<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:nb="https://www.newsbreak.com/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>Nextgov/FCW - All Content</title><link>https://www.nextgov.com/</link><description>Federal technology and cybersecurity news and best practices.</description><atom:link href="https://www.nextgov.com/rss/all/" rel="self"></atom:link><language>en-us</language><lastBuildDate>Fri, 15 May 2026 14:51:00 -0400</lastBuildDate><item><title>Nearly 3.4M users across government can use AI through OneGov, GSA official says</title><link>https://www.nextgov.com/artificial-intelligence/2026/05/nearly-34m-users-across-government-can-leverage-ai-through-onegov-gsa-official-says/413588/</link><description>Birgit Smeltzer, director of GSA’s Office of IT Products, IT Category, said “more than 120 orders have been placed against OneGov’s AI offerings,” with savings achieved thus far totaling at least $1.15 billion.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Edward Graham</dc:creator><pubDate>Fri, 15 May 2026 14:51:00 -0400</pubDate><guid>https://www.nextgov.com/artificial-intelligence/2026/05/nearly-34m-users-across-government-can-leverage-ai-through-onegov-gsa-official-says/413588/</guid><category>Artificial Intelligence</category><content:encoded>&lt;![CDATA[&lt;p&gt;Millions of federal users can now take advantage of artificial intelligence-specific tools offered through the General Services Administration&amp;rsquo;s &lt;a href="https://www.gsa.gov/buy-through-us/purchasing-programs/multiple-award-schedule/onegov"&gt;OneGov&lt;/a&gt; initiative, an agency official said on Friday.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Speaking on a &lt;a href="https://web.cvent.com/event/e5f90f03-112a-4190-94e6-93de88fde763/websitePage:d8cbbb27-57d9-4e05-b5a6-545907ff7efa?__vbtrk=MzYxMjA5Ojk1NzI0MTkzOm5ld3NsZXR0ZXI&amp;amp;_uax=MzYxMjA5Ojk1NzI0MTkz"&gt;panel&lt;/a&gt; at the ACT-IAC Emerging Technology and Innovation Conference, Birgit Smeltzer &amp;mdash; director of GSA&amp;rsquo;s Office of IT Products, IT Category &amp;mdash; said &amp;ldquo;more than 120 orders have been placed against OneGov&amp;rsquo;s AI offerings, and that has provided this new technology, or availability, to about 3.4 million across government for this particular technology.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;GSA launched OneGov in April 2025 as a way to offer agencies discounted rates on select private sector technologies and software services by treating the government as one customer. Twenty companies, including Microsoft and Adobe, &lt;a href="https://itvmo.gsa.gov/onegov/"&gt;have reached agreements&lt;/a&gt; with GSA so far to offer significant cost savings on some of their products.&lt;/p&gt;

&lt;p&gt;These deals have also provided agencies and government personnel with the opportunity to onboard new AI capabilities, which GSA officials previously said is &lt;a href="https://www.nextgov.com/ideas/2026/04/year-onegov-over-billion-savings-and-still-growing/413189/"&gt;helping speed up&lt;/a&gt; government use of and experimentation with the tools.&lt;/p&gt;

&lt;p&gt;Smeltzer said multiple agencies have already&amp;nbsp;taken advantage of OneGov&amp;rsquo;s AI offerings, including the departments of Health and Human Services, Veterans Affairs, &lt;a href="https://www.nextgov.com/modernization/2025/12/inside-transportation-departments-technology-transformation/410400/"&gt;Transportation&lt;/a&gt; and State, among others. She added that AI offerings accessed through OneGov can enhance workforce familiarity with the tools as the government looks to increase adoption of the capabilities moving forward.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Now, the agency makes it available to you for maybe a limited time, but you&amp;#39;re able to use it in your workday, and can see how it can benefit you and get your work done more efficiently&amp;nbsp;&amp;mdash;&amp;nbsp;perhaps without losing your job over [using] it,&amp;rdquo; Smeltzer said.&lt;/p&gt;

&lt;p&gt;GSA officials have touted the cost savings associated with using products purchased through the initiative.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We want GSA not to just be a shared service across government, but a force multiplier across the government,&amp;rdquo; GSA Deputy Administrator Mike Lynch said Tuesday at the Coalition for Common Sense in Government Procurement Spring Training Conference in Falls Church.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;He added that GSA has identified $1.15 billion in savings through the OneGov program through negotiated discounts of a variety of AI and software tools using the collective buying power of the federal government. The program, Lynch said, will continue to mature in the coming year.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Lynch also said&amp;nbsp;acquiring AI at discounted rates achieved through OneGov is an ideal follow-up for agencies that have experimented with AI and large language models through the &lt;a href="http://usai.gov"&gt;USAi.gov&lt;/a&gt; shared service platform. Several thousand federal employees have used the &lt;a href="https://www.nextgov.com/artificial-intelligence/2025/08/gsa-introduces-usaigov-streamline-ai-adoption-across-government/407443/"&gt;USAi platform&lt;/a&gt; since GSA launched it last August in response to President Trump&amp;rsquo;s AI Action Plan.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We want to see where we can add value, and we&amp;rsquo;re constantly checking in with industry partners and with agencies to ensure we&amp;rsquo;re providing world-class service,&amp;rdquo; Lynch said.&lt;/p&gt;

&lt;p&gt;In a statement to &lt;em&gt;Nextgov/FCW&lt;/em&gt;, a GSA spokesperson said the AI use and cost savings made possible through OneGov &amp;ldquo;are real, measurable results from unified buying and direct engagement with [original equipment manufacturers].&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;GovExec Editor-in-Chief Frank Konkel contributed to this report.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/15/GettyImages_2229815744/large.jpg" width="618" height="284"><media:credit>Douglas Rissing/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/15/GettyImages_2229815744/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Tech bills of the week: Mandatory AI RMF usage; AI for energy generation and storage; and more</title><link>https://www.nextgov.com/policy/2026/05/tech-bills-week-mandatory-ai-rmf-usage-ai-energy-generation-and-storage-and-more/413583/</link><description>New legislative proposals aim to use artificial intelligence to improve energy generation and storage, along with government workflows and women’s health care.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alexandra Kelley</dc:creator><pubDate>Fri, 15 May 2026 12:51:00 -0400</pubDate><guid>https://www.nextgov.com/policy/2026/05/tech-bills-week-mandatory-ai-rmf-usage-ai-energy-generation-and-storage-and-more/413583/</guid><category>Policy</category><content:encoded>&lt;![CDATA[&lt;p&gt;&lt;strong&gt;Modernizing energy grids with data&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Legislation introduced&amp;nbsp;by Rep. Jimmy Panetta, D-Calif., on May 7 is looking to update the Energy Act of 2020 by modifying and fortifying select energy storage programs and projects as the national demand for power increases amid growing reliance on artificial intelligence.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.congress.gov/bill/119th-congress/house-bill/8706/text?s=1&amp;amp;r=1&amp;amp;hl=artificial+intelligence"&gt;The Better Energy Storage and Safety Act&lt;/a&gt;&amp;nbsp;seeks to outfit the programs established in the Energy Act of 2020 with advanced data analytics, models and diagnostic tools to improve what the bill describes as the &amp;ldquo;safe installation and long-term operation of energy storage systems by abating expected failure modes&amp;rdquo; that could damage power storage systems.&lt;/p&gt;

&lt;p&gt;In addition to outfitting energy storage systems with better data tools to assess their functionality, the bill aims to improve the diagnostic, AI, computing and digital twin capabilities included in energy storage systems.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AI proliferation in export control workflows&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Rep. Ronny Jackson, R-Texas, also &lt;a href="https://www.congress.gov/bill/119th-congress/house-bill/8689/text?s=1&amp;amp;r=2&amp;amp;hl=artificial+intelligence"&gt;introduced a bill&lt;/a&gt;&amp;nbsp;on May 7 seeking to establish an Office of Export Controls and Border Security within the Bureau of Arms Control and Nonproliferation at the Department of State.&lt;/p&gt;

&lt;p&gt;The measure, known as the Strategic Export Controls and Border Security Enhancement Act, would direct the new office to craft a strategy for&amp;nbsp;incorporating&amp;nbsp;AI technologies&amp;nbsp;&amp;mdash;&amp;nbsp;along with other advanced analytics tools &amp;mdash; to help enhance its workflows and activities. Two of the use cases named in the bill include risk identification for customs enforcement in recipient countries.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Push for closed-loop geothermal energy&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;House lawmakers introduced companion legislation to an existing Senate bill that look to spur more research and development in new geothermal energy systems, with a focus on bringing scientific innovation to commercialization.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Reps. Pat Harrigan, R-N.C., and Andrea Salinas, D-Ore., introduced the Next-Generation Geothermal Research and Development Act on May 13. The proposal&amp;nbsp;seeks to move research and development efforts away from geothermal wells and towards closed-loop geothermal systems, the latter of which requires less subterranean water and maintenance.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;America has an enormous source of clean, reliable, baseload power sitting right beneath our feet, and we are barely scratching the surface of what it can do,&amp;rdquo; Harrigan &lt;a href="https://harrigan.house.gov/media/press-releases/congressman-pat-harrigan-introduces-legislation-unlock-next-generation"&gt;said in a statement&lt;/a&gt; accompanying the bill&amp;rsquo;s release. &amp;ldquo;A supercritical geothermal well can produce more than seven times the energy of a conventional geothermal well, and next-generation geothermal has the potential to deliver 90 gigawatts of power to the United States alone.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;One provision in the bill adds the use of AI algorithms to support next-generation geothermal energy research, amending the bill to leverage &amp;lsquo;&amp;lsquo;advanced tools, including machine learning algorithms, to assist&amp;rsquo;&amp;rsquo; in geothermal energy innovation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The bill would amend the Energy Independence and Security Act of 2007. In April, Sens. Cortez Mastro, D-Nev., and Lisa Murkowski, R-Alaska, introduced the&amp;nbsp;&lt;a href="https://www.congress.gov/bill/119th-congress/senate-bill/4406/all-info"&gt;companion legislation&lt;/a&gt; in the upper chamber.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Mandatory AI Risk Management Framework usage&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Rep. Ted Lieu, D-Calif., introduced a bill on Thursday that would require government agencies to use the &lt;a href="https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.100-1.pdf"&gt;AI Risk Management Framework&lt;/a&gt;, a set of voluntary guidance published by the National Institute of Standards and Technology in 2023.&lt;/p&gt;

&lt;p&gt;The bill specifies that only agencies adopting and leveraging AI technologies into federal workflows would be required to adhere to principles in the AI Risk Management Framework, &lt;a href="https://www.congress.gov/bill/119th-congress/house-bill/8819/text?s=2&amp;amp;r=1&amp;amp;hl=artificial+intelligence"&gt;per a summary of the legislation&lt;/a&gt;. Following its introduction, Lieu&amp;rsquo;s bill was referred to the House Science, Space and Technology Committee.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.nextgov.com/artificial-intelligence/2023/01/nist-debuts-long-anticipated-ai-risk-management-framework/382251/"&gt;Key pillars of the RMF&lt;/a&gt; are finding ways to increase the trustworthiness and risk mitigation in developing and implementing AI tools into government networks. It underscores a pathway to effective AI risk prevention, which consists of: govern, map, measure and manage.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Safeguarding connected vehicles&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://www.congress.gov/bill/119th-congress/house-bill/8730/text?s=2&amp;amp;r=6&amp;amp;hl=artificial+intelligence"&gt;Connected Vehicle Security Act of 2026&lt;/a&gt;,&amp;nbsp;introduced on Monday by Rep. John Moolenaar, R-Mich., aims to restrict the import, sale and resale of the software and hardware that powers smart cars and vehicles linked to foreign adversaries.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The bill&amp;rsquo;s chief aim is securing connected vehicles, defined in the bill as incorporating &amp;ldquo;advanced information and communications technologies that collect, process, and transmit vast amounts of sensitive data, including geolocation, operational, and personal information, and are capable of being remotely accessed and controlled.&amp;rdquo;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Software the bill identified as potentially compromising include any machine learning and other AI components that help enable driver decision-making or are used to control an automated driving system within the vehicle. Adversarial nations the bill targets include North Korea, China, Russia and Iran.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;While AI systems are highlighted in the bill, it also prohibits the import and sale of middleware, application and system software that directly support vehicle connectivity capabilities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The hardware prohibited in the bill includes chips, microcontrollers, microcomputers, cell modems, WiFi modules, Bluetooth modules, satellite communication systems&amp;nbsp;and more.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AI for women&amp;rsquo;s midlife health&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sen. Patty Murray, D-Wash., introduced legislation on Tuesday to improve menopausal and mid-life health care for women, featuring a provision leveraging AI for better diagnostics.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://www.congress.gov/bill/119th-congress/senate-bill/4503/text?s=2&amp;amp;r=5&amp;amp;hl=artificial+intelligence"&gt;Advancing Menopause Care and Mid-Life Women&amp;rsquo;s Health Act&lt;/a&gt;&amp;nbsp;calls for a strengthened public health apparatus for women&amp;rsquo;s midlife care, including public outreach campaigns, research programs and treatment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It specifically calls for more government oversight efforts to gauge the safety and efficacy of AI-powered devices for new treatments and diagnostic tools designed for addressing midlife, perimenopause&amp;nbsp;or menopausal symptoms.&amp;nbsp;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/15/large-1/large.jpg" width="618" height="284"><media:credit>Jarmo Piironen/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/15/large-1/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Trump says he and Xi discussed cyberattacks and spying between US, China </title><link>https://www.nextgov.com/cybersecurity/2026/05/trump-says-he-and-xi-discussed-cyberattacks-and-spying-between-us-china/413582/</link><description>“They’re talking about the spying. Well, we do it too,” the president said. “We spy like hell on them too.”</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Fri, 15 May 2026 12:30:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/05/trump-says-he-and-xi-discussed-cyberattacks-and-spying-between-us-china/413582/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;President Donald Trump said on Friday that he and Chinese President Xi Jinping discussed cyberattacks and espionage activities carried out by both nations during their bilateral meeting this week.&lt;/p&gt;

&lt;p&gt;Speaking to reporters aboard Air Force One during his return flight to the United States, Trump, when asked if he raised the topics in their discussions, said, &amp;ldquo;I did. And he talked about attacks that we did in China. Y&amp;rsquo;know, what they do, we do too.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;They&amp;rsquo;re talking about the spying. Well, we do it too,&amp;rdquo; he said. &amp;ldquo;We spy like hell on them too.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I told him, &amp;lsquo;we do a lot of stuff to you that you don&amp;rsquo;t know about and you&amp;rsquo;re doing things to us that we probably do know about,&amp;rsquo;&amp;rdquo; Trump added.&lt;/p&gt;

&lt;p&gt;The president didn&amp;rsquo;t describe specific cyber campaigns that were discussed. China has made waves in recent years for its sweeping intrusions into &lt;a href="https://www.nextgov.com/cybersecurity/2025/08/salt-typhoon-hackers-targeted-over-80-countries-fbi-says/407719/"&gt;telecommunications systems&lt;/a&gt;, government agencies and other infrastructure in the U.S. and around the world.&lt;/p&gt;

&lt;p&gt;One such campaign, tied to a group known as Volt Typhoon, involves cyberspies &lt;a href="https://www.nextgov.com/cybersecurity/2024/05/us-diplomats-told-china-stop-volt-typhoon-campaign-its-becoming-more-advanced-intelligence-officials-say/396361/"&gt;burrowing into&lt;/a&gt; critical infrastructure systems, like power grids and water treatment plants, with the goal of potentially disrupting or sabotaging them to distract the American public in the event China moves to invade Taiwan, officials have assessed.&lt;/p&gt;

&lt;p&gt;Asked about these intrusions, Trump said, &amp;ldquo;Well, you don&amp;rsquo;t know that. I mean, I&amp;rsquo;d like to see it, but it&amp;rsquo;s very possible that they do.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The remarks offer a rare public acknowledgment of the clandestine efforts the U.S. deploys to monitor Chinese computer networks and government officials. Intelligence agencies like the NSA and CIA rely on a range of covert tools, capabilities and secret partnerships to track foreign adversaries.&lt;/p&gt;

&lt;p&gt;The CIA, in particular, has made a more public effort to recruit Chinese officials as assets. Its &lt;a href="https://apnews.com/article/china-cia-informants-ratcliffe-videos-e5a094e39593726442826711b67486f9"&gt;video campaigns&lt;/a&gt; aimed at recruiting Chinese personnel are working and have &amp;ldquo;inspired new sources,&amp;rdquo; an agency official previously said.&lt;/p&gt;

&lt;p&gt;Trump&amp;rsquo;s remarks also reveal a notable diplomatic posture on the issue, particularly given how difficult cyber operations can be to publicly attribute or verify.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Chinese officials routinely deny allegations of hacking and espionage, though Trump&amp;rsquo;s description of his conversation with Xi appeared to suggest some acknowledgment from Beijing that it has sought to infiltrate U.S. computer networks and recruit American assets of its own.&lt;/p&gt;

&lt;p&gt;The White House and the Chinese embassy in Washington did not immediately respond to a request for comment.&lt;/p&gt;

&lt;p&gt;Suspected Chinese spies &lt;a href="https://www.nextgov.com/people/2026/01/suspected-chinese-spies-targeted-former-state-official-venezuela-research/410943/"&gt;sought out&lt;/a&gt; a former senior State Department officer late last year, requesting they draft an assessment of U.S. policy priorities in Venezuela in exchange for payment, &lt;em&gt;Nextgov/FCW&lt;/em&gt; reported in January. Such &lt;a href="https://www.nytimes.com/2026/05/09/us/politics/china-us-spy-congressional-aide.html"&gt;recruitment efforts&lt;/a&gt; have &lt;a href="https://www.nextgov.com/people/2026/02/now-accepting-applications-classified-intel/411255/"&gt;resurfaced&lt;/a&gt; amid a wave of departures from the federal government over the last year, as the administration has pursued various measures to shrink the federal workforce.&lt;/p&gt;

