AUTHOR ARCHIVES

Results 1-10 of 54

Analysis: Four Theories on John Boehner's Debt Limit Strategy

August 28, 2013 House Speaker John Boehner has tried to convince conservatives to abandon their idea to use the threat of a government shutdown to force President Obama to defund Obamacare, telling them instead to wait and use the debt limit to force Obamacare concessions. Framing the spending negotiations this way pleases no...

GOP Wants Conservatives to Trade a Shutdown for an Even Bigger Crisis

August 22, 2013 Republican leaders are trying to convince conservatives in Congress that instead of threatening to shut down the government unless President Obama agrees to defund Obamacare, they should refuse to raise the debt ceiling unless he agrees to delay the law. This is better, because to save his signature achievement, Obama...

Ronald Reagan to Richard Nixon on Watergate: 'This Too Shall Pass'

August 22, 2013 The Nixon Presidential Library released the last set of Nixon tapes on Wednesday, and they contain a call from Ronald Reagan to then-President Richard Nixon, assuring him that his Watergate speech was good, and that "This too shall pass." The call was made on April 30, 1973 and, of course,...

The Mind of Bradley Manning

August 15, 2013 Bradley Manning said he was sorry for hurting the United States during his sentencing hearing at Fort Meade on Wednesday, saying, "I only wanted to help people, not hurt people." But hours of testimony presented earlier by his defense team showed that wasn't Manning's only reason for downloading thousands of...

Analysis: The Choreographed Fight Over a Government Shutdown

August 13, 2013 Several Republicans, most prominently a few 2016 presidential candidates, are threatening to shutdown the federal government unless President Obama agrees to defund Obamacare. But Obama would never sign a bill to defund Obamacare. And Republicans know it. But they have to pretend they don't know it -- or that they...

Liz Cheney Pledges to Stamp Out the Last Remnants of Compromise in Congress

July 18, 2013 There is a faint hope that politicians will compromise on some things after several years of do-nothing Congresses, but Liz Cheney wants that to put an end to that right now. Cheney, daughter of former Vice President Dick Cheney, is running for Senate in Wyoming against a fellow Republican, Sen....

The Perils of Being the Earnest Intern

July 18, 2013 Byron Thomas was just another anonymous Senate intern until his co-workers started making fun of his earnest plea that they all show the American flag more respect and recite the Pledge of Allegiance every day. "Now I've only been here for 8 days but I can tell that something is...

Americans Finally Have Access to American Propaganda

July 15, 2013 A law went into effect this month that ends the ban on U.S. government-made propaganda from being broadcast to Americans. In a remarkably creative spin, the supporters of this law say that allowing Americans to see American propaganda is actually a victory for transparency. As Foreign Policy's John Hudson explains,...

How the IRS Made All Kinds of Groups' Lives Miserable

July 5, 2013 We know the IRS acted inappropriately in flagging conservative groups for review when they were seeking non-profit status. But now Congressional Democrats charge that the IRS acted inappropriately in reporting how it acted inappropriately. Liberal groups also got extra scrutiny from the IRS on its Be On the Look Out...

Senate Confirms Penny Pritzker to Be Commerce Secretary, 97 to 1

June 26, 2013 The Senate confirmed Penny Pritzker to be President Obama's Commerce Secretary on Tuesday by a vote of 97 to 1 — even though her nomination was supposed to be excitingly controversial. Instead, it was a rare moment of boring bipartisan cooperation. Pritzker was an early supporter of Obama's, but her...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.