AUTHOR ARCHIVES

Brendan Sasso

National Journal Brendan Sasso is a technology correspondent for National Journal. He previously covered technology policy issues for The Hill and was a researcher and contributing writer for the 2012 edition of the Almanac of American Politics. He grew up in the San Francisco Bay Area and graduated from Claremont McKenna College.
Results 1-10 of 241

The Hill's Newest Encryption Fight -- Over Committee Turf

March 23, 2016 Amid a series of ter­ror at­tacks and the court battle between Apple and the FBI, few mem­bers of Con­gress have any idea how to solve the thorny prob­lems sur­round­ing gov­ern­ment ac­cess to en­cryp­ted data. But that hasn’t stopped them from fight­ing over who gets to come up with the solu­tions....

The Obama Administration’s Encryption Views Are All Over the Map

January 27, 2016 The wide­spread use of en­cryp­tion is mak­ing it in­creas­ingly dif­fi­cult for the gov­ern­ment to catch gang­sters, child pred­at­ors, and ter­ror­ists, a top Justice De­part­ment of­fi­cial warned Monday at a tech­no­logy-policy con­fer­ence. “The De­part­ment of Justice is com­pletely com­mit­ted to seek­ing and ob­tain­ing ju­di­cial au­thor­iz­a­tion for elec­tron­ic evid­ence col­lec­tion in all...

Obama Administration’s Encryption Views Are All Over the Map

January 26, 2016 FROM NEXTGOV arrow The wide­spread use of en­cryp­tion is mak­ing it in­creas­ingly dif­fi­cult for the gov­ern­ment to catch gang­sters, child pred­at­ors, and ter­ror­ists, a top Justice De­part­ment of­fi­cial warned Monday at a tech­no­logy-policy con­fer­ence. “The De­part­ment of Justice is com­pletely com­mit­ted to seek­ing and ob­tain­ing ju­di­cial au­thor­iz­a­tion for elec­tron­ic evid­ence col­lec­tion in all...

The White House's Encryption Views Are All Over the Map

January 26, 2016 The wide­spread use of en­cryp­tion is mak­ing it in­creas­ingly dif­fi­cult for the gov­ern­ment to catch gang­sters, child pred­at­ors, and ter­ror­ists, a top Justice De­part­ment of­fi­cial warned Monday at a tech­no­logy-policy con­fer­ence. “The De­part­ment of Justice is com­pletely com­mit­ted to seek­ing and ob­tain­ing ju­di­cial au­thor­iz­a­tion for elec­tron­ic evid­ence col­lec­tion in all...

Frustrated by Congress, Privacy Advocates Shift Fight to the States

January 21, 2016 FROM NEXTGOV arrow Frus­trated by con­gres­sion­al grid­lock, le­gis­lat­ors in 16 states and the Dis­trict of Columbia un­veiled an ar­ray of bills Wed­nesday aimed at bol­ster­ing pri­vacy pro­tec­tions. An­thony Romero, the ex­ec­ut­ive dir­ect­or of the Amer­ic­an Civil Liber­ties Uni­on, which co­ordin­ated the rol­lout of the bills, ar­gued that state ac­tion is ne­ces­sary be­cause Con­gress...

Privacy Advocates Shift Focus From Congress to States

January 21, 2016 Frus­trated by con­gres­sion­al grid­lock, le­gis­lat­ors in 16 states and the Dis­trict of Columbia un­veiled an ar­ray of bills Wed­nes­day aimed at bol­ster­ing pri­vacy pro­tec­tions. An­thony Romero, the ex­ec­ut­ive dir­ect­or of the Amer­ic­an Civil Liber­ties Uni­on, which co­ordin­ated the rol­lout of the bills, ar­gued that state ac­tion is ne­ces­sary be­cause Con­gress...

This Court Case Could be a Major Blow to FTC’s Data Security Efforts

January 14, 2016 FROM NEXTGOV arrow Most com­pan­ies fa­cing a law­suit from the Fed­er­al Trade Com­mis­sion try to settle as quickly as pos­sible. Fight­ing the FTC means years of ex­haust­ing and ex­pens­ive lit­ig­a­tion. The com­mis­sion doesn’t even have the au­thor­ity to im­pose fines for most vi­ol­a­tions, so a set­tle­ment usu­ally just means the com­pany has to...

Privacy Groups Blast Cyber-Sharing Included in Omnibus Spending Bill

December 17, 2015 FROM NEXTGOV arrow After years of de­bate and man­euv­er­ing, a ma­jor cy­ber­se­cur­ity bill is fi­nally on the fast track to ap­prov­al after law­makers at­tached it to a $1.1 tril­lion gov­ern­ment spend­ing pack­age early Wed­nes­day morn­ing. While busi­ness groups and na­tion­al se­cur­ity hawks are cheer­ing the news, it’s a ma­jor blow to pri­vacy ad­voc­ates,...

Ted Cruz Is Right: NSA Reform Bill Allows More Spying

December 16, 2015 FROM NEXTGOV arrow Sens. Marco Ru­bio and Ted Cruz clashed over their op­pos­ing votes on a key sur­veil­lance bill dur­ing Tues­day night’s GOP de­bate, with each sen­at­or try­ing to es­tab­lish him­self as the strongest on na­tion­al se­cur­ity. Ru­bio ac­cused Cruz of ham­per­ing in­tel­li­gence agen­cies by sup­port­ing the USA Free­dom Act, which ended the...

Ted Cruz Is Correct: The NSA Reform Bill Allows More Spying

December 16, 2015 Sens. Marco Ru­bio and Ted Cruz clashed over their op­pos­ing votes on a key sur­veil­lance bill dur­ing Tues­day night’s GOP de­bate, with each sen­at­or try­ing to es­tab­lish him­self as the strongest on na­tion­al se­cur­ity. Ru­bio ac­cused Cruz of ham­per­ing in­tel­li­gence agen­cies by sup­port­ing the USA Free­dom Act, which ended the...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

    Download
  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download
  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

    Download
  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.

    Download

When you download a report, your information may be shared with the underwriters of that document.