Federal CIOs need to pay attention to European Commission’s investigation into Android

Karen Evans by Karen Evans, KE&T Partners
Monday, August 03, 2015

My goal here is not to rehash what has already been stated, but instead focus on Android and the underlying, lesser-known issues at play for government users. It is important to consider the implications this series of events has on public sector entities. Vendor practices are particularly important for federal CIOs while procuring goods and services, in particular as it relates to “bring-your-own-device” (BYOD) policies.

Televising the Revolution

H. Bryan Cunningham by Bryan Cunningham, Cunningham Levy LLP
Monday, August 03, 2015

Broad deployment of body-worn cameras will not be a panacea. But better technology and more data in pursuit of finding the truth has historically led to greater justice. This can happen only if those in power make hard decisions on at least the issues highlighted here, and sooner rather than later. If leaders fail to do so at the front end of the BWC revolution, the rights of many will be sacrificed.

US Must Do More To Protect Privacy

Julie Anderson by Julie Anderson, AG Strategy Group
Thursday, July 30, 2015

If the U.S. fails to assert its international leadership role, national security and individual privacy could continue to suffer. There are two things the U.S. can do to demonstrate its leadership on these issues and enable law enforcement to fulfill its mission while protecting individual privacy. On its own, each action is necessary but not sufficient.

After the OPM Breach, It’s Time for IT Organizations to be Accountable

Jeff Gould by Jeff Gould, SafeGov.org
Thursday, July 02, 2015

It is time to change the rules, and hold federal IT organizations accountable for their missteps. The OPM breach, which the Obama administration says was the work of Chinese hackers, exposes every current and former federal employee to blackmail, identity theft, phishing attacks, espionage and untold other forms of harassment. While no lives have been lost, the OPM attack is undeniably a national catastrophe whose consequences will be felt for years to come.

Agencies are taking the right steps to protect data

Karen Evans by Karen Evans, KE&T Partners
Wednesday, July 01, 2015

The Office of Personnel Management's Electronic Questionnaires for Investigations Processing system is offline now after the agency says it found a security vulnerability. The site will be offline for four to six weeks. OPM hasn't said the discovery came out of the 30-day cyber sprint called for by federal CIO Tony Scott. Karen Evans, executive director of the U.S. Cyber Challenge and former e-gov administrator at the Office of Management and Budget, is watching the agencies respond to Tony Scott's call. She tells In Depth with Francis Rose, how the OPM breach is changing the way agencies protect their data.

Congress shouldn't overlook FedRAMP funding in 2016 budget

Julie Anderson by Julie Anderson, AG Strategy Group
Friday, June 26, 2015

FedRAMP is charged with standardizing security assessments for cloud systems across government. While underappreciated, these standardization efforts are vital to improving the security of government data.

Measuring MLAT

H. Bryan Cunningham by Bryan Cunningham, Cunningham Levy LLP
Friday, June 19, 2015

Measuring a problem is a first step to solving it. Many, myself included, have identified problems with the “Mutual Legal Assistance Treaty” (MLAT) system used by one country to retrieve admissible criminal evidence stored in another. Based on formal international agreements, a country needing evidence (the “requesting country”) under the control of another country (the “responding country”) transmits a written request to the responding country on behalf of state or federal prosecutors in the requesting country. The responding country reviews the request and, if so inclined, secures the evidence under its own laws and, finally, transmits the evidence back to the requesting country. Anecdotal evidence, including the experience of state and federal prosecutors in the United States, suggests that the MLAT process can be slow and cumbersome.

US To China: Do As We Say, Not As We Do

Paul Rosenzweig by Paul Rosenzweig, The Chertoff Group
Thursday, June 18, 2015

Is America as authoritarian as China? Surely not. And yet sometimes the differences can be hard to discern. A case in point is their similar approaches to one aspect of criminal law, the lawful intercept rules for telecommunications; approaches that a new study by the American Enterprise Institute characterizes as the imposition of a double standard.

Privacy: The weak link for video security

Karen Evans by Karen Evans, KE&T Partners
Thursday, June 18, 2015

The collection and analysis of video data has become the norm. However, storing sensitive information is currently regulated by outdated security standards—or by no standards at all—that do not offer the necessary protections to prevent hackers or bad actors. Law enforcement, led by the IACP, is addressing this issue head-on with its recently released guidance on video data and cloud computing. The guidelines focus on law enforcement's operational needs and, most importantly, ensure the security of systems and video data. As the updated guidelines state: "Recent calls for the expansion of data collection by law enforcement officers through, for example, the use of body-worn cameras and other sensor devices, only serve to reemphasize the need for clearly articulated policies regarding cloud-based data storage."

IACP Releases Updated Guidance On Police Bodyworn Camera Video Data Storage

Bradley Shear by Bradley Shear, Law Office of Bradley S. Shear
Thursday, June 18, 2015

The International Association of Chiefs of Police (IACP) recently published their "Guiding Principles on Cloud Computing in Law Enforcement". These principles are much needed because as more digital video evidence is created by law enforcement, the proper safeguards must be in place to ensure that the data is stored in an appropriate manner for the legal justice system.