<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:nb="https://www.newsbreak.com/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>Government Executive - Authors - Aliya Sternstein</title><link>https://www.govexec.com/voices/aliya-sternstein/2337/</link><description>Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as &lt;em&gt;National Journal's Technology Daily&lt;/em&gt;, &lt;em&gt;Federal Computer Week&lt;/em&gt; and &lt;em&gt;Forbes&lt;/em&gt;. Before joining &lt;em&gt;Government Executive&lt;/em&gt;, Sternstein covered agriculture and derivatives trading for &lt;em&gt;Congressional Quarterly&lt;/em&gt;. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.</description><atom:link href="https://www.govexec.com/rss/voices/aliya-sternstein/2337/" rel="self"></atom:link><language>en-us</language><lastBuildDate>Tue, 17 Nov 2015 14:56:00 -0500</lastBuildDate><item><title>"Every American Has the Right to Know"</title><link>https://www.govexec.com/magazine/features/2015/11/every-american-has-right-know/123771/</link><description>President Obama’s push for transparency into government spending may have run out of steam.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Tue, 17 Nov 2015 14:56:00 -0500</pubDate><guid>https://www.govexec.com/magazine/features/2015/11/every-american-has-right-know/123771/</guid><category>Features</category><content:encoded>&lt;![CDATA[&lt;p&gt;In April 2006, a young Democratic senator from Illinois and a graying fiscal conservative from&lt;br /&gt;
Oklahoma introduced legislation to create a searchable database of federal monetary awards, essentially a Google for government spending. The site would empower citizens to monitor how their tax dollars are spent and uncover waste. President George W. Bush signed the Federal Funding Accountability and Transparency Act five months later and USASpending.gov was born in 2007. While co-sponsor Sen. Tom Coburn, a Republican, pushed for greater financial transparency until retiring in December 2014, many say the other co-sponsor, now President Obama, ran out of steam.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.govexec.com/feature/the-right-know/"&gt;Read more about the push for transparency here.&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2015/11/17/111615obamaMAG/large.jpg" width="618" height="284"><media:credit>Christopher Dilts/Shutterstock.com</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2015/11/17/111615obamaMAG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>The Top 10 Women Cyber Guardians You Should Know About</title><link>https://www.govexec.com/management/2015/09/top-10-women-cyber-guardians-you-should-know-about/121733/</link><description>A roundup of influential  information security leaders to watch.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Wed, 23 Sep 2015 16:01:00 -0400</pubDate><guid>https://www.govexec.com/management/2015/09/top-10-women-cyber-guardians-you-should-know-about/121733/</guid><category>Management</category><content:encoded>&lt;![CDATA[&lt;p&gt;&lt;em&gt;(This article originally appeared on &lt;/em&gt;Nextgov&lt;em&gt;)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The paucity of women in math and science extends to the data security realm. Women make up&amp;nbsp;&lt;a href="https://www.isc2cares.org/uploadedFiles/wwwisc2caresorg/Content/(ISC)%C2%B2-%202015-GlSWS-US-Federal-Gov-Results.pptx"&gt;&lt;strong&gt;14 percent&lt;/strong&gt;&lt;/a&gt;&amp;nbsp;of federal government cyber personnel, according to a May (ISC)2 global information security workforce study. The number was even lower in the private sector as recently as 2013:&amp;nbsp;&lt;a href="https://www.isc2cares.org/uploadedFiles/wwwisc2caresorg/Content/Women-in-the-Information-Security-Profession-GISWS-Subreport.pdf"&gt;&lt;strong&gt;11 percent&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;But quantity does not equal quality.&lt;/p&gt;

&lt;p&gt;And there is top-notch talent gracing the field across government, academia and industry. Here is an unempirical roundup of 10 influential leaders in information security, who happen to be women.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ann Barron-DiCamillo, director, &lt;/strong&gt;&lt;strong style="line-height: 20.8px;"&gt;U.S. Computer Emergency Readiness Team,&amp;nbsp;&lt;/strong&gt;&lt;strong&gt;Homeland Security &lt;/strong&gt;&lt;strong style="line-height: 20.8px;"&gt;Department&lt;/strong&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;img alt="" height="144" src="/media/ckeditor-uploads/2015/09/23/AnnBarronDiCamillo.jpg" width="300" /&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Oversees a round-the-clock watch center that collects, processes and shares information on cyberthreats with agencies and industry sectors. The disclosure of a theft of Office of Personnel Management files on 21.5 million national security-sensitive personnel and their families thrust her into the national spotlight -- a position she was uncomfortable with as an evangelist of confidentiality. Testifying at a House hearing in June on U.S. CERT&amp;#39;s role in the response, she acknowledged, &amp;quot;Like many Americans, I too am a victim of these incidents . . .&amp;nbsp;Although I am appearing today ready to provide information to this committee, I do so with some concern&amp;quot; about losing the trust of victims who open up to U.S. CERT. Her organization relies on voluntary cooperation from agencies and firms who believe they might have been hacked. &amp;quot;I worry that U.S. CERT appearing before this committee will have a chilling effect on their willingness to notify us,&amp;quot; she said. &amp;quot;We especially need private companies to continue to work with government and to share information about cyberthreats and incidents so that through greater shared awareness we can all be more secure from those who to seek to do us harm.&amp;quot; &amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Sally Holcomb, deputy chief Information officer,&amp;nbsp;&lt;/strong&gt;&lt;strong style="line-height: 20.8px;"&gt;Central Security Service,&amp;nbsp;&lt;/strong&gt;&lt;strong style="line-height: 1.6;"&gt;National Security Agency&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong style="line-height: 1.6;"&gt;&lt;img alt="" height="250" src="/media/ckeditor-uploads/2015/09/23/SallyHolcomb.JPG" width="200" /&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Tasked with protecting information systems that hold, perhaps, the world&amp;#39;s most secret data. &amp;quot;You may have heard we had some leaking problems,&amp;quot; she said in April, referring to ex-NSA contractor Edward Snowden&amp;#39;s spilling of classified intelligence. Increasingly, the agency depends on the cloud for tighter security and, paradoxically, easier access. Metadata makes both possible, she said. Each piece of information is tagged with details on content and who can read it. &amp;quot;Having the ability to secure at the object layer is pretty exciting for us,&amp;quot; she said at a cybersecurity summit organized by the Armed Forces Communications and Electronics Association. At the same time, NSA must also ensure the intelligence remains discoverable. A search &amp;quot;query has to result in &amp;#39;Hey, you may or may not have authorization, but there is data here subject to your request&amp;#39; and then give a means for someone to go find it.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Patricia Larsen, co-director of the National Insider Threat Task Force, Director of National Intelligence&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt="" height="187" src="/media/ckeditor-uploads/2015/09/23/PatriciaLarsen.jpg" width="200" /&gt;&lt;/p&gt;

&lt;p&gt;Manages a growing team of leak-pluggers across government. Her mission is to guard government secrets and government staff from those who can&amp;#39;t be trusted. &amp;quot;It&amp;rsquo;s a privilege to work in that program,&amp;quot;&amp;nbsp;she said last December at a forum hosted by&amp;nbsp;&lt;em&gt;Nextgov&lt;/em&gt;. &amp;quot;And the only reason that you are there is to help protect your colleagues, not to out them. So, we&amp;rsquo;ve got to professionalize that workforce of people who do this for a living.&amp;nbsp;They have to view themselves as part of a community.&amp;rdquo; The specialists must undergo training on privacy protections, intelligence oversight and investigative procedures, should their suspicions bear truth. &amp;quot;It is also critical to remember the human element, and the expertise of clinical psychologists is crucial to inform insider threat analysis,&amp;rdquo; she said.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Catherine Lotrionte, director of the Cyber Project, Georgetown University&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;img alt="" height="144" src="/media/ckeditor-uploads/2015/09/23/CatherineLotrionte.jpg" width="300" /&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Leads a research initiative that explores the role of international and domestic laws in fighting cyber threats. Last fall, she illuminated one way the United States might be able to use the World Trade Organization to punish China for economic espionage. A provision in the 1995 Trade Related Aspects of Intellectual Property Rights Agreement deals with a country&amp;#39;s obligation to protect undisclosed information. The clause &amp;quot;obliges each WTO member within its own jurisdiction -- to protect foreign companies&amp;#39; [undisclosed information], as they would protect their own companies&amp;#39; undisclosed information,&amp;quot; she said. The snag is that cyberspace spans jurisdictions. But she pointed out a potential workaround. It is very possible the Chinese ultimately will file a cyberspying case against America with the WTO, she said. When that happens, the United States&amp;rsquo; best move would be to &amp;ldquo;argue a defensive legal argument under our rights to counter what they are doing,&amp;quot; she said. &amp;quot;That would force the panel at the WTO to bring clarity to what those obligations mean for protecting undisclosed information.&amp;quot;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Angela McKay, director of cybersecurity policy and strategy, Microsoft&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;img alt="" height="300" src="/media/ckeditor-uploads/2015/09/23/AngelaMcKay.jpg" width="200" /&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Coordinates with the private sector, customers and law enforcement to build confidence in each other and in the Web. &amp;quot;One of the things that as an industry we&amp;#39;re really trying to grapple with is what should we be doing on behalf of users -- like automatic updates -- and what are the things that we want to inform users [of] to make good risk decisions&amp;rdquo; on their own, she said at a February cybersecurity symposium organized by New America. &amp;quot;That&amp;#39;s something where the pendulum hasn&amp;#39;t found a good equilibrium point.&amp;quot; The software giant once was reluctant to push out automatic updates, &amp;quot;because there was some concern that Microsoft was being the big top-down antitrust&amp;rdquo; entity, she said, &amp;quot;but as we realized the security ecosystem was changing we realized we needed to help users in this space.&amp;quot;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Katie Moussouris, chief policy officer, HackerOne&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt="" height="200" src="/media/ckeditor-uploads/2015/09/23/KatieMoussouris.jpg" width="300" /&gt;&lt;/p&gt;

&lt;p&gt;Widely&amp;nbsp;recognized for founding Microsoft&amp;#39;s &amp;quot;bug bounty&amp;quot; program that awards researchers with cash for reporting security holes they discover in the Seattle firm&amp;#39;s software. Now at HackerOne, a San-Francisco-based company that organizes similar prize programs, she criticizes policies that treat bug-finders like criminals. A new presidential order authorizing sanctions against people complicit in exploiting software glitches could discourage analysts from warning about such vulnerabilities, she said. The policy&amp;#39;s language should be tightened &amp;quot;to really reflect the intent, as opposed to increasing that fear among the security research community,&amp;quot; she said during an interview. Even if not sanctioned, &amp;quot;there are several other pressures that researchers will face where their jobs are contacted, their careers are threatened, and all kinds of other things that are non-criminal prosecution but more like persecution.&amp;quot; She rails against a current U.S. proposal to carry out an international arms agreement called the Wassenaar Arrangement that would control the international export of intrusion software. &amp;quot;The same offense techniques that are developed to bypass existing computer security measures are used in research to highlight weaknesses in order to fix the vulnerable software,&amp;quot; she wrote in&amp;nbsp;&lt;a href="http://www.wired.com/2015/07/moussouris-wassenaar-open-comment-period/"&gt;&lt;strong&gt;Wired&lt;/strong&gt;&lt;/a&gt;&amp;nbsp;last week. For spies, &amp;quot;no regulation will stop them. It is our job to collectively ensure that no regulation stops defenders.&amp;quot;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Melinda Rogers, chief information security officer, Justice Department&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt="" height="187" src="/media/ckeditor-uploads/2015/09/23/MelindaRogers.jpg" width="200" /&gt;&lt;/p&gt;

&lt;p&gt;Keeps information technology systems safe across the federal justice system. Her advice for organizations interested in surviving after a hack? &amp;ldquo;At the end of the day -- it&amp;rsquo;s knowing what is in your environment. It&amp;rsquo;s very easy to say, &amp;#39;Oh, well it&amp;#39;s an email system,&amp;#39; with email inside . . . but, that&amp;rsquo;s not the right answer,&amp;quot; she said at an AFCEA symposium last December. &amp;quot;One most own [the data, by] knowing what&amp;rsquo;s in the data and then take proper precautions.&amp;quot; Justice is updating acquisition guidance to make sure civil service employees understand that, when they work with vendors, encryption, contractor background investigations and other security controls must be carried out. When the inevitable data breach happens, damage control will hinge on &amp;quot;knowing what you have,&amp;quot; she said.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Phyllis Schneck, DHS deputy undersecretary for cybersecurity and communications&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt="" height="144" src="/media/ckeditor-uploads/2015/09/23/PhyllisSchneck.jpg" width="300" /&gt;&lt;/p&gt;

&lt;p&gt;Sees to it that Homeland Security serves as a &amp;quot;focal point for the security of cyberspace,&amp;quot; per presidential directive. The cyber czar of DHS previously made a name for herself as McAfee&amp;#39;s chief technology officer and chairman of the National Board of Directors of the FBI&amp;rsquo;s public-private InfraGard cybercrime program. Now, she works with critical sectors, like the power industry, to protect machines that increasingly are becoming accessible from the public Internet. Critical infrastructure systems are among the things in the so-called Internet of Things. These are the devices, in addition &amp;ldquo;to our refrigerators and toasters, that are connected,&amp;quot; she said. Her &amp;ldquo;personnel are engaging cleared asset owners, the folks running and operating the water plants, the electric plants, the transportation to look through a classified briefing campaign and address the impacts of recent BlackEnergy&amp;rdquo; spyware that targets industrial control systems, she said at a May 6 meeting of the President&amp;rsquo;s National Security Telecommunications Advisory Committee.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Suzanne Spaulding, DHS undersecretary for the National Protection and Programs Directorate&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt="" height="144" src="/media/ckeditor-uploads/2015/09/23/SuzanneSpaulding.jpg" width="300" /&gt;&lt;/p&gt;

&lt;p&gt;Runs the DHS division tasked with defending U.S. infrastructure against cyber- and physical threats. Once a regular on Capitol Hill who worked for both Democrats and Republicans for over a quarter of a century, she is more concerned about nonpartisan matters these days. &amp;quot;I really do worry that in the next year or so will be the year of the destructive attacks,&amp;quot; Spaulding said April 27, during an event organized by New York&amp;#39;s Fordham Law School. &amp;quot;With the Sony incident, all of the attention was on the salacious emails and the theft of movies before they came out and far less attention was paid -- for reasons I&amp;#39;m not clear on -- on the destructive nature of that attack: that there was destructive malware deployed that destroyed computers and data irretrievably.&amp;quot; She expects, no, she will put an end to further U.S. network sabotage. &amp;quot;Hope is not a plan. We have other plans,&amp;quot; she said.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Up and comer: Shannon Praylow, senior officer, an intelligence community 24-hour watch center&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt="" height="144" src="/media/ckeditor-uploads/2015/09/23/ShannonPraylow.jpg" width="300" /&gt;&lt;/p&gt;

&lt;p&gt;Manages a team at an undisclosed government facility in the Washington area. The 34-year-old contractor for Maverick Cyber Defense has no college degree and had to work her way up, while training and attending boot camp in the Virginia Army National Guard. Now, the departments of Defense, Homeland Security, Justice and State are all on her resume, sometimes concurrently. Yet, the shards of the broken glass ceiling cut deep. &amp;quot;Right now I&amp;rsquo;m a team lead of 10 males,&amp;quot; some of whom are upward&amp;nbsp;of 45 years old, she said. &amp;quot;I deal a lot with name calling, talking behind my back. And I can&amp;rsquo;t let that bother me.&amp;quot; A National Guard recruiter in 2001 first wanted to try her out as a truck driver: &amp;quot;I said, &amp;lsquo;No,&amp;rsquo; turned around and walked out. Walked in a few months later, and he said, &amp;#39;We do have this computer section, would you be interested?&amp;rsquo;&amp;rdquo;&lt;/p&gt;

&lt;p&gt;(&lt;em&gt;Image via &lt;a href="http://www.shutterstock.com/pic-158795060/stock-photo-human-eye-on-technology-design-background-cyberspace-concept.html?src=0NTQhXz-KyMVnbSglNAVCg-1-13"&gt;kurhan&lt;/a&gt;/&lt;a href="http://www.shutterstock.com/?cr=00&amp;amp;pl=edit-00"&gt;Shutterstock.com&lt;/a&gt;&lt;/em&gt;)&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2015/09/23/092315EIG_women_in_tech/large.jpg" width="618" height="284"><media:credit>kurhan/Shutterstock.com</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2015/09/23/092315EIG_women_in_tech/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>How the OPM Hackers Killed the Password</title><link>https://www.govexec.com/magazine/magazine-analysis/2015/09/how-opm-hackers-killed-password/120416/</link><description>The theft of feds’ personal information, not Hollywood’s selfies, might have finally sped up security measures.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Tue, 08 Sep 2015 10:00:00 -0400</pubDate><guid>https://www.govexec.com/magazine/magazine-analysis/2015/09/how-opm-hackers-killed-password/120416/</guid><category>Analysis</category><content:encoded>&lt;![CDATA[&lt;p&gt;White House directives dating back to 2004 warned against relying on passwords as the only mechanism to lock government systems&amp;mdash;but that didn&amp;rsquo;t stop agencies. U.S. cyber czar Michael Daniel publicly exhorted citizens to &amp;ldquo;kill the password&amp;rdquo; multiple times in 2014, but that didn&amp;rsquo;t stop password proliferation. Nor did a hack of passcode-protected personal devices that exposed nude photos of starlets like Jennifer Lawrence seem to faze federal computer users.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It was not until password-cracking actually hit home that agencies jumped to alternative forms of identification.&lt;/p&gt;

&lt;p&gt;Briefly, here is a timeline of the death of the password:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;August 27, 2004:&lt;/strong&gt; In response to the September 2001 terrorist attacks, President George W. Bush issues Homeland Security Presidential Directive 12 demanding the creation of a common identification form for federal employees and contractors. HSPD-12 requires a credential format that is &amp;ldquo;strongly resistant to identity fraud,&amp;rdquo; can be &amp;ldquo;rapidly authenticated electronically&amp;rdquo; and only issued through an &amp;ldquo;official accreditation process.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&amp;nbsp;The directive goes mostly unheeded for a decade.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;September 2014:&lt;/strong&gt; The majority of computer users across civilian agencies still can log on to government networks with simply a password. Only 1 percent of Office of Personnel Management computer users need something more than a password to access the agency&amp;rsquo;s information. All Pentagon workers, however, are swiping common access cards for system entry.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;June 4, 2015:&lt;/strong&gt; OPM reveals a contractor&amp;rsquo;s password was exploited to unlock 4.2 million records on current and former employees across the government. The records were housed in an Interior Department data center shared by 150 federal offices.&lt;/p&gt;

&lt;p&gt;Almost immediately, the race is on to couple passwords with at least a physical smartcard, or even better, physical proof of identity, like an iris scan.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;June 12, 2015: &lt;/strong&gt;The White House instructs all agencies to accelerate the activation of such two-step identification processes as part of a &amp;ldquo;30-day cybersecurity sprint.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Then perceptions of federal data security worsen.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;July 9, 2015:&lt;/strong&gt; OPM discloses that personal data on 21.5 million employees, applicants for clearances to handle classified information and their family members were stolen during a separate, related intrusion.&lt;/p&gt;

