AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems for Nextgov. She has covered technology for nine years at such publications as National Journal's TechnologyDaily, Federal Computer Week and Forbes. Before joining Government Executive, she covered agriculture and derivatives trading for Congressional Quarterly. She has been a guest commentator on C-SPAN, WTOP and Federal News Radio. She is a graduate of the University of Pennsylvania.
Results 41-50 of 2020

Fake Dot-Gov Webmail Used in Phishing Scam to Hack EPA and Census Staff

June 12, 2014 FROM NEXTGOV arrow A Nigerian man has admitted to compromising the email accounts of federal employees to order agency office products that he then sold on the black market, according to newly filed court papers. Abiodun Adejohn and conspirators cheated government supply vendors out of almost $1 million worth of goods through the ...

CIA Live: Spy Agency Holds Public Summit

June 11, 2014 FROM NEXTGOV arrow In the first public conference given by the CIA, the agency's head defended the practice of surveilling cyberspace for threats, but questioned the extent to which potent tracking capabilities should be applied. “If we are to understand the world we cover and to provide our policymakers with the intelligence that ...

Who Needs Heartbleed When Many Dot-Govs Don't Even Encrypt Communications?

June 11, 2014 FROM NEXTGOV arrow More than a quarter of federal websites are not properly configured with software to prevent intruders from intercepting data entered by citizens, according to a new study. Federal sites in general scored 10 percent lower than online banking services and social media networks at site security and server configuration, researchers ...

DEA Spy Unit Seeks to Hasten Surveillance Using IT

June 10, 2014 FROM NEXTGOV arrow The Drug Enforcement Administration is drafting a potential contract for help with "rapid prototyping," data analysis and other information technology services within its special intelligence unit, according to federal databases. The office's current IT arrangement includes six separate operating environments with different classifications, and the chosen firm would be responsible ...

IRS Illegally Gave Taxpayer Data to the FBI in 2010, Republicans Say

June 9, 2014 FROM NEXTGOV arrow The IRS sent the FBI a huge database containing sensitive taxpayer information on nonprofit conservative groups, possibly in violation of federal law, House Republicans allege. The lawmakers claim the transfer was part of an intentional effort to potentially probe the organizations for illegal campaign activities. The IRS confirmed the data ...

Hackers Redirect Linkin Park Fans to Jay-Z, Raid AmEx and Expose Monsanto

June 6, 2014 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: 76,000 California AmEx users were victims of a breach by Anonymous American Express is in the process of notifying people whose credit card information was posted online in March, during a protest against ...

DHS Misses Congressional Due Date to Show That Port ID Cards Work

June 6, 2014 FROM NEXTGOV arrow The Homeland Security Department has missed a congressionally ordered April 17 deadline to show that a half-billion dollar program for distributing maritime employee identification smartcards and scanners has actually protected vulnerable port areas. DHS officials told Nextgov that an assessment of the effectiveness of the Transportation Worker Identification Credential program ...

Flaw Lets Hackers Control Electronic Highway Billboards

June 5, 2014 FROM NEXTGOV arrow The Homeland Security Department is cautioning transportation operators about a security hole in some electronic freeway billboards that could let hackers display bogus warnings to drivers. "The vulnerability is a hard-coded password that could allow unauthorized access to the highway sign," DHS officials said in an alert on Wednesday. [See ...

TSA Plans to Profile Your Suitcase

June 4, 2014 FROM NEXTGOV arrow The Transportation Security Administration is funding a system that will electronically cross-check baggage tags with a passenger's identification documents to determine the riskiness of the bag and how thoroughly to inspect it, according to a new strategic investment plan. The technology will “read risk of bags” by networking together the ...

Can Big Data Stop Cyber Threats?

June 3, 2014 FROM NEXTGOV arrow The quality of data and automation has not matured to the point where feeding information to machines can prevent cyberattacks, according to one former U.S. intelligence cyber chief. Right now, there's simply too much information, and it's inefficient to analyze it, said Roger Hockenberry, former chief technology officer for the ...