AUTHOR ARCHIVES

Conor Friedersdorf

Conor Friedersdorf is a staff writer at The Atlantic, where he focuses on politics and national affairs. He lives in Venice, California, and is the founding editor of The Best of Journalism, a newsletter devoted to exceptional nonfiction.
Results 11-20 of 145

All the Federal Agencies that Fly Drones over US Soil

March 11, 2016 FROM NEXTGOV arrow A little more than a decade ago, the border patrol started using surveillance drones. The technology and the mission were a perfect match, and few did any worrying—almost no one objects to closely monitoring America’s southern border. The belief that the federal government was using drones to conduct domestic surveillance...

The Rise of Federal Surveillance Drones in the U.S.

March 10, 2016 A little more than a decade ago the border patrol started using surveillance drones. The technology and the mission were a perfect match, and few did any worrying—almost no one objects to closely monitoring America’s southern border. The belief that the federal government was using drones to conduct domestic surveillance...

Let’s Talk About the Federal Drones Flying Over US Soil

March 10, 2016 A little more than a decade ago the border patrol started using surveillance drones. The technology and the mission were a perfect match, and few did any worrying—almost no one objects to closely monitoring America’s southern border. The belief that the federal government was using drones to conduct domestic surveillance...

Will Conservatives Mount a Third-Party Challenge If Trump Is the Nominee?

February 25, 2016 Last summer, Donald Trump scared movement conservatives and establishment Republicans—not because they thought that he would actually win the Republican nomination, but because they feared that, in defeat, he would refuse to support the Republican nominee. Back then, it was easy to imagine a general election pitting a Bush against...

What the FBI vs. Apple Encryption Fight Is Really About

February 18, 2016 FROM NEXTGOV arrow When software engineers at Apple designed the iPhone’s security features, they labored knowing that millions were relying on them to safeguard their privacy. Insofar as their efforts succeeded, they would stymie spying by jealous exes; stop hackers from emptying bank accounts; prevent blackmailers from stealing nude photos; and thwart authoritarian...

The Hawkeye State Sours on Hawkish Republicans

February 2, 2016 For the last three election cycles, Iowa Republicans have chosen among large fields of GOP candidates vying for the nomination of a party without a clear leader. Mike Huckabee won in 2008. Rick Santorum was victorious in 2012. And Monday, caucus-goers elevated another Christian who trumpets his faith. “To God...

Local Law Enforcement Wants Your License Plate Data

January 28, 2016 Throughout the United States—outside private houses, apartment complexes, shopping centers, and businesses with large employee parking lots—a private corporation, Vigilant Solutions, is taking photos of cars and trucks with its vast network of unobtrusive cameras. It retains location data on each of those pictures, and sells it. It’s happening right...

An Unprecedented Threat to Privacy

January 27, 2016 FROM NEXTGOV arrow Throughout the United States—outside private houses, apartment complexes, shopping centers and businesses with large employee parking lots—a private corporation, Vigilant Solutions, is taking photos of cars and trucks with its vast network of unobtrusive cameras. It retains location data on each of those pictures, and sells it. It’s happening right...

How Police Departments Can Evaluate Threats by Using an Algorithm

January 13, 2016 FROM NEXTGOV arrow When Tamir Rice was killed by police officers in Cleveland, Ohio, in 2014, some observers assigned a portion of the blame to a 911 dispatcher. She relayed a citizen’s concern that a black male was sitting on a park swing, pulling a gun from his waist band and pointing it...

Reciprocal Drug Approval Between the FDA and Europe Surfaces in the Presidential Race

December 18, 2015 A couple years ago, James Joyner, a professor at the Marine Corps Command and Staff College, shared a story about how his doctor advised him to treat a cataract. “My surgeon suggested that, if I were willing to wait a couple of months and were willing to pay a couple...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.