Results 71-80 of 197

Data sharing deemed critical to tracking terrorist cash

September 24, 2003 A panel of federal officials on Wednesday told a House subcommittee that information sharing is critical to the reduction of funding to terrorists and said improvements have been made in the area since the terrorist attacks on the United States two years ago. But an FBI official said law enforcement...

Law enforcement official says threat center could be permanent

September 23, 2003 Three top federal law enforcement officials on Tuesday defended the evolving process the government is using to analyze and share information about terrorist activities. The officials testified before the Senate Judiciary Immigration and Border Security Subcommittee. John Brennan, director of the Terrorist Threat Integration Center (TTIC), said a TTIC Web...

Federal officials detail response to August blackout

September 17, 2003 As the East Coast braced for a high-powered hurricane, House lawmakers on Wednesday heard from federal critical infrastructure experts on what happened during the August power outage in parts of the United States and Canada. Robert Liscouski, the Homeland Security Department's assistant secretary for infrastructure protection, described how his directorate...

National 'cyber summit' planned to aid federal outreach

September 16, 2003 The Homeland Security Department is planning to hold a national "cyber summit" this fall to address shortcomings in outreach efforts to state and local governments and the private sector on improving cybersecurity practices. "That's where much of our work has to be done yet," Robert Liscouski, the department's assistant secretary...

Commerce under pressure to clean up giant Web database

September 12, 2003 A little-known global database of Web site owners has grown into a significant worldwide cyber-crime tracking device-and a major source of concern to privacy advocates and foreign governments. Despite its growing importance, the so-called "Whois" data is plagued with inaccuracies, as well as technical, legal, and ethical problems. The Commerce...

House chairman favors temporary terrorist-threat center

September 5, 2003 The new Terrorist Threat Integration Center (TTIC) for compiling terrorism information from various agencies must be temporary if the Homeland Security Department is not to violate its statutory requirements, the chairman of a congressional oversight committee said on Friday. "It's very plain if one reads the act [establishing the department]...

'Open source' software trend faces barriers

August 25, 2003 Federal, state and local governments around the world are catching "open source" fever, purchasing software that lets them view and modify source code as opposed to proprietary software such as that made by Microsoft. But whether the global trend will continue may depend upon new and old factors that could...

Information technology permeates Defense appropriations bills

August 22, 2003 The Defense Department appropriations bills passed by Congress are peppered with references to information technology programs. Defense appropriations eclipse all other agencies in the federal government. The White House requested $372 billion overall; the House provided $369 billion, the Senate $386.6 billion. The House offered $27.6 billion for information technology,...

Proposals for Homeland Security include similar science, tech figures

August 18, 2003 The congressional proposals for funding of science and technology initiatives for the Homeland Security Department in fiscal 2004 are largely aligned, according to the Appropriations Committee reports from the House and Senate. The House version of the bill, H.R. 2555, would provide $900.4 million for science and technology, including $35...

Congress lowers funding for intelligence, cybersecurity

August 15, 2003 The House and Senate showed a reluctance to fully fund the White House's budget request for Homeland Security Department's work on intelligence and infrastructure protection in legislation that would fund the department for fiscal 2004. "The committee is aware of the recent and rapid stand-up of the information analysis and...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.