Smarter Gov Tech, Stronger MerITocracy

The National Defense Authorization Act (NDAA) for FY 2019 took a big step toward passage with the release of the conference report late yesterday that unifies House and Senate NDAA legislation and places in sharp focus concerns about growing cyber and electronic warfare threats and ways that the United States should address them. […]

IRS

In 2016, criminals stole $1.6 billion from the Internal Revenue Service (IRS) by using false identities to claim fraudulent tax refunds, according to IRS estimates. In a report released today, the Government Accountability Office (GAO) zeroes in on IRS’ authentication efforts as a way to reduce fraud and save tax payer dollars, and offers 11 recommendations for IRS consideration. […]

The Department of Justice (DoJ) said Thursday it was putting in place a new policy governing disclosure by DoJ and other Federal agencies of “foreign influence operations” being conducted in the United States. The agency said the new policy “provides guideposts for Department action to expose and thereby counter foreign influence threats, consistent with the fundamental principle that the Department always must seek to act in ways that are politically neutral, compliant with the First Amendment and designed to maintain the public trust.” […]

As the National Defense Authorization Act (NDAA) for FY2019 makes its way through the House-Senate conference process, Senate Republicans today agreed to drop their ban on China-based communications equipment maker ZTE in favor of the House’s more lenient version of that measure. […]

Grant Schneider, currently the acting Federal chief information security officer, has been named Federal CISO on a permanent basis, the Office of Management and Budget (OMB) announced on Thursday. As CISO, Schneider is tasked with implementing cybersecurity practices across the executive branch, as well as serving as a policy advisor for the Trump administration. […]

The House Intelligence Committee today heard testimony from several witnesses who warned that China is actively working to infringe upon the intellectual property rights of U.S. entities, engages in cyberespionage against the United States, and poses a growing cyberthreat to the country. […]

Margaret Weichert, deputy director for management at the Office of Management and Budget (OMB) and one of the Trump administration’s most visible point persons promoting its plan to reorganize numerous aspects of Federal civilian agencies, said on Wednesday that the first fruits of that plan may be efforts to standardize aspects of the Federal cybersecurity workforce, ease the backlog of Federal background checks, and make improvements in the provision of government digital services generally. […]

Following a July 16 letter by former government officials requesting disclosure of 2020 Census cybersecurity policies, the U.S. Census Bureau issued a statement today affirming its “robust cybersecurity program” and ensuring interested parties that cybersecurity remains paramount at the bureau. However, it said it was declining to reveal all of its encryption policies “as a matter of data security.” […]

The Office of the Inspector General (OIG) found that the General Accountability Office (GAO) isn’t fully compliant with the Federal Information Security Modernization Act of 2014 (FISMA), according to a report released yesterday. […]

The Hide ‘N Seek (HNS) Internet of Things (IoT) botnet, which initially targeted home routers, IP cameras, and video recorders, has been expanded by cybercriminals to target two NoSQL database servers, making it a cross-platform botnet. […]

Amid mounting concern about attacks by foreign adversaries on the Department of Homeland Security’s supply chain, two House subcommittees met today to discuss that threat and legislation proposed by the White House–the Federal Information Technology Supply Chain Risk Management Improvement Act–that would respond to the problem. […]

Department of Defense (DoD) Chief Information Officer Dana Deasy said today at the Defense Systems Summit that he has identified four “key strategic areas” that will work to support the National Defense Strategy (NDS). Those four areas – cloud, artificial intelligence, C3 (command, control, and communications), and cybersecurity – are organized not in order of importance, but rather “order of integration,” Deasy said, with each of the priorities flowing from the prior one. […]

Paul Craft, director of operations at the Joint Force Headquarters Department of Defense Information Network (JFHQ-DoDIN), spoke today at the Defense Systems Summit about how his relatively new component of U.S. Cyber Command is now tasked with operating and securing the entirety of DoD’s sprawling IT network infrastructure and has undertaken a complete restructuring of network operations for all of DoD. […]

Even as Apple went public yesterday with a new mobile device operating system intended to close security loopholes that law enforcement agencies were using to access locked devices, one digital forensics firm said it found a workaround to bypass the new security features for a cost of about forty bucks. […]

Director of National Intelligence Dan Coats said Monday that the intelligence community (IC) will be prioritizing a comprehensive cyber posture, machine-augmented intelligence, and modern data management as “foundational priorities” in the coming years, following a year-long reexamination of the IC known as the IC2025 initiative. […]

A mobile device security platform funded in part by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been updated with a never-before-seen feature to help tackle one of the most persistent problems in Federal agency cybersecurity. […]

Categories