Skip to content

Bill Gertz

Bill Gertz

Bill Gertz is a national security columnist for The Washington Times and senior editor at The Washington Free Beacon ( He has been with The Times since 1985.

He is the author of six books, four of them national best-sellers. His latest book, "The Failure Factory," on government bureaucracy and national security, was published in September 2008.

Mr. Gertz also writes a weekly column called Inside the Ring, a weekly column that chronicles the U.S. national security bureaucracy.

Mr. Gertz has been a guest lecturer at the FBI National Academy in Quantico, Va.; the Central Intelligence Agency in Virginia; the National Defense University at Fort McNair in Washington; and the Brookings Institution in Washington. He has participated in the National Security Studies Program at the Johns Hopkins University School of Advanced International Studies and Syracuse University Maxwell School of Citizenship and Public Affairs.

He studied English literature at Washington College in Chestertown, Md., and journalism at George Washington University. He is married and has two daughters.

Articles by Bill Gertz

China conducts JL-2 sub missile test

China carried out a flight test of its new JL-2 submarine-launched ballistic missile last month, highlighting Beijing's nuclear buildup of missile submarines. The JL-2 flight test took place Jan. 23, according to defense officials familiar with details of the test. Published February 18, 2015

Lisa Monaco, assistant to the president for homeland security and counterterrorism, this week announced the creation of the Cyber Threat Intelligence Integration Center, a "czar" bureaucracy. (Associated Press)

Cyberthreat center coming

The White House national security adviser for counterterrorism announced this week that the Obama administration is setting up a cyberintelligence center aimed at providing better information and coordinated responses after cyberattacks that she said are growing more diverse and dangerous. Published February 11, 2015

Ashton Carter outlines acts of cyber war

Defense Secretary nominee Ashton Carter told the Senate Committee on Armed Services that an act of cyberwarfare is defined as a cyberattack on critical infrastructure, the economy or U.S. military operations. Published February 4, 2015

Retired commander of the U.S. Central Command, Gen. James Mattis, speaks before Congress. (Associated Press) ** FILE **

Gen. James Mattis criticizes Obama defense, security policies

Retired Marine Corps Gen. James Mattis, former commander of the U.S. Central Command, delivered a harsh critique of the Obama administration's defense and national security policies this week — without ever mentioning the president or his security team by name. Published January 28, 2015

Russia is increasing military operations in eastern Ukraine, but the U.S. and NATO have not supplied urgently needed lethal weaponry to the Ukrainian army. Moscow has proposed restoring an agreed line of division to end an escalation of fighting. (Associated Press)

Russians advance on Ukraine

Russian military forces are crossing into eastern Ukraine in larger numbers, according to Phillip A. Karber, a Georgetown University professor currently on a fact-finding tour of the region. Published January 21, 2015

Army Sgt. Bowe Bergdahl was released in May after nearly five years as a hostage, and perhaps after a failed ransom payment to an Afghan national. (Associated Press)

Pentagon IG to query five in Bergdahl ransom probe

Despite an official denial from Defense Secretary Chuck Hagel that a ransom was paid, the Pentagon's inspector general last week moved a step closer to launching a formal investigation into charges that the military's Joint Special Operations Command paid a large sum in a failed bid to win the release of Army Sgt. Bowe Bergdahl in Afghanistan last year. Published December 31, 2014

Among the top threats to U.S. national security is a potential "massive cyber-attack" launched by China, which has been "actively and aggressively refining its cyber warfare capabilities," says Bill Cowan. (Associated Press)

China: A cyberwarring state

China's strategy of large-scale cyberattacks is motivated mainly by the goal of keeping the Chinese Communist Party (CCP) in power, in addition to gaining economic secrets and planning cyberattacks in a conflict, according to a new report by the Center for a New American Security. Published December 3, 2014

 William A. Reinsch, National Foreign Trade Council President. CSPAN

Confessions of a panda hugger

William A. Reinsch, former undersecretary of commerce for export administration under President Bill Clinton, offered a surprising mea culpa in the latest annual report by the U.S.- China Economic and Security Review Commission made public earlier this month. Published November 26, 2014

National Security Agency director Mike Rogers said the exercise "Cyber Flag" was "force-on-force" training, "fusing attack and defense across the full spectrum of military operations in a closed network environment." (AP Photo/Marcio Jose Sanchez) ** FILE **

Cyber war games held

U.S. Cyber Command recently conducted large-scale digital war games that involved cyberattacks and defense against foreign strikes on critical infrastructure. Published November 12, 2014

Swedish corvette HMS Stockholm patrols Jungfrufjarden in the Stockholm archipelago, Sweden, Monday, Oct. 20, 2014. Sweden's biggest submarine hunt since the dying days of the Soviet Union has put countries around the Baltic Sea on edge, with Latvia's foreign minister calling the incident a potential "game changer" in the region. (AP Photo/TT News Agency, Anders Wiklund) SWEDEN OUT

B-52s buzz over Europe, and Swedes hunt for Russian sub

Large-scale NATO war games underway in Europe this week include the deployment of B-52 nuclear-capable bombers, as non-NATO member Sweden hunts for a Russian mini-submarine in its territorial waters. Published October 22, 2014

Islamic State demonstrators chant pro-al Qeada messages in Mosul. According to U.S. counterterrorism officials, both the North Africa-based al Qaeda in the Islamic Maghreb and Yemen-based al Qaeda in the Arabian Peninsula have seen defections to the Islamic State in recent weeks. (Associated Press)

Al Qaeda, Islamic State teaming up

U.S. airstrikes against Islamic State targets in Iraq and Syria have prompted several central al Qaeda groups, including its two most dangerous regional affiliates, to reconsider their opposition to the ultraviolent offshoot organization. Published October 8, 2014