&lt;p&gt;In Trump&amp;rsquo;s second term, U.S. officials have beenseeking a more hardened approach against foreign hackers and cybercriminal groups. In doing so, they have created a budding market for offensive cyber capabilities that government and industry are &lt;a href="https://www.nextgov.com/cybersecurity/2026/04/us-push-counter-hackers-draws-industry-deeper-offensive-cyber-debate/412770/"&gt;still grappling with&lt;/a&gt;. Offensive cyber operations would be among the tools the administration plans to use against groups deemed threats to the U.S., according to a &lt;a href="https://www.nextgov.com/cybersecurity/2026/05/us-lists-offensive-cyberattacks-counterterrorism-strategy/413374/"&gt;counterterrorism strategy&lt;/a&gt; released earlier this month.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/15/GettyImages_2276126799/large.jpg" width="618" height="284"><media:description>U.S. President Donald Trump and Chinese President Xi Jinping attend a welcome ceremony at the Great Hall of the People on May 14, 2026 in Beijing, China.</media:description><media:credit>Alex Wong/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/15/GettyImages_2276126799/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Why access to AI does not equal federal mission capability</title><link>https://www.nextgov.com/ideas/2026/05/why-access-ai-does-not-equal-federal-mission-capability/413552/</link><description>COMMENTARY | Federal agencies need to conduct a hard review of whether their current AI pilots can survive contact with real contracting, oversight and operational demands.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jesse Lambert</dc:creator><pubDate>Fri, 15 May 2026 11:55:00 -0400</pubDate><guid>https://www.nextgov.com/ideas/2026/05/why-access-ai-does-not-equal-federal-mission-capability/413552/</guid><category>Ideas</category><content:encoded>&lt;![CDATA[&lt;p&gt;The White House &lt;a href="https://www.whitehouse.gov/wp-content/uploads/2026/03/03.20.26-National-Policy-Framework-for-Artificial-Intelligence-Legislative-Recommendations.pdf"&gt;National Policy Framework for Artificial Intelligence&lt;/a&gt; and the General Services Administration&amp;#39;s proposed&lt;a href="https://buy.gsa.gov/interact/system/files/GSA_Federal_Acquisition%20Service%20Proposed%20Government%20AI%20System%20Terms%20and%20Conditions.pdf"&gt; Basic Safeguarding of Artificial Intelligence Systems&lt;/a&gt; clause are two different kinds of signal from the administration. One is broad policy direction; the other is operational. Read together, they suggest that the federal AI conversation is moving past access and into execution: data rights, oversight, traceability, portability&amp;nbsp;and the conditions under which AI can actually be used in mission environments.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That shift matters because access to an AI tool is not the same as mission capability. In my work on AI adoption in regulated environments, the hard part is rarely getting a tool in front of users. It is defining what data can be used, who can review outputs, how the system fits existing workflows&amp;nbsp;and what happens when the model, provider, or contract terms change.&lt;/p&gt;

&lt;p&gt;Those questions tend to surface late, often after an initial pilot has already demonstrated technical promise. By that point, agencies are forced to reconcile early experimentation with the realities of procurement, compliance&amp;nbsp;and long-term sustainment. This is where many efforts stall &amp;mdash; not because the technology underperforms, but because the surrounding conditions for responsible use were never fully defined.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Where the GSA clause gets specific&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;That is why the proposed GSAR 552.239-7001 clause matters. Yes, it requires contractors to disclose the AI systems used in contract performance within 30 days after award. But the more important point is what sits around that disclosure: government ownership of government data and custom development, restrictions on using that data to train or improve models, human-oversight and traceability requirements, portability provisions meant to reduce lock-in&amp;nbsp;and notice requirements around material system or service-provider changes.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is not just a compliance exercise; it is the outline of a more disciplined federal operating model for AI procurement and use. Agencies are being pushed to ask harder questions earlier: what enters the system, what leaves it, how it can be monitored, who can intervene&amp;nbsp;and whether it can be changed or exited without starting over. Contractors should read the clause the same way. The issue is no longer simply whether an AI tool performs, but&amp;nbsp;whether it can be used on terms the government can actually live with.&lt;/p&gt;

&lt;p&gt;Taken together, these requirements begin to define the boundaries of acceptable AI use in federal environments. Portability, for example, is not just about vendor flexibility; it is about ensuring continuity of mission if a provider changes terms or no longer meets operational needs. Similarly, traceability is not an abstract governance principle &amp;mdash; it is what allows agencies to validate outputs, respond to audits&amp;nbsp;and maintain accountability in high-stakes environments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Execution still depends on the workforce&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;None of this makes execution automatic. The White House framework is right to emphasize workforce development&amp;nbsp;and the gap is real: policy and contract structure can create better conditions for adoption, but they do not create capability on their own. Agencies still need people who know how to evaluate outputs, manage risk&amp;nbsp;and incorporate AI into real workflows rather than one-off demonstrations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Recent research from the &lt;a href="https://www.ey.com/en_us/newsroom/2026/04/federal-government-agencies-efficiency-efforts-face-significant-barriers"&gt;2026 EY Federal Trends Report&lt;/a&gt; shows that while nearly all federal leaders view AI as critical, 44% identify the workforce skills gap as the primary barrier to modernization. This gap means that even advanced infrastructure will remain underutilized without a parallel investment in people.&lt;/p&gt;

&lt;p&gt;Empowerment requires more than just granting access to a tool. True capability comes from structured support that helps staff understand how to safely incorporate AI into daily workflows. The practical issue is not generic AI literacy. It is operational fluency. Teams need to know when to trust the system, when to escalate, how to document its use&amp;nbsp;and how to work inside the controls that procurement and governance now make more explicit. Without that, agencies will keep mistaking pilot activity for durable capability. When employees feel supported, they use these tools to process data and serve the public more effectively.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What agencies should ask now&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The next step for agencies is not another round of abstract AI enthusiasm. It is a harder review of whether current pilots can survive contact with real contracting, oversight&amp;nbsp;and operational demands. That means looking at each effort not just for model performance, but for governability.&lt;/p&gt;

&lt;p&gt;In practical terms, agency leaders should now ask three questions of every serious AI effort. What rights and controls over data, outputs&amp;nbsp;and model change are actually secured in the contract? Who owns oversight, escalation&amp;nbsp;and operational adoption once the pilot ends? And if the tool works, can the agency scale it or transition away from it without rebuilding from scratch? Those questions get closer to mission capability than simply knowing a team has access to an AI tool.&lt;/p&gt;

&lt;p&gt;The administration&amp;rsquo;s recent moves matter less because they endorse AI in the abstract than because they make the execution challenge harder to ignore. The White House framework sets a direction of travel. The GSA clause begins translating that direction into procurement and operating conditions. The agencies that move fastest from access to capability will not be the ones with the most pilots. They will be the ones that can govern, absorb&amp;nbsp;and scale these systems in ways that hold up under real mission demands.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Jesse Lambert is Senior Principal for Strategy &amp;amp; AI Adoption at Evans, a strategic management services firm. He works with federal mission organizations on AI adoption, governance, operating models and modernization in regulated environments.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/15/GettyImages_2217792229/large.jpg" width="618" height="284"><media:credit>TGI/Tetra Images via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/15/GettyImages_2217792229/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>ODNI assigns two officials to lead intelligence coordination on election threats</title><link>https://www.nextgov.com/defense/2026/05/odni-assigns-two-officials-lead-intelligence-coordination-election-threats/413567/</link><description>For months, it was unclear if ODNI ever named an election threats executive responsible for leading election security efforts in the 2026 midterm cycle.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Thu, 14 May 2026 18:21:00 -0400</pubDate><guid>https://www.nextgov.com/defense/2026/05/odni-assigns-two-officials-lead-intelligence-coordination-election-threats/413567/</guid><category>Defense</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Office of the Director of National Intelligence recently named two officials to a role coordinating with the nation&amp;rsquo;s spy agencies on threats against the 2026 midterm elections, according to a congressional source and a second person familiar with the matter.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Dave Mastro and James Cangialosi will jointly oversee the intelligence community&amp;rsquo;s election threat mission, serving in the role of election threats executive. Both sources requested anonymity to communicate the appointments.&lt;/p&gt;

&lt;p&gt;Mastro serves on the National Intelligence Council, which produces intelligence assessments drawn from findings across the nation&amp;rsquo;s spy agencies, including reports requested by Congress and senior policymakers. Cangialosi serves as deputy director of the National Counterintelligence and Security Center.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We have an expansive team of professionals at ODNI focused on carrying out President [Donald] Trump&amp;rsquo;s and [Director of National Intelligence Tulsi] Gabbard&amp;rsquo;s election integrity efforts,&amp;rdquo; which includes Mastro and Cangialosi, ODNI spokesperson Olivia Coleman said in a statement.&lt;/p&gt;

&lt;p&gt;The office is also &amp;ldquo;providing robust briefings, on par with efforts traditionally carried out during election years, to protect election integrity this midterm cycle,&amp;rdquo; Coleman said.&lt;/p&gt;

&lt;p&gt;For months, it was unclear if ODNI ever named an election threats executive responsible for leading the intelligence community on election security for the coming midterm cycle.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The Record &lt;a href="https://therecord.media/odni-taps-officials-to-coordinate-response-to-election-threats"&gt;first reported&lt;/a&gt; the appointments.&lt;/p&gt;

&lt;p&gt;Established in 2022, the Foreign Malign Influence Center was designed to coordinate spy agencies&amp;rsquo; efforts to identify and assess foreign influence and disinformation threats targeting elections. But an &lt;a href="https://www.nextgov.com/people/2025/08/us-spy-chief-announces-plans-shrink-odni/407594/"&gt;overhaul&lt;/a&gt; inside ODNI launched last summer shifted many of the center&amp;rsquo;s responsibilities to the National Counterintelligence and Security Center and the National Intelligence Council, with ODNI arguing the previous structure raised constitutional concerns over coordination with social media companies.&lt;/p&gt;

&lt;p&gt;The election threats executive &amp;mdash; created in 2019 during Trump&amp;rsquo;s first term &amp;mdash; typically &lt;a href="https://www.congress.gov/crs-product/IF12470#:~:text=of%20critical%20infrastructure.-,Notification,-According%20to%20the"&gt;oversees&lt;/a&gt; an &amp;ldquo;Experts Group&amp;rdquo; that analyzes intelligence on foreign interference efforts.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Election threats can include cyberattacks on voting systems, foreign influence operations and disinformation campaigns aimed at undermining public trust in elections.&lt;/p&gt;

&lt;p&gt;The assignments come as Gabbard has &lt;a href="https://www.nextgov.com/people/2026/02/gabbards-expanded-role-election-security-draws-scrutiny/411295/"&gt;faced criticism&lt;/a&gt; over her involvement in the White House&amp;rsquo;s broader review of election security outcomes, including scrutiny from Democrats tied to her presence during an FBI raid on a Georgia election office and ODNI-led examinations of voting machines in Puerto Rico.&lt;/p&gt;

&lt;p&gt;This year&amp;rsquo;s annual intelligence assessment of worldwide threats to the U.S. &lt;a href="https://www.nextgov.com/defense/2026/03/annual-intelligence-assessment-doesnt-address-foreign-threats-us-elections/412216/"&gt;did not describe&lt;/a&gt; foreign threats to the nation&amp;rsquo;s elections, the first time in nearly a decade.&lt;/p&gt;

&lt;p&gt;Trump has continued to falsely claim the 2020 election was stolen from him, despite courts, audits and state reviews finding no evidence of widespread fraud that would have changed the outcome.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The appointments also come amid broader changes to the federal government&amp;rsquo;s election security apparatus ahead of the 2026 midterms. In recent months, Democrats and state election officials have &lt;a href="https://www.nextgov.com/cybersecurity/2026/04/federal-drawdown-election-support-destroyed-ongoing-relationships-experts-say/413181/"&gt;raised concerns&lt;/a&gt; over cuts to election-focused programs at the Cybersecurity and Infrastructure Security Agency, which has lost around a third of its workforce in the last year.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/14/GettyImages_2268831922-5/large.jpg" width="618" height="284"><media:description>Director of National Intelligence Tulsi Gabbard stands after President Donald Trump spoke about the Iran war from the Cross Hall of the White House on April 1, 2026 in Washington, DC. </media:description><media:credit>Alex Brandon-Pool/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/14/GettyImages_2268831922-5/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>House panel approves slate of DHS intelligence reform bills</title><link>https://www.nextgov.com/policy/2026/05/house-panel-approves-slate-dhs-intelligence-reform-bills/413566/</link><description>The measures aim to modernize terror alerts, expand local threat support and standardize training under the Office of Intelligence and Analysis, which the Trump administration is seeking to restructure.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Thu, 14 May 2026 17:22:00 -0400</pubDate><guid>https://www.nextgov.com/policy/2026/05/house-panel-approves-slate-dhs-intelligence-reform-bills/413566/</guid><category>Policy</category><content:encoded>&lt;![CDATA[&lt;p&gt;The House Homeland Security Committee advanced a raft of bills on Thursday seeking to refine the Homeland Security Department&amp;rsquo;s Office of Intelligence and Analysis and improve its ability to defend against various threats targeting state, local, tribal and territorial communities.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://homeland.house.gov/hearing/media-advisory-subcommittee-chairman-pfluger-to-hold-markup-for-ia-reform-legislation/"&gt;seven bipartisan bills&lt;/a&gt; mark Congress&amp;rsquo; latest attempt to shore up the intelligence office after a year of workforce upheaval and longstanding bipartisan pressure for reforms tied to concerns over politicization and surveillance overreach.&lt;/p&gt;

&lt;p&gt;A centerpiece measure led by Rep. August Pfluger, R-Texas &amp;mdash; who chairs the panel&amp;rsquo;s counterterrorism and intelligence subcommittee &amp;mdash; seeks to clarify I&amp;amp;A&amp;rsquo;s role under the Homeland Security Act by emphasizing the office&amp;rsquo;s responsibility to facilitate two-way threat intelligence sharing between federal authorities and state and local partners.&lt;/p&gt;

&lt;p&gt;Other Democrat-led measures included efforts aimed at updating how DHS handles public threat warnings, shares intelligence and trains analysts. The proposals would push DHS to modernize the nation&amp;rsquo;s terrorism alert system, increase support for state and local officials facing potential foreign espionage risks and require more standardized training for intelligence personnel on analytic standards, privacy and civil liberties protections.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;It&amp;rsquo;s no secret that I&amp;amp;A has had challenges in the past. Concerns around mission overreach, political bias and other hurdles have hurt this agency&amp;#39;s reputation,&amp;rdquo; Pfluger said during the committee markup of the measures. &amp;ldquo;Yet everyone here recognizes how important its mission is to securing the homeland.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The Trump administration is seeking to &lt;a href="https://www.nextgov.com/policy/2026/04/presidents-budget-proposes-folding-beleaguered-dhs-intelligence-office-headquarters/412617/"&gt;combine&lt;/a&gt; I&amp;amp;A and the department&amp;rsquo;s Office of the Secretary and Executive Management, Management Directorate and Office of Situational Awareness into a single unit reporting to the DHS secretary. It&amp;rsquo;s not clear how these measures would run up against those efforts. The new structure &lt;a href="https://www.nextgov.com/policy/2026/04/dhs-intelligence-office-restructuring-would-still-keep-it-under-odni-oversight/412780/"&gt;would not affect&lt;/a&gt; its oversight under the Office of the Director of National Intelligence, an administration official previously told &lt;em&gt;Nextgov/FCW&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;I&amp;amp;A was slated for major workforce reductions in President Donald Trump&amp;rsquo;s second term, &lt;em&gt;Nextgov/FCW&lt;/em&gt; first reported last July. Those plans, which would have only kept some 275 people at the office, drew &lt;a href="https://www.nextgov.com/people/2025/07/trump-admin-faces-multi-front-pushback-reported-plans-cut-most-dhs-intel-bureau/406508/"&gt;major pushback&lt;/a&gt; from law enforcement organizations and Jewish groups that long relied on the agency to disseminate timely intelligence about threats that concern their communities.&lt;/p&gt;

&lt;p&gt;The downsizing was put on hold just days later, but I&amp;amp;A reignited efforts soon after to shed its workforce more gradually. As of now, the office has around 550 full-time employees, according to a person familiar with the matter who requested anonymity to provide the figure. That number preserves more staff than the initial plans to cap the workforce at 275, but it is still half of the 1,000-person operation in place earlier last year.&lt;/p&gt;

&lt;p&gt;The office falls within the purview of the Senate and House Intelligence committees, but its status as a DHS component also subjects it to oversight from the Homeland Security panels in both chambers of Congress.&lt;/p&gt;

&lt;p&gt;In November, &lt;em&gt;Nextgov/FCW&lt;/em&gt; &lt;a href="https://www.nextgov.com/policy/2025/11/congress-weighed-measure-curtail-scope-dhs-intelligence-office/409653/"&gt;reported&lt;/a&gt; that the House Intelligence Committee privately weighed a measure in the annual intelligence community authorization bill to significantly curtail the size and scope of I&amp;amp;A. The provision would have barred the office from gathering and analyzing intelligence, effectively turning I&amp;amp;A into a clearinghouse for intelligence findings produced elsewhere and stripping it of standard spy agency collection authorities.&lt;/p&gt;

