AUTHOR ARCHIVES

Results 51-60 of 614

ADVICE+DISSENT: Intelligence File Pulling Them In

November 1, 2008 How can the next president keep the intelligence community vital? By the time you're reading this, we'll all know-or soon will know-who is the 44th president of the United States. And barring any unforeseen catastrophes, on Jan. 20, 2009, power will transition to the next administration. The new president must...

Officials worry about safety of financial data

October 17, 2008 Not that we need it, but here's yet another reason to worry about havoc in financial markets: U.S. intelligence officials increasingly fear that computer hackers could wreck banks and large financial institutions, or send stock markets into one more panicked frenzy, by covertly manipulating data and spreading false information. In...

Surveillance powers unlikely to change with new president

October 9, 2008 Editor's note: This article is excerpted from a National Journal story exploring how much of a difference the next president will be able to make in a number of policy areas. GOP presidential candidate John McCain believes that the collection of foreign intelligence is an inalienable presidential authority. He hasn't...

ADVICE+DISSENT: Intelligence File Set in Stone

October 1, 2008 As the Bush era winds down, spy masters leave their mark. As the curtain falls on the George W. Bush administration, the president and the top leaders of the intelligence community have turned their attention to legacy. In July, Bush amended Executive Order 12333, which has served as the guidebook...

ADVICE+DISSENT: Intelligence File Ghosts of Iran

September 1, 2008 Is a covert policy in Iran doomed to fail? Next to Iraq, the administration and its would-be successors face no greater foreign policy dilemma than what to do about Iran-its suspected nuclear weapons program, its support for terrorists and its influence in Iraq, for starters. These issues loom large on...

FAA system failure grounds hundreds of flights

August 26, 2008 FROM NEXTGOV arrow DENVER, Co. - The Federal Aviation Administration's National Airspace Data Interchange Network, which logs flight plans nationwide, experienced a serious system error on Tuesday, grounding hundreds of flights on the East Coast and in the Midwest. Comment on this article in The Forum."It appears to be an internal software processing...

FAA system failure grounds hundreds of flights

August 26, 2008 DENVER, Co.--The Federal Aviation Administration's National Airspace Data Interchange Network, which logs flight plans nationwide, experienced a serious system error on Tuesday, grounding hundreds of flights on the East Coast and in the Midwest. "It appears to be an internal software processing error, but we're going to have to do...

ADVICE+DISSENT: Intelligence File Tight-Lipped

August 1, 2008 In the fog of cyberspace, there is no security in silence. You might imagine that headlines such as these would illicit public outrage from the Bush administration and maybe even a call for U.N. sanctions: "Chinese spies stole U.S. trade secretary data" "Lawmakers say Capitol computers hacked by Chinese" "Olympic...

National security observers explain FISA ins and outs

July 21, 2008 The amendments to the Foreign Intelligence Surveillance Act that President Bush signed on July 10 may be the most significant rewrite of the government's spying powers in a generation. But you might not know that from reading the legislation. It is a dense, often opaque, and patchworked set of new...

ADVICE+DISSENT: Intelligence File Mike on Mike

July 1, 2008 The "silent" DNI is not afraid to talk about himself. Mike McConnell, the director of national intelligence, likes to remind people that his is a secret profession. When it comes to the job, he plays things close to the vest. But when given the chance to talk about himself in...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.