Donald Trump’s stunning victory may have overshadowed key congressional races, a handful of which could shape the president-elect’s tech agenda. In one race late Nov 8, Rep. Will Hurd (R-TX), managed to stave off a Democratic challenger. Rep Hurd has championed legislation that aims to fund IT modernization through new agency-based working capital funds, as well as a federalwide fund to which agencies could apply. In a Congress that now remains under Republican control, here are a few members who could influence future IT legislation in Trump's administration.
Sen Ron Johnson (R-WI) stays chairman of the Homeland Security and Governmental Affairs Committee. In a contentious race, Sen Johnson took 50 percent of the vote and defeated challenger Russ Feingold, a former Wisconsin senator whom Johnson unseated in 2010. As HSGAC chair, Sen Johnson has urged the White House to establish real-time automated monitoring for cybersecurity threats. In 2014, he introduced a measure requiring federal agencies to quickly deploy Einstein, the Homeland Security Department's cybersecurity system.
Since President Barack Obama was elected eight years ago, a great deal about technology has changed inside and outside the federal government.
“I think if I were to summarize [Obama’s legacy], it would be a seat at the table,” said Aneesh Chopra, whom Obama appointed as the first U.S. chief technology officer in 2009. As an assistant to the president, Chopra reported directly to President Obama, ensuring ideas from the CTO—often focused on innovation—are heard. “In prior administrations, the notion of the role of technology was largely relegated to back-office procurement activity,” Chopra added. “It was largely an operational conversation around how governments perform.” Instead, President Obama sought innovation from tech gurus and others because, as Chopra said, “policymaking has to take into account how technology will advance” complex and important issues like health care and economic growth.
In other words, President Obama helped take technology out of the back office and into the forefront of government. “Kudos to this administration for dragging the government into the digital era,” said Trey Hodgkins, senior vice president of the Information Technology Alliance for Public Sector.
The presidential nominees agree that the nation’s cybersecurity will be a priority for the winner of the November election. And that’s where the agreement ends. During the “Securing America” segment of Sept 26’s presidential debate, Democratic nominee Hillary Clinton and Republican nominee Donald Trump offered some of their thoughts—and colorful quotes—on who is attacking US institutions and how to fight them. Here’s what we learned:
- Clinton said the nation faces two types of cyber adversaries: hacking groups motivated by profit and "increasingly" states.
- Clinton attributed the Democratic National Committee e-mail breach to Russia, a step the White House has not publicly taken despite pressure from lawmakers.
- Trump questioned whether Russia orchestrated the DNC breach, offering China or “someone sitting on their bed that weighs 400 pounds” as alternatives.
- Clinton shared a positive view of the nation’s cyber capabilities: “We need to make it very clear, whether it's Russia, China, Iran or anybody else, the United States has much greater capacity. And we are not going to sit idly by and permit state actors to go after our information, our private-sector information or our public-sector information, and we're going to have to make it clear that we don't want to use the kinds of tools that we have.”
- Trump appeared to have doubts: “As far as the cyber, I agree to parts of what Secretary Clinton said, we should be better than anybody else, and perhaps we're not.”
- Trump’s 10-year-old son Barron Trump is good with computers: “He is so good with these computers, it's unbelievable.”
- Trump said the US has lost control of the Internet: “And I think Secretary Clinton and myself would agree very much when you look at what ISIS is doing with the Internet, they're beating us at our own game. ISIS. So we have to get very, very tough on cyber and cyber warfare.”
- Clinton suggested partnerships to avoid social media recruiting: “I think we need do much more with our tech companies to prevent ISIS and their operatives from being able to use the internet to radicalize, even direct people in our country and Europe and elsewhere.”
The Hillary Clinton e-mail saga continues. On Sept 23, the House Oversight and Government Reform committee voted 19-15 to hold Bryan Pagliano, formerly a tech aide for Clinton while she served as Secretary of State, for failing to testify about Clinton’s private e-mail server that he maintained. “Mr. Pagliano is a crucial fact witness in this committee’s investigation of former Secretary of State Hillary Clinton’s use of a private e-mail server to conduct government business,” said Oversight Chairman Jason Chaffetz (R-UT).
Pagliano, through his attorney, previously warned that were he to testify publicly, he would simply invoke his Fifth Amendment rights. Nonetheless, the resolution passed along party lines. “Mr. Pagliano’s attorney asserts because his client took the Fifth before the Select Committee on Benghazi, he shouldn’t be required to provide testimony to this committee. This is not a good faith argument,” Chairman Chaffetz said. Ranking Member Elijah Cummings (D-MD) accused Republican counterparts of seeking a “photo op” and “ready-made campaign commercial.” “No matter what anyone says, that is not a legitimate legislation purpose,” Ranking Member Cummings said.
