AUTHOR ARCHIVES

Alexander Abad-Santos

Results 41-50 of 75

Here’s the North Korea nuclear site they’re trying to hide from the world

February 1, 2013 FROM NEXTGOV arrow Want one more sign that North Korea is getting closer to their third nuclear test? They've started to camouflage and cover the entrance to an underground nuclear testing tunnel at the Punggye-ri facility so that no one can see what they're doing. "Analysis showed a camouflage net looking like a...

Iran and North Korea are upping their nuclear games

January 31, 2013 FROM NEXTGOV arrow There are two countries in this world that we'd rather not see tinker with nuclear energy: Iran and North Korea. And it just so happens one of those is now prepping for a nuclear test, while the other is bragging about how it's putting its program into overdrive. Let's start...

North Korea and its gulags are now on Google Maps

January 29, 2013 FROM NEXTGOV arrow Thanks to citizen cartographers, Google is finally able to fill in one of the last blank spaces on its version of Earth. Last night, the company added North Korea to vast database, and now we can see things like the Hermit Kingdom's mass transit routes, Pyongyang's parks, and even the...

The iPhone app that helped save Algerian hostages in the desert

January 23, 2013 FROM NEXTGOV arrow Make fun of iPhone 5s and their terrible maps all you want, but the next time you're in an Algerian hostage situation, running for your life 20 miles across the desert with almost no water and no real idea where to go, remember that Apple phone's native Compass app just...

Jill Kelley finally speaks about Petraeus, Broadwell, and blackmail

January 22, 2013 In her first interview since the bottom of the David Petreaus scandal fell out, the "other other woman" Jill Kelley told The Daily Beast's Howard Kurtz that Paula Broadwell is one scary cyberbully; that those 30,000 e-mails with General John Allen were more like hundreds; and that she's sorta like...

President Obama stumbles over the oath of office again

January 21, 2013 In 2009 Chief Justice John Roberts flipped some very important words in President Obama's swearing-in. Four years later, it appears the two still haven't figured out how to do get this tradition quite right. Click here to read more on the big "oops" moment from The Atlantic Wire.

U.S. Air Force swoops in on Algeria plant as terrorists demand hostage swap

January 18, 2013 The Algerian hostage situation is about as serious as its details are hazy, but as it enters its third day reports are emerging that the U.S. Air Force "is in the process of evacuating Americans and other individuals." Algerian state television reported this morning that Thursday's suspect mission by Algeria's...

Report: State believes Assad used chemical weapons on Syrian people

January 16, 2013 In a leak that could signal a crossing of President Obama's "red line" on the increasingly deadly conflict in Syria, the State Department has investigated and concluded that Syrian President Bashar al-Assad and his military forces used poison gas in a deadly attack on the city of Homs last month,...

Interior Secretary Ken Salazar is leaving the cabinet in March

January 16, 2013 President Obama has one more position to fill in his second-term cabinet. Following the departures of Hillary Clinton, Leon Panetta, Timothy Geithner, and Hila Solis, sources in the administration have confirmed that his Interior Secretary, Ken Salazar, will be leaving. "Salazar is expected to broadly announce his departure Wednesday. He...

Video: North Korea shows Eric Schmidt it knows how to Google

January 9, 2013 FROM NEXTGOV arrow As Bill Richardson and Eric Schmidt's excellent adventure to the Internet Black Hole known as North Korea carries on, the former New Mexico governor and Google chair visited some of the only people in the country who are allowed access to the Internet: the students at Kim Il Sung University....

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.