AUTHOR ARCHIVES

Results 11-20 of 54

The Government Is Spying on America with Drones, Too

June 20, 2013 FROM NEXTGOV arrow FBI director Robert Mueller said the government has used surveillance drones in the U.S. — though "in a very, very minimal way, very seldom" — at a Senate hearing on Wednesday. "It's very seldom used and generally used in a particular incident when you need the capability," Mueller said before...

Will Syria Be Obama's Fourth War?

June 14, 2013 Syria is being compared to a lot of things — Kosovo, Rwanda, Libya, Iraq — and the Obama administration is divided over which lessons should apply. Here's what President Obama will do for Syrian rebels: give them small arms and ammunition. Here's what he's considering: a no-fly zone along the...

Why Your Metadata Is Your Every Move

June 13, 2013 FROM NEXTGOV arrow The metadata that the National Security Agency collects on all calls in the U.S. is not just what's on a phone bill, as the program's supporters have claimed. Your phone bill lists some of the same things the NSA's collecting — numbers dialed, length of all — but does not...

Mike Morrell Says He's Quitting CIA for His Family (Not Benghazi), for 'Real'

June 13, 2013 Michael Morrell is retiring as deputy director of the CIA, and will be replaced by Avril Haines, the first woman to hold that job. Morrell spent 33 years at the CIA, and has served as acting CIA director twice, but says he wants to spend more time with his family....

Military Commanders Retain Powers in Sexual Assault Cases

June 12, 2013 Senate Armed Services Committee chair Carl Levin has killed a proposal that would have taken away military commanders' control in deciding whether to prosecute sexual assault cases and given it to an independent prosecutor. Sen. Kirsten Gillibrand championed the reform as a way to increase reporting and prosecution of sexual...

Romney Wishes Hurricane Sandy Hadn't Happened Because It Hurt His Chances

June 7, 2013 Mitt Romney has had seven months to think about why he lost the 2012 election, and now that he's coming out of his post-campaign dark period, you'd think he'd know exactly how to answer reporters' questions about what happened. But in a new interview with CNN's Gloria Borger, Romney showed...

Analysis: Obama's Trade Nominee's Cayman Bank Accounts

June 5, 2013 Another Romneyesque figure has been spotted in President Obama's administration. Michael Froman, nominated to be the U.S. trade representative, has about $500,000 in a Cayman Islands account, The New York Times' Jonathan Weisman reports. Froman, a former investment manager at Citigroup, also benefitted from the "carried interest" loophole that helped...

Millennials Don't Hate Big Government, but They Do Hate the GOP Economic Fix

June 4, 2013 The College National Republican Committee goes where the Republican National Committee wouldn't dare in its 2012 election autopsy -- they admit that it's not just the party's positions on gay marriage and abortion that repel young voters. It's the economic policy, too. The most eye-catching part of the College Republicans'...

Will Darrell Issa Finally Find His Benghazi Smoking Gun?

May 29, 2013 House Oversight Committee chair Darrell Issa has made up his mind about what happened within the Obama administration as it crafted talking points about Benghazi last September. He just can't quite prove it. So on Tuesday, Issa subpoenaed all the Benghazi talking points-related emails from 10 State Department aides, because...

Analysis: A Global War on Terror by Another Name Doesn't Tell Us How to Succeed

May 23, 2013 President Obama rejected the Bush-era term Global War on Terrorism in a major speech justifying and announcing changes to his counterterrorism policies at the National Defense University on Thursday. "Beyond Afghanistan, we must define our effort not as a boundless 'global war on terror' — but rather as a series...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.