One week after Rep Will Hurd (R-TX) introduced new IT legislation to the House of Representatives, designed to thrust government into 21st-century technologies, the Modernizing Government Technology Act passed on a voice vote. “Many parts of the federal government’s IT infrastructure are stuck in the Stone Age,” said Rep Hurd, who chairs the House IT Subcommittee. “The MGT Act will save taxpayer dollars, increase government accountability, and help government be more efficient in serving the American people.”
The MGT Act is essentially a combination of two prior pieces of legislation, taking portions of its language from the MOVE IT Act Hurd introduced earlier this summer and the White House-backed IT Modernization Fund introduced by Rep Steny Hoyer (D-MD) in the spring. The bill calls for the creation of working IT capital funds in CFO Act agencies, allowing agencies to bank savings from modernization efforts afoot. As a whole, government spends approximately 80 percent of its $90 billion IT budget on legacy systems. Agencies that are able to show savings from modernization efforts would be rewarded under this bill, allowing them to use savings to fund other modernization efforts, such as moving to the cloud.
[Commentary] The adage “good help is hard to find” is especially true for Information Technology (IT) talent in the federal government. The White House recently announced its Federal Cybersecurity Workforce Strategy, which includes a goal of hiring an additional 3,500 cybersecurity and IT specialists by January 2017. The use of existing flexibilities in the government’s system of hiring, training and nurturing talent could enable the government to meet that goal and improve performance today. But many senior IT and human resources managers do not know how to use the system well enough to make this happen. And further, in some areas, the system is so badly broken it is impossible to make progress without substantive reform. The next president should take a pragmatic path to hire more and better IT talent through existing hiring laws, while also enacting a targeted reform program to deliver even better mission results.
[W. Scott Gould is a senior adviser at Boston Consulting Group and former deputy secretary of the Veterans Affairs Department. Jeffrey Neal is a senior vice president at ICF International, former chief human capital officer for the Homeland Security Department, and publisher of the blog ChiefHRO.com.]
Government agencies spend less of their total budget on making operations mobile than commercial groups do, according to new research from IDC. Public-sector spending is about 17 percent of its budget, compared to about 25 percent of private-sector counterparts, according to an as-yet unpublished survey from IDC.
Analyst John Jackson described some of the findings at an AT&T event Sept 7 in Washington. Concerns about the security of apps and the data stored in those apps have been the primary barrier to adoption, Jackson explained. And for at least the past three years, concerns about integrating back-end systems into a mobile strategy have been the second largest barrier to adoption. Jackson predicted public- and private-sector organizations will soon spend more on software services, but spending on software itself is not likely to move much, he said.
So, who governs the Internet of things? Who ensures connected and self-driving cars don’t put their passengers in danger, that security cameras don’t relay video feeds of their users to third parties, or that data collected from billions of consumer devices can be used without compromising personal information? For now, it’s still not clear. Today, several agencies, including the Food and Drug Administration, the Federal Communications Commission, the Federal Trade Commission and the National Highway Traffic Security Administration have authority over some aspects of the Internet of things.
Experts say the regulatory framework isn’t well defined and that agencies will likely need to work together as cases arise that expose the potential downsides of widespread connectivity. As more IoT-related cases begin to test the regulatory framework, “the main thing that connects them is they’re going to have internet connectivity of some sort,” said Lee Tien, senior staff attorney at the Electronic Frontier Foundation. “Regulating a Fitbit is very different from regulating an automobile or regulating an implantable medical device like a defibrillator.” Here’s a look at some of the discussions federal groups are having about regulating the Internet of things.
[Commentary] A key function of government is to address citizen constituent needs. Fulfilling those needs requires implementing innovative and cost-effective services through the public sector’s digital transformation. The goal of citizen service is to provide faster, flexible and more responsive performance in critical mission programs. Partnering with the private sector has proven to be a good channel for innovation and helps deliver best commercial practices for agencies. This collaboration allows for fiscal accountability and provides a vehicle for efficient and fruitful programs.
In any vertical—health care, national security, transportation or education—a starting point for innovation can be in public/private partnering for citizen services. In commercial markets, the pressure is to win, maintain and expand market share while delighting customers with excellent customer service. This same level of pressure is on governments today with the goals of excellent response and effective resolution of any issue.
[Teresa A. Weipert is senior vice president of Sutherland Government Solutions.]
Agency chief information officers will need to get a better handle on their software license inventories and prepare to show savings to the Office of Management and Budget under a new law. Signed into law July 29, the Making Electronic Government Accountable By Yielding Tangible Efficiencies, or MEGABYTE, Act requires executive agency CIOs to develop a comprehensive software licensing policy in order to track spending on software, identify unused licenses and avoid duplication.
“There is considerable waste in software license expenditures, and implementation of the MEGABYTE Act will rectify this to the benefit of American taxpayers,” said Rep Matt Cartwright (D-PA) who sponsored the bill. The MEGABYTE Act requires CIOs to inventory 80 percent of software license spending and enterprise licenses, regularly track and maintain licenses, and embrace metrics such as software usage data to make cost-effective decisions. The act also requires CIOs to report financial savings or cost avoidance that results from software license management.