Advocacy groups argue against warrantless cellphone searches in Supreme Court cases

A handful of advocacy groups called for the Supreme Court to require warrants before law enforcement can search the contents of cellphones in briefs filed this month.

Encryption, access control problems common for state Medicaid agencies

Problems with encryption and access control are common among the systems used to process Medicaid claims, says a report from the Health and Human Services Department office of inspector general.

European Parliament votes for tighter data protection regulations

A European Union effort to tighten privacy regulations overwhelmingly passed the European Parliament in a March 12 vote. In all, 621 members of the parliament voted for, and only 10 against, what would be the first update to EU data protection regulations since the mid-1990s.

DHS seeks to erase database walls, but filter searches

An effort to create an internal data mining and search capability encompassing multiple Homeland Security Department databases will be constrained by a system that filters results according to employee authorization to see certain kinds of data, says the department privacy office.

Spotlight: Liability protection unresolved cyber threat sharing impediment, says Alexander

A significant unsolved challenge to cyber threat information sharing between the federal government and the private sector is how to address liability, said outgoing National Security Agency head Gen. Keith Alexander.

JIE not a program of record, says Takai

A Defense Department effort to restructure its information technology infrastructure is not a program of record, although it is subject to program of record-like oversight, said DoD Chief Information Officer Teri Takai.

OMB and GSA try for agility in IT development, oversight

The Office of Management and Budget plans to revamp its TechStat agency information technology oversight methodology, said Beth Corbet, deputy director for management at OMB.

DHS officials: Data analytics a challenge

Data analytics remains a challenge for the Homeland Security Department, officials from it acknowledged throughout a conference dedicated to homeland security matters.

Streufert: Agencies aren't dropping out of DHS continuous monitoring program

Reports that major federal departments are refusing to participate in a Homeland Security Department-led contract for continuous monitoring tools are untrue, said a DHS official Tuesday.

Likely next Cyber Command head calls for 'proactive' cyber operations

The likely next head of Cyber Command and the National Security Agency told Senators during a Tuesday confirmation hearing that the United States military posture in cyberspace has been reactive, rather that proactive. Vice Adm. Mike Rogers – President Obama's pick to replace Gen. Keith Alexander as the dual-hatted commander of Cyber Command and the NSA – testified before the Senate Armed Services Committee.

FICAM to be applied to the secret network

Identity management standards designed for federal unclassfied systems will be tailored for use on secret networks, with full implementation planned for September 2018. With only minor adjustments, FICAM is just as suitable for the secret fabric, said a March 5 blog post from the Information Sharing Environment.

No Digital Government Strategy 2.0 waiting in the wings

Anyone anticipating a formal follow-up to the Digital Government Strategy should stop doing so, senior federal information technology officials told a March 7 conference audience.

What went wrong with the Networx transition

A pair of internal analyses by the General Services Administration finds much to criticize in the structure of federal telecommunications contract Networx, portraying it as too complex, inflexible, and mismatched to the way agencies buy telecom services.

HHS seeks to boost ONC, cut funding in 2015 budget

The White House fiscal 2015 budget proposes $74.7 million for the Office of the National Coordinator for Health Information Technology, a $14 million increase over the current year enacted amount.

DHS official touts machine-to-machine cyber threat data sharing

A Homeland Security Department official touted agency use of a machine-to-machine format for sharing cyber threat information during a March 7 hearing. It's rolling out a standardized way of representing cyber threat information in a structured way – in a manner that computers can understand – called the Structured Threat Information Expression.

Swiping ID cards to logon to mobile devices? Maybe not, says NIST

What's worked for laptops and desktops won't work for mobile devices when it comes to verifying users' identity, says the National Institute of Standards and Technology. Enter what NIST calls a "derived credential," a way of taking the identity verification and encryption key infrastructure built up since 2004 for the identity smartcards and applying it to mobile devices.

2015 Budget Request: FAA NextGen

NextGen funding at the Federal Aviation Administration would drop from $901 million to $836 million under the Transportation Department's budget proposal for fiscal 2015.

White House proposes NIST funding boost

Scientific and technical research at the National Institute of Standards and Technology would get a nearly $30 million boost under the White House's spending proposal for the coming fiscal year.

2015 Budget Request: NTIA

The National Telecommunications and Information Administration requests $51 million in discretionary appropriations in the White House budget proposal for the next federal fiscal year.

Scant detail so far on 'federal cyber campus' proposal

Details so far on a proposed "federal cyber campus" contained within the White House budget proposal are scarce, beyond a few offhand references.