&lt;p&gt;Within hours, U.S. Chief Information Officer Tony Scott tells reporters: &amp;ldquo;We&amp;rsquo;ve dramatically increased the amount of two-factor authentication for privileged,&amp;rdquo; or high-level access, &amp;ldquo;users across the federal government.&amp;rdquo;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;nbsp;&lt;strong&gt;July 12, 2015: &lt;/strong&gt;Ninety-seven percent of OPM computer users and more than 72 percent of users governmentwide cannot get into agency systems without a smartcard.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;That&amp;rsquo;s an important control that&amp;rsquo;s needed. We were already working on it,&amp;rdquo; ahead of the hacks, Interior CIO Sylvia Burns told a House committee this summer. &amp;ldquo;We were making slow progress. When the incident happened, it just created a different lens on looking at the need, and I think it made it crystal clear to everybody why it was so critical that we achieve two-factor authentication.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The winner of the latchkey challenge was the General Services Administration, with only 1 percent of personnel still logging in with just a password by the end of the 30-day cybersecurity sprint. But the Energy Department, a frequent target of foreign espionage, made little headway in fortifying defenses. About 88 percent of Energy personnel can still punch in a single password to see sensitive government information. Surprisingly, 72 percent of users at the State Department, which was infiltrated by suspected Russian spies last fall, remain vulnerable to password-breaking.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;One of the most significant steps any organization can take to reduce the risk of adversaries penetrating networks and systems is requiring the use of a hardware-based personal identity verification card or an alternative form of strong authentication,&amp;rdquo; Scott said in a blog post announcing the results of the White House initiative. &amp;ldquo;Agencies made significant progress in this area.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;In the private sector, however, the password is alive and kicking&amp;mdash;even at the company providing ID protection for victims of the smaller OPM hack. Feds who register for those services are protected only by a password they create with the company, in which case a hacker needs only to break that password to victimize those individuals again.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;When you think of all the data that credit monitoring and identity theft services aggregate, those services themselves become a potential target,&amp;rdquo; says Jeremy Grant, former head of the Commerce Department&amp;rsquo;s National Program Office for the National Strategy for Trusted Identities in Cyberspace. He is one of the victims.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Grant was pleasantly surprised to learn that ID protection services for individuals affected by the larger breach related to background checks are expected to be more secure, according to a vendor solicitation.&lt;/p&gt;

&lt;p&gt;The contractor &amp;ldquo;will need to deliver a second factor,&amp;rdquo; like a one-time PIN sent in a text message, says Grant, now a managing director at the Chertoff Group, a consulting firm. &amp;ldquo;Protecting access to breach victims&amp;rsquo; accounts at the portal with two-factor authentication makes sure that someone can&amp;rsquo;t access their data with a stolen password.&amp;rdquo;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;nbsp;In the future, feds might have to go through even more steps to log in at work, said Shonnie Lyon, acting director of the Homeland Security Department&amp;rsquo;s Office of Biometric Identity Management, days after word broke of the OPM attack.&lt;/p&gt;

&lt;p&gt;Government employees might have to enter a smartcard, type a password and press a finger against a touchpad.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Several organizations are looking at three-factor authentication,&amp;rdquo; Lyon said at a June 11 industry event. &amp;ldquo;I think that&amp;rsquo;s the way things are going to have to go.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Unfortunately, now even fingerprints can be spoofed.&amp;nbsp; The fingerprint records of 1.1 million victims of the OPM hack were stolen.&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2015/09/08/090815twostep/large.png" width="618" height="284"><media:credit>Thinkstock</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2015/09/08/090815twostep/thumb.png" width="138" height="83"></media:thumbnail></media:content></item><item><title>Mapping Threats</title><link>https://www.govexec.com/magazine/magazine-analysis/2015/05/mapping-threats/111937/</link><description>New software is helping intelligence analysts, but the most powerful processor is still the human brain.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Wed, 06 May 2015 09:00:00 -0400</pubDate><guid>https://www.govexec.com/magazine/magazine-analysis/2015/05/mapping-threats/111937/</guid><category>Analysis</category><content:encoded>&lt;![CDATA[&lt;p&gt;Around the time the computer game &amp;ldquo;Where in the World Is Carmen Sandiego?&amp;rdquo; was teaching Generation Y about geography, grown-up versions of geography software had analysts at spy agencies a little concerned about job security. Back then, Defense Intelligence Agency imagery analyst Robert Cardillo and his colleagues thought visualization technology would replace their tradecraft. Today, as director of the National Geospatial-Intelligence Agency, Cardillo and his roughly 14,500 employees only wish more powerful image recognition software existed.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Going back to 1983 when I was welcomed into the business, somebody said to me they are going to automate our job,&amp;rdquo; Cardillo recounts in an interview. There will be &amp;ldquo;these ones and zeroes&amp;rdquo; that will pinpoint the changing positions of tanks, missiles, ships. The rumormonger told Cardillo it would be another six months or six years before the technology arrived, so he didn&amp;rsquo;t have to worry about a pink slip just yet.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Fast-forward 32 years: We&amp;rsquo;ve come a long way, but that&amp;rsquo;s still a very hard thing for computers to do&amp;mdash;not impossible, very hard,&amp;rdquo; he says, speaking from inside NGA&amp;rsquo;s Springfield, Virginia-based headquarters, which is shaped like a giant eyeball lens.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Right now, technology is up against a problem that didn&amp;rsquo;t exist in the Atari age: big data. The ever-increasing petabytes of pictures and other information generated by sensors require quick and constant observation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;If you&amp;rsquo;re my analyst on sub-Saharan Africa, I don&amp;rsquo;t want you spending time scanning all that imagery searching for something that wasn&amp;rsquo;t there last year, last month,&amp;rdquo; Cardillo says. &amp;ldquo;I do want you thinking hard about the Boko Haram [terrorist group] challenge or thinking hard about Central African Republic sectarian divide, Muslim-Christian, etc., and building mental models yourself.&amp;rdquo; So, he&amp;rsquo;s got computer programs handling &amp;ldquo;broad-based change detection,&amp;rdquo; a method for flagging items that didn&amp;rsquo;t appear in the previous day&amp;rsquo;s data dump and items that have disappeared&lt;br /&gt;
from view.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Such analysis, however, is no substitute for the experience, education and curiosity of the human mind. The computer is &amp;ldquo;looking for those triggers&amp;mdash;whether it&amp;rsquo;s a text or an email&amp;mdash;and then cueing the brain to go engage,&amp;rdquo; says Cardillo.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;On certain problem sets, such as Chinese aggression in the South China Sea, the software is doing a good job at prompting analysts. &amp;ldquo;That&amp;rsquo;s a very tough place to monitor,&amp;rdquo; he says. &amp;ldquo;Very big, very broad, very noisy. We have had some success with modeling to help us cue when and where something has changed.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;For instance, the Chinese slowly are &amp;ldquo;dredging up sand and they are building these islands&amp;rdquo; to mark their territory and &amp;ldquo;over time, our ability to human-cognitively process all of that coverage is just going to be overwhelmed,&amp;rdquo;&lt;br /&gt;
Cardillo says.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Paul Weise, who spent over three decades analyzing imagery for the Pentagon, says any rumor about software taking over the role of analysts is misplaced.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I can&amp;rsquo;t tell you how many times we brought on a new system, a new software set, that showed promise in either doing that job entirely or greatly assisting the analyst or cartographer,&amp;rdquo; he says. &amp;ldquo;We ended up turning the tool off because it took more time for the cartographer to fix the mistakes that were falsely interpreted by such algorithms.&amp;rdquo;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Weise retired three years ago from his role as director of the Office of Geospatial Intelligence Management. Now, as Lockheed Martin&amp;rsquo;s GEOINT mission officer, he helps the agency expand its signature Map of the World project, among other things. The portal consumes and synthesizes all sorts of intelligence so analysts can submerse&lt;br /&gt;
themselves in the situation at hand.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The quest to automate image recognition began in the 1980s and 1990s, when it became apparent technological progress was creating too many pictures to examine. Automation has shifted the tools of the trade from wet plate&lt;br /&gt;
photography and hand-drawn maps to geographic information systems. Increases in computer processing power, software agility and Internet connectivity, along with decreases in the cost of storage, now allow geospatial products to be spit out faster than a hand can cut and paste. And advances in sensor technology from small-satellite providers&amp;mdash;like DigitalGlobe, Planet Labs and Google&amp;rsquo;s SkyBox&amp;mdash;have expanded the field of view.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;In the Zone&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Ultimately, however, the new equipment reveals only a basic level of the full picture.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The reality is the most agile processor in this process remains the human brain,&amp;rdquo; says Keith Masback, chief executive officer of the U.S. Geospatial Intelligence Foundation, a professional&lt;br /&gt;
association. &amp;ldquo;Human engagement is required to do the quality control and the fact-checking and the ground-&lt;br /&gt;
truthing, especially in the world of safety of navigation.&amp;rdquo; Masback, a former NGA source operations group director, adds: &amp;ldquo;Because of the very ongoing life and death nature, the navigation products&amp;mdash;whether subsurface, surface or air&amp;mdash;have got to be right.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The Arctic, for instance, is one of the more treacherous zones. Almost by definition, the North Pole is not thought of as a global hot spot. But as the polar ice melts, the Arctic is becoming a nexus of geopolitical tensions over subjects as diverse as penguins and Ukraine. New transportation routes and energy reserves are rising to the surface, accompanied by turf wars.&lt;/p&gt;

&lt;p&gt;Because all the commotion has economic and not just military ramifications, Cardillo sees the Arctic as a place that could bring his agency out into the open. Again.&lt;/p&gt;

&lt;p&gt;Since becoming NGA director last fall, he has garnered attention for pulling the curtain off certain geospatial data, such as maps of the Ebola spread.&amp;nbsp; &amp;ldquo;I think the Arctic is a wonderful place, where we should be thinking about our next piece of open code,&amp;rdquo; Cardillo says. &amp;ldquo;A great deal of what&amp;rsquo;s known about the Arctic is unclassified. We don&amp;rsquo;t have a rich history of classified intelligence collection in the Arctic because&amp;mdash;guess what?&amp;mdash;it wasn&amp;rsquo;t a priority.&lt;/p&gt;

&lt;p&gt;Now it is. President Barack Obama in a May 2013 Arctic National Strategy outlined strategic priorities for the Arctic region that call for, among other things, a greater awareness of activity in the region as well as charts and scientific research to better understand the landscape. That would include NGA&amp;rsquo;s geospatial intelligence&amp;mdash;insights derived from pairing satellite imagery with historical data sets.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I&amp;rsquo;m not going to dive into the &amp;lsquo;Why is the Arctic warmer than it used to be?&amp;rsquo; But I know it is,&amp;rdquo; Cardillo says. &amp;ldquo;And I know there&amp;rsquo;s less ice up there now, and I know there&amp;rsquo;s more ship traffic now. I know there&amp;rsquo;s more potential for natural resource exploitation than there ever has been before. Those facts have driven state actions. Russia, as one of the claimants for the resources and maritime navigation and control, etc., has made decisions based upon those changing facts. Some of those decisions are military based.&amp;rdquo;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&amp;lsquo;It Changes Your Thinking&amp;rsquo;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Venues for hosting public geospatial intelligence on the Arctic might include Apple&amp;rsquo;s app store, the code-sharing site GitHub and NGA.mil, where interactive viewing tools are powered by Esri mapping software. The site currently serves up unclassified data sets to aid Ebola relief efforts.&lt;/p&gt;

