AUTHOR ARCHIVES

Results 21-30 of 614

Listening In

May 26, 2010 In 1978, when Congress enacted the Foreign Intelligence Surveillance Act, there were only a few ways to secretly capture someone's private conversations. One was a wiretap on a phone line. Another was through wireless signals, snatching a communication as it bounced between transmitters and receivers, or from a distance with...

ANALYSIS:Intelligence File Listening In

May 1, 2010 Surveillance laws should focus on how agencies use information, not how they collect it. In 1978, when Congress enacted the Foreign Intelligence Surveillance Act, there were only a few ways to secretly capture someone's private conversations. One was a wiretap on a phone line. Another was through wireless signals, snatching...

Legal adviser: Drone position will be explained

March 16, 2010 The Obama administration has asserted a legal position on the use of drone aircraft to kill suspected terrorists and militants, and officials plan to share the details "at an appropriate moment," according to Harold Koh, the State Department's legal adviser. National Journal asked Koh, the senior official responsible for international...

ANALYSIS:Intelligence File Afghanistan’s Spy Surge

March 1, 2010 A new war effort will stress the intelligence community. The U.S. military's successful troop surge in Iraq in 2007 benefited greatly from a parallel intelligence surge that remained largely unheralded at the time. According to former intelligence and military officials, a wealth of precise information on the movements of insurgents...

Privacy's Long Shadow

January 8, 2010 FROM NEXTGOV arrow Greg Mathieson/Landov On Oct. 23, 2009, Glenn Gaffney, the senior U.S. official responsible for collecting intelligence at the Office of the Director of National Intelligence, joined Utah Gov. Gary Herbert at a news conference in Salt Lake City. Together, they announced the construction of a new intelligence data center at...

ANALYSIS:Intelligence File Privacy’s Long Shadow

January 1, 2010 Intelligence agencies face a skeptical public as they carry out a vital mission. On Oct. 23, 2009, Glenn Gaffney, the senior U.S. official responsible for collecting intelligence at the Office of the Director of National Intelligence, joined Utah Gov. Gary Herbert at a news conference in Salt Lake City. Together,...

Creaky Collaboration

December 23, 2009 A minor rebellion broke out in the intelligence community a few months ago when the Office of the Director of National Intelligence announced it was shutting down a popular e-mail system. Called uGov, it allowed employees of different agencies to share information securely with each other, often without revealing operational...

Creaky Collaboration

December 21, 2009 FROM NEXTGOV arrow Jon Krause Concerns about information sharing persist, and they're dividing the intelligence community. A minor rebellion broke out in the intelligence community a few months ago when the Office of the Director of National Intelligence announced it was shutting down a popular e-mail system. Called uGov, it allowed employees of...

ADVICE+DISSENT:Intelligence File Creaky Collaboration

December 1, 2009 Concerns about information sharing persist, and they're dividing the intelligence community. A minor rebellion broke out in the intelligence community a few months ago when the Office of the Director of National Intelligence announced it was shutting down a popular e-mail system. Called uGov, it allowed employees of different agencies...

The cyberwar plan, not just a defensive game

November 13, 2009 FROM NEXTGOV arrow In May 2007, President Bush authorized the National Security Agency, based at Fort Meade, Md., to launch a sophisticated attack on an enemy thousands of miles away without firing a bullet or dropping a bomb. At the request of his national intelligence director, Bush ordered an NSA cyberattack on the...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download
  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download

When you download a report, your information may be shared with the underwriters of that document.