct long-term surveillance and reconnaissance. But since IS posted a video in January detailing the results of its research and development into weaponized consumer drones, the terrorist drone threat has taken off.

Since that video surfaced, “ISIS has carried out drone attacks on a nearly daily basis, and releasing videos and still photos of these attacks,” states a new study by the Middle East Media Research Institute’s Jihad and Terrorism Threat Monitor Project. “This represents a major development in this area.”

A video released by ISIS’s Salah Al-Din province in Iraq on February 21, 2017, shows fighters learning how to weaponize drones in a class. (Photo: MEMRI.org)

Drones first became a major concern of the Department of Homeland Security and Secret Service in 2015 when several drone flights were detected near the White House, including one that crashed on the White House lawn. But by 2016, military and intelligence officials began to witness cheap, consumer-grade drones being outfitted with explosive devices throughout Iraq, Syria, and Afghanistan.

“ISIS, for example, is fitting them with explosive charges and turning them into guided missiles,” the MEMRI report states. “ISIS is using drones to drop small bombs onto Iraqi security forces and civilians. Hizbullah [Hezbollah] too has learned how to weaponize surveillance drones, and the two groups are now using them against each other in Syria,” the report states, quoting U.S. military officials.

Defeating Terrorist Drones

In 2012, Iran claimed to have captured a Boeing Insitu ScanEagle drone that had violated its airspace. Since then, Iranian officials have unveiled a copycat drone based on claims they were able to reverse-engineer the system. Israeli authorities detected a drone similar to the Iranian copycat in 2016 as it entered Israeli airspace from Syria.

An Israeli attempt to intercept the drone using U.S. Patriot Missiles failed. Officials say the alleged Hezbollah drone exhibited “atypical maneuverability,” possibly because of Iran’s ability to reverse-engineer the electronics on the captured U.S. ScanEagle.

“As jihadis began using drones, they also began to share technology with each other–including technology they obtained from U.S. drones,” write MEMRI analysts Steven Stalinsky and R. Sosnow.

Enter The French

France has had its own concerns with drones, especially after a couple buzzed the presidential palace and a military facility last year.

While U.S. authorities are busy funding costly research and development on high-tech systems designed to zap drones out of the sky or intercept their command and control signals, the French military has opted for a low-tech, yet almost foolproof solution—golden eagles.

(Photo: Shutterstock)

That’s right, France is training four golden eagles to intercept drones. The so-called four Musketeers—d’Artagnan, Athos, Porthos, and Aramis—were born to do this job. Literally, officials hatched these chicks in November atop drones and kept them there during their formative development period.

Today, demonstrations have shown d’Artagnan swooping down from his perch at 10 meters per second, slamming into a flying drone, grasping it in his talons, and wrestling it down to the ground.

The eagles are so powerful and precise, and demonstrate such a natural hostility to drones, that media outlets in France report that the military has already ordered another brood of chicks. It’s hard to argue with France’s decision considering the 80 million years of predatory evolution that eagles bring to the table.

Meanwhile, French R&D has focused on anti-blast protective materials to protect the eagles during their midair interceptions.

The Weekend Reader-Feb. 17

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from  Intel, SolarWinds, DHS S&T, FAA, SkyWest, and more.

 

White House Open Data Disappears, Raising Transparency Questions

The White House has deleted all of the information that was housed on its open data portal, a move that is creating confusion about the digital transparency of the Trump administration. The database, which was deleted last week, contained information about government salaries, visitor records, and government research. Most of the information has been archived on the Obama administration’s White House page, but some external links and internal pages no longer work in that format.

Defense Department Sees Big Role For Artificial Intelligence in Cybersecurity

The Defense Department is likely within 18 months of introducing autonomous cybersecurity tools that will be capable of augmenting human analysts by predicting threats, including insider activity, and dynamically isolating parts of the network that may come under attack, the department’s outgoing chief information officer said Thursday.

 

 

Census on GAO’s ‘High Risk List’

The decennial census earned a place on the Government Accountability Office’s 2017 High Risk List, due to its information technology-oriented agenda, according to Robert Goldenkoff, director of strategic issues at GAO. The decennial census appeared on GAO’s High Risk List in 2009 as a source of potential operational risks. Its presence on the 2017 list, however, hinges more on IT-related issues. Goldenkoff said that impending cybersecurity concerns contributed to the  Census Bureau’s placement on the list.

