It's been an interesting week in the world of government computing. This week's ZDNet Government Week-in-Review touches on some major stories including big privacy and Patriot Act news at the the FBI and DOJ.
CBSI's Distinguished Lecturer David Gewirtz hosts ZDNet Government -- ZDNet's politics and policy coffeehouse -- where civics lessons meet technology, nothing is sacred, and everything is fair game.
In addition to hosting the ZDNet Government and ZDNet DIY-IT blogs, CBS Interactive's Distinguished Lecturer David Gewirtz is an author, U.S. policy advisor and computer scientist. He is featured in The History Channel special The President's Book of Secrets, is one of America's foremost cyber-security experts, and is a top expert on saving and creating jobs. He is also director of the U.S. Strategic Perspective Institute as well as the founder of ZATZ Publishing. David is a member of FBI InfraGard, the Cyberwarfare Advisor for the International Association for Counterterrorism & Security Professionals, a columnist for The Journal of Counterterrorism and Homeland Security, and has been a regular CNN contributor, and a guest commentator for the Nieman Watchdog of the Nieman Foundation for Journalism at Harvard University. He is the author of Where Have All the Emails Gone?, the definitive study of email in the White House, as well as How To Save Jobs and The Flexible Enterprise, the classic book that served as a foundation for today's agile business movement.
There are many other actors in the global cyberwar, from nation states to criminal organizations to hacktivist groups. Today, however, we're going to just focus on China vs. the U.S. It's a war both undeclared and unwinnable, but very, very real.
In this Memorial Day edition of ZDNet Government's Week-in-Review, we look at stories posted by our intrepid reporters around the world. Top news includes Twitter's two-factor authentication, retaliation against hackers, and big companies who pay little tax.
If you're considering starting a nonprofit and want to sail through government approval, here are five tech tips (and a few bonus ideas) that will make the process as painless as possible. This article is certified politics-free.
Three Democrats and a Republican have proposed a House Resolution entitled the Unlocking Technology Act of 2013. It's actually good governance. Surprised?
These technologies are wonderful, empowering, and simply breathtaking. They're also no end of trouble.
If the economy is to get stronger, charging consumers more when they're already struggling to afford goods and services is not a wise move. Even brick and mortars won't win. Here's why.
In part 4 of our four-part special report, presidential scholar David Gewirtz (who wrote the book on White House email) explores how President Bush's email archives are going to be managed, and how presidential email is part of the legacy of each presidential administration.
In Part 3 of our 4-part Special Report, our resident presidential scholar David Gewirtz (who wrote the book on White House email) explores how applying modern analytics techniques to the President Bush 200-million email message archive could help governance.
Not only will we become an America without privacy, we'll become an America without recourse. The Constitution must not end where the digital domain begins.
In Part 2 of our 4-part Special Report, our resident presidential scholar David Gewirtz (who wrote the book on White House email) explores why a large part of the story will always be missing from the record books.
We don't know enough about this revised version of the bill to freak out, and it still has a bunch of hurdles to get through. But, if it does get through the House, and if we still don't know much about it, go ahead and freak out.
In part 1 of our 4-part Special Report, our resident presidential scholar David Gewirtz (who wrote the book on White House email) provides an exclusive look behind the scenes of White House email.
We have been letting the fox guard the hen house for far too long, and it's high time the US government did something about it.
The challenge is distinguishing between data collected for protection and data collection that violates our privacy, all while respecting the very core of our Constitution.
The best of ZDNet, delivered
- 1 Google Voice: A step-by-step primer on ditching your landline while keeping your number
- 2 Google Voice: A cheapskate's guide to cheap VoIP
- 3 Google Voice: How to consolidate your virtual phone numbers
- 4 Google Voice: The ultimate iPhone how-to
- 5 Want to make money mining bitcoins? Criminals have you beat