AUTHOR ARCHIVES

Dashiell Bennett

Results 11-20 of 145

The CIA Didn't Trust Snowden, Even Back in 2009

October 11, 2013 FROM NEXTGOV arrow Edward Snowden had a negative report placed in his CIA personnel file more than four years ago, but that red flag wasn't enough to keep him out of the NSA's highly classified computer network. According to a report in Friday's The New York Times, while working as a CIA technician...

This Sad Kid at the Zoo Is Now the Defining Image of the Shutdown

October 10, 2013 We've all heard the tragic stories of the unintended consequences of the shutdown — cancer patients denied treatments; military families who can't bury loved ones; mothers who can't feed their babies — but none will probably spread as far and wide as this kid in a bear costume being locked...

Reports: Al-Qaeda Has Gone Quiet Since Surveillance Leaks

September 30, 2013 U.S. intelligence officials are complaining that recent news leaks of America's spying capabilities have severely undermined efforts to keep tabs on al-Qaeda. The New York Times reports Monday that unnamed officials claim the normal communications channels used by al-Qaeda's top operatives have gone silent in the two months, following a...

Navy Yard Responders Say Rescue Was Hampered by Bad Radios

September 20, 2013 FROM NEXTGOV arrow In the aftermath of this week's Navy Yard shooting, questions continue to be raised not just about shooter and his actions, but about the seemingly limited effectiveness of the first response. Several firefighters and police officers say that they had trouble communicating during the chaotic moments of the shooting, because...

Revealed: What U.S. Spy Agencies Spend Their Money On

August 29, 2013 A highly classified summary of nation's intelligence budget — leaked by Edward Snowden, of course — reveals that the CIA is still the biggest kid on the block when it comes to American spy agencies. Despite all the concern in recent months about the NSA's growing reach, our national eavesdropping...

Obama Has 'Grave Concerns,' but No Action Yet on Egypt and Syria

August 23, 2013 The U.S. military is reportedly re-thinking its options for possible strikes on Syria, but President Obama is still not committing the country to direct action against Bashar al-Assad's regime. In a wide-ranging interview broadcast on CNN this morning -- which covered everything from Egypt to his new dog -- Obama...

The CIA Laid Off the People Who Declassify Their Secrets

August 22, 2013 The Historical Collections Division is the office that catalogs the record of our nation's clandestine service and decides how much of it the American public gets to see -- and they all just lost their jobs because of the sequester. The Los Angeles Times reports that the mandated budget cuts...

Bradley Manning Sentenced to 35 Years in Prison

August 21, 2013 Bradley Manning, the U.S. Army private who gave thousands of classified documents to the website WikiLeaks has been given a 35-year prison sentence for giving away government secrets. Manning was convicted last month on charges of theft and violations of the Espionage Act, but was found not guilty of the...

A Chemical Weapons Attack in Syria May Have Killed Hundreds

August 21, 2013 Just days after U.N. inspectors arrived in Syria to investigate the possible use of chemical weapons, opposition activists allege that as many as 650 people have been killed in a poison gas attack. Two anti-Assad opposition groups say that a large rocket attack in Damascus on Wednesday morning was actually...

The Obamas Get a New Puppy

August 20, 2013 Bo Obama is still the top dog at 1600 Pennsylvania Avenue, but he does have some company now, thanks to the addition of his new "sister, Sunny. The White House announced yesterday that the First Family just bought a second Portuguese Water Dog, a one-year-old female that's the spitting image...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    View
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    View

When you download a report, your information may be shared with the underwriters of that document.