 

 

FITARA Scorecard Needs Improvements, Agency CIOs Say

Though FITARA scorecards provide important insights into IT modernization efforts, the current scorecard format needs improvements to accurately evaluate agency progress, according to agency CIOs speaking at an Association for Federal Information Resources Management event. Jonathan Alboum, CIO at the Department of Agriculture, explained that the size and organization of different agencies changes the way that those agencies accomplish FITARA requirements and how they are then evaluated. For example, agencies with federated IT departments across the agency should be evaluated differently from those with a centralized IT department.

The Situation Report: Congress Moves to Protect Your Location Privacy

Data collected by the American Civil Liberties Union shows that at least 70 state and local law enforcement agencies and more than a dozen Federal agencies own and operate cell site simulators that mimic cell towers and trick cellphones into sharing location data.

Known as “stingrays,” the devices are used to track criminal suspects. But with more than 320 million GPS-equipped cellphones used in the U.S., these secretive devices also regularly capture the location data of countless innocent bystanders.

That could change if Congress adopts a legislative proposal introduced Wednesday by a bipartisan group of lawmakers that would require agencies to obtain a search warrant to access location information on citizens without their knowledge, and would prohibit commercial providers from sharing that data with third parties without a person’s consent.

The bill, The Geolocation Privacy and Surveillance Act, would update years of conflicting court opinions on the matter. In 2012, the Supreme Court ruled unanimously in U.S. v. Jones that law enforcement agencies must first get a warrant before attaching a GPS tracking device to a vehicle. But the courts have said little about the implications of the skyrocketing number of consumer mobile devices that automatically transmit location data to nearby cell towers.

Introduced by Sen. Ron Wyden, D-Ore., and Reps. Jason Chaffetz, R-Utah, and John Conyers Jr., D-Mich., the so-called GPS Act would also provide for criminal penalties for anybody who secretly uses an electronic device to track another person’s location. The bill provides exemptions, however, for foreign intelligence collection operations, legal guardians tracking children, and situations in which a customer provides consent to share the data.

“Outdated laws shouldn’t be an excuse for open season on tracking Americans, and owning a smartphone or fitness tracker shouldn’t give the government a blank check to track your movements,” Wyden said in a statement. “Law enforcement should be able to use GPS data, but they need to get a warrant.”

According to the ACLU, the actual number of stingray devices in use across the country is not known. The use of stingrays “is often shrouded in secrecy,” according to an ACLU website dedicated to tracking their deployment. The ACLU also claims to have uncovered evidence that Federal and local law enforcement agencies are actively trying to conceal their use of the devices from public scrutiny.

“Geolocation tracking, whether information about where we have been or where we are going, strikes at the heart of personal privacy interests,” Conyers said. “The pattern of our movements reveals much about ourselves. When individuals are tracked in this way, the government is able to generate a profile of a person’s public movements that includes details about a person’s familial, political, professional, religious, and other intimate associations. That is why we need this legislation to provide a strong and clear legal standard to protect this information.”

Trump’s Tech–What’s Ahead?

Who’s running IT in the transition? Who’s up as the new Federal CIO? What’s with the new Cyber EO?  Right now, we’ve got more questions than answers in Federal IT. Here’s a short pour. Insights from the Hill, Trump transition team, GSA, DHS, and across government.

 

Fed CIO?

Word is, nothing’s going to happen quickly. May be that folks are still chewing on the Tony Scott State of Federal IT leave behind. Tony, you should have got better contract support–it’s so long it makes Vivek’s 25-point plan seem simple. Here’s what we hear. Reed Cordish is calling the shots. Cordish is a former world-ranked professional tennis player. Based on his meetings with GSA, he’s a big fan of 18F and Digital Services. Likes the agility. Reed may want to read the IG reports on 18F–two more coming any day now.  Congressman Hurd’s looking at holding a hearing on 18F in 60 days. But back to the Federal CIO decision–hearing we won’t see the position filled until May or June. Current frontrunner, Jessica Tisch, deputy commissioner of IT at NYC Police. She’s an heiress to the Tisch multibillion-dollar fortune.

