Lawmakers want tech updates at State Department

The roughly $243 million in expedited passport fees expected to become available in fiscal 2008 should be used to support investments in information technologies and infrastructure at the State Department, according to the House Appropriations Committee.

The committee report on the foreign aid spending bill, H.R. 2764, cited that figure as the Bush administration's budget request for the fees. Added to the $59 million the panel approved for the department's capital investments, the total money for IT modernization in fiscal 2008 would be about $304 million.

According to the report, the committee has appropriated close to $2 billion for the department's global IT infrastructure since 2001 "to enable rapid and reliable communication between Washington and the more than 300 locations worldwide." The House report said the committee expects State "to maintain and protect this investment."

Appropriators also encouraged the office in charge of the U.S. government's worldwide overseas buildings program to pursue the development of integrated building management systems.

"Such technology upgrades to integrate disparate legacy systems will protect the large and continuing investment of taxpayer resources in overseas properties and those who occupy them," the report said. "The committee has provided sufficient resources to support this effort."

The House committee hailed the secretary of State's science and technology adviser "for continuing to promote the essential role of science and technology in diplomacy." The report calls for more "science and technology capacity and literacy within the department and the role of science and technology in our nation's foreign policy."

The committee said the secretary of State should be prepared to report to Congress on the progress during fiscal 2008 to increase departmental tech capabilities. The committee further encouraged the department to consider support for a project to create and test an iris-scanning system "to identify, track and log visitors at select U.S. missions."

Finally, the House committee endorsed attempts to defeat the jamming of Radio Free Asia and Voice of America signals for broadcasts to China, Tibet, Vietnam and North Korea. And the panel touted efforts to counter Internet censorship in China and Iran.

The report for the draft companion bill approved by the Senate Appropriations Committee said State should assess threats to the department's computer networks and "consider the need to improve the capacity to monitor inside threats to networks of U.S. missions."

The panel wants at least $22 million spent on American schools and hospitals abroad in fiscal 2008. The Agency for International Development administers the program, known as ASHA, and some of its work involves computer technology.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.