federal government

National Security Depends on the Utilization of the MGT Act

by James Scott, Sr. Fellow, ICIT Nearly three-quarters of the $80 billion annually spent on federal IT systems is allocated towards the upkeep and maintenance of outdated and vulnerable legacy systems. The majority of these systems predate the Internet, many were “Frankensteined “together ad hoc from technologies that are now older than those tasked with .. read more

ICIT Analysis: The CLOUD Act – Immediate Passage of the CLOUD Act Ensures Unambiguous Protection of Privacy and National Security

The CLOUD Act is meaningful bipartisan legislation that will empower U.S. law enforcement and authorities in countries that enter into agreements with the government to quickly access essential evidence stored in servers owned by companies that are based in the United States, provided that there is probable cause and warrant to access that information. With .. read more

ICIT Analysis: The Graham-Klobuchar Amendment Can Secure Election Infrastructure

Election integrity is a non-partisan issue that merits significant bipartisan support. Multiple players are capable of exploiting the vulnerabilities present in the often insecure, black-box proprietary code and unsecurable, antiquated legacy technology upon which U.S. election tabulation infrastructure relies. The Graham-Klobuchar Amendment aims at achieving Secure State Election Infrastructure through a Federal-State collaborative commission of .. read more

ICIT Analysis: The Cyber Shield Act

Industry experts and federal agencies such as NSA, NASA and NIST have repeatedly pushed for the implementation and standardization of the bare essentials of Information Security, such as security-by-design, cyber-hygiene training, and layered defenses, to be recognized as crucial topics on the Hill.  The Cyber Shield Act is an excellent idea for improving informed consumer .. read more

ICIT Analysis – S.J. Res. 34 – Introduction of Privatized Censorship

With S.J.Res.34, every citizen will have massive amounts of their data exposed when their ISP or a nebulous third-party intentionally or inadvertently fails to adequately secure the information. By drastically expanding that collection, storage, and exchange of data with a few short lines of legislation, Congress has jeopardized the security and privacy of every citizen, every .. read more

ICIT Report: Utilizing the NSA’s CSfC Process- Protecting National Security Systems with Commercial Layered Solutions

The acceleration of State Sponsored and Mercenary APT cyber-attacks, each of which possess new and more innovative layering of stealth and sophistication, has triggered a much needed response by the National Security Agency’s (NSA) Information Assurance Directorate (IAD). A more expedient path to technology approval has been introduced for qualified organizations. As a result, the .. read more