recommended reading

author archives

Results 11-20 of 73

from govexec

Analysis: Are 50 Foiled Terrorist Plots Worth Your Privacy?

June 18, 2013 In the most candid explanation of the National Security Agency's surveillance program to date, agency head Gen. Keith Alexander said Tuesday that his organization's listening activity has helped foil more than 50 terrorist plots against the United States and its allies. One of those involved Najibullah Zazi's attempt to blow...

from govexec

The Taliban Is Ready for Peace Talks

June 18, 2013 U.S. officials have confirmed that the Taliban plans to open a political office in Doha, Qatar, for direct negotiations with the United States and the Afghan government. This comes just hours after after Afghan President Hamid Karzai shook hands with NATO's secretary-general in a ceremony returning day-to-day security responsibilities to...

Apple: iMessage and FaceTime Are Safe From the NSA's Prying Eyes

June 17, 2013 Apple has added its voice to a growing chorus of Silicon Valley companies calling on Washington for more transparency regarding its data-collection practices. In a statement released Monday, Apple disclosed new details about the requests for user information it fields from the government. For the six months ending May 31,...

Is This PRISM 2.0?

June 14, 2013 The U.S. intelligence community has been working with "thousands" of companies in key sectors of the economy to trade sensitive information on cybersecurity, including classified data, in ways that go beyond the revelations dropped by National Security Agency leaker Edward Snowden earlier this month. At least one of these companies,...

Analysis: Secret Intelligence Court Hardly Ever Says No

June 13, 2013 The secret court at the center of the National Security Agency surveillance debate has a bit of a reputation. It's supposed to act as a check on the executive, making sure it doesn't overstep its bounds when eavesdropping on terrorism suspects. In reality, the Foreign Intelligence Surveillance Courthardly ever says...

Leaker: NSA Has Been Snooping on China Since 2009

June 12, 2013 National Security Agency leaker Edward Snowden is contributing to Chinese complaints that the United States is engaged in acts of cyberespionage against Beijing. Snowden, the 29-year-old former contractor for Booz Allen Hamilton, told the South China Morning Post that Washington has been monitoring "hundreds" of targets in Hong Kong and...

Google, Facebook to DOJ: Let Us Publish the Number of FISA Requests You Make

June 12, 2013 Google's top lawyer is asking Washington to let the company expand its transparency report to include secret court orders like the kind involved in the NSA surveillance scandal. In a letter posted to Google's blog, David Drummond addresses Attorney General Eric Holder and FBI Director Robert Mueller, arguing that when...

Commentary: The NSA leaker and Highly Skilled but Academically Ordinary Workers

June 11, 2013 Booz Allen Hamilton has released a new statement on Edward Snowden, its now-former employee and National Security Agency surveillance leaker. In addition to saying it fired Snowden yesterday over code-of-ethics violations, Booz Allen reports that the Maryland native's annual salary was $122,000—far less than the $200,000 Snowden himself claimed to...

from govexec

6 in 10 Americans Don't See Anything Wrong With Mass Government Surveillance

June 11, 2013 The first polling on the National Security Agency surveillance leak is out, and despite almost unanimous cries of outrage from the press and civil-liberties advocates, the rest of America seems decidedly "meh" on the matter. Over half of us—56 percent, to be exact—think that serving phone companies with a secret...

NSA Leaks Shed Light on China's Complaints About U.S. Hacking

June 10, 2013 When it came to light that hackers had breached the networks of The New York Times, The Wall Street Journal, and other major U.S. institutions, one of Washington's first responses was to blame China. China's response? You guys do it, too! "The Defense Ministry and China Military Online websites have...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.