2 Alerts  

Reporter’s Notebook

jason-miller-original“Reporter’s Notebook” is a weekly dispatch of news tidbits, strongly-sourced buzz, and other items of interest that have happened or are happening in the federal IT and acquisition communities.

Submit ideas, suggestions and news tips  to Jason via email.

 Sign up for our Reporter’s Notebook email alert.

Can GSA’s 18F succeed where 3 other ID management projects have struggled?

When the General Services Administration’s 18F organization announced it was taking on the long-standing challenge of identity authentication and credentialing for government services, my first thought was “here we go again.”

Another group thinking they could find the answer to a challenge that three other attempts before them struggled to come up with.

It’s not a matter of building the killer app for citizens, and eventually businesses and other government organizations, to securely log into federal services, but it’s building an online approach that people trust, find easy to use and recognizes and uses existing private sector practices.

Through Login dot gov, 18F plans to build a platform for users who need to log in to government services. They say they plan to work with the National Institute of Standards and Technology, the Office of Management and Budget and GSA’s Federal Acquisition Service.

“Every consumer-facing service the government offers will benefit from this platform, enhancing the privacy and security of online interactions for the public and for agencies,” 18F wrote in its blog post. “To build this login platform, we’re using modern, user-friendly, strong authentication and effective identity proofing technology. This new platform will leverage the extensive lessons we’ve gained from agency efforts in the past, including lessons learned from our counterparts in the UK who built GOV.UK Verify.”


3 takeaways from the FITARA 2.0 hearing

House lawmakers are making good on their promise to haul up federal chief information officers to ensure they are meeting the spirit and intent of the Federal IT Acquisition Reform Act (FITARA).

The second report card day for most agencies showed slight improvements across most agencies.

The House Oversight and Government Reform Committee’s scorecard showed on the surface that the Commerce Department remains the standout among all agencies, and NASA has the biggest gap to make up.

But dig a little deeper in what the CIOs from Commerce, NASA, the Energy Department and the Labor Department told members of the subcommittees on IT and Government Operations and you’ll find real change happening.

Last week’s hearing was the first update on agency progress to reform how they manage and buy IT since November.


$3.1B IT Modernization Fund: DoA, MIA or alive and kicking?

The Office of Management and Budget may be getting its chance publicly to make its case for the $3.1 billion IT Modernization Fund.

And by many accounts, the May 25 hearing before the House Oversight and Government Reform Committee is going to be a huge opportunity for administration officials to explain in straightforward terms why this initial seed fund is so important from a cybersecurity and from a delivery of services to citizens perspective.

This opportunity comes as the fund doubters and pessimists are growing in number.

Over the last few weeks, several people have brought up to me whether I think the fund is dead on arrival, on life support or just getting started. At best, many government observers are split: it’s either on life support or has an outside chance of getting approved.

If you’ve heard Tony Scott, the federal chief information officer, speak recently, he will tell you there is progress on Capitol Hill. He will tell you about the meetings with lawmakers and how well they are going. Scott is expected to testify at the May 25 hearing.

The problem is evidence of those meetings is hard to find.


CDM suffering growing pains so GSA, DHS begin future planning

The continuous diagnostics and mitigation (CDM) program isn’t working as planned. The decision to use a blanket purchase agreement approach for the assorted cybersecurity tools and services isn’t flexible enough, doesn’t take into account longer-term agency operations and maintenance needs, and pre-pricing tools and services up-front adds a level of complexity to the program that was unexpected.

That is why the Homeland Security Department and the General Services Administration already are plotting the program’s future with two more years left on the contract.

GSA awarded the original five-year contract in August 2013 to 17 companies with a $6 billion ceiling.

Jim Piché, a group manager at GSA’s FEDSIM office, which oversees the CDM program, said the BPA’s stumbling points are heavily influencing the future of the program.

“The big piece we’ve learned is to have the flexibility of buying the products. Even though we are asking the agencies to specify what their networks look like, and we are asking the offerors to specify a solution that is firm fixed price, we understand the analysis will not be there until they get through the first part of the delivery of the task order where they do that discovery and true-up of what’s really going to be required,” he said after speaking at a conference on CDM sponsored by 1105 Government Information Group. “So having that flexibility in the task order,  [we are] able to purchase that additional product and buy those additional services to install that product has been really important to making the task orders useful and viable in the near term.”

DHS and GSA are working with the Office of Management and Budget and others to figure out how best to position the CDM program for the future without the challenges of the current BPA.


NASA’s transparency on acquisitions is a lesson others should heed

NASA made a $447.8 million award to SAIC in January to run one of the follow-on contracts under its I3P umbrella program. SAIC will continue to hold the Enterprise Applications Services Technologies 2 (EAST) contract. The company won the initial deal in 2010 under a 5-year, $321 million contract.

What’s most interesting about this award isn’t the fact SAIC won, or the fact that NASA’s decision survived a protest by CACI. The Government Accountability Office denied CACI’s protest in late April.

What really stands out about this entire process is NASA’s decision to release on FedBizOpps.gov its source selection document.

The 16-pager details NASA’s entire evaluation process for both bidders — SAIC and CACI. It outlines the strengths of each company’s proposal and why SAIC and CACI earned the evaluation scores they did.

Several long-time government contracting attorneys were shocked NASA would release such a document publicly.

“Generally, the source selection document is protected from disclosure from the Freedom of Information Act, but the agency can still decide to release it,” said Bill Shook, a long-time government contracts attorney. “This type of source selection document is one that I have seen hundreds of times, but always under a protective order.”

