AUTHOR ARCHIVES

Results 21-30 of 614

Listening In

May 26, 2010 In 1978, when Congress enacted the Foreign Intelligence Surveillance Act, there were only a few ways to secretly capture someone's private conversations. One was a wiretap on a phone line. Another was through wireless signals, snatching a communication as it bounced between transmitters and receivers, or from a distance with...

ANALYSIS:Intelligence File Listening In

May 1, 2010 Surveillance laws should focus on how agencies use information, not how they collect it. In 1978, when Congress enacted the Foreign Intelligence Surveillance Act, there were only a few ways to secretly capture someone's private conversations. One was a wiretap on a phone line. Another was through wireless signals, snatching...

Legal adviser: Drone position will be explained

March 16, 2010 The Obama administration has asserted a legal position on the use of drone aircraft to kill suspected terrorists and militants, and officials plan to share the details "at an appropriate moment," according to Harold Koh, the State Department's legal adviser. National Journal asked Koh, the senior official responsible for international...

ANALYSIS:Intelligence File Afghanistan’s Spy Surge

March 1, 2010 A new war effort will stress the intelligence community. The U.S. military's successful troop surge in Iraq in 2007 benefited greatly from a parallel intelligence surge that remained largely unheralded at the time. According to former intelligence and military officials, a wealth of precise information on the movements of insurgents...

Privacy's Long Shadow

January 8, 2010 FROM NEXTGOV arrow Greg Mathieson/Landov On Oct. 23, 2009, Glenn Gaffney, the senior U.S. official responsible for collecting intelligence at the Office of the Director of National Intelligence, joined Utah Gov. Gary Herbert at a news conference in Salt Lake City. Together, they announced the construction of a new intelligence data center at...

ANALYSIS:Intelligence File Privacy’s Long Shadow

January 1, 2010 Intelligence agencies face a skeptical public as they carry out a vital mission. On Oct. 23, 2009, Glenn Gaffney, the senior U.S. official responsible for collecting intelligence at the Office of the Director of National Intelligence, joined Utah Gov. Gary Herbert at a news conference in Salt Lake City. Together,...

Creaky Collaboration

December 23, 2009 A minor rebellion broke out in the intelligence community a few months ago when the Office of the Director of National Intelligence announced it was shutting down a popular e-mail system. Called uGov, it allowed employees of different agencies to share information securely with each other, often without revealing operational...

Creaky Collaboration

December 21, 2009 FROM NEXTGOV arrow Jon Krause Concerns about information sharing persist, and they're dividing the intelligence community. A minor rebellion broke out in the intelligence community a few months ago when the Office of the Director of National Intelligence announced it was shutting down a popular e-mail system. Called uGov, it allowed employees of...

ADVICE+DISSENT:Intelligence File Creaky Collaboration

December 1, 2009 Concerns about information sharing persist, and they're dividing the intelligence community. A minor rebellion broke out in the intelligence community a few months ago when the Office of the Director of National Intelligence announced it was shutting down a popular e-mail system. Called uGov, it allowed employees of different agencies...

The cyberwar plan, not just a defensive game

November 13, 2009 FROM NEXTGOV arrow In May 2007, President Bush authorized the National Security Agency, based at Fort Meade, Md., to launch a sophisticated attack on an enemy thousands of miles away without firing a bullet or dropping a bomb. At the request of his national intelligence director, Bush ordered an NSA cyberattack on the...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.