What the New U.S. Intelligence Strategy Says About Cyber Threats

From time to time GovEvents will come across information we feel our members and audience would benefit from. Here's something we wanted to share from Bob Gourley, Founder and CTO at Crucial Point LLC:

The United States intelligence strategy for 2019 has been released, covering seven specific themes. Here's how the United States Intelligence Community will deal with cyber threats:

"Despite growing awareness of cyber threats and improving cyber defenses, nearly all information, communication networks, and systems will be at risk for years to come. Our adversaries are becoming more adept at using cyberspace capabilities to threaten our interests and advance their own strategic and economic objectives. Cyber threats will pose an increasing risk to public health, safety, and prosperity as information technologies are integrated into critical infrastructure, vital national networks, and consumer devices. The IC must continue to grow its intelligence capabilities to meet these evolving cyber threats as a part of a comprehensive cyber posture positioning the Nation for strategic and tactical response."

For more on the new strategy and to download a copy see: OODAloop.com

The Next Frontier of Citizen Experience

Citizen Experience is a focus of the President's Management Agenda and the resulting IT Modernization Centers of Excellence. This focal point is a result of government receiving poor customer service marks (ranking them on par or below cable companies) year after year. Agencies have evolved from requiring citizens to visit a government office to fill out sheets of paperwork to online portals that provide much of that same paperwork online. It quickly became clear, however, that simply moving paperwork online was not the answer to improving citizen experience with government. Today the technology exists to take that online interaction to the next level.

Social media, Artificial Intelligence (AI), Internet of Things (IoT), video chat, text, and chatbots are being used throughout government to give citizens a more direct and personalized digital line to the agencies that serve them. Cities are using IoT to better communicate the whereabouts and schedule of public transport as well as air quality levels. AI is powering website chatbots and search functions allowing for more self-service of citizens looking to conduct business with the government 24/7.

But technology alone will not improve the government's customer service scores. The culture and morale of the government workforce also plays a huge role in the service that is delivered to citizens. Service representatives in government should be trained on new systems and shown how technologies will enhance, rather than replace, their jobs. Continue reading

Mapping out Geospatial Uses

Geospatial, as a strict term, means data that is related to a location. In the government space, Geospatial has been used interchangeably with GIS - or Geographic Information Systems - which refers to technology that uses geospatial data. GIS has long been a key technology for the military and intelligence communities to help map out and gain visibility into areas for combat or missions. But as the availability of geographic data grows through the use of GPS applications, drones, and IoT technologies, the use of GIS is expanding across government.

GIS is a key tool in disaster response helping overlay available resources and assets onto maps of areas impacted by floods or fires. It can also be used to map in real time the location of hazards such as downed power lines.

GIS is also being used by law enforcement. In one case, a boy had gone missing, suspected to be abducted. The boy posted a photo to Instagram and the image, taken from what seemed to be an apartment window, included a sign on a bank across the street. An analyst looked up branch locations and cross-referenced the addresses with online maps, but could not get a location that seemed to be a possible match. When they took that data and loaded it into a GIS system that took a top-down look at locations they were able to pinpoint the location of the child.

Urban sprawl and growth is also being managed with GIS. The city of Durham, NC uses aerial imagery to get a better look at changes being done to properties that impact land use, water runoff, and drainage.

There are several upcoming events focused on GIS as well as others that include discussion of the application of geospatial technology. Continue reading

Government Gets Social

Social media management platform, Hootsuite, recently released "The Social Government Benchmark Report 2018" that looked at how agencies are using and viewing social media use in connection with their mission. The report examined the value of social media for government organizations as well as explored best practices for enterprise-level social media management for government.

The survey of public sector employees found that about half of respondents rated their agency's use of social media as good or excellent. The top use cases for social media cited were:

  • Citizen engagement (77%) - social media allows for a better understanding of citizen needs and they've seen an increase in positive sentiment.
  • Customer care/service delivery (48%) - teams are able to have faster response times.
  • Critical response communications (47%) - agencies found that citizens are better informed about critical issues and rumors are quickly addressed via social channels.
  • Employer branding and recruitment (45%) - respondents say they are getting a higher volume of candidates as a result of social outreach.

Based on these successes, it's no surprise public servants want to do more with social. 87% of respondents said there is room for improvement. Luckily, there are several events in the coming months that can provide guidance on how public sector organizations can better use social media. Continue reading

CDM Hits Phase Three: Determining What is Happening on the Network

The Continuous Diagnostics and Mitigation (CDM) program, led by the Department of Homeland Security, was designed to fortify the cybersecurity of government networks and systems with capabilities and tools that identify risks on an ongoing basis, prioritize these risks based on potential impacts, and enable personnel to mitigate the most significant problems first. The program was rolled out in phases with phases one and two pretty much complete across government.

Now that agencies know what and who is on their network, they need to move onto phase three - what is happening on the network. This involves installing and managing the network and perimeter security measures. Given that the perimeter now includes mobile devices, securing those devices and the way they access the network is critical to meeting CDM goals. Currently,agencies are mapping out mobile connections at the agency level, and the networks with which agencies are regularly interacting.

Continue reading