 

Cyber EO

You’ve already read the revised Cyber EO–and we’ve reported on it. Here’s the 411. We briefed the MeriTalk Tech Iconoclasts paper–and the EO maps very tightly to recommendation four .usa 2020. Let’s face it, government IT is very bad at retiring legacy systems–the EO provides an important kick in the rear. It says that big agencies will keep their IT castles, but smaller agencies will need to go to shared services–makes a lot of sense. It makes agency and department heads accountable–a good thing, but it cuts right across FITARA. It puts GSA right in the middle of the modernization mix–and clearly we have some track record issues.

Some huge questions. The administration will need to bring its wallet–it’s going to take massive investment. Do the Republicans have the stomach for this spend? It’s going to drive a lot of friction, with no Federal CIO and little management in place, can the administration pull it off? And, of course, the inevitable questions, is this the final EO and when will we see John Hancock on the paper?

Word is Joshua Steinman is the architect for the next wave of Federal cybersecurity.

One final note for the dismount, if anybody tells you they know precisely what’s happening in government tech right now, question their credibility…

 

 

The Weekend Reader-Feb. 10

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from General Dynamics Information Technology, TRI-COR, Defense Logistics Agency, and more.

Latest Cybersecurity Order Calls For Shared Services, Network Consolidation

The order, “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,” obtained by MeriTalk, is a significant departure from earlier drafts. The latest version focuses heavily on interagency coordination, and makes modernization of legacy systems a central component of the plan to improve cybersecurity across civilian agencies.

 

 

Congress Will Keep Pushing for IT Modernization, Connolly Says

Congress will pursue IT modernization legislation just as meticulously as in the last Congress, in large part due to the high retention of active representatives in the last election, Rep. Gerry Connolly, D-Va., said at the Cloud Computing Caucus Advisory Group’s Destination Cloud event.

 

 

FCC Chairman Deals a Blow to Net Neutrality by Making a Free-Data Report Disappear

Federal Communications Commission Chairman Ajit Pai got rid of a report on free-data policies in what some are calling the beginning of an effort to derail net neutrality. Pai directed the Wireless Communications Bureau to rescind a report that concluded free-data policies are bad for consumers. These policies allow consumers to view certain websites and services without having to pay for data for that service, and enables Internet service providers to show favoritism toward certain sites, which violates net neutrality rules.

State IT Experts Stress Speed, Collaboration on Cloud Security

Collaboration and a willingness to learn new practices are the best ways to address cybersecurity concerns surrounding cloud computing, according to IT leaders from across the country. Greg Urban, chief operations officer of Maryland, said that a strong core of talent makes a big difference when exploring cloud capabilities. Urban, who spoke at the Cloud Computing Caucus Advisory Group Hillversation on Feb. 8, stated he assigned a “tiger team” to work on cloud infrastructure.

The Situation Report: What’s Behind the Delay of Trump Cyber Exec Order?

President Donald Trump was supposed to sign a sweeping cybersecurity executive order last month, but delayed its release shortly after meeting with senior national security leaders and industry experts. Since then the focus has been on trying to predict when Trump will hold the signing ceremony.

But worrying about the timing of the final order is far less important than the changes that are likely being made to the content of the order. Those changes—whatever they may be—may very well be the product of Trump’s meeting with senior government and industry cybersecurity professionals. I tend to think changes are being made to restructure a poorly written draft that suffered from lack of interagency coordination.

The draft order, titled “Strengthening U.S. Cyber Security and Capabilities,” calls for several 60- and 100-day assessments of the state of U.S. cybersecurity and the identification of areas of improvement. This largely follows the approach taken by President Barack Obama, who ordered his own 60-day cyberspace review shortly after assuming office.

The most glaring problem with Trump’s order was the complete absence of the FBI—the lead agency responsible for investigating cyber crimes, espionage activities, and attacks against Federal networks. Under Obama’s Presidential Policy Directive 41, the Justice Department and the FBI have been given key roles in national cybersecurity response.

