Software and automation are crucial to preventing leaks and sabotage, but they're not the only tools deployed by agencies that collect and guard secret information.
As law enforcement and intelligence agencies struggle to balance security against civil liberties, it's important to distinguish caricature from reality.
"NIST may seek the advice of the NSA on cryptographic matters but it must be in a position to assess it and reject it when warranted,” says a report from the Visiting Committee on Advanced Technology.
Former NSA contractor Edward Snowden details his role in helping intelligence agency CIOs solve pressing technical problems.
Former NSA head says guarding agencies' vast data stores is the critical challenge going forward.
The intelligence agency delves into some details about how it collects, stores and accesses data but leaves many key questions unanswered.
Several proposals would require access to consumer databases as well as records from local and state law enforcement and federal financial regulators.
The president’s plan would require a court order to collect information on individual accounts; the lawmakers’ bill would not.
Trying to determine when spy agencies are required to dispose of data is something of a mystery, even to them.
Analyzing fragmented information that doesn’t come neatly packaged is a challenge most other government users of big data can relate to.
Proposals under consideration in several legislatures would limit state interaction with firms assisting warrantless data collection.
Readers weigh in with real-life experience from both sides of the vetting process.
Meet 100 women and men who are doing great things in federal IT.
Click here for the full list
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com