Information Management

Can the Fed do a better job protecting embargoed economic data?

Shutterstock image: federal reserve.

The Federal Reserve Board, like other agencies that publish critical economic data, works with news media to share sensitive information with the public, including the minutes of the monetary policymaking body of the Federal Reserve System.

Journalists get an advance look at the information, but there's a catch. They must write their stories in special "lockup rooms," where they can't communicate with the outside world. Otherwise there could be leaks, which could have serious consequences for the financial markets.

Yet according to an audit of the Federal Reserve Inspector General dated April 15, the security in the lockup room isn't as tight as it should be.

Wireless connectivity and personal electronic devices are not allowed to members of the media, until they get the OK to file their stories. To be allowed in the lockup room, the media outlet must submit required documents, including a news organization agreement, a letter from the Washington, D.C., bureau chief, and a journalist agreement.

Leaks do happen from time to time. On Aug. 19, 2015, Bloomberg published a headline referencing an in-progress article on the economic forecast of the Federal Open Market Committee 24 minutes before the scheduled release of the data, sending markets into a tizzy.

Over the course of several visits to different lockup rooms, the IG observed some crucial security flaws, including a lack of metal detectors to identify mobile devices, and an inability to guarantee that reporters weren't able to access wireless signals in lockup rooms.

In response to IG recommendations, the Fed has forbidden journalists from bringing their own laptops. Instead, news organizations were required to purchase desktop computers to be stored at the lockup site. Those PCs were shipped directly to the Fed for inspection and installation. Additionally, the Fed installed a device to monitor wireless traffic inside the room, to make sure reporters weren't surreptitiously using connected devices.  

Most of the tech-related vulnerabilities observed by the IG have been addressed by the Fed, according to the report.

About the Author

Bianca Spinosa is an Editorial Fellow at FCW.

Spinosa covers a variety of federal technology news for FCW including workforce development, women in tech, and the intersection of start-ups and agencies. Prior to joining FCW, she was a TV journalist for more than six years, reporting local news in Virginia, Kentucky, and North Carolina. Spinosa is currently pursuing her Master’s degree in Writing at George Mason University, where she also teaches composition. She earned her B.A. from the University of Virginia.

Click here for previous articles by Spinosa, or connect with her on Twitter: @BSpinosa.


Featured

  • Cybersecurity
    malware detection (Alexander Yakimov/Shutterstock.com)

    Microsoft targets copycat influence websites

    Microsoft went to court to take down websites it believes to be part of a foreign intelligence operation targeting conservative think tanks and the U.S. Senate.

  • Cybersecurity
    secure network

    FAA explores shifting its network to FISMA high

    The Federal Aviation Administration is exploring an upgrade to the information security categorization of IT systems as part of air traffic control modernization.

  • Cybersecurity
    Shutterstock photo id 669226093 By Gorodenkoff

    The disinformation game

    The federal government is poised to bring new tools and strategies to bear in the fight against foreign-backed online disinformation campaigns, but how and when they choose to act could have ramifications on the U.S. political ecosystem.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.