State Department

  • Senators praise Lew for experience. Committee plans to vote on his nomination next week. Lew said technology, acquisition reform and performance management are among his top non-budget priorities.

    September 17, 2010
  • The Center for a New American Security (CNAS) released three publications today that offer policy recommendations for the QDDR team.

    September 16, 2010
  • E-Mentees will be recruited through State\'s existing network of thousands of alumni from exchange programs focusing on entrepreneurship, and others who express serious interest in entrepreneurial guidance. We get details from the State Department\'s Steven Koltai.

    September 03, 2010
  • A small army of American diplomats left behind is embarking on a long and perilous path to keeping Iraq from slipping back to the brink of civil war. Michael Corbin is the Deputy Assistant Secretary of State in the Bureau of Near Eastern Affairs for Iraq issues explains the road ahead.

    August 25, 2010
  • Read more from the blog TechChange.

    August 24, 2010
  • Move over Facebook and Twitter, there\'s a new social media competitor making its way through the federal government.

    August 24, 2010
  • Secretary of State Hillary Clinton made the announcement in a video.

    August 20, 2010
  • For the first time in 15 years, U.S. officials have lost their ability to inspect Russian long-range nuclear bases.

    August 17, 2010
  • State plans to expand role, but might not have the budget.

    August 11, 2010
  • As a deputy legal adviser, Robert Harris supervises offices providing advice on an array of issues ranging from human rights and refugees, treaties, law enforcement and intelligence, and regional issues involving the Western Hemisphere and Asia.

    August 09, 2010
  • How is the State Department using technology to build bridges?

    August 05, 2010
  • August 11th at 11:05am The DoD GIG IA Portfolio Management Office (GIAP) has learned through experience that mission critical networks are contested, violated, infiltrated and penetrated, leading to significant risks to US interests. The U.S. critical infrastructure has evolved from a ‘network enabled\' position to one that is now ‘network dependent.\' No aspect of the national critical infrastructure operates without extensive use of information technology, and it is this very fact that makes our networks such a high priority target for adversaries. The need for secure, self-aware, proactively managed defense mechanisms has never been more critical. Commercially available technologies, when combined with research and development done by both the government and the private sector, represent the best possible approach for combating the types of threats our critical infrastructure is facing today.

    August 02, 2010
  • Posing as someone else and using fake birth certificates and driver\'s licenses to get a U.S. passport can still work. For the second time in two years, the GAO has found holes in the country\'s security by deliberately using fraudulent material to obtain passports. But the hole has gotten smaller. GAO\'s Greg Kutz joins us with details.

    August 02, 2010
  • A Senate panel probes the government\'s continued foreign language deficiencies. The Government Accountability Office finds limited progress across several agencies. DHS and DoD are taking steps to increase the number of employees with foreign language skills.

    July 30, 2010