AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 31-40 of 2537

In a First, NSA Advertises Opportunities on Monster.com of Federal Contracting

December 31, 2015 FROM NEXTGOV arrow The National Security Agency has begun recruiting spy-tech inventors on the Monster.com of Beltway contractor jobs. The agency posted a special notice to FedBizOpps.gov, right before the holidays, advertising work for small companies that develop "innovative technologies." An NSA spokesman told Nextgov on Wednesday afternoon, "NSA’s posting on FedBizOpps is...

Hackers Compromise Hello Kitty Fans’ Info, Infect Hyatt & Leak Hot Hollywood Scripts

December 28, 2015 FROM NEXTGOV arrow Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches. In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: DHS Catches Salesman Pitching Fresh, Stolen TV Scripts A young hacker from the Bahamas got his hands on scripts for...

Has the Obama Administration’s Push on Transparency Run Out of Steam?

December 24, 2015 FROM NEXTGOV arrow This story appears in the November-December issue of Government Executive magazine. In April 2006, a young Democratic senator from Illinois and a graying fiscal conservative from Oklahoma introduced legislation to create a searchable database of federal monetary awards, essentially a Google for government spending. The site would empower citizens to...

Feds Scrambling to Close Backdoor in Widely Purchased IT Gear

December 23, 2015 The Department of Homeland Security and federal agencies are in incident-response mode as they work to remove listening posts in software planted by suspected cyberspies. The unauthorized code can allow attackers to invisibly decrypt communications passing through widely-used Juniper Networks firewalls, according to the company. The existence of the three-year...

Juniper Hack: DHS Tells Agencies to Close Encryption Backdoors

December 23, 2015 FROM NEXTGOV arrow The Department of Homeland Security and federal agencies are in incident-response mode as they work to remove listening posts in software planted by suspected cyberspies. The unauthorized code can allow attackers to invisibly decrypt communications passing through widely used Juniper Networks firewalls, according to the company. The existence of the...

Pentagon Bungled Y2K Planning, According to Newly Declassified Docs

December 22, 2015 FROM NEXTGOV arrow We now know the year 2000 came and went without missile protection systems or other mission critical government computer systems pausing to question the date. But if something had gone wrong as the world entered the new millennium, the Pentagon may not have been prepared for the consequences. Key military...

Pentagon Chief Didn't Violate Governmentwide Ban on Using Personal Email for Business

December 21, 2015 FROM NEXTGOV arrow Pentagon Secretary Ash Carter acknowledged erring when he used a personal email account for official business, but he did not violate a governmentwide ban on sending work messages through personal accounts. That is because there is no governmentwide prohibition against using personal email to conduct official business. And the only...

Clinton Campaign Voter Records Breached; Hackers Invade Juniper Networks, & Pickpocket Bubba Gump Patrons

December 21, 2015 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Payment Thieves Breach Restaurateur That Owns Bubba Gump, Morton's, Others Banking industry sources say that fraud patterns on cards issued to restaurant customers strongly suggest a payment system hack at Houston-based Landry’s, the...

Cyber Bill Boosts DHS Cyberthreat Sharing but Critics Fear Backdoor to NSA Surveillance

December 18, 2015 FROM NEXTGOV arrow A funding deal approved by the House today and set to clear Congress within days positions the Department of Homeland Security as the front door for hack surveillance intelligence arriving from private industry. The back door, to the chagrin of some privacy activists, is the intelligence community. The 2,000-page $1.1...

US Considers Using Portable DNA Labs, Iris Scans to Vet Syrian Refugees

December 17, 2015 The U.S. government is considering a handful of new technologies to strengthen and potentially hasten the screening of Syrian refugees. Mobile DNA analyzers and iris-recognition systems are among the tools under consideration or recently deployed, as the Obama administration strives to let in thousands of individuals escaping Bashar al-Assad's regime...