AUTHOR ARCHIVES

Adam Clark Estes

Results 1-10 of 94

The Space Station is Leaking Vital Fluid

May 10, 2013 FROM NEXTGOV arrow If there's any phrase an astronaut never wants to mutter, it's "Houston, we have a problem." Calling from the International Space Station on Thursday evening, Commander Chris Hadfield did just that. Well, he didn't actually quote that excellent Tom Hanks movie, but he did make a distressing call down to...

Are You Ready to Pay for YouTube?

May 6, 2013 FROM NEXTGOV arrow The Financial Times reports that the long-rumored paid subscription model is coming to YouTube as early as this week. The strategy will help YouTube compete not only with other online outlets like Netflix and Hulu but also with major networks like CBS. However, it's also a sea change in the...

UN Sources Say Syrian Rebels — Not Assad — Used Sarin Gas

May 6, 2013 A member of the United Nations commission of inquiry announced on a Swiss-Italian television show that they believe the Syrian rebels have used chemical weapons on Assad's troops. "Our investigators have been in neighboring countries interviewing victims, doctors and field hospitals and, according to their report of last week which...

Before Boston, the Tsarnaev Brothers Planned a Fourth of July Attack

May 3, 2013 As more details of Dzhokhar Tsarnaev's bedside interrogation leak out, we learned on Thursday night that the brothers originally planned a Fourth of July attack but built their bomb too quickly, leading them to consider another target. An information-rich and just published New York Time spiece explains a series of...

Twitter Tells News Organizations to Expect Even More Hacks in the Future

April 30, 2013 FROM NEXTGOV arrow A little less than a week after a hacked Associated Press account reported a non-existent bombing at the White House, Twitter decided it was time to comfort journalists by warning them that they should expect to get hacked. "We believe that these attacks will continue, and that news and media...

The CIA Gave Karzai Bags Full of Cash for Over a Decade

April 29, 2013 Afghan president Hamid Karzai has a sugar daddy, and its name is the Central Intelligence Agency. Or at least it had a sugar daddy. For over ten years, American spies greased Karzai's palms about once a month with suitcases, backpacks and even plastic grocery bags full of cash. And not...

CISPA Is Dead, Long Live CISPA

April 26, 2013 FROM NEXTGOV arrow After stirring up trouble for months, the Cyber Intelligence Sharing and Protection Act died a quiet death in the Senate on Thursday. Despite the bill's passage in the House, Senators decided to pigeonhole the legislation. It was not necessarily a surprising move for the upper chamber, especially given the fact...

Senate Passes Bill to End FAA Furloughs Just in Time to Fly Home

April 25, 2013 In a marathon session before a weeklong recess, Senators finally found a way to agree on something Thursday night, when they passed a bill to end flight controller furloughs. Thanks to the sequester, the Federal Aviation Administration has to figure out a way to save $637 million before Sept. 30,...

CIA Added Tamerlan Tsarnaev to a Terrorist Watchlist 18 Months Ago

April 25, 2013 The U.S. intelligence committee is already contradicting itself as the investigation into the Boston bombing unfolds. Turns out the CIA knew about one of the Tsarnaev brothers after all. In fact, the sleuths in Langley added Tamerlan Tsarnaev to a watchlist a full 18 months before the attack on the...

Good Timing: Twitter Will Soon Release a Two-Step Security Solution

April 24, 2013 FROM NEXTGOV arrow Some Twitter employee — probably several employees, actually — had a pretty rough day on Tuesday, after a hack led to the AP sending a fake tweet to its 2 million followers. If only the hacker had waited, Twitter could've stopped them! Minutes before appearing on the Rachel Maddow Show...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    View
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    View

When you download a report, your information may be shared with the underwriters of that document.