Biography for David Perera
David Perera is executive editor of the FierceMarkets Government Group, which includes FierceGovernment, FierceGovernmentIT, FierceHomelandSecurity, and FierceMobileGovernment. He has reported on all things federal since January 2004 and is co-author of Inside Guide to the Federal IT Market, a book published in October 2012. Based in greater-metro Washington, D.C., Dave can be reached here and can be found on LinkedIn or here. Tweeting at @daveperera.
Articles by David Perera
Privacy law in the United States tends to be targeted, and as a result "we don't believe that there are actually any federal statutes that would provide limits on drone surveillance," said Aime Stepanovich, an attorney with the Electronic Privacy Information Center. Following passage of a 2012 reauthorization bill, the FAA has worked to streamline procedures for integrating public agency UAVs into the national airspace.
The bill (H.R. 1163), which would need approval by the full House and the Senate before it could become law, would amend the Federal Information Security Management Act. The House approved the same legislation in April 2012 but the Senate did not advance it beyond committee.
As the Homeland Security Department adopts an incremental approach toward information technology project development, it should also improve its outcome reporting, said David Powner, director of information technology management issues at the Government Accountability Office.
As a result of the Electronic Communications Privacy Act of 1986, law enforcement agencies currently need only obtain a subpoena to access stored emails older than 180 days. The ECPA also permits law enforcement to obtain with a subpoena the contents of opened emails of any age, but some federal courts--including the Sixth Circuit (.pdf)--have found that ECPA provision to be unconstitutional.
A revised draft of Rep. Darrell Issa's (R-Calif.) federal information technology reform bill would introduce governmentwide a new evaluation criteria for IT contracting proposals and backs away from some of the mandatory commodity IT frameworks Issa originally proposed.
A federal district court judge has ruled that federal demands for transactional data via national security letters are unconstitutional, although she stayed her order enjoining the government from issuing the demands or enforcing secrecy surrounding current demands until the Ninth Circuit Court of Appeals can consider the case.
Who will build and own the public safety broadband network is less important than adherence to federal First Responder Network Authority standards, said Sam Ginn, FirstNet chairman during a March 14 hearing. "Who builds the network and who operates the network, that, I think, is open and negotiable," Ginn told a House panel.
Cybersecurity at the 24 largest federal agencies was roughly the same in measured quality during fiscal 2012 as the year before, according to a newly released annual report on agency compliance with the Federal Information Security Management Act.
Einstein-3A is meant to detect and prevent malicious traffic on federal networks. The Homeland Security Department infrastructure protection and information security budget line, which funds the Einstein program, is subject to a 7.8 percent sequester rate, according (.pdf) to the Office of Management and Budget.