Contractor finally delivers upgraded FBI computer system

Despite delays in meeting an accelerated schedule for a state-of-the-art computer network for the FBI, systems integrator Computer Sciences Corp. announced final delivery of the Trilogy computer system last week.

"We hit a few bumps on this one, but ended it on a high note," Paul Cofoni, president of CSC's federal sector, told National Journal's Technology Daily in an interview. Working on Trilogy was "a career milestone for all of us involved."

The FBI awarded the Trilogy contract to CSC in May 2001 to move the bureau from a largely paper-based information system with outdated information technology to a modern network providing agents with access to text, audio and video files at their desktop.

After the terrorist attacks of Sept. 11, 2001, however, the FBI put the Trilogy contract on an accelerated schedule, and CSC's failure to meet key benchmarks drew ire from senior FBI officials and federal lawmakers. Trilogy initially was budgeted at $379.8 million over three years, and Congress budgeted an additional $78 million to meet an accelerated delivery date of summer 2002.

In March, however, Sen. Judd Gregg, R-N.H., chairman of the subcommittee that oversees the FBI budget, criticized FBI Director Robert Mueller for falling behind on Trilogy's delivery date. "This panel has dedicated massive amount of dollars and time to working with the FBI" on the project, Gregg said. "It's now $2 million over budget and ... years behind schedule." Mueller maintained that Trilogy would be delivered in April and said the additional funds were "money well spent."

Cofoni said the advanced delivery schedule was "too advanced" given the scope of the project, and even with extra funds the contractor was severely taxed in meeting the delivery deadline.

"We didn't freeze the final design of the system [with the FBI] until last summer," he said, adding that getting all field offices to agree on common technical standards incurred additional delays. "We probably should have done a better job of escalating. If we had been working at a higher level at the FBI, we would have solved these issues faster," he added. Cofoni said CSC "had to scramble" to find extra staff with the appropriate security clearances to meet the accelerated schedule. "The FBI did help us by expediting the clearance process, but it was still quite an effort," he added.

The Trilogy project involved three phases of meeting specific deadlines, and ultimately provided new network, hardware and software to 29,000 users in more than 600 locations. According to CSC, many FBI employees prior to Trilogy were working on desktop computers nearly eight years old and unable to run basic office software applications. Many officers were connected to the Internet at speeds slower than most home users and lacked reliable office e-mail, the company said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.