Results 11-20 of 1314

As Qaddafi's government comes apart, new concerns for U.S.

August 22, 2011 While rebels in Libya took over the streets of Tripoli and declared an end to the rule of Muammar el-Qaddafi, major questions quickly need to be answered in the coming hours and days, including what kind of transitional government comes next and whether an international peacekeeping force should be sent...

Senate panel cuts more than $500 million from spy operations

August 3, 2011 More than $500 million would be cut from the CIA and other U.S. intelligence agencies under a bill authorizing programs and spending for spying operations next year, a key senator and congressional aides said. The fiscal 2012 intelligence authorization bill would reduce intelligence spending by about 1 percent -- about...

Soldier charged in bomb plot targeting Fort Hood personnel

July 29, 2011 The U.S. soldier arrested in Texas on Thursday planned to make two bombs using gun powder and shrapnel packed in pressure cookers to detonate inside a restaurant frequented by soldiers from Fort Hood, according to the Justice Department. Pfc. Naser Jason Abdo was charged on Friday with possession of an...

Senate confirms Mueller to head FBI for two more years

July 27, 2011 The Senate voted 100-0 on Wednesday to confirm Robert Mueller to remain as director of the FBI for two more years. President Obama had previously requested that Mueller's term be extended for two years in order to help ensure continuity in his national-security team. Mueller had been under a 10-year...

Justice to drop investigations into CIA officials involved in torture

June 30, 2011 The Justice Department will end a wide-ranging probe into the CIA's past interrogation, rendition, and detention activities, but it will launch a formal criminal investigation into agency officials involved in the deaths of two detainees, Attorney General Eric Holder announced on Thursday. "The department has determined that an expanded criminal...

Senators, administration clash over Libya operations

June 28, 2011 The State Department's top legal adviser clashed with senators Tuesday over the Obama administration's legal reasoning for why it does not need congressional authorization to conduct military operations in Libya. "There is no good reason why President Obama has failed to seek congressional authorization to go to war in Libya,"...

Was U.S. intelligence on bin Laden off target?

May 16, 2011 Nearly two weeks after the daring U.S. raid that caught Osama bin Laden by lethal surprise at his compound in Pakistan, it remains unclear how much direct control he had over al-Qaida's operations, according to U.S. officials and terror experts. That, in turn, has raised questions about the accuracy of...

Trains a target for al Qaeda, DHS says

May 6, 2011 The terrorist group al Qaeda had considered a plot to attack U.S. trains on the 10th anniversary of the September 11 terrorist attacks, but there is no information pointing to an imminent threat against U.S. railroads, the Homeland Security Department said on Thursday. Details about the plot appeared to be...

Bin Laden found in room with guns, U.S. officials say

May 5, 2011 When special operations forces closed in on Osama bin Laden at his compound in Pakistan, they found him in a room with two guns, one of which was an AK-47 assault rifle, two lawmakers and a U.S. government official told National Journal on Wednesday. The administration has confirmed that bin...

Napolitano lashes out at border critics

April 1, 2011 Homeland Security Secretary Janet Napolitano on Friday criticized those who argue the nation's border with Mexico is being overrun with violence, saying some are trying to score "political points" but their rhetoric is damaging economic development in border towns. Apparently frustrated over continued criticism of the Obama administration, Napolitano gave...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.