A Review of the FBI's Trilogy Information Technology Modernization Program

A Review of the FBI's Trilogy Information Technology Modernization Program
Author: National Research Council
Publisher: National Academies Press
Total Pages: 78
Release: 2004-06-10
Genre: Computers
ISBN: 0309092248

The Federal Bureau of Investigation (FBI) is in the process of developing a modern information technology (IT) systemâ€"the Trilogy programâ€" that is designed to provide a high-speed network, modern workstations and software, and an applicationâ€"the Virtual Case File (VCF)â€"to enhance the ability of agents to organize, access, and analyze information. Implementation of this system has encountered substantial difficulties, however, and has been the subject of much investigation and congressional concern. To help address these problems, the FBI asked the National Research Council (NRC) to undertake a quick review of the program and the progress that has been made to date. This report presents that review. The current status of four major aspects of the programâ€"the enterprise architecture, system design, program management, and human resourcesâ€"are discussed, and recommendations are presented to address the problems.

Strategies and Priorities for Information Technology at the Centers for Medicare and Medicaid Services

Strategies and Priorities for Information Technology at the Centers for Medicare and Medicaid Services
Author: National Research Council
Publisher: National Academies Press
Total Pages: 192
Release: 2012-02-23
Genre: Medical
ISBN: 0309221943

The Centers for Medicare and Medicaid Services (CMS) is the agency in the Department of Health and Human Services responsible for providing health coverage for seniors and people with disabilities, for limited-income individuals and families, and for children-totaling almost 100 million beneficiaries. The agency's core mission was established more than four decades ago with a mandate to focus on the prompt payment of claims, which now total more than 1.2 billion annually. With CMS's mission expanding from its original focus on prompt claims payment come new requirements for the agency's information technology (IT) systems. Strategies and Priorities for Information Technology at the Centers for Medicare and Medicaid Services reviews CMS plans for its IT capabilities in light of these challenges and to make recommendations to CMS on how its business processes, practices, and information systems can best be developed to meet today's and tomorrow's demands. The report's recommendations and conclusions offered cluster around the following themes: (1) the need for a comprehensive strategic technology plan; (2) the application of an appropriate metamethodology to guide an iterative, incremental, and phased transition of business and information systems; (3) the criticality of IT to high-level strategic planning and its implications for CMS's internal organization and culture; and (4) the increasing importance of data and analytical efforts to stakeholders inside and outside CMS. Given the complexity of CMS's IT systems, there will be no simple solution. Although external contractors and advisory organizations will play important roles, CMS needs to assert well-informed technical and strategic leadership. The report argues that the only way for CMS to succeed in these efforts is for the agency, with its stakeholders and Congress, to recognize resolutely that action must be taken, to begin the needed cultural and organizational transformations, and to develop the appropriate internal expertise to lead the initiative with a comprehensive, incremental, iterative, and integrated approach that effectively and strategically integrates business requirements and IT capabilities.

Report to the President of the United States

Report to the President of the United States
Author: United States. Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction
Publisher: Us Independent Agencies and Commissions
Total Pages: 624
Release: 2005
Genre: Business & Economics
ISBN:

A report from the commission established in 2004 and charged with examining capabilities and challenges of American intelligence community concerning the capabilities, intentions, and activities of foreign powers relating to the design, development, manufacture, acquisition, ossession, proliferation, transfer, testing, potential or threatened use, or use of weapons of mass destruction, related means of delivery, and other related threats of the 21st Century, presenting 74 recommendations for improving the United States intelligence community.

State Voter Registration Databases

State Voter Registration Databases
Author: National Research Council
Publisher: National Academies Press
Total Pages: 74
Release: 2008-04-17
Genre: Political Science
ISBN: 0309178584

The Help America Vote Act of 2002 requires the states to develop a single, computerized voter registration data base (VRD) that is defined, maintained, and administered at the state level. To help the states with this task, the U.S. Election Assistance Commission asked the NRC to organize a series of workshops and prepare an interim report addressing the challenges in implementing and maintaining state VRDs. The EAC also asked the NRC to advise the states on how to evolve and maintain the databases so that they can share information with each other. This report provides an examination of various challenges to the deployment of state VRDs and describes potential solutions to these challenges. This interim report's primary focus is on shorter-term recommendations although a number of long-range recommendations are presented. The final report will elaborate on the long-range questions and address considerations about interstate interoperability of the VRDs.

Advances in Government Enterprise Architecture

Advances in Government Enterprise Architecture
Author: Saha, Pallab
Publisher: IGI Global
Total Pages: 502
Release: 2008-11-30
Genre: Law
ISBN: 1605660698

Presents current developments, issues, and trends in enterprise architecture (EA). Provides insights into the impact of effective EA on IT governance, IT portfolio management, and IT outsourcing.

Spying Blind

Spying Blind
Author: Amy B. Zegart
Publisher: Princeton University Press
Total Pages: 337
Release: 2009-02-17
Genre: Political Science
ISBN: 1400830273

In this pathbreaking book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11. Until now, those failures have been attributed largely to individual mistakes. But Zegart shows how and why the intelligence system itself left us vulnerable. Zegart argues that after the Cold War ended, the CIA and FBI failed to adapt to the rise of terrorism. She makes the case by conducting painstaking analysis of more than three hundred intelligence reform recommendations and tracing the history of CIA and FBI counterterrorism efforts from 1991 to 2001, drawing extensively from declassified government documents and interviews with more than seventy high-ranking government officials. She finds that political leaders were well aware of the emerging terrorist danger and the urgent need for intelligence reform, but failed to achieve the changes they sought. The same forces that have stymied intelligence reform for decades are to blame: resistance inside U.S. intelligence agencies, the rational interests of politicians and career bureaucrats, and core aspects of our democracy such as the fragmented structure of the federal government. Ultimately failures of adaptation led to failures of performance. Zegart reveals how longstanding organizational weaknesses left unaddressed during the 1990s prevented the CIA and FBI from capitalizing on twenty-three opportunities to disrupt the September 11 plot. Spying Blind is a sobering account of why two of America's most important intelligence agencies failed to adjust to new threats after the Cold War, and why they are unlikely to adapt in the future.

Assessing the Impacts of Changes in the Information Technology R&D Ecosystem

Assessing the Impacts of Changes in the Information Technology R&D Ecosystem
Author: National Research Council
Publisher: National Academies Press
Total Pages: 204
Release: 2009-04-16
Genre: Computers
ISBN: 0309118824

The U.S. information technology (IT) research and development (R&D) ecosystem was the envy of the world in 1995. However, this position of leadership is not a birthright, and it is now under pressure. In recent years, the rapid globalization of markets, labor pools, and capital flows have encouraged many strong national competitors. During the same period, national policies have not sufficiently buttressed the ecosystem, or have generated side effects that have reduced its effectiveness. As a result, the U.S. position in IT leadership today has materially eroded compared with that of prior decades, and the nation risks ceding IT leadership to other nations within a generation. Assessing the Impacts of Changes in the Information Technology R&D Ecosystem calls for a recommitment to providing the resources needed to fuel U.S. IT innovation, to removing important roadblocks that reduce the ecosystem's effectiveness in generating innovation and the fruits of innovation, and to becoming a lead innovator and user of IT. The book examines these issues and makes recommendations to strengthen the U.S. IT R&D ecosystem.

Proceedings of a Workshop on Deterring Cyberattacks

Proceedings of a Workshop on Deterring Cyberattacks
Author: National Research Council
Publisher: National Academies Press
Total Pages: 400
Release: 2010-10-30
Genre: Political Science
ISBN: 0309160359

In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed.