<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:nb="https://www.newsbreak.com/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>Nextgov/FCW - All Content</title><link>https://www.nextgov.com/</link><description>Federal technology and cybersecurity news and best practices.</description><atom:link href="https://www.nextgov.com/rss/all/" rel="self"></atom:link><language>en-us</language><lastBuildDate>Fri, 10 Apr 2026 17:39:00 -0400</lastBuildDate><item><title>Appeals court removes limits on DOGE access to SSA data despite ‘alarming’ revelations</title><link>https://www.nextgov.com/digital-government/2026/04/appeals-court-removes-limits-doge-access-ssa-data-despite-alarming-revelations/412786/</link><description>The Friday decision follows a January court filing in which the government conceded that DOGE associates may have improperly accessed sensitive data at the agency.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Natalie Alms</dc:creator><pubDate>Fri, 10 Apr 2026 17:39:00 -0400</pubDate><guid>https://www.nextgov.com/digital-government/2026/04/appeals-court-removes-limits-doge-access-ssa-data-despite-alarming-revelations/412786/</guid><category>Digital Government</category><content:encoded>&lt;![CDATA[&lt;p&gt;A federal appeals court vacated a court order limiting the Department of Government Efficiency&amp;rsquo;s access to sensitive data at the Social Security Administration on Friday, handing the Trump administration a victory in its quest to reverse the restrictions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A majority of the U.S. Court of Appeals for the Fourth Circuit said that three organizations suing SSA weren&amp;rsquo;t able to show that irreparable harm was likely without action from the court, reversing a lower court&amp;rsquo;s preliminary injunction from last year that had blocked DOGE from accessing data.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This follows a January court filing&amp;nbsp;in which the government &lt;a href="https://www.nextgov.com/digital-government/2026/01/doge-officials-face-hatch-act-referrals-work-org-aiming-overturn-election-results/410805/?oref=ng-author-river"&gt;conceded&lt;/a&gt; that DOGE associates may have improperly accessed sensitive data at the agency.&lt;/p&gt;

&lt;p&gt;A DOGE employee signed an agreement to share SSA data with an unnamed political advocacy group that wanted to overturn election results in certain states, the government said in a correction to the record. That filing also revealed that much of DOGE&amp;rsquo;s data access occurred outside of official protocols &amp;mdash; and that SSA still doesn&amp;rsquo;t know the full scope of DOGE&amp;rsquo;s data access and sharing, which included the use of an unauthorized server.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The government&amp;rsquo;s recent acknowledgments are alarming and raise serious questions about its earlier conduct before the district court,&amp;rdquo; the Friday &lt;a href="https://www.ca4.uscourts.gov/opinions/251411.P.pdf"&gt;opinion&lt;/a&gt; reads.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The court called recent &lt;a href="https://www.washingtonpost.com/politics/2026/03/10/social-security-data-breach-doge-2/"&gt;reports&lt;/a&gt; about another SSA whistleblower accusing an ex-DOGE associate of planning to take sensitive data on U.S. citizens with him to his job at a government contractor &amp;ldquo;even more alarming&amp;rdquo; in its majority decision written by Judge Toby Heytens.&lt;/p&gt;

&lt;p&gt;The court made its decision to reverse the limit on SSA&amp;rsquo;s data access based on&amp;nbsp;the record before the district court at the time it issued the preliminary injunction, Heytens wrote, noting that the new revelations can be considered by the lower court down the line.&lt;/p&gt;

&lt;p&gt;The Supreme Court already temporarily gave DOGE access to SSA data again last summer in an unsigned decision. On Friday, the Fourth Circuit deferred to the Supreme Court and sent the case back to the district court.&lt;/p&gt;

&lt;p&gt;Judge Robert King argued in a partial dissent that the court should have assessed the merits of the preliminary injunction on the basis of the new, corrected record.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We now know that SSA and the other defendants provided patently false information to the district court in the preliminary injunction proceedings,&amp;rdquo; wrote King. He said prior rulings were &amp;ldquo;rendered on a materially erroneous record. And we know that, going forward, we should not accord the defendants any benefit of the doubt or readily trust in anything they say.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The government also admitted in its correction to the record that two DOGE associates were also granted access to sensitive data after a court issued a temporary restraining order last March blocking DOGE&amp;rsquo;s access to SSA data.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;SSA houses sensitive information like the addresses, Social Security numbers and dates of birth of millions of Americans.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The coalition of unions and retiree advocates suing SSA argues that DOGE got unauthorized access to this information, violating privacy laws and putting Americans at risk.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We look forward to continuing this case in the district court, seeking discovery, and getting to the bottom of this harmful conduct, including demonstrating the harms of DOGE&amp;rsquo;s actions that now appear to extend to the integrity of U.S. elections,&amp;rdquo; said Skye Perryman, president and CEO of Democracy Forward, which is representing the plaintiffs in the case.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/10/041026courthouseNG/large.jpg" width="618" height="284"><media:credit>traveler1116/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/10/041026courthouseNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>DHS intelligence office restructuring would still keep it under ODNI oversight</title><link>https://www.nextgov.com/policy/2026/04/dhs-intelligence-office-restructuring-would-still-keep-it-under-odni-oversight/412780/</link><description>A proposed FY27 overhaul would still leave DHS’s Office of Intelligence and Analysis answerable to the Office of the Director of National Intelligence, despite questions about its oversight.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Fri, 10 Apr 2026 15:34:00 -0400</pubDate><guid>https://www.nextgov.com/policy/2026/04/dhs-intelligence-office-restructuring-would-still-keep-it-under-odni-oversight/412780/</guid><category>Policy</category><content:encoded>&lt;![CDATA[&lt;p&gt;A significant White House plan to fold the Department of Homeland Security&amp;rsquo;s primary intelligence unit into DHS headquarters for the coming fiscal year would not affect its oversight under the Office of the Director of National Intelligence, an administration official told &lt;em&gt;Nextgov/FCW&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://www.nextgov.com/policy/2026/04/presidents-budget-proposes-folding-beleaguered-dhs-intelligence-office-headquarters/412617/"&gt;new reporting structure&lt;/a&gt;, unveiled last week in the president&amp;rsquo;s FY27 budget request, would combine the Office of Intelligence and Analysis and&amp;nbsp;the department&amp;rsquo;s Office of the Secretary and Executive Management, Management Directorate and Office of Situational Awareness into a single unit reporting to the DHS secretary.&lt;/p&gt;

&lt;p&gt;But I&amp;amp;A would still be considered a member of the intelligence community, said the official, who was granted anonymity to discuss the changes.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The planned, internal DHS structural changes noted in the president&amp;rsquo;s budget submission will not impact I&amp;amp;A&amp;rsquo;s membership in the [intelligence community] and will not impact ODNI&amp;rsquo;s oversight over I&amp;amp;A as a member of the IC,&amp;rdquo; the administration official said.&lt;/p&gt;

&lt;p&gt;I&amp;amp;A&amp;rsquo;s status as an official U.S. intelligence component under the budget proposal has not been previously reported. ODNI, led by Director of National Intelligence Tulsi Gabbard, manages the nation&amp;rsquo;s 18 spy agencies.&lt;/p&gt;

&lt;p&gt;The intent to keep I&amp;amp;A under ODNI management could be a reprieve for lawmakers and stakeholders concerned about future oversight of the office. The reorganization of the intelligence shop, which would require congressional approval in upcoming appropriations talks, would mark the most significant change to the office to date, following efforts made last year to sharply scale it back.&lt;/p&gt;

&lt;p&gt;I&amp;amp;A was slated for major workforce reductions in President Donald Trump&amp;rsquo;s second term, as&amp;nbsp;&lt;em&gt;Nextgov/FCW&lt;/em&gt; &lt;a href="https://www.nextgov.com/cybersecurity/2025/07/dhs-plans-shed-most-its-intel-office-workforce/406466/"&gt;first reported&lt;/a&gt; last July. Those plans, which would have only kept some 275 people working at the office, drew &lt;a href="https://www.nextgov.com/people/2025/07/trump-admin-faces-multi-front-pushback-reported-plans-cut-most-dhs-intel-bureau/406508/"&gt;major pushback&lt;/a&gt; from law enforcement organizations and Jewish groups that long relied on the agency to disseminate timely intelligence about threats that concern state, local, tribal and territorial communities. One international organization &lt;a href="https://www.nextgov.com/people/2025/07/private-letter-warned-cuts-dhs-intel-office-would-create-dangerous-intelligence-gaps/406839/"&gt;privately warned Congress&lt;/a&gt; that the proposed cuts would create &amp;ldquo;dangerous intelligence gaps.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The downsizing was &lt;a href="https://www.nextgov.com/people/2025/07/dhs-intelligence-office-halts-staff-cuts-after-stakeholder-backlash/406638/"&gt;put on hold&lt;/a&gt; just days later, but I&amp;amp;A &lt;a href="https://www.nextgov.com/people/2025/10/dhs-intelligence-office-sent-deferred-resignation-offers-shed-staff-recent-months/408660/"&gt;reignited efforts&lt;/a&gt; soon after to more gradually shed its workforce. As of late last year, the office had around 500 full-time employees, a figure that preserved more staff than the initial plans to cap the workforce at 275, though that still halved the 1,000-person operation in place earlier last year. It&amp;rsquo;s possible that more people have since departed.&lt;/p&gt;

&lt;p&gt;The office falls within the purview of the Senate and House Intelligence committees,&amp;nbsp;but its status as a DHS component also subjects it to oversight from the Homeland Security panels in both chambers.&lt;/p&gt;

&lt;p&gt;In November, &lt;em&gt;Nextgov/FCW&lt;/em&gt; &lt;a href="https://www.nextgov.com/policy/2025/11/congress-weighed-measure-curtail-scope-dhs-intelligence-office/409653/"&gt;reported&lt;/a&gt; that the House Intelligence Committee privately weighed a measure in the annual intelligence community authorization bill to significantly curtail the size and scope of I&amp;amp;A. The provision would have barred the office from gathering and analyzing intelligence, effectively turning I&amp;amp;A into a clearinghouse for intelligence findings produced elsewhere and stripping it of standard spy agency collection authorities.&lt;/p&gt;

&lt;p&gt;As part of its mission, I&amp;amp;A helps manage a series of fusion centers around the country that facilitate intelligence sharing between federal agencies and state and local law enforcement, raising questions about stakeholder engagement under the proposed restructuring.&lt;/p&gt;

&lt;p&gt;I&amp;amp;A was born as part of the creation of the Department of Homeland Security after the Sept. 11 terrorist attacks to coordinate intelligence on homeland threats and expand information sharing with state and local authorities. For years, lawmakers on both sides of the aisle have sought to reform the unit amid concerns about &lt;a href="https://www.wyden.senate.gov/news/press-releases/wyden-releases-new-details-about-surveillance-and-interrogation-of-portland-demonstrators-by-department-of-homeland-security-agents"&gt;domestic overreach&lt;/a&gt; and &lt;a href="https://homeland.house.gov/2024/06/28/homeland-republicans-demand-answers-from-dhs-ia-undersecretary-on-terror-threats-intelligence-sharing-challenges-partisanship/"&gt;partisanship&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Its placement in DHS has put it at the center of recurring &lt;a href="https://www.rand.org/content/dam/rand/pubs/monographs/2008/RAND_MG767.sum.pdf"&gt;jurisdictional tensions&lt;/a&gt; with the FBI, which drives much of the nation&amp;rsquo;s domestic intelligence, counterterrorism and counterintelligence work under the Justice Department.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/10/041026DHSNG/large.jpg" width="618" height="284"><media:credit>400tmax/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/10/041026DHSNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Tech bills of the week: Boosting export controls; AI-focused workforce development; and more</title><link>https://www.nextgov.com/policy/2026/04/tech-bills-week-boosting-export-controls-ai-focused-workforce-development-and-more/412779/</link><description>During Congress’s final week in recess, new legislation and amendments that were proposed run the tech policy gamut.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alexandra Kelley and Edward Graham</dc:creator><pubDate>Fri, 10 Apr 2026 15:13:00 -0400</pubDate><guid>https://www.nextgov.com/policy/2026/04/tech-bills-week-boosting-export-controls-ai-focused-workforce-development-and-more/412779/</guid><category>Policy</category><content:encoded>&lt;![CDATA[&lt;p&gt;&lt;strong&gt;Matching export controls&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A group of bipartisan senators introduced a companion bill to &lt;a href="https://www.nextgov.com/policy/2026/04/tech-bills-week-limiting-adversaries-access-us-tech-and-boosting-cyber-apprenticeships/412624/?oref=ng-topic-lander-top-story"&gt;an earlier House measure&lt;/a&gt; that updates semiconductor export control laws to ensure that adversaries cannot purchase key pieces of technology and equipment for semiconductor manufacturing from either the U.S. or its allies.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The Multilateral Alignment of Technology Controls on Hardware Act, introduced on Wednesday, aims to harmonize export controls among the U.S. and its allies to ensure that critical technologies do not fall into the hands of adversarial nations, like China.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Introduced by Sens. Jim Risch, R-Idaho, Pete Ricketts, R-Neb., and Andy Kim, D-N.J., the MATCH Act is also cosponsored by Sen. Chuck Schumer, D-N.Y. On the House side, companion legislation was introduced by Rep. Michael Baumgartner, R-Wash.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Idaho and America are at the leading edge of semiconductor innovation. It is vital we maintain this position by strengthening our export controls and closing loopholes that our adversaries exploit to obtain critical technologies like semiconductor manufacturing equipment,&amp;rdquo; Risch said &lt;a href="https://www.foreign.senate.gov/press/rep/release/risch-ricketts-kim-introduce-match-act-level-the-global-playing-field-for-us-tech"&gt;in a press release&lt;/a&gt;. &amp;ldquo;The MATCH Act will prevent adversaries from undermining the U.S. semiconductor industry and threatening our national security.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The bill targets the essential, or &amp;ldquo;chokepoint,&amp;rdquo; inputs for semiconductor manufacturing as the main subject of the new export controls. If passed, it would prohibit the sale of these chokepoints from the U.S. and allies to countries of concern.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Prepping the U.S. workforce for AI&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Rep. Tim Walberg, R-Mich., introduced a measure on Monday to reauthorize and update the 2014 Workforce Innovation and Opportunity Act to include new provisions that enhance the country&amp;rsquo;s workforce development in the AI era.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A Stronger Workforce for America Act of 2026 hinges on facilitating access for adult learners to apprenticeships, sector partnerships and employer-led training, all housed within the Department of Labor.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The bill also allocates funding for upskilling workers through &amp;ldquo;individual training accounts,&amp;rdquo; hands-on learning and other employer-led and industry-centric initiatives.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The workforce is evolving rapidly, and legislation designed over a decade ago is no longer meeting today&amp;rsquo;s demands,&amp;rdquo; Walberg said in &lt;a href="https://edworkforce.house.gov/news/documentsingle.aspx?DocumentID=413204"&gt;a press release&lt;/a&gt;. &amp;ldquo;This bill modernizes a struggling and underutilized workforce development system, delivering reforms that strengthen participant outcomes and ensure greater accountability for taxpayer dollars. This is a win for employers, job seekers, and taxpayers alike.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.congress.gov/bill/119th-congress/house-bill/8196/text?s=1&amp;amp;r=15"&gt;A second piece of legislation also&lt;/a&gt; seeks to update the Workforce Innovation and Opportunity Act. Introduced on Monday by Rep. Michael Baumgartner, R-Wash., the amendment focuses on adding a &amp;ldquo;Workforce data quality initiative&amp;rdquo; to the larger 2014 law.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Expanding the timeframe for penalizing export control violations&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A House measure &lt;a href="https://mackenzie.house.gov/media/press-releases/mackenzie-castro-introduce-bipartisan-bill-strengthen-export-control"&gt;introduced&lt;/a&gt; on Wednesday seeks to strengthen export control laws by extending the timeframe for addressing violations of U.S. law and clarifying that &amp;ldquo;a civil case is considered commenced when a charging letter is issued.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The proposal &amp;mdash; from Reps. Ryan Mackenzie, R-Pa., and Joaquin Castro, D-Texas &amp;mdash; would increase the statute of limitations for export control violations from five years to 10 years &amp;ldquo;for both civil enforcement actions and criminal prosecutions.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The legislation comes amid &lt;a href="https://www.nextgov.com/policy/2026/04/tech-bills-week-limiting-adversaries-access-us-tech-and-boosting-cyber-apprenticeships/412624/?oref=ng-topic-lander-top-story"&gt;a recent bipartisan, bicameral push&lt;/a&gt; to enhance U.S. export controls so that adversarial nations, like China, cannot easily gain access to sensitive technologies or semiconductor manufacturing equipment made in America.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;As bad actors develop sophisticated tactics to get around U.S. export controls and put our national security at risk, it&amp;rsquo;s essential that U.S. authorities have the legal tools they need to fulfill their missions,&amp;rdquo; Mackenzie said in a statement. &amp;ldquo;This bipartisan bill updates our laws to match today&amp;rsquo;s challenges, giving law enforcement more time to investigate complex cases and enforce accountability for those undermining American interests.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Making data centers pay for increasing energy demands&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Democrats in the House and Senate &lt;a href="https://tonko.house.gov/news/documentsingle.aspx?DocumentID=4569"&gt;introduced legislation&lt;/a&gt; on Thursday to place the onus of high electricity costs on data centers, rather than making surrounding residents shoulder the financial burden of high power demands.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The bill &amp;mdash; introduced in the House by Rep. Paul Tonko, D-N.Y., and in the upper chamber by Sen. Chris Van Hollen, D-Md. &amp;mdash; is in response to the growing electrical needs of data centers powering artificial intelligence technologies. While these centers underpin many of the emerging capabilities transforming public and private sectors, they require massive amounts of energy to operate, which can strain electrical grids and hike up bills.&lt;/p&gt;

&lt;p&gt;The proposal, called the Power for the People Act, would direct the Federal Energy Regulatory Commission to require that data centers pay for local transmission upgrades that have previously been passed down to local communities, as well as create &amp;ldquo;a data center load queue&amp;rdquo; to help offset the electrical demands of the centers. The bill would also direct the Energy Department, as well as state regulatory authorities and nonregulated electric utilities, to work to create &amp;ldquo;data center rate classes&amp;rdquo; to assign appropriate costs to the centers.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Families are already paying higher prices for everything from groceries to healthcare, to gas, to utilities &amp;mdash; they shouldn&amp;rsquo;t be forced to also shoulder the costs for companies building data centers,&amp;rdquo; Tonko said in a statement. &amp;ldquo;Our Power for the People Act balances the need for data center development without pushing those costs onto consumers.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Upgrading and expanding access to quantum research facilities&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;House lawmakers want to give researchers and scientists working within quantum information sciences and technologies the necessary tools to ensure the U.S. is leading in quantum-based systems.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Introduced on Thursday by Reps. Andrea Salinas, D-Ore., and Jim Baird, R-Ind., the Quantum Instrumentation for Science and Engineering Act directs the National Science Foundation to award grants that fund shared research facilities and specialized equipment used by universities, startups and laboratories.&lt;/p&gt;

