Smarter Gov Tech, Stronger MerITocracy
This page is not built out yet. If you are seeing this page, please contact an administrator.

The Situation Report: Will 2017 Be the Year Federal Cloud Takes Off?

Cloud computing has become virtually synonymous with IT modernization throughout the Federal government. But the government’s cloud record has been anything but consistent and predictable, making the effort to measure progress and plan for IT modernization efforts called for by Congress and the Trump administration nearly impossible.

These two challenges—modernization of Federal IT systems and the need to move to more cost-effective and agile cloud architectures—will likely go down as two of the biggest frustrations of former Federal Chief Information Officer Tony Scott, who pushed hard and valiantly to steer the ship of government in these directions.

But Scott, along with the help of the Federal CIO Council, left the incoming Trump administration with an invaluable treasure trove of insights into the State of Federal Information Technology in a report released just one day before President Donald Trump took office. In candid interviews with Scott and dozens of CIOs, deputy CIOs, chief information security officers, and numerous Federal IT managers, the 155-page report characterizes 2017 as a “crossroads” for Federal IT policy, oversight, and modernization, particularly in the area of cloud computing.

Federal agencies are projected to spend more than $2 billion on cloud computing services out of a total of $80 billion in IT spending in FY 2016. “However, while agencies see value in adopting cloud-based solutions they continue to face challenges in doing so,” the report acknowledges. “Longstanding Federal procurement policies, geared towards long-term, large-scale investments, do not always support the more incremental, agile acquisition model (e.g., only buy additional capacity when it is needed) offered by cloud providers.”

Source: Federal CIO Council.

CIOs also reported significant instances of confusion about Federal cloud policies and the impact those policies have on cloud service providers. “For example, the implementation of Trusted Internet Connections (TIC) requires the usage of specific government and commercial access providers, with validation checks provided by the Department of Homeland Security. A number of agencies stated that it was unclear as to whether their cloud-based providers were TIC-compliant, and the issue was further complicated by uncertainty over which policy should take precedence,” the report states.

“Additionally, the risk of vendor lock-in and concerns around multi-tenancy and data sovereignty continue to be issues,” according to CIO input to the report.

Security remains a central issue for CIOs as they contemplate moving Federal data to the cloud. And when it comes to Federal cloud security, the 800-pound gorilla sitting in CIO offices across the government is the Federal Risk and Authorization Management Program (FedRAMP), established by OMB in 2011 to provide a standardized approach across agencies for conducting security assessments, authorizations, and continuous monitoring of commercial cloud solutions.

But Federal cloud adoption rates continue to suffer. As a part of 2016 PortfolioStat, OMB set a governmentwide target of 15 percent for cloud computing adoptions. “Currently no agencies meet that level,” the CIO Council report states. “OMB also looked at FedRAMP utilization as a proxy for success adopting cloud computing solutions, but until the 2016 launch of the FedRAMP Dashboard, it was difficult to evaluate the level of agency re-use of FedRAMP packages for additional cloud provider authorizations.”

MeriTalk has documented the many trials and tribulations of the FedRAMP assessment process, including the high cost and lengthy procedures involved in obtaining a FedRAMP certification, as well as the lack of transparency in the program and the failure of agencies to share authorizations. Despite a concerted effort by the FedRAMP program office to streamline the certification process, the CIO Council report reveals that many of the same challenges continue to frustrate CIOs.

In a startling conclusion, the CIO Council report stated, “FedRAMP has not accelerated safe adoption of new cloud services.”

CIOs reported frustrations with the program’s inability to deliver on the central promise of assess once and use many times across government. In addition to not being able to find other agencies’ authorization packages for cloud services for potential reuse, there are still serious frustrations about unrealized cost savings and the need to conduct separate authorizations.

“Even once FedRAMP has issued an approval, I still need to do my own [certification & accreditation]–where is the cost savings?” one Federal CIO said. “Others indicated that FedRAMP takes so long to authorize a provider that it is not in the agency’s interest to participate. Further, even if a FedRAMP authorization is in place, the agency must conduct its own complete ATO,” the report states.

To learn more about effective cloud computing strategies, join MeriTalk on Feb. 8 at the Rayburn House Office Building for a Cloud Computing Caucus Advisory Group Hillversation. Hear from Federal and state agencies on their cloud strategies and how government can navigate the journey to the cloud. Click here for more information.

The Weekend Reader-Jan. 27

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from the Army Corps of Engineers, Polaris Alpha, the Naval Research Lab, and more.

 

Why Trump Can’t Get Rid of Climate Data

Federal records management regulations prohibit President Donald Trump from making climate change data disappear, despite the order to take down part of the website. Environmental Protection Agency employees said that Trump ordered the agency to remove the climate change page from its website despite rules in place to preserve online information produced by agencies.

 

Election Hacks, Artificial Intelligence, and Fake News Move Doomsday Clock Closer to Midnight

Every year since 1947, the Bulletin of the Atomic Scientists has adjusted the minute hand on the so-called Doomsday Clock to depict how close the world is to midnight—a metaphor for the increasing or decreasing threats to humanity. It is now 2½ minutes to midnight.

 

 

 

Women in STEM Need to Assert Themselves Now More Than Ever

Five days after millions of women marched around the world in support of equal rights, a group of female government technology leaders agreed it is more important than ever for young women to pursue careers in science, technology, engineering, and math (STEM).

 

 

 

Former Fed CISO Offers 4 Cybersecurity Recommendations for New Administration

Though former Brig. Gen. Gregory Touhill served only about four months as the first Federal Chief Information Security Officer, he has some suggestions for improving cyber in the new administration.“Frankly, I thought I’d still be standing up here as the Federal CISO, but that didn’t happen,” Touhill said Monday at the 2017 ICIT Winter Summit in Arlington, Va. “There’s a couple of issues that I think that are very noteworthy that collectively all of us have to be concerned about as we try to meet our mutual goal of supporting an open and transparent government that protects the people’s information while preserving privacy, civil rights, and civil liberties.”

The Situation Report: How the Hiring Freeze Could Affect the Federal Tech Workforce

President Donald Trump’s Federal hiring freeze on all non-military and public safety positions, announced Monday, met with almost immediate condemnation from Federal employee unions. But analysts worry about the impact the freeze could have on the ability of agencies to bring in new technology talent.

One of the most significant impacts of a hiring freeze will likely be felt in Federal tech circles outside of Washington, D.C. A hiring freeze means the vast majority of government operations (85 percent are located outside of Washington, D.C.) will be unable to bring in new, tech-savvy talent at a time when the number of employees eligible for retirement is increasing rapidly.

“With the number of retirement-eligible Federal employees increasing every day, new talent must be hired into the government in order to handle constantly evolving tools and technologies,” concludes a new report by the Federal CIO Council. “Recruiting new Federal employees and ensuring that existing personnel receive the right training and have the right tools to make use of new technologies needs to be at the forefront of the IT workforce efforts.”

Daniel Castro, vice president at the Information Technology and Innovation Foundation (ITIF) and director of ITIF’s Center for Data Innovation, told The Situation Report that the hiring freeze could hurt agency efforts like the Department of Commerce’s Data Corps or the General Services Administration’s 18F.

“They’re trying to hire a lot of people, and these are people they didn’t have on the rolls before. But they know they’re trying to hire for short-term positions, and this hurts,” Castro said. “It really puts a damper on the kind of mobility agencies are trying to develop in the Federal workforce. People will be leaving these organizations without the ability to replace them.”

One agency, which spoke to The Situation Report on condition of anonymity, said it is still trying to understand the freeze order. The agency is particularly confused about its ability to continue a very successful high-tech intern program.

Castro acknowledged this is an important question that relates directly to a critical talent pipeline for Federal agencies. “You’re paying for people who can eventually come on board as Federal employees,” he said.

The Federal government currently employs roughly 80,000 people under the job classification of information technology management. A hiring freeze will force agencies with unfilled positions to rely upon part-time workers or outsource more work to private contractors. Trying to reduce the size of the workforce without a corresponding restructuring of agency missions is a recipe for increased costs and an increase in the size of the contractor workforce.

Rich Beutel, principal of Cyrrus Analytics and the former lead acquisition and procurement policy counsel for the House Oversight and Government Reform Committee, said there are obvious potential upsides for contractors and small businesses. But there are also potential pitfalls to watch for, he said.

“[We could] see a repeat of the A-76 wars of past years—nonstop fighting between the unions and the administration on what can, or should be, outsourced,” Beutel said. The freeze also could have a negative impact on IT acquisition. The “acquisition workforce is usually the first to be downsized, which could slow down an already cumbersome and slow contracting process.”