&lt;p&gt;The lesser-known intelligence office at DHS has faced controversy for its role in alleged unchecked domestic surveillance. During the 2020 racial justice protests, I&amp;amp;A analysts &lt;a href="https://www.washingtonpost.com/national-security/dhs-compiled-intelligence-reports-on-journalists-who-published-leaked-documents/2020/07/30/5be5ec9e-d25b-11ea-9038-af089b63ac21_story.html"&gt;collected intelligence&lt;/a&gt; on journalists and demonstrators in Portland, Oregon, which sparked vast internal oversight and led to the removal of a top official.&lt;/p&gt;

&lt;p&gt;A separate congressional probe after the January 6, 2021, riots at the U.S. Capitol found that I&amp;amp;A and the FBI received &lt;a href="https://www.hsgac.senate.gov/media/dems/peters-report-finds-significant-intelligence-failures-by-fbi-and-dhs-in-lead-up-to-january-6th-capitol-attack/"&gt;numerous tips&lt;/a&gt; about online posts threatening violence at the site of the day&amp;rsquo;s events, but that such intel was not analyzed and flagged to law enforcement.&lt;/p&gt;

&lt;p&gt;The office was created as part of the formation of DHS after the Sept. 11 terrorist attacks to coordinate intelligence on homeland threats and expand information sharing with state and local authorities.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/14/GettyImages_2275484913/large.jpg" width="618" height="284"><media:description>Rep. August Pfluger, R-Texas, leaves the House Republican Conference caucus meeting at the Capitol Hill Club in Washington on Wednesday, May 13, 2026. His bill seeking to seeks to clarify I&amp;A’s role under the Homeland Security Act passed the House Homeland Security Committee on Thursday.</media:description><media:credit>Bill Clark/CQ-Roll Call, Inc via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/14/GettyImages_2275484913/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>NIST aims for summer release of AI cyber guidelines</title><link>https://www.nextgov.com/artificial-intelligence/2026/05/nist-aims-summer-release-ai-cyber-guidelines/413559/</link><description>Draft iterations of cybersecurity guidance for AI-driven threats across different types of emerging systems are in development as the federal government wades into AI model risk assessments.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alexandra Kelley</dc:creator><pubDate>Thu, 14 May 2026 16:05:00 -0400</pubDate><guid>https://www.nextgov.com/artificial-intelligence/2026/05/nist-aims-summer-release-ai-cyber-guidelines/413559/</guid><category>Artificial Intelligence</category><content:encoded>&lt;![CDATA[&lt;p&gt;The National Institute of Standards and Technology is slated to debut new guidance on artificial intelligence-specific cybersecurity to help mitigate AI-enabled digital threats while maximizing the benefits of safe AI adoption.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Speaking at a Qualys &lt;a href="https://events.govexec.com/qualys-rocon-public-sector-2026/"&gt;conference&lt;/a&gt; on Thursday, Victoria Pillitteri, the manager of the Security Engineering and Risk Management Group at NIST, said she expects a cybersecurity framework profile for AI to debut &amp;ldquo;sometime this summer&amp;rdquo; pending agency approval.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The forthcoming draft AI cybersecurity framework is slated to be accompanied by guidance on control overlays &amp;mdash; or sets of tailored cybersecurity baselines to manage risks unique to different AI systems &amp;mdash; with the help of NIST&amp;rsquo;s Center for AI Standards and Innovation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Pillitteri told &lt;em&gt;Nextgov/FCW &lt;/em&gt;that her team and CAISI have started to develop a series of overlay guidance focused on cyber threats targeting agentic, predictive and generative AI systems.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;This [administration&amp;rsquo;s] priority is speed; being innovative and scaling at speed,&amp;rdquo; Pillitteri said. &amp;ldquo;So that means everything does have to move faster. We&amp;#39;re trying to evolve the way that we develop, maintain and engage with our stakeholders. For our standards and guidelines, we&amp;#39;re trying to ensure that we are addressing these critical areas where cybersecurity intersects AI on multiple fronts.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;She said the draft of overlay guidance for predictive AI is expected to arrive this summer, while the overlay guidance on agentic systems is due in late summer to early fall. NIST plans to finalize the guidance by 2027.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The intention is to issue all of these guidelines sequentially in draft,&amp;rdquo; Pillitteri said. &amp;ldquo;This way we can take lessons learned, improvements, revise everything, but yet still get something out quickly, because we realize adoption is happening now.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;As the federal government mulls how best to understand the digital risks posed by increasingly powerful AI models &amp;mdash; such as Anthropic&amp;rsquo;s Mythos Preview model that was unveiled &lt;a href="https://www.nextgov.com/cybersecurity/2026/04/anthropics-glasswing-initiative-raises-questions-us-cyber-operations/412721/"&gt;in its Project Glasswing testing initiative&lt;/a&gt; &amp;mdash; CAISI will play a key role.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Last week, the &lt;a href="https://www.nextgov.com/artificial-intelligence/2026/05/commerce-ai-center-will-evaluate-google-deepmind-microsoft-and-xai-models/413349/"&gt;Department of Commerce announced&lt;/a&gt; it secured new agreements between leading AI developers Google DeepMind, Microsoft and xAI to submit their models for testing in CAISI. Researchers at CAISI will specifically look at the national security ramifications of these companies&amp;rsquo; frontier AI models.&lt;/p&gt;

&lt;p&gt;As of Thursday, the press release announcing the private sector partnership with CAISI has been removed. The Washington Post &lt;a href="https://www.washingtonpost.com/politics/2026/05/11/trump-ai-regulation-commerce-intelligence/"&gt;reported&lt;/a&gt; on Monday that a person familiar with the decision said the page was removed because of sensitivities&amp;nbsp;within the White House.&lt;/p&gt;

&lt;p&gt;Pillitteri said that while standards disseminated by NIST can&amp;rsquo;t keep pace with rapidly evolving technologies like AI, the forthcoming guidance aims to offer a fundamental playbook for vendor and supply chain partners to constantly fortify their data security infrastructure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;It&amp;#39;s not a rip and replace,&amp;rdquo; she said. &amp;ldquo;It&amp;#39;s, &amp;lsquo;How do we augment what we have? How do we adapt the technologies, the architectures, our products, solutions and services, and how do we augment our workforce &amp;hellip; to support the future needs that we&amp;#39;re building for ahead?&amp;rsquo;&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/14/GettyImages_1452604857/large.jpg" width="618" height="284"><media:credit>Shutthiphong Chandaeng/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/14/GettyImages_1452604857/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>VA security personnel aren’t detecting knives or booze, according to a watchdog report assessing medical facility security </title><link>https://www.nextgov.com/modernization/2026/05/knives-alcohol-watchdog-medical-facility-security/413555/</link><description>The Government Accountability Office highlighted that there are staffing shortages among VA police, but department officials say they have taken steps to address the issue.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sean Michael Newhouse</dc:creator><pubDate>Thu, 14 May 2026 15:32:00 -0400</pubDate><guid>https://www.nextgov.com/modernization/2026/05/knives-alcohol-watchdog-medical-facility-security/413555/</guid><category>Modernization</category><content:encoded>&lt;![CDATA[&lt;p&gt;Police officers who guard Veterans Affairs Department medical facilities failed to address security issues in a majority of covert tests conducted by the Government Accountability Office, which also determined that VA leaders have not fully implemented federal building security best practices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.gao.gov/assets/gao-26-107952.pdf"&gt;The report&lt;/a&gt;, which was published on Wednesday, found that:&lt;/p&gt;

&lt;ul&gt;
	&lt;li aria-level="1"&gt;VA staff at all 30 locations that were examined failed to detect a multi-tool with a prohibited knife blade. Investigators noted that only two of the buildings had metal detectors: one of them was not in use and in the other case the device set the detector off but officers did not act on it.&amp;nbsp;&lt;/li&gt;
	&lt;li aria-level="1"&gt;In 25 out of 26 tests, VA employees did not notice or respond to an undercover GAO investigator who was drinking from a bottle that appeared to contain alcohol in a waiting room, even though guards were nearby in more than a quarter of the cases.&amp;nbsp;&lt;/li&gt;
	&lt;li aria-level="1"&gt;At eight of 16 facilities, investigators were able to enter nonpublic spaces, such as offices, treatment rooms and a blood draw lab.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In 2025, &lt;a href="https://www.gao.gov/products/gao-25-108085"&gt;GAO similarly reported&lt;/a&gt; that contracted guards for agencies governmentwide failed to detect prohibited items in about half of its covert tests.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The VA has more than 4,300 police officers, physical security specialists and investigators as well as roughly 800 contract security guards.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;VA&amp;rsquo;s inspector general found that in fiscal 2025 &lt;a href="https://www.vaoig.gov/sites/default/files/reports/2025-08/vaoig-25-01135-196-final.pdf"&gt;police officers were the most frequently reported severe nonclinical occupational staffing shortage in the department&lt;/a&gt;, with 58% of medical facilities saying they didn&amp;rsquo;t have enough security personnel.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Quinn Slaven, VA&amp;rsquo;s press secretary, said by email to &lt;em&gt;Government Executive &lt;/em&gt;that officials have worked to address the issue by collaborating with the Office of Personnel Management to reclassify department police officers so that they can receive higher pay. He also said that the VA has consolidated law enforcement operations under one office, so that officers aren&amp;rsquo;t reporting to multiple different medical center directors.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;GAO also faulted the VA for not adhering to Interagency Security Committee risk management standards for federal buildings. Specifically, officials are not consistently documenting why they make certain security decisions considering available resources or measuring the performance of protective measures.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The watchdog recommended that VA enact&amp;nbsp;the government facility security guidelines.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;By fully implementing this standard, VA will be better able to make informed decisions, effectively allocate resources and prioritize security efforts at its medical facilities,&amp;rdquo; they wrote. &amp;ldquo;In addition, fully implementing this standard could help VA ensure it has appropriate security at its medical facilities to create a safe environment for veterans and VA staff.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.gao.gov/products/gao-18-201"&gt;GAO also recommended in 2018 that the VA incorporate ISC standards, but officials did not do so.&lt;/a&gt;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In the new report, GAO also found that about 98% of the approximately 74,700 crimes reported by the VA police in fiscal years 2024 and 2025 were nonviolent.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;GAO said in the report that the VA did not provide comments on the investigation. Agencies typically offer feedback on investigations by the watchdog that officials then incorporate into the report. Slaven, however, told &lt;em&gt;Government Executive &lt;/em&gt;that the VA did submit comments but that GAO didn&amp;rsquo;t include them.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In response, a GAO spokesperson said that VA submitted a message agreeing with the recommendations in the report after it had been sent to the senator who requested the investigation.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/14/051426_Getty_GovExec_VA_Medical-1/large.jpg" width="618" height="284"><media:description>The Veterans Affairs Department employs more than 4,300 police officers, physical security specialists and investigators. </media:description><media:credit>Julio Tamayo / Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/14/051426_Getty_GovExec_VA_Medical-1/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>White House withholds $1.3B in Medicaid payments to California amid broader fraud crackdown</title><link>https://www.nextgov.com/digital-government/2026/05/white-house-withholds-13b-medicaid-payments-california-amid-broader-fraud-crackdown/413543/</link><description>Vice President JD Vance said the administration will audit states’ Medicaid Fraud Control Units and threatened to “turn off” federal funding for the watchdogs if their fraud prevention efforts are found to be deficient.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Edward Graham</dc:creator><pubDate>Thu, 14 May 2026 13:28:00 -0400</pubDate><guid>https://www.nextgov.com/digital-government/2026/05/white-house-withholds-13b-medicaid-payments-california-amid-broader-fraud-crackdown/413543/</guid><category>Digital Government</category><content:encoded>&lt;![CDATA[&lt;p&gt;Vice President JD Vance announced on Wednesday that the federal government is &amp;ldquo;deferring&amp;rdquo; $1.3 billion in Medicaid reimbursements to California and said the administration would withhold payments from additional states if they do not ramp up their efforts to root out fraud in federal benefits programs.&lt;/p&gt;

&lt;p&gt;The notice came as part of President Donald Trump&amp;rsquo;s &amp;ldquo;war on fraud,&amp;rdquo; which Vance is leading as the head of the White House&amp;rsquo;s &lt;a href="https://www.nextgov.com/digital-government/2026/03/trumps-anti-fraud-task-force-poised-scrutinize-benefits-programs/412219/?oref=ng-homepage-river"&gt;anti-fraud task force&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The unit, established in March by executive order, was granted the authority to withhold funding from state and local jurisdictions &amp;ldquo;that do not have adequate anti-fraud requirements,&amp;rdquo; per the order, although the effort has been somewhat clouded by &lt;a href="https://stateline.org/2026/04/16/trump-says-hes-going-after-medicaid-fraud-but-is-mostly-focusing-on-blue-states/"&gt;allegations&lt;/a&gt; of political bias. The &lt;a href="https://www.whitehouse.gov/presidential-actions/2026/03/establishing-the-task-force-to-eliminate-fraud/"&gt;directive&lt;/a&gt; establishing the task force noticeably specifically called out Democrat-led states for failing to address fraud in their benefits programs.&lt;/p&gt;

&lt;p&gt;The White House kicked off its fraud prevention efforts by announcing in February it was &lt;a href="https://www.nextgov.com/policy/2026/02/white-house-war-fraud-begin-freezing-medicaid-payments-minnesota/411719/"&gt;withholding more than $240 million&lt;/a&gt; in Medicaid funding from Minnesota following allegations of misuse of public funds in the state&amp;rsquo;s social services.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Vance said the move to withhold Medicaid payments from California, in particular, was because the administration believes the state &amp;ldquo;has not taken fraud very seriously.&amp;rdquo;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;He downplayed any partisan undertones for the administration&amp;rsquo;s broader fraud prevention push, saying &amp;ldquo;we have red states and blue states that go after fraud aggressively,&amp;rdquo; although he added that &amp;ldquo;we also unfortunately have some states &amp;mdash; mostly blue states, unfortunately ​​&amp;mdash; that do not take Medicaid fraud very seriously.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;During Wednesday&amp;rsquo;s &lt;a href="https://www.c-span.org/program/news-conference/vice-president-jd-vance-holds-news-conference-on-federal-anti-fraud-initiatives/679081"&gt;news conference&lt;/a&gt;, Vance also said the federal government plans to review every state&amp;rsquo;s federally-funded Medicaid Fraud Control Units &amp;mdash; or MFCUs &amp;mdash; and will &amp;ldquo;turn off&amp;rdquo; funding for those watchdogs if their fraud prevention efforts are deemed insufficient.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;And if we continue to find problems, we can turn off other resources within their state Medicaid programs as well,&amp;rdquo; he added.&lt;/p&gt;

&lt;p&gt;The Wall Street Journal first &lt;a href="https://www.wsj.com/politics/policy/trump-jd-vance-medicaid-fraud-40e9e78e"&gt;reported&lt;/a&gt; on Wednesday that attorneys general in all 50 states received a letter from Department of Health and Human Services Inspector General Thomas Bell stating that the administration will be conducting &amp;ldquo;a robust review&amp;rdquo; of their MFCUs to ensure they are effectively combating Medicaid fraud.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We want to help you use technology and other tools to get rid of the fraud, to get to the root of the fraud,&amp;rdquo; Vance said during the news conference about working with states to bolster their fraud prevention efforts. &amp;ldquo;We want to help you, but we can only help these state programs if those state programs are willing to help themselves. So these letters are the first step &amp;mdash; the first effort &amp;mdash; to try to force these states to get serious about prosecuting fraud, and that&amp;#39;s exactly what we&amp;#39;re doing.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The Centers for Medicare and Medicaid Services also &lt;a href="https://www.cms.gov/newsroom/press-releases/cms-announces-aggressive-nationwide-crackdown-fraud-six-month-hospice-home-health-agency-enrollment"&gt;announced&lt;/a&gt; on Wednesday that it is implementing a six-month freeze on all new Medicare enrollments for hospices and home health agencies to halt what it called &amp;ldquo;high-risk categories&amp;rdquo; for fraudulent activity.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Since the start of Trump&amp;rsquo;s second administration, CMS has touted its use of new tools and technologies, including artificial intelligence, to better identify improper payments.&lt;/p&gt;

&lt;p&gt;During a March &lt;a href="https://www.nextgov.com/artificial-intelligence/2026/03/cms-expands-tech-driven-fight-against-medicaid-fraud/412256/"&gt;interview&lt;/a&gt; with &lt;em&gt;Nextgov/FCW&lt;/em&gt;, Kim Brandt &amp;mdash; deputy administrator and chief operating officer at CMS &amp;mdash; said the agency was using many of these capabilities in its Fraud Defense Operations Center to help &amp;ldquo;detect spikes or aberrancies in current claim submissions.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Brandt said at the time FDOC&amp;rsquo;s work, including the use of AI and enhanced data analysis, allowed the agency to save over $2 billion that would have otherwise gone toward improper Medicare payments. She added that CMS was looking to expand out its new technologies to identify further waste, fraud and abuse in the Medicaid program.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/14/GettyImages_2275482501/large.jpg" width="618" height="284"><media:description> Vice President JD Vance speaks alongside Administrator for the Centers for Medicare and Medicaid Services Mehmet Oz during a press conference on anti-fraud initiatives at the Eisenhower Executive Office building on the White House campus in Washington, DC, on May 13, 2026.</media:description><media:credit>Kent NISHIMURA / AFP via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/14/GettyImages_2275482501/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>House Homeland panel gets briefing on Anthropic’s Mythos</title><link>https://www.nextgov.com/artificial-intelligence/2026/05/house-homeland-panel-gets-briefing-anthropics-mythos/413542/</link><description>The conversation was “productive and focused on a range of AI security and competitiveness issues,” according to one person familiar with the meeting.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Thu, 14 May 2026 13:08:00 -0400</pubDate><guid>https://www.nextgov.com/artificial-intelligence/2026/05/house-homeland-panel-gets-briefing-anthropics-mythos/413542/</guid><category>Artificial Intelligence</category><content:encoded>&lt;![CDATA[&lt;p&gt;Members of the House Homeland Security Committee were briefed Wednesday on Mythos, the Anthropic artificial intelligence model that has drawn vast attention across the cybersecurity community for its advanced hacking capabilities.&lt;/p&gt;