&lt;p&gt;The bill seeks to amend the National Quantum Initiative Act &amp;ndash;&amp;ndash; which expired in 2023 &amp;ndash;&amp;ndash; to permit NSF to outfit qualifying research facilities and laboratories with the equipment and resources necessary to field QIST research and development.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It also seeks to expand access to said facilities and labs to better enable information sharing and hands-on learning experiences for students.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Quantum science is among the world&amp;rsquo;s fastest-growing areas of research, and leading in quantum research carries significant implications for innovation, our economy, and our national security,&amp;rdquo; Baird &lt;a href="https://salinas.house.gov/media/press-releases/rep-andrea-salinas-introduces-bipartisan-bill-expand-access-quantum-research"&gt;said in the press release&lt;/a&gt;. &amp;ldquo;The U.S. has led the world in quantum science for years. By further investing in this research, this legislation will help ensure we maintain our global competitive advantage.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/10/GettyImages_1399560076/large.jpg" width="618" height="284"><media:credit>Jarmo Piironen/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/10/GettyImages_1399560076/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Data is a strategic asset and a strategic vulnerability</title><link>https://www.nextgov.com/ideas/2026/04/data-strategic-asset-and-strategic-vulnerability/412766/</link><description>COMMENTARY | Treating data a strategic asset and defending it accordingly isn't simply a matter of technology policy; it's a fundamental component of national resilience.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Riccardo Di Blasio</dc:creator><pubDate>Fri, 10 Apr 2026 14:45:00 -0400</pubDate><guid>https://www.nextgov.com/ideas/2026/04/data-strategic-asset-and-strategic-vulnerability/412766/</guid><category>Ideas</category><content:encoded>&lt;![CDATA[&lt;p&gt;A foundational theme has underscored nearly every recent global security discussion: the role of data in national security. What has become clear from conversations with security and government leaders is that data is no longer a secondary concern; it is a primary strategic asset and a critical vulnerability.&lt;/p&gt;

&lt;p&gt;National security now rests on a bedrock of data. This is not a distant concept but a present-day reality. Defense systems, intelligence operations, emergency response grids and critical public services are all built upon vast, interconnected data infrastructures. The rapid integration of artificial intelligence has amplified this trend, transforming data into both a nation&amp;#39;s most powerful tool and its most exposed flank. One prevailing theme across these discussions is the urgent need to shift our thinking about data security from a technical issue to a strategic imperative.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cyber operations as geopolitical instruments&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A major point of consensus among global security leaders is that we are living through a consequential transition. Cyberattacks are no longer isolated technical events but potent instruments of geopolitical pressure. Leaders shared perspectives on how digital disruptions have evolved into direct threats to social, economic&amp;nbsp;and political stability.&lt;/p&gt;

&lt;p&gt;When a nation&amp;#39;s hospitals are disrupted, its power grid destabilized&amp;nbsp;or its government services taken offline, the impact is felt far beyond the digital realm. These attacks are designed to test public trust just as much as they test technical defenses. They intentionally blur the line between cyber warfare and traditional security threats, creating a new front in international statecraft. Yet, as many leaders have noted, the strategic response has not kept pace, with data resilience often remaining siloed as an operational concern. This framing is now dangerously outdated.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Elevating data resilience to critical defense infrastructure&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Modern defense strategies have long recognized the importance of readiness, redundancy&amp;nbsp;and resilience in physical assets. A key takeaway from recent discussions is that the same logic must now be applied with equal rigor to our digital infrastructure. Data integrity, availability&amp;nbsp;and recoverability are foundational pillars of national resilience.&lt;/p&gt;

&lt;p&gt;Without these pillars, even the most advanced defense capabilities are fundamentally compromised. A military force, an intelligence service or a public agency cannot function if its data cannot be trusted, accessed&amp;nbsp;or restored under pressure. This point was particularly emphasized in conversations around the accelerating use of AI for intelligence analysis, threat detection and decision support. The message was clear: data resilience must be elevated to the level of critical infrastructure protection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Untrusted data creates unreliable intelligence&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The effectiveness of AI systems is entirely dependent on the quality and integrity of the data they consume. As one panelist noted, when that data is incomplete, corrupted&amp;nbsp;or inaccessible, the resulting intelligence is not merely flawed &amp;mdash; it can be actively misleading. In high-stakes national security environments, this is not a theoretical risk.&lt;/p&gt;

&lt;p&gt;Corrupted data directly affects situational awareness, compromises decision-making&amp;nbsp;and can ultimately dictate strategic outcomes. As AI becomes more deeply embedded in national security systems, the connection between data resilience and operational credibility becomes absolute. These discussions reinforce a clear reality:&amp;nbsp;you cannot have a credible AI strategy without a robust data resilience strategy to support it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The necessary shift from prevention to continuity&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This evolving threat landscape demands a strategic shift away from purely perimeter-based cybersecurity models. Instead, security leaders and experts are calling for architectures designed for inevitability &amp;mdash; systems built on the assumption that disruption will occur. The focus must be on withstanding, isolating and recovering from incidents quickly.&lt;/p&gt;

&lt;p&gt;Resilience is not about preventing every breach; it is about ensuring continuity when a breach happens. It is the crucial difference between a temporary disruption and a lasting destabilization. This shift in mindset also requires a more rigorous approach to the technology ecosystem itself.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Trust in technology is&amp;nbsp;now a security prerequisite&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A recurring theme was that national security depends not only on what technologies are deployed but also on who builds, operates&amp;nbsp;and maintains them. Trusted vendors, transparent governance&amp;nbsp;and accountable supply chains are no longer abstract policy goals. They are now essential prerequisites for secure outcomes in a deeply interconnected world.&lt;/p&gt;

&lt;p&gt;As data flows across borders and through complex systems, trust must be designed into the infrastructure from the start, not layered on as an afterthought. This requires a new level of scrutiny and collaboration between public and private sectors to establish and enforce standards.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Partnerships are&amp;nbsp;the architecture of modern security&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;One of the most resonant conclusions emerging from global security dialogues is that no single entity can secure the digital future alone. No government, no private company&amp;nbsp;and no alliance can independently manage the scale and complexity of these challenges.&lt;/p&gt;

&lt;p&gt;Partnership &amp;mdash; across borders, sectors&amp;nbsp;and institutions &amp;mdash; is the new architecture of modern security. The discussions centered on how to ensure these partnerships are grounded in shared standards for resilience, transparency and accountability. Building this collaborative framework is the central task for the years ahead.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Securing data Is securing the future&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It&amp;rsquo;s clear that the global security landscape is evolving faster than our traditional frameworks. Data sits at the center of that evolution. Treating it as a strategic asset and defending it accordingly is not simply a matter of technology policy; it is a fundamental component of national resilience. As we look toward the future, the nations best prepared to navigate uncertainty will not be those with the most data, but those that have invested in making their data secure, resilient and worthy of trust.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Riccardo Di Blasio is the Senior Vice President, North America Sales at NetApp.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/10/GettyImages_2233776792_1/large.jpg" width="618" height="284"><media:credit>Just_Super/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/10/GettyImages_2233776792_1/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>US push to counter hackers draws industry deeper into offensive cyber debate</title><link>https://www.nextgov.com/cybersecurity/2026/04/us-push-counter-hackers-draws-industry-deeper-offensive-cyber-debate/412770/</link><description>The White House is expanding the market for offensive cyber capabilities — and drawing more of the private sector into that ecosystem — even as policy boundaries around their use remain unclear.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Fri, 10 Apr 2026 12:22:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/us-push-counter-hackers-draws-industry-deeper-offensive-cyber-debate/412770/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;The U.S. government has an offensive cyber wish list, and the private sector is already bidding. Many federal contractors back the effort, though they still have deeper questions about semantics and where offense ends and defense begins.&lt;/p&gt;

&lt;p&gt;Terms like &amp;ldquo;disruption,&amp;rdquo; &amp;ldquo;cyber effects&amp;rdquo; and &amp;ldquo;defensive operations&amp;rdquo; were flung around in discussions at the RSAC Conference in San Francisco last month, one of the largest cybersecurity gatherings in the world. In discussions during and after the conference, &lt;em&gt;Nextgov/FCW&lt;/em&gt; sought to learn how industry players perceive the vision under President Donald Trump to punch back harder against cyber adversaries, and how those industry leaders might contribute to the cause.&lt;/p&gt;

&lt;p&gt;For the past year, industry executives and U.S. officials in closed-door meetings have weighed the concept of &lt;a href="https://www.nextgov.com/cybersecurity/2025/05/18th-century-war-power-resurfaces-cyber-policy-talks/405526/"&gt;enlisting&lt;/a&gt; private sector cyber titans to hack for the government, inspired by the centuries-old practice of letters of marque and reprisal that made waves in the old days of naval warfare. But last month, National Cyber Director Sean Cairncross appeared to pour cold water on the concept.&lt;/p&gt;

&lt;p&gt;He &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/national-cyber-director-doesnt-envision-industry-doing-offensive-hacking/412176/"&gt;told audience members&lt;/a&gt; at an event that there&amp;rsquo;s &amp;ldquo;an enormous amount of capability on the private sector side,&amp;rdquo; but that he&amp;rsquo;s &amp;ldquo;not talking about private sector, industry or companies engaged in a cyber offensive campaign.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Cairncross said he wants to use the &amp;ldquo;ability of our private sector &amp;hellip; to inform and share information so that the [U.S. government] can respond&amp;rdquo; either defensively or in a more agile way to enemy hackers. His remarks came after the release of Trump&amp;rsquo;s &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/trumps-new-cyber-strategy-details-more-offensive-response-cyber-threats/411963/"&gt;national cyber strategy&lt;/a&gt;, whose first pillar focuses on ways to create obstacles for foreign state cyber operatives and criminal hackers.&lt;/p&gt;

&lt;p&gt;But nearly a dozen interviews with industry stakeholders and former officials indicate that it remains an open question where companies draw the line on cyber offense and where the government does. The boundaries around offensive cyber are often blurred, and the private sector is still trying to learn its place. That uncertainty leaves more questions than answers about how offensive cyber operations should be structured, regulated and integrated into a broader U.S. national security strategy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;New market force&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There&amp;rsquo;s consensus among security leaders that the private sector doesn&amp;rsquo;t want to be deployed for offensive hacking, said Adam Marr&amp;egrave;, chief information security officer at Arctic Wolf. The talk of &amp;ldquo;hacking back&amp;rdquo; comes up every five to ten years, he said, but those talks break down every time for a number of reasons, mainly because of legal and ethical concerns.&lt;/p&gt;

&lt;p&gt;Still, there&amp;rsquo;s &lt;a href="https://www.nextgov.com/cybersecurity/2026/04/pro-iran-hackers-are-targeting-us-industrial-control-systems-advisory-says/412679/?oref=ng-homepage-river"&gt;no indication&lt;/a&gt; that the global cybersecurity environment is calming. Foreign adversaries would &amp;ldquo;absolutely&amp;rdquo; want access to powerful exploits that can steal information or wreak havoc on systems, Marr&amp;egrave; said.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;[Adversaries] are mainly worried about what&amp;rsquo;s effective. So if it works, and if it ain&amp;rsquo;t broke, don&amp;rsquo;t fix it,&amp;rdquo; he said. &amp;ldquo;But if I can find a more exotic exploit that is going to allow me to have more access or access without being detected, or be able to get to somewhere I haven&amp;rsquo;t been able to get before, 100% they&amp;rsquo;re going to be looking for that.&amp;quot;&lt;/p&gt;

&lt;p&gt;Governments across the world are hankering for the latest and greatest hacking tools, said Elad Schulman, CEO of Lasso Security.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;If we are not developing capabilities, our enemies are developing those capabilities,&amp;rdquo; he said. &amp;ldquo;That is why we need to assume that, at any point in time, someone will find and use exploits against us.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;For years, companies have helped develop special technologies for the U.S. government&amp;rsquo;s secret cyber missions. But the new White House cyber strategy&amp;rsquo;s offensive focus sets a tone for companies and their investors, said Rob Joyce, the NSA&amp;rsquo;s former cybersecurity director.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;There&amp;rsquo;s been companies that are defense industrial base firms that know how to sell to the government, and there&amp;rsquo;s been some very boutique cyber companies that sell into the military cyber and intel community,&amp;rdquo; he said. &amp;ldquo;But this has the whole community and people out here in Silicon Valley who are not government-adjacent talking about ideas that they can help with in offensive cyber. I think it changes that ecosystem a little bit.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Joyce is now a venture partner at DataTribe, which invests in early-stage cybersecurity companies often led by people who worked in the intelligence community. He said the government is in the market for an array of cyber capabilities, including vulnerability scanning, exploit development, tooling to analyze cyber threat data and digital infrastructure to obscure the origin of covert cyber operations.&lt;/p&gt;

&lt;p&gt;This week, the cybersecurity world was sent into shock when Anthropic revealed it was holding back a powerful frontier AI model that could find previously undiscovered vulnerabilities at mass scale. The intelligence community is already eyeing its capabilities, &lt;em&gt;Nextgov/FCW&lt;/em&gt; &lt;a href="https://www.nextgov.com/cybersecurity/2026/04/anthropics-glasswing-initiative-raises-questions-us-cyber-operations/412721/?oref=ng-homepage-river"&gt;reported&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Still operating defensively&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Many practitioners are advising the cyber ecosystem to invest in defensive measures, regardless of the White House&amp;rsquo;s more offensive posture.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Being a defender, an ounce of prevention is worth a pound of cure,&amp;rdquo; said Ryan Anschutz, the incident response lead at IBM&amp;rsquo;s X-Force threat intelligence arm and a former FBI official. &amp;ldquo;A defensive prevention perspective, I think, would have more of an impact &amp;hellip; than offensive capabilities, which, quite frankly, some arms of the federal government &amp;mdash; their offensive capabilities far surpass the private sector.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Even among companies that simulate adversary cyberattacks to improve network defenses, known formally as red-teaming, the definition of &amp;ldquo;offensive hacking&amp;rdquo; can get fuzzy.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Would you classify offensive hacking as going out and fingerprinting the threat that was attacking you to gain the threat intelligence?&amp;rdquo; Anschutz said. &amp;ldquo;Is that offensive? Where does that change? Where&amp;rsquo;s the line drawn between what is offensive and what&amp;rsquo;s not offensive?&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The answer depends on who you ask.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Hacking back, in the sense of breaking into adversaries&amp;rsquo; computer systems for data and geopolitical intelligence, takes a level of access that only belongs in the government space, said another industry executive that works closely with the intelligence community on cyber matters.&lt;/p&gt;

&lt;p&gt;Google&amp;rsquo;s threat intelligence arm recently came out swinging with discussions of its new &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/google-launches-threat-disruption-unit-stops-short-calling-it-offensive/412321/"&gt;disruption unit&lt;/a&gt;, though executives soon quashed the notion that the unit is &amp;ldquo;offensive&amp;rdquo; in any way, arguing that removing infrastructure that hackers sit on is a defensive move that impedes their forward operations onto U.S. and allied systems.&lt;/p&gt;

&lt;p&gt;Some companies are building out advanced defensive cyber solutions at as rapid a pace as the offensive market, a sign that a more capable offense is driving equally urgent demand for stronger digital shielding.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We had just seen too many examples over and over again of how burned out these poor kids in these security operations centers are, how just overwhelmed at the enormity of all the alerts, all the boxes always flashing red,&amp;rdquo; said Bill MacMillan, a former CIA official and now the chief product officer at security operations center solutions provider Andesite.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We have to transform. We have to adopt this technology because this is the threat environment and the resource environment that we&amp;rsquo;re operating in,&amp;rdquo; he said.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Considering new frameworks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The offensive philosophy in Washington, D.C., has made some cyber experts weigh the pros and cons of the current legal environment that facilitates hacking activities.&lt;/p&gt;

&lt;p&gt;The NSA, Cyber Command and others are permitted to take more aggressive cyber actions to stop foreign adversaries and criminal hacker gangs. This week, the FBI said it covertly sent &lt;a href="https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-dns-hijacking-network-controlled"&gt;shutdown commands&lt;/a&gt; to kick Russian state-backed hackers out of thousands of routers housed in organizations around the world.&lt;/p&gt;

&lt;p&gt;The move, like many FBI takedowns of digital infrastructure, required court authorization. More broadly, some of the most sensitive intelligence operations do not rely on a standard U.S. court warrant at all.&lt;/p&gt;

&lt;p&gt;Even so, private companies lack those authorities. They may build the capabilities used in cyber operations, but &amp;mdash; like a defense contractor manufacturing a missile &amp;mdash; the decision to deploy them and the consequences that follow rest with the government, not the company.&lt;/p&gt;

&lt;p&gt;But what happens if a firm is hacked and wants to take action? There&amp;rsquo;s room to discuss &amp;ldquo;stand-your-ground&amp;rdquo; laws that could permit companies to respond to intrusions, at least to a certain degree, said Philip George, executive technical strategist at Merlin Cyber.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Obviously, there are some authority issues and some rules of engagement concerns, and we don&amp;rsquo;t necessarily want everyone returning fire or preemptively thwarting an attack,&amp;rdquo; he said. But if attacked in cyberspace, &amp;ldquo;what&amp;rsquo;s the extent that I can return fire, to at least take down infrastructure that may be targeting me?&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Asked if such a legal authority constitutes a counter-attack, he clarified it as a &amp;ldquo;counter-action&amp;rdquo; or &amp;ldquo;counter-response&amp;rdquo; because the former term carries &amp;ldquo;a lot of weight.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Some serious conversations will need to be had about the future of legal measures under this offensive posture, said John Fokker, head of threat intelligence at Trellix and a former official in the Dutch National Police&amp;rsquo;s High-Tech Crime Unit.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;If authorities are operating in the grey area with certain private sector entities, I&amp;rsquo;d much rather define and start talking about that grey area,&amp;rdquo; he said.&lt;/p&gt;

&lt;p&gt;Information-sharing between the public and private sectors &amp;mdash; a cornerstone of modern efforts to stop cyberattacks &amp;mdash; should also continue, he said, though he argued the process should be streamlined given the number of existing groups.&lt;/p&gt;