Trump’s freeze seeks to reduce the number of Federal employees and reduce government spending through workforce attrition. But past presidents instituted four hiring freezes from 1977 through 1981, none of which resulted in significant financial savings or actual workforce reductions.

What government auditors found when they studied these past hiring freezes was that they hindered agency missions, reduced oversight of programs, resulted in lost revenue, in many cases actually increased costs to government agencies, and did not substantially reduce the size of the Federal workforce.

The latest workforce data published by the Office of Personnel Management shows there were about 2.66 million Federal employees in 2014. That number has remained roughly steady since 1999, with the notable exception of the increases around the 2010 decennial census. The data shows that Federal workers are actually only 1.9 percent of the total U.S. workforce, down a full percentage point from when Ronald Reagan left the White House in 1989.

But nobody really knows the size of the contractor workforce. That was the official conclusion of the Congressional Budget Office in 2015. “Regrettably, CBO is unaware of any comprehensive information about the size of the federal government’s contracted workforce,” the CBO said.

However, we do know a few things about the Federal contractor workforce. For example, we know that in 2012 government agencies spent more than $500 billion on commercial products and services. Federal spending on contracts grew by 87 percent from 2000 to 2012, according to the CBO.

“Numerous studies have shown that contractors are two to three times more costly than each federal employee they replace,” said American Federation of Government Employees National President J. David Cox Sr. “President Trump’s federal hiring freeze could result in more government waste if agencies are forced to hire high-priced contractors to do the work that federal employees can and should be doing.”

Castro remains optimistic, noting that he doesn’t think the administration can continue down this road for its entire first term. “An ideal outcome is a more focused approach three months from now.”

The Weekend Reader-Jan. 20

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from Google, Department of Defense, PROOF Research, and more.

 

Former Googler Steps Into Administrator Role at USDS

Matt Cutts announced Wednesday that he will replace Mikey Dickerson as the acting administrator of the United States Digital Service. Cutts is the former leader of Google’s webspam team and director of engineering for USDS who joined the agency six months ago, expecting to stay for only three months.

 

 

McCain Lays Out $430 Billion Defense Revitalization Plan

Sen. John McCain, R-Ariz., chairman of the Senate Armed Services Committee, released a 33-page white paper detailing a $430 billion increase to the defense budget over the next five years. In addition to increasing spending and boosting the overall size of the military, McCain’s strategy calls for a re-balancing of high-tech and low-tech investments.

Tenable Expert Urges Stronger Language for ‘Grizzly Steppe’ Report

Federal Joint Analysis Reports (JAR) should include stronger language on indicators of compromise (IOC), according to Cris Thomas, a network security strategist at Tenable. The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) released a JAR on Dec. 29 that discusses the tools Russian intelligence officers used to compromise the networks and infrastructure associated with the recent U.S. presidential election. Federal agencies have dubbed Russian Intelligence Services’ (RIS) malicious cyber activity “Grizzly Steppe.”

Q&A: Cloudera Expert Advises Agencies To Understand Their Cloud Payments

MeriTalk conducted a Q&A with David Tishgart, director of product marketing at Cloudera, on cloud adoption.

 

 

 

 

The Situation Report: Outgoing Pentagon Acquisition Chief ‘Concerned’ About Future

Volumes have been written about the challenge of reforming the Defense Department acquisition process. And while significant progress has been made—cost growth in major weapon system programs, for example, is now at its lowest level in 30 years—the only measurement that really counts is if the things the Pentagon buys increase the combat capabilities of the military.

That was the parting shot of wisdom offered by outgoing Undersecretary of Defense for Acquisition, Technology and Logistics Frank Kendall during his final public appearance Tuesday at the Center for Strategic and International Studies.

“The metric that matters at the end of the day is ‘are we gonna win?’ ” Kendall said. “We’re doing an awful lot of requirements decisions in my view sort of by the seat of our pants. I think we can do better than that.”

But winning on the acquisition front may get tougher before it gets easier, Kendall warned. The 2017 Defense Authorization Act included more than 100 provisions dealing with acquisition reform, including a controversial provision that splits the Acquisition, Technology and Logistics Office into two separate entities, each with its own under secretary.

“I don’t think it’s a good thing,” Kendall said, adding that many of the current legislative proposals are “totally divorced from the reality” of the acquisition system. “The right model is to have one person who’s responsible for the total life cycle of our programs.”

In addition to congressional interference, which often leads to more bureaucracy and regulation, Kendall said he has concerns about the possibility that the Donald Trump administration may bring in outsiders with little or no technical experience or experience in government.

“I’m a little nervous that that may happen in this administration. You have to understand what you’re doing. You also have to understand the cultures,” said Kendall, who’s served six years in the undersecretary position and has co-authored three versions of the Defense Department’s Better Buying Power policy guidance. kendall-book“Bringing somebody in who doesn’t have the experience of working in that environment I think is a disservice. They will spend their first year just learning what the environment is like and how it works before they can be effective.”

Kendall spoke at length about his new book, Getting Defense Acquisition Right, which is available in PDF form on the Defense Department website. The book contains what Kendall describes as “some of the hard-won lessons of my decades of experience in the development of new defense products.”

Kendall urged the incoming Trump administration to prioritize defense spending on research and development along with modernization. “That’s where we really need the money,” he said. “We’ve got the ideas. What we don’t have in our budget right now, in our budget request, is the money to take those demonstration [projects], and assuming the results are successful, go on to building products.”

The Weekend Reader-Jan. 13

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from Chiron Technology Services, Department of Defense, Department of Energy, Honeywell International, and more.

 

Hurd’s 2017 Tech Outlook for Congress: Modernization, Hacking and Beyond

Rep. Will Hurd delivers the congressional keynote at MeriTalk's Palo Alto Networks Federal Forum on Sept. 2, 2016. (Photo: MeriTalk) As the chairman of the House Information Technology Subcommittee and a former private sector expert in cybersecurity, Rep. Will Hurd, R-Texas, became one of the 114th Congress’ leaders in information technology legislation and policy. As the 115th Congress begins working on legislation, MeriTalk sat down with Hurd at CES Government to discuss his IT outlook for government in 2017 and some of his legislative objectives.

 

Giuliani Announces Plan to Coordinate Trump Cybersecurity Team

(Photo: Shutterstock)

Former New York City Mayor Rudy Giuliani went on Fox & Friends on Thursday morning to announce his endeavor to coordinate a cybersecurity team on behalf of the incoming Trump administration.

 

 

 

 

Reporter’s Notebook: At CES, Real Questions About America’s Tech Future

Photo: Dan Verton

The future got ahead of our innovators and government policymakers this past weekend at the Consumer Electronics Show in Las Vegas, leaving many wondering about the world being ushered in by the confluence of smart sensors, big data, and artificial intelligence.

 

 

 

Kelly, at Confirmation Hearing, Pledges to Get ‘Deep Into’ Cybersecurity

DHSRetired Marine Gen. John Kelly stressed the importance of working together to combat cyber warriors at his confirmation hearing for Secretary of Homeland Security. Kelly said at the Jan. 11 hearing that incumbent Secretary of Defense Ash Carter was “on to something” when he reached out to Silicon Valley companies for best cybersecurity practices. He said he would like to continue Carter’s work as DHS secretary.

The Weekend Reader-Jan. 6

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from CenturyLink, U.S. Navy, Intel, and more.

 

The Situation Report: From Scorned DIA Chief to Trump’s Intelligence Gatekeeper

meritalk.comCIA historians have written entire books on how agency officials and analysts should get to know different presidents and how to most effectively communicate vital intelligence information to the most powerful person in the world. The truth is it has very little to do with the intelligence collected on Russian hacking activities. Many of those same officials—all of whom spoke on condition of anonymity due to the sensitivity of the subject matter—describe an already tumultuous web of relationships among the most senior intelligence agency heads.

FedRAMP 3PAO Acquisition Raises Concerns for Small Businesses

meritalk.comCoalfire, the No. 2 FedRAMP 3PAO, announced last month it has acquired Veris Group, the leading provider of the mandatory security assessments for cloud service providers that want to sell their products and services to Federal agencies. The acquisition gives Coalfire nearly five times the number of FedRAMP authorizations as its nearest competitor.

 

 

DHS OIG Objects to TSA’s Sensitive Information Decisions

meritalk.comThe inspector general for the Department of Homeland Security lodged an objection to the way the Transportation Security Administration handles information it deems Sensitive Security Information in a recent report on IT system security. TSA redacted six pieces of information that it considered SSI from the report. However, this information had already been publicly released in previous OIG reports. “None of these redactions will make us safer and simply highlight the inconsistent and arbitrary nature of decisions that TSA makes regarding SSI information.