&lt;p&gt;Anthropic executives provided the panel with a live demonstration of Mythos, allowing members to see how advanced AI can identify and reason through software vulnerabilities, according to a committee aide who attended the briefing and requested anonymity to communicate details of the demo.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;What we saw reinforced the urgency of ensuring that federal agencies, including our civilian cyber defenders, can responsibly access and deploy the most advanced U.S. models to find and patch vulnerabilities before foreign adversaries or criminal actors exploit them,&amp;rdquo; said the aide, who noted the briefing was one of the first live demonstrations delivered to Congress.&lt;/p&gt;

&lt;p&gt;President Donald Trump is meeting with Chinese President Xi Jinping this week, where AI competition is expected to come up in the discussion. Last month, the White House &lt;a href="https://www.nextgov.com/artificial-intelligence/2026/04/white-house-accuses-china-deliberate-industrial-scale-campaigns-steal-us-ai-models/413083/"&gt;accused Beijing&lt;/a&gt; of attempting to copy components of U.S. AI systems to build similar models of its own through a process known as distillation.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;As the [People&amp;rsquo;s Republic of China] aggressively works to close the AI innovation gap with the United States, the committee remains focused on ensuring that America&amp;rsquo;s AI leadership translates into a durable national security advantage, not a temporary lead that adversaries can copy, steal or rapidly commoditize,&amp;rdquo; the aide added.&lt;/p&gt;

&lt;p&gt;The briefing was &amp;ldquo;productive and focused on a range of AI security and competitiveness issues,&amp;rdquo; according to a second person familiar with the demo.&lt;/p&gt;

&lt;p&gt;Members discussed how the U.S. can preserve its advantage in AI, including maintaining leadership in compute power and preventing China from obtaining advanced chips, said the person, who added that attendees discussed safeguards for advanced AI models and ensuring future systems are developed and deployed safely and securely.&lt;/p&gt;

&lt;p&gt;Lawmakers also asked questions about Anthropic&amp;rsquo;s engagement with the federal government, including whether an ongoing &lt;a href="https://www.defenseone.com/business/2026/03/pentagons-war-anthropic-based-dubious-legal-thinking-and-ideologynot-real-risk-sources-say/411849/"&gt;legal dispute&lt;/a&gt; over a Defense Department supply chain risk designation against the company is affecting conversations about the use of AI models across federal agencies, including at CISA, which reportedly &lt;a href="https://www.axios.com/2026/04/21/cisa-anthropic-mythos-ai-security"&gt;doesn&amp;rsquo;t have full access&lt;/a&gt; to the model.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The second person did not add additional details about who in the government has access to Mythos, but said &amp;ldquo;the implications of advanced AI tools for state and local governments and under-resourced critical infrastructure sectors, including water systems, were also discussed.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Mythos, unveiled last month, was held back from a full public release on the grounds that it could pose national security risks in the wrong hands. U.S. critical infrastructure stakeholders have been &lt;a href="https://www.nextgov.com/cybersecurity/2026/05/operational-technology-providers-are-feeling-annoyance-exclusion-anthropics-mythos-rollout-sources-say/413309/"&gt;vying for access&lt;/a&gt; to the tool so it can be run against their own systems to identify and patch previously undiscovered vulnerabilities that could be exploited by hackers.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The Hill &lt;a href="https://thehill.com/policy/technology/5875253-house-briefing-anthropic-mythos/"&gt;first reported&lt;/a&gt; news of the demo.&lt;/p&gt;

&lt;p&gt;It&amp;rsquo;s unclear which government agencies have access to Mythos, although multiple reports and people familiar with the matter previously confirmed to &lt;em&gt;Nextgov/FCW&lt;/em&gt; that the NSA is among them.&lt;/p&gt;

&lt;p&gt;Senate Intelligence Committee Vice Chairman Mark Warner, D-Va., &lt;a href="https://www.politico.com/live-updates/2026/05/14/congress/house-homeland-gets-live-demonstration-of-anthropic-mythos-model-00920041"&gt;told Politico&lt;/a&gt; that he and Chairman Tom Cotton, R-Ark., were briefed on Mythos by Gen. Joshua Rudd, who leads Cyber Command and the NSA, but did not provide further details.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/14/GettyImages_2268294044/large.jpg" width="618" height="284"><media:description> House Homeland Security Chairman Rep. Andrew Garbarino, R-N.Y., and Ranking Member Rep. Bennie Thompson, D-Miss., look on ahead of a House Homeland Security Committee hearing on Capitol Hill on March 25, 2026 in Washington, DC. Members of the committee received a briefing on Wednesday about Anthropic's Mythos AI model.</media:description><media:credit>Andrew Harnik/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/14/GettyImages_2268294044/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Five steps to make commercial-first government work</title><link>https://www.nextgov.com/ideas/2026/05/five-steps-make-commercial-first-government-work/413523/</link><description>COMMENTARY | Recent federal mandates make clear that the status quo is no longer acceptable.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Irina Denisenko</dc:creator><pubDate>Wed, 13 May 2026 15:56:00 -0400</pubDate><guid>https://www.nextgov.com/ideas/2026/05/five-steps-make-commercial-first-government-work/413523/</guid><category>Ideas</category><content:encoded>&lt;![CDATA[&lt;p&gt;The White House&amp;rsquo;s April 2025&amp;nbsp;&lt;a href="https://www.whitehouse.gov/presidential-actions/2025/04/ensuring-commercial-cost-effective-solutions-in-federal-contracts/"&gt;Executive Order&lt;/a&gt;, reinforced last month by&amp;nbsp;&lt;a href="https://www.whitehouse.gov/wp-content/uploads/2026/04/M-26-12-Increasing-the-Acquisition-of-Commercial-Products-and-Services.pdf"&gt;Memorandum M-26-12&lt;/a&gt;,&amp;nbsp;marks a decisive shift in how the federal government approaches technology acquisition.&lt;/p&gt;

&lt;p&gt;For years, agencies have been encouraged to prioritize commercial off-the-shelf (COTS) solutions, yet entrenched procurement practices have continued to favor costly, time-intensive custom builds. The new mandate makes clear that this status quo is no longer acceptable.&lt;/p&gt;

&lt;p&gt;Directing agencies to increase the use of commercial products and services (and to justify when they do not) signals a broader effort to align federal technology strategy with the speed, scale and innovation of the private sector.&lt;/p&gt;

&lt;p&gt;Turning this policy into measurable outcomes will require more than intent; it will require practical and&amp;nbsp;structural changes in how government evaluates, acquires and deploys technology.&lt;/p&gt;

&lt;p&gt;Here are five recommendations to help translate this mandate into real progress:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Default to commercial first, with clear justification for exceptions&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A true shift to commercial-first must begin at the earliest stages of acquisition planning. Agencies should start every requirement with a structured market analysis to identify existing solutions that meet mission needs and treat that assessment as foundational, not procedural.&lt;/p&gt;

&lt;p&gt;When bespoke builds are proposed, the justification should be rigorous. Agencies must demonstrate not only that no viable commercial option exists, but that customization delivers clear advantages in cost, performance or mission outcomes. This flips the current dynamic, where custom development is too often the default. Embedding this discipline early will reduce redundant development, accelerate deployment and better align spending with proven, scalable technologies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Standardize security and compliance baselines across agencies&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Inconsistent interpretations of security requirements remain a major barrier to adoption. Even within shared frameworks, agencies often apply standards differently, thus leading to duplication, delays and uncertainty. Establishing a common baseline, paired with enforceable reciprocity, would streamline adoption significantly. If a solution is authorized under a recognized federal standard, that approval should be portable across agencies with minimal modification.&lt;/p&gt;

&lt;p&gt;Standardization does not weaken security, but strengthens it by creating clearer expectations, enabling deeper scrutiny&amp;nbsp;and eliminating redundant reviews that add cost without improving outcomes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Move from point-in-time approvals to continuous validation&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Traditional certification models rely on point-in-time assessments that quickly become outdated. Systems are approved based on a snapshot, even as software and threats evolve continuously.&lt;/p&gt;

&lt;p&gt;A more effective model is continuous validation using automation, real-time monitoring and ongoing control assessments to maintain a current view of risk. This allows agencies to move faster while improving oversight. By aligning authorization with modern software practices, agencies can deploy updates more quickly, respond to threats in real time and maintain stronger assurance over time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Create reusable &amp;ldquo;authorization pathways&amp;rdquo; for proven technologies&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Today, even widely used technologies often undergo redundant authorization processes in each agency. This slows adoption and discourages innovative providers from engaging with government. Reusable authorization pathways would allow previously assessed technologies to move more efficiently across agencies with similar risk profiles. This could include shared assessment artifacts, pre-approved solution categories or government-wide authorization packages. Treating prior assessments as reusable assets would reduce time-to-deployment while maintaining confidence in security and create a more predictable pathway for commercial providers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Incentivize acquisition teams based on outcomes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Procurement systems often reward adherence to process over delivery of results. While compliance is essential, overemphasis on process can discourage speed, innovation and smart risk-taking. Agencies should evolve their process for how success is measured by&amp;nbsp;focusing on time-to-deployment, total cost of ownership, mission impact and user adoption. Aligning incentives with outcomes will encourage teams to pursue more efficient, effective solutions. Empowered with the right metrics and support, acquisition professionals are far more likely to embrace commercial technologies and deliver meaningful results.&lt;/p&gt;

&lt;p&gt;Without structural change, this will be another well-intentioned directive. With it, it could mark the beginning of a fundamentally more modern, effective federal technology ecosystem.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Irina Denisenko is the CEO of Knox Systems, a cybersecurity pioneer delivering FedRAMP as a Service to help SaaS companies enter and scale in the government market. With deep expertise in technology, government and enterprise, Irina brings a track record of building trusted, scalable systems at the intersection of innovation and compliance.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/13/GettyImages_2249332999/large.jpg" width="618" height="284"><media:credit>mathisworks/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/13/GettyImages_2249332999/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Air Force taps Salesforce’s Army contract for personnel modernization work</title><link>https://www.nextgov.com/emerging-tech/2026/05/air-force-taps-salesforces-army-contract-personnel-modernization-work/413522/</link><description>The enterprise license agreement is part of a $5.6 billion vehicle and will bring agentic artificial intelligence to workforce and logistics management.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nick Wakeman</dc:creator><pubDate>Wed, 13 May 2026 15:28:00 -0400</pubDate><guid>https://www.nextgov.com/emerging-tech/2026/05/air-force-taps-salesforces-army-contract-personnel-modernization-work/413522/</guid><category>Emerging Tech</category><content:encoded>&lt;![CDATA[&lt;p&gt;Salesforce has signed a new $72 million enterprise license agreement with the Air Force to modernize personnel management and other functions using artificial intelligence.&lt;/p&gt;

&lt;p&gt;This is part of a $5.6 billion contract Salesforce &lt;a href="https://www.washingtontechnology.com/companies/2026/01/salesforce-signs-55b-contract-army/410944/"&gt;and the&amp;nbsp;Army inked in January&lt;/a&gt;. The idea was that the vehicle would be open to all of the Defense Department.&lt;/p&gt;

&lt;p&gt;The agreement with the Air Force is meant to&amp;nbsp;enhance situational awareness and unify business functions like personnel management, Salesforce said Wednesday.&lt;/p&gt;

&lt;p&gt;The Air Force will use Salesforce&amp;#39;s Missionforce National Security offering, which includes artificial intelligence tools.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Leveraging enterprise-wide contract vehicles accelerates our procurement timelines, optimizes resource allocation, and ensures our Airmen and Guardians are equipped with the agile technology necessary for today&amp;#39;s dynamic mission environments,&amp;quot; said Keith Hardiman, deputy chief information officer for the Air Force.&lt;/p&gt;

&lt;p&gt;The Air Force is using the Salesforce agreement to&amp;nbsp;consolidate contracts, reduce the number of contract actions and achieve volume-based savings.&lt;/p&gt;

&lt;p&gt;The agreement also aims to help the&amp;nbsp;Air Force connect its digital infrastructure to gain a view across personnel recruiting and logistics.&lt;/p&gt;

&lt;p&gt;The Air Force will also be able to pilot implementation of Salesforce&amp;rsquo;s Agentforce, an agentic AI solution, which is intended to enable automation of workflows and support decision-making at the edge.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/13/AirForceWT20260513/large.jpg" width="618" height="284"><media:credit>Gettyimages.com/fhm</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/13/AirForceWT20260513/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>‘No time to waste’ in prepping governments for AI cyber threats, top Dem lawmaker says</title><link>https://www.nextgov.com/artificial-intelligence/2026/05/no-time-waste-prepping-governments-ai-cyber-threats-top-dem-lawmaker-says/413517/</link><description>Senate Minority Leader Chuck Schumer called on the Department of Homeland Security to work closer with states and localities, and bemoaned the end of federal funding to an information-sharing center.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Chris Teale</dc:creator><pubDate>Wed, 13 May 2026 14:16:00 -0400</pubDate><guid>https://www.nextgov.com/artificial-intelligence/2026/05/no-time-waste-prepping-governments-ai-cyber-threats-top-dem-lawmaker-says/413517/</guid><category>Artificial Intelligence</category><content:encoded>&lt;![CDATA[&lt;p&gt;The U.S. Senate&amp;rsquo;s top Democrat called on the Department of Homeland Security last week to better coordinate its response to artificial intelligence-driven cyber threats with state, local, tribal and territorial governments.&lt;/p&gt;

&lt;p&gt;Sen. Chuck Schumer, the New York Democrat who serves as Senate Minority Leader, said &lt;a href="https://www.democrats.senate.gov/imo/media/doc/ces_letter_to_dhs.pdf"&gt;in a letter&lt;/a&gt; to Homeland Security Secretary Markwayne Mullin that the world is &amp;ldquo;coming to grips&amp;rdquo; with the fact that AI systems will soon be better than humans at finding software vulnerabilities. Schumer&amp;rsquo;s letter came after Anthropic &lt;a href="https://red.anthropic.com/2026/mythos-preview/"&gt;announced last month&lt;/a&gt; that its Claude Mythos Preview model is &amp;ldquo;strikingly capable&amp;rdquo; at finding cybersecurity vulnerabilities.&lt;/p&gt;

&lt;p&gt;Schumer called on Mullin and DHS to work closely with other units of government to prepare them properly for those cyber threats from AI. He noted the threats that states, localities and others face, including to their critical infrastructure, and urged the federal government to do more to protect them. AI could be capable of hacking such systems within a year, he said.&lt;/p&gt;

&lt;div class="related-articles-placeholder"&gt;[[Related Posts]]&lt;/div&gt;

&lt;p&gt;&amp;ldquo;As AI continues its rapid development &amp;mdash; including important cybersecurity advances as well as dangerous new hacking tools &amp;mdash; it is imperative that all levels of our government have access to this technology so they can prepare before it&amp;rsquo;s too late. We must beat cyber criminals in the race to defend our most critical systems from AI-enabled hacking or attacks,&amp;rdquo; Schumer said in a statement accompanying the letter. &amp;ldquo;There is no excuse for the Department of Homeland Security&amp;rsquo;s delay in bolstering state and local government cybersecurity capabilities. We must begin this process now &amp;mdash; before there are any major disruptions to hospitals or energy grids &amp;mdash; or worse.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;In his letter, Schumer asked Mullin to provide information on how DHS will coordinate with SLTT governments and the private sector to conduct risk assessments of critical infrastructure, and share information about vulnerability discovery and response. He also asked Mullin how DHS will work with other governments to provide remediation solutions, facilitate rapid vulnerability patching, offer access to modern testing and evaluation, and advise governments on identifying top AI talent and training to prepare the next generation of tech workers.&lt;/p&gt;

&lt;p&gt;Schumer&amp;rsquo;s letter noted that those questions come on the heels of the federal government pulling funding for the Multi-State Information Sharing and Analysis Center, which he noted was designated in 2010 as the &amp;ldquo;primary source&amp;rdquo; for those functions and more. Since the Cybersecurity and Infrastructure Security Agency announced it had pulled funding for MS-ISAC, the center has moved to &lt;a href="https://www.route-fifty.com/cybersecurity/2026/02/its-not-over-cyber-info-sharing-center-begins-next-chapters-after-losing-federal-funding/411633/"&gt;a membership model&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;For their part, officials in President Donald Trump&amp;rsquo;s administration have promised more information sharing, especially after the release of the National Cyber Strategy &lt;a href="https://www.route-fifty.com/cybersecurity/2026/03/feds-pledge-beefed-information-sharing-amid-new-cyber-strategy/412016/"&gt;in early March&lt;/a&gt;. In a previous public appearance, White House National Cyber Director Sean Cairncross said agencies &amp;mdash; including CISA as well as the Department of Justice and Federal Bureau of Investigation &amp;mdash; were &amp;ldquo;looking for ways to streamline information sharing from the [U.S. government] side.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Often how we know things is super sensitive,&amp;rdquo; he continued. &amp;ldquo;What we know is less so. We want to figure out how to communicate that in a helpful, actionable way, as we work through that on the interagency side, with partners on the state and local side.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Schumer, however, said the decision to cut funding to the MS-ISAC was a poor one given how AI has shifted the threat landscape.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Given the monumental changes quickly coming to cybersecurity as the result of frontier AI, and the need for organizations to be able to perceive and contextualize risks earlier than ever before, there could not be a worse time to undercut proven, longstanding MS-ISAC processes, procedures, and resources for sharing cyberthreat intelligence with SLTTs,&amp;rdquo; the letter said.&lt;/p&gt;

