AUTHOR ARCHIVES

Results 11-20 of 73

Analysis: Are 50 Foiled Terrorist Plots Worth Your Privacy?

June 18, 2013 In the most candid explanation of the National Security Agency's surveillance program to date, agency head Gen. Keith Alexander said Tuesday that his organization's listening activity has helped foil more than 50 terrorist plots against the United States and its allies. One of those involved Najibullah Zazi's attempt to blow...

The Taliban Is Ready for Peace Talks

June 18, 2013 U.S. officials have confirmed that the Taliban plans to open a political office in Doha, Qatar, for direct negotiations with the United States and the Afghan government. This comes just hours after after Afghan President Hamid Karzai shook hands with NATO's secretary-general in a ceremony returning day-to-day security responsibilities to...

Apple: iMessage and FaceTime Are Safe From the NSA's Prying Eyes

June 17, 2013 FROM NEXTGOV arrow Apple has added its voice to a growing chorus of Silicon Valley companies calling on Washington for more transparency regarding its data-collection practices. In a statement released Monday, Apple disclosed new details about the requests for user information it fields from the government. For the six months ending May 31,...

Is This PRISM 2.0?

June 14, 2013 FROM NEXTGOV arrow The U.S. intelligence community has been working with "thousands" of companies in key sectors of the economy to trade sensitive information on cybersecurity, including classified data, in ways that go beyond the revelations dropped by National Security Agency leaker Edward Snowden earlier this month. At least one of these companies,...

Analysis: Secret Intelligence Court Hardly Ever Says No

June 13, 2013 FROM NEXTGOV arrow The secret court at the center of the National Security Agency surveillance debate has a bit of a reputation. It's supposed to act as a check on the executive, making sure it doesn't overstep its bounds when eavesdropping on terrorism suspects. In reality, the Foreign Intelligence Surveillance Courthardly ever says...

Leaker: NSA Has Been Snooping on China Since 2009

June 12, 2013 FROM NEXTGOV arrow National Security Agency leaker Edward Snowden is contributing to Chinese complaints that the United States is engaged in acts of cyberespionage against Beijing. Snowden, the 29-year-old former contractor for Booz Allen Hamilton, told the South China Morning Post that Washington has been monitoring "hundreds" of targets in Hong Kong and...

Google, Facebook to DOJ: Let Us Publish the Number of FISA Requests You Make

June 12, 2013 FROM NEXTGOV arrow Google's top lawyer is asking Washington to let the company expand its transparency report to include secret court orders like the kind involved in the NSA surveillance scandal. In a letter posted to Google's blog, David Drummond addresses Attorney General Eric Holder and FBI Director Robert Mueller, arguing that when...

Commentary: The NSA leaker and Highly Skilled but Academically Ordinary Workers

June 11, 2013 FROM NEXTGOV arrow Booz Allen Hamilton has released a new statement on Edward Snowden, its now-former employee and National Security Agency surveillance leaker. In addition to saying it fired Snowden yesterday over code-of-ethics violations, Booz Allen reports that the Maryland native's annual salary was $122,000—far less than the $200,000 Snowden himself claimed to...

6 in 10 Americans Don't See Anything Wrong With Mass Government Surveillance

June 11, 2013 The first polling on the National Security Agency surveillance leak is out, and despite almost unanimous cries of outrage from the press and civil-liberties advocates, the rest of America seems decidedly "meh" on the matter. Over half of us—56 percent, to be exact—think that serving phone companies with a secret...

NSA Leaks Shed Light on China's Complaints About U.S. Hacking

June 10, 2013 FROM NEXTGOV arrow When it came to light that hackers had breached the networks of The New York Times, The Wall Street Journal, and other major U.S. institutions, one of Washington's first responses was to blame China. China's response? You guys do it, too! "The Defense Ministry and China Military Online websites have...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.