&lt;p&gt;But one executive said they expect the U.S. government will ultimately find ways to involve private contractors in offensive cyber operations, even as the administration publicly draws limits.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I believe that the government will contract for cyber operations under carefully crafted contracts,&amp;rdquo; said Kevin Spease, president at ISSE Services. &amp;ldquo;It simply depends on how you define it.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;He pointed to past U.S. conflicts where &lt;a href="https://www.govexec.com/management/2007/12/after-blackwater/25928/"&gt;private firms&lt;/a&gt; supported offensive missions, arguing cyber operations could follow a similar path.&lt;/p&gt;

&lt;p&gt;The rationale, Spease added, comes down to capability. The government, in both civilian and defense agencies, already predominantly relies on technology made by the private sector for day-to-day operations.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The private companies have far better expertise,&amp;rdquo; he said. &amp;ldquo;Sometimes it&amp;rsquo;s easier to have a contractor do it.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/10/041026hackNG/large.jpg" width="618" height="284"><media:credit>Anton Petrus/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/10/041026hackNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Judge renews procedures for 702 surveillance program that could soon lapse</title><link>https://www.nextgov.com/policy/2026/04/judge-renews-procedures-702-surveillance-program-could-soon-lapse/412767/</link><description>The program still requires reauthorization from Congress, and the judge notably took issue with how spy agencies use filtering tools to sift through raw data collected by the program.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Fri, 10 Apr 2026 10:40:00 -0400</pubDate><guid>https://www.nextgov.com/policy/2026/04/judge-renews-procedures-702-surveillance-program-could-soon-lapse/412767/</guid><category>Policy</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Trump administration notified Congress that the government&amp;rsquo;s top intelligence court last month renewed its endorsement of a contentious surveillance program, letting it operate for another year even though it&amp;rsquo;s set to expire soon without reapproval from lawmakers, according to two people familiar with the matter.&lt;/p&gt;

&lt;p&gt;But the judge on the Foreign Intelligence Surveillance Court who issued the March 17 ruling raised concerns about filtering tools the FBI, NSA and other agencies use to sift through raw data collected under the program &amp;mdash; known as Section 702 of the Foreign Intelligence Surveillance Act &amp;mdash; one of the people said.&lt;/p&gt;

&lt;p&gt;Both people spoke on the condition of anonymity to discuss details about the sensitive nature of the recertification, some components of which are classified.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Section 702 allows spy agencies to compel internet and telecom providers to turn over contents of phone calls, emails and text messages of foreigners located abroad without a warrant, but, in doing so, agencies can also incidentally collect Americans&amp;rsquo; data if they are communicating with a foreign target. The program is set to expire April 20, unless lawmakers vote to reauthorize it.&lt;/p&gt;

&lt;p&gt;Collected 702 communications are stored in classified databases, where analysts query them for foreign intelligence. Search terms &amp;mdash; known as &amp;ldquo;selectors&amp;rdquo; &amp;mdash; can include names, phone numbers or email addresses of targeted individuals. Analysts may use tools to search stored U.S. person data when they believe doing so is reasonably likely to return useful information for national security investigations.&lt;/p&gt;

&lt;p&gt;The New York Times &lt;a href="https://www.nytimes.com/2026/04/09/us/politics/section-702-surveillance-fisa.html?unlocked_article_code=1.Z1A.1Yqq.2pF-_HJClnJV&amp;amp;smid=nytcore-ios-share"&gt;first reported&lt;/a&gt; details of the recertification and said that, per the judge&amp;rsquo;s ruling, agencies must reengineer filter tools because the court found that narrowing results to an American&amp;rsquo;s collected communications effectively turns a foreign-target search into a U.S.-person query subject to stricter limits. &lt;em&gt;Nextgov/FCW&lt;/em&gt; has not independently confirmed those details.&lt;/p&gt;

&lt;p&gt;Unclassified talking points on the certification obtained by &lt;em&gt;Nextgov/FCW&lt;/em&gt; say the White House has until April 16 to appeal the order or correct the issues presented by the court. The court &amp;ldquo;determined that the proposed approach for the discreet technical capabilities at issue could present deficiencies,&amp;rdquo; according to the talking points, and the Trump administration is &amp;ldquo;working expeditiously to understand the mission impact of the court&amp;rsquo;s order,&amp;rdquo; it adds. The judge&amp;rsquo;s concerns about the querying process suggest spy agencies may not be consistently applying safeguards meant to protect Americans&amp;rsquo; data after being collected.&lt;/p&gt;

&lt;p&gt;The White House did not return a request for comment by the time of publication.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The administration is &lt;a href="https://www.nextgov.com/policy/2026/02/white-house-seeks-clean-extension-controversial-spying-law/411701/?oref=ng-homepage-river"&gt;seeking&lt;/a&gt; a clean 18-month extension of the spying power in Congress, which, if approved, would extend it until October 2027.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Privacy advocates argue that a warrant requirement should be mandated for searches of U.S. person data collected under 702. The intelligence community has historically argued against that measure, saying it would slow down timely investigations and prevent analysts from acting on hunches as they track national security threats.&lt;/p&gt;

&lt;p&gt;Several lawmakers from both sides of the political aisle, including Trump supporters, have backed warrant reforms for the law.&lt;/p&gt;

&lt;p&gt;The recertification and ruling from the judge could give privacy and civil liberties groups more runway to challenge how spy agencies handle Americans&amp;rsquo; data under the program.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The FISA court&amp;rsquo;s recertification of Section 702 is another demonstration of the same pattern we have seen time and time again. The intelligence agencies find workarounds, compliance breaks down, and the public only finds out after the fact. A clean reauthorization represents more of the same. Real reform requires warrants for Americans&amp;rsquo; communications,&amp;rdquo; said Kia Hamadanchy, senior policy counsel at the American Civil Liberties Union.&lt;/p&gt;

&lt;p&gt;Under Section 702, the court annually reviews and approves the procedures governing how agencies collect, handle and search data. The recertification allows the program to continue under court-approved rules, but it does not extend the underlying law and can surface compliance gaps that require agencies to change certain procedures.&lt;/p&gt;

&lt;p&gt;A &lt;a href="https://www.intel.gov/assets/documents/702-documents/declassified/2025/FISC_Opinion_Cert_ABC_03182025_Redacted.pdf"&gt;declassified version&lt;/a&gt; of last year&amp;rsquo;s certifications shows the FBI used an &amp;ldquo;Advanced Filter Function&amp;rdquo; that allowed users to &amp;ldquo;select a specific FBI casefile number or facility, using a drop-down menu or search bar&amp;rdquo; to review communications of individuals in contact with foreign targets.&lt;/p&gt;

&lt;p&gt;But the FBI later &amp;ldquo;deactivated&amp;rdquo; the tool after the Justice Department found that selecting those individuals &amp;ldquo;resulted in queries of raw information,&amp;rdquo; rather than merely sorting the results of prior searches, and that the government lacked sufficient records to determine whether those queries complied with applicable requirements. Those queries could have included communications involving U.S. persons, which would trigger stricter rules on how the data is accessed and used.&lt;/p&gt;

&lt;p&gt;The split between the court&amp;rsquo;s recertification process and Congress&amp;rsquo;s role in renewing Section 702 can create legal gray areas. The intelligence court approves the rules governing the program, but only lawmakers can extend the authority itself, raising questions about compliance if the statute lapses.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In 2024, two service providers privately &lt;a href="https://www.washingtonpost.com/national-security/2024/04/19/fisa-702-surveillance-internet/"&gt;warned they would stop complying&lt;/a&gt; if the law was not renewed, despite the program having been recertified that year.&lt;/p&gt;

&lt;p&gt;Section 702, enacted in 2008, codified parts of the once-secret Stellarwind surveillance program created under the Bush administration after the Sept. 11, 2001, attacks. In 2013, former NSA contractor Edward Snowden disclosed documents detailing how the authority was used, fueling a global debate over privacy and mass surveillance.&lt;/p&gt;

&lt;p&gt;The program is frequently used to track myriad national security threats, including hackers, terrorist groups and foreign intelligence operatives. This week, around four dozen former national security officials &lt;a href="https://www.nextgov.com/policy/2026/04/former-national-security-officials-urge-congress-renew-section-702-expiration/412703/?oref=ng-homepage-river"&gt;urged&lt;/a&gt; Congress to renew the spying power before it expires.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Editor&amp;#39;s note: This article has been updated to include details from the unclassified talking points on the certification that were obtained by &lt;/em&gt;Nextgov/FCW&lt;em&gt;.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/10/041026courtNG/large.jpg" width="618" height="284"><media:credit>Tatiana rico/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/10/041026courtNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Treasury debuts effort to share cyber threat intel with crypto firms</title><link>https://www.nextgov.com/cybersecurity/2026/04/treasury-debuts-effort-share-cyber-threat-intel-crypto-firms/412756/</link><description>The move signals that Treasury is increasingly treating cryptocurrency firms as part of the nation’s core financial infrastructure, making them a prime target for hackers.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Thu, 09 Apr 2026 16:25:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/treasury-debuts-effort-share-cyber-threat-intel-crypto-firms/412756/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Treasury Department said Thursday it will begin sharing cyber threat intelligence with cryptocurrency firms following a string of incidents in which hackers siphoned off millions of dollars in customer funds.&lt;/p&gt;

&lt;p&gt;The department&amp;rsquo;s Office of Cybersecurity and Critical Infrastructure Protection &lt;a href="https://home.treasury.gov/news/press-releases/sb0437"&gt;announced&lt;/a&gt; the effort to &amp;ldquo;provide timely, actionable cybersecurity information to eligible U.S. digital asset firms and industry organizations, helping them better identify, prevent, and respond to cyber threats targeting their customers and networks.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Under the program, qualifying U.S. digital asset firms and industry groups that meet agency criteria will be able to access the same threat intelligence the department already distributes to traditional financial institutions at no cost.&lt;/p&gt;

&lt;p&gt;The move signals Treasury is increasingly treating cryptocurrency firms as part of the nation&amp;rsquo;s core financial infrastructure, folding them into existing cyber threat-sharing channels as officials grow more concerned about the scale and sophistication of attacks targeting the sector.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Cyber threats targeting digital asset platforms are growing in frequency and sophistication,&amp;rdquo; said Cory Wilson, deputy assistant secretary for cybersecurity at the Treasury Department. &amp;ldquo;This initiative expands access to actionable threat information that helps firms strengthen defenses, reduce risk, and respond more effectively to incidents.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Cryptocurrency is becoming increasingly central to U.S. entities seeking to go after hackers, as such bad actors often seek to steal cryptocurrency or use it as a payment method to exchange stolen data.&lt;/p&gt;

&lt;p&gt;North Korea has built a reputation for installing &lt;a href="https://www.nextgov.com/cybersecurity/2025/06/us-unveils-multiple-operations-shutter-north-korean-it-worker-schemes/406421/"&gt;shadow workers&lt;/a&gt; in firms around the world to steal cryptocurrency and other financial assets to fund their regime, especially its missile program. Earlier this month, DPRK-aligned hackers &lt;a href="https://www.chainalysis.com/blog/lessons-from-the-drift-hack/"&gt;stole&lt;/a&gt; some $285 million from Drift Protocol, a Solana-based decentralized derivatives exchange, in a breach that wiped out more than half of the platform&amp;rsquo;s total value in the system.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/09/040926TreasuryNG/large.jpg" width="618" height="284"><media:credit>Yasin Ozturk/Anadolu Agency via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/09/040926TreasuryNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>When the storm hits: What Hurricane Katrina still teaches federal leaders about continuity of operations</title><link>https://www.nextgov.com/ideas/2026/04/when-storm-hits-what-hurricane-katrina-still-teaches-federal-leaders-about-continuity-operations/412743/</link><description>COMMENTARY | Make continuity planning an operational discipline rather than a compliance exercise.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Erika Dinnie</dc:creator><pubDate>Thu, 09 Apr 2026 14:33:00 -0400</pubDate><guid>https://www.nextgov.com/ideas/2026/04/when-storm-hits-what-hurricane-katrina-still-teaches-federal-leaders-about-continuity-operations/412743/</guid><category>Ideas</category><content:encoded>&lt;![CDATA[&lt;p&gt;One of the most vivid lessons from my Public Buildings Service career came from a building manager responsible for a federal courthouse in downtown New Orleans during Hurricane Katrina.&lt;/p&gt;

&lt;p&gt;As floodwaters rose and much of the city lost power and communications, he faced a situation no training manual had fully anticipated. Supply chains were cut off, transportation routes were impassable, and communications systems were unreliable at best. There was no playbook for a disaster of that magnitude.&lt;/p&gt;

&lt;p&gt;What he relied on instead was preparation, relationships and resourcefulness as he worked through the night to secure and preserve the historic courthouse.&lt;/p&gt;

&lt;p&gt;That story stayed with me during every continuity exercise and operational planning session throughout my years supporting the Public Buildings Service and federal IT continuity of operations (COOP). It reinforced something that every government technology leader eventually learns: continuity is not a binder on a shelf. It&amp;rsquo;s a living capability that must be built, practiced and refined long before a crisis occurs.&lt;/p&gt;

&lt;p&gt;During my time leading IT COOP functions, our teams planned and exercised scenarios across the spectrum of modern threats. These included natural disasters affecting federal facilities, extended power outages impacting data centers and telecommunications infrastructure, civil unrest disrupting transportation and staffing availability and enterprise-scale cybersecurity incidents affecting mission systems.&lt;/p&gt;

&lt;p&gt;While each scenario had unique characteristics, four factors repeatedly proved decisive whether organizations maintained operations or became overwhelmed by the scenario.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The first factor is communication.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In any major incident, primary communication systems are often the first capability to fail. Networks go down. Cellular towers become overloaded. Email systems become unreachable.&lt;/p&gt;

&lt;p&gt;Organizations that maintain situational awareness during a crisis are those that have established redundant communication channels in advance. That means more than knowing satellite phones exist somewhere in the organization.&lt;/p&gt;

&lt;p&gt;It means pre-positioning alternate communication devices at key locations, training personnel on how to use them and establishing out-of-band communication protocols that operate independently of primary networks. These systems must be exercised regularly so teams know how to use them when stress levels are high and time is limited.&lt;/p&gt;

&lt;p&gt;Continuity planning must assume that primary systems will fail. The goal is ensuring operations do not fail with them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The second factor is supply chain resilience.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;One of the earliest lessons from the response to Katrina was how quickly supply chain assumptions break down during a regional disaster. Vendors cannot reach affected areas. Fuel deliveries stop. Hardware replacements that normally arrive overnight may take weeks.&lt;/p&gt;

&lt;p&gt;For federal agencies that rely heavily on specialized equipment and service providers, this creates significant operational risk.&lt;/p&gt;

&lt;p&gt;Resilient organizations address this risk by asking difficult questions of their partners before an incident occurs. Where are vendor warehouses located? Could they be affected by the same regional event that impacts agency facilities? What inventory exists today for critical equipment and consumables? Can shipments be redirected to alternate facilities if primary locations become inaccessible?&lt;/p&gt;

&lt;p&gt;Supply chain resilience is often viewed as a procurement issue. In reality, it is a strategic continuity function that must be integrated into COOP planning from the outset.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The third factor is the ability to reconstitute operations quickly from an alternate site.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The true test of a COOP program is not the existence of documentation but whether an organization can resume mission-critical functions fast enough to maintain its responsibilities to the public.&lt;/p&gt;

&lt;p&gt;Speed matters. Every hour of downtime can affect citizen services, regulatory oversight and public trust.&lt;/p&gt;

&lt;p&gt;Successful reconstitution depends on three elements working together. First, access to critical records and documentation. System configurations, operational procedures and mission data must be accessible from alternate locations through secure and verified backup systems.&lt;/p&gt;

&lt;p&gt;Second, clear chains of command. During a crisis, ambiguity about authority can paralyze an organization. Personnel must know in advance who is responsible for key decisions and who assumes authority if primary leaders are unavailable.&lt;/p&gt;

&lt;p&gt;Third, delegation of authority. When primary decision-makers cannot be reached, other personnel must be empowered to act. Delegation is not a bureaucratic formality; it is a fundamental requirement for operational continuity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The fourth factor is technology readiness.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Modern federal operations depend on complex digital systems, which means continuity planning must account for the resilience of networks, applications and data environments. Agencies must determine which systems are truly mission-critical and define the minimum viable environment required to restore those capabilities.&lt;/p&gt;

&lt;p&gt;This may include redundant network paths, alternate data center or cloud environments, endpoint management tools capable of operating in degraded network conditions and secure out-of-band administrative access.&lt;/p&gt;

&lt;p&gt;However, the most important step is testing.&lt;/p&gt;

&lt;p&gt;A system that has never been exercised during a continuity drill remains an unknown quantity. The worst time to discover a configuration error or access control issue is during a real-world incident.&lt;/p&gt;

&lt;p&gt;Organizations that recover most effectively from disruptions share one additional characteristic: continuity is embedded in their culture.&lt;/p&gt;

&lt;p&gt;Leaders regularly ask &amp;ldquo;what happens if&amp;rdquo; questions during planning and procurement discussions. Staff time is dedicated to exercises and scenario planning. Gaps discovered during testing are treated as valuable intelligence rather than problems to conceal.&lt;/p&gt;

&lt;p&gt;Today&amp;rsquo;s federal agencies face an expanding range of potential disruptions. Natural disasters remain a constant risk, but they are now joined by cyber threats capable of disabling systems across entire enterprises, geopolitical instability affecting supply chains and infrastructure failures that can cascade across interconnected networks.&lt;/p&gt;

&lt;p&gt;Make continuity planning an operational discipline rather than a compliance exercise. The next major disruption is on the horizon. The question for federal technology leaders is not whether their organizations will face disruption but whether they will be ready when it arrives.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Erika Dinnie joined MetTel as the Vice President, Federal Strategy &amp;amp; Planning, to further expand MetTel&amp;rsquo;s growing Public Sector team based in Washington, D.C. Prior to joining MetTel, Ms. Dinnie served as the GSA&amp;rsquo;s Associate CIO for Digital Infrastructure Technologies for nearly ten years, overseeing GSA&amp;rsquo;s IT infrastructure, systems, software, and applications for its 17,500-user base. Before joining the GSA, Ms. Dinnie was Assistant Commissioner, Head of Workplace Services for Public Buildings Service (PBS) from 2011-2014.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/09/GettyImages_53533772/large.jpg" width="618" height="284"><media:description>Flooded neigborhoods can be seen as the Coast Guard conducts initial Hurricane Katrina damage assessment overflights August 29, 2005 in New Orleans, Louisiana.</media:description><media:credit>Kyle Niemi/US Coast Guard via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/09/GettyImages_53533772/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>CIA plans for ‘AI coworkers’, deputy director says</title><link>https://www.nextgov.com/artificial-intelligence/2026/04/cia-plans-ai-coworkers-deputy-director-says/412744/</link><description>The spy agency managed a few hundred AI projects last year, and recently used AI to generate an intelligence report for the first time, deputy director Michael Ellis said.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Thu, 09 Apr 2026 14:09:00 -0400</pubDate><guid>https://www.nextgov.com/artificial-intelligence/2026/04/cia-plans-ai-coworkers-deputy-director-says/412744/</guid><category>Artificial Intelligence</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Central Intelligence Agency aims to integrate artificial intelligence-powered &amp;ldquo;coworkers&amp;rdquo; into analysts&amp;rsquo; workflows in the coming years&amp;nbsp;as part of an effort&amp;nbsp;to rapidly adopt the emerging capabilities&amp;nbsp;for use in intelligence-gathering and analysis, a top official said Thursday.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;CIA Deputy Director Michael Ellis said these AI coworkers would be housed in agency analytics platforms to help with basic tasks, though humans would still be looped into the process.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;It won&amp;rsquo;t do the thinking for our analysts, but it will help draft key judgments, edit for clarity and compare drafts against tradecraft standards,&amp;rdquo; he said in a speech at a Special Competitive Studies Project event focused on AI and the intelligence community. The AI tools&amp;nbsp;would provide triage assistance and flag trends for human analysts to conduct further review.&lt;/p&gt;

