Tech Roundup

Inside Job

The Transportation Security Administration is shopping for a computer program to snoop into the online activities of agency employees, including their keystrokes and emails, for signs of potential leaks. TSA’s solicitation for an “enterprise insider threat software package” in June coincided with an Office of Special Counsel memorandum to federal agencies warning against targeted email monitoring. The memo followed a Food and Drug Administration retaliation case in which FDA allegedly spied on the private correspondence of whistleblowers.

Many government offices, particularly those in the intelligence and defense communities, are embracing employee-surveillance technology to prevent the unauthorized disclosure of federal information. TSA is specifically looking for a tool that can track keystrokes, chat messages and email, file transfers, and other activity—all without tipping off the employee. 

Spokesman David A. Castelveter says, “as the agency whose serious responsibility it is to deal with national security, TSA must remain vigilant to safeguard sensitive information in order to secure the nation’s transportation systems. This software is intended to assist in carrying out that mission. This initiative will be used in accordance with all federal laws and will be reserved for specific instances that meet TSA’s qualifications for an insider threat.”

FDA early this year ran into trouble with email monitoring when employees sued for allegedly bugging their government-issued computers after they informed the Office of Special Counsel about the agency’s approval of unsafe medical devices.

In her memo, Special Counsel Carolyn Lerner said agencies should evaluate their monitoring practices to ensure they don’t impede employees from using appropriate channels to disclose wrongdoing.

Aliya Sternstein

End of an Era

Veterans Affairs Department Chief Information Officer Roger Baker predicts that within five or six years VA no longer will furnish employees with computers. Instead, they will use the devices they own to connect to department networks. He also believes VA has issued its last desktop PC contract, a $477 million deal for up to 600,000 desktops awarded to Dell in April 2011. 

Baker would like to see VA get out of the business of providing its roughly 300,000 employees with hardware to access department networks and said he backed a policy that would allow employees to bring their own devices to the job. Asked how VA would manage the financial aspect of that type of policy, Baker says, “that’s a [human resources] issue.”

It will take a “massive investment” to ensure data is protected before VA can proceed with a widespread bring-your-own-device plan, Baker says. Managers and employees also would have to ensure that personal applications are free of viruses and malware before they are connected to the department’s computer systems.

Bob Brewin

Energy Drain

One barrier to gauging progress in the government’s data center consolidation effort is the fact that federal agencies aren’t measuring energy costs for some smaller data centers. 

It’s especially difficult to meter data centers that occupy only part of a building’s space and use a limited amount of energy, says Robert Harden, who works on IT efficiency for the Navy.

The Energy Department faces similar challenges, says Emily Stoddart, a program analyst with its Sustainability Performance Office. Officials are trying to determine which resources to put into small data centers that will likely be consolidated or closed. “We want to document a baseline for these data centers, but we’re wary of investing in a formal metering project,”
she says.

Joseph Marks

Pentagon Needs a Family (Cellphone) Plan

Buried deep within the Defense Department mobile device strategy released in June is a suggestion for a long overdue cost-saving idea: a centrally managed cellphone expense management system.

Outfits like The Bill Police help commercial enterprises centrally manage their cellphones—including ways to reallocate unused minutes from one phone to another—and Defense probably could save big bucks with the same approach.

I read FedBizOpps every day, and at least once a week some outfit in Defense has posted a cellphone service procurement. That’s an inefficient way to buy minutes for the world’s largest enterprise.
-Bob Brewin

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.