AUTHOR ARCHIVES

Josh Meyer

Josh Meyer has written about national security issues for more than 20 years and won numerous awards as a staff writer for the Los Angeles Times. He is also the co-author of the recent book, ``The Hunt For KSM: Inside The Pursuit and Takedown of the Real 9/11 Mastermind, Khalid Sheikh Mohammed,'' which was named one of the best books of 2012 by The Washington Post and Kirkus Reviews. He works in Washington, DC, where he is the director of education and outreach for the Medill National Security Journalism Initiative, which aims to find better ways to tell national journalism stories across all media platforms using new technologies.
Results 1-10 of 14

Here’s Some Unsettling Advice From the Former Top US Cyberspook About Protecting Humanity

July 25, 2013 FROM NEXTGOV arrow As the only person to ever head both the US National Security Agency and the US Central Intelligence Agency, retired Air Force General Michael V. Hayden has a lot of experience in seeing around corners. He’s now a global security consultant, helping companies and governments to protect themselves against cyber...

Is the UN Making a Law of Space?

July 19, 2013 Say you’re minding your own business in outer space, and all of a sudden, one of your multibillion-dollar satellites gets blown up. Or the signals it sends to Earth go haywire and fly-by-wire planes start crashing. Or, worse, those signals start telling you a nuclear-tipped ballistic missile is heading your...

How the US Government Uses Information From Spying on Foreign Companies

July 18, 2013 FROM NEXTGOV arrow There’s no longer doubt that the US government spies on foreign multinational corporations as well as governments, thanks to the disclosures by former National Security Agency contractor turned international fugitive Edward Snowden. The NSA vacuums up mountains of classified information from a rich array of sources. The CIA assists by...

One Big Threat to Cybersecurity: IT Geeks Can’t Talk to Management

July 15, 2013 FROM NEXTGOV arrow A new report on the state of risk-based cybersecurity management helps explain why IT employees and their corporate bosses don’t see eye to eye about hacking and other computer-based threats. The report, titled “Are Security Metrics Too Complicated for Management?” is the latest installment of an ongoing series by Tripwire...

How Israel Became the Worldwide Leader in Drones

July 11, 2013 FROM NEXTGOV arrow The biggest exporter of unmanned aerial vehicles, which are fast becoming essential to governments worldwide for both military and civilian uses, isn’t the United States, China or other major power. The big winner in this booming global market is Israel. And that creates a lot of geopolitical complications, for the...

Why The US is Going After Piracy in The Caribbean, Where it Hasn’t Existed for 200 Years

July 9, 2013 The US State Department announced yesterday that it will send a senior official, Tom Kelly, to the Bahamas this coming week to formally strengthen bi-lateral cooperation on global counter-piracy efforts. This might seem a bit odd, seeing as Blackbeard and the other so-called Pirates of the Caribbean haven’t commandeered a...

Good News for the NSA: There Are 42% Fewer New Secrets for Future Edward Snowdens to Leak

July 3, 2013 One of the reasons former NSA contractor Edward Snowden was able to get away with stealing top-secret documents about government surveillance programs is because Washington’s system of classifying national security information is badly broken. So many entire categories of data are classified—from how surveillance programs like PRISM work to the...

Analysis: Europeans Shouldn't Be Surprised the U.S. Has Been Spying on Them

July 2, 2013 European officials are even more shocked and outraged today than they were yesterday at the revelations in Der Spiegel that the US government has been spying on the EU’s offices in Washington and New York. “These are disturbing news if proven true. They demand full clarification,” the EU said in...

The Most Important Person Entering Government You’ve Never Heard Of

June 28, 2013 The first week on the job for Nicole Wong, dubbed by many as the US’s first chief privacy officer, has been fairly, well, private. The White House has named Wong, 44, a former top lawyer for Google and Twitter, as the new deputy US chief technology officer in the Office...

How Mobile Payments Might Be the Global Money-Laundering Machine Criminals Have Dreamed About

June 18, 2013 FROM NEXTGOV arrow Earlier this month, US prosecutors took down the global currency exchange Liberty Reserve and charged it with being the largest online money laundering operation in history, the “bank of choice for the criminal underworld.” More than a million customers used the Costa Rica-based company to wash more than $6 billion,according...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download
  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download

When you download a report, your information may be shared with the underwriters of that document.