AUTHOR ARCHIVES

Josh Meyer

Josh Meyer has written about national security issues for more than 20 years and won numerous awards as a staff writer for the Los Angeles Times. He is also the co-author of the recent book, ``The Hunt For KSM: Inside The Pursuit and Takedown of the Real 9/11 Mastermind, Khalid Sheikh Mohammed,'' which was named one of the best books of 2012 by The Washington Post and Kirkus Reviews. He works in Washington, DC, where he is the director of education and outreach for the Medill National Security Journalism Initiative, which aims to find better ways to tell national journalism stories across all media platforms using new technologies.
Results 1-10 of 14

Here’s Some Unsettling Advice From the Former Top US Cyberspook About Protecting Humanity

July 25, 2013 FROM NEXTGOV arrow As the only person to ever head both the US National Security Agency and the US Central Intelligence Agency, retired Air Force General Michael V. Hayden has a lot of experience in seeing around corners. He’s now a global security consultant, helping companies and governments to protect themselves against cyber...

Is the UN Making a Law of Space?

July 19, 2013 Say you’re minding your own business in outer space, and all of a sudden, one of your multibillion-dollar satellites gets blown up. Or the signals it sends to Earth go haywire and fly-by-wire planes start crashing. Or, worse, those signals start telling you a nuclear-tipped ballistic missile is heading your...

How the US Government Uses Information From Spying on Foreign Companies

July 18, 2013 FROM NEXTGOV arrow There’s no longer doubt that the US government spies on foreign multinational corporations as well as governments, thanks to the disclosures by former National Security Agency contractor turned international fugitive Edward Snowden. The NSA vacuums up mountains of classified information from a rich array of sources. The CIA assists by...

One Big Threat to Cybersecurity: IT Geeks Can’t Talk to Management

July 15, 2013 FROM NEXTGOV arrow A new report on the state of risk-based cybersecurity management helps explain why IT employees and their corporate bosses don’t see eye to eye about hacking and other computer-based threats. The report, titled “Are Security Metrics Too Complicated for Management?” is the latest installment of an ongoing series by Tripwire...

How Israel Became the Worldwide Leader in Drones

July 11, 2013 FROM NEXTGOV arrow The biggest exporter of unmanned aerial vehicles, which are fast becoming essential to governments worldwide for both military and civilian uses, isn’t the United States, China or other major power. The big winner in this booming global market is Israel. And that creates a lot of geopolitical complications, for the...

Why The US is Going After Piracy in The Caribbean, Where it Hasn’t Existed for 200 Years

July 9, 2013 The US State Department announced yesterday that it will send a senior official, Tom Kelly, to the Bahamas this coming week to formally strengthen bi-lateral cooperation on global counter-piracy efforts. This might seem a bit odd, seeing as Blackbeard and the other so-called Pirates of the Caribbean haven’t commandeered a...

Good News for the NSA: There Are 42% Fewer New Secrets for Future Edward Snowdens to Leak

July 3, 2013 One of the reasons former NSA contractor Edward Snowden was able to get away with stealing top-secret documents about government surveillance programs is because Washington’s system of classifying national security information is badly broken. So many entire categories of data are classified—from how surveillance programs like PRISM work to the...

Analysis: Europeans Shouldn't Be Surprised the U.S. Has Been Spying on Them

July 2, 2013 European officials are even more shocked and outraged today than they were yesterday at the revelations in Der Spiegel that the US government has been spying on the EU’s offices in Washington and New York. “These are disturbing news if proven true. They demand full clarification,” the EU said in...

The Most Important Person Entering Government You’ve Never Heard Of

June 28, 2013 The first week on the job for Nicole Wong, dubbed by many as the US’s first chief privacy officer, has been fairly, well, private. The White House has named Wong, 44, a former top lawyer for Google and Twitter, as the new deputy US chief technology officer in the Office...

How Mobile Payments Might Be the Global Money-Laundering Machine Criminals Have Dreamed About

June 18, 2013 FROM NEXTGOV arrow Earlier this month, US prosecutors took down the global currency exchange Liberty Reserve and charged it with being the largest online money laundering operation in history, the “bank of choice for the criminal underworld.” More than a million customers used the Costa Rica-based company to wash more than $6 billion,according...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.