&lt;p&gt;Schumer asked for a plan for &amp;ldquo;coordinating our nation&amp;rsquo;s response to frontier AI-enabled hacking&amp;rdquo; by July 1, as well as a nominee to lead CISA.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;AI is changing the cyber battlefield fast &amp;mdash; and we cannot let hackers get there first,&amp;rdquo; Schumer said in a statement. &amp;ldquo;Hospitals, power grids, water systems, schools, elections, and emergency services cannot be left exposed while criminal gangs and state-backed hackers race to exploit new AI tools. DHS must immediately help states and localities find and fix vulnerabilities before Americans are hit with outages, disruptions, and attacks that could put lives and livelihoods at risk. This is a race between cyber defenders and AI-enabled hackers &amp;mdash; and with communities across the country at risk, there is no time to waste.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/13/20260513_Schumer_Anna_Moneymaker-2/large.jpg" width="618" height="284"><media:description>U.S. Sen. Chuck Schumer speaks during a recent press conference on Capitol Hill. The Senate Minority Leader called on DHS to work closely with states and localities on cyber issues.</media:description><media:credit>Anna Moneymaker via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/13/20260513_Schumer_Anna_Moneymaker-2/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Watchdog recommends nearly 100 ways for agencies to save tens of billions </title><link>https://www.nextgov.com/modernization/2026/05/watchdog-recommends-100-ways-agencies-save-tens-billions/413508/</link><description>Agencies have implemented a majority of previous Government Accountability Office recommendations regarding duplicative federal programs, generating almost $775 billion in financial benefits.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sean Michael Newhouse</dc:creator><pubDate>Tue, 12 May 2026 22:16:00 -0400</pubDate><guid>https://www.nextgov.com/modernization/2026/05/watchdog-recommends-100-ways-agencies-save-tens-billions/413508/</guid><category>Modernization</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Government Accountability Office on Tuesday released its &lt;a href="https://www.gao.gov/assets/gao-26-108505.pdf"&gt;annual report&lt;/a&gt; highlighting duplicative federal programs and opportunities to promote effectiveness and efficiency across agencies. Officials estimated that implementing their new and past open recommendations could save more than $100 billion.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Some of the new 97 recommendations for lawmakers and agencies include:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li aria-level="1"&gt;Officials should consolidate mission-support services (e.g. payroll and travel) among agencies, which GAO reported could save tens of millions of dollars over three years. Specifically, the watchdog recommended that the Office of Management and Budget and General Services Administration improve data collection with respect to the effectiveness of shared services.&amp;nbsp;&lt;/li&gt;
	&lt;li aria-level="1"&gt;The departments of Defense and Veterans Affairs should identify more opportunities to share healthcare resources, which could reduce fragmentation and also save tens of millions of dollars annually.&amp;nbsp;&lt;/li&gt;
	&lt;li aria-level="1"&gt;FBI should lead the creation of a government-wide anti-scam strategy to spur collaboration, as 13 different agencies work to prevent scams.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Investigators reported that, as of March, agencies had fully or partially addressed 1,662 (77%) of recommendations that GAO has made in these annual reports for the last 16 years, yielding about $774.3 billion in financial benefits. Officials acknowledged, however, that this is a &amp;ldquo;rough estimate based on a variety of sources that considered different time periods and used different data sources, assumptions and methodologies.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;In the latest report, GAO also flagged past recommendations that remain unimplemented including:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li aria-level="1"&gt;Establishing an inventory of federal programs, which includes funding and performance information, to help identify duplication and overlap. &lt;a href="https://www.govexec.com/oversight/2026/03/many-federal-programs-are-missing-omb-inventory-watchdog-reports/411993/"&gt;The watchdog found in a March report that such an inventory created by OMB is missing statutorily required information.&lt;/a&gt;&lt;/li&gt;
	&lt;li aria-level="1"&gt;Setting up a process to identify and remove ineligible family members from the Federal Employees Health Benefits program, which the watchdog said could save more than $1 billion over nine years. &lt;a href="https://www.congress.gov/bill/119th-congress/house-bill/1"&gt;The One Big Beautiful Bill Act&lt;/a&gt;, which was enacted in July 2025, included a requirement to fulfill such a recommendation, but the Office of Personnel Management hasn&amp;rsquo;t implemented it yet.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li aria-level="1"&gt;Improving the IRS&amp;rsquo; enforcement efforts. Congressional Democrats in 2022 approved nearly $80 billion for the tax agency, in part, to enhance tax collections, but &lt;a href="https://budgetlab.yale.edu/research/weakened-irs-has-substantial-consequences"&gt;lawmakers since then have rescinded more than two-thirds of that funding.&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The House Republican &lt;a href="https://appropriations.house.gov/sites/evo-subsites/republicans-appropriations.house.gov/files/evo-media-document/fy27-legislative-branch-bill-subcommittee-mark.pdf"&gt;fiscal 2027 legislative branch appropriations bill&lt;/a&gt; would cut GAO&amp;rsquo;s funding by &lt;a href="https://appropriations.house.gov/sites/evo-subsites/republicans-appropriations.house.gov/files/evo-media-document/fy27-leg-branch-subcommittee-bill-summary.pdf?_gl=1*fxb6xb*_ga*NDM1MjEyNzY1LjE3NzYxODA4NDU.*_ga_L2WB5KYYFC*czE3Nzg2MTIyNzYkbzMkZzAkdDE3Nzg2MTIyNzYkajYwJGwwJGgw"&gt;nearly 25%&lt;/a&gt;. Congress in fiscal 2026 &lt;a href="https://www.govexec.com/management/2025/11/major-takeaways-federal-agencies-funding-deal-reopen-government/409446/"&gt;held the watchdog&amp;rsquo;s funding level flat&lt;/a&gt; despite an attempt by the House GOP to halve it. The Trump administration has criticized GAO for issuing &lt;a href="https://www.gao.gov/legal/appropriations-law/impoundment-control-act#RecentDecisions"&gt;several findings&lt;/a&gt; that officials illegally withheld congressionally approved spending.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/12/051226_Getty_GovExec_Money-1/large.jpg" width="618" height="284"><media:description>The Government Accountability Office reported that implementing their recommendations could save more than $100 billion. </media:description><media:credit>PM Images/Getty Images </media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/12/051226_Getty_GovExec_Money-1/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>The Pentagon’s cyber rules leave MSPs as an attack vector</title><link>https://www.nextgov.com/ideas/2026/05/pentagons-cyber-rules-leave-msps-attack-vector/413495/</link><description>COMMENTARY | Who actually holds the keys to military contractor information systems?</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Amy Edwards and Michael McLaughlin</dc:creator><pubDate>Tue, 12 May 2026 16:31:00 -0400</pubDate><guid>https://www.nextgov.com/ideas/2026/05/pentagons-cyber-rules-leave-msps-attack-vector/413495/</guid><category>Ideas</category><content:encoded>&lt;![CDATA[&lt;p&gt;At a time when China, Russia and criminal groups are increasingly targeting military supply chains, a narrow regulatory gap has created an attack vector adversaries can exploit to undermine national security.&lt;/p&gt;

&lt;p&gt;The Cybersecurity Maturity Model Certification (CMMC) program, which took effect in late 2025, is designed to protect those supply chains. By requiring contractors that handle Controlled Unclassified Information (CUI) to implement NIST SP 800-171 controls and undergo third-party verification, CMMC seeks to eliminate weak links across the Defense Industrial Base (DIB).&lt;/p&gt;

&lt;p&gt;But as CMMC shifts from regulation to real-world enforcement, a fundamental question looms: Who actually holds the keys to military contractor information systems?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Overlooked impact of MSPs&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Managed Service Providers (MSPs) are an indispensable part of protecting the DIB, giving small and medium-sized businesses (SMBs) access to IT expertise that would otherwise be cost-prohibitive. By outsourcing network, system and cloud management to MSPs, contractors can slash compliance costs while accelerating CMMC readiness, transforming a burdensome solo effort into a streamlined, scalable option.&lt;/p&gt;

&lt;p&gt;Done correctly, with MSPs held to the same rigorous standards as their clients, these providers strengthen security through specialized knowledge, proactive threat hunting and shared best practices, hardening the entire supply chain against evolving threats.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Where CMMC falls short&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If MSPs are not held to equivalent standards, they become a critical attack vector. MSP personnel routinely hold privileged administrative access to patch vulnerabilities, reset credentials and tune defenses. Compromised access can expose entire contractor networks. This &amp;ldquo;privileged access&amp;rdquo; reality is central to modern cybersecurity. But CMMC does not fully address it.&lt;/p&gt;

&lt;p&gt;Many contractors, especially resource-constrained SMBs, depend on MSPs to meet and sustain compliance. Yet CMMC&amp;rsquo;s governing regulation treats MSPs as &amp;ldquo;External Service Providers&amp;rdquo; (ESPs) under vague scoping rules and voluntary certification.&lt;/p&gt;

&lt;p&gt;Voluntary compliance is inadequate when the provider controls the environment. Multi-tenant architectures, standardized toolsets deployed across hundreds of clients and potential overseas operations make it impossible for any single contractor to rigorously validate an MSP&amp;rsquo;s security posture. The result: contractors face clear obligations, while MSPs with operational control over CUI environments can escape equivalent certification &amp;mdash; creating a high-leverage entry point for adversaries.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Real threats to the DIB&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is not theoretical. The 2020 SolarWinds attack used trusted software updates to breach dozens of defense contractors. The 2021 Kaseya VSA ransomware campaign hit MSPs directly, encrypting systems at hundreds of downstream clients. In early 2026, ransomware groups Qilin and Akira targeted IT service providers and manufacturing supply chains, with Akira breaching providers serving defense and government sectors. Nation-state actors, including Chinese-linked Mustang Panda, continue persistent espionage through third-party vectors. Supply-chain attacks are surging, AI is amplifying extortion and MSP privileged access remains a prime vulnerability.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The legislative fix&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The solution is not to abandon MSPs. It is to hold them to appropriate standards. The fix requires neither a sweeping overhaul nor undue burdens on small businesses. It demands targeted oversight and discrete updates, beginning with the House Armed Services Committee (HASC).&lt;/p&gt;

&lt;p&gt;A foundational challenge is visibility: DoW lacks a reliable inventory of MSP usage among Level 2 and Level 3 contractors. There is no record of which contractors rely on MSPs for CUI-related systems, which providers are involved or their certification status. Industry estimates suggest tens of thousands of MSPs serve U.S. businesses, with widespread adoption among defense manufacturers, yet only approximately 40 have attained CMMC Level 2 certification. Without this baseline, the Pentagon is operating blind.&lt;/p&gt;

&lt;p&gt;First, HASC should direct DoW to conduct a focused survey of Level 2 contractors: Do they use MSPs for systems that process, store or transmit CUI? Which MSPs? Are those providers certified commensurate with their level of privileged access? This inventory would illuminate real exposure without excessive red tape.&lt;/p&gt;

&lt;p&gt;Second, Congress should close the gap surgically. Congress has already defined &amp;ldquo;managed service provider&amp;rdquo; in 6 U.S.C. &amp;sect; 650(18) as entities providing ongoing network, infrastructure or security services &amp;mdash; a statutory foundation ready to be applied. Congress should amend 32 CFR Part 170 to incorporate that definition and require MSPs with administrative access to CUI environments to obtain certification matching their client contractor&amp;rsquo;s CMMC level.&lt;/p&gt;

&lt;p&gt;These steps enforce a core principle: if an entity holds functional control over CUI systems, it must meet verifiable standards aligned with that responsibility. MSPs already help SMBs achieve security and compliance more affordably and quickly; clear rules will promote CMMC-ready partners and further harden the supply chain.&lt;/p&gt;

&lt;p&gt;CMMC promises genuine protection across the DIB, not checkbox compliance. Treating privileged access as an edge case invites preventable vulnerabilities at a moment when threats from ransomware to nation-state espionage are intensifying. The changes are narrow, the rationale clear and the stakes &amp;mdash; safeguarding systems essential to warfighters and national security &amp;mdash; are immense.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Amy Edwards is a U.S. Army veteran and Director of Legislative Affairs for the Managed Service Provider Collective. Michael McLaughlin is a U.S. Navy veteran and Co-Leader of the Cybersecurity and Data Privacy Practice Group at the law firm of Buchanan Ingersoll &amp;amp; Rooney, PC.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/12/GettyImages_1284349529/large.jpg" width="618" height="284"><media:credit>Austin Nooe/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/12/GettyImages_1284349529/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>‘It would be insane’ for spy agencies to not have AI model early access, lawmaker says</title><link>https://www.nextgov.com/artificial-intelligence/2026/05/it-would-be-insane-spy-agencies-not-have-ai-model-early-access-lawmaker-says/413483/</link><description>The top Democrat on the House Intelligence Committee said the Commerce Department should also have a role in AI policy.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Tue, 12 May 2026 14:09:00 -0400</pubDate><guid>https://www.nextgov.com/artificial-intelligence/2026/05/it-would-be-insane-spy-agencies-not-have-ai-model-early-access-lawmaker-says/413483/</guid><category>Artificial Intelligence</category><content:encoded>&lt;![CDATA[&lt;p&gt;Rep. Jim Himes, D-Conn., the top Democrat on the House Intelligence Committee, said Tuesday it would be &amp;ldquo;insane&amp;rdquo; for U.S. intelligence agencies to not have early access to advanced artificial intelligence models that could be used for hacking and cyberdefense.&lt;/p&gt;

&lt;p&gt;His remarks, delivered on a panel at Politico&amp;rsquo;s Security Summit, come as the Trump administration is reportedly considering a major AI executive order and debating whether the Commerce Department or intelligence community should oversee evaluations of AI models. They also come as President Donald Trump makes a planned trip to China this week, where he is expected to discuss AI matters with Chinese President Xi Jinping.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Making sure that, in particular, where our real computational brains are, the National Security Agency, making sure they have access to the most capable hacking tools &amp;hellip; it would be insane not to do that, right?&amp;rdquo; he said.&lt;/p&gt;

&lt;p&gt;The NSA, the spy community&amp;rsquo;s premiere hacking, codebreaking and foreign eavesdropping giant, has been testing Mythos, a major Anthropic model that&amp;rsquo;s been held back from full public release due to its substantial cyber capabilities, multiple people familiar with the matter said.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;On Monday, The Washington Post &lt;a href="https://www.washingtonpost.com/politics/2026/05/11/trump-ai-regulation-commerce-intelligence/?utm_source=newsletter&amp;amp;utm_medium=email&amp;amp;utm_campaign=newsletter_axioscodebook&amp;amp;stream=top"&gt;reported&lt;/a&gt;&amp;nbsp;the Trump administration is split over whether to give spy agencies or the Commerce Department dibs at evaluating models. Commerce officials are pushing back against a White House proposal to house an AI evaluation center within the intelligence community, according to the report.&lt;/p&gt;

&lt;p&gt;Himes said the Commerce Department should also have a role to play in AI policy.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Across the government, we should be looking at these capabilities,&amp;rdquo; he said, adding that &amp;ldquo;we ought to be cultivating &amp;mdash; not damaging &amp;mdash; our relationship with the producer of this remarkable new technology,&amp;rdquo; in a nod to the ongoing legal complaints Anthropic has lodged at the Defense Department, which deemed it a supply chain risk earlier this year after the company said it wouldn&amp;rsquo;t meet certain Pentagon demands.&lt;/p&gt;

&lt;p&gt;Himes said he doesn&amp;rsquo;t think the legal spat between the DOD and Anthropic has set back the intelligence community in the near term, though &amp;ldquo;if this drags out, if [Defense Secretary] Pete Hegseth gets a bee in his bonnet about this and just decides to target because his ego is damaged &amp;hellip; that will be a massive liability for United States national security.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Officials are circulating draft policy documents with language clarifying the government&amp;rsquo;s ability to use private sector tech without outside stipulations, &lt;em&gt;Nextgov/FCW&lt;/em&gt; &lt;a href="https://www.nextgov.com/artificial-intelligence/2026/05/trump-admin-floats-policy-language-limiting-contractor-say-agency-uses-technology/413337/"&gt;reported&lt;/a&gt; last week. It&amp;rsquo;s not clear if the contracting language is part of a coming executive order or a separate policy initiative.&lt;/p&gt;