Tony Franco, a senior partner with PilieroMazza law firm, said seeing an unredacted version of this document is highly unusual.


Why risk is becoming a key conversation in the C-suite

The Office of Management and Budget has been promising for the last 18 months to change the way agencies measure and mitigate risk.

Whether in policy or through the update of Circular A-123, OMB has been working to require agencies to take an enterprise approach to risk management.

Well, within the next four-to-six weeks, we should get a look at what managing enterprise risk will look like across government.

Dave Mader, OMB controller, said May 13 at the CFO-CIO Summit sponsored by the Association of Government Accountants and AFFIRM in Washington, that the update to A-123 will come out by the end of June.

“We are introducing a new chapter requiring every CFO Act agency to implement over the next year an enterprise risk management (ERM) program,” Mader said. “When the circular comes out in the next month or so, the thing that will be interesting is ERM will not be the responsibility of the CFO. We talked with a group of assistant secretaries for management recently and they asked us not to tag the CIO or the CFO to own ERM. So the way we are describing it and implementing it is this is a C-suite responsibility and it should be embedded in how the department runs on a day-to-day basis. It needs to be owned by the leadership across the department.”

Mader offered me a clarification after his presentation on what he meant that it has to be owned by the C-suite.


DoD’s words ring hollow to vendors when it comes to LPTA

The Defense Department continues to deny any systemic problem with using lowest-price technically acceptable (LPTA) too much for contracts. But there is a growing body of evidence where perception is overshadowing reality, therefore making LPTA a serious problem.

Two recent examples show just how much work DoD must do to either change the opinion of industry and therefore Capitol Hill, or actually educate its workforce to stop using this approach inappropriately.

The first case study is the ENCORE III IT services contract. Two vendors, Booz Allen Hamilton and CACI, submitted pre-award bid protests to the Government Accountability Office.

The second example is new legislation coming from Sens. Mark Warner (D-Va.) and Mike Rounds (R-S.D.). The two members of the Senate Armed Services Committee introduced the Promoting Value Based Defense Procurement Act of 2016 (S.2826) to limit the use of LPTA, especially in IT procurements.


DHS, HUD bring money, mission together to begin transforming IT spending

The Department of Housing and Urban Development is spending as much as 95 percent of its $342 million IT budget on legacy systems.

The Homeland Security Department, with its $6.2 billion technology spend in fiscal 2016, wasn’t much better just a few years ago. It was spending 80 percent of the department’s IT budget on legacy systems, including 48 percent on what technology executives considered commodity legacy systems that could be transitioned to shared or enterprise services.

DHS and HUD are two examples why the Office of Management and Budget is pushing for Congress to approve its proposal for the $3.1 billion IT Modernization Fund.

While lawmaker acceptance of the ITMF is unclear, HUD and DHS aren’t waiting around either.

Susan Schuback, HUD’s deputy chief information officer, said the implementation of a portfolio management approach is swinging the pendulum the other way on legacy IT spending.


White House recognizing risks of big data

The Obama administration fashioned itself as the “big data” White House almost from the beginning. Looking back at the litany of initiatives, starting with Data.gov, to the $200 million proposed investment in big data projects in 2012, to the naming of the first federal chief data scientist, the White House deeply enjoys talking about the real and potential impact data can have on the government and society at-large.

While there is plenty of reason to question the administration’s self-proclaimed desire to “unleash the power of data” — many will say the only data the White House wants to make public is the self-congratulatory type or the fact that Data.gov hasn’t lived up to its billing — the latest White House report on big data is a better example of the true power of open data. and worth reading.

“What stands out to me in this particular report is how important it is to think about the ethical implications of both data collection and algorithm design,” said Nick Sinai, a former deputy chief technology officer at the White House during the Obama administration, and now an adjunct lecturer in public policy at the Harvard Kennedy School and a venturepPartner at Insight Venture Partners. “Whether it’s hiring, college admissions, or credit decisions, we need to make sure the use of big data technology starts with principles of ‘equal opportunity by design.’ In criminal justice, for example, we’ve seen what happens when data inputs reflect racial bias in building predictive algorithms — and thereby perpetuate discriminatory outcomes in pretrial release, sentencing, and parole decisions.”

Sinai’s comments highlight a growing understanding of the power of big data outside the usual communities.


Roots of IT reform starting to take hold

A constant stream of industry pundits and Capitol Hill overseers are calling for evidence of the impact of the Federal IT Acquisition Reform Act (FITARA).

Is it working? Are federal chief information officers taking/being given a real “seat at the table?” Why haven’t the departments of Energy and Labor finished their implementation plans yet?

Too often these and other questions don’t have a direct answer.

But if you listen closely enough to what CIOs are saying, you can see just how FITARA is taking root.

Let’s start with the Commerce Department, where CIO Steve Cooper has to manage two big-dog bureaus: Census and Patent and Trademark Office.

Both have huge budgets: PTO requested almost $600 million in fiscal 2017 for IT alone, and Census requested $1.6 billion, including $778 million for the decennial count, which includes a host of IT initiatives.

Understanding the risk and concerns about the 2020 count, Cooper is working with Census technology executives in a way that’s different than what past CIOs did.

And whether he or anyone admits it, the reason is two-fold: FITARA and, more importantly, the intense scrutiny on the 10-year event.


« Older Entries