 

Trump Can’t Run Cybersecurity Like a Business, Report Says

meritalk.comThe report said that President Obama made the mistake of expecting that the incorporation of Silicon Valley executives in decision-making would automatically advance the United States’ cybersecurity prowess. The government is a complex system with different rules, relationships, and procedures than the typical technology company, which is one reason why these partnerships haven’t worked, according to the report. “There is no technological solution to the problem of cybersecurity, at least any time soon, so turning to technologists was unproductive,” the report stated.

 

The Situation Report: From Scorned DIA Chief to Trump’s Intelligence Gatekeeper

CIA historians have written entire books on how agency officials and analysts should get to know different presidents and how to most effectively communicate vital intelligence information to the most powerful person in the world.

But there’s no chapter (yet) in the CIA’s Getting to Know the President that could possibly prepare career intelligence professionals for President-elect Donald Trump’s inclination to publicly call into question the value and integrity of the analysis of our nation’s intelligence services. And that’s exactly what the tweeter in chief did on Tuesday.

But what’s really behind this very public rebuke? The truth is it has very little to do with the intelligence collected on Russian hacking activities. What Americans are watching play out 140 characters at a time, according to current and former intelligence professionals interviewed by The Situation Report, is a distasteful game of political retribution orchestrated by Trump’s pick for national security adviser, retired Army Gen. Michael Flynn.

Intelligence community veterans who spoke to The Situation Report paint a disturbing picture of a Trump national security team, led by Flynn, that is deeply skeptical of the CIA’s track record during the Obama administration—so skeptical, in fact, that Friday’s scheduled briefing on Russian hacking activities has already been discounted as little more than a political ploy.

Many of those same officials—all of whom spoke on condition of anonymity due to the sensitivity of the subject matter—describe an already tumultuous web of relationships among the most senior intelligence agency heads. Director of National Intelligence James Clapper, who is leading the review of Russian hacking activities, fired Flynn in 2014 largely because of Flynn’s tendency to bully anybody (including the White House) who didn’t agree with his hyper-partisan assessments. Clapper also recently tried to fire NSA Director Adm. Mike Rogers, who sources say is likely to retire to pursue the DNI position under Trump.

But it was Flynn who rode the right coattails to victory and it is Flynn who now serves as the intelligence gatekeeper for Trump.

“Trump is rightfully concerned,” said a former intelligence official who expressed support for Flynn. “He doesn’t know who’s friend or foe in the intelligence community right now. Clearly the intelligence community missed it on ISIS. They have been wrong on a lot of things and they don’t want to admit it. What have they got right? It’s a pretty short list.”

A former senior official who served at a major intelligence agency said Flynn, the former director of intelligence at the Joint Special Operations Command under Gen. Stanley McChrystal, has a valid point about the quality of the intelligence he saw coming from the national intelligence community when he was in Iraq. “He wasn’t a happy consumer of intelligence and I don’t necessarily disagree with him,” the official said.

But the man who some see as a talented maverick with a reputation for straight talk is seen by others as just another “embittered ex-staffer.” And that, combined with his position as Trump’s national security adviser, makes him a dangerous wild card.

“I think Flynn has Al Haig written all over him,” said a former CIA officer, referring to former Secretary of State Alexander Haig, a retired Army general who famously put himself in charge of the White House when President Ronald Reagan was shot. “Flynn got fired and he’s pissed off. The national security adviser always controls how much access the intelligence community gets to the president. And Flynn is shitting all over the intelligence community right now.”

For some veteran intelligence community members, that’s exactly what needs to happen. “Until the intelligence community purges itself of these very narrow-minded bureaucrats, we’re going to keep being wrong,” said an official supportive of Flynn’s approach. “And I don’t blame Trump for not wanting to be wrong.”

A former senior agency leader who knew Flynn when he served in government offered a word of caution about the maverick former general. “I always thought he was a mustang, but that he also needed to be managed,” the official said. “He was doing all of the right things, but it was the way he went about doing them.”

That has a former CIA officer very worried. “You are one GS-12 officer away from a fuck-up every day. I swear to God this is going to come back to bite Trump in the ass. The problem with Flynn is simple: ‘Fuck you’ is not a policy.”

The Weekend Reader-Dec. 23

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from Cloudera, CenturyLink, and more.

 

White House Creates App to Track Regulations

meritalk.comThe app is significant because of President-elect Donald Trump’s promise to issue a temporary moratorium on new agency regulations that are not compelled by Congress or public safety in order to encourage businesses to hire more workers. Trump also announced that “for every one new regulation, two old regulations must be eliminated.” The app allows users to search for regulations based on when they were completed, if they’re still being reviewed, or by agency. There are 96 regulations pending and 98 regulations recently concluded as of Thursday.

BYOD Security is Next Big Task, Citrix Expert Says

meritalk.comMore and more Federal agencies will adopt bring your own device policies in 2017, and industries will keep up with solutions to secure the devices, according to Glenn Roth, Citrix senior systems engineer for U.S. public sector. Several Federal agencies, including some of Roth’s customers, already have BYOD policies, which allow employees to work on their own laptops or tablets. The system of allowing employees to use their own devices offers opportunities for agencies to save money on Federally funded devices. Also, Roth said that employees are generally more comfortable working on their own computers than on government-issued devices.

 

U.S. Could Miss Out on IoT Benefits Because of Lack of Government Support

meritalk.comThe U.S. government has not done enough to support the Internet of Things, which could cause the nation to miss out on social and economic benefits, according to a Center for Data Innovation report released last week. The report acknowledged that the government has participated in many small projects to help IoT, but these projects are insufficient to foster the growth of this technology as quickly as would be “desirable.” The report suggested a large-scale, coordinated government effort, such as a national strategy for the Internet of Things. The act also advocated for a national IoT strategy.  “As the Obama administration draws to a close, it is unlikely the Federal government will make significant additional progress toward a national strategy,” the report stated.

Tech the Halls With Agency-Specific Gifts

meritalk.comAs the holidays roll around, the MeriTalk staff compiled a list of helpful technology gifts for agency employees. The gifts range from serious to silly depending on each agency’s mission and technology needs. Check out the list.

 

Understanding Russia’s Information Operations Campaign Against the West

There is no evidence that Russian hacking activities altered the results of the 2016 presidential election. Ghost votes were not cast and electronic tabulations were not changed. But there is ample evidence that Russian President Vladimir Putin’s intelligence services are now waging a massive information operations campaign targeting Western democracies.

There is now general agreement among the director of National Intelligence, the director of the FBI, and the CIA that Russia engaged in a wide-ranging campaign to influence the outcome of the election in favor of Republican Donald Trump, who has taken a decisively pro-Russian stance when questioned about the actions and intentions of Putin.

But the reaction to the intelligence community’s assessment by Trump loyalists and various information technology pundits has been to simply point to the possibility—however remote—that some lonely hacker who still lives in his parents’ basement could have been to blame for data breaches that led to the release of a trove of embarrassing emails related to Hillary Clinton’s campaign and the Democratic National Committee. Of course, such a conclusion is not only wrong, but it reveals a fundamental lack of understanding of how intelligence operations work.

The offensive hacking component of Russia’s activities to disrupt the U.S. election was but one part of a much larger information operations campaign—a campaign that is now believed to have involved layered operations security, psychological operations, and active dissemination of disinformation.

On Thursday, just one day before I appeared on BBC World News to provide an intelligence professional’s perspective on the Russian campaign, former CIA Director Gen. Michael Hayden appeared on the same program and characterized the effort as a massive intelligence victory for Moscow.

“I would put this in the win column as one of the most successful covert actions, covert influence programs in the history of covert influence programs,” Hayden said.

The reason Hayden is correct in his assessment and why the president-elect of the United States should side with the consensus view of his own intelligence services is because of how such intelligence assessments are developed and conclusions reached. The CIA’s assessment was not based on news media headlines or exclusively from computer code forensics. The assessment provided to Trump and to members of Congress is based on an all-source analysis of activities, ranging from code analysis to signals intelligence, open source information, and good, old-fashioned human intelligence—spies.

It is completely within the capabilities of U.S. intelligence to identify hackers and members of organized criminal elements working in cooperation with Russian intelligence. Two individuals involved in the Russian hacking effort are known to the U.S. intelligence community and are known to have working relationships with Russian intelligence. It is also within our capabilities to collect information that would implicate Putin in the operational planning and oversight of the campaign. All of that is, admittedly, very difficult, but far from impossible.

And I can’t imagine an intelligence assessment of such national significance that would not be based on a few digital fingerprints.

Now it is time to watch Europe. As much as Russia’s election hacking was an effort to destabilize the U.S. political system, Putin’s hopes and wishes don’t stop there. The success of the Russian effort in the U.S. practically ensures that Putin will turn his attention to the elections coming up in France, Germany, and the Netherlands—key NATO allies.

