AUTHOR ARCHIVES

Results 11-20 of 1314

As Qaddafi's government comes apart, new concerns for U.S.

August 22, 2011 While rebels in Libya took over the streets of Tripoli and declared an end to the rule of Muammar el-Qaddafi, major questions quickly need to be answered in the coming hours and days, including what kind of transitional government comes next and whether an international peacekeeping force should be sent...

Senate panel cuts more than $500 million from spy operations

August 3, 2011 More than $500 million would be cut from the CIA and other U.S. intelligence agencies under a bill authorizing programs and spending for spying operations next year, a key senator and congressional aides said. The fiscal 2012 intelligence authorization bill would reduce intelligence spending by about 1 percent -- about...

Soldier charged in bomb plot targeting Fort Hood personnel

July 29, 2011 The U.S. soldier arrested in Texas on Thursday planned to make two bombs using gun powder and shrapnel packed in pressure cookers to detonate inside a restaurant frequented by soldiers from Fort Hood, according to the Justice Department. Pfc. Naser Jason Abdo was charged on Friday with possession of an...

Senate confirms Mueller to head FBI for two more years

July 27, 2011 The Senate voted 100-0 on Wednesday to confirm Robert Mueller to remain as director of the FBI for two more years. President Obama had previously requested that Mueller's term be extended for two years in order to help ensure continuity in his national-security team. Mueller had been under a 10-year...

Justice to drop investigations into CIA officials involved in torture

June 30, 2011 The Justice Department will end a wide-ranging probe into the CIA's past interrogation, rendition, and detention activities, but it will launch a formal criminal investigation into agency officials involved in the deaths of two detainees, Attorney General Eric Holder announced on Thursday. "The department has determined that an expanded criminal...

Senators, administration clash over Libya operations

June 28, 2011 The State Department's top legal adviser clashed with senators Tuesday over the Obama administration's legal reasoning for why it does not need congressional authorization to conduct military operations in Libya. "There is no good reason why President Obama has failed to seek congressional authorization to go to war in Libya,"...

Was U.S. intelligence on bin Laden off target?

May 16, 2011 Nearly two weeks after the daring U.S. raid that caught Osama bin Laden by lethal surprise at his compound in Pakistan, it remains unclear how much direct control he had over al-Qaida's operations, according to U.S. officials and terror experts. That, in turn, has raised questions about the accuracy of...

Trains a target for al Qaeda, DHS says

May 6, 2011 The terrorist group al Qaeda had considered a plot to attack U.S. trains on the 10th anniversary of the September 11 terrorist attacks, but there is no information pointing to an imminent threat against U.S. railroads, the Homeland Security Department said on Thursday. Details about the plot appeared to be...

Bin Laden found in room with guns, U.S. officials say

May 5, 2011 When special operations forces closed in on Osama bin Laden at his compound in Pakistan, they found him in a room with two guns, one of which was an AK-47 assault rifle, two lawmakers and a U.S. government official told National Journal on Wednesday. The administration has confirmed that bin...

Napolitano lashes out at border critics

April 1, 2011 Homeland Security Secretary Janet Napolitano on Friday criticized those who argue the nation's border with Mexico is being overrun with violence, saying some are trying to score "political points" but their rhetoric is damaging economic development in border towns. Apparently frustrated over continued criticism of the Obama administration, Napolitano gave...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.