Tech groups praise parts of intelligence bill
But they still want the government's lead cybersecurity job elevated
IDG News Service - Technology trade groups cheered parts of a comprehensive intelligence reform bill that passed the U.S. Congress yesterday, including a provision that could speed up the federal government's security clearance process for IT vendors and contractors.
But the bill, passed by the U.S. House of Representatives on Tuesday and by the Senate yesterday, was stripped of language that would have elevated the lead cybersecurity position at the U.S. Department of Homeland Security from a director-level position to an assistant secretary.
The Information Technology Association of America (ITAA) said it was "dismayed" that congressional negotiators took out the assistant secretary language. The trade group and other organizations have called on Congress to elevate the position because they believe that it's too low in the agency to push cybersecurity goals in the public and private sectors.
The Arlington, Va.-based ITAA called on Congress to elevate the position as soon as possible next year.
The ITAA cheered other parts of the intelligence reform bill, known as the National Intelligence Reform Act. The bill would help speed along security clearances for IT vendors and contractors working with the U.S. Department of Defense or intelligence agencies, said Bob Cohen, senior vice president at the ITAA.
It can take more than 12 months to approve a new top-secret Defense Department clearance for someone with limited foreign travel experience and no credit or police problems, according to the ITAA. The delays are a "very big problem" for IT companies that want to do work for the Defense Department and other agencies, Cohen said.
The intelligence bill creates a National Intelligence Directorate (NID). The directorate's responsibilities include developing background-check policies. In conjunction with the White House, the NID deputy director is supposed to appoint a single federal agency to conduct background investigations. However, the director will also be able to grant waivers to specific agencies that need to conduct their own investigations for reasons of efficiency or national security.
Right now, most U.S. intelligence agencies conduct their own security clearances and have differing procedures, Cohen said.
The intelligence bill also allows security-clearance reciprocity between agencies for the first time, Cohen said. For example, an IT contractor with FBI clearance could work for the CIA without getting a new clearance. "We can't be bogged down in red tape," he added. "[The old system] stalls programs because companies can't get their people in place."
The Business Software Alliance praised the intelligence bill for creating a director of science and technology to advise the new director of national intelligence on the use of technology in intelligence matters.
The Washington-based alliance also praisedprovisions to update the FBI's IT structure to lead digital efforts against terrorist threats, use technology to protect U.S. airports and borders, and implement enhanced travel screening.
Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?