Tech Roundup


Chain Reaction

Counterfeit materials increasingly endanger the military supply chain. Because technology often touches many hands in foreign countries before reaching a contractor, malicious actors have multiple opportunities to taint materials.

In March, the Government Accountability Office announced its undercover investigators had ordered military-grade parts from online portals and received 40 price quotes for bogus part numbers—all from vendors located in China. 

To guard against compromised technology, which potentially could fail or harbor malware, acquisition specialists are forging new relationships with the intelligence community, says Mitchell Komaroff, Defense’s director of trusted mission systems and networks.

The Defense Intelligence Agency has conducted about 500 analyses for military purchasing programs, he said during a House Energy and Commerce Subcommittee on Oversight and Investigations hearing. A robust trusted systems and networks strategy for limiting supply risks is expected to be operational by fiscal 2016, he added.

GAO’s online shopping experiment focused on defense components that are hard to find, including those used in weapons systems. When the auditors asked vendors for invalid part numbers that GAO had concocted, the firms sent the auditors bogus parts labeled with the invalid numbers. In other words, the Chinese suppliers offered to sell parts that do not technically exist. The trial ran from August 2011 through February 2012.

Separately, a 2010 Commerce Department survey found that of 387 defense contractors, 39 percent had encountered counterfeit electronics during a four-year period. And those military suppliers witnessed a more than 140 percent increase in incidents during that period.

-Aliya Sternstein

Big Data’s Big Day

Science agencies across government are investing $200 million in new research and development related to the mining, processing, storage and use of big data.

The National Science Foundation, for instance, announced a $10 million grant to build new algorithms and tools to sort through petabytes, terabytes, exabytes and zettabytes of data. The National Institutes of Health plans to put a data set of the human genome project in Amazon’s EC2 computer cloud with tools to make the information easily accessible to researchers.

Zachary Lemnios, the assistant Defense secretary for research and engineering, says the Pentagon plans to develop tools that can use big data to make “truly autonomous” defense systems that “can learn from experience with very little training and learn the limits of their own knowledge.”

The initiative was sparked by a June 2011 report from the President’s Council of Advisors on Science and Technology, which found a gap in the private sector’s investment in basic research and development for big data. 

- Joseph Marks

Cutting the Phone Bill

The Agriculture Department has saved about 20 percent of its mobile phone costs by consolidating mobile service contracts. The total savings amount to about $400,000 per month, an Agriculture spokeswoman said. “Over the past year, USDA has moved from over 700 separate mobile service plans with three carriers that account for the largest portion of USDA cellular services to 10 service plans in three contracts at an estimated 18 percent to 20 percent savings,” she said in an email.

The new slate of contracts is costing USDA about $1.2 million per month compared with about $1.6 million for the legacy plans.

Joseph Marks

What’s Brewin: Combat Computing

The Defense Department may develop forward- deployed data centers to handle computing requirements for forces operating outside the United States, Teri Takai, the Defense chief information officer, told lawmakers in March. 

Takai said she envisions “the possibility for some forward-deployed/deployable data centers. The centers will be flexible and will hold both regional and enterprise services and data, all tailored to the mission situation and to the speed and reliability of the connection to the more fixed portions of the network.”

A number of outfits already offer containerized data centers, which require only power and network connections to operate. This gives a whole new meaning to the concept of plug and play.

- Bob Brewin

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.


When you download a report, your information may be shared with the underwriters of that document.