AUTHOR ARCHIVES

Connor Simpson

Results 31-40 of 107

Assad Presents His Defense Against the U.S.

September 9, 2013 Syrian President Bashar al Assad defended himself publicly to the United States in an interview with Charlie Rose, claiming that the U.S. doesn't have "a single shred" of evidence tying him to the August 21 chemical attacks, and that we should "expect every action" in retaliation if the United States...

The State Department Will Send Someone to North Korea to Rescue Kenneth Bae

August 28, 2013 For the first time in two years, the State Department is sending an official representative to North Korea in an attempt to broker the release of jailed American citizen Kenneth Bae. Bob King, the special envoy for North Korean human rights issues, will make the trip on Friday. He'll ask...

NSA Bugs United Nations With Enthusiasm, Documents Suggest

August 26, 2013 The U.S. National Security Agency is accused of bugging the United Nations' New York headquarters, along with the European Union and the U.N.'s nuclear watchdog, last summer, according to documentsreleased by Edward Snowden to Germany's Der Spiegel. NSA agents could hardly contain their excitement after getting access to the U.N....

Intercepted Al Qaeda Conference Call Triggered U.S. Embassy Closures

August 7, 2013 FROM NEXTGOV arrow The continued closure of embassies and the travel alerts across the Middle East was apparently prompted not by a simple conversation between two top Al Qaeda leaders, but by an intercepted conference call between top leadership and affiliates across the region. That's been followed by a noticeable uptick in drone...

The President Blocks an Apple Sales Ban at the Last Minute

August 5, 2013 FROM NEXTGOV arrow The Wall Street Journal reports the administration just awarded Apple with a significant victory in their patent war with Samsung. A looming sales ban on older generations of iPhones and iPads wasblocked by the White House, Apple's only hope, at the last minute. The International Trade Commission ruled at the...

The Internet Made the Military Stop Selling Playboy

July 31, 2013 The military will finally stop selling nudie magazines at on-post shops run by the Army and Air Force Exchange Service after years and years of protest, but only because soldiers are moving to the millions of free porn site on the Internet, or to soliciting real, live sex on Craigslist,...

Jack Lew: No Debt Limit Fight This Fall

July 29, 2013 Treasury Secretary Jack Lew did a tour of four major Sunday shows this morning, hitting up NBC's Meet the Press, Fox News Sunday, ABC's This Week and CNN's State of the Union all in one weekend. Obviously Lew touched on a lot over the course of the morning, so we've...

What to Expect from the President's Big Climate Change Speech

June 24, 2013 On Tuesday, President Obama will use a speech at Georgetown University to announce new, sweeping executive orders addressing climate change that will be designed to appease critics who have attacked the President for talking the green talk and not walking the green walk. Obviously, the White House is also hoping...

Not so Fast, Google: the FTC Wants to Review That Waze Deal

June 24, 2013 FROM NEXTGOV arrow Google's billion dollar deal for Waze was a win, with Apple and Facebook left behind, but the excitement at Google's Santa Clara headquarters will be put on hold while the Federal Trade Commission takes a good, long look at the deal. The New York Post reported the FTC would be...

Why Edward Snowden Leaked the Secret NSA Information

June 10, 2013 The Guardian has revealed the identity of the man who leaked information about the NSA's surveillance programs, PRISM and Boundless Informant. Meet Edward Snowden, a 29-year-old defense contractor employee who's worked for the NSA for four years. Snowden is currently employed by defense contractor Booz Allen Hamilton, where he makes...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.