&lt;p&gt;Within a decade, the CIA will treat AI tools as an &amp;ldquo;autonomous mission partner&amp;rdquo; and officers will manage teams of AI agents in a hybrid model to increase the speed and scale of intelligence work, Ellis added.&lt;/p&gt;

&lt;p&gt;Last year, the agency had more than 300 AI projects, and, for the first time in its history, AI was recently used to generate an intelligence report, he said.&lt;/p&gt;

&lt;p&gt;The remarks provide a rare public glimpse into how one of the nation&amp;rsquo;s top spy agencies is integrating frontier AI systems into its day-to-day operations, and they signal that such platforms are expected to become a daily feature of officers&amp;rsquo; workflows in the near future.&lt;/p&gt;

&lt;p&gt;The CIA primarily executes and coordinates human intelligence gathering overseas, often done undercover. Officers recruit and manage foreign assets to clandestinely gather intelligence on areas like economics, terrorism and cyber threats.&lt;/p&gt;

&lt;p&gt;Much of that work often involves the use of technology, though some have recently argued the advent of advanced AI tools may push the CIA more toward &lt;a href="https://www.nextgov.com/artificial-intelligence/2026/04/old-school-spycraft-could-make-comeback-ai-undermines-trust/412532/"&gt;old-world tradecraft techniques&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;But there have been benefits to technological investments. The agency recently elevated its Center for Cyber Intelligence into an entire mission center, a move that&amp;rsquo;s &amp;ldquo;paying dividends already by allowing us to deploy new tools to the field and gain more access to priority targets,&amp;rdquo; Ellis said.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The battle of cybersecurity will be a battle of artificial intelligence,&amp;rdquo; and whoever capitalizes on the best AI models will wield &amp;ldquo;enormous power,&amp;rdquo; he added. &amp;ldquo;Having a new mission center centered around cyber intelligence will put us on the path to secure the upper hand.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The agency also recently announced a new &lt;a href="https://www.nextgov.com/acquisition/2026/02/cia-announces-new-acquisition-framework-speed-tech-adoption/411285/"&gt;acquisition framework&lt;/a&gt; to overhaul how it integrates technology into its missions.&lt;/p&gt;

&lt;p&gt;In an effort to track how foreign adversaries like China are using advanced AI and other technologies, the CIA doubled its technology-related foreign intelligence reporting, said Ellis. Those intelligence products focus on technology use abroad and can include findings on areas like semiconductors, cloud computing, infrastructure, cybersecurity or R&amp;amp;D.&lt;/p&gt;

&lt;p&gt;Ellis did not mention Anthropic&amp;rsquo;s recent Project Glasswing announcement, a consortium announced earlier this week meant to help secure critical software against AI-driven attacks. The project was fueled by a powerful, non-public Anthropic frontier model the company says has already uncovered thousands of vulnerabilities but could be weaponized in the wrong hands.&lt;/p&gt;

&lt;p&gt;The intelligence community and its industry partners are already examining and discussing how such a model may impact the future of cyber missions, &lt;em&gt;Nextgov/FCW&lt;/em&gt; &lt;a href="https://www.nextgov.com/cybersecurity/2026/04/anthropics-glasswing-initiative-raises-questions-us-cyber-operations/412721/?oref=ng-author-river"&gt;reported&lt;/a&gt; Wednesday.&lt;/p&gt;

&lt;p&gt;Earlier this year, Anthropic declined to &lt;a href="https://www.defenseone.com/threats/2026/02/it-would-take-pentagon-months-replace-anthropics-ai-tools-sources/411741/?__hstc=7334573.b81c520ae99515baa41a0565b9bf46be.1772661158928.1775682574417.1775755278536.77&amp;amp;__hssc=7334573.5.1775755278536&amp;amp;__hsfp=e330fa4a975e9d0e1aadd34ded81ad5c"&gt;ease restrictions&lt;/a&gt; against its tools being used for domestic surveillance or fully autonomous weapons for Pentagon use, triggering a &amp;ldquo;supply chain risk&amp;rdquo; designation from the Defense Department and a White House order that all federal agencies phase out their uses of Anthropic tools. The company has legally challenged the move.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ellis did not single out Anthropic specifically, though he cautioned that the CIA &amp;ldquo;cannot allow the whims of a single company&amp;rdquo; to constrain its use of AI and said the agency is looking to diversify across multiple vendors to preserve operational freedom.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/09/040926CIANG/large.jpg" width="618" height="284"><media:description>CIA Deputy Director Michael Ellis speaks April 9 at a Special Competitive Studies Project event.</media:description><media:credit>David DiMolfetta/Staff</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/09/040926CIANG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>OpenAI national security lead endorses ‘appropriate human judgment’ in AI</title><link>https://www.nextgov.com/artificial-intelligence/2026/04/openai-national-security-lead-endorses-appropriate-human-judgment-ai/412738/</link><description>Sasha Baker, OpenAI’s head of national security policy, said a “workforce transformation” is needed to make sure that humans are making the final calls to keep people and systems safe.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alexandra Kelley</dc:creator><pubDate>Thu, 09 Apr 2026 12:59:00 -0400</pubDate><guid>https://www.nextgov.com/artificial-intelligence/2026/04/openai-national-security-lead-endorses-appropriate-human-judgment-ai/412738/</guid><category>Artificial Intelligence</category><content:encoded>&lt;![CDATA[&lt;p&gt;Workforce transformation and the application of &amp;ldquo;appropriate human judgment&amp;rdquo; will be necessary when incorporating advanced artificial intelligence capabilities into defense operations, according to OpenAI&amp;rsquo;s head of national security policy.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I do think there&amp;#39;s a workforce transformation that we&amp;#39;re facing where we&amp;#39;re going to have to educate a generation of analysts, of service members, of Foreign Service officers, to ensure that they&amp;#39;re still applying &amp;mdash; in the Pentagon, they call it &amp;lsquo;appropriate human judgment,&amp;rsquo;&amp;rdquo; Sasha Baker, head of National Security Policy at OpenAI, said during a Thursday&amp;nbsp;conference hosted by the Special Competitive Studies Project.&lt;/p&gt;

&lt;p&gt;In defense operations, the consequences of an incorrect decision fueled by AI systems are &amp;ldquo;much greater&amp;rdquo; depending on the use case, Baker continued. Her comments come amid the &lt;a href="https://www.nextgov.com/artificial-intelligence/2026/03/what-rights-do-ai-companies-have-government-contracts/411801/"&gt;ongoing fallout between Anthropic and the Pentagon&lt;/a&gt; over how AI products contracted by the federal government should be used in warfighter operations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Just after the Trump administration canceled the contract between the Pentagon and Anthropic and &lt;a href="https://www.nextgov.com/acquisition/2026/03/private-sector-former-military-leaders-urge-congress-intervene-pentagon-anthropic-dispute/411932/"&gt;further blacklisted the company&lt;/a&gt; in federal operations, &lt;a href="https://www.nextgov.com/artificial-intelligence/2026/03/what-rights-do-ai-companies-have-government-contracts/411801/"&gt;OpenAI announced a deal&lt;/a&gt; with the Pentagon&amp;nbsp;&lt;a href="https://x.com/sama/status/2027578652477821175"&gt;and said&lt;/a&gt;&amp;nbsp;the agency agreed to Anthropic&amp;rsquo;s original stipulations: prohibitions on U.S. citizen surveillance and human presence in autonomous weapons.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;When you think about the potential for AI transformation, it really impacts the entire spectrum of the work that we do as a national security community, from making your paperwork a little bit easier and more efficient all the way to potentially revolutionizing the targeting cycle,&amp;rdquo; Baker&amp;nbsp;said.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Baker reiterated OpenAI&amp;rsquo;s prioritization of safety in advanced AI deployment during the conference, saying that, as of now, no large language model is foolproof, including OpenAI&amp;rsquo;s flagship model ChatGPT. Baker mentioned &lt;a href="https://openai.com/index/trusted-access-for-cyber/"&gt;OpenAI&amp;rsquo;s Trusted Access&lt;/a&gt; program as a filter for AI models with a level of safety applied, such as user protocols.&lt;/p&gt;

&lt;p&gt;Baker&amp;rsquo;s comments were in&amp;nbsp;response to the recent announcement of &lt;a href="https://www.anthropic.com/glasswing"&gt;Project Glasswing&lt;/a&gt;, a new Anthropic program that is distributing&amp;nbsp;the company&amp;rsquo;s high-powered beta Claude Mythos Preview model to select tech companies as a means to test its cyber capabilities.&lt;/p&gt;

&lt;p&gt;She also briefly discussed the latest OpenAI model, Spud, which is still in development, saying cybersecurity is top of mind ahead of its release, similar to the process Anthropic is taking with its Mythos Preview model.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;As Spud leaves the laboratory environment and becomes widely accessible, we do want to make sure that cyber defenders get a chance to both understand the model capabilities and potentially use it to patch vulnerabilities that might otherwise become significant from a national security perspective,&amp;rdquo; Baker said.&lt;/p&gt;

&lt;p&gt;In addition to expanding on OpenAI&amp;rsquo;s security posture when crafting and deploying its AI models, Baker discussed her effort to bring OpenAI engineers to Congress, the White House and the Pentagon to evangelize the technical&amp;nbsp;facts about AI with&amp;nbsp;policymakers and to foster smart, strategic AI adoption in government workflows.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I do worry a little bit that we&amp;#39;ll try a bunch of wrong things before we get to the right thing,&amp;rdquo; she said. &amp;ldquo;I hope that we get there before there is a crisis that really forces us to galvanize and come together. I think we can do it.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/09/040926BakerNG/large.jpg" width="618" height="284"><media:description>Sasha Baker, then-US Acting Under Secretary of Defense for Policy speaks during a press conference in Seoul on September 15, 2023. </media:description><media:credit>ANTHONY WALLACE/AFP via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/09/040926BakerNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Treasury is creating a database with pandemic aid recipients’ sensitive information</title><link>https://www.nextgov.com/digital-government/2026/04/treasury-creating-database-pandemic-aid-recipients-sensitive-information/412722/</link><description>Critics say the scope established in the agency’s systems of record notice “is an astonishing and dramatic departure from prior Treasury practice.”</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Natalie Alms</dc:creator><pubDate>Wed, 08 Apr 2026 17:44:00 -0400</pubDate><guid>https://www.nextgov.com/digital-government/2026/04/treasury-creating-database-pandemic-aid-recipients-sensitive-information/412722/</guid><category>Digital Government</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Treasury Department is pooling information about people who received benefits from pandemic-era relief programs in a new, central database it says will be used to conduct program audits.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It&amp;rsquo;s the latest front in the Trump administration&amp;rsquo;s efforts to centralize government data, including information typically held by states about people who receive nutrition benefits and jobless aid. Many of the administration&amp;rsquo;s previous attempts have been subject to lawsuits.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Critics say the department&amp;rsquo;s required &lt;a href="https://www.federalregister.gov/documents/2026/02/04/2026-02234/privacy-act-systems-of-records#dates"&gt;notice&lt;/a&gt; for the system is imprecise, overly broad and runs afoul of privacy laws governing the federal government. Treasury is amassing addresses, financial data, Social Security numbers and other data in the new system, which it says it may cross-match with other government data.&lt;/p&gt;

&lt;p&gt;Typically, these types of notices are &amp;ldquo;routine matters that do not warrant comment,&amp;rdquo; Steve Sharpe, senior attorney at the National Consumer Law Center, said in a statement. &amp;ldquo;But the scope of this notice is an astonishing and dramatic departure from prior Treasury practice.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The NCLC, a nonprofit focused on economic justice, called the new system a &amp;ldquo;baseless violation of privacy&amp;rdquo; in a &lt;a href="https://www.nclc.org/wp-content/uploads/2026/03/Comment-91-Fed-Reg-5155.pdf"&gt;comment&lt;/a&gt; on the February notice that it submitted with over 40 other organizations, including many state and local legal aid groups.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Treasury&amp;rsquo;s plan &amp;ldquo;could be construed to reach millions of individuals,&amp;rdquo; the comment reads.&lt;/p&gt;

&lt;p&gt;The database will include information about the individuals and entities, like small businesses, receiving benefits from eight department programs, Treasury&amp;rsquo;s notice says. Congress created many of these during the pandemic to provide emergency relief.&lt;/p&gt;

&lt;p&gt;Other programs feeding data into the new system, like one created to rebuild the Gulf Coast after the Deepwater Horizon oil spill in 2010, have no relation to the pandemic. The new system could also include other programs administered by the Treasury in addition to those listed in the formal filing, the notice says.&lt;/p&gt;

&lt;p&gt;Local governments administer some of these programs, and they&amp;rsquo;re already required to report subrecipient and vendor information, the National League of Cities, the United States Conference of Mayors and National Association of Counties say in a &lt;a href="https://naco.sharefile.com/share/view/s75871bbda8684003b7f9b16e984f7dde"&gt;comment&lt;/a&gt;, which also emphasizes the cost that reporting new data would entail, especially after some of these programs have been shuttered following the end of the pandemic.&lt;/p&gt;

&lt;p&gt;Treasury did not respond to a request for comment. But if it moves forward with the new system as described in the notice, it will be saving information about a long list of people &amp;mdash; not only those who receive assistance, but also people &amp;ldquo;associated&amp;rdquo; with the nonprofits, small businesses and other entities that received or delivered aid. The system will also house application information, which could include sensitive financial information.&lt;/p&gt;

&lt;p&gt;The nonprofit Association of Public Data Users wrote in its &lt;a href="https://cdt.org/wp-content/uploads/2026/03/2026-03-04-APDU-Comments-on-2026-02234-91-FR-5155.pdf"&gt;comment&lt;/a&gt; that the notice &amp;ldquo;seems designed particularly to obfuscate the purpose of the collection and potential uses of the data.&amp;rdquo;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Although the stated purpose of the system is for audits, &amp;ldquo;we suspect the unstated purpose of the system of records is not to audit at all, but to get access to the information held by states that Treasury cannot otherwise directly compel them to submit to the federal government,&amp;rdquo; continues APDU&amp;rsquo;s comment, which it submitted with nine other organizations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The Trump administration has pressured a range of state and local entities to share data with the federal government since the beginning of last year, including voter files.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The Electronic Privacy Information Center argues in its &lt;a href="https://epic.org/wp-content/uploads/2026/03/EPIC-Financial-Assistance-Programs-Comment-final.pdf"&gt;comment&lt;/a&gt;, which got sign-on from other organizations like the Center for Democracy and Technology, that the new system runs afoul of the Privacy Act&amp;rsquo;s principles of minimizing data collection, calling the proposed program &amp;ldquo;illegal and reckless.&amp;rdquo;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The notice signals more of the same &amp;ldquo;data grab playbook&amp;rdquo; from the administration, John Davisson, litigation director for EPIC, told &lt;em&gt;Nextgov/FCW&lt;/em&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Time and again we&amp;#39;ve seen this administration exploit personal data to construct wildly exaggerated narratives of waste and fraud, to carry out brutal immigration enforcement tactics, and attempt to undermine the right to vote,&amp;rdquo; he said.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/08/040826TreasuryNG/large.jpg" width="618" height="284"><media:credit>J. David Ake/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/08/040826TreasuryNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>HHS replaces COBOL-based payroll system</title><link>https://www.nextgov.com/modernization/2026/04/hhs-replaces-cobol-based-payroll-system/412723/</link><description>The deployment of the new cloud-based system came after eight months of collaboration between HHS, the Federal Aviation Administration and the Defense Finance and Accounting Service.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Edward Graham</dc:creator><pubDate>Wed, 08 Apr 2026 17:23:00 -0400</pubDate><guid>https://www.nextgov.com/modernization/2026/04/hhs-replaces-cobol-based-payroll-system/412723/</guid><category>Modernization</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Department of Health and Human Services has successfully replaced an outdated, COBOL-based payroll system &amp;ldquo;with a secure, cloud-based platform that reduces administrative burden and improves service delivery,&amp;rdquo; the agency announced on Wednesday.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;HHS said the new platform is the culmination of an eight-month partnership with the Federal Aviation Administration and the Defense Finance and Accounting Service to transition away from the legacy system. COBOL is a computer programming language that is often considered antiquated, despite the coding continuing to underpin many federal government systems.&lt;/p&gt;

&lt;p&gt;In a &lt;a href="https://www.hhs.gov/press-room/hhs-replaces-legacy-payroll-system-improving-service-delivery.html"&gt;press release&lt;/a&gt;, the agency said it worked with the FAA to analyze &amp;ldquo;complex business logic and mapped system dependencies,&amp;rdquo; while end-to-end testing was conducted with the FAA, DFAS and internal HHS teams. HHS said it led the &amp;ldquo;design, development, and deployment of the [new] solution on a secure cloud platform.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The modernized system will reduce maintenance costs and speed up payroll processing, according to HHS, which said &amp;quot;tasks that once required up to six hours of manual effort are now completed in minutes through automation, improving speed, accuracy, and reliability.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The effort was led by the Office of the Chief Information Officer, which &amp;mdash; &lt;a href="https://www.nextgov.com/policy/2026/03/hhs-reverses-biden-era-restructuring-its-it-and-tech-operations/412520/"&gt;until very recently&lt;/a&gt; &amp;mdash; did not directly oversee three of the top agencywide technology roles. HHS announced on March 31 that it was reversing a Biden-era restructuring of the agency and would be consolidating the chief technology officer, chief data officer and chief artificial intelligence officer roles within OCIO.&lt;/p&gt;