&lt;p&gt;The ongoing discussions highlight how the Trump administration is closely examining cyber threats brought on by advanced AI models and is looking to take a more hands-on approach toward the AI sector, despite prior laissez-faire positions.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/12/051226HimesNG/large.jpg" width="618" height="284"><media:description>Rep. Jim Himes, D-Conn., speaks to a reporter on the House steps after a vote in the U.S. Capitol on Thursday, April 23, 2026.</media:description><media:credit>Bill Clark/CQ-Roll Call, Inc via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/12/051226HimesNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Lawmakers propose to establish AI guardrails for VA in FY27 funding</title><link>https://www.nextgov.com/artificial-intelligence/2026/05/lawmakers-propose-establish-ai-guardrails-va-fy27-funding/413481/</link><description>Reps. Paul Gosar, R-Ariz., and James Walkinshaw, D-Va., are looking to address concerns about unregulated uses of artificial intelligence in separate amendments offered to the House Fiscal Year 2027 Military Construction, Veterans Affairs and Related Agencies Bill.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Edward Graham</dc:creator><pubDate>Tue, 12 May 2026 12:21:00 -0400</pubDate><guid>https://www.nextgov.com/artificial-intelligence/2026/05/lawmakers-propose-establish-ai-guardrails-va-fy27-funding/413481/</guid><category>Artificial Intelligence</category><content:encoded>&lt;![CDATA[&lt;p&gt;Proposed amendments to the fiscal year 2027 funding bill for the Department of Veterans Affairs include several measures seeking to limit the use of decisional or unapproved artificial intelligence tools by the agency.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The House Rules Committee is set to hold a hearing on the VA funding proposal and proposed amendments Tuesday afternoon. The FY27 funding package &lt;a href="https://www.nextgov.com/modernization/2026/04/house-fy27-va-funding-bill-allocates-34b-ehr-rollout/413016/"&gt;passed&lt;/a&gt; out of the House Appropriations Committee last month.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Separate &lt;a href="https://rules.house.gov/bill/119/hr-8469"&gt;proposals&lt;/a&gt; offered by Reps. Paul Gosar, R-Ariz., and James Walkinshaw, D-Va., specifically call for additional oversight of VA&amp;rsquo;s uses of AI to ensure they are being deployed appropriately. Although both proposed amendments may not make it into the final funding package voted on by the full House, they signal lingering lawmaker unease about the VA&amp;rsquo;s use of the emerging capabilities to augment department operations.&lt;/p&gt;

&lt;p&gt;Gosar&amp;rsquo;s &lt;a href="https://amendments-rules.house.gov/amendments/GOSAR_096_xml260507115400779.pdf?_gl=1*6r0nas*_ga*NzgyNTE1MjE4LjE2NjE5NTUxOTg.*_ga_N4RTJ5D08B*czE3Nzg1OTU0MzAkbzQkZzEkdDE3Nzg1OTU5ODQkajYwJGwwJGgw"&gt;measure&lt;/a&gt; would block VA funding from being used &amp;ldquo;to make a final determination with respect to the approval or denial of a claim for disability compensation under the laws administered by the Secretary of Veterans Affairs using artificial intelligence.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;VA has used AI and automation to speed up its processing of veterans benefits claims, although some lawmakers and veteran service organizations have expressed concern about officials ceding too much of their decisionmaking authority to the technologies. The agency has &lt;a href="https://www.nextgov.com/artificial-intelligence/2026/04/ai-helping-va-speed-claims-processing-dems-worry-about-errors/412904/"&gt;stressed&lt;/a&gt; that humans always make the final claims decisions and that the AI tools act as more of an automated information retrieval system.&lt;/p&gt;

&lt;p&gt;Gosar spokesman Anthony Foti said the congressman&amp;rsquo;s amendment would &amp;ldquo;establish a clear safeguard within the VA disability claims process&amp;rdquo; to ensure that human reviewers always make the final decisions, adding that Gosar &amp;ldquo;believes it is important to establish appropriate guardrails before these technologies are relied upon for consequential adjudicative decisions.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Even though VA is already leveraging some AI tools to speed up benefits processing, the agency is looking to further expand its suite of claims-focused technologies. VA&amp;rsquo;s 2025 AI use case inventory, which was released in January, included &lt;a href="https://www.nextgov.com/artificial-intelligence/2026/03/va-increasingly-looking-ai-enhance-claims-processing/411900/"&gt;28 instances&lt;/a&gt; of the technologies being leveraged for claims processing, with the majority of these examples still listed as being in the pre-deployment phase.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Disability determinations often involve nuanced medical evidence, individualized circumstances, and credibility assessments that require human judgment and oversight,&amp;rdquo; Foti said. &amp;ldquo;The amendment is designed to ensure that AI serves as a support tool &amp;mdash; not as the final decision-maker &amp;mdash; in matters directly impacting veterans&amp;rsquo; healthcare access, financial stability, and earned benefits.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Walkinshaw&amp;rsquo;s amendment, meanwhile, looks to address uses of the emerging capabilities that may be operating without agency oversight.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Within 180 days of the funding bill&amp;rsquo;s enactment, Walkinshaw&amp;rsquo;s &lt;a href="https://amendments-rules.house.gov/amendments/WALKIN_056_xml%20-%20Shadow%20AI260507104339577.pdf?_gl=1*1nqscie*_ga*NzgyNTE1MjE4LjE2NjE5NTUxOTg.*_ga_N4RTJ5D08B*czE3Nzg1OTU0MzAkbzQkZzEkdDE3Nzg1OTY0MzUkajYwJGwwJGgw"&gt;proposal&lt;/a&gt; would require VA to submit a report to relevant congressional committees detailing &amp;ldquo;the use of unapproved artificial intelligence models or artificial intelligence-powered applications, also known as &amp;lsquo;&amp;rsquo;shadow AI&amp;rsquo;&amp;rsquo;, within information technology networks of the Department of Veterans Affairs, and any cybersecurity risks and data exposure vulnerabilities introduced by such use.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;These &amp;lsquo;shadow&amp;rsquo; uses of AI often entail employees using technology not approved by the agency to conduct work and that operate outside of traditional restrictions.&lt;/p&gt;

&lt;p&gt;Walkinshaw&amp;rsquo;s office was not able to immediately respond to a request for comment.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/12/051226GosarNG/large.jpg" width="618" height="284"><media:description>Rep. Paul Gosar (R-Ariz.) leaves a House Republican Conference meeting at the U.S. Capitol on February 03, 2026 in Washington, DC.</media:description><media:credit>Kevin Dietsch/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/12/051226GosarNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Anthropic and nonprofit partner to streamline benefits administration with AI</title><link>https://www.nextgov.com/artificial-intelligence/2026/05/anthropic-and-nonprofit-partner-streamline-benefits-administration-ai/413455/</link><description>Code for America is working with the AI company to build and pilot solutions that leverage Anthropic’s Claude chatbot to help benefit caseworkers improve service delivery.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Kaitlyn Levinson</dc:creator><pubDate>Mon, 11 May 2026 16:00:00 -0400</pubDate><guid>https://www.nextgov.com/artificial-intelligence/2026/05/anthropic-and-nonprofit-partner-streamline-benefits-administration-ai/413455/</guid><category>Artificial Intelligence</category><content:encoded>&lt;![CDATA[&lt;p&gt;CHICAGO &amp;mdash; The civic tech nonprofit Code for America is partnering with artificial intelligence company Anthropic to develop tools aimed at helping caseworkers enhance public benefits administration across the nation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The organizations are working together to develop an AI-enabled solution to improve the accuracy and timeliness of benefits service delivery under the Supplemental Nutrition Assistance Program, Jana Rhyu, vice president of product at Code for America, announced Friday at a &lt;a href="https://summit.codeforamerica.org/"&gt;summit&lt;/a&gt; hosted by the organization in Chicago last week.&lt;/p&gt;

&lt;p&gt;The SNAP Policy Navigator tool is built on federal regulations, state manual selections, official policy directives and other documents to help caseworkers &amp;ldquo;quickly and accurately get an answer to [a] very specific policy question&amp;rdquo; when they are working with clients, said Michael Lai, who leads state and local government AI at Anthropic.&lt;/p&gt;

&lt;div class="related-articles-placeholder"&gt;[[Related Posts]]&lt;/div&gt;

&lt;p&gt;The tool leverages Anthropic&amp;rsquo;s Claude chatbot and is built on a model context protocol to ensure a secure two-way connection between data sources and AI applications, Rhyu said. A caseworker can input a simple, policy-based question, such as how a client&amp;rsquo;s change in income or a new federal policy could impact their benefits, and the tool outputs an up-to-date response in plain language with cited sources and suggested next steps.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The user &amp;ldquo;gets clarity on policy, not a decision on overall eligibility. The decision stays with [them],&amp;rdquo; she said.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The announcement comes as state and local public benefit agencies scramble to comply with rule changes to the federal food assistance program made last July under President Donald Trump&amp;rsquo;s &amp;ldquo;&lt;a href="https://www.route-fifty.com/digital-government/2026/04/nonprofit-playbook-looks-help-snap-leaders-manage-payment-error-rates/412686/"&gt;Big, Beautiful Bill&lt;/a&gt;.&amp;rdquo; The law subjects participants to expanded work requirements, shifts administrative costs to states based on their SNAP payment error rates, and requires that the Thrifty Food Plan &amp;mdash; the model used to calculate the lowest-cost nutritional meal for a family of four &amp;mdash; be cost-neutral to changes in food prices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Since its passage, SNAP participation has declined by more than &lt;a href="https://www.cbpp.org/research/food-assistance/snap-tracker-people-are-losing-food-assistance-as-the-republican-megabill"&gt;3 million people&lt;/a&gt; across 36 states as of January, and further reductions are expected once the new rules are fully implemented, according to the Center on Budget and Policy Priorities.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Policy is constantly changing, and the complexities of policy implementation are immense, which places an even bigger burden on the caseworkers,&amp;rdquo; Rhyu said.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That&amp;rsquo;s why it&amp;rsquo;s critical for resources like the SNAP Policy Navigator tool to help reduce caseworkers&amp;rsquo; administrative burden of sifting through and trying to apply intricate policies to individual cases, she said.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Indeed, the complex rules regarding eligibility and exemptions present common barriers to benefits access and having to explain those to residents who depend on the timely and accurate delivery of public assistance to meet their everyday needs only adds to it, Lai said.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Such challenges are exacerbated by funding uncertainty, workforce shortages and increasing caseloads that many states and localities are grappling with across the U.S.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;He pointed to one former caseworker who described their job as &amp;ldquo;an email inbox that&amp;#39;s always full, where each one requires care and attention, but you&amp;#39;re constantly getting interrupted as you try to work through the never ending inbox of people to help.&amp;rdquo;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition to the SNAP Policy Navigator, Code for America and Anthropic will develop a suite of Claude-based tools to further assist benefit workers with answering policy questions, reviewing eligibility documents and drafting communications to benefit recipients, Code for America leaders said in an &lt;a href="https://codeforamerica.org/news/anthropic-partnership/"&gt;announcement&lt;/a&gt; last week.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We know that caseworkers are really overburdened in general, but especially at this moment with HR 1 as well, and so AI shouldn&amp;#39;t be used for AI&amp;rsquo;s sake,&amp;rdquo; Lai said. &amp;ldquo;We want it ultimately to be helping in this human way and trying to make benefits administration more efficient, more accurate and more human centered.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/11/codeforamerica-1/large.jpg" width="618" height="284"><media:description>Jana Rhyu (left) and Michael Lai announce Code for America and Anthropic's partnership to develop AI-based tools to streamline benefits administration for caseworkers at the annual Code for America Summit on May 8, 2026, in Chicago.</media:description><media:credit>Kaitlyn Levinson for GovExec</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/11/codeforamerica-1/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Canvas breach spotlights cybercriminal appetite for student data</title><link>https://www.nextgov.com/cybersecurity/2026/05/canvas-breach-spotlights-cybercriminal-appetite-student-data/413451/</link><description>Cyberattacks on widely used third-party services like Canvas can expose sensitive data that hackers can later weaponize. Higher education institutions are often a prime target.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David DiMolfetta</dc:creator><pubDate>Mon, 11 May 2026 12:00:00 -0400</pubDate><guid>https://www.nextgov.com/cybersecurity/2026/05/canvas-breach-spotlights-cybercriminal-appetite-student-data/413451/</guid><category>Cybersecurity</category><content:encoded>&lt;![CDATA[&lt;p&gt;A major cybercrime gang&amp;rsquo;s hack of Canvas is highlighting how education technology providers have become attractive targets for cybercriminals, whose access to student records, login credentials and other sensitive data can create opportunities for fraud, identity theft, extortion and future intrusions.&lt;/p&gt;

&lt;p&gt;ShinyHunters on Thursday claimed responsibility for a hack into Instructure&amp;rsquo;s Canvas platform that facilitates course materials and class management for thousands of institutions. An extensive document posted by the hackers and obtained by &lt;i&gt;Route Fifty&lt;/i&gt;&amp;nbsp;lists some 9,000 customers apparently impacted in the breach, including Georgetown, Harvard and Cornell universities. It&amp;rsquo;s not clear whether all victims listed were accessed, or what data may have been stolen.&lt;/p&gt;

&lt;p&gt;As Instructure worked to restore services, the hackers appeared to launch &lt;a href="https://techcrunch.com/2026/05/07/hackers-deface-school-login-pages-after-claiming-another-instructure-hack/"&gt;follow-on attacks&lt;/a&gt;, while students flooded social media during final exam season with photos and videos showing compromised Canvas pages appearing upon login. ShinyHunters claims it accessed names, email addresses, student identification and private messages.&lt;/p&gt;

&lt;p&gt;The hacking group said Saturday it would not comment further. An extortion message posted on affected sites says that Instructure has until May 12 to reach out to the hackers. ShinyHunters has since removed Instructure from their Pay-or-Leak portal and the company says Canvas functions have been restored.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Route Fifty&lt;/em&gt;&amp;nbsp;has asked Instructure if it is negotiating with the group or has paid a ransom to prevent data from being leaked.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The FBI is likely investigating the incident, according to two people familiar with the matter who requested anonymity to communicate their understanding of the government&amp;rsquo;s response to the breach.&lt;/p&gt;

&lt;p&gt;An FBI spokesperson said on Friday that the bureau is aware of the compromise.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;If you are contacted directly by anyone claiming to have your data, we recommend you not send payment or respond to their demands. By receiving a message, that does not necessarily mean your personal information has been compromised,&amp;rdquo; their statement said.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Hackers often exaggerate or fabricate their access to sensitive or personal information to prompt payment from victims, the FBI spokesperson added. &amp;ldquo;We encourage individuals to be cautious of unsolicited emails, calls, or texts claiming to be from your school, the [Learning Management System] provider, or law enforcement and to verify the contact through known channels before responding.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Universities are a &amp;ldquo;treasure trove&amp;rdquo; of data and ransomware hackers know this, said Cynthia Kaiser, a former senior FBI cyber official. &amp;ldquo;At the same time, the openness that defines higher education can make these institutions more exposed than many other organizations.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Kaiser, now vice president of the Ransomware Research Center at Halcyon, said that criminal hacker groups frequently obtain credentials from other intrusions and use them to carry out other hacks.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;You have to remember that groups like ShinyHunters, Lapsus$ and Scattered Spider often log in rather than hack in,&amp;rdquo; she said, referring to a slew of major criminal hacker gangs that have made headlines for their intrusions over the years.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Any stolen data wouldn&amp;rsquo;t enable immediate financial theft, though it&amp;rsquo;s highly valuable for targeted phishing and social-engineering attacks, said Adam Marr&amp;egrave;, a former FBI special agent and Chief Information Security Officer at Arctic Wolf.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The biggest risk after incidents like this is not instant identity theft but scams that surface weeks or months later and appear legitimate. Students, parents, and educators should stay alert for unexpected or urgent messages, avoid clicking unverified links, enable multi-factor authentication on email accounts and be cautious with any request for personal information,&amp;rdquo; he said.&lt;/p&gt;

&lt;p&gt;The House Homeland Security Committee is investigating the matter, according to a letter sent Monday to Instructure CEO Steve Daly from Rep. Andrew Garbarino, R-N.Y., the panel&amp;rsquo;s chairman. He asked company executives to brief lawmakers and staff by May 21.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Instructure said in a &lt;a href="https://www.instructure.com/incident_update"&gt;blog post&lt;/a&gt; that the unauthorized access involved information like usernames, email addresses, course names, enrollment information and messages. The company also &amp;ldquo;identified a vulnerability regarding support tickets in our Free for Teacher environment that was exploited.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;It&amp;rsquo;s not known how long it took for the hackers to craft the plan for the intrusion, but the fact that they carried it out during final exams &amp;ldquo;shows the level of planning that went into this attack,&amp;rdquo; said Damien Skeeles, a senior manager at Filigran, which sells open-source cybersecurity solutions.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;You wonder how much more planning went into it, and how many more acts there are to follow,&amp;rdquo; he said.&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/11/20260511_Canvas_Oscar_Wong-1/large.jpg" width="618" height="284"><media:credit>Oscar Wong via Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/11/20260511_Canvas_Oscar_Wong-1/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Agentic AI just proved it can fix federal procurement — now let’s scale it</title><link>https://www.nextgov.com/ideas/2026/05/agentic-ai-just-proved-it-can-fix-federal-procurement-now-lets-scale-it/413443/</link><description>COMMENTARY | In today’s budget-constrained environment, where every dollar must stretch further and mission delivery is harder than ever, agentic AI offers a genuine path to doing more with less.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">KJ Lian and Anil Chaudhry</dc:creator><pubDate>Mon, 11 May 2026 09:00:00 -0400</pubDate><guid>https://www.nextgov.com/ideas/2026/05/agentic-ai-just-proved-it-can-fix-federal-procurement-now-lets-scale-it/413443/</guid><category>Ideas</category><content:encoded>&lt;![CDATA[&lt;p&gt;&lt;em&gt;&lt;font face="arial, sans-serif"&gt;The views expressed in this article are those of the authors and do not necessarily reflect the official policy or position of their employers.&amp;nbsp;&lt;/font&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Every year, federal agencies evaluate thousands of vendor proposals worth billions of taxpayer dollars, and they do it with a process that is slow, inconsistent&amp;nbsp;and an inefficient use of personnel time.&lt;/p&gt;

