recommended reading

DHS to pick up $6 billion tab for cyber surveillance systems at every department

Blazej Lyjak/Shutterstock

The Homeland Security Department is footing a potentially $6 billion bill to provide civilian agencies with the technology and expertise needed for near real-time threat detection, DHS officials said this week. The White House has demanded so-called continuous monitoring since 2010, but many agencies did not have the resources or know-how to initiate such surveillance.

Under the new five-year project, DHS, which is responsible for protecting civilian networks, will shoulder the financial burden to finish activating continuous monitoring governmentwide. More than 62 percent of the federal government, or 15 out of 24 major civilian agencies, do not have mature surveillance programs, according to internal watchdogs

The new initiative, called continuous monitoring as a service, or CMaaS, will bundle sensors, risk-status displays and professional consulting services for agencies, according to a vendor solicitation released late last month.

Homeland Security plans to split the job among at least five teams, each comprising multiple companies supplying an array of technologies and experts. Military, state and local agencies will be urged to purchase services from the same contract packages to protect dot-mil and municipal government computer systems, but Homeland Security will not cover those costs.

“DHS is responsible for securing unclassified networks for federal executive branch civilian departments and agencies” on the dot-gov domain, Homeland Security spokesman SY Lee said.

Some information technology vendors expect, in the future, similar services will be offered to electricity providers, hospitals and other critical service companies for their private networks, though that is outside the scope of the current initiative.

Executives at prospective contractor Booz Allen Hamilton said their bid for the task will highlight the Virginia-based consulting firm’s own internal continuous monitoring system. “We’re definitely eating our own dog food on continuous monitoring,” said George Schu, a senior vice president who handles the company’s federal cyber business. “I think this is a defining moment for the nation, and the government has an important role.”

Continuous monitoring is intended to quantitatively track computer security protections, detect abnormal network activity, and then illustrate all this data on a central, easy-to-read computer screen, federal officials say. Agency personnel are in charge of interpreting the statistics on those “dashboards” to spot vulnerabilities and fix the most detrimental ones first, Lee said.

Each competitive proposal must include all three CMaaS components: human services, tools and dashboards.

Industry players are creating diverse teams because of the breadth of skills required, Booz Allen officials said. Agencies will be able to select from 15 types of tools, such as applications that identify unauthorized software and users on a system, as well as professional consulting services to operate the tools, the contracting document states.

This week, Homeland Security officials said they anticipate awarding the contracts before October 2013.

Ahead of imminent budget cuts, DHS secured $218 million for continuous monitoring and intrusion detection programs from a continuing resolution that funds the government through March 27.

Threatwatch Alert

Network intrusion

Florida’s Concealed Carry Permit Holders Names Exposed

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.