FBI deploys first phase of technology upgrade

The FBI this week rolled out the initial part of its $425 million information technology system upgrade to reduce agents' dependence on paper-based files.

Employees now have an Internet-based interface giving them access to the Automated Case Support system. A "personal workbox" summarizes agents' cases and leads, while a "squad workbox" allows supervisors to better manage resources and make assignments. The new interface also has a better search function, according to the agency.

The upgrades mark the first of four phases for the six-year effort, known as Sentinel and designed to take the place of the failed $170 million Virtual Case File project.

"With the completion of Phase 1, FBI employees will see a marked improvement in their ability to access, retrieve and move information," said Joseph Ford, the FBI's associate deputy director, in a statement.

Lockheed Martin Corp. worked on the first stage of the program under a $57 million contract awarded in March 2006. It includes options that could be worth $248 million for work on the three additional phases.

Linda Gooden, executive vice president of Lockheed Martin Information Systems and Global Services, said in a statement that the company is "proud to support the FBI in the first-phase delivery of this highly capable system."

The initial upgrades were originally scheduled to take effect earlier this year, but in April, FBI Director Robert Mueller told congressional appropriators that the deployment would be delayed at least a month because of "some unforeseen technicalities." Mueller said Sentinel would begin a test period at FBI headquarters and some field offices that month, and that the agency was in the final approval process with Lockheed Martin for the start of the first phase.

A group of FBI employees trained on the system in preparation for the initial deployment. They will serve as the points of contact for support in their offices. All FBI employees were offered training, the agency stated. As part of it, users had opportunities to make recommendations on changes to the application.

Mueller told congressional appropriators that Sentinel's second phase is more important than the first because it will affect more field agents. He said the second phase could come a year to 18 months after the first starts. The interim would be used in part to incorporate lessons learned from the first phase, he said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.