&lt;p&gt;Contracting officers manually cross-reference dense submissions against hundreds of Federal Acquisition Regulation (FAR) clauses, Defense Federal Acquisition Regulation Supplement requirements and a growing web of executive orders. Critical gaps remain despite the diligent efforts of procurement teams. Timelines stretch from weeks into months. The cost is mission delay, wasted funding&amp;nbsp;and eroded public trust.&lt;/p&gt;

&lt;p&gt;This is not a theoretical problem; it is a daily operational reality. Even as the FAR overhaul aims to simplify compliance, procurement team burdens keep growing.&lt;/p&gt;

&lt;p&gt;That&amp;rsquo;s why the ATARC Agentic AI Lab set out to answer a specific question: can a team of specialized AI agents &amp;mdash; not a chatbot or search tool, but autonomous agents working in coordination &amp;mdash; evaluate a federal proposal against real regulatory requirements and surface genuine compliance risks? We didn&amp;rsquo;t want a demo. We wanted proof.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;We got it.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Our proof of concept deployed three specialized AI agents: a FAR compliance agent, an executive order agent&amp;nbsp;and a technical evaluation agent&amp;nbsp;against a real-world-modeled $8.5 million vendor proposal for a fictitious agency data modernization initiative. Each agent independently analyzed the submission from its domain, querying curated regulatory knowledge bases and generating detailed findings with precise FAR citations.&lt;/p&gt;

&lt;p&gt;The results were striking. The agents identified gaps in small business subcontracting documentation, security framework specifics and cost justification. Where the proposal was strong, particularly its alignment with executive orders on AI policy,&amp;nbsp;the agents recognized that too.&lt;/p&gt;

&lt;p&gt;Here&amp;rsquo;s what matters most: humans never left the loop. The agents performed the analytical labor, document review, citation matching, cross-referencing across domains. Every final determination, every exception judgment, every award decision remained with the reviewer. The AI didn&amp;rsquo;t replace expertise. It multiplied it.&lt;/p&gt;

&lt;p&gt;We also learned what doesn&amp;rsquo;t work yet. The system needs confidence scoring so reviewers know when to trust a finding. It needs context-aware interpretation for agency-specific deviations and acquisition strategy trade-offs no general model can anticipate. These are solvable engineering challenges, not fundamental limitations.&lt;/p&gt;

&lt;p&gt;The broader lesson extends well beyond pre-award compliance review. The multi-agent architecture we validated &amp;mdash; specialized agents with distinct knowledge domains, coordinating through a shared orchestration layer &amp;mdash; is a reusable pattern. Grant evaluations at federal health agencies. Regulatory impact assessments at EPA. Small business compliance support that levels the playing field for new market entrants. The pattern scales because the problem scales.&lt;/p&gt;

&lt;p&gt;Agencies should implement agentic AI tools against real procurement workloads and share findings openly. The Office of Federal Procurement Policy should issue guidance encouraging AI-assisted document review with clear human-in-the-loop standards.&lt;/p&gt;

&lt;p&gt;We have the proof. In today&amp;rsquo;s budget-constrained environment, where every dollar must stretch further and mission delivery is harder than ever, agentic AI offers a genuine path to doing more with less. The question is no longer whether this technology can help. The question is whether we will move from pilot to production before that opportunity passes.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;KJ Lian is&amp;nbsp;the&amp;nbsp;senior manager of the emerging tech solutions team for federal civilian at Amazon Web Services. Anil Chaudhry is a senior advisor for AI at the Department of Transportation. Both&amp;nbsp;Lian and&amp;nbsp;Chaudhry&amp;nbsp;are co-chairs&amp;nbsp;of the ATARC Agentic Al Lab.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/10/GettyImages_2213666420/large.jpg" width="618" height="284"><media:credit>pcess609/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/10/GettyImages_2213666420/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Tech bills of the week: Limiting data harvesting; AI for financial fraud prevention; and more</title><link>https://www.nextgov.com/policy/2026/05/tech-bills-week-limiting-data-harvesting-ai-financial-fraud-prevention-and-more/413434/</link><description>Although Congress was off this week, lawmakers still introduced several measures looking to examine the use of AI tools and protect mass gathering from malicious drone threats.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alexandra Kelley and Edward Graham</dc:creator><pubDate>Fri, 08 May 2026 16:46:00 -0400</pubDate><guid>https://www.nextgov.com/policy/2026/05/tech-bills-week-limiting-data-harvesting-ai-financial-fraud-prevention-and-more/413434/</guid><category>Policy</category><content:encoded>&lt;![CDATA[&lt;p&gt;&lt;strong&gt;Securing online user data&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new House bill adds to the growing volume of legislation seeking to bolster data privacy protections by prohibiting companies from requiring online users to give access to their data as a condition of service.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://d12t4t5x3vyizu.cloudfront.net/cloud.house.gov/uploads/2026/05/CLOUTX_087_xml-1.pdf"&gt;The You Own the Data&lt;/a&gt; &amp;mdash; or YODA &amp;mdash; Act, introduced by Rep. Michael Cloud, R-Texas, tackles longstanding data privacy issues by limiting data collection from website hosts beyond &amp;ldquo;what is reasonably necessary to provide the requested service,&amp;rdquo; and bans tracking cookies without explicit user permission.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The Constitution protects Americans&amp;rsquo; right to private property and privacy from unwarranted searches and seizures. That principle doesn&amp;rsquo;t disappear the moment you open a browser,&amp;rdquo; Cloud said in &lt;a href="https://cloud.house.gov/posts/release-congressman-cloud-reintroduces-the-you-own-the-data-act-yoda"&gt;the press release&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The measure enables the Federal Trade Commission and state attorneys general to enforce the YODA Act&amp;rsquo;s pillars. Notably, it creates recourse for individuals whose data has been illegally harvested to bring civil suits against companies with an annual gross revenue of $50 million or more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Using advanced tech to combat financial fraud&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Rep. Mike Flood, R-Neb., formally &lt;a href="https://www.congress.gov/bill/119th-congress/house-bill/8671?s=1&amp;amp;r=48"&gt;introduced&lt;/a&gt; legislation on Thursday that would direct federal banking agencies to conduct a study on the use of artificial intelligence and other advanced technologies in fraud detection and prevention, &amp;ldquo;with particular attention to community financial institutions.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The bill &amp;mdash; the Bank Fraud Technology Advancement Act &amp;mdash; also includes a section calling for the agencies to establish a voluntary &amp;ldquo;community bank fraud technology pilot program&amp;rdquo; one year after completion of the required study, saying that it would help &amp;ldquo;facilitate community financial institution access to advanced fraud detection tools.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;A &lt;a href="https://docs.house.gov/meetings/BA/BA20/20260305/119023/BILLS-119pih-bankingagenciestoconductan.pdf"&gt;draft&lt;/a&gt; of Flood&amp;rsquo;s measure was previously discussed during a March House Financial Services Subcommittee on Financial Institutions &lt;a href="https://financialservices.house.gov/calendar/eventsingle.aspx?EventID=411032"&gt;hearing&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Counter-drone measures for the National Guard&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Rep. Michael McCaul, R-Texas, &lt;a href="https://mccaul.house.gov/media-center/press-releases/mccaul-colleagues-introduce-guard-skies-act-empower-national-guard"&gt;introduced&lt;/a&gt; a bipartisan measure on Thursday that seeks to enhance counter-drone measures at large-scale events &amp;mdash; such as the upcoming FIFA World Cup and America250 celebrations &amp;mdash; by giving the National Guard explicit authority to mitigate potential threats posed by the unmanned aerial systems.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The proposal, the &lt;a href="https://mccaul.house.gov/sites/evo-subsites/mccaul.house.gov/files/evo-media-document/guard-the-skies_mccaul.pdf"&gt;Guard the Skies Act&lt;/a&gt;, grants the National Guard the ability &amp;ldquo;to protect certain facilities and assets from unmanned aircraft.&amp;rdquo; The legislation is co-sponsored by Reps. Marcy Kaptur, D-Ohio, Eli Crane, R-Ariz., and Josh Gottheimer, D-N.J.&lt;/p&gt;

&lt;p&gt;&amp;quot;From foreign adversaries to transnational criminal organizations, hostile actors have increasingly adopted drone technology to target critical infrastructure and innocent civilians. As the United States prepares to host millions of visitors for the FIFA World Cup, America250 celebrations, and eventually the Olympics, we must be prepared to intercept and neutralize this evolving threat,&amp;rdquo; McCaul said in a statement. &amp;ldquo;The Guard the Skies Act would leverage the National Guard &amp;mdash; a force uniquely positioned for rapid deployment and crisis response &amp;mdash; to protect our skies and the large-scale gatherings below.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SBA&amp;rsquo;s AI use&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A measure &lt;a href="https://www.congress.gov/bill/119th-congress/house-bill/8664/text?s=1&amp;amp;r=2"&gt;introduced&lt;/a&gt; by Rep. Hillary Scholten, D-Mich., would task the head of the Small Business Administration with implementing a recommendation from a May 4 Government Accountability Office &lt;a href="https://www.gao.gov/assets/gao-26-107828.pdf"&gt;report&lt;/a&gt; on uses of AI in the agency&amp;rsquo;s small business contracting and innovation research.&lt;/p&gt;

&lt;p&gt;That watchdog called for SBA to ensure its chief information officer &amp;ldquo;establishes policies and procedures for meeting the agency&amp;rsquo;s applicable reporting requirements for AI use case inventories, including defining roles and responsibilities, and for documenting the implementation of policies and procedures and key decisions.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Within 45 days of the bill&amp;rsquo;s passage, Scholten&amp;rsquo;s measure would require that SBA submit a report to the House and Senate Small Business committees detailing the plans it will take &amp;ldquo;to establish and implement policies and procedures to disclose artificial intelligence use.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/08/GettyImages_1399560076/large.jpg" width="618" height="284"><media:credit>Jarmo Piironen/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/08/GettyImages_1399560076/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Unleashing AI across the US government: The data security challenge holding back decision advantage</title><link>https://www.nextgov.com/ideas/2026/05/unleashing-ai-across-us-government-data-security-challenge-holding-back-decision-advantage/413428/</link><description>COMMENTARY | Agencies are making significant investments in AI, but those efforts will be wasted if they can't secure the sensitive data that the emerging capabilities need to provide real value.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Terry Halvorsen</dc:creator><pubDate>Fri, 08 May 2026 14:41:00 -0400</pubDate><guid>https://www.nextgov.com/ideas/2026/05/unleashing-ai-across-us-government-data-security-challenge-holding-back-decision-advantage/413428/</guid><category>Ideas</category><content:encoded>&lt;![CDATA[&lt;p&gt;During my years leading IT strategy at the Department of Defense and the Navy, I witnessed firsthand the frustrating paradox that continues to plague government artificial intelligence&amp;nbsp;initiatives: we&amp;#39;re sitting on mountains of valuable data that could revolutionize mission outcomes, yet we can&amp;#39;t actually use most of it with AI systems.&lt;/p&gt;

&lt;p&gt;The problem isn&amp;#39;t technology adoption, since&amp;nbsp;federal agencies are rapidly deploying AI and machine learning capabilities.&amp;nbsp;The challenge is that our most sensitive data &amp;mdash; the information that could provide genuine decision advantage&amp;nbsp;&amp;mdash;&amp;nbsp;remains locked away because our current security architectures can&amp;#39;t protect it at scale once AI systems begin processing it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The promise of augmented intelligence&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Let&amp;#39;s be clear about what&amp;#39;s at stake. When properly implemented, AI &amp;mdash; or what I prefer to call &amp;quot;augmented intelligence&amp;quot;&amp;nbsp;&amp;mdash;&amp;nbsp;represents a crucial advancement in how government operates. From predictive maintenance on weapons systems to accelerated threat detection in cybersecurity, from streamlined acquisition processes to improved resource allocation, AI has the potential to enhance every aspect of federal operations.&lt;/p&gt;

&lt;p&gt;The Pentagon&amp;#39;s emphasis on responsible AI &amp;mdash; built on principles of equitable, traceable, reliable, governable and transparent usage &amp;mdash; provides the right ethical framework. We understand that humans must remain in the loop for critical decisions, particularly those involving national security or individual rights. We&amp;#39;ve established governance structures and invested in quality, auditable data pipelines.&lt;/p&gt;

&lt;p&gt;But here&amp;#39;s what keeps CIOs and CISOs awake at night: all these careful preparations become meaningless if we can&amp;#39;t secure the data during AI processing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The decrypt-to-use vulnerability&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Today&amp;#39;s AI systems, including the increasingly popular Retrieval-Augmented Generation (RAG) models that federal agencies are deploying, have a fundamental security limitation. To analyze data, they must decrypt it first. This creates a vulnerability window where sensitive information sits exposed in memory and processing systems.&lt;/p&gt;

&lt;p&gt;For classified defense data, this is often a complete showstopper. Legal teams won&amp;#39;t approve AI analysis of intelligence data when the architecture requires decryption during processing. The same applies to healthcare data protected by HIPAA, financial records subject to compliance requirements&amp;nbsp;or personally identifiable information covered by privacy laws.&lt;/p&gt;

&lt;p&gt;Consider the implications: the Department of Defense collects vast amounts of operational data, but by my estimates, we use only about 5% of it on our best days. Of that small fraction, only about 25% reaches commanders in time to inform mission-critical decisions. If I told corporate executives they were throwing away 95% of their competitive advantage, they&amp;#39;d be terminated that day. Yet we are forced to slow down our AI usage because we lack secure methods to process sensitive data with AI.&lt;/p&gt;

&lt;p&gt;This isn&amp;#39;t just inefficiency; it&amp;#39;s a national security risk. Our adversaries are aggressively deploying AI without the same ethical constraints or security concerns that rightfully slow our adoption. The country that can most effectively harness AI for intelligence analysis, operational planning and strategic decision-making will have significant advantages in future conflicts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The RAG security challenge&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Retrieval-Augmented Generation models present particularly acute security challenges. These systems combine large language models with organizational knowledge bases, allowing AI to provide contextually relevant responses based on proprietary or classified information. They&amp;#39;re powerful tools for everything from policy analysis to technical support.&lt;/p&gt;

&lt;p&gt;But RAG architectures require constant interaction between the AI model and data repositories. Every query triggers retrieval operations that pull sensitive information from storage, decrypt it for processing, generate results and ideally re-encrypt everything. Each step creates potential exposure points. Each handoff between systems represents a possible vulnerability.&lt;/p&gt;

&lt;p&gt;Traditional encryption approaches &amp;mdash; encrypt data at rest, decrypt for processing, re-encrypt for storage &amp;mdash; simply don&amp;#39;t work when AI systems need continuous, high-speed access to sensitive information. The decrypt-to-use model creates too many windows of vulnerability, and the performance overhead of constant encryption and decryption operations becomes prohibitive.&lt;/p&gt;

&lt;p&gt;Federal agencies attempting to deploy RAG systems on classified or sensitive data face an impossible choice: either accept security risks that breach their compliance obligations, or forgo AI capabilities on the data where AI would provide the most value.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What&amp;#39;s needed: processing without decryption&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The solution requires a fundamentally different security architecture; one that enables AI processing on encrypted data without ever decrypting it. This isn&amp;#39;t theoretical cryptography research; the underlying mathematics exists. What&amp;#39;s needed is engineering that makes continuous encryption practical for real-world AI operations.&lt;/p&gt;

&lt;p&gt;Such an architecture would allow RAG models to query encrypted databases, retrieve encrypted information, process it while encrypted and return results; all without creating those vulnerability windows that make security officers reject AI deployments. The encryption never comes off. The data is never exposed, even to the AI system itself.&lt;/p&gt;

&lt;p&gt;This would unlock AI capabilities across government operations that are currently off-limits:&lt;/p&gt;

&lt;p&gt;&lt;u&gt;In defense and intelligence&lt;/u&gt;: Analysts could use AI to identify patterns across classified datasets, generate intelligence assessments and provide decision support; all while maintaining required security clearances for the data itself.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;In healthcare&lt;/u&gt;: VA hospitals could deploy AI diagnostics and treatment recommendations using complete patient records, improving care quality without HIPAA violations.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;In law enforcement&lt;/u&gt;: Investigators could leverage AI for case analysis and threat detection using sensitive criminal justice information that currently can&amp;#39;t be processed by AI systems.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;In financial oversight&lt;/u&gt;: Regulators could use AI to detect fraud patterns and compliance violations across sensitive financial data that institutions legally cannot decrypt for AI analysis.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Beyond technical solutions: cultural change&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Technology alone won&amp;#39;t solve this challenge. As I emphasized throughout my time at DOD, we need fundamental shifts in how government approaches risk management. Too often, &amp;quot;risk management&amp;quot; becomes a sophisticated way of saying &amp;quot;no&amp;quot; to innovation. We need to ban that reflex and focus instead on mission outcomes.&lt;/p&gt;

&lt;p&gt;The right question isn&amp;#39;t &amp;quot;How do we eliminate all risk?&amp;quot; It&amp;#39;s &amp;quot;How do we enable critical capabilities while managing risks to acceptable levels?&amp;quot; For AI security, that means demanding encryption architectures that protect sensitive data throughout the AI processing lifecycle, not just when data sits idle in storage.&lt;/p&gt;

&lt;p&gt;We also need acquisition reform that allows government to rapidly adopt innovative security solutions. It&amp;#39;s absurd that a $500,000 contract costs the same to execute as a $2 billion program. Small companies developing breakthrough security technologies can&amp;#39;t navigate our procurement bureaucracy. Meanwhile, adversaries move faster because they&amp;#39;re unburdened by our process constraints.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The path forward&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Federal agencies are making significant investments in AI infrastructure, training programs and governance frameworks. These investments will be wasted if we can&amp;#39;t secure the sensitive data that AI needs to provide real value.&lt;/p&gt;