The Weekend Reader-Dec. 16

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from HP Enterprise Services, Carahsoft, and more.

 

At DHS S&Ts Industry Day, the Operative Word was ‘Consortium’

meritalk.comDuring the event, consortiums were touted as a way to address important S&T issues. The industry day, held on Dec. 5 in Menlo Park, Calif., served as a way for tech start-ups to learn about funding opportunities within S&T. The department has hosted five industry days prior to this one; this particular event sought out companies that could provide defense solutions for the financial sector.

 

Trump Seeks Trade Input From Tech Executives

meritalk.comPresident-elect Donald Trump met with technology executives Wednesday and asked them for their opinions on trade. “There are a lot of border restrictions and a lot of border problems,” Trump said during the meeting in New York. “I’m here to help you folks do well,” Trump said.

 

 

FCC Chairman to Leave Office Jan. 20

meritalk.comTom Wheeler, chairman of the Federal Communications Commission, announced that he will leave the agency on Jan. 20, 2017.  “It has been a privilege to work with my fellow commissioners to help protect consumers, strengthen public safety and cybersecurity, and ensure fast, fair, and open networks for all Americans,” Wheeler said in a statement. The Republican commissioners have vowed to overturn net neutrality and other Wheeler-era regulations once the commission enters a Republican majority.

Tech Community Uncertain About Trump Administration Policies

meritalk.comA lack of clear technology policy established during Donald’s Trump’s campaigning and preparations as president-elect is making it difficult to determine what the future of tech policy is going to look like, according to experts speaking at an Information Technology Innovation Foundation (ITIF) panel on Thursday.

 

The Situation Report: NARA Gains a CTO, NSA Loses an IG

NARA’s New CTO

mark-busbyMy Capitol Hill listening post has picked up strong signals that Mark Busby, the former program manager for the Department of Justice’s Data Center Transformation Initiative, earlier this month took over as the new chief technology officer at the National Archives and Records Administration.

Busby, who spoke at MeriTalk’s Accelerating Data Center Transformation event in October, was instrumental in closing 64 percent of DOJ’s data centers, which now stand at between 30 and 40 nationwide.

Amit Yoran on the Move

amit-yoranTenable Network Security announced it has hired former RSA President Amit Yoran to take over as the company’s new chairman and CEO.

Yoran, a cybersecurity entrepreneur, sold his first company (Riptech) to Symantec in 2002. He then spent a year as the director of the National Cybersecurity Division at the Department of Homeland Security.

He later founded and became CEO of NetWitness before RSA acquired the company in 2011.

NSA IG Dismissed?

RogersMy Fort Meade eavesdropping station has picked up indications and warnings via the Project on Government Oversight that NSA Director Adm. Michael Rogers has recommended the termination of George Ellard as the agency’s inspector general. According to unconfirmed intelligence picked up by POGO, a review board determined that Ellard–who has publicly criticized NSA leaker Edward Snowden for not approaching the IG before leaking data to news outlets–had retaliated against another agency whistleblower.

POGO sources state that Ellard remains on the staff at NSA pending an appeal currently before Secretary of Defense Ash Carter.

Ransomware Targeting Industrial Systems

(Illustration: Shutterstock)

My LinkedIn sensor network reports that ransomware attacks targeting industrial control systems (ICS)–the computers that control critical infrastructure like the electric power grid and major manufacturing processes–may be on the rise. In fact, researchers plan to detail three case studies involving ransomware that targeted ICS servers and work stations at two critical facilities in South America, and a third in the U.S., during next month’s ICS Security Conference in Miami Beach.

The Department of Homeland Security responded to 295 incidents in 2015 involving industrial control systems. But one of the big challenges facing officials has been the emergence of foreign companies that specialize in finding zero-day exploits for ICS networks and then selling them to hacker groups and foreign intelligence services.

Look Who’s MeriTalking: Jim Smid

MeriTalk recently connected with Jim Smid, chief technology officer at Iron Bow Technologies, to discuss hyper converged infrastructure (HCI) and how it can jump-start modernization. Iron Bow is a solutions integrator that helps companies and organizations implement new technologies, integrate those technologies, and create system efficiencies.

Jim Smid (Photo: LinkedIn)
Jim Smid (Photo: LinkedIn)

MeriTalk: What are the advantages of leveraging HCI to jump-start modernization and cloud migration?

Jim Smid: It’s all about simplification. Not only is the technology streamlined, but HCI is also easier to use from an operator and manager perspective. With HCI, users can advance toward the goal of commoditizing the use of their hardware–giving them greater flexibility in what that hardware is capable of doing.

HCI is an excellent step toward a software-defined data center (SDDC), which enables agencies to boost the utilization and flexibility of their hardware and make decisions based on how they need to use that hardware at any given moment. HCI plays an important role in orchestrating and automating these processes so organizations can get the full benefit of their hardware spend.

When it comes to jump-starting cloud migration, if the infrastructure isn’t simple and efficient, it’s not going to work. To move to cloud, organizations must drive efficiencies. HCI is a great way to simplify how you drive efficiencies and how to make cloud infrastructure work.

MeriTalk: Which of these advantages matters most to agencies today?

J.S.: Simplicity is most important to agencies. The ability to quickly deploy applications on HCI makes the agency much more efficient. This is especially important as agencies’ IT requirements grow and the shortage of skilled IT professionals persists. HCI can play an important role in helping agencies optimize the impact of their IT spend and resources.

MeriTalk: How else does a HCI approach help remove barriers to modernization and improve performance?

J.S.: The HCI approach has been around for a while, but there are several technology changes–such as flash storage and recovery management technologies–that help remove the barriers to modernization and improve performance across applications. HCI enables organizations to scale very simply, and gives them flexibility to leverage their overall infrastructure to drive greater efficiency.

MeriTalk: In what types of environments are you seeing the greatest traction for this approach?

J.S.: The greatest traction for a HCI approach is in virtual desktop infrastructures. However, as technical advances mature, we are starting to see HCI used as a more generic landing place for all kinds of applications. People are beginning to look to HCI before building something out in a traditional converged or reference architecture, and it is becoming a more realistic alternative for a wider range of applications.

MeriTalk: What myths or misconceptions are most common when talking to customers about deploying HCI?

J.S.: The myth is around performance. And it’s truly a myth today. With new technology, such as flash, the ability to extend memory, as well as various storage advances, people are realizing what HCI can do.  We are trying to get people past the perception that HCI won’t scale and we’re now seeing greater acceptance. Once our customers use HCI for more than what they originally bought it for, the approach continues to sell itself.

MeriTalk: Can you share a few best practices for the journey to HCI?

J.S.: The No. 1 best practice is to work with someone who has been there before and is familiar with the latest HCI advances. Agencies should lean on a partner with experience in how to design the infrastructure–one who understands the various iterations and offerings in the marketplace and how HCI can fit into their existing infrastructure. To ensure success, organizations must rely on subject matter experts, like Iron Bow.

MeriTalk: What do you think the administration change will mean for IT modernization initiatives, including the Data Center Optimization Initiative?

J.S.: That remains to be seen. I think the new administration has talked about driving efficiencies and investing in the Department of Defense, so I’m cautiously optimistic there will be a push toward modernization in IT and the benefits that modernization gives the military and government.

 

 

The Weekend Reader-Dec. 9

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from NIH, Mellanox, GSA, S&K Aerospace, and more.

 

CIOs Predict Decreased Funding for Tech Modernization Under Trump

meritalk.comDespite new policies designed to give chief information officers more spending power, some Federal CIOs don’t see any improvement in acquiring the technology they need to keep their systems secure. Luke McCormack, CIO of the Department of Homeland Security, said that whether or not MGT passes the Senate, systems will remain unfunded. Despite this, claims that the fund will cost about $9 billion prevent an agreement from the Senate.

 

VA Launches New Site For Digital Health Platform

meritalk.comThe Department of Veterans Affairs this week launched a new website to raise awareness of the agency’s Digital Health Platform–a cloud-based approach to integrating veterans health data to produce what the agency calls real-time, analytics-driven, personalized care. VA’s current EHR, known as VistA, is a 40-year-old system that the agency continues to modernize while it debates a potential commercial replacement. According to the new website, “DHP provides a comprehensive dashboard spanning a veteran’s complete health record.

 

DOT Reacts to FITARA Failure

meritalk.comThe third and most recent FITARA scorecard was released Dec. 6. DOT, which has received overall D’s on the previous two scorecards, received an F+ this time around. A spokesperson said that the report card does not reflect the agency’s particular circumstances.