&lt;p&gt;NGA&amp;rsquo;s first app, Anti-Shipping Activity Messages, or ASAM, details incidents of hijacking on the high seas all over the world. The underlying code for the app, which was released last fall, also is available on GitHub.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We&amp;rsquo;re all in on GitHub. We&amp;rsquo;re very proud of our [GitHub] page,&amp;rdquo; Cardillo says. &amp;ldquo;I&amp;rsquo;m encouraging our team to create conditions and the context so that our policymakers and decision-makers can have a better footing to think about employment of resources, deployment of diplomatic engagement and, potentially, security-related actions&amp;mdash;whether it&amp;rsquo;s just to protect or it&amp;rsquo;s to project. In some cases we project force throughout the world to ensure safety of navigation, for example,&amp;rdquo; Cardillo says.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Cardillo likes to show people polar projection maps. &amp;ldquo;It&amp;rsquo;s very disconcerting, it destabilizes your mind,&amp;rdquo; he says. &amp;ldquo;When you look at the North Pole at the center of a projection, it looks very unfamiliar.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;At first, gazers say, &amp;ldquo; &amp;lsquo;Wait a minute, the United States isn&amp;rsquo;t that tiny. It doesn&amp;rsquo;t sit on the edge of the Earth like that. We&amp;rsquo;re at the center of the world.&amp;rsquo; You get those reactions,&amp;rdquo; Cardillo says. But, he adds, they also &amp;ldquo;clearly see Alaska and Canada and Norway and Russia&amp;mdash;what I like about it is the way it changes&lt;br /&gt;
your thinking.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2015/05/05/050515isisMAG/large.jpg" width="618" height="284"><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2015/05/05/050515isisMAG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Wait</title><link>https://www.govexec.com/magazine/features/2015/03/wait/107295/</link><description>A new computer system was supposed to speed up immigration processing and reduce fraud, but it hasn’t worked out as planned.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Thu, 12 Mar 2015 08:00:00 -0400</pubDate><guid>https://www.govexec.com/magazine/features/2015/03/wait/107295/</guid><category>Features</category><content:encoded>&lt;![CDATA[&lt;p&gt;If there&amp;rsquo;s one thing politicians of all stripes can agree on, it&amp;rsquo;s this: The immigration system is broken. What&amp;rsquo;s less obvious is the extent to which that&amp;rsquo;s physically true. An online system that was supposed to automate the processing of green cards and other immigration benefits has struggled to function properly since at least 2009.&amp;nbsp;When President Obama in November 2014 announced a series of executive actions that would expand the population of immigrants eligible to remain in the United States, he placed a highly vulnerable technology program center stage in a major policy fight.&lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.govexec.com/feature/the-wait/"&gt;Read more here.&lt;/a&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2015/03/11/031115wait/large.jpg" width="618" height="284"><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2015/03/11/031115wait/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Privacy Negotiator</title><link>https://www.govexec.com/magazine/briefing/2014/11/privacy-negotiator/98594/</link><description>Civil liberties advocate Ari Schwartz walks a fine line between tracking and protecting citizens as White House cyber director.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Tue, 11 Nov 2014 00:00:00 -0500</pubDate><guid>https://www.govexec.com/magazine/briefing/2014/11/privacy-negotiator/98594/</guid><category>Briefing</category><content:encoded>&lt;![CDATA[&lt;p&gt;In 2011, &lt;em&gt;Government Executive&lt;/em&gt; spotlighted&amp;nbsp;a handful of emerging leaders, including Ari&amp;nbsp;Schwartz, the first-ever National Institute for Standards and Technology Internet policy adviser, who hailed from the privacy activism world. He went on to advise three Commerce Department secretaries on developing voluntary cyber standards in accordance with a landmark executive order. Then during the heat of the anti-surveillance movement, he was named to the White House National Security Council staff to instill civil liberties into cybersecurity and signals intelligence policies. Today,&amp;nbsp;Schwartz, 43,&amp;nbsp;has emerged. He is the&amp;nbsp;White House senior director for cybersecurity. Senior Correspondent Aliya Sternstein recently looped back with Schwartz to discuss balancing the needs of operatives and privacy-&lt;br /&gt;
conscious citizens, along with raising kids in the smartphone era.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Do your old colleagues at the Center for Democracy and Technology civil liberties group give you a hard time about working with &amp;ldquo;the spies?&amp;rdquo;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;They&amp;rsquo;ve never referred to me as &amp;ldquo;the spy.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;They don&amp;rsquo;t see you as having gone to the dark side?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;They see me as a person who can answer questions about what is going on. I think they see me as helpful in that way. I would love for you to ask them that. I would like to know the answer too. I think that&amp;rsquo;s really one of the worst things that happens in Washington&amp;mdash;when something gets reported or [comes out] through the rumor mill, and they hear the worst of it first, rather than hearing it from the people who are trying to put it together.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What information are you personally most concerned about keeping private?&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;I have a family and I have kids, and I think of a lot of things in my personal life&amp;mdash;&lt;br /&gt;
relating to my children&amp;mdash;as being very private and personal. It concerns me if information like that were to get out. I think communications&amp;mdash;when taken out of context&amp;mdash;often can raise a lot of concerns, so I do worry about what companies and what the government does with communications and making sure that it is used properly and that personal privacy is being protected. I am worried about [my 7-year-old and 10-year-old] getting on Facebook, but that&amp;rsquo;s a couple of years away. They don&amp;rsquo;t have phones. They have iPods. But my 10-year-old says everyone has a phone, except for him.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How has the discussion about privacy changed at Commerce and the NSC since the leaks by ex-intelligence contractor Edward Snowden about mass monitoring of U.S. phone records and foreign online communications?&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Privacy had always been a major issue, but certainly I think that the disclosures have really heightened those issues. The president was very clear in his Jan. 17 speech about the direction that we&amp;rsquo;re headed&lt;br /&gt;
in [when he announced a directive to hone data collections].&amp;nbsp;Since then it&amp;rsquo;s been more about implementing those things the president pointed to&amp;mdash;building privacy protections for non-U.S. persons in particular.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Your communications on social media, couldn&amp;rsquo;t they be swept up in some of these signals intelligence activities?&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I&amp;rsquo;m a citizen just like everyone else. It depends on what type of collection it is. Under [the directive], we have these areas where bulk data still can be collected. They are a very limited set of areas. I think it would exclude many of my communications and other private citizens&amp;rsquo; communications, but I don&amp;lsquo;t think it completely rules that out. It&amp;rsquo;s not&amp;nbsp;out&amp;nbsp;of the question at all.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Have you changed your online habits?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It&amp;rsquo;s almost as much from breaches, more so than government, but I think it&amp;rsquo;s related. Using two-factor authentication and using security tools are things that I did before and that I continue to stay up on. Especially right now, with breaches in particular, I think using multifactor authentication is just essential for everybody. I think a lot of celebrities found that out the hard way from the Apple breach that happened recently.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Is it hard for you to keep quiet about White House privacy initiatives, like the new executive order requiring two-step identity verification for government charge cards?&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It changes so quickly that I find even at times where I&amp;rsquo;m allowed to tell somebody, and then I tell them, then it changes and I have to call them back. That seesaw makes it so there is a natural tendency to want to hold off until you are certain that something is actually going to happen before you start telling people.&amp;nbsp;That&amp;rsquo;s something I&amp;rsquo;ve learned in my four years in government. You don&amp;rsquo;t want to get people&amp;rsquo;s hopes up. It&amp;rsquo;s better to let people know that you are working on something, and give them a broad outline to get feedback from them without saying which direction the policy is going in.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Do you feel like you have made sacrifices to get where you are?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It is a demanding job and I, of course, make sacrifices for my family time because of that. But there is an awareness, if that&amp;rsquo;s the case. Particularly [National Security Adviser] Susan Rice has been really, really good about making clear that family has to come first.&amp;nbsp;There are a lot of times when there is information that we&amp;rsquo;re getting on classified systems and we have to come into the office. That&amp;rsquo;s certainly not the case in nonprofit.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Do your kids grasp the gravity of your job?&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;They do. They get to come to the events at the White House. So, they get some fun out of it as well. But I think there is an understanding that I&amp;rsquo;m doing a serious job trying to protect the country and&lt;br /&gt;
our liberties.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Have your kids met the president?&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;They have not. But my oldest son came to Take Your Kid to Work Day and they had a question-and-answer session with the first lady. My younger one was four months too young for that, so hopefully this year he&amp;rsquo;ll get to go. There are some things they get to do that other kids would dream of doing. The first lady at that session, she said, &amp;ldquo;You know, I realize that sometimes your parents don&amp;rsquo;t get to come home for dinner and sometimes they don&amp;rsquo;t get to make it to all your soccer games,&amp;rdquo; and she kind of was apologizing to them for the sacrifices that I make, which I appreciated.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What has been the most fulfilling experience for you in the new job?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Everywhere I go, people thank me for the work we did on the cybersecurity framework and how it got better over time. The trust from the private sector to keep it voluntary; from the privacy groups, we hear that they are glad we were able to keep the Fair Information Practice Principles in the document despite the heavy pressure that we got from industry. When you start to see announcements related to and around cyber insurance, that&amp;rsquo;s pretty fulfilling because that was the original goal, to build it into the marketplace without a regulatory effort.&amp;nbsp;Just like [with the proviso] &amp;ldquo;Do you have smoke alarms?&amp;rdquo; for fire insurance, which is built into most regular business policies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Do you expect to leave anytime soon?&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It&amp;rsquo;s interesting because these undergraduate college students, they say, &amp;ldquo;Oh, my dream is to work at the NSC,&amp;rdquo; and it was never my dream to work at the NSC. But now that I am here, I see why it is people&amp;rsquo;s dreams. If you want to work on formulations, if you want to work on the hot national security issues, there is not a better place to be.&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2014/11/10/111014ari/large.jpg" width="618" height="284"><media:credit>Jeff Elkins</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2014/11/10/111014ari/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Around Government</title><link>https://www.govexec.com/magazine/briefing/2014/09/around-government/93455/</link><description>Braving bureaucracy, malware magnets, 
building brain hacks.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Charles S. Clark, Aliya Sternstein, and Patrick Tucker</dc:creator><pubDate>Tue, 09 Sep 2014 08:00:00 -0400</pubDate><guid>https://www.govexec.com/magazine/briefing/2014/09/around-government/93455/</guid><category>Briefing</category><content:encoded>&lt;![CDATA[&lt;p&gt;
 &lt;strong&gt;
  Bravery
 &lt;/strong&gt;
 &lt;strong&gt;
  in
 &lt;/strong&gt;
 &lt;strong&gt;
  the
 &lt;/strong&gt;
 &lt;strong&gt;
  Bureaucracy
 &lt;/strong&gt;
&lt;/p&gt;
&lt;p&gt;
 &lt;em&gt;
  Making the right decision isn’t the hard part, agency leaders say, it’s having the guts to follow through.
 &lt;/em&gt;
&lt;/p&gt;
&lt;p&gt;
 &lt;strong&gt;
  By Charles S. Clark
 &lt;/strong&gt;
&lt;/p&gt;
&lt;p&gt;
 Newscaster Dan Rather was famous in the 1980s for signing off the evening news with a simple word: courage. He may have been onto something, according to an academic analysis of interviews with 10 well-regarded federal executives.
&lt;/p&gt;
&lt;p&gt;
 Conventional wisdom is that the toughest decisions in government are those that are “informationally complex,” note Harvard University management professor Steven Kelman and a consulting trio from Booz Allen Hamilton.
&lt;/p&gt;
&lt;p&gt;
 But nine of 10 of these agency leaders said the hardest challenge for them wasn’t deciding the right thing to do, but being willing to do it. “In other words, these were decisions requiring courage in the face of some personal, political or organizational risk,” said the study, delivered in August to the Academy of Management meeting in Philadelphia.
&lt;/p&gt;
&lt;p&gt;
 Whether rolling out a new program or dismantling old ones, all the veterans of federal bureaucracy described infighting and doubts from co-workers in the run-up to their decisions. And though
 &lt;br/&gt;
 information-gathering is helpful, “a sense of moral identity” is what most said is the secret to having an impact.
&lt;/p&gt;
&lt;p&gt;
 “The executive must be able to organize for vigilant decision-making for the run of important decisions, but be prepared to turn this approach off when courage is required,” the authors write. “Advisers should also be able to be ambidextrous, sensing when their leader needs discussion, debate and dissent, and when he or she needs moral support.”
&lt;/p&gt;
&lt;p&gt;
 &lt;strong&gt;
  &lt;a href="http://www.govexec.com/media/gbc/docs/pdfs_edit/0914brfbriefs-chart1.png"&gt;
   &lt;img alt="" src="https://www.govexec.com/media/gbc/docs/pdfs_edit/0914brfbriefs-chart1.png" style="width: 140px; height: 424px; margin: 5px; float: left;"/&gt;
  &lt;/a&gt;
  Scanning Smart Cards
 &lt;/strong&gt;
&lt;/p&gt;
&lt;p&gt;
 A recent cross-agency priority goal report on cybersecurity raises questions about how many federal employees have smart ID cards and who needs them. As of December 2013, more than 5 million personal identity verification cards have been issued, but the latest audit reveals some agencies are still vexed by security and funding gaps.
&lt;/p&gt;
&lt;p&gt;
 &lt;strong&gt;
  Malware Magnets
 &lt;/strong&gt;
&lt;/p&gt;
&lt;p&gt;
 Believe it or not, the government ranks toward the bottom on a list of 29 sectors most likely to experience encounters with malicious software. Between January and July, the media—not agencies—suffered the most from hacking attempts, according to a Cisco security report. The government ranked 25th.
&lt;/p&gt;
&lt;p&gt;
 Attackers apparently timed malware drops to high-profile events, such as the 2014 Winter Olympic Games, and big news stories, like the disappearance of Malaysia Airlines Flight 370. Scammers want to hit large swaths of the population, and websites with hot headlines provide just the right user base.
&lt;/p&gt;
&lt;p&gt;
 “I would have guessed that government would have been much, much higher,” said Levi Gundert, a leader of Cisco’s threat research, analysis and communications team. On average, agency networks were half as likely to be hacked. Below  are the top five malware magnets.
&lt;/p&gt;
&lt;p&gt;
 &lt;strong&gt;
  Media
 &lt;/strong&gt;
 | Publishing firm networks were almost four times as likely to attract malware as the average enterprise network.
&lt;/p&gt;
&lt;p&gt;
 &lt;strong&gt;
  Pharmaceutical and Chemical
 &lt;/strong&gt;
 | Drug company systems were three times more at risk.
&lt;/p&gt;
&lt;p&gt;
 &lt;strong&gt;
  Aviation
 &lt;/strong&gt;
 | Airline networks were more than twice as likely to be infected.
&lt;/p&gt;
&lt;p&gt;
 &lt;strong&gt;
  Transportation and Shipping
 &lt;/strong&gt;
 | Transport and mailing systems were at two times the risk.
&lt;/p&gt;
&lt;p&gt;
 &lt;strong&gt;
  Manufacturing
 &lt;/strong&gt;
 | Industrial systems were just under double the risk.
&lt;/p&gt;
&lt;p&gt;
 &lt;em&gt;
  - Aliya Sternstein
 &lt;/em&gt;
&lt;/p&gt;
&lt;p&gt;
 &lt;img alt="" class="big" src="https://www.govexec.com/media/gbc/docs/pdfs_edit/090814brainmag.jpg" style="width: 450px; height: 270px;"/&gt;
&lt;/p&gt;
&lt;p&gt;
 &lt;em&gt;
  Thinkstock
 &lt;/em&gt;
&lt;/p&gt;
&lt;p&gt;
 &lt;strong&gt;
  Building Brain Hacks
 &lt;/strong&gt;
&lt;/p&gt;
&lt;p&gt;
 &lt;em&gt;
  Detailed soldier scans could alter the neuroscience of national security.
 &lt;/em&gt;
&lt;/p&gt;
&lt;p&gt;
 Scientists funded by the Defense Department have announced a breakthrough that could allow researchers to create in 220 days an extremely detailed picture of the brain that previously would have taken 80 years of scans to complete.
&lt;/p&gt;
&lt;p&gt;
 The military has been looking to build better brain hacks for decades, with results that ranged from the frightening to the comical. This latest development could revolutionize the study of the brain, but also the national security applications of neuroscience.
&lt;/p&gt;
&lt;p&gt;
 Scientists at Stanford University who developed the new way to see the brain in greater detail, outlined in the journal
 &lt;em&gt;
  Nature Protocols
 &lt;/em&gt;
 , said that it could mark a new era of rapid brain imaging, allowing researchers to see how parts of the brain interact on a cellular level.
&lt;/p&gt;
&lt;p&gt;
 Instead of sensing electrical activity through EEG or observing hemoglobin flow under functional magnetic resonance, called fMRI, the Stanford researchers’ technique uses light to reveal causal relationships in the circuits themselves.
&lt;/p&gt;
&lt;p&gt;
 The military’s research into brain science has produced some bizarre results, such as the DARPA “roborat,” a rat that had electrodes implanted into its motor cortex allowing researchers to manipulate direction and movement.
&lt;/p&gt;
&lt;p&gt;
 There have also been some big hits.
&lt;/p&gt;
&lt;p&gt;
 One program yielded some remarkable insight into the potential for better soldier performance through focused brain states. “It turns out the expert marksman has a brain state,” Amy Kraus, a former DARPA program manager, told a group at the Potomac Institute for Policy Studies.
&lt;/p&gt;
&lt;p&gt;
 One of the most significant near-term applications of military-funded neuroscience is observing the effects of combat on service members. “How much risk can we expect them to take over a lifetime?” Jonathan D. Moreno, University of Pennsylvania professor and author of
 &lt;em&gt;
  Mind Wars
 &lt;/em&gt;
 , said at the Potomac Institute. “How much medication? How many devices? How much change in their behavior, through direct manipulation of their brains?”
&lt;/p&gt;
&lt;p&gt;
 &lt;em&gt;
  -Patrick Tucker
 &lt;/em&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p&gt;
 &lt;strong&gt;
  Listen, Employees Want More Talk
 &lt;/strong&gt;
&lt;/p&gt;
&lt;p&gt;
 Employee satisfaction with communication from agency leaders about goals and projects
 &lt;br/&gt;
 in their organizations has declined during the past four years, according to a report from
 &lt;br/&gt;
 the Partnership for Public Service. The satisfaction score for communication fell to 50.2
 &lt;br/&gt;
 (out of 100), according to the group’s new analysis of responses to three questions on the latest Federal Employee Viewpoint Survey. The top-ranked agencies in communications
 &lt;br/&gt;
 by leaders were NASA, the intelligence agencies and the Treasury Department. The worst
 &lt;br/&gt;
 communicators were the Homeland Security, Interior and Agriculture departments.
&lt;/p&gt;
&lt;p&gt;
 &lt;strong&gt;
  54.1
 &lt;/strong&gt;
 -
 &lt;em&gt;
  Leadership communication score in the 2009 Federal Employee Viewpoint Survey
 &lt;/em&gt;
&lt;/p&gt;
&lt;p&gt;
 &lt;strong&gt;
  50.2
 &lt;/strong&gt;
 -
 &lt;em&gt;
  Leadership communication score in the 2013 survey
 &lt;/em&gt;
&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2014/09/08/090814brfMAG_1/large.jpg" width="618" height="284"><media:credit>Thinkstock</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2014/09/08/090814brfMAG_1/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>The Snowden Effect</title><link>https://www.govexec.com/magazine/advice-and-comment/2014/07/snowden-effect/88225/</link><description>Public aversion to domestic
spying doesn’t seem to be
hurting government’s ability
to recruit cyber staff.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Wed, 09 Jul 2014 16:00:00 -0400</pubDate><guid>https://www.govexec.com/magazine/advice-and-comment/2014/07/snowden-effect/88225/</guid><category>Advice And Comment</category><content:encoded>&lt;![CDATA[&lt;p&gt;Revelations last year that the National Security Agency is collecting Americans&amp;rsquo; telephone metadata soured some people&amp;rsquo;s opinions about the U.S. intelligence community, but they apparently haven&amp;rsquo;t affected the views of many computer security professionals.&lt;/p&gt;

&lt;p&gt;Anecdotal evidence suggests that leaks by Edward Snowden, the former systems administrator and contractor with the National Security Agency, have not hindered efforts to recruit or retain cyber staff at the three-letter agencies. Instead, the disclosures actually might have helped intelligence agencies attract computer aficionados by spotlighting the agencies&amp;rsquo; bleeding edge technology.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We have had no indication that cyber pros have any reticence about working for the government,&amp;rdquo; says Mark Aiello, president of Massachusetts-based Cyber 360 Solutions, a staffing firm. &amp;ldquo;It is probably the opposite, and mostly for the opportunity to work with some advanced tools or techniques. The Big Brother aspect is appealing if you are the watcher, not the watched.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Justice Department Chief Information Security Officer Melinda Rogers says the attention to agencies&amp;rsquo; cyber activities may pique the interest of potential recruits. &amp;ldquo;And that&amp;rsquo;s our responsibility as hiring managers to make sure that they understand the importance of&amp;nbsp;the mission.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Multiple East Coast cyber recruiters say none of their prospective hires has mentioned Snowden as a factor in their career considerations. Nor have cyber headhunters, who place departing government pros in industry positions, seen any increase in federal personnel heading for the exits.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I normally hear regularly from people who want to leave. I haven&amp;rsquo;t seen an uptick at all,&amp;rdquo; says Kathy Lavinder, founder of Maryland-based Security and Investigative Placement Consultants. &amp;ldquo;I think there&amp;rsquo;s just always a steady stream of people who want to leave after X amount of years. And I think for the NSA, there are people who go there to get the experience to have that on their resume.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Deborah Page, a Virginia-based executive search consultant with the McCormick Group who specializes in information security job searches, says, &amp;ldquo;We aren&amp;rsquo;t seeing any challenges at the moment&amp;rdquo; with recruiting talent in the wake of Snowden, &amp;ldquo;or at least I&amp;rsquo;m not.&amp;rdquo;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2 style="font-style:italic;"&gt;A Blow to Morale&lt;/h2&gt;

&lt;p&gt;The Snowden leaks might not have hurt recruiting or led to an exodus of talent, but the publicity they generated certainly had an impact, says Christina Ayiotis, a computer science faculty member at the George Washington University. &amp;ldquo;Morale was severely affected at NSA,&amp;rdquo; she says. &amp;ldquo;While there may be disagreement regarding whether actions were legal or not, the vast majority of employees were doing the work they always do, believing it was protecting the country. The negative impact has been in their productivity levels, I&amp;rsquo;m sure.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;While the intelligence community ranks among the best places to work in government in surveys by the Partnership for Public Service, employee satisfaction and commitment dipped from 71 percent in 2012 to 67 percent in 2013.&lt;/p&gt;

&lt;p&gt;Nonetheless, job seekers appear undeterred.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;CIA spokesman Christopher White says more than 80,000 people applied for jobs with the agency in 2013, an increase over the previous year although he would not disclose how many people applied in 2012. &amp;ldquo;What I can tell you is that recent leaks have not impacted our recruiting efforts in any significant way,&amp;rdquo; he says.&lt;/p&gt;

&lt;p&gt;Within the office of the Director of National Intelligence, hiring managers have seen &amp;ldquo;no notable impact to our recruitment efforts or to the number of individuals submitting applications in response to the Snowden media leaks,&amp;rdquo; DNI spokeswoman Kasey Butler says.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Officials at the FBI and the Homeland Security Department declined to&amp;nbsp;comment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;At the Pentagon, the opportunity to join a &amp;ldquo;unique cyberspace mission,&amp;rdquo; which involves hacking adversaries, protecting military systems and cyber spying, continues to attract candidates, Defense spokeswoman Lt. Col. Valerie Henderson says. &amp;ldquo;Recent media attention to the work cyber professionals perform provides an opportunity to correct distortions and present the facts on the critical value of this work,&amp;rdquo; she adds.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;As for the elephant in the room, NSA Director Adm. Mike Rogers said recently at a Reuters cybersecurity summit that the agency had seen some impact on recruiting and retention, in certain areas: &amp;ldquo;In general I would say not to the point where it&amp;rsquo;s really impacted our ability to recruit the right people,&amp;rdquo; Rogers said.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Regarding retention, he pays particular attention to younger staff with three to five years training, &amp;ldquo;who have a skill set that is readily transferable to the outside world,&amp;rdquo; he said. &amp;ldquo;I have not seen significant loss that I would attribute to the current environment. Now, does that mean I&amp;rsquo;m going to sit here and tell you we haven&amp;rsquo;t seen any loss?&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;span style="line-height: 1.6;"&gt;No . . . I think it just goes to the workforce believes in what they&amp;rsquo;re doing.&amp;rdquo;&lt;/span&gt;&lt;/p&gt;
]]&gt;</content:encoded></item><item><title>Cyber Medic</title><link>https://www.govexec.com/advice-and-comment/thinking-ahead/2014/05/cyber-medic/84124/</link><description>Kevin Charest turned HealthCare.gov’s security challenges into a quest for better teamwork at HHS.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Fri, 09 May 2014 10:28:07 -0400</pubDate><guid>https://www.govexec.com/advice-and-comment/thinking-ahead/2014/05/cyber-medic/84124/</guid><category>Thinking Ahead</category><content:encoded>&lt;![CDATA[&lt;p&gt;A&lt;span style="line-height: 1.6;"&gt;fter the flubbed debut of the HealthCare.gov website, Kevin Charest, chief information security officer at the Health and Human Services Department, knew he had to roll up his sleeves alongside the people who make the agency&amp;rsquo;s programs work. &amp;nbsp;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;In many ways my job has been to set policies at the department level that then can be translated and adhered to at the local level,&amp;rdquo; he says. When lawmakers grilled him and another agency official on security vulnerabilities in the&lt;br /&gt;
online health insurance marketplace, it became clear he was not part of the operations side of the project, Charest admits.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Here are two guys being asked to testify, but they were not involved in the design and implementation and security decisions associated with the thing they are testifying about,&amp;rdquo; he says.&lt;/p&gt;

