recommended reading

author archives

Results 1-10 of 342

The US Needs to Whip Its Disaster-Response Plans Into Shape

March 1, 2016 When the 2010 earthquake in Haiti proved too much for the United Nations’ humanitarian aid workers, the U.S. government took over, mounting a relief operation that was ultimately deemed fairly successful. But six years after that response, the federal government has yet to fully institutionalize the lessons it gleaned, or...

Here’s One Way the US-China Relationship Is Improving

August 4, 2015 There’s plenty of friction between the U.S. and China these days, but at least one aspect of the relationship hasn’t been this strong since the 20th century. Military-to-military contacts — from low-level exercises all the way up to presidential and four-star visits — have been shooting up since 2010, and...

An Unexpected Voice Speaks Out Against Backdoored Encryption

July 27, 2015 ASPEN, Colo. — As top national-security officials continued to argue that U.S. companies should build government-only backdoors into encrypted devices and services, an unexpected voice rose in opposition. “I think that it’s a mistake to require companies that are making hardware and software to build a duplicate key or a...

Former Pentagon Intel Chief Says Military’s Clandestine Service Is Growing

July 23, 2015 ASPEN, Colo. — A military human intelligence organization that has faced headwinds in recent years is still growing in size, the Pentagon’s former intelligence chief said on Thursday. Michael Vickers, until recently the undersecretary of defense for intelligence, said that the Defense Clandestine Service is still expanding and will continue...

NATO Members’ Defense Spending, in Two Charts

June 22, 2015 Five NATO members are expected to meet the alliance’s 2 percent target for defense spending in 2015, according to data released on Monday. Poland joins Britain, Estonia, Greece, and the United States as the only members of the 28-country alliance to meet the threshold. NATO Secretary General Jens Stoltenberg commended...

How the Air Campaign Against ISIS Is Changing, in Three Charts

May 14, 2015 The air forces hitting ISIS militants in Iraq and Syria are increasingly going after smaller targets, a reflection of previous successes—and enemy adaptation. In the past month, roughly 44 percent of air-strike targets have been towards ISIS fighting positions. That’s up from about 20 percent overall since the campaign began...

from govexec

Three Charts That Explain the ISIS Targets Struck By Coalition Air Forces

April 7, 2015 The U.S. military’s share of the air campaign against ISIS is holding steady. In both February and March, American forces carried out about 70 percent of the coalition’s air attacks against targets in Iraq and 93 percent of them in Syria, according to figures released today by CENTCOM officials. Since...

The 5,548 ISIS Targets Struck By Coalition Air Forces, in 3 Charts

April 6, 2015 The U.S. military’s share of the air campaign against ISIS is holding steady. In both February and March, American forces carried out about 70 percent of the coalition’s air attacks against targets in Iraq and 93 percent of them in Syria, according to figures released today by CENTCOM officials. Since...

How the White House and Congress Plan To Boost Defense: Ignore Sequestration

March 21, 2015 The House and the Senate may have found a sweet spot for their budget strategies: they’re both planning on using the U.S. war chest to give the Pentagon the money the White House requested for defense, but outside the reach of sequestration’s spending caps. The White House hoped to force...

5 Months of Air Strikes in Iraq and Syria in 4 Charts

January 8, 2015 This story has been updated. It’s been five months since operations began in Iraq to protect the besieged Yazidi population on Mount Sinjar. Since Aug. 8, U.S. and coalition forces have carried out 1,689 strikes in Iraq and Syria against more than 3,200 Islamic State targets (also known as ISIS,...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.