AUTHOR ARCHIVES

Results 101-110 of 614

Watch list dispute highlights U.S.-Canadian tensions

February 27, 2007 The U.S. government believes that Maher Arar, a Canadian telecommunications engineer, has ties to terrorists, and it has placed his name on a U.S. watch list that bars him from entering the country. That alone would be unremarkable because U.S. watch lists contain thousands of names -- except that the...

Expansion of local intelligence-sharing centers sparks controversy

February 13, 2007 To bolster homeland security, Democratic lawmakers want state and local governments to expand their intelligence-gathering, a goal supported by the Bush administration but one that some civil libertarians and privacy advocates say borders on domestic spying. As part of the Democrats' first-100-hours legislative push, the House passed a bill that...

Guarding Turf

February 7, 2007 Among the many management challenges that Defense Secretary Robert Gates has inherited -- besides the Iraq war -- is what to do about his predecessor's predilection for turf poaching. Under Donald Rumsfeld, Special Operations forces and defense components stepped up their intelligence efforts, particularly through covert actions abroad aimed at...

ADVICE+DISSENT: Intelligence File Guarding Turf

February 1, 2007 As Defense secretary, will Robert Gates put the CIA back on track? Among the many management challenges that Defense Secretary Robert Gates has inherited-besides the Iraq war-is what to do about his predecessor's predilection for turf poaching. Under Donald Rumsfeld, Special Operations forces and defense components stepped up their intelligence...

Career officials hope new chiefs will stabilize spy agencies

January 12, 2007 The graybeards of spycraft are smiling: After two years of turnover and uncertainty in the top ranks of the U.S. intelligence establishment, which saw such outsiders as a former congressman and a career ambassador elevated to high posts, four of their own are now in control or soon will be....

ADVICE+DISSENT: Intelligence File The British Are Coming!

January 1, 2007 Intelligence firm picks up former CIA chief George Tenet on its march into the U.S. market. In October, George Tenet, the last director of central intelligence, emerged from his mostly quiet retirement to announce he had accepted a new job. The British defense and intelligence firm QinetiQ (pronounced kin-ET-ic) snatched...

Chertoff discusses goals, responds to critics

December 20, 2006 In February 2005, Michael Chertoff stepped down from a lifetime appointment to the federal bench to lead one of the most far-flung and disjointed bureaucracies in the federal government. Only six months into the job, Hurricane Katrina put the Homeland Security Department's disaster planning and response mission to the test...

Worldly View

December 20, 2006 In 2004, Internet giant Google made John Hanke an offer he couldn't refuse. The Silicon Valley video game entrepreneur had built a software program called Keyhole, which let users "fly over" 3-D maps of points on the globe. Google bought Keyhole -- for an undisclosed sum -- hired Hanke, and...

Chertoff: Traveler screening program wasn't a secret

December 8, 2006 Homeland Security Secretary Michael Chertoff says it should not surprise people that for years his department has searched for terrorists among tens of millions of airline passengers, cross-checking travelers' personal data against terrorist watch lists and analyzing them for potential terrorist activity. "I've talked about the collection of this data...

ADVICE+DISSENT: Intelligence File Worldly View

December 1, 2006 Geospatial agency shifts with the times: buys images, gives them away. In 2004, Internet giant Google made John Hanke an offer he couldn't refuse. The Silicon Valley video game entrepreneur had built a software program called Keyhole, which let users "fly over" 3-D maps of points on the globe. Google...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.