&lt;p&gt;The good news is that solutions are emerging. Continuous encryption technologies that enable AI processing without decryption are moving from research labs to commercial availability. Forward-thinking agencies should be evaluating these capabilities now, running pilot programs and preparing their organizations for a security architecture that finally allows sensitive data and AI to work together.&lt;/p&gt;

&lt;p&gt;The stakes are too high for incremental progress. Every month we wait to solve the RAG security challenge is another month where America&amp;#39;s adversaries gain ground in the AI race. Every sensitive dataset that remains off-limits to AI is a missed opportunity for better decisions, faster response times and more effective government operations.&lt;/p&gt;

&lt;p&gt;We built the responsible AI framework. We established governance structures. We invested in data quality. Now we need the security architecture that allows us to actually use AI on the data that matters most.&lt;/p&gt;

&lt;p&gt;The technology to unleash AI across government operations exists. What we need now is the leadership commitment to demand it, the acquisition agility to procure it, and the cultural shift to deploy it. Our missions, and our national security, depend on it.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Terry Halvorsen served as Chief Information Officer at the U.S. Department of Defense from 2015-2017 and as CIO of the Department of the Navy. He currently serves as Vice President of Federal Client Development at IBM. He is a veteran Army intelligence officer who served during Operation Just Cause and Operation Desert Storm.&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/08/GettyImages_2214959014/large.jpg" width="618" height="284"><media:credit>Greggory DiSalvo/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/08/GettyImages_2214959014/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Inside the effort to connect Congress with the feds enacting its policies</title><link>https://www.nextgov.com/policy/2026/05/inside-effort-connect-congress-feds-enacting-its-policies/413407/</link><description>Those writing laws don’t often hear from those charged with implementing them. The POPVOX Foundation wants that to change.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Natalie Alms</dc:creator><pubDate>Fri, 08 May 2026 08:00:00 -0400</pubDate><guid>https://www.nextgov.com/policy/2026/05/inside-effort-connect-congress-feds-enacting-its-policies/413407/</guid><category>Policy</category><content:encoded>&lt;![CDATA[&lt;p&gt;Congress is flying blind on the effectiveness of the laws it creates.&lt;/p&gt;

&lt;p&gt;That&amp;rsquo;s the thesis of a new &lt;a href="https://www.popvox.org/departure"&gt;project&lt;/a&gt; released last week by the POPVOX Foundation, a nonpartisan nonprofit, based on the input of 50 federal employees pushed out of their government jobs last year. The intent of this work was partly to gather insights on how policy implementation works in the executive branch and what barriers exist to effective government that lawmakers may not know about.&lt;/p&gt;

&lt;p&gt;But it&amp;rsquo;s also about showing Capitol Hill what&amp;rsquo;s possible, said Anne Meeker, senior advisor for the POPVOX Foundation, which collaborated with the Niskanen Center, Civil Service Strong, the Partnership for Public Service and the Foundation for American Innovation on the work, called Departure Dialogues.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Communication between those making laws and those implementing them has been a problem for a long time, said Meeker, in part because federal employees doing the work aren&amp;rsquo;t usually authorized to go talk to Congress about what they may be dealing with as they turn statute into reality. That made last year a unique opportunity, as federal employees left the government en masse under the Trump administration&amp;#39;s efforts to shrink the size of the federal workforce.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Typically, Congress&amp;rsquo; current mechanisms for feedback from those closest to implementation in the government are limited. Hearings &amp;ldquo;are performative as often as they are informative,&amp;rdquo; the new report reads. Audits from the Government Accountability Office are usually retrospective, and congressionally-mandated reports are often compliance exercises.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Federal agencies have legislative affairs offices, but the information they transmit to Congress often gets filtered down to politics and top-level priorities, not the &amp;ldquo;program-level, operational oversights [of] what&amp;rsquo;s working, what&amp;rsquo;s breaking, what statutory language creates unnecessary friction,&amp;rdquo; the new report reads.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The hope is that Congress may replicate POPVOX&amp;rsquo;s process, or parts of it&amp;nbsp;&amp;mdash;&amp;nbsp;including the use of AI to synthesize insights and surface patterns &amp;mdash; so that experts have channels to communicate with lawmakers and their staff. For that reason, Departure Dialogues includes a methods report, in addition to a report on key findings and a legislative index.&lt;/p&gt;

&lt;p&gt;One recommendation is for congressional committees to consider building structured input processes into reauthorization cycles or invite mid-level experts in for structured listening sessions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;As for what lawmakers may find if they take on the charge of hearing more from those in government agencies, one top takeaway Departure Dialogues found is that the accumulation of policies and requirements is making it difficult to get things done. Congress usually adds requirements, but it doesn&amp;rsquo;t take them away.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;One recurring challenge I encountered was the cumulative burden imposed by overlapping and sometimes conflicting legislative and reporting requirements associated with different funding streams,&amp;rdquo; Vikki Stein, who worked at the U.S. Agency for International Development for 30 years, told POPVOX.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;While each requirement was reasonable in itself, together they created inefficiencies that reduced our ability to focus on program effectiveness,&amp;rdquo; she continued. &amp;ldquo;This led to significant duplication of effort, diverting staff time and resources away from program monitoring, learning, and adaptation.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Others told POPVOX that statutory language sometimes directly prevents them from achieving what Congress intended.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A common culprit: the Paperwork Reduction Act, a law created before the days of the internet that&amp;rsquo;s meant to reduce paperwork for Americans. Detractors say the law adds bureaucracy internally to those delivering government services who want to collect data like feedback meant to help ensure that government programs work well for people &amp;mdash; but that it doesn&amp;rsquo;t ultimately always reduce burden on citizens the way it&amp;rsquo;s intended to.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Those writing the new report saw themes across workforce, contracting and internal communication: just as agencies and Congress are siloed, so too are agencies isolated from each other, and even teams within agencies are experiencing separation.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The project was a little bit of an experiment to see if departing federal employees in this really politically tense moment were interested in participating,&amp;rdquo; Meeker said of the work.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The response that we got &amp;hellip; was really neat to see. We had so many folks really excited about this chance to say to Congress, like, &amp;lsquo;Look, forget the partisanship, forget the politics. This is just the one thing you need to know about how to make this program better,&amp;rsquo;&amp;rdquo; she continued. &amp;ldquo;That spirit of service was actually really kind of moving.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/07/050726capitolNG/large.jpg" width="618" height="284"><media:credit>Doug Armand/Getty Images</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/07/050726capitolNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>US tech official calls for ‘transformational’ use of AI in scientific discovery</title><link>https://www.nextgov.com/artificial-intelligence/2026/05/us-tech-official-calls-transformational-use-ai-scientific-discovery/413405/</link><description>Chief Technology Officer Ethan Klein said deploying AI agents across workflows will enhance scientific efficiency, which is particularly critical “because that underpins every one of these technologies that we're looking to develop.”</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Edward Graham</dc:creator><pubDate>Thu, 07 May 2026 16:50:00 -0400</pubDate><guid>https://www.nextgov.com/artificial-intelligence/2026/05/us-tech-official-calls-transformational-use-ai-scientific-discovery/413405/</guid><category>Artificial Intelligence</category><content:encoded>&lt;![CDATA[&lt;p&gt;The Trump administration sees greater incorporation of artificial intelligence capabilities into the scientific research space as critical for continued U.S. technology leadership, a White House official said on Thursday.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Speaking at the Special Competitive Studies Project&amp;rsquo;s &lt;a href="https://expo.scsp.ai/"&gt;AI+ Expo&lt;/a&gt;, U.S. Chief Technology Officer Ethan Klein said a major focus of this administration &amp;ldquo;is having better integration and tie-in across the scientific development piece, all the way through tech development, testing, prototyping and scale up.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Klein said greater adoption of emerging capabilities like agentic AI &amp;mdash; autonomous systems capable of executing specific tasks with minimal human oversight &amp;mdash; will have a profound impact on scientific research. A Market Connections survey of more than 200 technology executives across government that was &lt;a href="https://www.nextgov.com/artificial-intelligence/2026/05/survey-more-half-federal-agencies-now-planning-agentic-ai-pilots/413324/"&gt;released&lt;/a&gt; on Tuesday found that 53% of respondents said their agencies were already exploring uses of agentic AI or were planning pilots of the technology.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;Across a broad swath of applications, but specifically for scientific discovery, I think agentic AI will be transformational,&amp;rdquo; said Klein, who also serves as an associate director of the White House Office of Science and Technology Policy.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Greater use of these capabilities, he said, would help to expand and enhance data collection and transform the types of experiments that can be conducted by researchers.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I think that if we&amp;#39;re able to actually deploy these agentic AI &amp;hellip; agents across those workflows, they&amp;#39;re going to see a great amount of scientific efficiency,&amp;rdquo; Klein added. &amp;quot;And that&amp;#39;s incredibly important, because that underpins every one of these technologies that we&amp;#39;re looking to develop.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;The Trump administration has already taken some steps to enhance nationwide research efforts by leveraging AI. The largest of these is the Genesis Mission, which was &lt;a href="https://www.nextgov.com/artificial-intelligence/2025/11/white-house-launches-genesis-mission-spur-ai-federal-assets/409777/"&gt;launched&lt;/a&gt; in November 2025 and seeks&amp;nbsp;to further harness AI for scientific advancement.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Klein said the initiative will help bring &amp;ldquo;a bit of that muscle [when it comes to] incorporating that into the workflows that we know are going to bring forth this new era of AI-enabled scientific discovery.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Thursday&amp;rsquo;s panel, however, was held amid ongoing concerns about how the Trump administration&amp;rsquo;s push to scale back government operations through layoffs and reductions in force is impacting research efforts.&lt;/p&gt;

&lt;p&gt;Just last month, President Donald Trump dismissed all 22 members of the independent advisory board overseeing the National Science Foundation, which supports nationwide science and engineering research. Critics have said the purge &amp;mdash; which comes as NSF still lacks a permanent director &amp;mdash; &lt;a href="https://www.latimes.com/world-nation/story/2026-04-26/trump-purges-national-science-board-scientists-warn-of-ai-shift"&gt;will harm&lt;/a&gt; continued U.S. scientific leadership.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Editor&amp;rsquo;s note: Market Connections is a business division of GovExec, the parent company of Nextgov/FCW.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/07/050726KleinNG/large.jpg" width="618" height="284"><media:description>U.S. CTO Ethan Klein attends the 33rd Annual White House Correspondents' Garden Brunch on April 25, 2026 in Washington, DC.</media:description><media:credit>Paul Morigi/Getty Images for Haddad Media</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/07/050726KleinNG/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item><item><title>Pentagon will ‘never again’ rely on a single AI provider, official says</title><link>https://www.nextgov.com/artificial-intelligence/2026/05/pentagon-will-never-again-rely-single-ai-provider-official-says/413399/</link><description>Defense Under Secretary for Research and Engineering Emil Michael said new agreements with Big Tech companies are a “counterstatement” to the ongoing Anthropic-Pentagon conflict as the agency prioritizes flexible contracts.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alexandra Kelley</dc:creator><pubDate>Thu, 07 May 2026 14:41:00 -0400</pubDate><guid>https://www.nextgov.com/artificial-intelligence/2026/05/pentagon-will-never-again-rely-single-ai-provider-official-says/413399/</guid><category>Artificial Intelligence</category><content:encoded>&lt;![CDATA[&lt;p&gt;Leadership at the Pentagon reiterated the agency&amp;rsquo;s commitment to diversifying its artificial intelligence service providers, with Under Secretary of Defense for Research and Engineering Emil Michael taking the stage Thursday at an event in Washington, D.C.,&amp;nbsp;&lt;a href="https://www.defenseone.com/threats/2026/05/pentagon-leaders-love-agentic-ai-its-giving-cyber-criminals-nation-state-powers/413379/?oref=d1-featured-river-secondary"&gt;to stress&lt;/a&gt; that his department is never being &amp;ldquo;single-threaded with any one model.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Speaking during the Special Competitive Studies Project&amp;rsquo;s AI+ Expo event, Michael said that the recent deals between &lt;a href="https://www.nextgov.com/artificial-intelligence/2026/05/pentagon-makes-agreements-7-companies-add-ai-classified-networks/413264/?oref=ng-homepage-river"&gt;eight leading AI developers and the Department of Defense&lt;/a&gt; are both a private sector statement of support for working with the government, as well as a step towards the Pentagon&amp;rsquo;s goal to diversify its tech stack with different providers.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;We were single-threaded on one vendor, one AI vendor at the Department of War, and to integrate into classified systems is not just putting your software on a public cloud and having it work,&amp;rdquo; Michael said, referring to his agency&amp;rsquo;s contract with Anthropic. &amp;ldquo;These are sophisticated, protective systems that take a lot of work to integrate on, so it wasn&amp;#39;t like I could just turn on a few other models that easily. But never again we&amp;rsquo;ll be single-threaded with any one model.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Michael continued to say that the new deals with Amazon Web Services, Google, Microsoft, NVIDIA, OpenAI, Reflection, Oracle and SpaceX are &amp;ldquo;a statement by the biggest tech companies in the world who are involved in the AI space &amp;hellip; and have them say, &amp;lsquo;We support the Department of War, we support the U.S. government, and we support the&amp;hellip; armed services for all lawful use cases.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;Michael&amp;rsquo;s comments come in the midst of an &lt;a href="https://www.nextgov.com/acquisition/2026/03/anthropic-sues-over-dozen-federal-agencies-and-government-leaders/411995/?oref=ng-home-top-story"&gt;ongoing dispute&lt;/a&gt; between Anthropic and the Department of Defense following the company&amp;rsquo;s refusal to have its technology used in operations involving autonomous weaponry and American surveillance.&lt;/p&gt;

&lt;p&gt;The fallout of that dispute resulted in the Pentagon designating Anthropic a supply chain risk and the White House &lt;a href="https://www.nextgov.com/acquisition/2026/03/agencies-begin-shed-anthropic-contracts-following-trumps-directive/411823/"&gt;ordering agencies&lt;/a&gt; to begin removing the company&amp;#39;s products from their tech stacks. A judge &lt;a href="https://www.nextgov.com/acquisition/2026/03/judge-blocks-dods-ban-anthropic-calls-it-first-amendment-retaliation/412457/?oref=ng-author-river"&gt;put a hold&lt;/a&gt; on those actions in late March pending ongoing litigation over the government&amp;rsquo;s actions.&lt;/p&gt;

&lt;p&gt;The release of Anthropic&amp;rsquo;s advanced cybersecurity-focused model, Mythos Preview, changed the discussion. Access to Mythos and its advanced capabilities for detecting cybersecurity flaws is tantalizing for the U.S. government, prompting &lt;a href="https://www.nextgov.com/artificial-intelligence/2026/04/white-house-drafting-plans-permit-federal-anthropic-use/413202/?oref=ng-author-river"&gt;internal drafts of policy plans&lt;/a&gt; that would enable some agencies to use Anthropic&amp;rsquo;s cutting-edge model.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Michael said that the advent of Mythos signals the forthcoming evolution of cyber-capable AI models.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;The Mythos moment&amp;nbsp;is really a cyber moment, and it&amp;#39;s: &amp;lsquo;How is the U.S. government going to deal with cyber?&amp;rsquo;&amp;rdquo; Michael said.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Major tech companies are responding to Michael&amp;rsquo;s drive to diversify the Pentagon&amp;rsquo;s vendor portfolio. Rand Waldron, the vice president of the Global Government Sector for Oracle Cloud Infrastructure, told &lt;em&gt;Nextgov/FCW&lt;/em&gt; that Defense officials are asking cloud service providers like Oracle to prioritize interconnectedness in the effort to avoid vendor lock-in.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;From what I can see, the Department of War has some very savvy people who &amp;hellip; don&amp;#39;t want to go all in on one [model] because&amp;nbsp;then six months later, they may need to go all in on another,&amp;rdquo; Waldron said.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;He explained that there will likely be models that are more finely-tuned to particular use cases, such as code generation, data analytics, supply chain management or targeting in warfighter operations. One model from a single provider may not effectively serve each of these workflows.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I don&amp;#39;t believe that all those different use cases will end up being the exact same model at any given time,&amp;rdquo; Waldron said.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The Pentagon&amp;rsquo;s desire to expand the service offerings available for its workforce has precedent. Waldron said that DOD and the intelligence community have laid the foundation for a flexible approach to AI services acquisition, citing the creation of the Commercial Cloud Enterprise and Joint Warfighting Cloud Capability contracting vehicles as the blueprints for future contracting structure.&lt;/p&gt;

&lt;p&gt;&amp;ldquo;It&amp;#39;s not like they&amp;#39;re trying to replace Anthropic with another model provider,&amp;rdquo; Waldron said. &amp;ldquo;They want to replace Anthropic with four model providers.&amp;rdquo;&lt;/p&gt;
]]&gt;</content:encoded><media:content url="https://cdn.nextgov.com/media/img/cd/2026/05/07/9648785/large.jpg" width="618" height="284"><media:description>Undersecretary of Defense for Research and Engineering Emil Michael attends a Defense Advanced Research Projects Agency event at DARPA Headquarters, Arlington, Va., April 29, 2026.</media:description><media:credit>Staff Sgt. Milton Hamilton/Air Force</media:credit><media:thumbnail url="https://cdn.nextgov.com/media/img/cd/2026/05/07/9648785/thumb.jpg" width="138" height="83"></media:thumbnail></media:content></item></channel></rss>