AUTHOR ARCHIVES

Results 51-60 of 614

ADVICE+DISSENT: Intelligence File Pulling Them In

November 1, 2008 How can the next president keep the intelligence community vital? By the time you're reading this, we'll all know-or soon will know-who is the 44th president of the United States. And barring any unforeseen catastrophes, on Jan. 20, 2009, power will transition to the next administration. The new president must...

Officials worry about safety of financial data

October 17, 2008 Not that we need it, but here's yet another reason to worry about havoc in financial markets: U.S. intelligence officials increasingly fear that computer hackers could wreck banks and large financial institutions, or send stock markets into one more panicked frenzy, by covertly manipulating data and spreading false information. In...

Surveillance powers unlikely to change with new president

October 9, 2008 Editor's note: This article is excerpted from a National Journal story exploring how much of a difference the next president will be able to make in a number of policy areas. GOP presidential candidate John McCain believes that the collection of foreign intelligence is an inalienable presidential authority. He hasn't...

ADVICE+DISSENT: Intelligence File Set in Stone

October 1, 2008 As the Bush era winds down, spy masters leave their mark. As the curtain falls on the George W. Bush administration, the president and the top leaders of the intelligence community have turned their attention to legacy. In July, Bush amended Executive Order 12333, which has served as the guidebook...

ADVICE+DISSENT: Intelligence File Ghosts of Iran

September 1, 2008 Is a covert policy in Iran doomed to fail? Next to Iraq, the administration and its would-be successors face no greater foreign policy dilemma than what to do about Iran-its suspected nuclear weapons program, its support for terrorists and its influence in Iraq, for starters. These issues loom large on...

FAA system failure grounds hundreds of flights

August 26, 2008 FROM NEXTGOV arrow DENVER, Co. - The Federal Aviation Administration's National Airspace Data Interchange Network, which logs flight plans nationwide, experienced a serious system error on Tuesday, grounding hundreds of flights on the East Coast and in the Midwest. Comment on this article in The Forum."It appears to be an internal software processing...

FAA system failure grounds hundreds of flights

August 26, 2008 DENVER, Co.--The Federal Aviation Administration's National Airspace Data Interchange Network, which logs flight plans nationwide, experienced a serious system error on Tuesday, grounding hundreds of flights on the East Coast and in the Midwest. "It appears to be an internal software processing error, but we're going to have to do...

ADVICE+DISSENT: Intelligence File Tight-Lipped

August 1, 2008 In the fog of cyberspace, there is no security in silence. You might imagine that headlines such as these would illicit public outrage from the Bush administration and maybe even a call for U.N. sanctions: "Chinese spies stole U.S. trade secretary data" "Lawmakers say Capitol computers hacked by Chinese" "Olympic...

National security observers explain FISA ins and outs

July 21, 2008 The amendments to the Foreign Intelligence Surveillance Act that President Bush signed on July 10 may be the most significant rewrite of the government's spying powers in a generation. But you might not know that from reading the legislation. It is a dense, often opaque, and patchworked set of new...

ADVICE+DISSENT: Intelligence File Mike on Mike

July 1, 2008 The "silent" DNI is not afraid to talk about himself. Mike McConnell, the director of national intelligence, likes to remind people that his is a secret profession. When it comes to the job, he plays things close to the vest. But when given the chance to talk about himself in...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.