The department issued 74 EAGLE II task orders, almost all of which was issued to small businesses. But the $591 million in orders represent only 3 percent of the strategic sourcing program's potential $22 billion value.
The Federal Information Security Modernization Act of 2014 authorizes DHS to assist the Office of Management and Budget with managing and monitoring implementation of security requirements by agencies and providing them with operational and technical assistance, among other activities.
U.S. officials blame Chinese hackers for stealing personal data on about 4 million current and former government employees, although a news report cites other government officials saying that it may have actually affected up to 18 million people, including prospective employees.
What began as an effort to improve governance and assess the security risk of the Federal Communications Commission's information technology systems quickly became an opportunity to consolidate and reduce costs through IT modernization.
The initiative was supposed to be implemented by June 2014 and cost $2.1 billion, but with the transition to a new architecture, the effort was pushed out to August 2016 and then to March 2019.
The Social Security numbers of some 4 million current and former workers that were potentially compromised in a breach of an Office of Personnel Management database were not encrypted, said OPM Director Katherine Archuleta.
Mobile technology is a critical tool for delivering citizen services at the Homeland Security and Health and Human Services departments, said federal officials.
The suit, which was filed in the U.S. District Court for the District of Arizona, said such conditions violate the U.S. Constitution and CBP's own policies. It names Homeland Security Secretary Jeh Johnson, among others as defendants.
For example, fast broadband connectivity will allow Customs and Border Protection agents to use the full range of capabilities offered by smartphones such as mission-critical apps, geospatial services and the ability take video and transmit it to central headquarters.
A senior FBI counterterrorism official emphasized the need for federal law enforcement officials to have the capability to legally access encrypted devices without the use of backdoors for investigating potential terrorist incidents.