AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems for Nextgov. She has covered technology for nine years at such publications as National Journal's TechnologyDaily, Federal Computer Week and Forbes. Before joining Government Executive, she covered agriculture and derivatives trading for Congressional Quarterly. She has been a guest commentator on C-SPAN, WTOP and Federal News Radio. She is a graduate of the University of Pennsylvania.
Results 1-10 of 2027

Terror Victims Can’t Seize Iranian and Syrian Web Addresses

July 30, 2014 FROM NEXTGOV arrow The global body that regulates Web addresses has moved to block an effort by U.S. terrorism victims to collect on civil damages by seizing country-specific IP addresses for Iran, Syria and North Korea. The Internet Corporation for Assigned Names and Numbers told the federal court for the District of Columbia ...

After Delays, USCIS Sets New Deadline for Digital Immigration Records

July 29, 2014 FROM NEXTGOV arrow Computerizing casework at U.S. Citizenship and Immigration Services is a major difficulty and will be a key priority going forward, new USCIS Director Leon Rodriguez said Tuesday in his first congressional appearance. Since 2008, the agency has unsuccessfully attempted to digitize the paper folders personnel currently use for evaluating the ...

British Activist Lauri Love Accused of Hacking Deltek

July 28, 2014 FROM NEXTGOV arrow Lauri Love, an alleged British hacktivist accused of numerous U.S. agency hacks, has been charged with stealing sensitive data on government contractors from Deltek, a federal market research firm. The breach was disclosed in April, but the identity of the suspect had not been released until now. The Herndon, Virginia-based ...

Hacker Breached NOAA Satellite Data from Contractor’s PC

July 28, 2014 FROM NEXTGOV arrow National Oceanic and Atmospheric Administration satellite data was stolen from a contractor's personal computer last year, but the agency could not investigate the incident because the employee refused to turn over the PC, according to a new inspector general report. This is but one of the “significant security deficiencies” that ...

Hackers Probe Dominion Power Staff, Bankroll Pickpockets’ Airfare to London, and Raid a Charity

July 25, 2014 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Dominion Resources personnel who arranged wellness screenings became hacking victims An attacker penetrated a benefits system containing personal information on the energy company’s employees, spouses and partners who went online to schedule a ...

Virtual Border Fence Project Halted After Raytheon Protest

July 25, 2014 FROM NEXTGOV arrow A major border security project involving the deployment of 50 surveillance towers across southern Arizona is temporarily on hold, following a protest by Raytheon that the government improperly awarded the work to a rival. In a protest decision released Thursday afternoon, the Government Accountability Office ruled the Department of Homeland ...

Some Things Should Be Banned from the Internet of Things

July 24, 2014 FROM NEXTGOV arrow The unknown danger in connecting an increasing number of analog objects, such as light bulbs, to the Web is worrying policy advisers. The "Internet of Things” just might have too many things, says Richard Danzig, a member of the Defense Policy Board and the President’s Intelligence Advisory Board. "Information companies ...

Unclassified JFK Assassination Database Still Stored In Top Secret Vault -- for Convenience

July 23, 2014 FROM NEXTGOV arrow The master database cataloging material related to the assassination of President John F. Kennedy has always been housed in a Top Secret vault, much of the time on a personal computer, according to National Archives and Records Administration officials. The index -- which does not hold physical artifacts -- was ...

Evaluate Aspiring Cyberwarriors Using Gaming, Not Grades

July 22, 2014 FROM NEXTGOV arrow Maybe the winner of an upcoming Pentagon contest to robotize cybersecurity should win a salaried job, in addition to the planned $2 million cash prize. That's the belief of former Navy Secretary Richard Danzig, who questions why the government focuses so much on formal education when evaluating applicants for cyber ...

Significant Deficiencies Found in Treasury’s Computer Security

July 21, 2014 FROM NEXTGOV arrow Weaknesses in Treasury Department computer systems that track federal debt are severe enough to disrupt accounting, according to a government audit. Newly discovered security vulnerabilities at the Bureau of the Fiscal Service, coupled with older unfixed problems, constitute a "significant deficiency" for financial reporting purposes, the Government Accountability Office found. ...