FBI tests software to find and detain e-mail

FBI tests software to find and detain e-mail

BY SUSAN M. MENKE | GCN STAFF

Every user occasionally retracts an unopened e-mail message.

Now software can make the message unreadable after it's been opened.

The FBI is evaluating NetRecall software from Authentica Inc. of Waltham, Mass., for possible use in the bureau's Trilogy infrastructure upgrade.

The three-year, $300 million Trilogy program will build a bridge from the bureau's existing mainframe and token-ring network infrastructure to intranets and the Web, said Joseph Kielman, chief scientist in the FBI's Information Resources Division.

'We're trying to be ready for a change, instead of playing catch-up,' Kielman said.

Contractors' duties

Trilogy's contractors are DynCorp of Reston, Va., which is responsible for network transport, and a team led by Science Applications International Corp. of San Diego, which will migrate FBI user applications to a single intranet system.

The Federal Systems Integration and Management Center made the two awards through the General Services Administration's Millennia umbrella contracts. A FedSIM spokesman said the $41 million award to DynCorp in May and last month's $14 million award to SAIC cover only the first year of the contract.

SAIC's team includes Allied Technology Group of Rockville, Md.; Cairo Corp. of Centreville, Va.; IBM Global Services of Bethesda, Md.; and Indus Corp. of Vienna, Va.

Time to sign-on

The team will engineer single sign-on rights for FBI users to multiple apps from any bureau computer. Users can move their case data, including multimedia audio and video evidence, between apps.

With a staff of 15, Kielman operates the FBI's high-speed Ethernet and asynchronous transfer mode test bed made up of uniprocessor and multiprocessor platforms running Sun Microsystems Solaris, Linux, and Microsoft Windows NT and 2000.

The test bed also evaluates switches, routers and security products.

The Authentica software so far 'is working as advertised,' Kielman said, 'but we aren't ready to use it yet' in production. 'We're still a mainframe organization,' he said.

'Most applications are terminal emulator kinds of things,' Kielman said.

He said he hopes to bring some of the infrastructure prototypes built for the test bed into broader operation in the next few months.

Featured

  • Records management: Look beyond the NARA mandates

    Records management is about to get harder

    New collaboration technologies ramped up in the wake of the pandemic have introduced some new challenges.

  • puzzled employee (fizkes/Shutterstock.com)

    Phish Scale: Weighing the threat from email scammers

    The National Institute of Standards and Technology’s Phish Scale quantifies characteristics of phishing emails that are likely to trick users.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.