AUTHOR ARCHIVES

Katherine McIntire Peters

Deputy Editor Katherine is deputy editor of Government Executive Media Group, a division of Atlantic Media, where she oversees editorial coverage for GovExec.com and Government Executive magazine. She previously was executive editor of Nextgov.
Results 971-980 of 1046

Reaching Out

March 1, 1999 kpeters@govexec.com any of the more than 13,000 people who have studied at the Marshall Center since 1948 have since assumed influential positions in their countries' governments. The center is having a profound effect on the emerging democracies of Eastern Europe and Central Asia, Defense officials say. Mission To serve as...

Defensive Diplomacy

March 1, 1999 kpeters@govexec.com armisch-Partenkirchen, Germany, seems an unlikely place for a revolution. The postcard-perfect Alpine village near the border with Austria is better known among sports enthusiasts than among politicos. But a military education center here, established after the breakup of the Soviet Union, is quietly stoking the fires of democracy across...

Money Matters

February 1, 1999 n 1997, for the first time ever, the federal government produced a consolidated, governmentwide financial statement. Or rather, it tried to. It turned out that most of the financial data reported by agencies was so unreliable the statement could not be audited by the General Accounting Office. Among other problems,...

A Matter of Trust

January 1, 1999 kpeters@govexec.com "Gentlemen, the credibility gap between you and Congress is as wide as the Grand Canyon." -Sen. John McCain, R-Ariz. cCain spoke those words in October 1996. He was addressing then-Secretary of Defense William Perry and then-Chairman of the Joint Chiefs of Staff Gen. John Shalikashvili. Perry and Shalikashvili had...

Many Threats Yield Many Programs

December 1, 1998 kpeters@govexec.com he Ballistic Missile Defense Organization is pursuing both land- and sea-based systems to effectively counter missile threats both overseas and to the continental United States. "The threat is so varied, and the mission demands so complex, that we do not currently have the technology to allow us to develop...

Rush to Failure

December 1, 1998 kpeters@govexec.com he deployment of U.S. troops to the Persian Gulf in 1991 to force Iraq out of Kuwait was a wake-up call for military planners. The vulnerability of soldiers to Iraqi Scud missiles demonstrated the critical need for a missile defense system capable of defending large areas by intercepting and...

Incoming!

December 1, 1998 kpeters@govexec.com n July 15, the bipartisan Commission to Assess the Ballistic Missile Threat to the United States delivered a sobering report to Congress. The threat of missile attack "is broader, more mature and evolving more rapidly" than has been reported by the intelligence community, the commission concluded. What's more, the...

A House Divided

November 1, 1998 kpeters@govexec.com n the past five years, the Immigration and Naturalization Service has received what most federal agencies can only dream of: a doubling of its budget and a huge influx personnel. But money and more staff, it turns out, haven't solved the agency's problem--a split personality. The INS is legally...

DoD civilian education strives for higher grade

October 5, 1998 kpeters@govexec.com The Defense Department's civilian education program got a boost Friday when Defense Secretary William Cohen swore in Jerome F. Smith to become chancellor for education and professional development. The selection of the chancellor fulfills a key recommendation in the Defense Reform Initiative report released last November. The job was...

Doing More With Less, Again

August 15, 1998 kpeters@govexec.com n the last 10 years, American troops have been deployed overseas for 10 major operations-as many as in the previous 30 years. Of the troops that were sent on those deployments, 70 percent came from the Army. And yet the Army consumes only 24 percent of the Defense budget....

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    View
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    View

When you download a report, your information may be shared with the underwriters of that document.