David McGlinchey

Results 21-30 of 406

Bush administration developing governmentwide personnel reform bill

June 7, 2005 The Bush administration has drafted a civil service reform bill that proposes governmentwide implementation of a new system based on reforms that are being implemented at the Defense and Homeland Security departments. The legislation is known as the 2005 Civil Service Modernization Act and a draft letter addressed to House...

FBI, Santa Fe police probe attack on Los Alamos employee

June 6, 2005 The FBI and the Santa Fe Police Department are conducting a joint investigation into an attack Sunday on a Los Alamos National Laboratory who has alleged financial impropriety at the facility, according to law enforcement officials. Tommy Hook, an auditor at Los Alamos National Laboratory, was assaulted and severely beaten...

Senators say base closing documents fall short

June 2, 2005 Two senators said Thursday that the Defense Department has not released all the documents that were used to develop the base realignment and closing recommendations. On Tuesday night, the Pentagon opened a secure room for lawmakers and congressional staffers with security clearances to view the BRAC documents. Defense Secretary Donald...

Enabling the Disabled

June 2, 2005 The House voted last week to speed up a reform that would give more compensation to about 29,000 military retirees who are too disabled to work. The move came in an amendment to the fiscal 2006 National Defense Authorization Act, which was passed May 25 by a vote of 390-39....

Pentagon targets Saturday for release of base closing information

June 1, 2005 Senior Defense officials said Wednesday that they hope to have all documentation used in the base realignment and closure process available to the public by June 4. A senior Republican senator protested the delay and argued that the Pentagon's postponement in releasing and declassifying key documents has prevented communities from...

Senators threaten to subpoena base closing documents

May 31, 2005 Two senators said Saturday that they plan to subpoena Defense Department documents on base realignment and closure recommendations if Pentagon officials do not hand them over willingly. Sen. Susan Collins, R-Maine, and Sen. Joseph Lieberman, D-Conn., the chairwoman and ranking member on the Senate Homeland Security and Governmental Affairs Committee,...

Northrop Grumman drops out of Los Alamos competition

May 27, 2005 A leading defense contractor announced Thursday that it will not compete for the contract to manage Los Alamos National Laboratory, leaving a field of only two prominent competitors. Northrop Grumman officials said they decided not to pursue the contract after the Energy Department issued its final request for proposals. That...

Senator wants $96 million restored to DHS management

May 26, 2005 A senior lawmaker called on his Senate colleagues Thursday to restore almost $100 million in House-ordered cuts to the Homeland Security Department's management programs. Sen. George Voinovich, R-Ohio, said the House had cut $96 million in funding for the DHS Office of the Undersecretary for Management, potentially endangering the implementation...

More Flexible?

May 26, 2005 The Treasury Department extended the "use it or lose it" deadline for Flexible Spending Accounts in the private sector last week and a federal workers union is calling on federal officials to do the same for the public service. Flexible Spending Accounts allow workers to put aside untaxed income for...

Homeland Security appeals for personnel funding

May 24, 2005 The Homeland Security Department asked Congress Tuesday to provide the entire $53 million that the Bush administration requested for implementation of the agency's new personnel system. Last week, in its version of the fiscal 2006 Homeland Security appropriations bill, the House voted to divert more than $26 million from the...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.