recommended reading

Using Search Tools to Declassify Presidential Docs -- Starting With Reagan's

President Ronald Reagan poses for photographers in the Oval Office.

President Ronald Reagan poses for photographers in the Oval Office. // Ron Edmonds/AP File Photo

The White House plans to speed up the declassification of presidential records by launching new tools to search and automatically analyze documents for possible release, according to the Obama administration’s second round of commitments to the international Open Government Partnership published on Friday.

The CIA and the National Archives and Records Administration will pilot the tools on the Reagan administration’s classified email system, the White House said.

The Archives will also use a new referral and tracking system to automatically notify relevant agencies when records are ready for declassification review and to track whether agencies are meeting declassification deadlines, the plan said.

The plan also renews commitments to be more transparent about the government’s foreign intelligence collection, as President Obama proposed in August following revelations from leaker Edward Snowden about controversial foreign spying programs undertaken by the National Security Agency.

In total, the plan lists 23 new or expanded open government commitments, including plans to channel all Freedom of Information Act requests through a single online portal and to develop common FOIA regulations and practices across federal agencies so journalists, researchers and citizens aren’t faced with a mishmash of different requirements and contacts.

The Center for Effective Government, a transparency organization, called the commitments “bold and ambitious” in a statement on Friday.

 “We are impressed by the scope and detail of the plan, as well as the administration's commitment to continue to engage and refine those commitments for which detailed goals are not yet available,” Sean Moulton, the group’s director of open government policy, said.

Transparency advocates have criticized the Obama administration for not following through on bold claims about its commitment to transparency.

The administration made 26 first-round commitments to the OGP, a voluntary group of 60 nations committed to being more transparent, and claimed to have completed 24 of them in a March report. An independent assessment found the White House had only completed half of those commitments and made only nominal progress on many of them.

Friday’s action plan also included commitments to:

  • Combine data from government systems that track imports and exports into a “single window” to aid researchers and watchdogs
  • Make federal regulations easier to find and read online, perhaps by bringing more agencies into an open source pilot developed by the Consumer Financial Protection Bureau.
  • Relaunch the government data trove Data.gov to include an index of all federal data sets in a single catalog.
  • Explore using computer-to-computer tools that allow citizens to comment on federal regulations through non-government websites.
  • Improve the Federal Emergency Management Agency’s timely release of machine readable data during natural disasters.
  • Publish additional federal contracting data and make more spending data available in machine readable formats
  • Enhance ForeignAssistance.gov, a transparency site for foreign aid spending, and Performance.gov, a site that measures government’s progress toward key goals. 

Threatwatch Alert

Network intrusion / Spear-phishing

Researchers: Bank-Targeting Malware Sales Rise in Dark Web Markets

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.