AUTHOR ARCHIVES

Brendan Sasso

National Journal Brendan Sasso is a technology correspondent for National Journal. He previously covered technology policy issues for The Hill and was a researcher and contributing writer for the 2012 edition of the Almanac of American Politics. He grew up in the San Francisco Bay Area and graduated from Claremont McKenna College.
Results 1-10 of 241

The Hill's Newest Encryption Fight -- Over Committee Turf

March 23, 2016 Amid a series of ter­ror at­tacks and the court battle between Apple and the FBI, few mem­bers of Con­gress have any idea how to solve the thorny prob­lems sur­round­ing gov­ern­ment ac­cess to en­cryp­ted data. But that hasn’t stopped them from fight­ing over who gets to come up with the solu­tions....

The Obama Administration’s Encryption Views Are All Over the Map

January 27, 2016 The wide­spread use of en­cryp­tion is mak­ing it in­creas­ingly dif­fi­cult for the gov­ern­ment to catch gang­sters, child pred­at­ors, and ter­ror­ists, a top Justice De­part­ment of­fi­cial warned Monday at a tech­no­logy-policy con­fer­ence. “The De­part­ment of Justice is com­pletely com­mit­ted to seek­ing and ob­tain­ing ju­di­cial au­thor­iz­a­tion for elec­tron­ic evid­ence col­lec­tion in all...

Obama Administration’s Encryption Views Are All Over the Map

January 26, 2016 FROM NEXTGOV arrow The wide­spread use of en­cryp­tion is mak­ing it in­creas­ingly dif­fi­cult for the gov­ern­ment to catch gang­sters, child pred­at­ors, and ter­ror­ists, a top Justice De­part­ment of­fi­cial warned Monday at a tech­no­logy-policy con­fer­ence. “The De­part­ment of Justice is com­pletely com­mit­ted to seek­ing and ob­tain­ing ju­di­cial au­thor­iz­a­tion for elec­tron­ic evid­ence col­lec­tion in all...

The White House's Encryption Views Are All Over the Map

January 26, 2016 The wide­spread use of en­cryp­tion is mak­ing it in­creas­ingly dif­fi­cult for the gov­ern­ment to catch gang­sters, child pred­at­ors, and ter­ror­ists, a top Justice De­part­ment of­fi­cial warned Monday at a tech­no­logy-policy con­fer­ence. “The De­part­ment of Justice is com­pletely com­mit­ted to seek­ing and ob­tain­ing ju­di­cial au­thor­iz­a­tion for elec­tron­ic evid­ence col­lec­tion in all...

Frustrated by Congress, Privacy Advocates Shift Fight to the States

January 21, 2016 FROM NEXTGOV arrow Frus­trated by con­gres­sion­al grid­lock, le­gis­lat­ors in 16 states and the Dis­trict of Columbia un­veiled an ar­ray of bills Wed­nesday aimed at bol­ster­ing pri­vacy pro­tec­tions. An­thony Romero, the ex­ec­ut­ive dir­ect­or of the Amer­ic­an Civil Liber­ties Uni­on, which co­ordin­ated the rol­lout of the bills, ar­gued that state ac­tion is ne­ces­sary be­cause Con­gress...

Privacy Advocates Shift Focus From Congress to States

January 21, 2016 Frus­trated by con­gres­sion­al grid­lock, le­gis­lat­ors in 16 states and the Dis­trict of Columbia un­veiled an ar­ray of bills Wed­nes­day aimed at bol­ster­ing pri­vacy pro­tec­tions. An­thony Romero, the ex­ec­ut­ive dir­ect­or of the Amer­ic­an Civil Liber­ties Uni­on, which co­ordin­ated the rol­lout of the bills, ar­gued that state ac­tion is ne­ces­sary be­cause Con­gress...

This Court Case Could be a Major Blow to FTC’s Data Security Efforts

January 14, 2016 FROM NEXTGOV arrow Most com­pan­ies fa­cing a law­suit from the Fed­er­al Trade Com­mis­sion try to settle as quickly as pos­sible. Fight­ing the FTC means years of ex­haust­ing and ex­pens­ive lit­ig­a­tion. The com­mis­sion doesn’t even have the au­thor­ity to im­pose fines for most vi­ol­a­tions, so a set­tle­ment usu­ally just means the com­pany has to...

Privacy Groups Blast Cyber-Sharing Included in Omnibus Spending Bill

December 17, 2015 FROM NEXTGOV arrow After years of de­bate and man­euv­er­ing, a ma­jor cy­ber­se­cur­ity bill is fi­nally on the fast track to ap­prov­al after law­makers at­tached it to a $1.1 tril­lion gov­ern­ment spend­ing pack­age early Wed­nes­day morn­ing. While busi­ness groups and na­tion­al se­cur­ity hawks are cheer­ing the news, it’s a ma­jor blow to pri­vacy ad­voc­ates,...

Ted Cruz Is Right: NSA Reform Bill Allows More Spying

December 16, 2015 FROM NEXTGOV arrow Sens. Marco Ru­bio and Ted Cruz clashed over their op­pos­ing votes on a key sur­veil­lance bill dur­ing Tues­day night’s GOP de­bate, with each sen­at­or try­ing to es­tab­lish him­self as the strongest on na­tion­al se­cur­ity. Ru­bio ac­cused Cruz of ham­per­ing in­tel­li­gence agen­cies by sup­port­ing the USA Free­dom Act, which ended the...

Ted Cruz Is Correct: The NSA Reform Bill Allows More Spying

December 16, 2015 Sens. Marco Ru­bio and Ted Cruz clashed over their op­pos­ing votes on a key sur­veil­lance bill dur­ing Tues­day night’s GOP de­bate, with each sen­at­or try­ing to es­tab­lish him­self as the strongest on na­tion­al se­cur­ity. Ru­bio ac­cused Cruz of ham­per­ing in­tel­li­gence agen­cies by sup­port­ing the USA Free­dom Act, which ended the...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    View
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    View

When you download a report, your information may be shared with the underwriters of that document.