Just how secure are federal buildings?


To listen to the Federal Newscast on your phone or mobile device, subscribe in PodcastOne or Apple Podcasts. The best listening experience on desktop can be found using Chrome, Firefox or Safari.

Federal building alarm systems and security cameras are falling short of expectations. But just how short? Well that’s unclear from a heavily redacted report released by the General Services Administration inspector general this week. Auditors reviewed the security systems and cameras at 14 federal buildings…

READ MORE

To listen to the Federal Newscast on your phone or mobile device, subscribe in PodcastOne or Apple Podcasts. The best listening experience on desktop can be found using Chrome, Firefox or Safari.

  • Federal building alarm systems and security cameras are falling short of expectations. But just how short? Well that’s unclear from a heavily redacted report released by the General Services Administration inspector general this week. Auditors reviewed the security systems and cameras at 14 federal buildings and seemed to find they were in various states of disrepair. One of the IG’s recommendations is for GSA to implement a plan to repair, replace and even install security cameras and alarm systems as part of a nationwide assessment. The IG also says GSA and the Federal Protective Service should revise their memorandum of understanding to clearly identify who’s responsible for maintaining these systems.
  • The Government Accountability Office found $206 billion of waste in government spending on personal property like office chairs and cars between 2016 to 2020. GAO found agencies use only 8% of the over 2.6 million excess items. Recommendations include promoting the maximum use out of excess property and advising agencies to review their internal guidance on considering excess property. Tuesday’s report comes two weeks after Comptroller General Gene Dodaro addressed the Senate with ways to limit government overlap earlier this month.
  • USPTO is investing in a foundational piece of its zero trust architecture. With what…

Source…