AUTHOR ARCHIVES

Results 81-90 of 614

Bearing Witness

August 1, 2007 Endangered villages in Darfur are protected by powerful, and relatively inexpensive, intelligence. From above, Malam al Hosh in North Darfur looks almost indistinguishable from the vast, seemingly desolate terrain surrounding it. Satellite images reveal formations that, at first, appear to be outcroppings of boulders. But look closer and you see...

Chain of Command

July 15, 2007 Did George Tenet fail the president, or just do his job? Weeks before the Sept. 11 attacks, George Tenet, then the director of Central Intelligence, was convinced that al Qaeda had planned an imminent strike on the United States, and that President Bush should authorize the CIA to take covert...

Languishing Linguists

July 1, 2007 Why can't 2,000 Arabic speakers get jobs with an intelligence agency? When Evan Lesser hears officials lament the lack of skilled linguists in the intelligence community, he gets frustrated. That's because he knows where to find about 2,000 Arabic speakers, 475 who can speak Farsi and another 250 or so...

TB incident highlights gaps in response to irrational behavior

June 18, 2007 As details emerge in the case of Andrew Speaker, the 31-year-old runaway groom with a drug-resistant strain of tuberculosis, more questions arise about whether the nation's defenses against biological agents, as well as terrorists, are in proper working order, and whether health and homeland-security officials have truly adapted to the...

ADVICE+DISSENT: Intelligence File The Contractor Conundrum

June 15, 2007 Intelligence agencies won't say how many contractors they've hired. But we'll give it a shot. The Office of the Director of National Intelligence has finished an unprecedented head count of contract employees working for the 16 spy agencies. The timing could hardly be better, given congressional uproar over outsourcing analysts,...

Homeland Security could face transition problem

June 1, 2007 On November 2, 2004, top officials from the Homeland Security Department held a small Election Night party at a Washington restaurant to watch the presidential election returns come in on television. Nearly every leader there owed his job to the man then fighting for his own job -- George W....

ADVICE+DISSENT: Intelligence File Too Close to Home

June 1, 2007 Agencies' reluctance to spy on Americans is largely a management issue. Since journalists revealed in December 2005 that the National Security Agency has eavesdropped on phone calls and e-mails inside the United States without the customary court-issued warrants, the public debate over domestic spying has centered on ethics and the...

Gimme an S-P-Y

May 30, 2007 There's a reason intelligence is called a "silent service." Spies tend to shy away from the limelight. Not that they're shrinking violets -- hardly. But in a trade that's marked by slyness, subterfuge and occasional skullduggery, publicity is something generally best avoided. Which is why the Intelligence and National Security...

ADVICE+DISSENT: Intelligence File Gimme an S-P-Y

May 15, 2007 Intelligence cheerleaders promote solidarity in the field. There's a reason intelligence is called a "silent service." Spies tend to shy away from the limelight. Not that they're shrinking violets-hardly. But in a trade that's marked by slyness, subterfuge and occasional skullduggery, publicity is something generally best avoided. Which is why...

L.A.’s anti-terrorism hub serves as a model

May 2, 2007 It started with a phone call. On April 23, 2004, a Friday, a man calling himself "Al" contacted the Homeland Security Department in Washington. He claimed that he knew a group of terrorists who were going to blow up a building. Al knew this, he said, because he was once...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.