AUTHOR ARCHIVES

Results 11-20 of 58

Should the CIA share some of the blame for Benghazi?

October 11, 2012 For the last month, the media and Congress have been grilling the State Department for the security failures during the deadly assault on a U.S. compound in Benghazi, Libya. But what if the State Department is the wrong target of scrutiny? According to a counter-theory advanced last night by The...

State Department disowns Susan Rice's Libya narrative

October 10, 2012 In an unusual display of disunity, State Department officials have disowned remarks by one of their top officials, U.S. Ambassador to the U.N. Susan Rice, regarding her explanation of the deadly terrorist assault on U.S. diplomats in Libya in September. Not only did they say Rice's characterization of those attacks...

North Korea: Our missiles can hit continental U.S.

October 9, 2012 FROM NEXTGOV arrow North Korea finally broke its silence on the U.S. agreement to allow South Korea to produce missiles capable of targeting all of North Korea and the announcement is vintage Pyongyang: You think that's impressive? Our long-range missiles are "within the scope of strike" of the continental U.S., Japan, Guam and...

Libya says it has the militants suspected of killing Ambassador Stevens surrounded

October 9, 2012 Libyan soldiers have surrounded Ansar al-Sharia, the Islamist militia suspected of killing U.S. Ambassador Chris Steves and three other Americans, but say they are in desperate need of back up. Reporting from Tripoli, The Guardian's Chris Stephen reports that the Islamist militia has been blockaded in a remote region in...

U.S. official goes public with criticism of security policy in Libya

October 8, 2012 The State Department insists it didn't cut corners on security in the run-up to the deadly Sept. 11 terrorist attack in Benghazi, but a former U.S. security official in Libya is doing his best to torpedo those claims. For weeks, the State Department has been on defense trying to account...

The party's over at the Secret Service

October 5, 2012 The Secret Service has put the kabosh on late-night alcohol benders and morning-after Facebook posts: The agency issued new policies governing alcohol and social media use this week in wake of the drunken prostitue scandal in Colombia five months ago. The new policy, obtained by The Washington Post, seems to...

U.S. knew about al Qaeda link in Benghazi within 24 hours

September 26, 2012 It took a long time for the Obama administration to admit an Al Qaeda link to the attacks in Benghazi on Sept. 11, but according to a new report in The Daily Beast, U.S. intelligence officials knew al Qaeda was involved within a day of the attacks. Not only that,...

Pentagon: Don't tweet about the former SEAL's Bin Laden book

September 26, 2012 While the Pentagon is still mulling over whether to prosecute Navy SEAL author Matt Bissonnette, it is sure about one thing: it doesn't want any of its employees tweeting about that guy's best-selling book. Today, the Washington Times Rowan Scarborough reports the Defense Department has issued guidelines on handling No...

What just happened in Islamabad? U.S. embassy latest target in violent wave

September 20, 2012 Staving off a protest that became as violent as it was quickly subdued, Pakistani police fired off live rounds and shot tear gas into a crowd of more than 1,000 students Thursday as protesters attempted to demonstrate in front of the U.S. Embassy in Islamabad. Furious over the Innocence of...

Maryland installs cameras to watch the cameras watching you

September 14, 2012 FROM NEXTGOV arrow Here's a new twist on the panopticon: Authorities in southern Maryland are installing cameras to monitor the cameras monitoring auto traffic. Seriously, one of them is already installed. Local station WTOP reports that a rash of traffic cameras were destroyed so the Prince George's County Police Department decided to install...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    View
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    View

When you download a report, your information may be shared with the underwriters of that document.