&lt;p&gt;In a statement, HHS CIO Clark Minor said &amp;ldquo;by replacing outdated technology and driving collaboration across agencies, we are increasing efficiency, strengthening security, and delivering more reliable, higher-quality services to the American people.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;HHS said replacing its COBOL-based payroll system with the cloud-based platform is in keeping with the Office of Personnel Management&amp;rsquo;s &lt;a href="https://www.opm.gov/news/news-releases/one-hr-system-for-the-entire-federal-government-opm-and-omb-announce-major-reform/"&gt;Federal Human Resources 2.0 initiative&lt;/a&gt;, which is working to combine more than 100 governmentwide HR systems into one platform.&lt;/p&gt;

&lt;p&gt;In a &lt;a href="https://www.hhs.gov/sites/default/files/fy-2027-budget-in-brief.pdf"&gt;brief&lt;/a&gt; detailing HHS&amp;rsquo; proposed fiscal year 2027 budget that was released by the White House on Friday, the agency referenced OPM&amp;rsquo;s push to create a consolidated HR platform and said OCIO &amp;ldquo;will invest $16 million to maximize interoperability with this new governmentwide, secure, cloud-based system.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/08/040826HHSNG/large.jpg" width="618" height="284"><media:credit>Michael A. McCoy/For The Washington Post via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/08/040826HHSNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Anthropic’s Glasswing initiative raises questions for US cyber operations</title><link>https://www.nextgov.com/cybersecurity/2026/04/anthropics-glasswing-initiative-raises-questions-us-cyber-operations/412721/</link><description>Intelligence officials and industry are weighing how Claude Mythos Preview could reshape hacking and cyberdefense. The company has also briefed senior officials on the AI model it says has already uncovered thousands of cyber vulnerabilities.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Patrick Tucker, Alexandra Kelley, and David DiMolfetta</dc:creator><pubDate>Wed, 08 Apr 2026 17:08:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/anthropics-glasswing-initiative-raises-questions-us-cyber-operations/412721/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;Anthropic&amp;rsquo;s decision to hold back a powerful frontier AI model over cybersecurity risks, paired with a new initiative to study its effects on global networks, is prompting discussions about how such tools could reshape hacking operations within the U.S. intelligence community, and how they might be used to identify and exploit weaknesses in adversary systems.&lt;/p&gt;

&lt;p&gt;The company unveiled Project Glasswing on Tuesday, seeking to help secure critical software against AI-driven attacks, with partners including Amazon Web Services, Apple, Cisco, Google, Microsoft and others. Those participants will gain access to Claude Mythos Preview, an unreleased model the company says has already uncovered thousands of vulnerabilities as Anthropic looks to steer its tools toward defensive cybersecurity use.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The fallout &amp;mdash; for economies, public safety, and national security &amp;mdash; could be severe. Project Glasswing is an urgent attempt to put these capabilities to work for defensive purposes,&amp;rdquo; the AI company said in a &lt;a href="https://www.anthropic.com/glasswing"&gt;Tuesday blog&lt;/a&gt;. The Mythos Preview model &amp;ldquo;has already found thousands of high-severity vulnerabilities, including some in every major operating system and web browser,&amp;rdquo; it says.&lt;/p&gt;

&lt;p&gt;The intelligence community is reacting to the news, according to a person familiar with the thinking of multiple IC agencies.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;They want secure code and to use AI to find network vulnerabilities as well,&amp;rdquo; said the person, who, like some others in this story, spoke on the condition of anonymity to describe sensitive internal deliberations.&lt;/p&gt;

&lt;p&gt;Prior to any external release, Anthropic briefed senior officials across the U.S. government on Mythos Preview&amp;rsquo;s full capabilities, including both offensive and defensive cyber applications, said an Anthropic official. That engagement has included discussions with the Cybersecurity and Infrastructure Security Agency and NIST&amp;rsquo;s Center for AI Standards and Innovation, among others.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Bringing government into the loop early &amp;mdash; on what the model can do, where the risks are, and how we&amp;rsquo;re managing them &amp;mdash; was a priority from the start,&amp;rdquo; the company official said.&lt;/p&gt;

&lt;p&gt;Analysts inside the National Security Agency have also been casually chatting about the release of the Mythos model, another person familiar with the matter told &lt;em&gt;Nextgov/FCW&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Multiple intelligence agencies and Defense Department components play roles in both offensive cyber operations and defending U.S. networks. Because offensive missions often depend on understanding a target&amp;rsquo;s defenses, tools like the Mythos model in the wrong hands could help adversaries identify and exploit weaknesses in critical systems. Agencies are already known to &lt;a href="https://vce.usc.edu/volume-6-issue-1/the-ethics-of-stockpiling-zero-day-vulnerabilities/"&gt;stockpile hacking exploits&lt;/a&gt; for future use.&lt;/p&gt;

&lt;p&gt;The development is also drawing major attention and concern, in some cases, from cyber-focused firms that engage with the intelligence community.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;How is anyone supposed to defend against all of this at once?&amp;rdquo; said one executive at a cyber investment firm, alarmed by the scale at which the Anthropic model was able to identify vulnerabilities.&lt;/p&gt;

&lt;p&gt;The Glasswing news is &amp;ldquo;scary and ominous&amp;rdquo; because it isn&amp;rsquo;t clear how Mythos Preview could be used offensively, especially if it falls into the hands of a foreign adversary, said Hayden Smith, a co-founder at Hunted Labs, a company focused on software supply chain risks.&lt;/p&gt;

&lt;p&gt;It&amp;rsquo;s very possible the model could land in the possession of governments considered hostile to the U.S., he said, explaining that &amp;ldquo;even with deep vetting, the odds of Mythos flowing into the wrong hands is barely a hypothetical given the landscape of current attacks on the open source ecosystem and software supply chain.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Because much of the internet runs on widely used open-source software maintained by developers around the world, tools like Mythos could uncover weaknesses in code that underpin large parts of the digital ecosystem.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That dynamic has come into sharper focus following recent software supply chain incidents that had widespread repercussions &amp;mdash; including a compromise of the &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/north-korea-linked-hackers-suspected-axios-open-source-hijack-google-analysts-say/412523/"&gt;Axios JavaScript library&lt;/a&gt; disclosed last week &amp;mdash; and amid concerns that some developers behind critical open-source projects are &lt;a href="https://www.nextgov.com/cybersecurity/2025/08/report-russia-based-yandex-employee-oversees-open-source-software-approved-dod-use/407703/"&gt;affiliated with companies&lt;/a&gt; the U.S. government considers tied to foreign adversaries.&lt;/p&gt;

&lt;p&gt;Capitol Hill is also paying attention to the Anthropic development.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We are already seeing cyber threat actors using AI tools to improve their capabilities, putting government, businesses and consumers&amp;rsquo; security and personal information at risk,&amp;rdquo; said Sen. Mark Warner, D-Va., the vice chairman of the Senate Intelligence Committee. &amp;ldquo;As AI dramatically accelerates the discovery of new vulnerabilities, I hope industry will correspondingly accelerate and reprioritize patching.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Observers have been awaiting the release of a model like Mythos Preview that could identify and exploit cyber vulnerabilities at scale for some time, said Morgan Adamski, the former executive director at U.S. Cyber Command and lead for PwC&amp;rsquo;s Cyber, Data &amp;amp; Technology Risk services.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;For those in the offensive cyber community, for the U.S. government, there&amp;rsquo;s obviously a huge potential there from an adversarial perspective,&amp;rdquo; she said in an interview.&lt;/p&gt;

&lt;p&gt;But offense and defense are, in many ways, one and the same. If cyberintelligence analysts find a novel vulnerability in an enemy computer network, it&amp;rsquo;s possible a U.S. system might have the same vulnerability, too.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;There&amp;rsquo;s going to be a real equity conversation that occurs,&amp;rdquo; Adamski said. &amp;ldquo;If we exploit something in an adversarial network, we&amp;rsquo;re going to have to be able to defend against it in our own critical infrastructure.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;She also said to expect more of these innovations in the AI space, as &amp;ldquo;typically, when these types of models come out, other models aren&amp;rsquo;t far behind.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;In an interview, Gary DePreta, the senior vice president of Cisco&amp;rsquo;s U.S. Public Sector Organization, told &lt;em&gt;Nextgov/FCW&lt;/em&gt; that the company&amp;rsquo;s participation in Project Glasswing is part of its larger aim to address cybersecurity threats while bringing the benefits of AI to its customer base.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We&amp;rsquo;re going from an age of detect-and-respond &amp;mdash; and as we automate with AI &amp;mdash; to predict-and-prevent threats,&amp;rdquo; DePreta said on Wednesday. &amp;ldquo;We keep saying this phrase at Cisco: &amp;lsquo;there is a paradox of progress as it relates to AI and the enterprise.&amp;rsquo; And what it simply means is the capabilities of AI are far exceeding the enterprise&amp;rsquo;s ability to implement it in a safe and secure way.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Anthropic has become a major voice in the line AI companies are willing to draw in ethical uses of their technology, though that stance has drawn friction with the U.S. military. Earlier this year, the company declined to ease restrictions against its tools being used for domestic surveillance or fully autonomous weapons &lt;a href="https://www.defenseone.com/threats/2026/02/it-would-take-pentagon-months-replace-anthropics-ai-tools-sources/411741/"&gt;for Pentagon use&lt;/a&gt;, triggering a &amp;ldquo;supply chain risk&amp;rdquo; designation from the Defense Department and a White House order that all federal agencies phase out their uses of Anthropic tools. The company has &lt;a href="https://www.cnbc.com/2026/03/26/anthropic-pentagon-dod-claude-court-ruling.html"&gt;legally challenged&lt;/a&gt; the move.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It&amp;rsquo;s possible that the Mythos announcement may reshape how the Defense Department interacts with the company.&lt;/p&gt;

&lt;p&gt;The government &amp;ldquo;needs to make amends with Anthropic and help them and Glasswing members maintain the American lead on AI by preventing Chinese model theft,&amp;rdquo; said Leah Siskind, an AI research fellow at the Foundation for Defense of Democracies think tank.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Anthropic is making the responsible call &amp;mdash; but adversaries won&amp;rsquo;t,&amp;rdquo; she said. &amp;ldquo;China is already exploiting U.S. AI models to accelerate its own capabilities, and when they reach Mythos-level performance, they will weaponize it.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/08/040826GlasswingNG/large.jpg" width="618" height="284"><media:credit>Samuel Boivin/NurPhoto via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/08/040826GlasswingNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>As aircraft losses mount, Pentagon wants a software fix to see through the fog of war</title><link>https://www.nextgov.com/modernization/2026/04/aircraft-losses-mount-pentagon-wants-software-fix-see-through-fog-war/412705/</link><description>The Defense Department is looking to update how older planes see each other and absorb data.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Patrick Tucker</dc:creator><pubDate>Wed, 08 Apr 2026 11:32:00 -0400</pubDate><guid>https://www.nextgov.com/modernization/2026/04/aircraft-losses-mount-pentagon-wants-software-fix-see-through-fog-war/412705/</guid><category>Modernization</category><content:encoded>&lt;![CDATA[&lt;p&gt;The U.S. planes that have gone down in the Middle East since the launch of Operation Epic Fury all lacked the same thing: a common operating picture that includes relevant intelligence and data. The Defense Innovation Unit &lt;a href="https://www.diu.mil/work-with-us/submit-solution/PROJ00662"&gt;announced&lt;/a&gt; Monday it&amp;rsquo;s looking for a fix.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The request: an open-architecture software suite to fuse real-time data into a credible picture of moving objects, threats, and conditions. The idea is to give pilots a broader understanding of reality in a way that is unremarkable to American motorists with easy access to data about ever-changing conditions but aspirational for air crews flying planes outfitted with antique computer hardware.&lt;/p&gt;

&lt;p&gt;U.S. Air Force officials &lt;a href="https://www.defenseone.com/policy/2024/03/air-mobility-commander-pushes-connectivity-outdated-mobility-fleet/395355/"&gt;have warned&lt;/a&gt; of a lack of a common operating picture among airframes, particularly transport planes like C-130s, for years. But the loss of seven aircraft in just over a month, due mostly to communication errors and friendly fire, has exposed a big gap in how U.S. planes communicate with one another and with ground forces.&lt;/p&gt;

&lt;p&gt;At the outset of the war on Iran, the U.S. lost three F-15E Strike Eagles &lt;a href="https://www.centcom.mil/MEDIA/PRESS-RELEASES/Press-Release-View/Article/4418568/three-us-f-15s-involved-in-friendly-fire-incident-in-kuwait-pilots-safe/"&gt;due to&lt;/a&gt; Kuwaiti friendly fire. In March, &lt;a href="https://www.defenseone.com/defense-systems/2026/03/it-keeps-me-night-kc-135-crash-underscores-necessary-comms-upgrades-leaders-say/412317/"&gt;they lost a KC-130&lt;/a&gt; refueling tanker when it was involved in a mid-air mishap with a second tanker, due in part to a transponder failure but, again, pointing to a gap in the planes&amp;rsquo; ability to fuse data to identify one another.&lt;/p&gt;

&lt;p&gt;During the rescue effort that followed an Iranian shootdown of an F-15E Strike Eagle and an A-10 Thunderbolt on April 3, the U.S. destroyed two &lt;a href="https://www.wsj.com/livecoverage/iran-war-news-2026/card/u-s-special-ops-planes-destroyed-in-iran-cost-more-than-100-million-each-TNFAZRMdqQY2wuzmIfQI"&gt;MC-130J transport planes&lt;/a&gt; when the planes were unable to take off from their makeshift runway, U.S. President Donald Trump &lt;a href="https://www.dailymail.co.uk/news/article-15710345/Trump-reveals-155-aircraft-involved-daring-rescue-airman-scrambled-cliff-faces-treating-wounds-contacted-US-forces-special-beeper.html"&gt;said&lt;/a&gt; in a press conference on Monday.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;It was sandy, wet sand, so we thought there may a problem taking off because of the weight of the plane&amp;hellip; And then we also had all the men jumping back onto the planes, and they got pretty well bogged down.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;It&amp;rsquo;s the sort of problem that access to real-time data on terrain, weather, and other factors could have solved. But most older transport planes lack up-to-date maps or terrain data, forcing crews to &amp;ldquo;rely heavily on pre-mission planning products, voice updates, and aging platform-specific displays,&amp;rdquo; according to DIU&amp;rsquo;s ask.&lt;/p&gt;

&lt;p&gt;Because computer hardware varies widely throughout the U.S. aircraft fleet, the Air Force and aircrews frequently use workarounds such as software-defined radios or off-the-shelf communications equipment to get the data they need. But there is no common standard, which makes it difficult for aircrews to know what data they need.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;This problem is especially relevant for large, high-value airlift and tanker aircraft that utilize avionics and mission systems that are optimized for more permissive operations,&amp;rdquo; according to the announcement for DIU&amp;rsquo;s &amp;ldquo;Open Mission Engine&amp;rdquo; program. The new effort seeks software that can combine all the relevant friend, foe, intelligence, and logistics data into one place in real time, not afterward.&lt;/p&gt;

&lt;p&gt;While the solicitation doesn&amp;rsquo;t mention Operation Epic Fury by name, the rising number of U.S. military aircraft mishaps shows how urgently the U.S. military needs a way to better let planes communicate with each other.&lt;/p&gt;

&lt;p&gt;Among the features that DIU wants the new software &amp;ldquo;engine&amp;rdquo; to have is a &amp;ldquo;moving map&amp;rdquo; application that &amp;ldquo;uses relevant operational data into a single aircrew display, including blue-force awareness, threat and airspace overlays, mission updates, and route decision support.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/08/9559209/large.jpg" width="618" height="284"><media:description>U.S. Air Force pilots prepare for take off in a C-130J in the U.S. Central Command area of responsibility during Operation Epic Fury, March 10, 2026.</media:description><media:credit>U.S. Air Force </media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/08/9559209/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Former national security officials urge Congress to renew Section 702 before expiration</title><link>https://www.nextgov.com/policy/2026/04/former-national-security-officials-urge-congress-renew-section-702-expiration/412703/</link><description>The surveillance program lapses April 19 unless renewed by Congress. The Trump administration is asking for a clean, 18-month extension.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Wed, 08 Apr 2026 10:54:00 -0400</pubDate><guid>https://www.nextgov.com/policy/2026/04/former-national-security-officials-urge-congress-renew-section-702-expiration/412703/</guid><category>Policy</category><content:encoded>&lt;![CDATA[&lt;p&gt;Around four dozen former national security officials urged Congress to renew a contentious spying power before it expires later this month, asking that lawmakers ensure the reauthorization process doesn&amp;rsquo;t get entangled with other legislative matters, according to a letter obtained by &lt;em&gt;Nextgov/FCW&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Section 702 of the Foreign Intelligence Surveillance Act allows the FBI, NSA and other intelligence agencies to gather overseas foreigners&amp;rsquo; communications without a warrant.&lt;/p&gt;

&lt;p&gt;The authority is legally limited to non-U.S. persons abroad, but it can sweep in Americans&amp;rsquo; texts, emails and phone calls when they communicate with overseas targets, raising Fourth Amendment concerns from privacy advocates. It lapses after April 19 unless lawmakers vote to renew it.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We cannot afford to let our Intelligence Community lose this tool that helps keep our nation safe, even for a day,&amp;rdquo; said the letter, which was sent earlier this week.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It was signed by top intelligence and law enforcement veterans, including former NSA deputy director George Barnes, former FBI director Chris Wray, former director of national intelligence James Clapper and former CIA director John Brennan.&lt;/p&gt;

&lt;p&gt;The letter pushes back on efforts made by&amp;nbsp;&lt;a href="https://www.wyden.senate.gov/news/press-releases/wyden-lee-davidson-and-lofgren-introduce-bill-to-reform-fisa-section-702-protect-americans-constitutional-rights-and-plug-data-broker-surveillance-loophole#:~:text=Closing%20the%20data%20broker%20loophole%3A%20The%20bill%20bans%20the%20federal%20government%20from%20buying%20Americans%E2%80%99%20data%20from%20data%20brokers%20without%20a%20warrant."&gt;some members of Congress&lt;/a&gt; to concurrently address the intelligence community&amp;rsquo;s &lt;a href="https://www.nextgov.com/defense/2024/01/nsa-illegally-purchases-americans-internet-data-without-warrant-senator-says/393644/"&gt;purchases of commercial&lt;/a&gt; data without a warrant as part of the Section 702 renewal.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Some have sought to use this reauthorization as an occasion to address concerns about&amp;nbsp;government acquisition of Americans&amp;rsquo; information from commercial data brokers,&amp;rdquo; the letter says. &amp;ldquo;But as you know, Section 702 is a targeted statute governing electronic surveillance of non-U.S. persons abroad. The matter of data broker purchases has nothing to do with Section 702, is fundamentally distinct from FISA, and should not be conflated with or delay the urgent need for the Act&amp;rsquo;s renewal.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The letter&amp;rsquo;s signatories also reference a staff report issued last week by&amp;nbsp;the Privacy and Civil Liberties Oversight Board&amp;nbsp;that largely backed the use of Section 702 since its last renewal in 2024. That report&amp;nbsp;has received &lt;a href="https://www.nextgov.com/policy/2026/04/single-member-surveillance-watchdog-backs-702-powers-raising-independence-questions/412595/"&gt;major pushback&lt;/a&gt; from civil liberties groups, who have questioned its conclusions because it was produced under a sub-quorum policy with only one Republican member.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Privacy advocates argue that a warrant measure should be required for searches of U.S. person data swept up under 702. The intelligence community has traditionally argued against that measure because they say it would slow down timely investigations and prevent analysts from acting on hunches as they track national security threats.&lt;/p&gt;