 

 

 

Most Agencies Likely to Meet DATA Act Reporting Deadline

meritalk.comA majority of the 24 major agencies defined under the CFO Act are expected to meet the deadline to begin reporting their spending information. Under the Digital Accountability and Transparency Act of 2014 (DATA Act), Federal agencies are required to begin reporting their spending information to the Department of the Treasury and the Office of Management and Budget by May 9, 2017.

 

2017 Forecast – Cloud Ahead (Faster?)

It’s prediction season in Federal IT, and time to take bets if 2017 will (finally) be the year agencies find a way to speed their path to the cloud.

Signs point to yes.  GSA has signaled it’s working to streamline and accelerate the FedRAMP process, although it’s too early to know if the improvements will make a difference.  Cloud options are needed more than ever, with the Data Center Optimization Initiative (DCOI) requiring agencies to close 25% of their tiered data centers by end of FY18.  And, the data deluge continues from IoT, mobile, social, and more.

The question is can agencies modernize fast enough, making the data actionable and available.  We need to overcome obstacles including shadow IT, legacy applications that are far from “cloud ready,” budget constraints, and more.  So where from here?

More and more, cloud will be viewed as an investment strategy, with cloud selections based on questions including where the data must live, who needs access to the data, and the application’s current state.   Agencies will assess cloud options and create XaaS delivery models that are highly efficient, scalable, give mission owners a choice, and are more secure than legacy infrastructure.  A few thoughts:

#1   Focusing on the First Step:  Cloud Ready or Not?

Feds will focus on application rationalization, determining if agency applications are ready – and able – to operate successfully in a cloud environment.  This is a particular challenge for legacy applications, which can be bogged down by dependencies, connections to other applications, and data sprawl.  The state of cloud-readiness will drive the cloud investment strategy and taking this first step will simplify and speed cloud migrations.

#2   Hybrid Will Be Hot

When looking at application transformation and cloud migration, most agree that a hybrid approach makes sense.  Agencies can choose the most appropriate option for each individual application.  For legacy apps that are not “cloud ready,” an on-premise private cloud is likely the best route; for new applications, an off-premise solution may enable quicker deployment at reduced costs.  Agencies will have greater success building environments that connect data between clouds (public/private), building on hybrid cloud implementation success and lessons learned

#3   Everything-as-a-Service (XaaS) Will Overshadow Shadow IT

Feds will continue to turn to cloud-powered “Everything-as-a-Service” models, enabling mission owners to select and deploy vetted, secure technology options.  IT teams can deliver more quickly, and work within budget and personnel/resource constraints – paying for what they use vs. what they project.  Simplified deployment means in-demand IT resources focus on innovation vs. keeping the lights on.   And, last but not least – XaaS is more secure – enabling standardization and more frequent updates.  With cyber concerns front and center, end users and mission owners will look for these approved, secure, and rapid deployment options

ViON works with Federal customers to deploy the right cloud architecture – whether public, private cloud, or hybrid, and overcome legacy infrastructure limitations.  Through our CloudFast Service, we provide secure, on-premise private clouds – ViON owns the infrastructure, and agencies pay for what they use as they accelerate the modernization process.

And, through our Cloud Transformation Service, ViON provides a roadmap and assistance to get agencies moving, quickly, from their current state of legacy IT to a future with cloud-ready applications and infrastructure, enabling agencies to make cloud investment decisions aligned with mission goals.

Learn more about cloud opportunity for the year ahead:

Industry Perspective:  How to Embrace Cloud as a Business Model

IT-as-a-Service 101:  What You Need To Know

Infographic:  Cloud as an Investment Strategy

 

This blog post was originally published here

The Situation Report: Top 25 CIOs–Will They Stay or Will They Go? 3

One of the key goals of the Federal Information Technology Acquisition Reform Act, known as FITARA, remains enhancing the authority of Federal chief information officers. And doing that requires putting an effective reporting structure in place that ensures CIOs report directly to the head of the agency.

But that has proven to be a challenge, as we heard this week from Rep. Gerry Connolly, D-Va., one of the co-authors of the FITARA legislation. “In writing the legislation, we weren’t overly prescriptive,” Connolly said, speaking during Tuesday’s hearing of the House Oversight and Government Reform Committee. “We were hoping that the hierarchy would evolve to a more rational hierarchy. We have 250 people named CIO in 24 agencies. There is no private corporation, no matter how big, that would have anything like that.”

The movement to improve CIO authority in the Federal government is clearly beginning to shift to a numbers game. Are there too many CIOs? Why do so many agency CIOs have trouble controlling the activities of sub-agency and sub-sub-agency CIOs?

This led The Situation Report to think about who will be leaving the Federal CIO ranks during the transition and who might be staying. With the help of a veteran industry executive who has tracked this very issue, we pulled together the following list of 25 Federal CIOs.

The Top 25 CIOs. Will They Stay, or Will They Go?

Note: CIO positions across government fall into one of the following categories:

  • PAS CIOs: These positions are presidential appointees who require Senate confirmation;
  • Noncareer SES: These positions are senior executive-level roles and are filled by political appointees;
  • Career SES: These positions are senior executive-level roles and are filled by career employees;
  • General SES: These positions are senior executive-level roles and can be filled by either a career or a noncareer executive.

gundeep-ahluwaliaIncumbent: Gundeep Ahluwalia

Agency/Department: Department of Labor

Status/Staying or Leaving: Career acting-Career SES recruitment underway

 

 

jonathan-alboumIncumbent: Jonathan Alboum

Agency/Department: Department of Agriculture

Status/Staying or Leaving: Career-unknown

 

 

bender-cropIncumbent: Lt. Gen. William Bender

Agency/Department: Department of the Air Force

Status/Staying or Leaving: Career-unknown

 

 

sonny-bahagowaliaIncumbent: Sonny Bhagowalia

Agency/Department: Department of the Treasury

Status/Staying or Leaving: Career-unknown

 

 

sylvia-burnsIncumbent: Sylvia Burns

Agency/Department: Department of the Interior

Status/Staying or Leaving: Career-unknown

 

 

The Weekend Reader-Dec. 2

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from GSA, IBM, DHS, Armor Express, Department of Energy, OGIS, and more.

 

Police Unsure About Sharing Body Camera Footage With Feds

meritalk.comPolice departments across the country that received Federal grants for body worn cameras are concerned about sharing information with the agencies responsible for this funding. Some police departments have gone so far to as to say they would not share body camera footage unless Federal agencies compelled them. Body cameras that are turned on all the time can be a double-edged sword. While these constantly running devices could potentially improve officer accountability in certain cases, there are also situations in which this content could be misused.

 

Effort to Block Rule 41 Changes Fails, Easing Government Hacking

meritalk.comAn effort led by Sen. Ron Wyden, D-Ore., to block or delay changes to Rule 41 of the Federal Rules of Criminal Procedure failed to pass the Senate floor on Wednesday, causing the changes to the rule to go into effect at midnight on Dec. 1. The changes will allow law enforcement to obtain warrants to search computers in an unknown location and to search any device that the hacker has broken into, potentially granting access to multiple privately owned computers with one warrant. The ACLU is disappointed that Congress did not halt the rule change.

 

Next Federal CIO’s First 100 Days Could Focus on Cybersecurity

meritalk.com

While President-elect Donald Trump has outlined his goals for the first 100 days in office, information technology experts speculate that the first 100 days for the next Federal chief information officer will focus on bringing new leaders up to date on cybersecurity challenges. Mark Kneidinger, acting director of Federal network resilience at the Department of Homeland Security, said the Federal CIO should be aware of the massive change in leadership, ensure that the new CIOs and deputy secretaries are aware of their cybersecurity responsibilities, talk to leaders about how to continue to upgrade their legacy systems, and bring together chief information security officers to establish a common mission similar to that of the CIOs.

 

 

Tech Companies Cultivate Workforce by Sponsoring High Schools

meritalk.comIBM suggested a new model of education, which includes six years of high school, in a letter to President-elect Donald Trump from Nov. 15. Ginni Rometty, chief executive officer of IBM, said that there will soon be 100 schools that follow this method across the country. After their third year, they’re eligible to take at least one college course.

 

The Situation Report: Cerner Positions Itself For EHR Deal With Veterans Affairs

The technological stars may be aligning for health IT giant Cerner. And that could mean another multibillion-dollar government contract–this time with the Department of Veterans Affairs.

Kansas City-based Cerner announced this month an agreement with American Well, a telehealth technology company, to deliver a virtual health care experience within Cerner’s electronic health record (EHR) system–an industry first.

Integrating telehealth capabilities into the EHR experience puts Cerner in a highly competitive position as the VA continues to deliberate the fate of its aging VistA EHR platform. Telehealth has been a major component of VA’s efforts to improve access to care for veterans, especially for those veterans who do not live close to a VA hospital or clinic. Making the Cerner EHR even more attractive to VA is the company’s recent win of the Defense Department’s $4.6 billion EHR contract.

