Beyond Facial Recognition: Growing Applications of Biometrics in Government

Biometrics are more than facial recognition. Biometrics include all types of biological markers that can be used for identification. Fingerprints pre-date the use of facial recognition and today the practice continues to evolve to use other biological data for a wide variety of use cases.

Tapping into wearable data for first responder safety

The Department of Homeland Security recently funded several startups that have developed innovative monitoring technologies that can be used to protect the health, safety and mental well being of police officers, firefighters, and other emergency responders. These solutions include: Continue reading

FITARA Report Looks to Future Evolution

The 15th Federal Information Technology Acquisition Reform Act (FITARA) scorecard was issued in December 2022 to provide a look at how agencies are meeting modernization goals. Much like the 14th report, all measured agencies improved their scores or stayed the same indicating that changes are needed to ensure the report fully reflects today's modernization goals that have shifted from data center consolidation to cloud usage, and onward to Zero Trust cybersecurity strategies. The committee overseeing the scorecard, as well as industry groups, are looking at ways to better align modernization activities with the report.

FITARA 15 Findings

Currently, the seven active grading categories on the scorecard are: 1) progress in transitioning to EIS contracts; 2) CIO authority enhancements; 3) transparency and risk management; 4) portfolio review; 5) data center consolidation; 6) Modernizing Government Technology (MGT) Act; and 7) cybersecurity/FISMA. Continue reading

Defining the Value of Digital Assets

Digital assets are more than just bitcoin and they are having an incredible impact on how legitimate and illegitimate transactions are conducted. Breaking it down to a simple level there are three basic forms of digital assets:

  • Digital currency is the electronic form of traditional currency. It is what is stored in a digital wallet, transmitted electronically and then turned into actual cash when withdrawn from a bank or ATM.
  • Cryptocurrency is the encrypted form of digital currency that uses blockchain technology to move it around. Cryptocurrency does not require a financial institution to verify the transaction.
  • Non-fungible tokens (NFTs) are a one-of-a-kind digital asset that represents a real-world item such as photos, music, videos and trading cards.

Unfortunately, as with any new technology, bad actors are finding ways to exploit these assets while the rest of the world is still trying to fully understand them. Continue reading

Citizen Service for the Most Vulnerable

Citizen experience is a key priority across government. Agencies are taking a new look at citizens as customers and simplifying how they deliver services. At no time is that simplification more important than at times of crisis. The government provides critical support to citizens impacted by natural disasters, public health emergencies, terrorism, and economic insecurity. There are some incredible examples of how government is applying technology to meet the needs of vulnerable populations.

Supporting Homeless Populations

Austin, TX is using the Homeless Emergency Management (HEM) Tracking and Prioritization Tool as part of its larger efforts to understand and support the city's homeless population. Field staff use the tool to capture information about homeless encampments that includes factors related to health, safety, and impacts on infrastructure, property, and environmental health. This data is collated into a score that helps prioritize areas for intervention.

Before this tool, departments across the city were collecting different information and had no uniform way to evaluate it. The HEM Tool applies a citywide lens to encampment response, enabling prioritization and resource deployment to those that present the biggest risks, supports consistent encampment data capture, and improves citywide understanding of needs, risk and trends. Continue reading

Charting the Future of Defense

The National Defense Strategy (NDS) sets the strategic direction for our military to meet the security threats of tomorrow. Overall, the Defense Strategy focuses on China and Russia as the primary adversaries, but it also emphasizes the importance of global cooperation among allies as well as adversaries to meet threats that are bigger than any one country including climate change, food insecurity, and pandemics. The defense strategy lays out three primary tactics for advancing U.S. and global security.

Integrated Deterrence

The practice of integrated deterrence involves working closely across all branches of the military, warfighting domains, and even across other federal entities to ensure national security. It expands responsibility for deterring adversaries beyond the Department of Defense (DoD), involving the intelligence community, health agencies, environmental agencies, and more. Continue reading