Outgoing federal CIO warns of 'an IT cartel'
Vivek Kundra, in appearance before White House science committee, also tells of the risk of data sharing
Computerworld - WASHINGTON - In a wide-ranging discussion Friday with President Barack Obama's top science advisors, Federal CIO Vivek Kundra warned of the dangers of open data access and complained of "an IT cartel" of vendors.
He also believes the U.S. can operate with just a few data centers.
Kundra, who is leaving his job in mid-August, offered a kaleidoscopic view of his concerns about federal IT in an appearance before President's Council of Advisors on Science and Technology.
In particular, Kundra is worried about the "mosaic effect," the unintended consequence of government data sharing, where data sets are combined and layered in ways that can strip away privacy and pose security threats.
In the age of Facebook and Twitter, where a lot of personal data is already available, government data that may have been "innocuous in the past," can be used to "identify people that may not want to be identified," Kundra said.
At this meeting, he was sharply critical of government IT contracting and told the committee "that we almost have an IT cartel within federal IT" that's made up of "very few companies" that benefit from government spending "because they understand the procurement process better than anyone else."
"It's not because they provide better technology," Kundra said of the contractors.
As federal CIO, Kundra has been an advocate for data sharing, a critic of big government vendor contracts, and a believer in new technologies, particularly the cloud. He is leaving his job to take a fellowship at Harvard.
Kundra said the government knows "that true value lies at the intersection of multiple data sets" but he also realizes that if data is released "without actually thinking about the national security implications," there could be issues.
As an example, Kundra said his office has been talking to the Nuclear Regulatory Commission about data it was going to release and acknowledged a "very vigorous debate" around it, without revealing specifics.
Obama and tech
- China set to surpass U.S. in R&D spending in 10 years
- Outgoing federal CIO warns of 'an IT cartel'
- @whitehouse takes on Twitter Town Hall
- Obama's CIO quits
- Little new in Obama cybersecurity proposal
- Feds update IT plan following Obama's 'horrible' comment
- Obama's online trusted ID plan greeted with caution
- U.S. Census tech makeover includes 'oasis' for innovation
- Obama seeks big boost in cybersecurity spending
- QuickPoll: Is Obama's 98% 4G broadband coverage goal realistic?
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Agility & Scalability for Oracle EBS R12 and RAC on VMware vSphere 5
- This white paper outlines extensive performance and scalability testing of Oracle EBS applications on a Vblock™ Systems with vSphere 5.
- Oracle and VCE: The Next Step in Integrated Computing Platforms
- In this ESG Lab review you will learn how a VCE system driven by Oracle, delivers the perfect blend of high performance and...
- Migrate Oracle Apps from RISC/UNIX to Virtualized x86
- Ready to move Oracle to a virtualized environment? This brief explains how true converged infrastructure can help you migrate from a RISC/UNIX environment...
- Step Out of the Bull's-Eye
- Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe. All Government IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Government IT Webcasts