AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 61-70 of 2103

IRS Gave Sensitive Data to Convict Sentenced to 21 Years

August 14, 2014 FROM NEXTGOV arrow The Internal Revenue Service failed to conduct background checks on many contract workers who handled sensitive taxpayer data, an internal review reveals. The findings arrive at a time when identity theft has become an everyday threat in the public and private sectors. At the IRS, contractors hired for courier, printing, ...

The Navy Battles for ‘E*WARFARE’ Brand

August 13, 2014 FROM NEXTGOV arrow The Navy has trademarked the name "e*WARFARE" and registered to reserve the rights to "E*WARFARE" in a preemptive move to deflect lawyers and fraudsters. As of last week, e*WARFARE -- lowercase "e" and "WARFARE" in all capital letters, with an asterisk -- is the exclusive logo for official electronic warfare ...

Can You Profile a Suitcase? You Could Win a $15,000 Prize

August 12, 2014 FROM NEXTGOV arrow This story has been updated to include a comment from TSA. The Transportation Security Administration will pony up $15,000 for an idea for a system that crosschecks baggage tags against fliers’ personal data to determine the threat-level of their bags. The thinking is that this data exchange will save screeners ...

Who Receives Hacker Threat Info From DHS?

August 11, 2014 FROM NEXTGOV arrow Health care, banking and other key sectors at risk of cyberattacks have not joined a Department of Homeland Security program required to offer these industries protections against a potential catastrophic hack, according to federal inspectors. President Obama ordered in early 2013 that DHS expand an information-sharing program once restricted to ...

Will The Government Shred Your Contract After a Hack?

August 8, 2014 FROM NEXTGOV arrow Contractors are concerned they might lose government business for coming forward about suspected internal data breaches, after the unprecedented decision by two departments to halt contracts with a hacked background investigation firm. It is believed the personal information of Department of Homeland Security employees likely was compromised when a suspected ...

Hackers Hack Back China, Aim for Gizmodo Gadget Lovers and Hijack the Internet

August 8, 2014 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Activists broadcast anti-Communist messages on Chinese TV Residents in Wenzhou, a city in eastern Zhejiang province, had their normal television programming interrupted the night of Aug. 1 -- possibly by hacktivists who operate ...

The CIA Can’t Hack Senate Computers Because They Own Them, Experts Say

August 7, 2014 CIA personnel probably didn’t commit a hacking crime by rummaging through congressional computers used to research the agency's torture activities, former federal attorneys and scholars say. Some lawmakers are calling for a criminal probe into new findings by a CIA inspector general that the agency improperly searched Senate intelligence committee ...

CIA Didn’t Really Hack Senate Computers

August 6, 2014 FROM NEXTGOV arrow CIA personnel probably didn’t commit a hacking crime by rummaging through congressional computers used to research the agency's torture activities, former federal attorneys and scholars say. Some lawmakers are calling for a criminal probe into new findings by a CIA inspector general that the agency improperly searched Senate intelligence committee ...

Federal Computers Could Be Infected By Invisible Malware

August 5, 2014 A surge of malicious software hit news media websites during the first half of 2014, unleashing a threat to federal agencies that rely on those sites to get information, cybersecurity researchers say. Media networks were almost four times as likely to attract malware as the average enterprise network, likely because ...

Invisible Web Infection Poses Threat to Federal Computers

August 5, 2014 FROM NEXTGOV arrow A surge of malicious software hit news media websites during the first half of 2014, unleashing a threat to federal agencies that rely on those sites to get information, cybersecurity researchers say. Media networks were almost four times as likely to attract malware as the average enterprise network, likely because ...