&lt;p&gt;Now Charest is much more attuned to managers on the front lines. &amp;ldquo;I think there&amp;rsquo;s been an awakening that we&amp;rsquo;re partners,&amp;rdquo; he says. &amp;ldquo;I&amp;rsquo;m not the boogeyman. And, in fact, when and if something does happen, it&amp;rsquo;s the department that has to bear the brunt of that.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;He acknowledges that the linkage between HealthCare.gov and networks in other federal agencies, local governments, companies and homes nationwide creates a bull&amp;rsquo;s-eye for identity thieves. But that interconnection also creates a nexus for information sharing, he says.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The upside: HHS improves the security of that entire sector with a single signal of an incoming threat, Charest says.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The more interconnected we all become, the more we better make sure that we&amp;rsquo;re all doing our very best to defend this infrastructure,&amp;rdquo; he says. &amp;ldquo;We&amp;rsquo;ve seen a rash of threats hit the retail community over the last few months. We don&amp;rsquo;t want to see a similar thing happen in health care.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2014/05/09/050914thinkingaheadMAG/large.jpg" width="618" height="284"><media:credit>James Kegley</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2014/05/09/050914thinkingaheadMAG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Cyber Arms Control</title><link>https://www.govexec.com/magazine/nextgov/2014/03/cyber-arms-control/81463/</link><description>Congress wants agencies to stop the proliferation of war worms, but lawmakers haven’t yet defined what those are.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Fri, 28 Mar 2014 09:40:59 -0400</pubDate><guid>https://www.govexec.com/magazine/nextgov/2014/03/cyber-arms-control/81463/</guid><category>Nextgov</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	Federal agencies during the next several months must work together on guidelines for controlling the trade of cyberwar technology. That requirement, made by Congress in late 2013, is sure to raise a host of legal, technical and operational challenges.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	In programming, a cyber weapon often refers to malicious code that takes advantage of a software glitch called a &amp;ldquo;zero day,&amp;rdquo; to insert itself and manipulate data. For example, Stuxnet, an alleged U.S-Israeli cyber weapon, upended Iran&amp;rsquo;s nuclear program by exploiting a flaw in the country&amp;rsquo;s centrifuge systems.&lt;/p&gt;
&lt;p&gt;
	The concern in Congress is that war worms, let loose in the black market, are being sold to the public and overseas aggressors.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	The 2014 National Defense Authorization&amp;nbsp;Act&amp;nbsp;that lawmakers cleared in December 2013 requires federal departments, with input from industry, to devise&amp;nbsp;&amp;ldquo;intelligence, law enforcement and financial sanctions&amp;rdquo; mechanisms to&amp;nbsp;&amp;ldquo;suppress the trade in cyber tools&amp;nbsp;and infrastructure that are or can be used for criminal, terrorist or military activities while preserving&amp;nbsp;the ability of governments and the private sector to&amp;nbsp;use such tools for legitimate purposes of self-defense.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	The law also directs the Obama administration to address the problem at the international level, an effort that began late last year. In December, the&amp;nbsp;&lt;em&gt;Financial Times&lt;/em&gt;&amp;nbsp;reported that 41 nations, including the United States, Russia and Germany, were close to a deal that would equate sensitive cyber technologies to traditional arms under one of the world&amp;rsquo;s key agreements on weaponry export control.&amp;nbsp;The revised terms for the Wassenaar Arrangement, as of January 2014,&amp;nbsp;now include controls on &amp;ldquo;surveillance and law enforcement/intelligence gathering tools and Internet Protocol (IP) network surveillance systems or equipment,&amp;rdquo; which might damage international and regional security.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	In a seemingly complementary maneuver, the U.S. defense authorization package calls on the administration to craft &amp;ldquo;principles for controlling the proliferation of cyber weapons that can lead to expanded cooperation and&amp;nbsp;engagement with international partners.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	But Congress did not define what a cyber weapon is, making it hard to compare the two initiatives.&lt;/p&gt;
&lt;p&gt;
	By fall, agencies must deliver recommendations for damping the proliferation of cyber weapons, including a draft statement of principles and a review of applicable legal authorities.&lt;/p&gt;
&lt;p&gt;
	Some legal experts call the concept of cyber arms control impractical.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;In the physical world, the production of weaponry is restricted by the need for an industrial base.&amp;nbsp;In cyberspace, weapons are bits and bytes and produced as intellectual property,&amp;rdquo; Paul Rosenzweig, a Homeland Security Department official during the George W. Bush administration,&amp;nbsp;wrote&amp;nbsp;on the &lt;em&gt;Lawfare&lt;/em&gt; blog in July 2013.&amp;nbsp;&amp;ldquo;With such an ease of manufacture (comparatively) and a global market, there seems to be precious little prospect for an arms-control type approach to eliminating the trade.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Cyber weapon vendor and federal contractor Endgame Systems reportedly offers customers 25 zero-day exploits a year for $2.5 million.&lt;/p&gt;
&lt;p&gt;
	Rosenzweig&amp;nbsp;calls Congress&amp;rsquo; proposal for cyber weapon nonproliferation &amp;ldquo;notably off target,&amp;rdquo; adding that &amp;ldquo;while the objective is certainly noble, I suspect the effort will be relatively unsuccessful.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2014/03/28/032814cyberweaponMAG/large.jpg" width="618" height="284"><media:credit>Jon Krause</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2014/03/28/032814cyberweaponMAG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title> The Whale Whisperer</title><link>https://www.govexec.com/advice-and-comment/thinking-ahead/2014/01/whale-whisperer/77159/</link><description>Biologist David Wiley ventures outside the swim lanes to design an app that prevents deadly ship strikes.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Tue, 21 Jan 2014 11:36:00 -0500</pubDate><guid>https://www.govexec.com/advice-and-comment/thinking-ahead/2014/01/whale-whisperer/77159/</guid><category>Thinking Ahead</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	David Wiley, a biologist at the National Oceanic and Atmospheric Administration, spearheaded development of an app that pinpoints, on digital nautical charts, places where ships might collide with endangered North Atlantic right whales. Only 500 of the mammals remain. Their biggest threat is boats.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	To protect the species, NOAA restricts speed limits and boundaries. Those barriers, however, are invisible in the ocean unless mariners have access to dynamic maps. With NOAA&amp;rsquo;s Whale Alert app mariners can simply swipe an iPad or iPhone screen to see the no-go zones.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;It&amp;rsquo;s designed to make it easier for the maritime community to comply with the ship-strike rule,&amp;rdquo; Wiley says. &amp;ldquo;Obviously, the more compliance, the more likely we are to have a conservation benefit.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	As of Dec. 6, there had been no fatal collisions in the regions charted by the app since its 2012 launch. And with funding from donations, the tool required only a small government investment.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Wiley went through unofficial channels to make all this happen. NOAA never signed off on the app. The field scientist didn&amp;rsquo;t know about federal Web management rules. But after the fact, no one is likely to deactivate such a life preserver.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	For fostering technology that saves lives, money and time, &lt;em&gt;Nextgov&lt;/em&gt; honored Wiley with a 2013 Bold Award.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Next up: A universal Ocean Alert app.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;We&amp;rsquo;re hoping to evolve Whale Alert into Ocean Alert, because there are similar problems everywhere in the ocean,&amp;rdquo; Wiley says. &amp;ldquo;For instance, there are some areas where shippers need to burn different fuels because of air pollution regulations, and they need to know where they are relative to those zones as well.&amp;rdquo;&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2014/01/21/012114wileyMAG/large.jpg" width="618" height="284"><media:credit>Mark Fleming</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2014/01/21/012114wileyMAG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Can You Save the Whales With a Smartphone?</title><link>https://www.govexec.com/management/2013/12/can-you-save-whales-smartphone/75726/</link><description>NOAA's Whale Alert mobile app can keep mariners from striking the endangered North Atlantic right whale.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ross Gianfortune and Aliya Sternstein</dc:creator><pubDate>Fri, 20 Dec 2013 09:30:00 -0500</pubDate><guid>https://www.govexec.com/management/2013/12/can-you-save-whales-smartphone/75726/</guid><category>Management</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	&lt;strong&gt;Listen to the story:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	&lt;iframe style="border: none" src="//html5-player.libsyn.com/embed/episode/id/2597927/height/65/width/450/theme/standard/direction/no/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/" height="65" width="450" scrolling="no"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;&lt;a href="http://ec.libsyn.com/p/e/a/f/eafe4b779dfd7f4e/022wiley.mp3?d13a76d516d9dec20c3d276ce028ed5089ab1ce3dae902ea1d01c08033d7cc588706&amp;amp;c_id=6552613"&gt;Download this episode&lt;/a&gt;&amp;nbsp;|&amp;nbsp;&lt;a href="https://itunes.apple.com/us/podcast/excellence-in-government/id600078661"&gt;Subscribe on iTunes&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	One of the rarest large animals on the planet, the North Atlantic right whale can grow up to 59 feet long. These migratory whales tend to stay close to peninsulas and near continental shelves to feed. Hunted to near-extinction, the whales were one of the first species to come under the protection of the federal government in the 1930s.&lt;/p&gt;
&lt;p&gt;
	With laws against whaling and the industry dying, the the no. 1 mortality factor among the endangered whales has shifted to ship strikes. The National Oceanic and Atmospheric Administration &lt;a href="http://www.nmfs.noaa.gov/pr/shipstrike/"&gt;has created a ship strike rule&lt;/a&gt;&amp;nbsp;that requires ships slow their rate of speed in particular areas of the ocean so the whale coexist with the ships. But the species remains in trouble.&lt;/p&gt;
&lt;p&gt;
	David Wiley, a NOAA researcher, was integral in making ship crews more aware of the whales and the ship strike rule with the development of &lt;a href="http://stellwagen.noaa.gov/protect/whalealert.html"&gt;Whale Alert&lt;/a&gt;. The mobile app provides mariners the most current information available to reduce the risk of collisions between ships and right whales.&lt;/p&gt;
&lt;p&gt;
	&amp;quot;What we&amp;#39;re trying to do is display that rule in a way that makes compliance with it easier,&amp;quot; Wiley said.&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;Nextgov &lt;/em&gt;honored Wiley with a 2013 Bold Award in November for his work on Whale Alert. At &lt;a href="http://www.nextgov.com/cio-briefing/2013/08/what-politicians-dont-tell-you-about-federal-employees/69752/"&gt;Nextgov Prime 2013&lt;/a&gt;, Wiley spoke with senior correspondent Aliya Sternstein about the app and its contribution to conservation of the whales. Wiley said the captains of the ships pose the greatest risk, but it can be mitigated if they can understand how to comply with the rule.&lt;/p&gt;
&lt;p&gt;
	&amp;quot;We think understanding and displaying the rule as simply as possible will lead to the greatest compliance,&amp;quot; Wiley said. &amp;quot;And if you have great compliance, you have great conservation.&amp;quot;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2013/12/19/EIGpodcast_1_1_1_2/large.jpg" width="618" height="284"><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2013/12/19/EIGpodcast_1_1_1_2/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Tech Roundup</title><link>https://www.govexec.com/magazine/nextgov/2013/11/tech-roundup/73895/</link><description>Apps that teach, the 
cyber training slide, 
CMS’ testing troubles.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein, Bob Brewin, and Joseph Marks</dc:creator><pubDate>Fri, 15 Nov 2013 00:00:00 -0500</pubDate><guid>https://www.govexec.com/magazine/nextgov/2013/11/tech-roundup/73895/</guid><category>Nextgov</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	&lt;strong&gt;Game On&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Building an educational game for a smartphone or tablet is a pretty tall order for federal agencies. It has to be sufficiently engaging so it doesn&amp;rsquo;t wilt when compared with apps from private sector leaders such as Zynga. But you can&amp;rsquo;t ramp up the fun by compromising the app&amp;rsquo;s educational value or you&amp;rsquo;ll shortchange young learners and fail to fulfill the agency&amp;rsquo;s mission.&lt;/p&gt;
&lt;p&gt;
	One app that crosses both these high bars is&amp;nbsp;Solve the Outbreak, an iPad game developed by the Centers for Disease Control and Prevention. The reviewers in &lt;em&gt;Nextgov&amp;rsquo;s&lt;/em&gt; apps rating project gave it 4.5 points out of 5, making it one of the highest scoring apps in the project&amp;rsquo;s two-year history.&lt;/p&gt;
&lt;p&gt;
	The app presents players with real-world disease outbreaks and teaches them about epidemiology and data analysis as they make decisions about how to respond. Along the way, players earn points until they reach the rank &amp;ldquo;disease detective.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Our reviewers thought the app was educational enough to be used in a classroom and fun enough to hold high school students&amp;rsquo; interest&amp;mdash;a high bar as anyone who&amp;rsquo;s spent much time with adolescents knows.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;This is the type of learning I love for kids to have,&amp;rdquo; says Ted Chan, founder of Practicequiz.com and chief technology officer of&amp;nbsp; Cook123.com. &amp;ldquo;It teaches that a lot of the math, biology, science and statistics concepts they are learning have meaningful applications.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	The reviewers&amp;rsquo; only criticism of the app was that it&amp;rsquo;s only available on the iPad.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	For more information, check out &lt;em&gt;Nextgov&amp;rsquo;s&amp;nbsp;&lt;/em&gt;Building Better Apps project at &lt;a href="http://www.nextgov.com/mobile/grading-government-apps/59768/"&gt;www.nextgov.com&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;Joseph Marks&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;Glass Half Empty&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Federal agencies for 15 years have been unable to move cybersecurity off a list of the government&amp;rsquo;s most imperiled initiatives, with a new audit revealing a declining number of agencies&amp;mdash;half&amp;mdash;do not annually train employees on security.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Perennial weaknesses in network security endanger national security because of the pervasiveness of the Internet and sophisticated cyber threats, according to a Government Accountability Office report released in September.&lt;/p&gt;
&lt;p&gt;
	In fiscal 2012, 12 of the 24 major federal agencies provided annual security awareness training to at least 90 percent of their network users, compared with 22 agencies the prior year.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	These and other &amp;ldquo;weaknesses show that information security continues to be a major challenge for federal agencies,&amp;rdquo; the audit states. &amp;ldquo;Until steps are taken to address these persistent challenges, overall progress in improving the nation&amp;rsquo;s cybersecurity posture is likely to remain limited.&amp;rdquo;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;Aliya Sternstein&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;Testing 1,2,3&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Contractors that helped develop the Obama administration&amp;rsquo;s troubled online health insurance marketplace say the Centers for Medicare and Medicaid Services, which oversaw the project, performed only two weeks of testing before going live on Oct. 1.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	That&amp;rsquo;s significantly less testing time than usual for major Web applications, representatives from HealthCare.gov contractors CGI Federal and QSSI say. They declined to say how much time should have been allocated.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	CGI played a major role in building Medicare.gov, for which it had several months of testing, says senior vice president Cheryl Campbell.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;Joseph Marks&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;NSA Needs a 12-Step Program&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Since Edward Snowden started leaking details on how the National Security Agency gobbles up exabytes of data worldwide, it has become increasingly clear that it has an unhealthy addiction.&lt;/p&gt;
&lt;p&gt;
	NSA chief Keith Alexander has said the agency needs to collect &amp;ldquo;haystacks&amp;rdquo; of data in order to detect terrorist needles, an effort &lt;em&gt;The Washington Post&lt;/em&gt;&amp;nbsp;says&amp;nbsp;&amp;ldquo;occasionally threatened to overwhelm storage repositories, forcing the agency to halt its intake with &amp;lsquo;emergency detasking&amp;rsquo; orders.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Those are real signs of addiction. The explanation for this spying&amp;mdash;everyone does it&amp;mdash;is an excuse used by alcoholics on the 10th beer of the evening while everyone else at the bar slowly sips their second.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	I&amp;rsquo;m not suggesting NSA go cold turkey, but it might try tapering off&amp;mdash;a terabyte at a time.&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;Bob Brewin&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded></item><item><title>Sensory Overload</title><link>https://www.govexec.com/magazine/briefing/2013/10/sensory-overload/70996/</link><description>DHS and Congress rethink surveillance gear along the 
U.S.-Mexico border.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Tue, 01 Oct 2013 00:00:00 -0400</pubDate><guid>https://www.govexec.com/magazine/briefing/2013/10/sensory-overload/70996/</guid><category>Briefing</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	The need for robotic eyes on the border seems like a no-brainer for most lawmakers negotiating immigration reform and border security, but calculating costs and cameras per mile might not prove so easy.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Until directed otherwise by Congress, the Homeland Security Department is moving ahead with a $465 million plan to remotely watch eight areas in Arizona that brush up against Mexico.&lt;/p&gt;
&lt;p&gt;
	The multiyear project aims to dot the state with video surveillance turrets that can spot illegal activity, such as human and drug trafficking. The towers are part of a second attempt at a virtual fence, after an earlier go exhausted&lt;br /&gt;
	$1 billion. Conceived in 2005, the Secure Border Initiative network was to be a series of one-size-fits-all interconnected&lt;br /&gt;
	towers flanked with cameras. But the dynamic border environment tripped up the cameras and the project was abandoned in 2011. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	This time, DHS officials say they will station towers only where cameras have clear visibility in Nogales, Ariz., and then add more in Sonoita, Douglas, Casa Grande, Ajo and Wellton&amp;mdash;for a total of up to 50 towers, funding permitted. A contract is expected to be awarded by the end of the year. Functioning SBInet towers in Tucson and Ajo will remain.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	In August, Rep. Mike McCaul, R-Texas, took House colleagues on a tour of the Southwest to show them where surveillance equipment, checkpoints&amp;nbsp;and other border controls are situated. McCaul is chairman of the Homeland Security Committee, which passed border security legislation this year.&lt;/p&gt;
&lt;p&gt;
	The bill McCaul sponsored would leave decisions about where to place border equipment up to experts from all levels of government who know best how much is needed and where, committee aides say.&lt;/p&gt;
&lt;p&gt;
	For years, &amp;ldquo;resources have dictated the strategy instead of a strategy dictating what resources are provided,&amp;rdquo; McCaul told &lt;em&gt;Government Executive &lt;/em&gt;in an email. His measure would require DHS to create a national strategy for gaining control of the border.&lt;/p&gt;
&lt;p&gt;
	Right now, &amp;ldquo;we have patched up individual holes&amp;mdash;causing illegal immigration to shift to less fortified sectors instead of stopping it altogether,&amp;rdquo; McCaul says. San Diego uses fences. Arizona uses drones and surveillance cameras on poles. And in Texas, there is a lot of unsecured space.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;The fence in the San Diego sector has pushed illegal immigrants off the California coast through our maritime borders, and advanced technology and increased enforcement in the Tucson sector has caused apprehensions to skyrocket in the Rio Grande Valley,&amp;rdquo; he says. &amp;ldquo;Today, even the most fortified sectors are full of gaping holes.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Everything in the legislation is wrapped around achieving a 90 percent apprehension rate, aides say. By drawing up a plan first, the thinking goes, lawmakers will know which tools are necessary to get there.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;The national strategy must be&amp;nbsp;presented to the Congress&amp;mdash;using technology, fencing and manpower, and with input from local communities, ranchers and landowners,&amp;rdquo; as well as government officials, McCaul says. &amp;ldquo;If Congress sees capability gaps in the plan, we will demand changes.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Not all of the new surveillance tools would require new funding. &amp;nbsp;By redeploying unarmed military drones and robots brought back from Iraq and Afghanistan, Homeland Security could acquire additional gear at no additional cost&amp;mdash;except for shipping fees.&lt;/p&gt;
&lt;p&gt;
	On the Senate side, lawmakers already have settled on a recipe for gadgets and gizmos to tighten border control. Comprehensive immigration legislation passed in June calls for 50 integrated fixed towers in Arizona, more than 30 in Texas and three in San Diego. Other equipment would include 205 handheld thermal imaging systems or night vision goggles for the Rio Grande Valley and 19 license plate readers in Laredo, Texas. Combined with law enforcement and fencing costs, the border security tab for the Senate plan would be $46 billion.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Some former federal immigration officials have voiced concerns that the technology proposals will duplicate ongoing efforts, like the virtual fence.&lt;/p&gt;
&lt;p&gt;
	Doris Meissner, who was commissioner of the Immigration and Naturalization Service during the Clinton administration, says lawmakers are overlooking DHS&amp;rsquo; accomplishments in high-tech surveillance during the past five years&amp;mdash;accomplishments taxpayers have already paid for.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;There is such a great deal of investment that has already taken place along the border, with a tremendous amount of support, bipartisan support, through the appropriations process,&amp;rdquo; says&lt;br /&gt;
	Meissner, now a senior fellow at&amp;nbsp;the nonpartisan Migration Policy Institute. &amp;ldquo;SBInet really failed, and it was a very large expenditure of money, most of which didn&amp;rsquo;t pay off. But they did learn from it, and they have since been employing these technologies that are available on the market.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Plus, Congress better provide more human eyes in the courthouses to keep up with what the robotic eyes are observing, some immigration attorneys say.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;Sequestration is already harming our courts here. Who is going to be available to defend or prosecute all of the illegal entry cases? What I see is disjointed optical placations,&amp;rdquo; says&lt;br /&gt;
