AUTHOR ARCHIVES

Alexander Abad-Santos

Results 31-40 of 75

Sasha and Malia's Spring Break Will Not Ruin the Republic

March 29, 2013 Sasha and Malia's trip to the Bahamas or Idaho or wherever they are is expensive, lavish, and depending on who you ask perhaps a bit wasteful—just like Bush daughters' trip to Argentina and the Carters, Fords, and Eisenhowers' trips to Europe, or any other First Family member moves with a...

Analysis: The U.S. Flew B-2 Bombers Over Korea Because It Can

March 28, 2013 So we know North Korea has a habit of puffing its chest and it feels like Kim Jong-Un's country declares the annihilation of its enemies seemingly every other day now. But with the U.S. announcing that they're practicing stealth bombing runs over the Korean peninsula, it's a sign that the...

Who's Using Chemical Weapons in Syria Now?

March 19, 2013 FROM NEXTGOV arrow Opposition forces and the Syrian regime agree that there was an attack in the dangerous Aleppo province that killed at least 16 people and wounded around 86 on Tuesday. And both are claiming, to some extent, that there were chemical weapons involved. The one thing they can't agree on is...

The Army Doesn't Want You to See the Results of Its Shady PTSD Probe

February 28, 2013 FROM NEXTGOV arrow This past fall, the Army found out the results of a probe meant to determine if psychiatrists were reversing soldiers' PTSD diagnoses to save the government money by denying them medical retirements. Months later, they still don't want anyone knowing what's in those files. The Army has refused to release...

China Says U.S. Is on Offense in Hacking Attacks on Defense Ministry

February 28, 2013 FROM NEXTGOV arrow Ten days to the day that cyber security firm Mandiant released a blistering report on China's state-sponsored sustained hacking of the United States's vital infrastructure and top companies, the Chinese Ministry of Defense has its own report about the U.S. hacking two vital military sites. "According to the IP addresses,...

China Says the U.S. Is Actually the Hacker You Should Be Worried About

February 20, 2013 FROM NEXTGOV arrow Days after cybersecurity firm Mandiant published an eye-popping report of state-sponsored cyber espionage by the China's People’s Liberation Army, the Chinese have fired back. They're not only denying that they are behind the attack, they also say that they're actually the victim and that the United States of America is...

Anonymous Wants to Ruin Your State of the Union Livestream

February 12, 2013 FROM NEXTGOV arrow Another big, bad Anonymous hack is knocking on cyber doorsteps — and freaking out Washington: The do-gooder hacking collective plans to target cord cutters and anyone using the Internet to watch the State of the Union address online, blacking out President Obama's speech for the causes of Aaron Swartz, the...

Are Spy Drones Being Used to Find Fugitive Christopher Dorner?

February 11, 2013 FROM NEXTGOV arrow The Internet erupted with some pretty shocking news yesterday: that the police were using drones to find wanted cop-killer Christopher Dorner. If true, it would be another odd turn in this massive manhunt, but despite claims to the contrary, he wouldn't be the first human target on American soil. London's...

North Korean video imagines what it would be like to wipe out a U.S. city

February 5, 2013 FROM NEXTGOV arrow North Korea likes to drop hints about annihilating the United States with nuclear weapons, but just to make it clear, they've produced a helpful propaganda film to show exactly how that's going to go down. The video—which was posted on one of North Korea's official propaganda websites, Uriminzokkiri, over the...

You might want to be prepared for two North Korean nuclear tests

February 4, 2013 FROM NEXTGOV arrow Not satisfied with upsetting the entire world with a new nuclear weapons test, there's now speculation that North Korea may be planning two tests, possibly back-to-back or even simultaneously. When last we had checked with them, there were reports that the North Koreans were camouflaging an entrance to one of...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.