recommended reading

Commerce wants maps showing where broadband is needed

The absence of a national map that pinpoints localities that lack high-speed Internet access could hinder the federal government from distributing stimulus funds to expand the service in those areas, lawmakers and federal officials said on Thursday.

While federal agencies wait for accurate mapping, they are moving ahead on outreach initiatives to engage potential service providers and grant recipients.

The recovery act provides $4.7 billion for the Commerce Department to accelerate the rollout of high-speed Internet, or broadband, nationwide. It mandates activities such as providing grants to encourage long-term subscribership, retooling public computer facilities and maintaining a broadband inventory map.

"Some applicants will be ready to go from the beginning of the program while others will need more time to undertake planning activities, develop business plans, map broadband availability and build the necessary partnerships to assure project sustainability. These activities may take some applicants months to complete," Mark Seifert, senior adviser to the assistant secretary of Commerce's National Telecommunications and Information Administration, told lawmakers at a House oversight hearing.

Congress also gave the Agriculture Department $2.5 billion to extend services to rural areas. At the hearing, convened by the House Energy and Commerce subcommittee on Communication, Technology and the Internet, David Villano, assistant administrator of USDA's rural development telecommunication program, testified that the department is cooperating with Commerce and the Federal Communications Commission to compile the map.

The subcommittee's ranking member, Cliff Stearns, R-Fla., expressed concerns that the short time frame Congress has given the departments to accomplish their broadband missions may waste taxpayer money. To avoid failure, he urged the relevant agencies to prioritize establishing a comprehensive, nationwide broadband inventory map.

"It's common sense that we should know where to best spend the money before the money is actually spent," he said. Because "nationwide broadband mapping may not be complete before the stimulus requires the funds to be spent" by September 2010, perhaps the agencies should first fund projects in states that have completed maps, Stearns added.

Witnesses representing state and local governments and industry told Stearns that if states start mapping now, they should be able to receive funding before all grants are awarded.

"This [geographic] information that is gathered should be entirely in the public domain," panel member Anthony D. Weiner, D-N.Y., said.

"Openness and transparency have been our guiding principles" in implementation to date, Seifert said in his opening testimony. All public meetings on the broadband programs have been webcast. Those who could not attend virtually or physically were invited to participate via teleconference, and citizens also e-mailed questions.

"This robust approach to public comment will ensure the involvement of taxpayers in the design and implementation of the broadband initiatives in a way that gets recovery act dollars out to the public as quickly as possible to promote job creation and broadband development and deployment," he said. "Moving forward, we will be posting critical funding information, including recipient and fund-use data to accurately track, monitor and report on taxpayer funds."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.