	Kathleen&amp;nbsp;Campbell Walker, an El Paso-based lawyer with Cox Smith.&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2013/09/27/100113borderMAG/large.jpg" width="618" height="284"><media:credit>United States Customs and Border Protection</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2013/09/27/100113borderMAG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Tech Roundup</title><link>https://www.govexec.com/magazine/nextgov/2013/09/tech-roundup/69815/</link><description>Ghost viruses, ID iris scans, lagging IT reform.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein, Bob Brewin, and Joseph Marks</dc:creator><pubDate>Sun, 01 Sep 2013 01:00:00 -0400</pubDate><guid>https://www.govexec.com/magazine/nextgov/2013/09/tech-roundup/69815/</guid><category>Nextgov</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	&lt;strong&gt;Chasing Ghost Viruses&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	After detecting malicious software in system components at Commerce Department headquarters, federal officials in 2012 disconnected the Economic Development Administration&amp;rsquo;s computer infrastructure, annihilated $170,000 worth of equipment and cut off staff email and website access nationwide, according to an inspector general audit released in late June.&lt;/p&gt;
&lt;p&gt;
	&amp;nbsp;The response was overkill. It turns out there was no widespread malware infection&amp;mdash;something officials learned more than a year later, after the IG informed them.&lt;/p&gt;
&lt;p&gt;
	The chain of destruction began in late 2011, when the Homeland Security Department notified Commerce about possible worms in the department&amp;rsquo;s systems. Commerce traced the problem to parts on the headquarters&amp;rsquo; network that support the Economic Development Administration. Believing the issue was widespread, EDA in January 2012 asked Commerce to disconnect its systems from the&amp;nbsp;network, which cut access to email for all agency employees and prevented field office personnel from accessing other vital applications as well.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Officials then began demolishing computers, printers, TVs, cameras, computer mice, keyboards and other IT parts. In April 2012, the agency brought the workforce back online using alternative services, but the demolition continued for four more months&amp;mdash;until the agency ran out of funds. In total, EDA spent more than $2.7 million&amp;mdash;over half of its fiscal 2012 IT budget&amp;mdash;on recovery efforts, the IG found. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	One cause for the confusion: The Computer Incident Response Team member assigned to the job was unqualified. Rather than hand the agency a list of possibly infected components, the employee mistakenly provided a roster of 146 components within the network, only six of which were actually contaminated.&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;- Aliya Sternstein&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;The Eyes Have It&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	New federal guidelines on iris recognition allow the Homeland Security Department to proceed with a $100 million plan for modernizing employee badges.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Following the Sept. 11, 2001, terrorist attacks, Congress passed legislation requiring that government personnel have smart card credentials to access all government buildings and networks. In May, DHS began searching for a contractor to replace the department&amp;rsquo;s fingerprint identification system with more cutting-edge technology, such as iris matching capabilities. But there was no consistent way to exchange eye images between cameras and card readers.&lt;/p&gt;
&lt;p&gt;
	That changed in July after the National Institute of Standards and Technology finalized guidelines for incorporating iris scans into employee IDs.&lt;/p&gt;
&lt;p&gt;
	As of July 3, DHS expected to spend up to $102.8 million to provide staff with upgraded biometric smart cards during the next decade, according to contract filings.&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;- Aliya Sternstein&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;Lagging IT Reform&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Rep. Gerry Connolly, D-Va., lashed out at federal technology leaders for being slow to adopt cost-saving reforms laid out early in the Obama administration&amp;mdash;such as consolidating data centers and shifting data to computer clouds&amp;mdash;and for inadequately reporting on progress.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;My hope is that as we move forward all of us can try to find ways to encourage and exhort and pressure the federal government to come into the 21st century with management changes and allocation and investment changes that will better serve the country,&amp;rdquo; he said.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;- Joseph Marks&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;China Loves the Navy&amp;rsquo;s&amp;nbsp;GPS Landing System&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	I did a Google search for some background information on the precision GPS landing system the Navy used to help guide its unmanned X-47B to a carrier landing, and one of the first hits to pop up was a paper by three authors from China&amp;rsquo;s Naval University of Engineering.&lt;/p&gt;
&lt;p&gt;
	&lt;br /&gt;
	The paper, presented in May at a conference in Wuhan, China, goes into great detail about the landing system. I wondered where China obtained so much information about a U.S. Navy program, until I stumbled across a 2010 Naval Air Systems Command&amp;nbsp;presentation, which included many of the details used in the 2013 China report.&lt;/p&gt;
&lt;p&gt;
	The authors even included the same graphic used by the U.S. Navy in 2010 to illustrate how the precision guidance system works.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Too bad NAVAIR can&amp;rsquo;t copyright its slide decks.&lt;/p&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;- Bob Brewin&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2013/09/03/090113ngMAG/large.jpg" width="618" height="284"><media:credit>Thinkstock</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2013/09/03/090113ngMAG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Beyond the Breach</title><link>https://www.govexec.com/magazine/features/2013/09/beyond-breach/69791/</link><description>The Thrift Savings Plan bounces back from the theft of personal data on thousands of beneficiaries.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Sun, 01 Sep 2013 00:00:00 -0400</pubDate><guid>https://www.govexec.com/magazine/features/2013/09/beyond-breach/69791/</guid><category>Features</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	When hackers in 2011 penetrated a contractor&amp;rsquo;s computer containing the Social Security numbers of 123,000 federal employee retirement plan participants, fund administrators were unaware of the intrusion, had neglected a series of security audit recommendations, and had no legal recourse against the vendor.&lt;/p&gt;
&lt;p&gt;
	Today, a year after learning of the incident, the Federal Retirement Thrift Investment Board is willing to pay the price for stronger security. There is also a new contractor taking over early next year.&lt;/p&gt;
&lt;p&gt;
	Unfortunately, the Thrift Savings Plan break-in is not an exceptional case. Government systems nationwide, even those maintained by the Homeland Security Department and security contractors like RSA, are compromised every day. And the same episode could happen again at the TSP or any place else. But next time, TSP staff should be better positioned to detect something is amiss, rather than hear about it after the fact from the FBI.&lt;/p&gt;
&lt;p&gt;
	Information technology audits obtained through the Freedom of Information Act, an examination of contract language, and interviews with TSP officials and congressional aides depict an organization in which security measures, in general, were implemented after the fact. A lengthy period elapsed between the time of the breach and the time Serco, the vendor whose network was attacked, found out what happened. In July 2011, intruders successfully targeted the computer of a Serco employee who helped keep track of participant accounts. It was not until April 2012 that the FBI informed Serco and TSP of the incident.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;The investigation into the data taken from the Thrift Savings Plan required months of intensive forensic analysis by FBI personnel from multiple field offices and headquarters divisions because the methods behind the intrusion were sophisticated,&amp;rdquo; bureau officials said in a statement. &amp;ldquo;Then the FBI had to execute a legal process that involved outside entities, information that also took time to develop and receive.&amp;rdquo; Officials said they were unable to discuss how the intrusion occurred.&lt;/p&gt;
&lt;p&gt;
	Alan Hill, Serco&amp;rsquo;s senior vice president for corporate communications and government relations, portrays the contractor and TSP as &amp;ldquo;victims of a sophisticated and targeted cyberattack.&amp;rdquo; When pressed, he acknowledges they could have taken more security precautions.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Serco maintains a heavy footprint in the government, with more than $450 million in federal contracts last year alone. Federal officials this summer awarded the Reston-based firm a potential $1.2 billion contract to support recordkeeping for the nationwide health insurance exchanges created as part of the 2010 health care overhaul Rep. Darrell Issa, R-Calif., chairman of the House Oversight and Government Reform Committee, has criticized the selection of a company that was unable to prevent the exposure of hundreds of thousands of retirement plan records. Hill says Serco&amp;rsquo;s responsibilities primarily involve processing paper applications and do not include maintaining IT systems or networks for the exchanges.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;Lack of Controls&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	It&amp;rsquo;s worth noting there is no evidence the hackers got into TSP&amp;rsquo;s network. The compromised machine resided on a Serco-owned network dedicated to TSP operations. And as of mid-July, there was no indication the intruders tried to divert funds or commit financial fraud. But their ambitions might be even more serious, several cybersecurity experts say. &amp;ldquo;It is important to point out that this company is intimately involved in servicing the U.S. government. We have seen many attacks originating from China against data providers trying to get personal information on military personnel&amp;mdash;that very well could be what happened here,&amp;rdquo; George Kurtz, a former McAfee chief technology officer now at cyber forensics firm CrowdStrike, said after the 2012 revelation.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Most security specialists use the word &amp;ldquo;sophisticated&amp;rdquo; to refer to hacks that are targeted and intent on extracting specific information. In one such maneuver, intruders stole RSA&amp;rsquo;s proprietary login technology to gain access to RSA-protected defense company networks, including those at Lockheed Martin Corp.&lt;/p&gt;
&lt;p&gt;
	James Lewis, a cybersecurity analyst who advises the Obama administration and Congress, said following the TSP&amp;rsquo;s announcement he had the impression that &amp;ldquo;at least one smart country is building a database on [U.S. government] employees, using things like TSP and social networks.&amp;rdquo; But, he added, &amp;ldquo;it&amp;rsquo;s hard to believe they didn&amp;rsquo;t go after any money.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	During the past year, data entrusted to contractors at several major departments has been exposed. DHS recently discovered that personal details on employees holding security clearances had been unprotected since 2009 because of a glitch in the software a contractor was using. The General Services Administration did not know about the leak of federal contractors&amp;rsquo; personal and proprietary information held in an IBM-managed database until a good Samaritan user, whose own information was at risk, told the agency.&lt;/p&gt;
&lt;p&gt;
	Months before the TSP incident, agency officials recognized they were not dedicating enough effort to system protections. &amp;ldquo;TSP still has a significant amount of work to do as far as the documentation of safety and security procedures,&amp;rdquo; agency executive director Gregory T. Long stated, according to April 2011 board meeting minutes. Seven months after the TSP breach, but before it became public, auditors from the Labor Department&amp;rsquo;s Employee Benefits Security Administration and KPMG described the TSP&amp;rsquo;s oversight of computer access and security controls as a &amp;ldquo;significant matter.&amp;rdquo;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Computer safeguards continued to be a sore spot up until the breach became public. Meeting notes from early 2012 state that Ian Dingwall, chief accountant for the Employee Benefits Security Administration, &amp;ldquo;expressed concern that not all recommendations related to technology concerns had been addressed by the board.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Security was still an outstanding issue the month TSP officials learned about the infiltration. Notes from an April 2012 board meeting say that external auditors had &amp;ldquo;identified 18 policies related to IT controls that were not approved or implemented to date.&amp;rdquo; Auditors discovered nine inactive accounts on a recordkeeping system, and several former TSP employees did not have system access revoked immediately after leaving the organization.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	A Senate Homeland Security and Governmental Affairs Committee aide told&amp;nbsp;&lt;em&gt;Government Executive&lt;/em&gt;&amp;nbsp;that congressional staff felt board members knew about security problems before the assault and didn&amp;rsquo;t do enough to strengthen defenses.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	The board &amp;ldquo;rejects the contention that our system security was weak,&amp;rdquo; TSP spokeswoman Kim Weaver says. &amp;ldquo;The open audit recommendations deal primarily with process and documentation&amp;mdash;operational and management controls&amp;mdash;not with the technical controls required to provide security to modern federal computer systems.&amp;rdquo; She acknowledges, however, that previously, the board might have underspent on security.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	The board&amp;rsquo;s budget is funded through participant fees. Last year&amp;rsquo;s board wanted to reduce operating costs, including security expenses, Weaver says. The board &amp;ldquo;was hampered in its ability to address the open findings more aggressively because of budget constraints,&amp;rdquo; she says.&lt;/p&gt;
&lt;p&gt;
	The new board has boosted the operating budget, &amp;ldquo;which enables us to make significant progress toward closing outstanding audit findings, which is a top priority,&amp;rdquo; Weaver explains. Between 2011 and 2012, the TSP consisted of about 100 full-time employees and a budget that grew by less than $20 million, from $128 million to $143 million. Now, 143 employees are on staff and funding has increased to $171 million.&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;Security After the Fact&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Some of the steps TSP has taken since the incident could serve as a guide for agencies that haven&amp;rsquo;t yet been hit, cyber researchers and agency officials say.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;Attacks such as the one that happened are always going to happen. There&amp;rsquo;s no way to prevent them. It&amp;rsquo;s how are we going to respond, early on,&amp;rdquo; says Jay Ahuja, the TSP&amp;rsquo;s chief risk officer. His position and office of seven employees are new. In addition, the agency now has a chief information security officer, with whom Ahuja meets weekly. Other new positions include three information systems security officers.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	The major lesson the board drew from the strike is the &amp;ldquo;need to improve the segregation of our systems&amp;rdquo; by customizing access rights for each user and heightening the protection of more critically sensitive data, Weaver says.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;It looks like a classic example of an organization that didn&amp;rsquo;t focus on security and had only rudimentary controls in place,&amp;rdquo; says Ed Skoudis, who estimates that more than 90 percent of the breaches he has examined as a computer forensics expert witness involved a lack of segmentation. Skoudis is the founder of Counter Hack Challenges, which constructed &amp;ldquo;CyberCity,&amp;rdquo; a 3-D model town that agencies and businesses use to practice securing power grids and other critical industry networks.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Describing the audit criticisms &amp;ldquo;as merely process and documentation shortcomings instead of technical is a lame excuse on their part,&amp;rdquo; he says. &amp;ldquo;Without good documented processes, even security that, through luck, is accidentally good over the short term decays rapidly.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	TSP officials disagree that fundamental security was lacking. &amp;ldquo;We are continuously making improvements to our security posture and architecture,&amp;rdquo; Weaver says. After the incident, Serco took &amp;ldquo;corrective actions&amp;rdquo; to strengthen information protections and limit the likelihood of another intrusion, she adds. Serco will be running the system until Oct. 1 and then help shift the job to a new vendor, Science Applications International Corp., until February 2014.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;If this board had stronger oversight on [Serco] this could have been avoided,&amp;rdquo; a Homeland Security and Governmental Affairs Committee aide says, referring to the extent of the damage.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;Read the Fine Print&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	The TSP&amp;rsquo;s original $32 million recordkeeping agreement with Serco did not include contractual remedies in the event of a data breach. &amp;ldquo;That is a subject area that has been significantly altered in the new contract with SAIC,&amp;rdquo; Weaver says.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	The deal with Serco included just three sentences on security requirements, according to documents reviewed by&amp;nbsp;&lt;em&gt;Government Executive&lt;/em&gt;. One provision barred the contractor from disclosing details about system protections. Another stipulated that Serco must create an inspection program to safeguard government data, and allow government officials to see Serco&amp;rsquo;s technical operations. The third was a breach notification clause that required Serco and the agency, in the event of a threat, to &amp;ldquo;immediately bring the situation to the attention of the other party&amp;rdquo;&amp;mdash;which Serco did.&lt;/p&gt;
&lt;p&gt;
	It has been standard industry practice for more than five years to spell out security requirements for contractors, Skoudis says, adding that clauses should be reviewed each time a pact is updated. &amp;ldquo;Contractors increasingly handle and store a lot of sensitive information on behalf of government agencies. They need to have just as stringent security controls as the agencies themselves,&amp;rdquo; he says.&lt;/p&gt;
&lt;p&gt;
	Hill says Serco continually makes cybersecurity enhancements to deal with ever-evolving threats. &amp;ldquo;Serco remains confident of the safety and security of its systems. Through continuous monitoring and improvement, Serco is vigilant in safeguarding the information and systems with which it is entrusted, and we take cyberattacks very seriously,&amp;rdquo; he says.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Weaver says the new agreement with SAIC spells out data breach stipulations at length, including who bears what costs, and includes provisions regarding continuous background screening of personnel and security training. The six-year, $227 million deal was awarded Aug. 9.&lt;/p&gt;
&lt;p&gt;
	But, she adds, &amp;ldquo;Given the sophisticated nature of the attack, it&amp;rsquo;s extremely unclear whether the attack would have been prevented even if all open audit recommendations had been fully implemented.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2013/08/31/082813tspNG_1/large.jpg" width="618" height="284"><media:description>Jay Ahuja, the TSP’s chief risk officer, says attacks will still happen but early response will make the difference.</media:description><media:credit>Stephen Voss</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2013/08/31/082813tspNG_1/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Cloud Control</title><link>https://www.govexec.com/magazine/nextgov/2013/08/cloud-control/67778/</link><description>Contractors seeking FedRAMP certification encounter hurdles.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Thu, 01 Aug 2013 01:00:00 -0400</pubDate><guid>https://www.govexec.com/magazine/nextgov/2013/08/cloud-control/67778/</guid><category>Nextgov</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	A program aimed at simplifying the required security documentation for cloud companies is more of an obstacle course than an access way into the government sector, some agency and industry officials say.&lt;/p&gt;
&lt;p&gt;
	The&amp;nbsp;Federal Risk and Authorization Management Program, or FedRAMP, has blessed only&amp;nbsp;five&amp;nbsp;out of about 100 vendors applying for certifications that affirm their Web services are safe for agencies governmentwide. All cloud providers interested in selling technology to agencies must comply with FedRAMP&amp;nbsp;controls, such as data backups, by June 2014.&lt;/p&gt;
&lt;p&gt;
	Federal officials say part of the reason for the low passing rate is the rigor of the criteria. FedRAMP&amp;nbsp;bills itself as a standardized approach to cloud security assessments, authorization and monitoring.&amp;nbsp;The idea is for companies to endure the process once and then not have to undergo separate evaluations by each agency customer, officials say.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;Every cloud provider we&amp;rsquo;ve worked with has been completely blown away by the level of effort that it takes to do this,&amp;rdquo; says FedRAMP program manager Matthew Goodrich. &amp;ldquo;While the first lift is going to be incredibly hard, you don&amp;rsquo;t have to do that lift again . . . Once it&amp;rsquo;s done once, there&amp;rsquo;s not repeated questions, there&amp;rsquo;s not additional things to ask.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	However, agencies still need to meet other security prerequisites after a company&amp;rsquo;s service is approved to activate the cloud technology. For instance, a FedRAMP-authorized cloud does not provide certain access restrictions mandated by regulations under the 2002 Federal Information Security Management Act, or FISMA. To meet those requirements, an agency must add more security components, as&amp;nbsp;such as two-factor authentication and the ability to record Web sessions. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Meanwhile, agencies that are uneasy with any answers they see in&amp;nbsp;FedRAMP&amp;nbsp;documentation can ask the vendor to undergo additional scrutiny, or refuse to accept the contractor at all.&lt;/p&gt;
&lt;p&gt;
	Kevin Dulany, chief of risk management oversight for the Pentagon&amp;rsquo;s office of the chief information officer, cites Amazon as an example.&amp;nbsp;The server giant&amp;nbsp;clinched&amp;nbsp;a FedRAMP authorization in May.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;I&amp;rsquo;m going to use your&amp;nbsp;security artifacts and that body of evidence for me to make my own risk decision,&amp;rdquo; he says. &amp;ldquo;My process is going to be about a two-week process of verification, and I&amp;rsquo;m going to make my own decision.&amp;rdquo;&amp;nbsp; And the judgment, he adds, might be that &amp;ldquo;I can&amp;rsquo;t accept that risk based upon my own operational mission needs.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	In Dulany&amp;rsquo;s hypothetical situation, even if he chooses to accept Amazon&amp;rsquo;s security level, the system still would need more controls, according to Amazon&amp;rsquo;s business collaborators. So the Web services industry is not convinced that FedRAMP makes security assessments more efficient.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;It certainly runs the risk of being a process that drags everybody down,&amp;rdquo;&amp;nbsp;says Mike Hettinger, a director at the&amp;nbsp;Software and Information Industry Association. The small number of approvals reflects the difficulty of the method, he says.&lt;/p&gt;
&lt;p&gt;
	Officials at the General Services Administration, the agency running FedRAMP, say documents illustrating how cloud providers meet federal security requirements&amp;nbsp;and any associated risks will differ among providers.&lt;/p&gt;
&lt;p&gt;
