Homeland Security Science Chief Wants to Know What You Think His Goals Should Be

First responders are among those invited to submit ideas. First responders are among those invited to submit ideas. TFoxFoto / Shutterstock.com

Four months into his tenure as the Homeland Security Department’s science and technology chief, Reginald Brothers on Monday opened an online outreach tool to gather input from stakeholders to create a “north star” set of visionary goals to guide DHS’ future.

In what is called a Collaboration Community, ideas for the department’s future investments are being solicited from federal, state, local and tribal agencies, as well as emergency responders, owners and operators of critical infrastructure, laboratories, universities, and key private sector industries, according to the department.

“The presumption is that the goals could take 20-30 years to achieve, but they would set us on a series of vectors that should last some time,” Brothers told Government Executive. “It should influence our investments and increase efficiencies for operational stakeholders.”

Proposed strategic goals are being refined based on policies and priorities from the White House, the 2014 Quadrennial Homeland Security Review, and the DHS secretary, the department said. “Crowdsourcing is not unusual, but this may be first time this particular agency has done it,” said Science and Technology Undersecretary Brothers, an electrical engineer who spent three years running technology research programs at the Defense Department. The Federal Emergency Management Agency has used Web-based platforms to similarly promote transparency, DHS noted.

The Science and Technology Directorate is DHS’ primary research and development arm and “technical core,” the department said. Broad themes for its coming strategic goals include new techniques to speed up noninvasive screening of travelers, nonintrusive online security protection against cyber threats, real-time actionable data on situations that can be used by decision makers to head off threats, and well-protected first-responders.

Respondents to the invitation need not be experts, Brothers stressed. “We want feedback from anyone who’s creative and concerned about DHS’ mission space and innovation,” he said.  “You can talk to experts with lots of education, but a lot of my experience is that people outside your field can also provide useful input, and research shows that.”

The Collaboration Community “is not just a public relations effort, but, I would hope, a real attempt to reach out to all our stakeholders to get the best ideas to make a difference,” he said. “We have to communicate. In this time of limited resources, it’s important that we look toward cross-government collaboration at all levels, which is necessary to get a good return on investment. We have to work with all interested parties.”

Asked whether some of the feedback may be negative—from privacy advocates, for example, who argue that Homeland Security’s domestic intelligence-gathering at local fusion centers can threaten civil liberties—Brothers said, “We expect a wide span of responses, some critical and some complimentary.”

Messages on the website for the online Collaboration Community may be anonymous, though a return email address is required. Officials warn that information discussed or posted must be “non-sensitive and appropriate for the aforementioned audience.” (Respondents with information that requires secrecy can submit to a separate address at STIdeaScale@hq.dhs.gov.)

Users are encouraged to vote on others’ ideas. The channel will be open from Aug. 25 through Sept. 7.

(Image via TFoxFoto / Shutterstock.com)

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.