Results 141-150 of 197

Terrorist-tracking tools

September 10, 2002 A controversial Defense Department counterterrorism office created this year is moving ahead with plans to create terrorist-catching technologies, amid concerns raised by civil-liberties groups about the office's mission and its leader. The Information Awareness Office-within the Defense Advanced Research Projects Agency, the Pentagon's high-tech idea factory-was created in February to...

Pentagon restrictions on wireless devices expected soon

August 16, 2002 The Defense Department is expected to finalize its new policies restricting military use of wireless devices next week, a department spokesman said Friday. "There's no question it's going to happen," the spokesman said. "I would expect it sometime next week" when Pentagon Chief Information Officer John Stenbit returns from leave....

Top Army lab seeks support for crisis response system

August 8, 2002 Experts agree that everyone responding to a terrorist threat, from firefighters to military commanders, needs to be on the same communications page before and when crisis hits. And a military officer at a top Army communications research laboratory is on a mission to see that it happens. Major Shawn Hollingsworth,...

Canada's military gets in step with United States

August 7, 2002 Canada is escalating the technology focus of its military, reflecting the goal of transformation for the U.S. armed forces. "The world has changed significantly over the past decade," says the new 2001-2002 annual report of Canada's Chief of the Defense Staff. Citing "different" potential threats, such as those to critical...

Trade bill includes billions for border security technology

August 1, 2002 The bill to renew presidential trade-negotiating authority passed by the Senate Thursday includes billions of dollars earmarked for new border security technologies and contains explicit negotiating objectives on e-commerce and services. The Senate passed the bill, H.R. 3009, by a vote of 64-34. Sections of the bill that would reauthorize...

Key tech provisions included in House, Senate security bills

July 29, 2002 The high-tech industry may get what it wished for in the proposed Homeland Security Department, as most of its top priorities have been included in the bills now before Congress. The House passed its homeland security bill, H.R. 5005, on Friday by a margin of 295-132. The Senate will try...

Broadband guardians

July 23, 2002 To help protect American soil against terrorist attacks, officials say, the country needs a high-speed computerized network that is reliable and secure, and lets systems at all levels of government communicate with one another and work together. But before the government begins building one from scratch, the National Guard would...

House panel adds tech position, research centers to security bill

July 19, 2002 The House Select Homeland Security Committee on Friday voted to add a position of special assistant to the secretary to the proposed Homeland Security Department to serve as a liaison with the private sector. The committee also voted to establish a network of university centers for research and development but...

House homeland bill adds tech position, blocks cybersecurity transfer

July 18, 2002 The version of a bill to establish a Homeland Security Department generated Thursday by the House committee overseeing the legislation's development includes several key provisions sought by the House Science Committee. As amended by the House Select Homeland Security Committee, the draft bill, would add the position of undersecretary for...

House chair seeks to trim undersecretaries in homeland proposal

July 16, 2002 House Majority Leader Dick Armey, R-Texas, on Tuesday indicated that the House Select Committee on Homeland Security would object to the addition of an undersecretary of science and technology in the new Homeland Security Department. "We have to look at all of the proposals for undersecretaries," Armey, R-Texas, said when...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.