Letter to the Editor

Every week I receive my copy of FCW and read those articles that pertain to computer security because that is where my career is focused. I am an information systems security auditor (ISSA) with the second largest cabinet agency in the federal system. I was appointed to that position more than five years ago. During that time, I have gone through a list of computer security audits ranging from reviewing and verifying contingency plans and disaster recovery to penetration tests.

I've been amazed at the grandiose claims that some agency workers make in Federal Computer Week about providing pay increases to the information technology area. I'm an auditor and have seen many of the IT federal employees. There are a few who are capable of handling tomorrow's technology, but there are too many more who are paper pushers or former help-desk employees in good standing. Granted, this creates a level of trust, but to trade that for incompetence? I think we can do better.

Recently while on an audit, I provided an audience of IT staff members with a demonstration of how insecure their system was and how that vulnerability could cost them because they lacked the ability to audit. Talk of this quickly made it back to Washington, D.C., where it had other career-threatening implications. (I may talk of them some other time.)

While I was writing up the report, I felt it was my duty to inform them of how or what steps they could take to test and to determine the measure of their configuration. I called the chief administrator (who, by the way, probably is now receiving this increased pay) to discuss system audit settings. To my amazement, he was completely unaware of how to set up that simple configuration. This was not his fault. This is the fault of an incompetent federal system of management.

Years ago, during a review of top-down responsibility of policy enforcement, the chief information officer's only computer training over the past 10 years was for Microsoft Word and Excel. This was the man responsible for writing information security policy within the second largest federal government agency.

I agree that those who work within the field of ever-changing technology should be paid more, and I also understand that there will be a few incompetents who will slip through the cracks. But today I'm afraid that more than a few populate the area responsible for system security who know little more than how to log on to the network server to set up users.

I know the bureaucracy of the government. I know the petty childish management ploys disguised as taking action while top-level managers are allowed to dictate to IT system administrators that their passwords don't have to comply with policy. I know the good-old-boy system, where the office of the inspector general is informally asked not to disclose findings.

I am bitter at the frustration of standing by and watching while people categorized in the 334 series — whose main function is to download data from a mainframe and import it into a Microsoft document — receive this increase. I am bitter at the frustration of trying to explain the security implications of a misconfigured server to someone who is two pay grades above me and is now receiving a pay increase. I am bitter at the frustration of studying for the CISA, CISSP, CNNA and MCSE exams, reading the latest $50 information security book and going through each day's Common Vulnerabilities and Exposures, Bugtraq, SecurityFocus and InfoSec e-mail. And I am bitter at the frustration of having to set up my own network at home because management thinks a training room connected to the agency network is a lab.

The calamity here is not the incompetence of government management, for I'm sure there are those few who have a good understanding of information security. The calamity is that when there is that attack against a computer, what will management do, re-boot? Or worse, point the finger at the person most capable?

Name withheld upon request


We welcome your comments. To send a letter to the editor, use this form.

Please check out the archive of Letters to the Editor for fellow readers' comments.


  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.