	Officials acknowledge that even with FedRAMP, by order of FISMA,&amp;nbsp;agencies still must apply a risk management framework, as well as select, implement and assess appropriate controls.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2013/07/31/080113cloudMAG/large.jpg" width="618" height="284"><media:credit>Corbis</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2013/07/31/080113cloudMAG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>NSA's Big Dig</title><link>https://www.govexec.com/magazine/features/2013/08/nsas-big-dig/67751/</link><description>It’s no secret that Harvey Davis has a sensitive job building massive spy data centers.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Thu, 01 Aug 2013 00:00:00 -0400</pubDate><guid>https://www.govexec.com/magazine/features/2013/08/nsas-big-dig/67751/</guid><category>Features</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	He works at one of the three-letter intelligence agencies and oversees construction of a $1.2 billion surveillance data center in Utah that is 15 times the size of MetLife Stadium, home to the New York Giants and Jets. Long Island native Harvey Davis, a top National Security Agency official, needs that commanding presence. His role is to supervise infrastructure construction worldwide for NSA, which is part of the Defense Department. That involves tending to logistics, military installations, as well as power, space and cooling for all NSA data centers.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	In May, crews broke ground on a $792 million computing center at the agency&amp;rsquo;s headquarters near Baltimore that will complement the Utah site. Together the Utah center and Maryland&amp;rsquo;s 28-acre computer farm span 228 acres&amp;mdash;more than seven times the size of the Pentagon.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	During an interview with&amp;nbsp;&lt;em&gt;Government Executive&amp;nbsp;&lt;/em&gt;in June, amid the uproar over leaked details of NSA&amp;rsquo;s domestic espionage activities, Davis describes the 200-acre Utah facility as very transparent: &amp;ldquo;Only brick and mortar.&amp;rdquo; A data center just provides energy and chills machines, he says.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	About 6,500 contractors, along with more than 150 Army Corps of Engineers and NSA workers, including some with special needs, are assigned to the project. Davis perks up when he talks about the hundreds of individuals with disabilities he has steered into NSA.&lt;/p&gt;
&lt;p&gt;
	But ask him why the facility is so big and what&amp;rsquo;s inside, and he is less forthcoming. &amp;ldquo;I think we&amp;rsquo;re crossing into content. It&amp;rsquo;s big because it&amp;rsquo;s required to be big,&amp;rdquo; says Davis, a 30-year veteran of the spy agency.&lt;/p&gt;
&lt;p&gt;
	At NSA, secrecy is not exclusive to intelligence analysts. Every civil servant in the Installations and Logistics Directorate Davis leads has a security clearance. He earned his in the early 1980s, entering the agency with a master&amp;rsquo;s degree in business administration, experience managing inventory for a women&amp;rsquo;s apparel chain, and a yearning for a higher calling than retail.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	For security reasons, some of the contractors erecting the data center don&amp;rsquo;t even know its purpose, other than the equipment needed&amp;mdash;nothing about snooping. The 2010 public work solicitation called for a 65-megawatt center with a chiller plant, fire suppression systems, electrical generators and an uninterruptible power supply backup capacity.&lt;/p&gt;
&lt;p&gt;
	Davis lets out that inside there will be supercomputers, or what NSA labels &amp;ldquo;high performance computers.&amp;rdquo; These need &amp;ldquo;different cooling and different power distributions as opposed to something you bought from Best Buy,&amp;rdquo; he says. The machines, along with whatever other technology is tucked in the facility, are slated to power on by Oct. 1.&lt;/p&gt;
&lt;p&gt;
	Four years ago, the stated purpose of the megaplex near Salt Lake City was to amass foreign intelligence and warnings about hackers. &amp;nbsp;Officials described it as an extension of President George W. Bush&amp;rsquo;s 2008 Comprehensive National Cybersecurity Initiative, a largely classified, cross-agency program to protect U.S. computer networks against adversaries. Today, it is evident the data plantation will not be linked to any one program. Instead, the systems inside will warehouse counterterrorism information collected in aggregate, including millions of Americans&amp;rsquo; phone logs for five years and certain foreigners&amp;rsquo; online messages, NSA officials confirm. Spies at other locations will decipher what&amp;rsquo;s accumulated to thwart terrorist attacks, cyber assaults, and weapons of mass destruction.&lt;/p&gt;
&lt;p&gt;
	The&amp;nbsp;Utah effort is the largest ongoing Defense construction project in the United States.&amp;nbsp;Still, it is only three-quarters the size of the department&amp;rsquo;s largest in the world&amp;mdash;the Medical Center Replacement Project at Rhine Ordnance Barracks, Germany.&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;His Posse&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Davis is reluctant to discuss the ratio of contractors to civil service employees in Utah&amp;mdash;a week after&amp;nbsp;&lt;em&gt;The Guardian&lt;/em&gt;&amp;nbsp;and&amp;nbsp;&lt;em&gt;The Washington Post&lt;/em&gt;&amp;nbsp;have reported an NSA contractor leaked Top Secret documents. Prosecutors are pursuing former Booz Allen Hamilton employee Edward Snowden for exposing files about PRISM, the agency&amp;rsquo;s foreign Internet surveillance program, and domestic call data-monitoring while he was administering NSA data systems in Hawaii.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Compared with the 6,500 contract employees, &amp;ldquo;there is a smaller number of people on my core project management team,&amp;rdquo; Davis says. An agency official in the room adds: &amp;ldquo;We can talk in total numbers here . . . We can&amp;rsquo;t get into how many are ours, how many are theirs.&amp;rdquo;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	A few days after the interview, when asked why NSA&amp;rsquo;s reliance on contractors is hush-hush, agency officials released some figures.&amp;nbsp; Ten people are on Davis&amp;rsquo; core team.&amp;nbsp;About 150 employees from the Army Corps of Engineers, along with an undisclosed number of employees from the 1,000-member Installations and Logistics Directorate, are involved with the Utah project. NSA considers the total sum of agency personnel staffed to certain construction projects operational details and would not provide that statistic.&amp;nbsp; A small workforce of up to 200 government and contract employees&amp;mdash;building engineers, systems administrators and maintenance workers&amp;mdash;will stay permanently to keep the facility running.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Davis is more eager to discuss the quality than quantity of his employees. Roughly 10 years ago, while working as an NSA human resources director, he encountered an untapped talent pool that he now draws from regularly. &amp;ldquo;The disabled population is just so thankful to have a job. They would just come in here and you&amp;rsquo;d have to actually force them to go home,&amp;rdquo; Davis says. &amp;ldquo;I have engineers that are hard of hearing, and our workforce all took sign language so they could actually communicate with one another.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Nobody waters down security clearance exercises to facilitate special needs applicants, he adds. &amp;ldquo;Somebody who was deaf, we would do polygraph in sign language,&amp;rdquo; Davis says. &amp;ldquo;What we look for is qualifications first. We have someone developing software&amp;mdash;working on the computers&amp;mdash;that is blind. There is really no limitation that we have found as long we can find the skill match.&amp;rdquo; At least a dozen engineers who have disabilities work in his directorate. Grounds maintenance and snow removal contractors in Utah will be hired through SourceAmerica (formerly NISH), a nonprofit organization that fits agency needs with the skills of job seekers with disabilities.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;He has integrated this into the fabric of the company,&amp;rdquo; says Joyce A. Bender, past chair of the board of the American Association of People with Disabilities, who met Davis when he decided NSA needed more diversity. &amp;ldquo;What makes this work at any company is a passionate leader, someone in leadership, whether it&amp;rsquo;s in the private sector or a federal agency,&amp;rdquo; says Bender, a Pittsburgh-based consultant who recruits people with disabilities for work in government and industry.&lt;/p&gt;
&lt;p&gt;
	Her firm refers to NSA about 200 individuals annually for positions in finance, linguistics, math and other specialties. Since 2010, about 550 candidates have been hired.&amp;nbsp;&amp;ldquo;If he says, &amp;lsquo;I&amp;rsquo;m going to do something,&amp;rsquo; you can count on it that he is going to do it,&amp;rdquo; Bender says of Davis. &amp;ldquo;He doesn&amp;rsquo;t sugarcoat anything. He&amp;rsquo;s very direct and to the point.&amp;rdquo;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;A Leak During Construction&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	No matter their background or how they came to NSA, civil servants and contract employees alike all serve in silence. &amp;ldquo;That&amp;rsquo;s really the culture of this agency, and we&amp;rsquo;re really not looking for big accolades,&amp;rdquo; Davis says. &amp;ldquo;What really makes the people satisfied here is that they did the job and they did it right and they&amp;rsquo;re doing things within the appropriate manner.&amp;rdquo; The mentality is that NSA operates in the dark for the safety of Americans. Some citizens, however, argue it should operate in the sunshine a little more for the safety of democracy.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	The secrecy dispute is &amp;ldquo;a distraction and a weakness that has been presented by this guy,&amp;rdquo; Snowden, who should not have seen such sensitive information in the first place, says one former NSA official. &amp;ldquo;They&amp;rsquo;ve got to do some internal homework about how to keep that data separate,&amp;rdquo; the ex-official says, adding that technical controls are not very difficult to configure. &amp;ldquo;How the heck did this guy in Hawaii gain access to all that?&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Some human rights advocates are grateful for the exposure of the agency&amp;rsquo;s surveillance methods. &amp;ldquo;Communications about millions of innocent Americans are being stored for five years in a government database&amp;mdash;whether or not there is any reason to search our call records, and I don&amp;rsquo;t think our Constitution allows that,&amp;rdquo; says Alex Abdo, staff attorney for the American Civil Liberties Union&amp;rsquo;s National Security Project.&lt;/p&gt;
&lt;p&gt;
	Even some former Pentagon officials say citizens should know NSA&amp;rsquo;s intentions for the Utah data center. &amp;ldquo;When you have this much centralization of capabilities, which in government terms can translate into real power&amp;mdash;that and resources&amp;mdash;it&amp;rsquo;s important that the public be able to look at these things and figure out what they are doing,&amp;rdquo; says a cyber official who recently left Defense and now works as a private contractor. The official is not involved in the project and was not authorized to speak on behalf of the department.&lt;/p&gt;
&lt;p&gt;
	A 2012 article in&amp;nbsp;&lt;em&gt;Wired&lt;/em&gt;&amp;nbsp;reported that NSA needs the megaplex partially because the Pentagon wants to expand the military global communications network to manage yottabytes of data. &amp;ldquo;A yottabyte is a septillion bytes&amp;mdash;so large that no one has yet coined a term for the next higher magnitude,&amp;rdquo; the article said. &amp;ldquo;Should the agency ever fill the Utah center with a yottabyte of information, it would be equal to about 500 quintillion (500,000,000,000,000,000,000) pages of text.&amp;rdquo; NSA officials told&amp;nbsp;&lt;em&gt;Government Executive&lt;/em&gt;, however, they do not discuss such operational details. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;An Open House&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	The contents of the NSA computer fortress might be a mystery to the public, but Davis says his project has been open to congressional and industry scrutiny.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;The military construction process by design is a very, very transparent process. We work through the Corps of Engineers,&amp;rdquo; he says. &amp;ldquo;It&amp;rsquo;s a public discourse. When we give out our request for proposal, that&amp;rsquo;s through FedBizOpps.gov.&amp;rdquo; But on the website, many of the work descriptions for that project are locked behind a firewall. NSA spokeswoman Vanee Vines says the documents are restricted because &amp;ldquo;they must be accounted for and are only for cleared defense contractors.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Davis acknowledges the controversy over his project has taken an emotional toll. &amp;ldquo;We&amp;rsquo;ve been pressured to disclose what&amp;rsquo;s been going in the Utah Data Center for quite a while independent of the current events,&amp;rdquo; he says. &amp;ldquo;My workforce and the workforce that I work with here [in Utah] take our jobs and our responsibility very, very seriously, and for somebody to say that we&amp;rsquo;re doing something untoward is a pretty big hit on the morale here.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	No matter the outcome of the debate, the Utah computers are expected to go online within two months. This is where the MBA comes in. From choosing a site, to convincing Congress to agree with blueprints to surmounting a late-in-the-game budget chop, balancing the books is key. &amp;ldquo;Utah is a wonderful place with abundant and inexpensive power,&amp;rdquo; Davis says. &amp;ldquo;Plenty of sources of water for cooling.&amp;rdquo; NSA applied a mathematical model to select the location. The surrounding environment simplified construction. &amp;ldquo;Utah, because of the facility and the utilities, just came out far and ahead of everywhere else,&amp;rdquo; he says. &amp;ldquo;Lots of good roads. We could get the steel in. We could get the concrete in. We have lots of sand pits nearby,&amp;rdquo; he says. &amp;ldquo;We built our own cement slabs in that area. It&amp;rsquo;s pretty well offset from the road for the security that we need for the data center.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	The price tag for the project is in line with industry standards, according to NSA. &amp;ldquo;It&amp;rsquo;s actually relatively cheap and I came in under cost,&amp;rdquo; Davis says, referring to $100 million in savings gained partly by refusing to let contractors adjust the plan. Penny-pinching became mandatory when governmentwide spending cuts, known as sequestration, kicked in this year.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;One of the biggest cost drivers on a project this size is something called an engineering change proposal. They really number in the tens to hundreds in a project of this size,&amp;rdquo; but one could &amp;ldquo;count on a couple of hands the numbers of change orders that we allowed to happen,&amp;rdquo; he says. &amp;ldquo;We spent a lot of time honing the requirements tightly up front, making sure we knew what we were building, building it, and not going back and changing it later.&amp;rdquo; That&amp;rsquo;s the New York strong arm talking.&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2013/07/31/072513davidnsad1/large.jpg" width="618" height="284"><media:credit>Melissa Golden</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2013/07/31/072513davidnsad1/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Tech Roundup</title><link>https://www.govexec.com/magazine/nextgov/2013/07/tech-roundup/65816/</link><description>Boosting access to federal data, securing mobile devices, the joint health record mess.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein, Bob Brewin, and Joseph Marks</dc:creator><pubDate>Mon, 01 Jul 2013 00:00:00 -0400</pubDate><guid>https://www.govexec.com/magazine/nextgov/2013/07/tech-roundup/65816/</guid><category>Nextgov</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	&lt;strong&gt;Data Derby&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Government agencies must collect and publish new information in open, machine-readable and, whenever possible, nonproprietary formats, according to a White House&amp;nbsp;executive order&amp;nbsp;and&amp;nbsp;open data policy&amp;nbsp;&lt;br /&gt;
	published May 9.&lt;/p&gt;
&lt;p&gt;
	The idea behind the initiative is that information the government collects for the purposes of management, regulation and security can also be used by entrepreneurs to build products that aid consumers and turn a profit&amp;mdash;much like the billion-dollar industry that has been built on government-supplied Global Positioning System information, for example.&lt;/p&gt;
&lt;p&gt;
	What&amp;rsquo;s more, public access to government data can raise awareness of an issue or lead to smarter consumer choices. The website&amp;nbsp;WeMakeItSafer, for example, aggregates government information about product recalls.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;Starting today, we&amp;rsquo;re making even more government data available online, which will help launch even more new startups,&amp;rdquo; President Obama said in a statement. &amp;ldquo;And we&amp;rsquo;re making it easier for people to find the data and use it, so that entrepreneurs can build products and services we haven&amp;rsquo;t even imagined yet.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Government contractors and the open government community both applauded the executive order.&lt;/p&gt;
&lt;p&gt;
	Hudson Hollister of the Data Transparency Coalition trade association notes that better maintained government data could help contractors save money by allowing them to automate more reporting and compliance processes.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;Spending and programs would become more efficient, because data standards would permit the deployment of big data analytics to find waste and fraud,&amp;rdquo; he says. &amp;ldquo;Even our capital markets would benefit, because public regulatory filings converted into open data would be a more accessible source of actionable information&lt;br /&gt;
	for investors.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;- Joseph Marks&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;Secure&amp;nbsp;Those Phones&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	The Office of Management and Budget sent agencies instructions for securing government-owned commercial smartphones and tablets in an effort to bring consistency to what had been an ad hoc patchwork of guidelines. The 104-page&amp;nbsp;compilation&amp;nbsp;of controls was accompanied by a manual for picking the most appropriate mobile device setup.&lt;/p&gt;
&lt;p&gt;
	The instructions are part of a digital government strategy the White House&amp;nbsp;laid out&amp;nbsp;one year ago that called on agencies to &amp;ldquo;adopt a coordinated approach to ensure privacy and security in a digital age.&amp;rdquo;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	The departments of Homeland Security and Defense, along with the National Institute of Standards and Technology, developed the baseline protocols as first steps only. Later guidance, for example, might focus on continuous monitoring of controls, cryptography, securing the data instead of the device, and ensuring data is only shared with authorized users.&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;- Aliya Sternstein&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;Savings Shortfall&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	An initiative to consolidate federal data centers is well short of its goal of $3 billion in reduced spending by 2015, according to the Government Accountability Office.&lt;/p&gt;
&lt;p&gt;
	&amp;nbsp;Only five of 24 federal agencies have reported estimated savings through 2014 and those total less than $700 million, according to&amp;nbsp;the House Oversight and Government Reform Committee&amp;rsquo;s panel on government operations.&lt;/p&gt;
&lt;p&gt;
	The proposed savings, which GAO expects the White House will achieve eventually, will come from moving data to computer clouds and using more efficient centers.&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;- Joseph Marks&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;The Health Records Mess&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Secretary of Defense Chuck Hagel&amp;rsquo;s&amp;nbsp;decision&amp;nbsp;to modernize the Defense Department&amp;rsquo;s electronic health record through the purchase of commercial software looks like a setback for development of an integrated electronic health record with the Veterans Affairs Department.&lt;/p&gt;
&lt;p&gt;
	Except for a passing reference, the Hagel memo makes no reference to the iEHR, and seems more of the same go-it-alone approach favored by the Pentagon.&lt;/p&gt;
&lt;p&gt;
	This approach could run into serious congressional roadblocks. On May 14, the House Appropriations Committee&amp;nbsp;backed language&amp;nbsp;in the 2014 Defense spending bill that said no funds could be expended on any EHR project unless it is an open architecture that serves both departments.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	In addition, Frank Kendall, undersecretary of Defense for acquisition, says 20 vendors have products that could meet the Pentagon&amp;rsquo;s needs&amp;mdash;and since they all have lawyers, protests are inevitable. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;- Bob Brewin&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2013/07/01/070113ngMAG/large.jpg" width="618" height="284"><media:credit>Michael Morgenstern</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2013/07/01/070113ngMAG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Access Denied</title><link>https://www.govexec.com/magazine/nextgov/2013/07/access-denied/65819/</link><description>DHS is caught up in a decade-long struggle to secure port facilities with biometrics.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Mon, 01 Jul 2013 00:00:00 -0400</pubDate><guid>https://www.govexec.com/magazine/nextgov/2013/07/access-denied/65819/</guid><category>Nextgov</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	Eleven years and a half billion dollars after launching a program to secure access to vulnerable maritime facilities in the wake of the Sept. 11, 2001, terrorist attacks, federal officials have yet to significantly improve port security, auditors say. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	The Homeland Security Department&amp;nbsp;is set to roll out&amp;nbsp;the Transportation&amp;nbsp;Worker Identification Credential nationwide at a projected cost of&amp;nbsp;$3 billion, plus $234.2 million for the installation of card scanners. But a federal watchdog report released&amp;nbsp;May 8 advised Congress to revoke a law requiring employees to swipe the cards to enter facilities until the Transportation Security Administration&amp;nbsp;can prove the smartcards and card readers actually work. TSA oversees TWIC security threat assessments.&lt;/p&gt;
&lt;p&gt;
	Acknowledging that the current card reader system is deficient, some lawmakers say they are optimistic that alternative technologies can build on TSA&amp;rsquo;s legwork and succeed.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;Repealing the requirement to deploy card readers misses the point,&amp;rdquo; Rep. John Mica, R-Fla., chairman of the Oversight and Government Reform&amp;nbsp;Subcommittee on Government Operations,&amp;nbsp;told &lt;em&gt;Government Executive &lt;/em&gt;in an email. &amp;ldquo;There is no reason that in the 21st&amp;nbsp;century, with the federal government already utilizing this technology, TSA cannot implement a solution that allows secure access to America&amp;rsquo;s ports.&amp;rdquo; At a subcommittee hearing the day after the report came out, Government Accountability Office researchers&amp;nbsp;agreed that other types of passes, like the military&amp;rsquo;s universal credential, prove the initiative has potential.&lt;/p&gt;
&lt;p&gt;
