Defense sees role for 'open source' software

The Defense Department sees a role for "open source" software as well as proprietary software in its information technology systems, according to a briefing conducted on Capitol Hill by a senior Pentagon official earlier this month.

In a presentation to staff for Washington state lawmakers, Dawn Meyerriecks, chief technology officer at the Defense Information Systems Agency, noted that the agency is exploring the use of certain software licenses, covered by the general public license (GPL) whose source code is open to inspection and alteration because it has been "widely" embraced by Defense high-tech clients such as IBM, Hewlett-Packard and Sun Microsystems. It also has been embraced by commercial information technology solutions. Further, open source technology improves cost effectiveness, the presentation said.

The presentation said that Defense is working on understanding applications and limitations of open source software as it applies to Defense policy requirements, and it is assessing the ongoing use of such software across the department. A report on both its application and use is in the process of development, to enable the agency to create an internal set of policies on open source.

The issue of the government's usage of open source is sensitive to Washington state lawmakers, as one of the state's largest employers is Microsoft-the largest producer of propriety software and a sometime critic of the government's use of open-source software. After Defense commissioned a study to examine its use of open-source software, Rep. George Nethercutt, R-Wash., arranged for Meyerriecks to meet with staff of Washington state lawmakers to get a briefing on open-source software. Nethercutt and officials with other state lawmakers would not comment on the meeting.

Microsoft and other companies, through a consortium called the Initiative for Software Choice, have been lobbying the Hill and other countries to ensure that open source systems, like Linux, do not become favored by governments. Currently, some countries such as Portugal are considering legislation that would require their governments to only use "free" or open source software. Earlier this month, Microsoft announced it would open the source code of its Windows operating system to governments and international organizations in an effort to enhance the software's security features.

Tony Stanco, associate director for open source in government at George Washington University's Cyber Security Policy and Research Institute, said that many high tech companies are starting to make use of GPL and Defense is looking at "where GPL might fit in the a software universe" at the agency.

Meyerriecks was on travel and could not be reached for immediate comment, but her presentation quoted Marcus Sachs, director of communication and infrastructure protection at the White House Cybersecurity office, saying, "We try to remain neutral with respect to the source [open vs. proprietary] ... the government isn't going to take a position [for or against open source]."

Microsoft officials declined to comment.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.