Raytheon gets Massachusetts intelligence center work

Raytheon Co. has won a six-month, $2.9 million contract to install intelligence analysis software for the commonwealth's antiterror fusion center.

U.S. Visit ID system may be missing the mark

Researchers contend the U.S. Visitor and Immigrant Status Indicator Technology program's method for matching fingerprints with images may have a detection probability of only 53 percent.

Navy taps BearingPoint for strategic sourcing work

BearingPoint wins five-year, $55.8 million contract to support the fleet's strategic sourcing initiatives.

Many ports lose out in risk-based grant program

The vast majority of the nation's 361 seaports will not be eligible for funding from the Port Security Grant program from the Homeland Security Department under new risk-based eligibility rules.

Titan wins Navy ship training systems work

Titan Corp. said it won a contract from the Naval Sea Systems Command to help procure engineering and technical services for the Navy's Total Ship Training Systems program.

DOD seeks bandwidth for information systems network

The Defense Department will release a request for proposals to obtain technologies that would add bandwidth to the Defense Information Systems Network.

Acrobat user gaffe exposes classified info

A public military report on an investigation into the shooting death of an Italian security agent includes blocks of classified data that can be deciphered as easily as copying and pasting text.

What went wrong?

When Stephen O'Keeffe introduced members of the newly formed advisory board of the Chief Information Security Officers Exchange at an April 5 press conference, the initiative seemed to have all the elements for success.

Survey: Sarbanes-Oxley has big impact

Sixty-eight percent of U.S. corporate IT executives said complying with the Sarbanes-Oxley Act of 2002 is having a major impact on their IT operations.

New list of critical vulnerabilities released for Q1 2005

The SANS Institute of Bethesda, Md., has begun updating its top 20 list of Internet vulnerabilities on a quarterly basis in an effort to give administrators more timely data to help prioritize patching.

CISO Exchange falls apart

The controversial Chief Information Security Officers Exchange effectively collapsed today, with both of its co-chairs, Rep. Tom Davis (R-Va.), and the federal CIO Council, withdrawing their support.

Capital Roundup

The U.S. Visitor and Immigrant Status Indicator Technology office is set to release a strategic plan as requested by Congress. Not surprisingly, the program office is expected to ask for more money.

Capital Roundup

The U.S. Visitor and Immigrant Status Indicator Technology office is set to release a strategic plan as requested by Congress. Not surprisingly, the program office is expected to ask for more money.

DHS, military spur IT growth

The Homeland Security Department and the Pentagon are the main drivers behind federal IT spending growth, but systems integrators can still expect to see the Office of Management and Budget exerting pressure to control spending.

On the Edge

Concealed weapon no more

Berkeley picked to run NSF cybersecurity effort

The University of California-Berkeley will run a $19 million collaborative cybersecurity effort for the National Science Foundation.

Davis questions involvement in CISO Exchange

House Government Reform Chairman Rep. Tom Davis (R-Va.) is re-evaluating his involvement in the CISO Exchange because of concerns over fees to be charged to industry participants and about the group's structure.

Luigart, Paller honored by CIO Council

The council's Azimuth Awards, handed out each year during FOSE, honor people whose work has benefited government IT.

New push for Safety Act fixes

Contractors supplying new technologies to the Homeland Security Department are renewing their push to ease what they feel is an arduous application process for the department's Safety Act liability protections, and to strengthen the protections for trade secrets they disclose in their applications.