	The TWIC program requires maritime workers to undergo background checks and carry biometric IDs to enter certain harbor areas without an escort. During a recent $23 million trial, Homeland Security confirmed card readers could verify identities and restrict access.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	But GAO officials say the department&amp;rsquo;s findings are unsubstantiated.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	At the hearing in May, Rep. Elijah&amp;nbsp;Cummings, D-Md., ranking Democrat on the full oversight committee, expressed his disappointment in the program. &amp;ldquo;Those TWIC cards are nothing more than very expensive flash passes without&amp;nbsp;sophisticated&amp;nbsp;electronic&amp;nbsp;readers to read them,&amp;rdquo; he said. &amp;ldquo;That&amp;rsquo;s sad.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	In the report, Stephen Lord, GAO director for homeland security and justice issues, said&amp;nbsp;DHS officials lacked data to back the conclusion that the smartcards and scanners provide &amp;ldquo;a critical layer of port security.&amp;rdquo;&amp;nbsp;During testing, the ID readers and access control systems were unable to record reasons for errors, DHS&amp;nbsp;and independent evaluators failed to collect comprehensive data on malfunctioning passes, and&amp;nbsp;participants did not document instances of denied access, according to the audit.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;Eleven years after initiation, DHS has not demonstrated how, if at all, TWIC will improve maritime security,&amp;rdquo; Lord wrote, adding that Congress should consider repealing a law that directs the department to base card reader rules on the trial run and instead require that DHS &amp;ldquo;complete an assessment that evaluates the effectiveness of using TWIC with readers.&amp;rdquo;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	The new report follows more than a half dozen negative audits since 2003. &amp;ldquo;If you look at a poster child for programs that sort of run amok and do not get the job done, the TWIC card&amp;mdash;as it&amp;rsquo;s&amp;nbsp;affectionately&amp;nbsp;known&amp;mdash;the Transportation Worker Identification Card, is unfortunately the poster child for not producing what, I think, Congress intended,&amp;rdquo; Mica said during the hearing.&amp;nbsp;&amp;ldquo;We spent a half billion dollars on this, and we&amp;rsquo;ve got a card now that is flawed, and not by my definition, but by GAO&amp;rsquo;s evaluation.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	The day the report was distributed, Rep. Bennie Thompson, D-Miss., the top Democrat on the Homeland Security Committee, said&amp;nbsp;lawmakers should put off wasting additional funds on an effort that already has cost $544 million. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;The program continues to suffer from fundamental problems,&amp;rdquo; Thompson&amp;nbsp;said in an email. &amp;ldquo;Port workers and industry stakeholders have invested their time, effort and money into this troubled program, holding up their end of&lt;br /&gt;
	the bargain.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Thompson added he supports the auditors&amp;rsquo; recommendation that TSA re-examine the merits of the biometric passes and scanners &amp;ldquo;before the American people are expected to invest additional money in this program. We cannot continue to throw good money after bad.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Agency officials stand by the virtues of the credential but seem open to trying other security approaches. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;It&amp;rsquo;s not a silver bullet. It&amp;rsquo;s part of our layered security,&amp;rdquo; Steve Sadler, TSA&amp;rsquo;s assistant administrator for intelligence and analysis, told lawmakers. &amp;ldquo;And I think it provides value when it&amp;rsquo;s used properly and installed properly.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	In an April letter responding to a draft GAO report, DHS officials defended the rigor of their assessment and said the department did not have enough funding to perform the type of study GAO expected. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;There were limited fiscal and workforce resources made available at participating sites,&amp;rdquo; wrote Jim Crumpacker, director of the department&amp;rsquo;s GAO-inspector general liaison office. Also, he said, the tests needed to cover a wide range of environmental conditions but avoid interfering with daily operations, which affected&lt;br /&gt;
	data collection.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	At the House hearing, Lord and subcommittee members from both parties urged Sadler to&amp;nbsp;consider a different arrangement, like the Pentagon&amp;rsquo;s&amp;nbsp;common access card, which functions as a standard military ID, or a model in which local ports issue credentials.&lt;/p&gt;
&lt;p&gt;
	Sadler replied, &amp;ldquo;We&amp;rsquo;ll look at anything to make this pilot better and to make the result better.&amp;rdquo;&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded></item><item><title>Tech Roundup</title><link>https://www.govexec.com/magazine/nextgov/2013/05/tech-roundup/63737/</link><description>Transparency moves, TRICARE budget shift and CIOs for IT reform.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein, Bob Brewin, and Joseph Marks</dc:creator><pubDate>Tue, 28 May 2013 09:56:18 -0400</pubDate><guid>https://www.govexec.com/magazine/nextgov/2013/05/tech-roundup/63737/</guid><category>Nextgov</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	&lt;strong&gt;Transparency Moves&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	President Obama&amp;rsquo;s fiscal 2014 budget proposal transfers control of USAspending.gov, the spending transparency website, from the General Services Administration to the Treasury Department.&lt;/p&gt;
&lt;p&gt;
	The administration plans to give Treasury $5.5 million to manage the site, previously bankrolled by the congressionally mandated e-government fund, which is devoted to using the Internet to improve citizen services and access to public information.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;Treasury will conduct an analysis of the operation and information in USAspending and determine what changes in the medium or long term may be warranted,&amp;rdquo; a department spokeswoman says. &amp;ldquo;The collection of governmentwide financial management information is closely aligned with Treasury responsibilities.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Whether the transfer from GSA to Treasury is good or bad news for transparency advocates is unclear, says Daniel Schuman, policy counsel for the Sunlight Foundation.&lt;/p&gt;
&lt;p&gt;
	Congress envisioned the e-gov fund as a proving ground for technology-driven transparency initiatives, so it&amp;rsquo;s appropriate that the five-year-old USAspending should move to a permanent home, he says.&lt;/p&gt;
&lt;p&gt;
	On the one hand, Treasury may be seen as a less political home for USAspending than the White House-based Office of Management and Budget; on the other hand, OMB has a better bully pulpit to force agencies to report spending and to make other transparency reforms, he says.&lt;/p&gt;
&lt;p&gt;
	The USAspending transfer may leave more of the e-gov fund for other transparency initiatives such as the &lt;a href="http://www.itdashboard.gov/"&gt;federal IT Dashboard&lt;/a&gt;, which tracks tech spending.&lt;/p&gt;
&lt;p&gt;
	The president requested $20 million for the e-gov fund this year, but Congress typically appropriates less money than the White House requests.&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;- Joseph Marks&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;Budget Shift&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	The Defense Department has quietly shifted management and oversight of health information technology, including procurements, from the Military Health System and the TRICARE Management Activity, to Frank Kendall, undersecretary of Defense&lt;/p&gt;
&lt;p&gt;
	for acquisition, technology and logistics.&lt;/p&gt;
&lt;p&gt;
	One official said the move reflects frustration among senior Pentagon leaders with MHS&amp;rsquo; efforts to procure new health IT systems, both independently and in partnership with the Veterans Affairs Department to develop an integrated electronic heath record. The departments have spent at least $1 billion during the past five years pursuing an integrated system.&lt;/p&gt;
&lt;p&gt;
	The shift is a major blow to MHS and TRICARE.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Defense Secretary Chuck Hagel told lawmakers at a hearing of the House Appropriations Committee&amp;rsquo;s Defense panel on April 16 that he had taken personal responsibility for the iEHR and said in late March he had deferred a request for proposals for a new Defense electronic health record because &amp;ldquo;I didn&amp;rsquo;t think we knew what the hell we were doing.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;- Bob Brewin &lt;/em&gt;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;CIOs Support IT Reform&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Many government chief information officers think a proposed congressional overhaul that would give them broader authority over how their agencies buy information technology is a &amp;ldquo;step in the right direction,&amp;rdquo; according to TechAmerica&amp;rsquo;s CIO Insights survey.&lt;/p&gt;
&lt;p&gt;
	In congressional testimony, CIOs typically avoid saying whether such budget authority would be helpful. Federal CIO Steven VanRoekel has said authority over IT spending is less important than CIOs having &amp;ldquo;a seat at the table&amp;rdquo; during agency mission discussions.&lt;/p&gt;
&lt;p&gt;
	The survey found 76 percent of IT spending still goes to the operation and maintenance of existing systems, despite attempts to shift more funding to new 
	initiatives.&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;- Joseph Marks&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;About That Job Description&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	In August 2010, then-Defense Secretary Robert Gates&amp;nbsp;shut down&amp;nbsp;the Office of the Assistant Secretary for Networks and Information Integration as one small piece of a budget cutting exercise, with a new and improved chief information officer shop taking over many of the tasks once performed by the office.&lt;/p&gt;
&lt;p&gt;
	In late April, Deputy Secretary Ashton Carter sent out a&amp;nbsp;memo&amp;nbsp;that finally got around to transferring the responsibilities and functions of the disestablished Networks and Information Integration Office to the Defense CIO.&lt;/p&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p&gt;
	That memo clarified that the CIO&amp;mdash;currently Teri Takai&amp;mdash;will provide policy guidance on cybersecurity and gives her what looks like considerable sway over the IT budgets of the four services.&lt;/p&gt;
&lt;p&gt;
	&lt;em&gt;- Bob Brewin&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2013/05/28/052813ngMAG/large.jpg" width="618" height="284"><media:credit>Corbis</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2013/05/28/052813ngMAG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>No Dead Zones</title><link>https://www.govexec.com/magazine/nextgov/2013/05/no-dead-zones/63743/</link><description>The Army wants to protect brand-name smartphones and tablets on the front lines.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Tue, 28 May 2013 09:56:09 -0400</pubDate><guid>https://www.govexec.com/magazine/nextgov/2013/05/no-dead-zones/63743/</guid><category>Nextgov</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	A &amp;nbsp;U.S. military officer in Seoul, South Korea, texts another officer across town on his government-issued iPhone&amp;mdash;the same model his Boston-based teenager uses. An hour earlier, the father and son spoke on their twin gadgets using a commercial cellular frequency. Now, the officer is about to share geospatial maps of allied troop coordinates using an insulated Secret military mobile network.&lt;/p&gt;
&lt;p&gt;
	Such communications on consumer smartphones could happen within a year under the Army&amp;rsquo;s commercial smartphone plan.&lt;/p&gt;
&lt;p&gt;
	Across the globe, from the barracks to the battlefield, service members are testing the reliability and safety of non-BlackBerry devices, such as iPhones, iPads and Android-based products. Their efforts coincide with plans outlined earlier this year by Defense Chief Information Officer Teri Takai to support smartphones on classified and unclassified networks. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	There are kinks in the wires to smooth out. The Army, for instance, does not yet have a way to combine networks carrying Top Secret information with administrative applications, such as streamed distance learning courses and supply order forms, says Mike McCarthy, head of the Army&amp;rsquo;s smartphone project.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;Right now my office looks like Best Buy because they haven&amp;rsquo;t converged yet into a single solution. I can&amp;rsquo;t do classified on the same device that I do unclassified on. So we&amp;rsquo;re working on those kinds of solutions,&amp;rdquo; he said during a Webcast presentation hosted by Government Executive Media Group in March.&lt;/p&gt;
&lt;p&gt;
	McCarthy, who spoke with &lt;em&gt;Government &lt;/em&gt; &lt;em&gt;Executive&lt;/em&gt; in April, doubts the Army ever will reach the point of accessing Top Secret information on commercial handhelds. &amp;ldquo;But Secret and below is something that I am confident will be realized within months, not years,&amp;rdquo; he says.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Another disconnect: Sometimes overseas soldiers literally hang up on each other when commercial Internet service is unavailable or vulnerable. But there will be apps for that. Mobile tools for scrambling texts and calls already are in use at other U.S. military organizations. And the Army might procure air-based cellular stations&amp;mdash;even drones mounted with hot spots&amp;mdash;as workarounds.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;The answer is not just putting up towers,&amp;rdquo; McCarthy says.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;An Empty Smartphone&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	The most secure approach would be a phone that shows no traces of its owner when not in use.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;One of the solutions we&amp;rsquo;re looking at, truly, is keeping everything off the devices&amp;mdash;or as much off of it as we can,&amp;rdquo; he says. All communications would take place in a secure cloud network anchored to a remote data center. That way, &amp;ldquo;we don&amp;rsquo;t have anything stored on the device itself. When you need information, you&amp;rsquo;re able to reach into a cloud environment and pull that data in so that it is accessible while you need it. When you&amp;rsquo;re done with it, it goes away,&amp;rdquo; McCarthy explains. If the device is lost or falls into the wrong hands, there&amp;rsquo;s nothing to hack.&lt;/p&gt;
&lt;p&gt;
	Separately, several military organizations, including Special Operations forces, are using a set of apps that code voice and texts. The software suite was developed in part by former Navy SEALs at security firm Silent Circle. &amp;ldquo;When it hits the Internet of [whatever country the user is in], it&amp;rsquo;s already encrypted. So it doesn&amp;rsquo;t matter if you&amp;rsquo;re on Iraqna or you&amp;rsquo;re on AfSat or you&amp;rsquo;re in China,&amp;rdquo; says company co-founder Mike Janke, referring to various foreign Internet service providers.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;Forget just war zones. I&amp;rsquo;m talking first-world countries that monitor their communications. How do you protect that?&amp;rdquo; he asks. The security, Janke explains, relies on disposable keys that encrypt communications as soon as they leave the device. When an officer dials or texts, the encryption happens instantly on the handset, so there&amp;rsquo;s nothing a host-nation service provider or interceptor can grab.&lt;/p&gt;
&lt;p&gt;
	And the technique works on any telecom channel officers might use, on devices ranging from older cell phones to those using 4G. The apps&amp;rsquo; encryption protocols create a unique key each time the user makes a call or sends a text. &amp;ldquo;Then, after the call, the keys are deleted. There&amp;rsquo;s nothing there. There&amp;rsquo;s no history of calls,&amp;rdquo; says Janke, a former SEAL sniper.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	The group of apps for mobile calls and text messages costs nongovernment civilians $20 a month. Defense personnel receive bulk discounts that vary depending on the size of the user base, company officials say.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;A Hybrid Model&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Another method of making private calls really private: toggle between two types of phone connections. The local Internet service would be sufficient when commercial infrastructure is available and considered secure. When a host nation&amp;rsquo;s infrastructure is unsafe, a separate backup line would be used.&lt;/p&gt;
&lt;p&gt;
	Take Afghanistan. The main service providers there are an Afghan government-owned system influenced by opposition forces and a system maintained by a Russian company, McCarthy says. So, the best choice would be to &amp;ldquo;take us off the commercial frequencies and put us onto frequencies that are controlled by the military,&amp;rdquo; he explains. These include drone hot spots. Unmanned aerial aircraft are one of many affordable proposals, McCarthy says.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;The solution is not to just lease a phone from Taliban Bell,&amp;rdquo; he adds.&lt;/p&gt;
&lt;p&gt;
	One more kink: making sure every device and human user complies with these safeguards. How do organizations enforce security policies on devices that, by nature, are not centrally controlled? They work with vendors to develop so-called enterprise mobile management tools.&lt;/p&gt;
&lt;p&gt;
	The Air Force Space Command, for example, has contracted with Good Technology to let employees download smartphone and tablet applications that control personal apps and allow managers to control military data. The company would not disclose the size of the contract. According to federal business databases, the Defense Commissary Agency in 2012 spent $8,009 on 45 Good Technology licenses for a &amp;ldquo;bring your own device&amp;rdquo; experiment in which employees used their personal devices.&lt;/p&gt;
&lt;p&gt;
	McCarthy says the Army is considering Good&amp;rsquo;s products for Android-based phones.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	According to a June 2012 Defense mobile device strategy, counter-hack techniques must work on any mobile brand and any operating system. &amp;ldquo;This is supposed to be a device-agnostic, OS-agnostic program,&amp;rdquo; McCarthy says. By the end of 2013, between 20,000 and 25,000 gadgets of various makes and models powered by various software programs should be under evaluation servicewide, he expects.&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;The Insider Threat&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Ultimately, military mobile security comes down to personal hygiene. A Pentagon internal investigator recently chastised the Army CIO and service members for disregarding the rules on thousands of devices.&lt;/p&gt;
&lt;p&gt;
	The service&amp;rsquo;s CIO &amp;ldquo;was unaware&amp;rdquo; of more than 14,000 commercial mobile devices that were in use, Alice Carey, a Pentagon assistant inspector general, wrote in a March report.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	The audit reviewed a number of smartphone initiatives, including a trial that substituted handhelds for pen and paper to coordinate disaster aid. Participants could snap photos of hurricane-ravaged areas, capture the latitude and longitude, and upload the data to a military server. Security lapses occurred during these activities and others because managers did not realize the devices were connected to Army networks and storing sensitive information, according to Carey.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Meanwhile at West Point, U.S. Military Academy phones were not configured to require passwords for access. Instead, officials left it up to users to add that security layer, so 14 out of 48 mobile devices had no password protection. Also, the Military Academy and U.S. Army Corps of Engineers&amp;rsquo; Engineer Research and Development Center failed to devise a way of wiping data drives remotely if lost, stolen or assigned to another employee.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;The Army CIO did not develop clear and comprehensive policy&amp;rdquo; for commercial devices, Carey wrote. These errors &amp;ldquo;left the Army networks more vulnerable to cybersecurity attacks and leakage of sensitive data.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	In a letter responding to the investigation&amp;rsquo;s findings, Maj. Gen. Stuart Dyer, head of the Army CIO/G-6 cybersecurity directorate, said the organization agreed with the observations and &amp;ldquo;in many cases, the Army has already begun implementing improvements.&amp;rdquo;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	McCarthy says the auditors did not talk to him or his program team during the inspection. But, now, his team, the Army CIO, the Pentagon&amp;rsquo;s National Security Agency cryptographers, and Defense Information Systems Agency support staff are working closely to resolve the concerns highlighted.&lt;/p&gt;
&lt;p&gt;
	A key goal of the smartphone project &amp;ldquo;is to find the kinds of solutions that will provide that safe and secure environment,&amp;rdquo; as well as managed access, he says. And one day Best Buy might just carry it.&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2013/05/28/052813mantechMAG/large.jpg" width="618" height="284"><media:credit>Jeffrey Alan Love</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2013/05/28/052813mantechMAG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Taking a Flier on Big Data</title><link>https://www.govexec.com/magazine/features/2013/05/taking-flier-big-data/63755/</link><description>SA wants data aggregators to screen airline passengers, 
but digital records can be unreliable.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Tue, 28 May 2013 09:53:56 -0400</pubDate><guid>https://www.govexec.com/magazine/features/2013/05/taking-flier-big-data/63755/</guid><category>Features</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	Airline passengers might soon 
	be subjected to probes more 
	controversial than body scans if the Transportation Security Administration pursues plans to profile passengers based on commercial analytics.&lt;/p&gt;
&lt;p&gt;
	TSA is considering letting private data brokers calculate the threat-level of fliers.&amp;nbsp;Agency officials say they expect to finish exploring this approach by the end of this year. Passengers whose digital footprints check out clean wouldn&amp;rsquo;t have to strip off shoes, overcoats and belts, or unpack laptops&amp;nbsp;and liquids.&lt;/p&gt;
&lt;p&gt;
	Set aside privacy fears about TSA peering into citizens&amp;rsquo; gun shopping receipts, pharmacy purchases or online dating activities. Are commercial data aggregations even accurate? No one knows. Not the Federal Trade Commission, nor the Justice Department. Not the data brokers. And not the people being tracked&amp;mdash;who typically can&amp;rsquo;t even see their own records.&lt;/p&gt;
&lt;p&gt;
	Personal information gathered in commercial forums could prove valuable for public safety, authorities and privacy advocates agree. But they also say judging citizens based on outdated or inaccurate underlying data could do more harm than good for society.&lt;/p&gt;
&lt;p&gt;
	TSA&amp;rsquo;s thinking is that a company would aggregate biographic and biometric &amp;ldquo;nongovernmental data elements to generate an assessment of the risk to the aviation transportation system that may be posed by a specific individual,&amp;rdquo; states a Jan. 8&amp;nbsp;request&amp;nbsp;for strategy suggestions.&lt;/p&gt;
&lt;p&gt;
	The system would have to provide a &amp;ldquo;reliable method that effectively identifies known travelers, based on a sound analysis and the application of an algorithm that produces dependable results,&amp;rdquo; the work requirements state.&lt;/p&gt;
&lt;p&gt;
	Fliers and most TSA officials would be in the dark about the data those algorithms are munching on. &amp;ldquo;The specific sources and types of information employed for pre-screening purposes under this initiative may not be&amp;nbsp;publicly&amp;nbsp;disclosed,&amp;rdquo; agency documents state, adding that the data will not be disclosed to TSA except during audits. The quality requirements are vague: The vendor must use &amp;ldquo;specific sources of current, accurate and complete nongovernmental data.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;Spotty Track Records&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Increasingly, big data taps the same kinds of digital evidence for authorities as it does for marketers: social media posts, voter registrations, credit reports and clickstreams&amp;mdash;which are Web browsing histories&amp;mdash;to name a few.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	The&amp;nbsp;FTC in December 2012 ordered nine data brokers&amp;nbsp;to report whether their company &amp;ldquo;monitors, audits, or evaluates the accuracy of personal data&amp;rdquo; used to target advertising. Commission officials, however, say they are not inquiring about the accuracy of personal data used to track criminals. &amp;ldquo;Our focus is on consumer privacy and commercial data practices&amp;mdash;rather than the use of commercial data for law enforcement purposes,&amp;rdquo; says Peder Magee, senior attorney for FTC&amp;rsquo;s Division of Privacy and Identity Protection.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	It&amp;rsquo;s too late anyway. Justice&amp;rsquo;s Bureau of Alcohol, Tobacco, Firearms and Explosives already uses big data&amp;nbsp;to&amp;nbsp;predict gun violence.&amp;nbsp;Justice officials would not comment on how they measure the integrity of this information.&lt;/p&gt;
&lt;p&gt;
	The consequences of relying on dubious statistics and computations can vary. Some researchers suggest that a few mistakes won&amp;rsquo;t affect results because the scope of these analyses is so huge. &amp;ldquo;We can accept some messiness in return for scale,&amp;rdquo; Viktor Mayer- 