&lt;p&gt;Efforts to require warrants for 702 searches involving Americans&amp;rsquo; communications came close to success during the 2024 reauthorization debate, when a House amendment failed after a 212&amp;ndash;212 tie vote.&lt;/p&gt;

&lt;p&gt;Some progressive members of Congress have sought to craft a softer version of a warrant measure that would grant some exceptions for certain U.S. person searches, according to two congressional aides with knowledge of the matter. One example of this could be an urgent case where intelligence analysts want to query an IP address to locate a U.S. organization and notify them that they were targeted by hackers, said one of the aides.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Both requested anonymity to speak candidly about closed-door legislative discussions concerning the surveillance power.&lt;/p&gt;

&lt;p&gt;But time is limited. Congress is in recess this week, limiting lawmakers&amp;rsquo; available calendar time before the authority&amp;rsquo;s expiration. April 19 falls on a Sunday, opening the possibility of lawmakers working on the weekend to reach a deal.&lt;/p&gt;

&lt;p&gt;Many in Congress are still in a &amp;ldquo;wait-and-see&amp;rdquo; mode, despite Capitol Hill running up close to the renewal deadline. The whip count for lawmakers who would vote for or against cleanly renewing the spying power is not entirely clear, according to both the congressional aides.&lt;/p&gt;

&lt;p&gt;The Trump administration is seeking a &lt;a href="https://www.nextgov.com/policy/2026/02/white-house-seeks-clean-extension-controversial-spying-law/411701/"&gt;clean 18-month extension&lt;/a&gt; of the law and has sent top intelligence officials to Capitol Hill for meetings to discuss renewal with lawmakers and their staff. Several lawmakers from both sides of the political aisle, including Trump supporters, have historically backed warrant reforms for the law.&lt;/p&gt;

&lt;p&gt;Section 702 allows the intelligence community to compel U.S. tech, telecom and information service providers to supply access to targets&amp;rsquo; communications, in part because much of the world&amp;rsquo;s internet traffic transits backbone infrastructure based in the United States.&lt;/p&gt;

&lt;p&gt;The statute was enacted in 2008, codifying parts of the once-secret Stellarwind surveillance program created under the Bush administration after the Sept. 11, 2001, terrorist attacks. In 2013, former NSA contractor Edward Snowden disclosed documents detailing how the authority was used, fueling a global debate over privacy and mass surveillance.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/08/040826CapitolNG/large.jpg" width="618" height="284"><media:credit>Andrew Harnik/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/08/040826CapitolNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>VA’s FY27 budget proposal seeks funding for additional AI adoption</title><link>https://www.nextgov.com/artificial-intelligence/2026/04/vas-fy27-budget-proposal-seeks-funding-additional-ai-adoption/412687/</link><description>VA’s decision intelligence and automation activities would see a 10.9% increase over FY26 enacted levels, with the growth “driven primarily by the AI Infrastructure solution.”</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Edward Graham</dc:creator><pubDate>Tue, 07 Apr 2026 16:36:00 -0400</pubDate><guid>https://www.nextgov.com/artificial-intelligence/2026/04/vas-fy27-budget-proposal-seeks-funding-additional-ai-adoption/412687/</guid><category>Artificial Intelligence</category><content:encoded>&lt;![CDATA[&lt;p&gt;The White House wants to allocate more funds to the Department of Veterans Affairs to help expand the agency&amp;rsquo;s use of artificial intelligence tools in fiscal year 2027, according to several detailed budget proposals.&lt;/p&gt;

&lt;p&gt;The Trump administration released its &lt;a href="https://www.whitehouse.gov/wp-content/uploads/2026/04/budget_fy2027.pdf"&gt;proposed FY27 budget&lt;/a&gt; on Friday, with the VA and other agencies subsequently releasing more detailed breakdowns of their suggested funding levels.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The agency&amp;rsquo;s funding proposal is unlikely to be enacted by Congress in its current form, as the legislative branch often reworks or fully overhauls White House proposals to meet lawmakers&amp;#39; policy goals, but the document nonetheless provides a window into VA&amp;rsquo;s priorities for FY27.&lt;/p&gt;

&lt;p&gt;The administration is seeking $144.9 billion in discretionary funding for VA in the next fiscal year, with roughly $6.3 billion of that allocated for the agency&amp;rsquo;s IT systems.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A small &amp;mdash; but noticeably growing &amp;mdash; portion of these funds are earmarked for AI adoption and expansion.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The budget proposes allocating $130 million to the Veterans Benefits Administration &amp;ldquo;for automation and artificial intelligence investments modernizing veterans claims processing by reducing errors and delivering benefits to veterans faster.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;VA&amp;rsquo;s 2025 AI use case inventory listed 367 instances of the agency&amp;rsquo;s deployment of or experimentation with the emerging capabilities. Of this total, &lt;a href="https://www.nextgov.com/artificial-intelligence/2026/03/va-increasingly-looking-ai-enhance-claims-processing/411900/?oref=ng-skybox-hp"&gt;28 of the uses were focused&lt;/a&gt; on improving government benefits processing for veterans and their beneficiaries.&lt;/p&gt;

&lt;p&gt;In an FY27 budget &lt;a href="https://department.va.gov/wp-content/uploads/2026/04/Volume-5.pdf"&gt;document&lt;/a&gt; focused on the agency&amp;rsquo;s IT programs and electronic health record modernization project, VA also proposes earmarking $47.8 million for its &amp;ldquo;Decision Intelligence and Automation&amp;rdquo; activities. The budget breakdown says this funding would be for &amp;ldquo;shared automation and decision support capabilities, including the infrastructure and controls needed to develop, integrate, and govern artificial intelligence capabilities across the Department.&amp;rdquo;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;VA says the boost in proposed funds for these activities &amp;mdash; $4.7 million more than what was enacted in 2026, or an increase of around 10.9% &amp;mdash; is needed to support additional uses of the emerging capabilities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The increase is driven primarily by the AI Infrastructure solution, enabling VA to pilot and scale AI tools that improve operational efficiency, enhance clinical decision-making, and support personalized care and benefits delivery, while sustaining governance frameworks for safe, effective, and ethical use,&amp;rdquo; the budget says. &amp;ldquo;The outcome is a secure, scalable AI ecosystem that strengthens decision-making and workflow execution across mission services.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The agency also says further uses of AI and automated tools would reduce delays and allow VA staff and clinicians to better support veteran care.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;According to the budget document, full-time equivalent employees have saved an average of 2-3 hours &amp;ldquo;through [the use of] generative AI tools at VA,&amp;rdquo; although it was not clear what timeframe was used to determine this amount. VA also says that 100% of its high-impact AI use cases are in compliance &amp;ldquo;with federal risk management practices.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;In a topline &lt;a href="https://department.va.gov/wp-content/uploads/2026/04/2027-BiB.pdf"&gt;budget brief&lt;/a&gt;, VA says investments in AI would advance its research efforts &amp;ldquo;by providing a mechanism for directly translating new evidence into practice and pilot testing novel tools and solutions to revolutionize care.&amp;quot;&lt;/p&gt;

&lt;p&gt;The agency&amp;rsquo;s overall FY27 budget proposal also allocates $4.2 billion for the continued implementation of its new Oracle Health electronic health record, which is part of a broader federal effort to deploy one common, interoperable system across VA, the Defense Department, the U.S. Coast Guard and the National Oceanic and Atmospheric Administration.&lt;/p&gt;

&lt;p&gt;VA paused most deployments of the new EHR software in April 2023 to address a host of usability and patient safety issues at the facilities where the system had been rolled out. The agency, however, is preparing to restart go-lives on April 11, with plans to deploy the EHR system at 13 sites in 2026 and then roughly double that amount in 2027.&lt;/p&gt;

&lt;p&gt;While the agency is primarily focused right now on resuming the EHR modernization project, the budget proposal also says that efforts to migrate the system to Oracle Cloud Infrastructure will help it better adopt AI tools in the future.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The ability of the Federal EHR to take advantage of artificial intelligence and other capabilities from industry hinges on successfully shifting the system to a cloud infrastructure,&amp;rdquo; the document reads.&lt;/p&gt;

&lt;p&gt;VA&amp;rsquo;s 2025 AI inventory &lt;a href="https://www.nextgov.com/artificial-intelligence/2026/02/vas-latest-ai-inventory-includes-new-suicide-ehr-focused-use-cases/411270/"&gt;included five instances&lt;/a&gt; of the agency&amp;rsquo;s Office of Electronic Health Record Modernization &amp;mdash; which is spearheading its deployment of the new system &amp;mdash; seeking to adopt these capabilities.&lt;/p&gt;

&lt;p&gt;This included one use case where the office was identified as being in the pre-deployment phase of rolling out a clinical AI agent into the new system, noting that &amp;ldquo;administrative tasks, manual documentation, and complex workflows within the Electronic Health Record (EHR) cause lower clinical efficiency and operational effectiveness.&amp;rdquo;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;According to VA&amp;rsquo;s AI strategy, an updated version of which was &lt;a href="https://www.nextgov.com/artificial-intelligence/2025/10/va-ai-strategy-says-early-use-cases-will-inform-adoption-new-ehr/408526/"&gt;released&lt;/a&gt; in October, early validation of the agency&amp;rsquo;s AI use cases will eventually allow them to be &amp;ldquo;incorporated into the EHR and many other information technology platforms through coordination between innovators and the teams managing those systems today.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/07/040726VANG/large.jpg" width="618" height="284"><media:credit>FinkAvenue/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/07/040726VANG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Pro-Iran hackers are targeting US industrial control systems, advisory says</title><link>https://www.nextgov.com/cybersecurity/2026/04/pro-iran-hackers-are-targeting-us-industrial-control-systems-advisory-says/412679/</link><description>This latest cyber assessment released during the war with Iran mirrors similar cyber intrusions made by an Iran-aligned group that targeted Pennsylvania water systems in late 2023.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Tue, 07 Apr 2026 15:21:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/pro-iran-hackers-are-targeting-us-industrial-control-systems-advisory-says/412679/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;Iran-aligned hackers have exploited and disrupted operational technology control systems embedded in multiple U.S. critical infrastructure sectors, targeting equipment manufactured by Rockwell Automation, according to an advisory issued Tuesday.&lt;/p&gt;

&lt;p&gt;The hackers have set their sights on the company&amp;rsquo;s Allen-Bradley line of programmable logic controllers, or PLCs, which are digital computers that interface with operational equipment to monitor and automate industrial processes like water treatment, power generation and manufacturing.&lt;/p&gt;

&lt;p&gt;The cyber intrusions have, in some cases, resulted in operational disruption and financial loss, according to &lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a?utm_source=IranPLC202604&amp;amp;utm_medium=GovDelivery"&gt;the assessment&lt;/a&gt; signed by the Cybersecurity and Infrastructure Security Agency, FBI, NSA, EPA, the Department of Energy and U.S. Cyber Command&amp;rsquo;s Cyber National Mission Force.&lt;/p&gt;

&lt;p&gt;The disruptions occurred by manipulating data on human-machine interfaces and on supervisory control and data acquisition, or SCADA, displays, as well as harmful interactions with project files, it adds.&lt;/p&gt;

&lt;p&gt;The advisory is the latest signal indicating that Iran-aligned hacker groups have successfully targeted and impeded U.S. systems amid the ongoing U.S.-Israel war against Iran that broke out Feb. 28.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It comes after an apparent Tehran-backed hacker group carried out a &lt;a href="https://www.nextgov.com/cybersecurity/2026/03/cisa-launches-investigation-stryker-cyberattack/412079/"&gt;cyberattack&lt;/a&gt; against medical technology giant Stryker last month, which wiped employees&amp;rsquo; phones and prevented workers from accessing their computers.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The authoring agencies assess a group of Iranian-affiliated advanced persistent threat (APT) actors is conducting this activity to cause disruptive effects within the United States.&amp;rdquo; the advisory reads. &amp;ldquo;The group has targeted devices spanning multiple U.S. critical infrastructure sectors, including Government Services and Facilities (to include local municipalities), Water and Wastewater Systems (WWS), and Energy Sectors.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;A request for comment sent to Rockwell Automation&amp;rsquo;s media relations email bounced back.&lt;/p&gt;

&lt;p&gt;Pro-Iran hackers have made a habit of targeting any computer systems tied to nations deemed foreign adversaries by Tehran, especially the U.S. and Israel. In late 2023, amid the Israel-Hamas war, one hacker group &lt;a href="https://www.nextgov.com/cybersecurity/2023/12/cisa-fbi-warn-iran-backed-infrastructure-hacks/392452/"&gt;defaced&lt;/a&gt; the interfaces of water treatment systems in Pennsylvania, which had Israel-made Unitronics equipment built inside.&lt;/p&gt;

&lt;p&gt;In 2020, Rockwell Automation &lt;a href="https://www.rockwellautomation.com/en-us/company/news/press-releases/Rockwell-Automation-to-Acquire-Avnet-to-Expand-Cybersecurity-Expertise.html"&gt;acquired&lt;/a&gt; Israel-based Avnet Data Security, aiming to bolster the cyber posture of its industrial control systems and operational technology.&lt;/p&gt;

&lt;p&gt;The assessment urged organizations to keep PLCs off the open internet, review logs for suspicious activity and lock down affected Rockwell devices to prevent unauthorized access. Unsecured internet-connected operational technology can expose industrial systems to remote access, giving attackers a pathway to disrupt or manipulate functions.&lt;/p&gt;

&lt;p&gt;The Iran war has been &lt;a href="https://www.defenseone.com/threats/2026/02/strikes-iran-will-test-us-cyber-strategy-abroad-and-defenses-home/411782/"&gt;widely expected&lt;/a&gt; to test the strength of U.S. cyberdefenses, and experts have warned that exposed devices would be a potential target for pro-Iran hackers.&lt;/p&gt;

&lt;p&gt;President Donald Trump escalated his threats against Tehran on Tuesday, saying a &amp;ldquo;whole civilization will die tonight&amp;rdquo; if Iran doesn&amp;rsquo;t open the Strait of Hormuz by an 8 p.m. ET deadline.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Trump has promised to attack &amp;ldquo;every bridge&amp;rdquo; and power station in the country if a deal isn&amp;rsquo;t reached. Iran has promised a &amp;ldquo;devastating&amp;rdquo; response if such an attack occurs. Any sharp escalation could heighten the risk of retaliatory cyberattacks.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/07/040726IranNG-1/large.jpg" width="618" height="284"><media:credit>daoleduc/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/07/040726IranNG-1/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>GSA to require agencies to pay for USAi after launching it as a free service</title><link>https://www.nextgov.com/artificial-intelligence/2026/04/gsa-require-agencies-pay-usai-after-launching-it-free-service/412678/</link><description>The platform was billed as a way to accelerate AI adoption across the government when GSA launched it last year.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Natalie Alms</dc:creator><pubDate>Tue, 07 Apr 2026 14:49:00 -0400</pubDate><guid>https://www.nextgov.com/artificial-intelligence/2026/04/gsa-require-agencies-pay-usai-after-launching-it-free-service/412678/</guid><category>Artificial Intelligence</category><content:encoded>&lt;![CDATA[&lt;p&gt;The General Services Administration will soon start charging other government agencies to use the generative AI suite that it launched as a no-cost service last year to help agencies test and adopt AI.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;GSA offers some central technology services to other government agencies, in addition to managing the government&amp;rsquo;s real estate portfolio and procurement.&amp;nbsp;It billed USAi as a free, secure environment in which agencies could experiment with different AI systems&amp;nbsp;when it &lt;a href="https://www.nextgov.com/artificial-intelligence/2025/08/gsa-introduces-usaigov-streamline-ai-adoption-across-government/407443/"&gt;introduced the platform&lt;/a&gt; last year. The premise was that agencies could test multiple AI models for tasks like generating code and summarizing documents without each agency procuring and authorizing different AI models separately.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Currently, 15 agencies use the service, according to the agency&amp;rsquo;s budget &lt;a href="https://www.gsa.gov/system/files/GSA%20FY%202027%20Congressional%20Justification.pdf"&gt;request&lt;/a&gt; published April 3. USAi offers models from OpenAI, Amazon, Meta, Gemini for Government, Microsoft, xAI and Anthropic, and it includes a unified chatbot interface, an application programming interface &amp;mdash; or API &amp;mdash; and a management console to track metrics and set requirements.&lt;/p&gt;

&lt;p&gt;Additional government agencies are on a waiting list to access USAi, which was framed as a way to supercharge AI adoption in government as part of the Trump administration&amp;rsquo;s AI strategy.&lt;/p&gt;

&lt;p&gt;GSA will start charging agencies for USAi during fiscal 2027 as part of a &amp;ldquo;cost-recoverable model,&amp;rdquo; according to the agency&amp;rsquo;s budget documents. The change will support long-term sustainability and scale for the platform, a GSA spokesperson told &lt;em&gt;Nextgov/FCW&lt;/em&gt;, noting that charging for services is consistent with how the agency runs other shared services.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;It allows GSA to continue operating and improving the platform, invest in security and infrastructure, and meet increasing demand across agencies without relying solely on appropriated funding,&amp;rdquo; they said.&lt;/p&gt;