There were several factors that led DOD to choose Cerner that also make the company’s EHR technology an easier sell for VA. First, Cerner has already put its software through the Pentagon’s rigorous security scanning process. In addition, Cerner demonstrated to DOD that it was capable of providing modular software components that can be used with other commercial software packages, and would not require significant customization.

The aligning of the stars has not been lost on senior Cerner executives. My remote listening post near Cerner’s Kansas City headquarters picked up some very interesting intelligence during a recent company earnings call.

“I don’t think there’s an expectation that’s going to be in the immediate horizon, but there is clearly a dialogue,” said Cerner President Zane Burke, referring to the potential for VA to approach the company to replace VistA. “Should we be called upon to respond to that and get asked, we’d be excited to perform.”

VA earlier this year put a $624 million VistA scheduling upgrade contract on hold, crushing the hopes of Cerner competitors Epic Systems and Lockheed Martin. At the same time, VA Chief Information Officer LaVerne Council told Congress she had made a recommendation to VA on a “state of the art, world-class” EHR system.

“Our motto is to put our head down and be very successful with the DoD,” Burke said during the earnings call with analysts. “That will yield a lot of positive results for 2017 in terms of system sales that are unique to Cerner, as well as position us for the VA.”

 

OPM Breach Preventable with Security Analytics

The House Committee on Oversight and Government Reform released an investigative report in September that reviewed the Office of Personnel Management (OPM) data breaches – breaches that resulted in over 21 million stolen records. The report stated, “Despite this high value information maintained by OPM, the agency failed to prioritize cybersecurity and adequately secure high value data.”

Editor’s Notebook: Understanding Run, Hide, Fight

As a former military intelligence officer, I recently had the opportunity to be part of a team of security experts who developed the First Observer Plus anti-terrorism training. First Observer Plus is a U.S. Department of Homeland Security training program administered by the Transportation Security Administration.

The value of this training program became obvious as news broke Monday of an active shooter incident taking place at Ohio State University in Columbus, Ohio.  Tens of thousands of students received the following “Buckeye Alert” early Monday via Twitter and text messages.

 


But as the news developed, it became painfully obvious that many involved, including the media, had little or no understanding of the run, hide, fight guidance. For all of the benefits of high-tech alerts and apps, they are of little significance if school administrators do not properly train their students in what it means to run, hide, and fight.

The First Observer Plus anti-terrorism training program, which is currently being deployed across the nation to millions of transportation industry workers, can make a difference in helping to educate school and university officials on how to teach active shooter response to their students.

“It is more important than ever for the news media and the general public to understand what the actual guidance is for responding to an active shooter incident,” said Don L. Rondeau, program executive for the First Observer Plus training program. “Run, hide, fight sounds simple, but there are specific things you should consider during each potential phase, and everybody should understand that fighting should be undertaken only as a last resort.”

The following detailed explanation of the Run, Hide, Fight active shooter response is based on the First Observer Plus terrorism awareness training.

actsht-run

Run

If you decide to run, have an escape route and plan in mind. Leave your personal belongings behind. Keep your hands visible so law enforcement officers responding to the incident can see that you don’t pose a threat.

actsht-hide

Hide

If you decide to hide, hide in an area out of the shooter’s field of view. Block entry to your hiding place. And if there’s a door present, lock it. And remember–turn off your cellphone so it doesn’t give away your location. Phones set to silent may still vibrate and emit noise.

actsht-fight

Fight

If you choose to fight, do so only as a last resort and try to incapacitate the shooter. Take aggressive action and use whatever items are at your disposal to fight.

actsht-finals

Other Considerations

There’s one other thing you should understand about reacting to an active shooter incident–and that’s how to respond when law enforcement arrives.

  • Remain calm and follow instructions.
  • Put down any items in your hands.
  • Raise your hands and spread your fingers.
  • Keep your hands visible at all times.
  • Try to avoid quick movements toward officers, such as holding onto them for safety.
  • It may be difficult, but try to avoid pointing, screaming, or yelling.
  • And don’t stop to ask officers for help or directions when evacuating.

Reporting Information

Information you should provide to law enforcement or 911 operators during an active shooter incident is as follows:

  • The location of the active shooter.
  • The number of shooters.
  • Physical description of shooters.
  • Number and type of weapons held by shooters.
  • And the number of potential victims at the location.

The Weekend Reader-Nov. 25

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from Symantec, BAE Systems, and more.

 

Trumps Tech Advisers: No Restraint, No Regulation

meritalk.comPresident-elect Donald Trump during his transition is relying on two American Enterprise Institute contributors for advice on technology policy, which consists of calls for deregulation of the National Security Agency and an end to net neutrality: Jeffrey Eisenach and Mark Jamison.  Eisenach said the government should create a Federal Cybersecurity Service, a civilian agency with the NSA’s cyber defense assets and the powers of the military and law enforcement to react to cybersecurity problems without having to go through the obstacles of gaining permission from other levels of government. In Trump’s YouTube video, which outlines his plans for his first 100 days in office, he said he would allow the military to develop and use offensive cyber capabilities; however, that poses a problem for the protection of private companies that have been the targets of cyberattack.

Connolly Leads Effort to Hold Election Cybersecurity Hearing

meritalk.comRep. Gerry Connolly, D-Va., spearheaded a letter signed by 15 members of the House Foreign Affairs Committee to request that the committee hold a hearing on the attempts by foreign powers to influence the U.S. presidential election. “It is our hope that a potential hearing would address what interference took place, how it happened, and how we can prevent such actions going forward, in order to preserve the integrity of the U.S. electoral process,” Connolly told MeriTalk. “Electronic security is an important aspect, but not the only potential form of foreign interference in U.S. elections.” “Ranking Member (Eliot) Engel, one of our most cherished institutions, democratic elections free of foreign interference, is in question,” the letter said.

Grants Support Cybersecurity Education

meritalk.comLeaders of the University at Albany, State University of New York’s cybersecurity program are working on internship opportunities with companies in the area for students to gain cybersecurity experience. The program divided $1 million in grant funding evenly among five academic institutions to support cybersecurity education among students. Between 250 and 300 students are enrolled in UAlbany’s cybersecurity program, which includes a master’s track, as well as accounting and digital forensics programs.

Privacy Groups Stand Against Federal Student Information Database

meritalk.comThe Department of Education has plans to build a Federal database of student information, which has sparked protest from privacy groups. The Federal unit records system would include information on student performance throughout school and track students into their careers. Supporters said that the database will help inform policy decisions and enable students to make better choices when it comes to higher education and jobs.

 

The Situation Report: Prepare For a Radical Shakeup in Federal IT

Analysts and pundits have been wringing their hands for the past two weeks trying to predict what the election of Donald Trump means for Federal IT and technology policy. Of course, nobody has a good answer because nobody really knows.

And while it will certainly take some time before IT issues bubble up to the top of the priority list for the new administration, the reality is that there’s no evidence to suggest that Donald Trump will not embark upon a radical retooling of Federal IT, potentially dismantling the failed General Services Administration’s 18F experiment and reversing course on the Obama administration’s baby, the U.S. Digital Service.

In fact, a radical shakeup is actually more likely than is staying the course. A Trump administration will steer the ship of state away from its current course of filling the government ranks with Silicon Valley heroes and instead turn over the government’s most challenging technological problems to private tech firms that can develop better solutions, under budget, and ahead of schedule.

THE SITUATION REPORT SPONSORED BY:

[the_ad id=”24963″]

Trump’s loose grasp of technology issues and policy means he will continue to delegate many of these decisions to team members within his inner circle. Yes, many observers are hoping beyond hope that Federal Chief Information Officer Tony Scott will agree to stay on beyond the inauguration. But as Scott has acknowledged, nobody is asking. The reality is that the future of Federal IT is in the hands of Trump’s transition leaders for technology—Jeffrey Eisenach, an economist, and Mark Jamison, a research professor.

Neither Eisenach nor Jamison has any practical, hands-on technology management experience in government or the private sector. They are products of the Washington, D.C., think-tank scene. So what is their world view when it comes to IT policy and the role of government? One of the most instructive examples is the approach taken by Eisenach and Jamison to the FCC. Eisenach is no friend of the FCC and has supported significantly rolling back the agency’s authorities. But Jamison has gone a step further, actually questioning the need for the FCC’s existence.

