Tech Roundup

Inside Job

The Transportation Security Administration is shopping for a computer program to snoop into the online activities of agency employees, including their keystrokes and emails, for signs of potential leaks. TSA’s solicitation for an “enterprise insider threat software package” in June coincided with an Office of Special Counsel memorandum to federal agencies warning against targeted email monitoring. The memo followed a Food and Drug Administration retaliation case in which FDA allegedly spied on the private correspondence of whistleblowers.

Many government offices, particularly those in the intelligence and defense communities, are embracing employee-surveillance technology to prevent the unauthorized disclosure of federal information. TSA is specifically looking for a tool that can track keystrokes, chat messages and email, file transfers, and other activity—all without tipping off the employee. 

Spokesman David A. Castelveter says, “as the agency whose serious responsibility it is to deal with national security, TSA must remain vigilant to safeguard sensitive information in order to secure the nation’s transportation systems. This software is intended to assist in carrying out that mission. This initiative will be used in accordance with all federal laws and will be reserved for specific instances that meet TSA’s qualifications for an insider threat.”

FDA early this year ran into trouble with email monitoring when employees sued for allegedly bugging their government-issued computers after they informed the Office of Special Counsel about the agency’s approval of unsafe medical devices.

In her memo, Special Counsel Carolyn Lerner said agencies should evaluate their monitoring practices to ensure they don’t impede employees from using appropriate channels to disclose wrongdoing.

Aliya Sternstein

End of an Era

Veterans Affairs Department Chief Information Officer Roger Baker predicts that within five or six years VA no longer will furnish employees with computers. Instead, they will use the devices they own to connect to department networks. He also believes VA has issued its last desktop PC contract, a $477 million deal for up to 600,000 desktops awarded to Dell in April 2011. 

Baker would like to see VA get out of the business of providing its roughly 300,000 employees with hardware to access department networks and said he backed a policy that would allow employees to bring their own devices to the job. Asked how VA would manage the financial aspect of that type of policy, Baker says, “that’s a [human resources] issue.”

It will take a “massive investment” to ensure data is protected before VA can proceed with a widespread bring-your-own-device plan, Baker says. Managers and employees also would have to ensure that personal applications are free of viruses and malware before they are connected to the department’s computer systems.

Bob Brewin

Energy Drain

One barrier to gauging progress in the government’s data center consolidation effort is the fact that federal agencies aren’t measuring energy costs for some smaller data centers. 

It’s especially difficult to meter data centers that occupy only part of a building’s space and use a limited amount of energy, says Robert Harden, who works on IT efficiency for the Navy.

The Energy Department faces similar challenges, says Emily Stoddart, a program analyst with its Sustainability Performance Office. Officials are trying to determine which resources to put into small data centers that will likely be consolidated or closed. “We want to document a baseline for these data centers, but we’re wary of investing in a formal metering project,”
she says.


Joseph Marks

Pentagon Needs a Family (Cellphone) Plan

Buried deep within the Defense Department mobile device strategy released in June is a suggestion for a long overdue cost-saving idea: a centrally managed cellphone expense management system.

Outfits like The Bill Police help commercial enterprises centrally manage their cellphones—including ways to reallocate unused minutes from one phone to another—and Defense probably could save big bucks with the same approach.

I read FedBizOpps every day, and at least once a week some outfit in Defense has posted a cellphone service procurement. That’s an inefficient way to buy minutes for the world’s largest enterprise.
 
-Bob Brewin

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.