Secret Service doesn't keep IT needs secret

Plans developing for multiphased IT modernization program

The normally hush-hush Secret Service recently went public with details about plans to modernize its aging information technology infrastructure, giving industry and analysts an early look at the service’s IT future.

A path forward

The Secret Service plans to accomplish its Information Integration and Transformation project in four increments, with each one tackling a different part of the problem.

  • Block 1: Modernize IT infrastructure, focusing on database architecture and cybersecurity projects.
  • Block 2: Develop a communication environment for voice and data interoperability.
  • Block 3: Bolster secure information access controls.
  • Block 4: Improve IT capabilities associated with the service’s protective and investigative intelligence operations.

Earlier this month, the Secret Service asked industry for a 10-page technical concept paper to help finalize procurement plans for the multiphased modernization program’s first phase. That first increment will primarily include IT infrastructure modernization, database architecture and maintenance, and cybersecurity. The service said the work will serve as a foundation for subsequent phases.

In a request for information, the Secret Service provided details about its outdated IT and how it hopes the modernization project will improve things. Meanwhile, the service plans to release a request for proposals that includes schedule and cost information for the first increment of the overall modernization program, named Information Integration and Transformation, by mid-January, officials said.

Karen Evans, former administrator of e-government and IT at the Office of Management and Budget, said the service should be commended for outlining its IT goals.

“I think this is great that this is out there because the whole purpose behind an RFI is to get what industry can do for you,” said Evans, now a partner at KE&T Partners. “As a project manager, this is very exciting that an agency would do this for a major IT infrastructure overhaul.”

The service’s needs and modernization plans are extensive, according to the RFI. “The existing IT infrastructure is outdated, beyond life cycle, and at risk of failing,” the service said.

Jonathan Eunice, founder of IT advisory firm Illuminata, said a phased approach to such a project is sound, especially when upgrading from old systems. He also approved of the service’s desire for virtualization and multivendor participation.

Meanwhile, Evans said the service’s IT needs are probably common across the government. She added that when making upgrades, agencies get better solutions when they make more information available.

“If you don’t tell people exactly what you have, then it’s real difficult for you to ascertain what the true cost is going to be to do the upgrades and do the migrations,” Evans said.

About the Author

Ben Bain is a reporter for Federal Computer Week.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group