A congressionally chartered commission said the State Department does not have the training or expertise to take over security operation in Iraq when the military departs at the end of 2011.
Senators praise Lew for experience. Committee plans to vote on his nomination next week. Lew said technology, acquisition reform and performance management are among his top non-budget priorities.
The Center for a New American Security (CNAS) released three publications today that offer policy recommendations for the QDDR team.
E-Mentees will be recruited through State\'s existing network of thousands of alumni from exchange programs focusing on entrepreneurship, and others who express serious interest in entrepreneurial guidance. We get details from the State Department\'s Steven Koltai.
A small army of American diplomats left behind is embarking on a long and perilous path to keeping Iraq from slipping back to the brink of civil war. Michael Corbin is the Deputy Assistant Secretary of State in the Bureau of Near Eastern Affairs for Iraq issues explains the road ahead.
Read more from the blog TechChange.
Move over Facebook and Twitter, there\'s a new social media competitor making its way through the federal government.
Secretary of State Hillary Clinton made the announcement in a video.
For the first time in 15 years, U.S. officials have lost their ability to inspect Russian long-range nuclear bases.
State plans to expand role, but might not have the budget.
As a deputy legal adviser, Robert Harris supervises offices providing advice on an array of issues ranging from human rights and refugees, treaties, law enforcement and intelligence, and regional issues involving the Western Hemisphere and Asia.
How is the State Department using technology to build bridges?
August 11th at 11:05am The DoD GIG IA Portfolio Management Office (GIAP) has learned through experience that mission critical networks are contested, violated, infiltrated and penetrated, leading to significant risks to US interests. The U.S. critical infrastructure has evolved from a ‘network enabled\' position to one that is now ‘network dependent.\' No aspect of the national critical infrastructure operates without extensive use of information technology, and it is this very fact that makes our networks such a high priority target for adversaries. The need for secure, self-aware, proactively managed defense mechanisms has never been more critical. Commercially available technologies, when combined with research and development done by both the government and the private sector, represent the best possible approach for combating the types of threats our critical infrastructure is facing today.
Posing as someone else and using fake birth certificates and driver\'s licenses to get a U.S. passport can still work. For the second time in two years, the GAO has found holes in the country\'s security by deliberately using fraudulent material to obtain passports. But the hole has gotten smaller. GAO\'s Greg Kutz joins us with details.
A Senate panel probes the government\'s continued foreign language deficiencies. The Government Accountability Office finds limited progress across several agencies. DHS and DoD are taking steps to increase the number of employees with foreign language skills.