Looking for an industry assist

State and local governments had just begun to follow the federal government's lead in turning to outside technology firms for help in running agency information technology operations when terrorists attacked New York City and the Pentagon on Sept. 11, 2001.

Now, one year later, as local officials prepare for their role as first responders on the homeland security front, the trend toward tapping the private sector for a range of IT services is expected to accelerate, government insiders and industry observers say.

"We're going to have to bring the private sector in [to help with homeland security initiatives] because the states can't do it all," said one state chief information officer, who asked not to be identified. "And not just for outsourcing ongoing services but also for developing new IT stuff."

Indeed, observers say, the private sector can provide state and local governments with the technological expertise and innovation — along with the economies of scale — needed to help combat terrorism on the home front.

But it won't be as simple as just signing a check and then sitting back. In what will be unfamiliar territory for many, government officials are going to have to decide which parts of their operation can be outsourced successfully, and then find and manage industry partners who they can trust to do the job.

An array of services is available, from developing and running interoperable broadband and wireless communications networks for first responders to protecting agency systems from cyberattacks. Other offerings include disaster recovery, business continuity services, and help developing data standards that allow easy interoperability between disparate databases and systems.

According to Gartner Inc. Dataquest, 80 percent of state officials have named homeland security as a top technology initiative for 2003. What's more, after years of focus on e-government and service to citizens, state budgets now are focusing their limited dollars away from internal development and toward external services providers.

Rishi Sood, a principal analyst for Gartner, expects states and localities to undertake homeland security endeavors in several phases, beginning with ensuring that communications and networking infrastructures work optimally, increasing network security and automating first responders.

Longer-term, government entities will look to build a management model that enables different organizations to work together better. Specifically, how do federal agencies share data, networking and telecommunications services down to the state and local level, and vice versa? How can they build more manageable frameworks that focus on regions and the protection of regions?

"The previous obsession with e-government has morphed into focusing on what the needs of homeland security are, and homeland security has really started to accentuate the need for jurisdictions to work together and actually build common systems rather than their own independent systems," Sood said. "So it's really speaking about some innovative technologies and some newer ways of implementing technology, and that's an area where the private sector really has the best expertise and capability."

"There just hasn't been that follow-on-through development at this point yet," Sood said. "We really expect this to finally begin to take off during the second half of 2003 or early 2004."

Cathy Clements, regional vice president of business development and state government sales for Sprint, said that state CIOs are moving forward with some law enforcement activity, but "overall, homeland security from a policy and funding standpoint is still an unknown at this point."

With so much uncertainty, homeland security remains a sensitive topic for many government officials. Carolyn Purcell, CIO of Texas, a leader in outsourcing thanks to a recent move to turn over the operation of two of its data centers to Northrop Grumman Corp., chose her words carefully when answering the outsourcing question.

"It's almost certain that some of homeland security functions would be outsourced in some way or another," she said. "But I would say that when we do [outsource], we would do it with great deliberation and care to ensure that we do it responsibly."

Skilled government personnel are retiring at an increasingly rapid rate, and 46 of 50 states currently face budget deficits. Many are calling for IT funding cuts, and vendors offer an attractive option to make up the skills and resources gap. They possess more cutting-edge skills and a better grasp on technology than the public sector, and they can do many of the same functions more efficiently and less expensively than the government can in-house.

"States are being forced to cut programs at a time when they know that they're going to have to put some resources into homeland security," said Steve Kolodney, vice president of digital government for American Management Systems Inc. and a former CIO for Washington. "The safest way to go about that is to spread the risk by engaging the private sector where they can, and I think that's a reasonable strategy that some states will begin to deploy."

Many observers note that despite the legislative and financial standoff on Capitol Hill, states already are outsourcing some functions that can support homeland security requirements. "Homeland security represents just a different set of scenarios that you now have to bake into all of your other business activities," said Larry Singer, CIO for Georgia.

For example, long before the terrorist attacks, states were seeking to improve communication between police and other emergency personnel and set up more effective disaster recovery and business continuity centers. But the perceived enemy at that time was more likely to be a hurricane or run-of-the-mill criminal than an international terrorist.

Likewise, states have long been monitoring networks and firewalls against potential intruders and mischief-makers, but this function is now likely to be one of the more prevalent homeland security priorities and a top candidate for outsourcing to the private sector.

This latter trend, said Amit Yoran, vice president of managed security services for Symantec Corp., is as much a function of market maturation and the fact that states now are recognizing the value of focusing their limited in-house resources on strategic security initiatives, while passing off the more day-to-day security management functions to a third-party.

"Sept. 11 was a point that brought increased awareness to cybersecurity and the possibility that terrorists could use networks as an avenue for wreaking havoc," he said. "But it's not like on Sept. 11 we had to redefine how to best protect networks or how to best monitor network systems. There was a valid requirement for these types of solutions long before then, and the solutions that states are asking for and that we are offering have not changed."

For example, the Capital Wireless Integrated Network (CapWIN), a joint project among Maryland, Virginia and Washington, D.C., being built by IBM Corp., will improve voice, data, and video communication among regional law enforcement, public safety and transportation personnel.

IBM will supply the communications bridge to all participating agencies. The network is scheduled to be operational in 2003, and IBM will continue on after that, enhancing the network and rolling it out to additional end users, according to Paul Leuba, IBM's CapWin project manager.

Pennsylvania has been working with KPMG Consulting Inc. to develop the Justice Network, a statewide effort to enhance public safety by providing a common online environment in which authorized state, county and local officials can access offender records and other criminal justice information from 15 participating state agencies.

Another outsourcing project of note is Computer Sciences Corp.'s design and back-end operation of a multilayered biometrics identity management system recently put in place by Pennsylvania's Department of Corrections.

"Credentialing and controlling access has been an issue for some time at government facilities, but this application is now addressing homeland security and the fact that the threat can come from within," said Ben Gianni, vice president of homeland security at CSC.

Georgia, meanwhile, already is responding to homeland security requirements, making the recent decision to turn its firewall monitoring over to Internet Security Systems so that its internal staff can devote more time and resources on the state's intrusion detection systems for cybersecurity.

Singer, who was instrumental in Georgia's recent decision to outsource its broadband telecommunications networks, noted that the decision to outsource some of the state's network security was based on the same criteria he's always relied upon when considering whether to outsource.

"If our needs are the same as everyone else's, if the function is not peculiar to what we do, if it doesn't require peculiar knowledge of our environment and if somebody else, because of their volume and leverage, can do it cheaper than we can, then we're going to outsource it to them," he said. "It shouldn't — and won't — matter what type of technology initiative is involved."

Hayes is a freelance writer based in Stuarts Draft, Va. She can be reached at hbhayes@cfw.com.

NEXT STORY: Milwaukee makes fast response

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.