AUTHOR ARCHIVES

Bob Brewin

Editor at Large Bob Brewin joined Government Executive in April 2007, bringing with him more than 20 years of experience as a journalist focusing on defense issues and technology. Bob covers the world of defense and information technology for Nextgov, and is the author of the “What’s Brewin” blog.
Results 2521-2530 of 2966

That's Counterintelligence, No Spaces

March 3, 2009 FROM NEXTGOV arrow Evidently I have some real eagle-eyed readers in the intelligence community, because I received a note pointing out that I had a slight misspelling when referring to counter-intelligence in my continuing coverage of the thumb-drive ban. A Marine reader (I know because only Marines sign off "Semper Fidelis") pointed out ...

OK, Can't Treat Adults Like Adults

March 2, 2009 FROM NEXTGOV arrow In my last post I endorsed the intelligence community's approach to thumb drives - don't ban them but issue warnings about the risks, and then assume end users will take an adult approach to the judicious use of computer technology. Well, in a matter of hoots, I've swung the other ...

From Nextgov.com: Digital files on presidential helicopter found in Iran

March 2, 2009 Computer documents showing an upgrade for one of the Marine helicopters used by President Obama were discovered on a file server in Iran on Feb. 25. Read the full story on Nextgov.com

Digital files on presidential helicopter found in Iran

March 2, 2009 FROM NEXTGOV arrow Computer documents showing an upgrade for one of the Marine helicopters used by President Obama were discovered on a file server in Iran on Feb. 25. Tiversa Inc., a Pennsylvania company that scans file-sharing networks for government and corporate clients, first discovered the plans for the VH-60N Marine One presidential ...

Thumb Drives Like Unsafe Sex

February 27, 2009 FROM NEXTGOV arrow That's the view of Joel Brenner, national counter-intelligence executive, who said he views the use of thumb drives on national security information systems as "the electronic equivalent of unprotected sex and the biggest sources of what I call ETDs, or electronically transmitted diseases." Brenner, who was speaking at the 4th ...

File-sharing networks used to uncover thousands of medical records

February 27, 2009 FROM NEXTGOV arrow Just days after President Obama signed a law giving billions of dollars to develop electronic health records, a university technology professor submitted a paper showing that he was able to uncover tens of thousands of medical files containing names, addresses and Social Security numbers for patients seeking treatment for conditions ...

Secretary Gates Muzzles Budgeteers

February 26, 2009 FROM NEXTGOV arrow The $534 billion fiscal 2010 budget for the Defense Department, which the Obama administration released on Thursday, contains few details, particularly on major programs such as the IT-rich $230 billion Army Future Combat Systems project intended to network myriad vehicles and sensors on the battlefield. Details on funding for FCS ...

Nicely Assumes CIO Duties At ODNI

February 26, 2009 FROM NEXTGOV arrow The Office of the Director of National Intelligence said Sherrill Nicely, deputy chief information officer, has assumed the role of acting CIO while Patrick Gorman, the acting CIO, is on leave. ODNI did not say why Gorman was on leave or for how long. Gorman has served as acting CIO ...

VA to start processing vets' educational benefits in March

February 26, 2009 FROM NEXTGOV arrow Officials with the Veterans Affairs Department told a House panel on Thursday that they have developed a computer application and hired more staff to process claims under the new GI Bill but will not have a working computer system to manage the entire workload automatically until December 2010. Congress passed ...

The March of the Botnets

February 25, 2009 FROM NEXTGOV arrow Dennis Blair, Director of National Intelligence, provided a grim statistic in his testimony on Wednesday at a hearing of the House Permanent Select Committee on Intelligence. He said 15 percent of all networked computers in the world are in botnets, computers hijacked and remotely controlled to deliver spam or launch ...