Just how radical an idea is this? Well, consider that the FCC is the second largest source of revenue in the U.S. government–bringing in more than $44 billion last year as a result of spectrum auctions. “Who will auction off spectrum to the private sector?” asked a senior FCC source, who spoke to The Situation Report on condition of anonymity. “All that money goes to pay down the national debt by the way, not to FCC (whose budget has been flat for the last seven years at approximately $400 million). A $400 million investment for a $44-plus billion return in one year is something that the Trump administration might appreciate.”

What are the chances that the likes of an 18F, which has lost tens of millions of dollars, competes with the private sector, and has no major IT program successes to point to (other than a few websites and apps), could survive in a Trump administration that is willing to entertain the thought of eliminating a critical agency like the FCC? What are the chances that the Obama administration’s tech baby—the U.S. Digital Service—will survive Trump’s ongoing “evaluation” of the entire Executive Office of the President, which includes the Office of Management and Budget, the Federal CIO’s office, the Office of Science and Technology Policy, and more?

The reality is, these are not (as some have suggested) questions for a Republican administration. These are questions being posed to a Trump administration—a political organism that nobody yet truly understands. Anybody who thinks they know what is going to happen is simply not telling the truth.

“Is net neutrality toast? Probably,” said a senior FCC official. “Will they stop the activities of the FCC re: privacy and ISPs? Perhaps. However, the advisers may want to look closer if they think the Trump administration would want to kill the $44-plus billion/year in spectrum auctions revenue or their mechanism for rolling out broadband infrastructure to middle America. Not to mention E911 and other emergency telecom services for the nation.”

A willingness to eviscerate a Federal technology player as large and as important as the FCC is clear indication that the Federal government’s Silicon Valley experiment is far from safe. Liquidation of these highly questionable endeavors will not happen overnight. Like climate change, the sea levels are rising slowly but steadily all around 18F and USDS. And they don’t have the waders for it.

The Weekend Reader-Nov. 18

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from Amazon Web Services, Department of Defense, Octo Consulting Group, and more.

Extreme Vetting Will Require Smarter Data, DHS Expert Says

meritalk.comPresident-elect Donald Trump ran his campaign on the commitment to remove illegal Mexican residents and temporarily ban Muslims from entering the country. Extreme vetting policies would logically accompany these stringent immigration goals. “We need to avoid data glut and information overload,” said Donna Roy of DHS.

 

 

Snowden Warns Against Putting ‘Faith or Fear’ in Trump

meritalk.com“What we need to start thinking about now is not how we defend against a President-elect Trump, but how we defend the rights of everyone everywhere,” according to Edward Snowden, the National Security Agency contractor responsible for leaking information about the U.S. government’s mass surveillance program in 2013. Snowden said the Internet is a tool that was built to empower people, but too often it is used by authoritarian governments to disempower dissenters. To overcome this problem, Snowden said that technology companies need to ensure every communication system is “protected by default” from end to end across the world.

Its Privacy vs. Innovation in Wild West of Augmented Reality

meritalk.comIn the “Wild West” of augmented reality applications, the U.S. government has to balance the concerns of helping to protect consumer privacy and security while also leaving room for companies to freely innovate, according to witnesses at a Senate Energy and Commerce hearing. It doesn’t always feel like there’s a sheriff out there to help out,” said John Hanke of Niantic. On the other side of the spectrum, white hat hackers, whose aim is to discover vulnerabilities in AR software and help companies patch them, worry that they will be prosecuted for their work. “We worry that our reverse engineering or our attempts to figure out what the flaws might be with a device will be met with legal challenges,” said Ryan Calo.

 

State Department Leads the Flock in Twitter Usage Among Federal Agencies

meritalk.comAgency Twitter use has become an important factor in communication between the Federal community and the public. Agencies that have the best Twitter strategy, such as the State Department, tend to have been present on Twitter for the longest and have picked up the most followers. MeriTalk studied the Twitter accounts of 15 agencies to determine number of followers, number of tweets, and year that the Twitter accounts were created to determine which agencies are the most successful on the social media site.

 

The Situation Report: Bandwidth Trumps Politics for Defense Intelligence

What do you get when you cross a third-generation Portuguese congressman with a completely logical plan to consolidate the military’s Joint Intelligence Analysis Centers around the world?

If you guessed an investigation by the Pentagon inspector general and serious allegations of plagiarism, you are correct.

Rep. Devin Nunes, R-Calif., the chairman of the House Permanent Select Committee on Intelligence whose family hails from Portugal, is waging war on the Defense Department’s plan to draw down U.S. forces at Lajes Air Base on a small Portuguese island in the Azores and reassign military and contractor personnel to a new, modern facility at the British Royal Air Force Base at Croughton. In addition to saving money, the move is in response to an aging infrastructure at the current JIAC in Molesworth, U.K., and the lack of sufficient IT communications infrastructure in the Azores.

But Nunes this week waged an unusually vehement defense of his family’s homeland (unusual in that he represents the people of California, not the people of Portugal) when he called Director of National Intelligence James Clapper and Deputy Secretary of Defense Robert Work to testify before the committee, and proceeded to prosecute his case based on Wikipedia and tourism anecdotes.

Stay with me.

In March, Work met with Nunes and other lawmakers to provide written justification (as a required by the Defense Authorization Act) for the Pentagon’s decision not to move personnel from Molesworth to Lajes. And while the intent was to lay out the communications bandwidth requirements for the JIAC and show why the Royal Air Base in Croughton was a much better communications hub than Lajes, Pentagon IT officials (from the department’s CIO office and the Defense Information Systems Agency) did the unthinkable.

“Secretary Work, are you aware that significant portions of this document that you passed to three committee chairmen to meet a public law were plagiarized from Wikipedia?” Nunes asked.

Pause here for uncomfortable shifting in one’s seat.

Rep. Devin Nunes, R-Calif.
Rep. Devin Nunes, R-Calif.

“I’m just alarmed…that we would rely on Wikipedia, a free online encyclopedia that’s famously known for most high school students plagiarizing their homework and that the Department of Defense would even use Wikipedia…to provide any information to Congress to put in any report,” said Nunes.

“I’m surprised that this comes directly from a Wikipedia page,” responded Work. “I was required by the National Defense Authorization Act to make a determination that our movement to Croughton was operationally the right call to make and I made that determination and communicated my intent to do that.”

Because the consolidation of facilities will impact the National Intelligence Program budget, Clapper was forced to weigh in on the matter. During briefings last year with the commander of the JIAC at Molesworth, Clapper said he was informed that civilian contractors working at Molesworth had outright refused to move to Lajes.

“Sounds like we are making decisions based on where people want to live,” Nunes shot back.

“You know these are older people who have children in schools, particularly high school age, and I think that the general reaction to that—to move to an island in the middle of the Atlantic ocean—was not very positive,” Clapper said.

“You have to put this into the context of what this question is about,” Work said.

” ‘What was better, Croughton or Lajes?’ There is no comparison. Croughton is absolutely the best information hub,” he told Nunes.

And that’s when Nunes’ argument went from the ridiculous to the absurd. “Are you aware that the Azore islands are a popular vacation spot for people from the U.S. and Europe and have daily flights?” he asked Clapper.

Clapper paused for a moment, the wheels clearly spinning, wondering if he should allow politics to trump the realities of bandwidth.

“Ahh…no, I’m not.”

Moving Time – Federal Data Center Optimization Takes Center Stage

It’s time for Feds to pack their data center bags and start moving to cloud.

Yet enterprises are not as secure in their decision to move to cloud. The Blue Coat Elastic 2016 Shadow Data Threat Report showed nearly 100 percent of apps analyzed do not provide sufficient security and compliance controls to effectively protect data in the cloud. In addition, organizations are running 20 times more cloud apps than they estimate, leading directly to an increase in Shadow IT.

What can Feds learn from enterprises’ experience? And how are Feds faring in the move to cloud?

The Weekend Reader-Nov. 11

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from Quantum Spatial, Bureau of Land Management, NOAA, Woolpert, and more.

 

Trump Administration Likely to Oust 18F

meritalk.comThe incoming Trump administration plans to get rid of 18F, the digital services team located within the General Services Administration that has been criticized recently for its spending practices, according to a senior administration official. “People that have actual IT experience will be put into positions,” said the official, who spoke to MeriTalk on condition of anonymity because of the sensitive nature of the transition discussions. Republican Donald Trump won the presidential election on Nov. 8, raising questions about what lies ahead for Federal IT.

 

Sensors Text Farmers When Cows Get Sick

meritalk.comFarmers should save their cows’ numbers in their phones because cows can now send farmers a text message when they’re feeling under the weather. The farmer maintains a base station that reads all of the data from each of the cows, adds the real-time data to the outdoor temperature and humidity, and then uploads it to the cloud. The system can also email a veterinarian to make an appointment for the farmer, to ensure the cow’s illness can be prevented quickly.

