Using AI to Modernize Old Techniques

Artificial Intelligence is being implemented across government to modernize and automate traditional manual processes. For many organizations, this means taking paper-based, tedious, error-prone tasks and turning them over to a machine for automated completion. Beyond using AI to hand off tasks best completed by machines -- those that are rote and repetitive -- agencies are also looking at ways to introduce the technology into already complex human-driven activities to make them even more effective and efficient.

Researchers at Dartmouth College's Department of Computer Science have taken a technique that proved valuable in WWII and applied AI to extend the usefulness of the method. A canary trap is a technique that plants different instances of false information in documents. If one of those documents is leaked, the canary will "sing," identifying the leaker. For example, in WWII British intelligence agents planted false documents on a corpse to trick Nazi Germany into preparing for an assault on Greece while the Allies invaded Sicily. The team at Dartmouth created a modern version, WE-FORGE, that plants different instances of false information in documents. The process is relatively simple when creating a small number of variations in a handful of documents, but to extend it to large scientific or technical documents, AI is essential. WE-FORGE uses natural language processing to generate multiple fake files that are believable yet incorrect.

Continue reading

Putting Work into Defining the Government Workforce

The last year has brought about incredible change in the federal workforce, and it shows no sign of stopping. With a new Director for the Office of Personnel and Management (OPM) confirmed, the next several months will bring new energy and activity to formalizing and standardizing workplace policies, processes, and approaches for the "new normal" of a digital-first government.

The move to telework changed how many people view and even perform their jobs. Before the pandemic, telework was sporadically used throughout government and viewed pretty skeptically. Now that the genie is out of the bottle, it's clear that government can continue to function without people in office buildings from 9am-5pm. As in-person work starts to come back around, the new shift will be in defining and managing a hybrid workforce.

Continue reading

Government Security: Looking From the Inside Out

With a number of high-profile security hacks involving widely used software, government agencies are retraining their focus on their organization's security measures and those of the vendors and service providers that work with them. This shift in focus was actually on the rise before the recent hacks in anticipation of cyberattacks just like the ones we've recently seen.

In January of 2020, the Defense Department implemented the Cybersecurity Maturity Model Certification (CMMC), a unified standard for implementing cybersecurity across the defense industrial base (DIB), which includes over 300,000 companies in the supply chain. Contractors have always been held responsible for implementing and documenting their IT systems' security that touch sensitive government data. Under CMMC, this continues, but adds the need for a third party to assess the contractor's compliance.

Continue reading

A Short History of Shared Services…and What’s Next.

Shared Services in government is nothing new. The idea began in the 1980s with the consolidation of payroll and some other administrative functions. In the '90s the focus was on creating entities that could provide common business functions across government and, in that effort, become a cost center.

The 2000s saw the rise of the term 'Line of Business' that looked at common business functions across government to identify opportunities to transform, streamline and share. The Obama Administration looked specifically to IT as a shared service, releasing the Federal IT Shared Services Strategy that provided federal agency chief information officers and key stakeholders guidance. This guidance focused on the implementation of shared IT services as a key principle of their efforts to eliminate waste and duplication, with the intention to reinvest in innovative mission systems.

Continue reading

The Growing Impact of IoT

The use of Internet of Things (IoT) to manage infrastructure and services is not a new concept, but response to the new normal of pandemic life, natural disasters, and the implementation of 5G networks all could accelerate the implementation of IoT solutions.

Remote Management

Stay-at-home orders, social distancing measures, and backlogged inspection schedules all combine to make a great case for implementing sensors and other IoT devices as part of infrastructure management. With technology providing data on the status of equipment, facilities, and general infrastructure like roads and bridges, the need to deploy inspectors to the field can be minimized. In the short term, this reduces potential points of exposure for inspectors and field staff. Longer term, it adds a new "colleague" to field management teams. IoT can handle routine, low risk monitoring, freeing up humans to focus on more complex or higher priority tasks and activities.

Continue reading