&lt;p&gt;GSA&amp;rsquo;s Technology Transformation Services runs the AI suite along with many other cross-government technology offerings, like the identity proofing and single sign-on system, Login.gov.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Agencies are required to pay to use some, but not all, of those services, as TTS relies in part on a revolving fund lawmakers require to be fully cost-recoverable &amp;mdash; something the agency has &lt;a href="https://www.nextgov.com/digital-government/2023/12/gsa-critical-juncture-salvage-faith-tts-agency-watchdog-warns/392736/"&gt;struggled to do&lt;/a&gt; in the past. USAi, meanwhile, currently relies on funding from the Federal Citizen Services Fund, according to the budget request, which receives appropriations from Congress in addition to reimbursements from other agencies.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/07/040726GSANG/large.jpg" width="618" height="284"><media:credit>SAUL LOEB/AFP via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/07/040726GSANG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Trump proposes cutting CISA election security program in FY27 budget</title><link>https://www.nextgov.com/cybersecurity/2026/04/trump-proposes-cutting-cisa-election-security-program-fy27-budget/412672/</link><description>The move is part of $700 million in proposed program cuts, resulting in a net funding reduction of about $360 million. The budget also projects eliminating some 860 positions.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Tue, 07 Apr 2026 10:25:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/trump-proposes-cutting-cisa-election-security-program-fy27-budget/412672/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Trump administration is hoping to eliminate roughly $700 million in programs across the Cybersecurity and Infrastructure Security Agency in fiscal year 2027, a sweeping set of cuts that translate to a net reduction of about $360 million after accounting for internal transfers and other adjustments, according to a detailed &lt;a href="https://www.dhs.gov/sites/default/files/2026-04/26_0403_ocfo-budget-cisa.pdf"&gt;budget justification&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The proposal targets election security, workforce development, stakeholder engagement and a range of infrastructure protection efforts, marking one of the most significant overhauls of the nation&amp;rsquo;s civilian cyber defense agency since its creation.&lt;/p&gt;

&lt;p&gt;The budget would notably eliminate CISA&amp;rsquo;s election security program entirely, including cutting funding for information-sharing support to state and local officials and removing dedicated election security advisors across the country.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The proposal would also end CISA&amp;rsquo;s support for the Elections Infrastructure Information Sharing and Analysis Center, or EI-ISAC, a key hub for sharing threat intelligence, cyber alerts and incident response resources with state and local election officials.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The moves would scale back one of the federal government&amp;rsquo;s main avenues for coordinating with state and local election officials on election cybersecurity risks like ransomware attacks, phishing campaigns and efforts by foreign adversaries to probe election systems and conduct &lt;a href="https://www.nextgov.com/cybersecurity/2025/10/inside-americas-next-information-war/408796/"&gt;influence operations&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The 2027 proposal would significantly scale back CISA&amp;rsquo;s stakeholder engagement operations, eliminating offices focused on stakeholder coordination and international affairs while shifting more responsibility for certain infrastructure security and emergency communications programs to state and local governments.&lt;/p&gt;

&lt;p&gt;Any move to eliminate these stakeholder engagement functions could have far-reaching effects, as those offices serve as a main conduit between CISA and state, local, private-sector and international partners that play a role in protecting critical infrastructure in the U.S. and around the world.&lt;/p&gt;

&lt;p&gt;The budget also calls for significant workforce reductions, including through cuts to funded but unfilled positions.&lt;/p&gt;

&lt;p&gt;Collectively, the changes would eliminate roughly 867 positions across CISA, according to the budget justification, as more than 1,100 positions tied to program cuts would be partially offset by transfers into the agency and targeted hiring.&lt;/p&gt;

&lt;p&gt;Also notable is the proposed elimination of CISA&amp;rsquo;s chemical security program, which would cut more than 200 positions tied to inspections and oversight of high-risk facilities. At the same time, roughly $300 million and hundreds of personnel from the Department of Homeland Security&amp;rsquo;s Countering Weapons of Mass Destruction office would be transferred into CISA, shifting broader chemical, biological, radiological and nuclear threat functions into the agency.&lt;/p&gt;

&lt;p&gt;Congress would have to approve the entire budget structure in upcoming appropriations talks. Prior efforts to reduce CISA&amp;rsquo;s funding met resistance on Capitol Hill last year, when the White House sought roughly $490 million in reductions but ultimately faced pushback from lawmakers that significantly narrowed the scope of the cuts.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;CISA has a vital role in fulfilling DHS&amp;rsquo;s core mission, one that I continue to strongly support,&amp;rdquo; Rep. Andrew Garbarino, R-N.Y., the chairman of the House Homeland Security Committee, told &lt;em&gt;Nextgov/FCW&lt;/em&gt; after this story was published.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Congress has a responsibility to ensure the agency has the resources it needs to succeed,&amp;rdquo; he said. &amp;ldquo;I look forward to discussing this in greater detail with Secretary Mullin and having him testify for the first time before the committee in our annual budget hearing in the coming months.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The budget preserves funding for various technical cybersecurity functions, including investments in threat hunting and analysis tools.&lt;/p&gt;

&lt;p&gt;The proposal also includes about $4.9 million to support cybersecurity and incident response planning for the 2028 Los Angeles Olympics, designated as a&amp;nbsp;National Special Security Event under DHS standards. The funding would support exercises, drone threat assessments and coordination with federal, state and local partners ahead of the games, even as the budget scales back many of the agency&amp;rsquo;s broader coordination efforts.&lt;/p&gt;

&lt;p&gt;Additional funding would also be diverted toward CISA&amp;rsquo;s implementation of the Cyber Incident Reporting for Critical Infrastructure Act, or CIRCIA. Amid the ongoing DHS funding lapse, the cyber agency has been delayed in developing a final rule for the law, which, in essence, mandates critical infrastructure entities report major cyber incidents to CISA within 72 hours and ransomware payments within 24 hours.&lt;/p&gt;

&lt;p&gt;Also notable is a small increase in funding and staffing for CISA&amp;rsquo;s Office of the Chief Counsel, which the justification cites as a rising volume of litigation, including cases on employment-related matters, as the agency moves forward with workforce reductions and other staffing changes. The increase suggests the agency is preparing for a heavier &lt;a href="https://www.nextgov.com/people/2025/11/dhs-says-shutdown-layoffs-cisa-will-proceed-despite-court-injunction/409332/"&gt;legal workload&lt;/a&gt; as it implements the proposed cuts.&lt;/p&gt;

&lt;p&gt;The budget plans reflect long-standing skepticism from the Trump administration and its allies toward CISA, particularly over the agency&amp;rsquo;s role in 2020 election security efforts and concurrent work to counter false information online. Critics have argued the agency strayed beyond its &amp;ldquo;core&amp;rdquo; mission of infrastructure protection and federal cyber defense.&lt;/p&gt;

&lt;p&gt;Cyber practitioners and former officials have frequently said that even the cuts put in place in the last year go too far.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;You don&amp;rsquo;t cut the fire department and then wonder why buildings burn. CISA isn&amp;rsquo;t the bureaucratic overhead; for practitioners it&amp;rsquo;s the lifeline between government intelligence and the private sector running the infrastructure this country depends on,&amp;rdquo; said Seemant Sehgal, founder and CEO of BreachLock, which sells a variety of cyberdefense services.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Cutting its budget by $707 million, on top of what&amp;rsquo;s already been cut, is a gift to every nation-state actor that&amp;#39;s been quietly targeting U.S. critical infrastructure,&amp;rdquo; he added.&lt;/p&gt;

&lt;p&gt;The tensions between the Trump administration and CISA date back to the 2020 election, when its then-director Chris Krebs publicly affirmed the security of the vote and was subsequently dismissed by Trump. In his second term, Trump has continued to target Krebs, including ordering a &lt;a href="https://www.nextgov.com/cybersecurity/2025/04/former-cyber-official-chris-krebs-leave-sentinelone-bid-fight-trump-pressure/404634/"&gt;federal investigation&lt;/a&gt; last year into his government tenure.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Editor&amp;rsquo;s note: This story was updated to include a comment from Rep. Andrew Garbarino, R-N.Y.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/07/040726CISANG/large.jpg" width="618" height="284"><media:credit> Thomas Fuller/SOPA Images/LightRocket via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/07/040726CISANG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>The IRS wants to shrink its workforce by nearly 4,000 — and use technology to make up the difference</title><link>https://www.nextgov.com/modernization/2026/04/irs-wants-shrink-its-workforce-nearly-4000-and-use-technology-make-difference/412659/</link><description>“Without modernization, the IRS would be unable to sustain performance with a reduced headcount,” the budget document says.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Natalie Alms</dc:creator><pubDate>Mon, 06 Apr 2026 17:35:00 -0400</pubDate><guid>https://www.nextgov.com/modernization/2026/04/irs-wants-shrink-its-workforce-nearly-4000-and-use-technology-make-difference/412659/</guid><category>Modernization</category><content:encoded>&lt;![CDATA[&lt;p&gt;The IRS has pushed out more than 28,000 employees since Trump&amp;rsquo;s inauguration. Now, it wants to lose another net 4,000 staff, according to new IRS budget documents.&lt;/p&gt;

&lt;p&gt;The tax agency is banking on technology improvements to help it sustain performance at its lower headcount, it says in its fiscal year 2027 budget &lt;a href="https://home.treasury.gov/system/files/266/02.-IRS-FY-2027-CJ.pdf"&gt;justification&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Without modernization, the IRS would be unable to sustain performance with a reduced headcount,&amp;rdquo; the budget document says. The agency&amp;rsquo;s modernization budget &amp;ldquo;represents a prudent and necessary investment to sustain performance, enable future workforce efficiencies, and deliver enduring value to taxpayers and the Nation.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The IRS estimates that staffing reductions of 4,875 employees will yield &amp;ldquo;significant savings&amp;rdquo; of over $777 million. The IRS budget doesn&amp;rsquo;t specify where or how these cuts would take place, and the IRS and Treasury Department did not respond to requests for comment. Overall, the administration has proposed a $1.4 billion reduction in IRS funding.&lt;/p&gt;

&lt;p&gt;Even as the IRS says that it&amp;rsquo;s relying on technology to make up for a smaller staff size, its technology shop hasn&amp;rsquo;t been immune to staffing losses. The IRS has shed about 40% of its IT staff, &lt;a href="https://federalnewsnetwork.com/workforce/2026/02/irs-cio-says-agency-lost-40-of-tech-workers-last-year/?readmore=1"&gt;according&lt;/a&gt; to Federal News Network, and 80% of its executives. The agency also reassigned 1,500 employees from its IT shop to the office of the chief operating officer last year.&lt;/p&gt;

&lt;p&gt;AI &amp;ldquo;will be part of speeding up everything we&amp;rsquo;re doing,&amp;rdquo; Frank Bisignano, the IRS CEO, told lawmakers last month. &amp;ldquo;We are building an IRS that leverages advanced technology, empowers its workforce with better tools and delivers secure and easily accessible services.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;But Congress&amp;rsquo; watchdog &lt;a href="https://www.nextgov.com/artificial-intelligence/2026/03/irs-faces-ai-skills-gaps-after-pushing-tech-talent-out-watchdog-finds/412337/?oref=ng-author-river"&gt;warned&lt;/a&gt; recently that staffing losses at the IRS have left skill gaps in AI areas that increase the risk that the agency&amp;rsquo;s AI efforts &amp;ldquo;will not succeed.&amp;rdquo;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The agency&amp;rsquo;s research, applied analytics and statistics unit &amp;mdash; one of two main AI hubs at the IRS, helmed by the agency&amp;rsquo;s AI lead &amp;mdash; lost 63 employees who supported the agency&amp;rsquo;s AI efforts as of May last year.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IT staff at the IRS have also been &lt;a href="https://www.govexec.com/workforce/2026/02/irs-tasks-more-staff-without-any-tax-experience-process-tax-returns/411333/?oref=ge-author-river"&gt;among&lt;/a&gt; those &lt;a href="https://www.govexec.com/management/2026/02/setting-agency-failure-amid-staffing-crunch-irs-taps-employees-no-relevant-experience-assist-during-filing-season/411192/?oref=ge-author-river"&gt;moved&lt;/a&gt; to work as tax examiners and contact representatives after the IRS failed to fully staff its divisions tasked with tax processing and customer service in the lead-up to the filing season.&lt;/p&gt;

&lt;p&gt;The IRS is also proposing some hires in the new budget request.&lt;/p&gt;

&lt;p&gt;The tax agency wants to hire 1,132 employees to &amp;ldquo;maintain customer service&amp;rdquo; to help implement the administration&amp;rsquo;s &amp;ldquo;One Big, Beautiful Bill&amp;rdquo; and staff its telephone line, according to the budget, which also previews a push for more online, self-service options for taxpayers so that they don&amp;rsquo;t have to rely on &amp;ldquo;assisted channels&amp;rdquo; in the first place.&lt;/p&gt;

&lt;p&gt;This isn&amp;rsquo;t the first push to make up for staffing losses at the IRS since Trump took office. Last summer, the agency &lt;a href="https://www.nextgov.com/people/2025/08/irs-canceling-its-layoff-plans-will-ask-some-it-fired-or-pushed-out-return/407623/?oref=ng-author-river"&gt;pivoted&lt;/a&gt; away from planned layoffs to hiring and reassignments to fill &amp;ldquo;mission critical skill sets.&amp;rdquo;&lt;/p&gt;

&lt;div class="related-articles-placeholder"&gt;[[Related Posts]]&lt;/div&gt;

&lt;p&gt;Danny Werfel, who served as IRS commissioner during the Biden administration, told &lt;em&gt;Nextgov/FCW&lt;/em&gt; in a statement that &amp;ldquo;the most important next step is for the IRS to publish a detailed modernization plan that gives the public clear visibility into its technology priorities, timelines, and expected outcomes.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The plan should help make clear how, when, and at what budget, the IRS will make up for staffing reductions that may be impeding their stated objective to improve customer service, collections, and data security,&amp;rdquo; he continued.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That plan appears to be in flux as the IRS anticipates using up the last of its funding from the Inflation Reduction Act in fiscal 2028. Passed in 2022, the law originally gave the IRS almost $80 billion, although $54 billion of that has been rescinded by lawmakers. The IRS was using some of the funding for technology improvements, and now the IRS is re-evaluating its modernization plans as it anticipates the money running dry, the budget says.&lt;/p&gt;

&lt;p&gt;Among the work that the IRS had been doing with IRA funding is &lt;a href="https://www.nextgov.com/modernization/2024/09/irs-will-stick-legacy-processing-system-upcoming-tax-season/399419/?oref=ng-author-river"&gt;trying to modernize&lt;/a&gt; some of its systems that date back to the 1960s. It appears that that effort is ongoing, as the IRS budget includes a push to modernize its mainframe tax processing systems that are built on over 15 million lines of COBOL, a legacy computer language that fewer programmers are now proficient in.&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/06/GettyImages_2264764407/large.jpg" width="618" height="284"><media:description>Internal Revenue Service Chief Executive Officer Frank Bisignano testifies before the House Ways and Means Committee in the Longworth House Office Building on Capitol Hill on March 04, 2026 in Washington, DC. The first CEO of the IRS in U.S. history, Bisignano simultaneously serves as the commissioner of the Social Security Administration. </media:description><media:credit>Chip Somodevilla/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/06/GettyImages_2264764407/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Government official impersonation scam complaints doubled in 2025, FBI report shows</title><link>https://www.nextgov.com/cybersecurity/2026/04/government-official-impersonation-scam-complaints-doubled-2025-fbi-report-shows/412656/</link><description>The scams, some of which were fueled by AI, can be especially effective because they exploit the built-in authority and urgency people associate with institutions.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Mon, 06 Apr 2026 16:41:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/04/government-official-impersonation-scam-complaints-doubled-2025-fbi-report-shows/412656/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;The number of complaints filed with the FBI that described cyberscammers impersonating government officials nearly doubled between 2024 and 2025 and resulted in some $800 million in losses last year, FBI data released Monday shows.&lt;/p&gt;

&lt;p&gt;Recorded government impersonation complaints rose from some 17,300 in 2024 to nearly 32,500 in 2025, the FBI&amp;rsquo;s 2025 Internet Crime Complaint Center &lt;a href="https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf"&gt;report&lt;/a&gt; shows. The center, dubbed IC3, documented some $797 million in losses in 2025 from those efforts, up from around $405 million in the year prior.&lt;/p&gt;

&lt;p&gt;That type of scam was listed among the top five cyber-enabled fraud crimes by both number of recorded occurrences and amount of money lost. Other major cyber crimes include romance, tech support and investment scams.&lt;/p&gt;

&lt;p&gt;The spike comes amid a broader surge in &lt;a href="https://www.socure.com/news-and-press/federal-fraud-crisis-report"&gt;impersonation-based fraud&lt;/a&gt;, fueled by artificial intelligence-driven voice and messaging tools that can allow scammers to convincingly pose as government officials at scale.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;AI was referenced 260 times in complaints involving government impersonations, the report shows, with $7 million lost in cases with those AI references. AI involvement was documented the most in complaints involving investment scams.&lt;/p&gt;

&lt;p&gt;Government impersonation can be especially effective because scammers often exploit the built-in authority people associate with official institutions, prompting victims to act quickly out of fear of penalties, legal trouble or loss of benefits.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;It has never been more important to be diligent with your cybersecurity, social media footprint, and electronic interactions. Cyber threats and cyber-enabled crime will continue to evolve as the world embraces emerging technologies such as artificial intelligence,&amp;rdquo; the IC3 report says.&lt;/p&gt;

&lt;p&gt;The increase coincides with a period of &lt;a href="https://www.govexec.com/workforce/2026/03/continuing-shed-federal-workers-remains-priority-number-one-white-house-official-says/411907/"&gt;upheaval&lt;/a&gt; across much of the government&amp;rsquo;s workforce, though IC3 did not detail any evidence linking the rise in complaints to mass federal layoffs.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Cyber threats, additionally, continue to become more prevalent. Data breaches and ransomware were among the most prominent cyber threat complaints documented in 2025. Over 60 new ransomware variants &amp;mdash; modified versions of ransom malware crafted by hackers to evade detection &amp;mdash; were discovered last year, the report says. Government facilities also remain a top target of cyber adversaries.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/06/GettyImages_2221852023/large.jpg" width="618" height="284"><media:credit>Thomas Fuller/SOPA Images/LightRocket via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/06/GettyImages_2221852023/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>CIA deception campaign helped US rescue downed airman in Iran, director says</title><link>https://www.nextgov.com/defense/2026/04/cia-deception-campaign-helped-us-rescue-downed-airman-iran-director-says/412648/</link><description>Iranian forces were “humiliated” after recognizing they were deceived in the move that bought time for U.S. forces to rescue the weapons officer, CIA Director John Ratcliffe said.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Mon, 06 Apr 2026 14:32:00 -0400</pubDate><guid>https://www.nextgov.com/defense/2026/04/cia-deception-campaign-helped-us-rescue-downed-airman-iran-director-says/412648/</guid><category>Defense</category><content:encoded>&lt;![CDATA[&lt;p&gt;A deception campaign launched by the CIA bought time for U.S. forces to rescue an airman who went down in Iran on Friday, CIA Director John Ratcliffe said in a White House news conference on Monday.&lt;/p&gt;

&lt;p&gt;The CIA deployed human assets and &amp;ldquo;exquisite technologies&amp;rdquo; to contribute to the rescue of the weapons systems officer of an F-15E Strike Eagle, Ratcliffe said. The aircraft&amp;rsquo;s pilot was rescued earlier upon the crash, but Iran was &amp;ldquo;desperately hunting&amp;rdquo; for the backseater who ejected further from his wingman and had moved away from the crash site.&lt;/p&gt;