“In view of the fact that significant cyber incidents will often involve at least the possibility of a nation-state actor or have some other national security nexus, the Department of Justice, acting through the Federal Bureau of Investigation and the National Cyber Investigative Joint Task Force, shall be the Federal lead agency for threat response activities,” states PPD-41, signed in 2016.

Another agency notably left out of the draft order is the State Department. It seems highly unusual for Trump’s first executive order on cybersecurity not to address international coordination and policy issues given the high-profile attacks against U.S. agencies and political organizations that have been traced back to Russia and China.

As many expected, the draft order delegates much of the power and influence over national cybersecurity efforts to the secretary of defense and, to a lesser extent, the secretary of homeland security. Although the secretaries of defense and homeland security are given authority over the reviews of national security systems and civilian agency systems, respectively, there are a couple of notable concerns.

First, the draft order calls upon the director of national intelligence to conduct a review of cyberspace adversary capabilities. But the review would not be a pure intelligence community product. The president’s national security adviser, Michael Flynn, would have a role, as would the secretaries of homeland security and defense.

Second, the order focuses rightly on the national imperative to improve the education system and increase the number of students pursuing science, technology, engineering, and mathematics (STEM) disciplines with an eye toward recruiting new cybersecurity talent to protect Federal networks. But strangely enough, the draft order puts the secretary of defense in charge of making workforce development recommendations to the president.

“The Secretary of Defense shall make recommendations as he sees fit in order to best position the U.S. educational system to maintain its competitive advantage into the future,” the draft order states.

“This order was clearly written by people who don’t necessarily have a handle on what an executive order is yet,” a former CIA cybersecurity professional said, speaking on condition of anonymity. “That said, executive orders are interpretations of existing law and are not meant to be drafted tightly. They want some vagueness in there.”

As for the apparent ascendancy of the Defense Department in national cybersecurity, the CIA officer said it comes as no surprise. “Flynn is going to put the military in front. DHS is going to get washed out of cyber.”

The large role for the Defense Department in the draft order may also be part of the administration’s world view, vis-à-vis Russia and China. And that may mean it is less likely that the final order will diminish the role of the Pentagon. “They may be sending a signal,” the former CIA officer said.

The Weekend Reader-Feb. 3

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from CACI, Leidos, National Institutes of Health, Department of Defense, and more.

Exclusive: VA Reassigns CISO to Enterprise Cloud Program

Less than six months into her tenure as the Department of Veterans Affairs’ chief information security officer, Roopangi Kadakia has been tasked to lead the agency’s cloud efforts. Dominic Cussatt will take over as acting CISO, according to an internal agency memo obtained Wednesday by MeriTalk.

 

 

House Bill Would Curb Open Data on Race, Affordable Housing

HR 482, or the Local Zoning Decisions Protection Act of 2017, moved to the House Committee on Financial Services on Jan. 12. Rep. Paul Gosar, R-Ariz., Sen. Marco Rubio, R-Fla., and Sen. Mike Lee, R-Utah, sponsored the bill, which would render Affirmatively Furthering Fair Housing (AFFH) ineffective. AFFH, a 2015 ruling of the Department of Housing and Urban Development, requires certain HUD grantees to conduct an Assessment of Fair Housing (AFH) planning process.

 

Executive Order Links Modernization Effort to Better Cybersecurity

President Donald Trump and members of his national security team met with industry cybersecurity leaders in what was billed as a “listening session” prior to the signing of an executive order that will introduce some fundamental changes to the government’s approach to national cybersecurity. Although Trump was expected to sign the order Tuesday, the signing was postponed shortly after Trump began the meeting.

 

Federal Cloud Spending Will Increase as Confidence Builds, NetApp Expert Says

The Federal CIO Council’s State of Federal Information Technology report, released Jan. 19, stated that Federal agencies spent more than $2 billion on cloud computing services in fiscal year 2016. Rob Stein, vice president of Public Sector for NetApp, said that amount will increase this year. Stein said the Federal government’s acquisition barriers are one reason widespread cloud adoption has been slow; however, he said cloud spending will ultimately increase in 2017.

1 5 6 7 8 9 19