 

IoT Called a ‘Wonderful Thing’ for People With Disabilities

meritalk.comThe Internet of Things (IoT) is a great tool for those with disabilities, experts say, but government and industry can do more to ensure that IoT devices are accessible by all, through the implementation of universal design. “The Internet of Things offers opportunities to increase independence by reducing the need for personal assistance at home,” said Daniel Castro, vice president at the Information Technology and Innovation Foundation, adding that smart pill bottles, sensors in the home, and advances in assistance robots would enable people with disabilities to live at home or alone while still ensuring quality care. “These technologies have potentially enormous benefits for people with disabilities, but these benefits are by no means guaranteed.

Council of Agency Web Directors Will Assemble a Month After Election

meritalk.comThe General Services Administration will start a council of agency Web and digital directors by Dec. 8, according to a memorandum from Federal Chief Information Officer Tony Scott. The memorandum establishes a governance structure that will help agencies comply with Federal laws and policies regarding digital services and websites. Every agency must develop a plan for governing its digital services and post it on the Federal government’s digital strategy webpage. This way, digital services will be available and an integral part of each government agency.

 

The Situation Report: FITARA Scorecard Changes and IC ITE Funding Questions

Change Is In The Air

It’s no secret that a lot of Federal chief information officers aren’t fans of the methodology behind the Federal Information Technology Acquisition Reform Act (FITARA) scorecard issued by the House Oversight and Government Reform Committee. Critics have complained that the scoring methodology wasn’t always fair and reasonable.

Well, my remote listening post positioned outside the Rayburn House Office Building has picked up strong signals that changes to the FITARA scorecard are being crafted for the next session of Congress. Chatter indicates that in addition to making the scoring process more reasonable for agencies, lawmakers “want somebody to be accountable” for the progress (or lack thereof) of agencies. “Part of the changes involve adding responsibilities and making OMB responsible for oversight,” according to a source close to the discussions.

“The discussions are really focused on normalizing the scorecard so that there is more consistency across different agencies of different sizes, complexity, and culture,” another source told The Situation Report. The new scorecard will likely refine the metrics used to evaluate how agencies are reporting CIO authorities.

Could IC ITE Suffer Under Trump?

In August, then-presidential candidate Donald Trump openly expressed his distrust of the U.S. intelligence community. But now that he’s the president-elect and receiving classified intelligence briefings, will he come around to the reality that the IC is critical to his ability to make sound national security decisions?

Time will tell. But can the intelligence community’s central modernization effort—IC Information Technology Enterprise (IC ITE)—wait that long? My Capitol Hill sensor network has detected tremors stemming from potential funding shortfalls for the massive effort to deploy a common IC desktop, secure online collaboration tools, and secure common cloud architectures across the 17 major components of the U.S. intelligence community.

Because IC ITE is not a collection activity and is not owned by any one organization, “adequate funding may depend more on voluntary contributions—a coalition of the willing,” according to a recent study intercepted by The Situation Report. “As all resources are finite, money used for IC ITE means less money available for agency-specific priorities.”

More Questions For 18F

Imagine Federal CIO Tony Scott’s surprise when he heard that the U.S. Digital Service and the General Services Administration’s 18F were working on developing a single sign-on capability for the Centers For Medicare & Medicaid Services (CMS). My deep intercept station outside the New Executive Office Building picked up information on a conference call between an OMB emissary and representatives from CMS, USDS, and 18F.

“It would take $100 million. Why do you guys think you can do this?” is all my intercept station picked up before we lost the signal. Intelligence sources indicate 18F has yet to respond to the question.

MeriTalk Names GSA Source

Reacting to a battery of recent MeriTalk articles on GSA 18F and FedRAMP, voices inside and outside GSA have called for MeriTalk to name our source.  Well, this time, we’re completely transparent–it’s Matt Goodrich. Just last week, the FedRAMP PMO issued a message to FedRAMP JAB-certified CSPs.  The FedRAMP PMO tells CSPs that have invested millions to attain a JAB certification that they need to demonstrate that they have at least six unique agency customers–or they’ll get kicked out of the JAB certification and need to pursue an agency sponsor.

 

FedRAMP Eats Its Own Children

CSPs are incensed by what they see as the FedRAMP PMO moving the goal posts. And, interestingly, the FedRAMP PMO states that it may change the minimum threshold–so that CSPs may need more than six agency customers to maintain their JAB certification. Peculiar timing for this assertive move from the embattled PMO. GAO just announced that it’s auditing the FedRAMP process–and Congressman Gerry Connolly’s convening government and industry to frame new legislation to corral the wayward “do-once-use-many” cloud cybersecurity certification program. By requiring CSPs to demonstrate their governmentwide installation, the FedRAMP PMO will likely turn its biggest allies into its biggest adversaries. CSPs are incensed by the prospect of their massive investments going up in smoke.

 

What If CSPs Say No?

What if CSPs refuse to provide the PMO with information on where they’re installed? Few have agreed to provide this information to date. It’s widely known that CSPs don’t want to provide their customer lists for fear of tipping their hands to the competitors. It’ll be interesting to see how GSA goes about enforcing the reporting requirement–not to mention the eviction process. Time to lawyer up?

 

Quack, Quack

Congressman Will Hurd triumphed in Texas–that’s a huge win for the tech community. That said, it’s unlikely we’ll see any movement on MGT until the new session–why would Republicans not wait to negotiate with themselves? At the same time, we’ll likely see 18Fers jump ship fearing Trump. That could spell a whole new chapter for FedRAMP, cloud, and government procurement reform. Industry and government got together to provide recommendations to fix the program. GSA refused to acknowledge this effort. Mr. Goodrich’s email to CSPs has surely changed the tone and urgency of the debate.

Reporting to You Live – Real-time Updates for Agencies

This just in, a threat has surfaced on an agency network. Can it be stopped in time? Continuous Diagnostics and Mitigation (CDM) combined with Symantec + Blue Coat’s security platform enables real-time threat detection, allowing agencies to mitigate and address any risks.

Agencies need visibility into their networks, control over user access, and protection of their boundaries as part of CDM.

The Weekend Reader-Nov. 4

Industry Insider: What’s Happening in IT

Insider smallMeriTalk compiles a weekly roundup of contracts and other industry activity. Stay up to date on everything that’s happening in the Federal Information Technology community. MeriTalk.com keeps you informed about the topics that mean the most to you and creates a targeted platform for cooperation, public-private dialogue, highlighting innovation, and sharing informed opinions. This week: News from OSI Systems, ProPublica, FedRAMP, VMware and more.

 

Air Force Speaks to Congress About Cloud Computing Fund

meritalk.com

The U.S. Air Force is talking to Congress about starting a multiyear, replenishable fund for cloud computing, according to Frank Konieczny, CTO of the Office of Information Dominance and CIO of the Office of the Secretary at the U.S. Air Force. Cloud computing would be widely adopted by Federal agencies if the congressional funding process changes to accommodate IT modernization. Agencies have trouble predicting the budget they’ll need for cloud computing because of the fluctuating nature of certain applications. “It’s just a ridiculous exercise.” In some agencies, cloud adoption is occurring whether or not it’s cost effective.

 

New Cybersecurity Job Search Tool Features Interactive Map

meritalk.comThe National Institute of Standards and Technology announced the release of CyberSeek, an interactive map that shows cybersecurity job availability by both state and locality. At the time of publication, the map showed nearly 349,000 cybersecurity job openings nationwide and a total employed cybersecurity workforce of more than 778,000. The website also includes a Career Pathway section, which provides job seekers and those looking to get into cybersecurity careers with entry-level positions, salary statistics, and potential career pathways. The tool is also designed to help employers find areas of the country with a high saturation of cybersecurity workers, as the current market has more open positions than workers able to fill them.

Q&A: The Indiana University Professor Who’s Trying to Weed Out Fake News

meritalk.comMeriTalk conducted a Q&A with Filippo Menczer, a professor of Informatics and Computer Science and the director of the Center for Complex Networks and Systems Research at the Indiana University School of Informatics and Computing. In May 2016, he and his team launched the Observatory on Social Media (OSoMe), a big data hub for people to analyze social media trends.

 

 

Top 10 Ways to Make FITARA Work

meritalk.comCenseo Consulting Group worked with Cyrrus Analytics and Hettinger Strategy Group to create the report “FITARA at a Crossroads.” MeriTalk summarizes the 10 recommendations. GAO would continue to audit the government’s ability to meet legislative requirements. If GAO could access OMB’s agency data, which is more detailed than the information stored by any other entity, they would be able to make more accurate assessments. The grading criteria need to reflect new fields and provide incentive for future FITARA behaviors.

 

1 6 7 8 9 10 19