recommended reading

Stimulus hot line is on the horizon

Recovery Accountability and Transparency Board Chairman Earl Devaney announced on Tuesday that his panel is working to establish a hot line for managing public comments and concerns about economic stimulus spending.

But the complexity of incoming advice could present a challenge, he told lawmakers during a House Science and Technology Subcommittee on Investigations and Oversight hearing.

"This hot line, which will allow for input in all manner of communication, cannot simply be an off-the-shelf, plain vanilla hot line, with personnel who do not understand what questions to ask or what information to obtain," Devaney stated in written testimony.

Typically, hot lines are set up to handle one agency or one type of funding, but Devaney's panel is responsible for overseeing governmentwide stimulus spending, ranging from education grants and federal construction contracts to rural development loans and broadband technology programs.

"The board will strive to ensure that any hot line personnel and technology will be both expansive and thorough enough to meet this challenge," he stated.

Devaney also told the subcommittee that "in the next week or two" the board plans to embark on "some sort of competitive process" that will enable information technology vendors to bid on contracts for enhancing Recovery.gov, the federal Web site conceived to trace the spending of stimulus funds.

An online town hall meeting that the board organized in late April to gather ideas about technologies that could improve the site's design and content received 593,000 hits on the first day, Devaney noted. The National Academy of Public Administration, which co-hosted the dialogue, still is assembling the recommendations, he said.

Fraudnet, a Government Accountability Office hot line that precedes the stimulus effort, has gathered more than 25 allegations of misuse of stimulus, bailout and recovery-related funds during the past few months, acting Comptroller General Gene L. Dodaro told lawmakers. The service allows citizens to share evidence of fraudulent activity via phone, fax, e-mail, postal mail or an online form.

Dodaro said it is too soon to discuss details about the allegations received or the status of the ongoing investigations.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.