	Schonberger and Kenneth Cukier write in their book,&lt;em&gt; Big Data &lt;/em&gt;(Eamon Dolan/Houghton Mifflin Harcourt, March 2013). &amp;ldquo;We&amp;rsquo;re willing to sacrifice a bit of accuracy in return for knowing the general trend. Big data transforms figures into something more probabilistic than precise.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	However, the level of precision that satisfies marketers is very different from the exactitude required by government agencies, says Jennifer Granick, director of civil liberties at Stanford University&amp;rsquo;s Center for Internet and Society. &amp;ldquo;You can have 15 percent accuracy for advertising,&amp;rdquo; which might be better than other forms of behavioral analyses, &amp;ldquo;but if you are getting 85 percent of it wrong when you are denying people government benefits or sending out police to interview them, that would be completely wasteful and dangerous,&amp;rdquo; she says.&lt;/p&gt;
&lt;p&gt;
	One major concern among some law enforcement experts is that&amp;nbsp;most data warehouses store obsolete records. &amp;ldquo;The biggest problem is they don&amp;rsquo;t update,&amp;rdquo; says Paul Wormeli of the Integrated Justice Information Systems Institute, a federally funded organization. A citizen&amp;rsquo;s profile is not automatically adjusted if a credit report or human resources form turns out to have been mistyped.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;The Data Police&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	There&amp;rsquo;s no easy answer to the potential accuracy problem with big data.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Directing a government agency, or even a bunch of agencies, to regulate data quality would be nearly impossible and futile, information management experts say.&amp;nbsp;Plus, the private sector has a financial incentive to tidy up a person&amp;rsquo;s entry:&amp;nbsp;the aggregator market competes on the sharpness of its databases. People should have the ability &amp;ldquo;to correct it and to remove it if&amp;nbsp;the info is sensitive,&amp;rdquo;&amp;nbsp;says Craig Wills, a computer science professor at&amp;nbsp;Worcester Polytechnic Institute. Still, fixes made to one database don&amp;rsquo;t always carry over to other systems relying on the same information, Granick notes. &amp;ldquo;There&amp;rsquo;s no right to access the profile that whatever advertisers of the world have compiled on me,&amp;rdquo; she says. &amp;ldquo;Amazon has a profile on me and what they think I like, and I can refine it, but I can&amp;rsquo;t get a copy.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Marketing firms argue new industry guidelines that let Internet users opt out of online tracking address&amp;nbsp;many of these problems. Principles adopted by the Digital Advertising Alliance, whose members include Datalogix, Acxiom and other data wholesalers, prohibit browsing histories from being used to determine eligibility for employment, health care treatments and insurance coverage. &amp;ldquo;To date it&amp;rsquo;s proven to work. We have very broad reach and people are following it,&amp;rdquo; says Stuart Ingis, counsel for the alliance.&lt;/p&gt;
&lt;p&gt;
	Unlike the data mining industry, credit bureaus are required by law to correct commercial data.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Credit information is updated every 30 days, or each payment cycle, according to the Consumer Data Industry Association. Citizens are responsible for communicating name and address changes to lenders, who furnish those modifications to the bureaus. &amp;ldquo;The furnisher may have more up-to-date address information than the post office,&amp;rdquo; says Norm&amp;nbsp;Magnuson, the association&amp;rsquo;s vice president of public affairs. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	So for TSA and other agencies, vetting the accuracy of big data will be nothing short of a big challenge.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2013/05/28/0513featTSA/large.jpg" width="618" height="284"><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2013/05/28/0513featTSA/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Rolling Out The iPhone</title><link>https://www.govexec.com/magazine/nextgov/2013/04/rolling-out-iphone/62199/</link><description>After a trial run, ICE issues Apple devices for work and personal use.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Mon, 01 Apr 2013 00:00:00 -0400</pubDate><guid>https://www.govexec.com/magazine/nextgov/2013/04/rolling-out-iphone/62199/</guid><category>Nextgov</category><content:encoded>&lt;![CDATA[&lt;p&gt;
&lt;/p&gt;
&lt;p&gt;
	Following a three-month trial, Immigration and Customs Enforcement in January began distributing as many as 17,000 secure iPhones to employees for work and personal use. The devices are equipped with software to protect both government and personal data.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Personnel allotted iPhones are allowed to download apps for private use, as long as the software and data do not violate policies, according to ICE officials.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;These are government devices and ICE has a limited personal use policy that provides for users to add applications and data that does not violate professional conduct standards of the agency,&amp;rdquo; ICE Press Secretary Barbara Gonzalez says. &amp;ldquo;The devices are subject to inspection or retrieval&amp;mdash;just like any piece of government equipment.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	The agency is distributing the devices in batches to investigators, legal personnel and other staff. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;We&amp;rsquo;re using a geographical-based deployment plan,&amp;rdquo; Gonzalez says.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	In October 2012, ICE disclosed that it would replace its existing Research in Motion BlackBerry smartphones with Apple iPhones because RIM&amp;rsquo;s products could no longer meet the agency&amp;rsquo;s needs.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	After evaluating RIM&amp;rsquo;s rate of innovation, business model sustainability and the attributes of other smartphones, including Android devices, ICE chose the iPhone, according to contracting papers.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	The iPhones are set up for selective wiping if a device is misplaced or stolen so ICE can erase government data remotely&lt;br /&gt;
	but preserve personal apps and files, according to Good Technology, a mobile security firm facilitating the rollout.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Eugene Liderman, director of public sector technology for Good Technology, says the agency has the infrastructure to scale up to 17,000 users. The company is under contract to secure up to 25,000 users, he adds.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	For 18 months before the iPhone announcement, Good Technology worked with Homeland Security Department officials, including the inspector general, to ensure its technology could shield data and applications from hackers and unauthorized people using the phones, company officials say.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Beyond tight security, the features ICE was looking for in a new smartphone included reliability and the flexibility to handle &amp;ldquo;fingerprint and retina scanning for immediate identification of an individual,&amp;rdquo; as well as facial recognition, according to agency documents.&lt;/p&gt;
&lt;p&gt;
	Agencies are shedding BlackBerrys to buy Apple and Android-based smartphones that offer more features, according to Government Executive Media Group research. BlackBerry use among federal managers dropped 77 percent between August 2009 and September 2011, while iPhone use nearly tripled.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Hoping to bounce back, RIM announced in December that ICE is testing its BlackBerry 10 business line. Like older versions, the new Blackberrys comply with a government encryption specification for sensitive data called Federal Information Processing Standard 140-2. Apple&amp;rsquo;s phones are not FIPS-certified yet.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Good Technology officials say their software provides the same kind of agencywide control over device settings and data access that comes with BlackBerry services, when layered on top of the iPhone&amp;rsquo;s operating system.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Last fall, ICE officials gave both Apple and RIM top security scores in documents justifying the agency&amp;rsquo;s plan. ICE praised the companies for controlling both the hardware and operating systems in their products. Google&amp;rsquo;s Android, which received a low security score, provides only an operating system and allows other companies to run it on their devices.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;What is a strength for Google is a risk for ICE,&amp;rdquo; the documents state.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;Analysis conducted by ICE has concluded that for the near term, Apple iPhone services offer the agency the best solution for its mobile technology,&amp;rdquo; the justification says. &amp;ldquo;Apple&amp;rsquo;s strict control of the hardware platform and operating system, independent of telecommunication vendor, provides ICE with the greatest degree of control and management to ensure the most reliable delivery of services to ICE&amp;rsquo;s mission users.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2013/03/31/040113mantechMAG/large.jpg" width="618" height="284"><media:credit>Jon Krause</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2013/03/31/040113mantechMAG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Carhacking</title><link>https://www.govexec.com/magazine/features/2013/02/carhacking/60957/</link><description>Intruders can tap into  vehicle systems to access cellphone calls, GPS signals—even the brakes—with no industry regulations in sight.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aliya Sternstein</dc:creator><pubDate>Fri, 01 Feb 2013 01:00:00 -0500</pubDate><guid>https://www.govexec.com/magazine/features/2013/02/carhacking/60957/</guid><category>Features</category><content:encoded>&lt;![CDATA[&lt;p&gt;
	A U.S. senator drives from Capitol Hill to her home in Virginia, listening to the CD a constituent gave her. Going with the speed of traffic at 60 miles per hour, her brakes suddenly engage. Then an SUV rams the politician&amp;rsquo;s sedan from behind, killing her on impact. It turns out an extremist&amp;nbsp;assassin had hijacked the car&amp;rsquo;s controls after infecting the CD with malicious code that penetrated the vehicle&amp;rsquo;s network.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	In another scenario, two intelligence agents driving to CIA headquarters get a call from their branch chief, which the driver answers on a hands-free Bluetooth connection. After hanging up, the agents brainstorm how to pursue the tip they&amp;rsquo;ve just received while a foreign intelligence operative records their conversation. The adversary had cracked the Bluetooth system to bug the in-car microphone. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Think about cyber threats and probably the last thing that comes to mind is your car. But cars can expose personal information through features like OnStar and Ford SYNC. Hackers can unlock the doors, kill the engine and deactivate the starter. For now, the chances of such exploits happening at this point are slim, given the sophisticated technical skills required. But they will become easier as car systems become more intertwined with commercial communications networks. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Researchers have proved during live road tests that these wireless attacks can work. Aggressive driving could take on new meaning in the absence of cyber rules for the road.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Wireless services like SYNC and OnStar embedded in an in-dash electronics panel can offer attackers access to personal information and critical operational components, like brakes.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Bluetooth and cellular links have &amp;ldquo;roots in other worlds,&amp;rdquo; says Stefan Savage, a Univer-sity of California, San Diego computer science professor and principal investigator on the hack experiments. &amp;ldquo;Bluetooth is not just used in your car. It&amp;rsquo;s used in your iPod. It&amp;rsquo;s a very general protocol that&amp;rsquo;s designed to do a lot of different things and that tends to create problems.&amp;rdquo;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;No Rules&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	The really scary part: There are no guidelines for automobile cyber safety. Regulators either won&amp;rsquo;t or can&amp;rsquo;t do much about the risks.&lt;/p&gt;
&lt;p&gt;
	In response to questions about &amp;nbsp;the status of network security research and mandates, National Highway Traffic Safety Administration officials said in a statement that &amp;ldquo;NHTSA is aware of the potential for &amp;lsquo;hackers&amp;rsquo; and other cybersecurity issues whenever technology is involved; however, the agency is not aware of any real-world cybersecurity issues in vehicles.&amp;rdquo; When asked by &lt;em&gt;Government Executive&lt;/em&gt; whether NHTSA is developing recommendations for manufacturers, officials referred back to the statement.&lt;/p&gt;
&lt;p&gt;
	Security problems are real, however. In 2010, a disgruntled former employee of an auto dealership allegedly remotely&amp;nbsp;deactivated the ignition systems of customers&amp;rsquo; vehicles in Austin, Texas. That same year, the researchers showed how intruders can infiltrate computers tied to virtually every aspect of a car&amp;rsquo;s functionality, including speedometers and entertainment consoles.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Practically speaking, regulating cybersecurity on the road would be a feat for many reasons, say academics and privacy advocates. For one thing, the rule-making process would constantly lag behind quick-morphing threats. Also, NHTSA might not even know what to say, judging by a recent National Academy of Sciences study that found the agency is in the early stages of understanding vehicular network security. Some experts reason that NHTSA is not acting because the agency typically doesn&amp;rsquo;t until a safety issue is pervasive on the road.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;There&amp;rsquo;s no clear evidence or no clear strict need for regulation at this point,&amp;rdquo; says John Maddox, who was NHTSA&amp;rsquo;s associate administrator for vehicle safety&amp;nbsp;research until August 2012. &amp;ldquo;What we do need is to conduct the research to&amp;nbsp;study the problem very carefully.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	Most experts agree that regulators, manufacturers and consumers must get a better handle on vehicle cyber defenses.&lt;/p&gt;
&lt;p&gt;
	At least four institutions and two automobile associations are developing recommended best practices. In 2011, the Transportation Department&amp;rsquo;s John A. Volpe National Transportation Systems Center&amp;nbsp;presented NHTSA with advice on how to go about drafting guidelines. In November 2012, an agency official involved in cyber research planning spoke out about car safety and dependability at a workshop the University of Maryland hosted.&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;Revving Up Research&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	NHTSA&amp;rsquo;s 2013 budget request suggests that the agency may be weighing regulations. The document reveals plans to &amp;ldquo;conduct rule-making-ready research to establish electronic requirements for vehicle control systems&amp;rdquo; in everyday cars. The budget proposes establishing a $10 million program to study cyber risks, starting this year.&lt;/p&gt;
&lt;p&gt;
	The National Academy of Sciences&amp;rsquo; study, which was released in January 2012&amp;mdash;and famously dispelled allegations that Toyota electronics caused unintended acceleration&amp;mdash;urged NHTSA to get up to speed in cyber. The report criticized the agency for lacking the technical competency to probe the Toyota issue without outside help. NHTSA&amp;rsquo;s Office of Vehicle Safety Research does not study cybersecurity, according to the academy.&lt;/p&gt;
&lt;p&gt;
	The proposed 2013 agenda aligns with the academy&amp;rsquo;s advice and also would involve other cyber-related federal&amp;nbsp;agencies. Already, the Defense Department&amp;rsquo;s Cyber Crime Center, which is the Pentagon&amp;rsquo;s computer forensics hub, has examined the SYNC in-car voice-&amp;nbsp;recognition system to flag potential threats, according to contractor&amp;nbsp;Lockheed Martin Corp. Under the budget strategy, NHTSA staff would attempt to pinpoint problems in car electronics before they go into production.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Sen. Jay Rockefeller, D-W.Va., chairman of the Commerce, Science and Transportation Committee, plans to follow the regulator&amp;rsquo;s progress in charting cyber concerns, committee aides say. &amp;ldquo;The chairman is aware of the potential issues revolving around in-car computers,&amp;rdquo; Rockefeller spokesman Kevin McAlister says, noting the committee &amp;ldquo;will work to ensure that NHTSA performs the necessary actions to protect drivers and passengers.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	In the lab, researchers from UC San Diego and the University of Washington overrode an assortment of car safety systems, unafraid to meddle with the engine. &amp;ldquo;The kinds of things you worry about is either that your car is leaking information that you wish to be private,&amp;rdquo; such as your driving habits or what your passengers are saying, &amp;nbsp;&amp;ldquo;or that an adversary can control features of your car,&amp;rdquo; Savage says.&lt;/p&gt;
&lt;p&gt;
	During one expedition, the team was able to access a car&amp;rsquo;s internal network to disengage the brakes, making it difficult for the driver to stop. The investigators also succeeded in forcing the brakes to deploy, lurching the driver forward. Another demonstration showed how seemingly innocuous car tools facilitate these sorts of attacks, such as infected music CDs, FM radios and wireless tire pressure sensors.&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;Car-Code Attacker&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Citing the researchers&amp;rsquo; work, the academy pointed to an actual cyber incident that highlights looming dangers. The dealership ex-employee reportedly manipulated in-car systems that lock the engine when clients skip payments&amp;mdash;essentially an alternative to repossession. By exploiting the program, he immobilized the starters and Global Positioning Systems on about 100 vehicles, leaving drivers&amp;rsquo; parked cars stranded. &amp;ldquo;Obviously, had such an attack compromised a vehicle&amp;rsquo;s power train, braking and other operating systems while being driven, the consequences could have been much more severe,&amp;rdquo; the academy report stated.&lt;/p&gt;
&lt;p&gt;
	Perhaps the creepiest situation, albeit highly theoretical, is one in which thugs send unwitting drivers on suicide missions. &amp;ldquo;One can easily envision hypothetical cyberwar or terrorist scenarios,&amp;rdquo; in which attackers commandeer vehicles en masse via an infected audio file &amp;ldquo;and then, later, trigger them to simultaneously disengage the brakes when driving at high speed,&amp;rdquo; the research&amp;nbsp;team speculated.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Some former NHTSA officials say that until there is hard proof of real-life threats, mandatory standards would be superfluous and costly for manufacturers and the government. &amp;ldquo;I&amp;rsquo;m not ruling out the need for regulation,&amp;rdquo; but it has not presented itself yet, says Maddox, now director of collaborative program studies at the Texas A&amp;amp;M Transportation Institute.&lt;/p&gt;
&lt;p&gt;
	If the auto industry develops voluntary standards, NHTSA then should consider whether to release its own guidelines, he says. The U.S. Council for Automotive Research, which includes engineers from Chrysler Group, Ford Motor Co. and General Motors, has deputized a task force to work on cybersecurity controls. SAE International, an association of automotive engineers, also is examining the issue.&lt;/p&gt;
&lt;p&gt;
	Ford officials rolled off a list of cybersecurity precautions they take in assembling vehicles, including SYNC-enabled cars. The manufacturer checks key interfaces in &amp;ldquo;fuzz&amp;rdquo; tests&amp;mdash;a technique that spews random information at automobile software while specialists monitor for signs of failure. Ford spokesman Alan Hall says specialists simulate possible vulnerabilities during production by looking at the people, parts, data flows and other functional elements &amp;ldquo;to determine where we may have issues with things like data integrity, information disclosure, denial of service, escalation of privilege, tampering or spoofing, etc., and then determine one or more mitigation strategies.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;
	SYNC has a built-in firewall and an application white-listing function that dictates which programs can be launched in car systems. Also, the vehicle control system network is separate from SYNC&amp;rsquo;s infotainment features, according to Hall. Software updates must be &amp;ldquo;code-signed,&amp;rdquo; or validated as Ford-authored to launch, &amp;ldquo;thus preventing unauthorized software installation and access to private information,&amp;rdquo; he says.&lt;/p&gt;
&lt;p&gt;
	&lt;strong&gt;Industry Standards&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;
	Maddox says a voluntary regime of cybersecurity safeguards, like the manufacturers&amp;rsquo; ongoing efforts, might be appropriate for the constantly evolving field of hacking. &amp;ldquo;The industry would be more knowledgeable and more nimble than government can be in this area,&amp;rdquo; he says. Some privacy groups agree that automotive companies should take the lead in writing cyber standards. &amp;ldquo;The car manufacturers have a lot of incentive to not put cars on the road that are inherently vulnerable,&amp;rdquo; says Joseph Lorenzo Hall, senior staff technologist with the Center for Democracy and Technology, a civil liberties organization.&lt;/p&gt;
&lt;p&gt;
	If drivers start complaining about &amp;ldquo;someone messing with you on their OnStar,&amp;rdquo; that&amp;rsquo;s where NHTSA might have to step in, he says. Such a gaping security hole might force a recall and ex post facto regulations for cyber safety tests. A computer weakness &amp;ldquo;probably doesn&amp;rsquo;t reach their radar until there is big potential for something very bad happening on the road,&amp;rdquo; he adds.&lt;/p&gt;
&lt;p&gt;
	Other activists, however, want hard regulations because they believe rules are both necessary and within the agency&amp;rsquo;s authority to hand down.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;The potential for drivers in the United States to have their cars tracked or compromised by security flaws in vehicles&amp;rsquo; embedded computers is a matter of both driver safety and security,&amp;rdquo; says Amie Stepanovich, associate litigation counsel for the Electronic Privacy Information Center. &amp;ldquo;Regulations would provide guidance for vehicle manufacturers and baseline protections for all drivers in the United States.&amp;rdquo; She adds that existing state data breach laws might offer citizens some protections, but such legislation is inconsistent and nonexistent in some states.&lt;/p&gt;
&lt;p&gt;
	The university researchers are reluctant to press for regulations, acknowledging standards development will be challenging, but they are encouraged by NHTSA&amp;rsquo;s apparent attention to their studies. &amp;ldquo;We&amp;rsquo;ve talked with them many times, we&amp;rsquo;ve been at workshops with them on the topic . . . From my standpoint there certainly appears to be interest and activity related to better understanding the cybersecurity problem and what to do about it,&amp;rdquo; Savage says. He says he is not familiar with regulatory politics or NHTSA&amp;rsquo;s thinking.&lt;/p&gt;
&lt;p&gt;
	&amp;ldquo;It would be very easy to dictate a set of requirements that would either do little good or would be unworkable in practice,&amp;rdquo; Savage says. Today&amp;rsquo;s global marketplace means many hands from many part-makers in many facilities touch U.S. cars. &amp;ldquo;There are complex supply chain issues here because automotive manufacturers are really integrators. There may be no single person who has access to all the source code that goes into a modern vehicle,&amp;rdquo; he says, adding that requiring manufacturers to test the whole vehicle may&amp;nbsp;be unfeasible.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;
	Savage adds, &amp;ldquo;The standards process is going to take a while.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.govexec.com/media/img/cd/2013/01/31/020113carhackMAG/large.jpg" width="618" height="284"><media:credit>Corbis</media:credit><media:thumbnail url="https://cdn.govexec.com/media/img/cd/2013/01/31/020113carhackMAG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item></channel></rss>