AUTHOR ARCHIVES

Joseph Marks

Senior Correspondent Joseph Marks covers cybersecurity for Nextgov. He previously covered cybersecurity for Politico, intellectual property for Bloomberg BNA and federal litigation for Law360. He covered government technology for Nextgov during an earlier stint at the publication and began his career at Midwestern newspapers covering everything under the sun. He holds a bachelor’s degree in English from the University of Wisconsin in Madison and a master’s in international affairs from Georgetown University.
Results 901-910 of 1942

Military Illegally Aided ICE in Money Laundering Case, Civil Rights Lawyer Says

August 7, 2013 FROM NEXTGOV arrow The military’s Special Operations Command and an agency of the Homeland Security Department engaged in an investigation of a $2.5 billion money laundering scheme that violated long-standing policies that preclude military forces from participating in law enforcement activities, a top civil liberties lawyer told Nextgov. The Washington office of the...

From a Tweet to a Thunderclap

August 6, 2013 FROM NEXTGOV arrow Monday brought the newest addition to the list of social media sites approved for federal use: Thunderclap, a tool that claims to “amplify” Twitter campaigns by timing 100 or more tweets for simultaneous release. Each Thunderclap campaign is started by a single user who schedules the tweets for release one...

How Computer Clouds Could Help Cure Cancer

August 5, 2013 FROM NEXTGOV arrow Computer clouds have been credited with making the workplace more efficient and giving consumers anytime-anywhere access to emails, photos, documents and music as well as helping companies crunch through masses of data to gain business intelligence. Now it looks like the cloud might help cure cancer too. The National Cancer...

A Call for Cyber Diplomacy

August 2, 2013 FROM NEXTGOV arrow LAS VEGAS -- If the United States’ goal is peace and security in cyberspace, officials should think less about cyberwar and more about cyber diplomacy, a scholar from the Atlantic Council said on Thursday. For all of the talk about lightning attacks that come out of nowhere and the often...

The FDA is Going After Fake Drug Sellers Online

August 2, 2013 FROM NEXTGOV arrow The Food and Drug Administration’s law enforcement arm wants an Internet monitoring system to help root out sellers of illegally-marketed drugs, food and cosmetics, dietary supplements, tobacco and scam miracle cures. The agency is looking for a contractor to mine through Internet data to spot those illegal sellers and, on...

There May Be Some Feds at Defcon After All

August 1, 2013 FROM NEXTGOV arrow LAS VEGAS -- For the record I did not get into the Defcon hacker’s conference. I wanted to investigate whether federal employees and contractors were attending the conference despite a request from organizer Jeff Moss that they take a year off in the wake of revelations about the National Security...

Build Once, Use Often

August 1, 2013 May marked a White House deadline for government agencies to begin streaming data directly to outside developers and the public through application programming interfaces, or APIs. Basically, these are instructions for one computer to continuously grab information from another. Some agencies launched a dozen or more APIs in response to...

Tech Roundup

August 1, 2013 CIA’s Virus Trouble The Government Accountability Office found that the CIA gave Amazon an unfair advantage when it agreed to weaken security requirements on a $150 million contract for a massive intelligence community computer cloud it had already awarded to the Web giant. During post-award negotiations, Amazon asked the CIA...

Around Government

August 1, 2013 Decoding Rap and Regs GSA considers site that analyzes hip-hop lyrics to cut through jargon. What will be the next social media platform to make it big in government? The answer may be Rap Genius, a four-year-old tool to decode hip-hop lyrics that federal agencies could use to crowdsource explanations...

Insider Threats ≠ Hackers

July 31, 2013 FROM NEXTGOV arrow LAS VEGAS -- Of the two best tools to detect insider threats in a network, only one can be supplied by a vendor, the FBI’s former chief information security officer said at the Black Hat cybersecurity conference here Wednesday. That’s software that tracks employees’ individual digital patterns and how those...