



US Govt Commits To Publish Publicly Financed Software Under FOSS (k7r.eu) 39
An anonymous reader writes: The White House has published a draft (PDF) for a Source Code Policy. The policy requires every public agency to publish their custom-build software as Free Software for other public agencies as well as the general public to use, study, share and improve the software. The Source Code Policy is intended for efficient use of US taxpayers' money and reuse of existing custom-made software across the public sector. It is said to reduce vendor lock-in of the public sector, and decrease duplicate costs for the same code which in return will increase transparency of public agencies. The custom-build software will also be published to the general public either as public domain, or as Free Software so others can improve and reuse the software. Looking at the exceptions, it appears the list excludes a number of interesting things. But what's remarkable here is that, by default, publicly financed software will now be deemed as open-source. That's a win.
Re: (Score:2)
Most likely not, read the draft if you're interested:
Applicable exceptions are as follows:
1. The release of the item is restricted by another statute or regulation, such as the Export Administration Regulations, the International Traffic in Arms Regulation, or the laws and regulations governing classified information;
2. The release of the item would compromise national security, confidentiality, or individual privacy;
3. The release of the item would create an identifiable risk to the stability, securit
Re: (Score:1)
So the source code to pretty much all software can't be published, because hackers can view the source and find more mind-numbingly boneheaded stupid vulnerabilities that they can exploit, even if the code isn't used in "front-facing" applications [as hackers commonly system-hop].
Re: (Score:2)
Re: So, foreign governments can use it too? (Score:2, Funny)
Yeah they should use he json license. It prevents evil use of the software.
North Korea could have healthcare.gov Java (Score:2)
Yep, North Korea would be able to use the 2.4 million lines of Java that makes up the bulk of healthcare.gov, if it had been developed under this policy. The US would then hope that NK actually tried to use it for something important.
Re: (Score:2, Insightful)
Re: (Score:1)
I say, it depends greatly on who exactly the "other guy" is...
Are you sure, this is not going to happen, given our government's incredible efficiency in general and handling of classified materials in particular? What safeguards are you hoping to see in place to prevent it from happening?
Comment removed (Score:5, Interesting)
That's a very smart thing to do (Score:2)
I've worked on a bunch of contract at various levels of government and I'm always shocked to see how belligerent and protective departments or groups can be with their code and applications. There's been so many times when I get hired to do something that after spending a day or two there, that I discovered that another department has done the exact same thing. What follows is my recommendation to leverage what they have in-house already rather than whip something up. What always follows after is weeks of
ITAR (Score:3)
Re: (Score:1)
and since ITAR defines s/w as arms, the right to root ur iphone is protected under the 2nd amendment;-)
Can't wait to see the quality of the documentation (Score:2)
Re: (Score:2)
Functions
getRandomNumber()
https://xkcd.com/221/ [xkcd.com]
Sweet (Score:2)
Hackers are Delighted! (Score:2)
Now, hackers won't have to deal with that pesky machine code to find the loopholes; they can look for intriguing bits of source code first. Should do wonders for the security of Government-held data, don't you think?
On the other hand, we can hope that "white hats" will do the same...but what's THEIR incentive to help government systems become even more secure? A bounty program would be nice...but not in a time when austerians are on the ascent!
Re: Hackers are Delighted! (Score:1)
Maybe requiring the code to be open will mean that a bit more attention is paid to making it secure. We can hope, at least.
Re:Isn't this already the law? (Score:4, Insightful)
You are referring to code produced by a government employee. This applies to products that the federal government pays a contractor to develop, the government is now supposed to include language in the contract stating the government owns the produced code and the code will be released into the public domain. You would be shocked about how much code the US Government has paid for but which the contractor claims to still own. Lots of code that runs our weapons systems is supposedly owned by the company that was paid to produce the code.