AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 21-30 of 2245

The Pentagon's Satellite Spies Are Aiming for the Arctic

March 9, 2015 Almost by definition, the North Pole is not thought of as a global hot spot. It's an area typically only recognized come holiday time. But as the polar ice melts, the Arctic is becoming a nexus of geopolitical tensions, over subjects as diverse as penguins and Ukraine. The National Geospatial ...

Why the National Geospatial Intelligence Agency Has Eyes on the Arctic

March 9, 2015 FROM NEXTGOV arrow Almost by definition, the North Pole is not thought of as a global hot spot. It's an area typically only recognized come holiday time. But as the polar ice melts, the Arctic is becoming a nexus of geopolitical tensions, over subjects as diverse as penguins and Ukraine. The National Geospatial ...

Defense Firm Called Isis Wins $7 Million Pentagon Cyber Contract

March 9, 2015 The Defense Department has hired a little-known Virginia startup company – with an unfortunate name – to pull together the military's most cutting-edge computer and information assets. The "Threat Intelligence Platform" project will help Pentagon analysts sift through big data research to track threats – including presumably Islamic State extremists. ...

Isis -- No, Not That One -- Wins $7 Million Pentagon Cyber Contract

March 8, 2015 FROM NEXTGOV arrow The Defense Department has hired a little-known Virginia startup company – with an unfortunate name – to pull together the military's most cutting-edge computer and information assets. The "Threat Intelligence Platform" project will help Pentagon analysts sift through big data research to track threats – including presumably Islamic State extremists. ...

Hackers Con Telecom IT Support Worker, Bilk Mandarin Oriental Guests and Trigger Bogus Bomb Alarm at a Mall

March 6, 2015 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: High-Paying Guests Hacked at Mandarin Oriental Luxury hotel chain Mandarin Oriental Hotel Group says credit card systems at some of its locations in the United States and Europe have been breached. IT Support ...

Pentagon Gets Authority To Hire 3,000 Cyber Pros

March 5, 2015 The military has been given the go-ahead to fast-track the hiring of 3,000 computer whiz civilians, in part, to flesh out the half-staffed U.S. Cyber Command, federal officials announced Thursday. Yesterday, command leaders told Congress they need to be able to quicker make compensation deals with prospective employees, as threats ...

Attention, Cyber Pros: The Pentagon Wants You -- 3,000 of You

March 5, 2015 FROM NEXTGOV arrow The military has been given the go-ahead to fast-track the hiring of 3,000 computer whiz civilians, in part, to flesh out the half-staffed U.S. Cyber Command, federal officials announced Thursday. Yesterday, command leaders told Congress they need to be able to quicker make compensation deals with prospective employees, as threats ...

Fallout from Clinton’s Private Emails: How Secure are Agency Email Systems?

March 5, 2015 FROM NEXTGOV arrow It's still unclear what, if any, security measures former Secretary of State Hillary Clinton deployed on the ad hoc personal email system she used for government business. Some cyber specialists and transparency advocates are voicing outrage over the potential presidential candidate possibly flouting federal security rules with a “homebrew” server ...

6 Biggest Blunders in Government's Annual Cyber Report Card

March 2, 2015 FROM NEXTGOV arrow The White House has released its yearly assessment of agency compliance with the governmentwide cyber law known as the Federal Information Security Management Act. And given the spate of breaches and hacks that hit both government and the private sector, the results may not be all that surprising. Sensitive agency ...

Clapper Plays the 'Insurance' Card To Defend NSA Surveillance

March 2, 2015 James Clapper, the nation's top spy, said keeping logs of U.S. citizens' phone calls is a preventive measure for discerning potential threats. Any legislation that shifts collection from the government to private telecom companies—a move Clapper has said he supports—could fail to stop a terrorist attack, he added. The National ...