Results 141-150 of 197

Terrorist-tracking tools

September 10, 2002 A controversial Defense Department counterterrorism office created this year is moving ahead with plans to create terrorist-catching technologies, amid concerns raised by civil-liberties groups about the office's mission and its leader. The Information Awareness Office-within the Defense Advanced Research Projects Agency, the Pentagon's high-tech idea factory-was created in February to...

Pentagon restrictions on wireless devices expected soon

August 16, 2002 The Defense Department is expected to finalize its new policies restricting military use of wireless devices next week, a department spokesman said Friday. "There's no question it's going to happen," the spokesman said. "I would expect it sometime next week" when Pentagon Chief Information Officer John Stenbit returns from leave....

Top Army lab seeks support for crisis response system

August 8, 2002 Experts agree that everyone responding to a terrorist threat, from firefighters to military commanders, needs to be on the same communications page before and when crisis hits. And a military officer at a top Army communications research laboratory is on a mission to see that it happens. Major Shawn Hollingsworth,...

Canada's military gets in step with United States

August 7, 2002 Canada is escalating the technology focus of its military, reflecting the goal of transformation for the U.S. armed forces. "The world has changed significantly over the past decade," says the new 2001-2002 annual report of Canada's Chief of the Defense Staff. Citing "different" potential threats, such as those to critical...

Trade bill includes billions for border security technology

August 1, 2002 The bill to renew presidential trade-negotiating authority passed by the Senate Thursday includes billions of dollars earmarked for new border security technologies and contains explicit negotiating objectives on e-commerce and services. The Senate passed the bill, H.R. 3009, by a vote of 64-34. Sections of the bill that would reauthorize...

Key tech provisions included in House, Senate security bills

July 29, 2002 The high-tech industry may get what it wished for in the proposed Homeland Security Department, as most of its top priorities have been included in the bills now before Congress. The House passed its homeland security bill, H.R. 5005, on Friday by a margin of 295-132. The Senate will try...

Broadband guardians

July 23, 2002 To help protect American soil against terrorist attacks, officials say, the country needs a high-speed computerized network that is reliable and secure, and lets systems at all levels of government communicate with one another and work together. But before the government begins building one from scratch, the National Guard would...

House panel adds tech position, research centers to security bill

July 19, 2002 The House Select Homeland Security Committee on Friday voted to add a position of special assistant to the secretary to the proposed Homeland Security Department to serve as a liaison with the private sector. The committee also voted to establish a network of university centers for research and development but...

House homeland bill adds tech position, blocks cybersecurity transfer

July 18, 2002 The version of a bill to establish a Homeland Security Department generated Thursday by the House committee overseeing the legislation's development includes several key provisions sought by the House Science Committee. As amended by the House Select Homeland Security Committee, the draft bill, would add the position of undersecretary for...

House chair seeks to trim undersecretaries in homeland proposal

July 16, 2002 House Majority Leader Dick Armey, R-Texas, on Tuesday indicated that the House Select Committee on Homeland Security would object to the addition of an undersecretary of science and technology in the new Homeland Security Department. "We have to look at all of the proposals for undersecretaries," Armey, R-Texas, said when...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.