&lt;p&gt;The injured officer was found by the CIA in a mountain crevice but was still invisible to Iranian forces.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Following the successful exfiltration on Saturday night, our intelligence reflects that the Iranians were embarrassed and ultimately humiliated by the success of this audacious rescue,&amp;rdquo; Ratcliffe said.&lt;/p&gt;

&lt;p&gt;At the press conference, President Donald Trump said it was the CIA&amp;rsquo;s &amp;ldquo;genius&amp;rdquo; that contributed to the rescue and that the spy agency had spotted &amp;ldquo;something moving up the mountain.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;This is at night. And they kept the camera on him for 45 minutes,&amp;rdquo; Trump said, suggesting the CIA had a covert surveillance capability &amp;mdash; potentially a drone or satellite &amp;mdash; available to track the airman&amp;rsquo;s movements.&lt;/p&gt;

&lt;p&gt;The public remarks about the mission show how the Trump administration has made it a point to highlight contributions that CIA operatives have made toward its national security efforts.&lt;/p&gt;

&lt;p&gt;Those include operations that &lt;a href="https://abcnews.com/Politics/ate-inside-meticulously-planned-operation-capture-maduro/story?id=128871919"&gt;targeted&lt;/a&gt; the government of ousted Venezuelan leader Nicol&amp;aacute;s Maduro. The agency has also taken a more public-facing posture, releasing &lt;a href="https://www.reuters.com/business/media-telecom/cia-makes-new-push-recruit-chinese-military-officers-informants-2026-02-12/"&gt;recruitment videos&lt;/a&gt; aimed at sourcing in China. And in the months leading up to the Iran war, agency spies had been reportedly &lt;a href="https://www.nytimes.com/2026/03/01/us/politics/cia-israel-ayatollah-compound.html"&gt;tracking&lt;/a&gt; the movements of now deceased Ayatollah Ali Khamenei.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/06/GettyImages_2270103721/large.jpg" width="618" height="284"><media:description>CIA Director John L. Ratcliffe speaks during a news conference in James S. Brady Press Briefing Room of the White House on April 06, 2026 in Washington, DC. President Trump spoke about the successful military mission to rescue a weapons systems officer whose F-15E Strike Eagle was shot down in Iran.</media:description><media:credit>Anna Moneymaker/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/06/GettyImages_2270103721/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Secret Service is embedding AI experts across the agency</title><link>https://www.nextgov.com/artificial-intelligence/2026/04/secret-service-embedding-ai-experts-across-agency/412646/</link><description>“I think having this internal team will really help us transform our [AI] adoption across the organization,” Secret Service CIO and CAIO Chris Kraft said about the push to bring fresh tech talent into the agency.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Edward Graham</dc:creator><pubDate>Mon, 06 Apr 2026 14:09:00 -0400</pubDate><guid>https://www.nextgov.com/artificial-intelligence/2026/04/secret-service-embedding-ai-experts-across-agency/412646/</guid><category>Artificial Intelligence</category><content:encoded>&lt;![CDATA[&lt;p&gt;The U.S. Secret Service is pushing to onboard tech talent to help personnel better use artificial intelligence capabilities, according to the agency&amp;rsquo;s IT and AI lead.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In an interview with &lt;em&gt;Nextgov/FCW&lt;/em&gt;, Chief Information Officer and Chief AI Officer Chris Kraft said the agency is undertaking a new program to embed AI specialists across its operations who can help turbocharge adoption of the tools.&lt;/p&gt;

&lt;p&gt;Kraft said the initiative is essentially &amp;ldquo;a small group of AI experts that can bring expertise internal to the Secret Service, and then focus on our AI initiatives across the organization,&amp;rdquo; adding that &amp;ldquo;I think that there&amp;#39;s a lot of value in having experts as federal employees, instead of just contracting for that capability.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;He teased out the hiring push in a LinkedIn &lt;a href="https://www.linkedin.com/posts/ctkraft_the-secret-about-yesterdays-gs-13-is-out-activity-7432093037960482816-Wo-L/?utm_source=share&amp;amp;utm_medium=member_desktop&amp;amp;rcm=ACoAAC9m6rMBpm6rJeq2x6mmSSOK25obe6tPaiA"&gt;post&lt;/a&gt; at the end of February, in which he shared a job posting from the Secret Service and said, &amp;ldquo;we&amp;rsquo;re building a new #AI program at the U.S. Secret Service.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Kraft was formally &lt;a href="https://www.secretservice.gov/newsroom/releases/2025/12/chris-kraft-appointed-secret-service-chief-information-officer"&gt;appointed&lt;/a&gt; to the CIO role in December, after having served in the position in an acting capacity. Prior to joining the Secret Service, he served as DHS&amp;rsquo; acting CTO and, before that, as that agency&amp;rsquo;s deputy CTO for AI and emerging technology.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;While he was at DHS, he helped establish an &lt;a href="https://www.nextgov.com/people/2024/06/dhs-hires-initial-cohort-10-join-its-ai-corps/397632/"&gt;AI Corps&lt;/a&gt; to bring AI experts into the agency to help personnel better leverage those capabilities. The Secret Service&amp;rsquo;s new AI program mirrors much of what DHS sought to accomplish with its own initiative.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Kraft said his experience working on both the technical and operational sides of agencies has shown him the importance of proving what AI is capable of &amp;mdash; including whether or not the answer is the emerging capabilities or other technology.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;When you&amp;#39;ve got those deep technical experts that can focus on AI and other areas, I think it can be really transformative to increase your capabilities across the board,&amp;rdquo; he said. &amp;quot;And whether that&amp;#39;s revisiting how you handle specific applications of technology or looking at implementing new capabilities, and then bring in that AI and data sciences perspective to help support large-scale operations.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The Secret Service has already &lt;a href="https://www.dhs.gov/ai/use-case-inventory/usss"&gt;deployed&lt;/a&gt; some AI uses, including a tool to decipher license plates from poor-quality videos and photos. It has also been working with other agencies to leverage facial recognition technology.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Kraft said expanded uses of AI across the agency can further support agents and back-office operations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;There&amp;rsquo;s so much information and data coming at people that it&amp;rsquo;s hard, in some cases, to absorb all that, and if artificial intelligence can help you absorb that vast amount of information and highlight what those things are that people should be looking at, I think that that&amp;rsquo;s a huge win,&amp;rdquo; he said.&lt;/p&gt;

&lt;p&gt;While agencies have been steadily increasing their uses of AI over the past several years, adversaries and bad actors have also been leveraging the capabilities. Kraft said careful agency adoption of AI &amp;mdash; with a human in the loop, workforce training and effective deployment &amp;mdash; can help the Secret Service fully harness these tools. And that&amp;rsquo;s where he believes the AI program and hiring push can have a large impact on agency operations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I think having this internal team will really help us transform our [AI] adoption across the organization,&amp;rdquo; Kraft said.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/06/GettyImages_2230114024-1/large.jpg" width="618" height="284"><media:description>A US Secret Service officer works a checkpoint near the White House ahead of the meeting between Ukrainian President Volodymyr Zelensky, European leaders and US President Donald Trump in Washington, DC, on August 18, 2025.</media:description><media:credit>Alex WROBLEWSKI / AFP via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/06/GettyImages_2230114024-1/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>The war against fraud should be a war for tech modernization</title><link>https://www.nextgov.com/ideas/2026/04/war-against-fraud-should-be-war-tech-modernization/412645/</link><description>COMMENTARY | Combating fraud is a noble exercise, but combating longstanding systemic barriers to innovation and performance is often harder.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Stan Soloway</dc:creator><pubDate>Mon, 06 Apr 2026 13:37:00 -0400</pubDate><guid>https://www.nextgov.com/ideas/2026/04/war-against-fraud-should-be-war-tech-modernization/412645/</guid><category>Ideas</category><content:encoded>&lt;![CDATA[&lt;p&gt;In her &lt;a href="https://www.nextgov.com/digital-government/2026/03/trumps-anti-fraud-task-force-poised-scrutinize-benefits-programs/412219/#:~:text=White%20House%20Deputy%20Chief%20of,at%20identity%20verification%20platform%20Socure."&gt;March 18 article&lt;/a&gt; (&amp;ldquo;Trump&amp;rsquo;s anti-fraud task force poised to scrutinize benefits programs&amp;rdquo;), &lt;em&gt;Nextgov/FCW&lt;/em&gt; Senior Correspondent Natalie Alms reported on a new executive order formally establishing a task force to combat fraud in America&amp;rsquo;s public benefits programs.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;The task force will focus on ensuring states &amp;mdash; and, in 12 states, including California and New York, county governments &amp;mdash; have adequate anti-fraud controls in place. If controls are deemed inadequate, the Trump administration may withhold funds for submitted and prospective claims, as recently demonstrated in Minnesota and New York. In addition, as Alms points out, the task force has been directed to address longstanding challenges associated with limited data sharing between state and federal governments.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;To be sure, fraud is a real issue in public benefits programs. But while there certainly are cases of individual malfeasance, the data clearly show that the vast preponderance of improper payments (in Medicaid alone, the number could be as high as $30 billion or more) result not from individual cheaters, but from arcane systems and processes that are simply not suited to the size and scope of our current benefits infrastructure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Simply put, as the executive order suggests but doesn&amp;rsquo;t highlight, the biggest issues affecting the integrity of our benefits programs are not &amp;ldquo;fraud&amp;quot; per se; rather, they lie in a lack of data sharing, inadequate and outdated tools and an overly complex web of programs, restrictive administrative requirements and processes.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Think of it this way: a war on fraud is certainly welcome, but we would do better to think of it as a war for tech modernization &amp;mdash; overcoming the limitations of legacy systems and orthodoxies that drive improper payments and in many ways enable actual fraud.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Moreover, real, impactful change will not happen by fiat; it&amp;rsquo;s not enough to simply say a state &amp;ldquo;must&amp;rdquo; implement systems to track and validate (or not) beneficiary eligibility or payments. Doing so requires funding, expertise, collaboration between all levels of government, a willingness to tackle organizational disconnects and the flexibility for states to utilize tools and providers best suited to their unique situations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Take Minnesota, for example. It is one of a dozen states where benefits are administered at the county level, and it has 87 counties. What it doesn&amp;rsquo;t have, however, is an effective system to track beneficiaries when they move. So, when someone moves from county A to county B &amp;mdash; which happens all the time &amp;mdash; there is no system in place to notify Medicaid. As a result, Medicaid will start paying two different counties for coverage of the same person. In a state the size of Minnesota, that amounts to significant taxpayer money; aggregated nationwide, the cost easily goes into the billions.&lt;/p&gt;

&lt;p&gt;The point is this: improper payments, including individual fraud, are mostly a problem of aged technology coupled with outdated administrative rules and organizational constructs that hamstring governments at all levels.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Even in Minnesota, where we witnessed massive COVID relief fraud, the perpetrators were not individual beneficiaries but organized criminal entities which were able to exploit the state&amp;rsquo;s lack of modern technology &amp;mdash; which otherwise would likely have detected their actions far sooner.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To add to the challenges, federal financial support to states for administering key benefits programs &amp;mdash; such as SNAP nutrition assistance &amp;mdash; is being reduced by roughly 50%, even as the (rightful) demands to root out fraud and waste grow.&lt;/p&gt;

&lt;p&gt;With that in mind, the new anti-fraud task force must be a vehicle for two critical initiatives: First, a broad rethinking of administrative policies&amp;nbsp;&amp;mdash;&amp;nbsp;including giving states and, where relevant, counties&amp;nbsp;greater flexibility in how they administer the programs, deal with endemic workforce shortages and more.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This must include serious proposals to break down longstanding departmental, organizational and data silos, create integrated eligibility and administrative processes that can help harmonize and simplify the vast array of related programs, many of which serve the same families and rely on the same data to determine eligibility.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;At the same time, the task force should be a vehicle for a concerted national effort to modernize the technologies that undergird the array of programs. A successful effort will require significant investments of tax dollars at the federal, state and local levels. As daunting as some of those investments might seem, when compared to the amount of money wasted today, it will be pennies.&lt;/p&gt;

&lt;p&gt;Combating fraud is a noble exercise, but combating longstanding systemic barriers to innovation and performance is, in many ways, harder. Yet, its returns will be exponentially greater, improvements in program integrity will be more significant and the resulting restoration of trust in programs that serve those most in need will serve us all.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Stan Soloway is chairman of the National Academy of Public Administration and chair of the Center for Accountability, Modernization and Innovation, which advocates for innovations in public services delivery.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/06/GettyImages_2266907399/large.jpg" width="618" height="284"><media:description>U.S. President Donald Trump prepares to sign paperwork during a White House signing ceremony in the Oval Office of the White House on March 16, 2026 in Washington, DC. Trump signed an executive order to create a task force on fraud which will be lead by Vice President J.D. Vance.</media:description><media:credit>Alex Wong/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/06/GettyImages_2266907399/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Tech bills of the week: Limiting adversaries’ access to US tech; and boosting cyber apprenticeships</title><link>https://www.nextgov.com/policy/2026/04/tech-bills-week-limiting-adversaries-access-us-tech-and-boosting-cyber-apprenticeships/412624/</link><description>This week’s proposals are focused on blocking adversaries from gaining access to critical U.S. technologies and manufacturing capabilities, as well as addressing the nation’s cyber workforce shortage.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Edward Graham</dc:creator><pubDate>Fri, 03 Apr 2026 16:40:00 -0400</pubDate><guid>https://www.nextgov.com/policy/2026/04/tech-bills-week-limiting-adversaries-access-us-tech-and-boosting-cyber-apprenticeships/412624/</guid><category>Policy</category><content:encoded>&lt;![CDATA[&lt;p&gt;&lt;strong&gt;Expanding export controls on foreign adversaries&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;New legislation introduced by Rep. Ann Wagner, R-Mo., on Monday looks to bolster the federal government&amp;rsquo;s export control regime on sensitive U.S. technologies to ensure that adversarial nations are not able to leverage the capabilities to further their own economic ambitions.&lt;/p&gt;

&lt;p&gt;Wagner said the &lt;a href="https://wagner.house.gov/media-center/press-releases/wagner-introduces-bill-confront-china-limit-its-influence"&gt;measure&lt;/a&gt;, the Export Control Enforcement and Enhancement Act, would modernize U.S. restrictions on accessing sensitive technologies and &amp;ldquo;streamline the ability of the Departments of State, Defense, and Energy to quickly modify the list of foreign entities&amp;mdash;ranging from governments to companies and research institutions&amp;mdash;that pose a serious risk to our national security.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Foreign adversaries, like China, have used U.S.-made semiconductors to bolster the development of their own artificial intelligence capabilities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Wagner&amp;rsquo;s proposal would create a 30-day period for &amp;ldquo;proposed additions, removals, or other modifications&amp;rdquo; to the Department of Commerce&amp;rsquo;s Entity List so the government would &amp;ldquo;be able quickly address any efforts by our adversaries to cheat the system and obtain superior, American-made technology.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Limiting bad actors&amp;rsquo; access to chipmaking equipment&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A bipartisan group of lawmakers in both chambers of Congress is also looking to tighten export controls on semiconductor manufacturing equipment through new legislation that would further limit the ability for China and other foreign adversaries to import the capabilities.&lt;/p&gt;

&lt;p&gt;While the U.S. has already imposed significant restrictions on China&amp;rsquo;s access to semiconductors and related chip manufacturing components, Beijing has been able to skirt these measures by, in part, purchasing equipment from American allies or using shell companies.&lt;/p&gt;

&lt;p&gt;The effort &amp;mdash; &lt;a href="https://baumgartner.house.gov/media/press-releases/baumgartner-introduces-bipartisan-bill-tighten-controls-sensitive-chipmaking"&gt;introduced&lt;/a&gt; by Rep. Michael Baumgartner, R-Wash., on Thursday, and soon to be introduced in the upper chamber by Sens. Pete Ricketts, R‑Neb., and Andy Kim, D‑N.J. &amp;mdash; looks to close these loopholes by prohibiting the sale of essential semiconductor equipment &amp;ldquo;to any destination inside a country of concern.&amp;rdquo;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The bill would also enhance restrictions on a series of specific Chinese companies, including Huawei, and require export controls to &amp;ldquo;apply uniformly&amp;rdquo; across the U.S. and its allies. If allied countries &amp;ldquo;cannot demonstrate progress&amp;rdquo; on enhancing their export restrictions within a 150-day deadline, the Commerce Department would be directed &amp;ldquo;to implement controls unilaterally.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Baumgartner said the proposal, called the Multilateral Alignment of Technology Controls on Hardware &amp;mdash; or MATCH &amp;mdash; Act, would &amp;ldquo;ensure that America and our allies move in lockstep to close these gaps, defend our technological edge, and safeguard the supply chains that power everything from our weapons systems to our critical infrastructure.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Boosting cyber apprenticeships&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Bipartisan House legislation &lt;a href="https://susielee.house.gov/media/press-releases/lee-introduces-bipartisan-bill-expand-cybersecurity-apprenticeships"&gt;introduced&lt;/a&gt; on Tuesday would require the Labor Department to establish a grant program to boost Americans&amp;rsquo; access to cybersecurity apprenticeship opportunities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The measure, led by Reps. Susie Lee, D-Nev., and Brian Fitzpatrick, D-Pa., looks to address talent gaps in the nation&amp;rsquo;s cybersecurity workforce, which the lawmakers said included over 500,000 current job vacancies.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Their &lt;a href="https://susielee.house.gov/sites/evo-subsites/susielee.house.gov/files/evo-media-document/cyber-ready-workforce-act-one-pager-119th-congress.pdf"&gt;proposed grant program&lt;/a&gt; would be overseen by Labor and would &amp;ldquo;award competitive grants to businesses, industry and community-based organizations, workforce development boards, educational institutions, joint labor-management partnerships, and nonprofits to develop registered apprenticeship programs in cybersecurity.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;In a statement, Fitzpatrick said the bill &amp;ldquo;will provide the next generation of cybersecurity experts the opportunity to gain in-demand skills for high-paying jobs here in Pennsylvania and across the nation without the burden of student loan debt, while fortifying our critical infrastructure and safeguarding our data systems.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Sens. Jacky Rosen, D-Nev., and Marsha Blackburn, R-Tenn., also introduced a companion measure to the proposal &amp;mdash; the Cyber Ready Workforce Act &amp;mdash; in the upper chamber.&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/04/03/GettyImages_1399560076/large.jpg" width="618" height="284"><media:credit>Jarmo Piironen/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/04/03/GettyImages_1399560076/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item></channel></rss>