AUTHOR ARCHIVES

Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems for Nextgov. She has covered technology for nine years at such publications as National Journal's TechnologyDaily, Federal Computer Week and Forbes. Before joining Government Executive, she covered agriculture and derivatives trading for Congressional Quarterly. She has been a guest commentator on C-SPAN, WTOP and Federal News Radio. She is a graduate of the University of Pennsylvania.
Results 61-70 of 1925

Hackers Lift F-35 Plans, Infiltrate FBI Press Office

January 24, 2014 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Man nicks F-35 stats to try smuggling to Iran The technical information on the joint strike fighter was intercepted before reaching its intended recipient overseas. And the culprit, a naturalized U.S. citizen, was ...

The Whale Whisperer

January 21, 2014 David Wiley, a biologist at the National Oceanic and Atmospheric Administration, spearheaded development of an app that pinpoints, on digital nautical charts, places where ships might collide with endangered North Atlantic right whales. Only 500 of the mammals remain. Their biggest threat is boats. To protect the species, NOAA restricts ...

BlackBerrys Will Make Up 98% of Mobile Devices on New DOD System

January 17, 2014 A Pentagon system intended to secure a mix of brand name smartphones for warfighters will primarily support BlackBerrys when the tool starts launching later this month, according to Defense Department officials. About 80,000 BlackBerrys and 1,800 Defense-owned Apple and Android-based phones and tablets will begin being hooked up to the ...

Hackers Mortify Drunk Drivers, Attack Syrian Electronic Army, and Pay Back MIT

January 17, 2014 FROM NEXTGOV arrow In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Cops name and shame drunk drivers on Twitter Staffordshire Police are being investigated for potentially violating data protection laws by tweeting the identities of suspects, as part of a public awareness campaign. Syrian ...

BlackBerrys Will Make Up 98% of Mobile Devices on New Defensewide System

January 17, 2014 FROM NEXTGOV arrow A Pentagon system intended to secure a mix of brand name smartphones for warfighters will primarily support BlackBerrys when the tool starts launching later this month, according to Defense Department officials. About 80,000 BlackBerrys and 1,800 Defense-owned Apple and Android-based phones and tablets will begin being hooked up to the ...

Obama Establishes Big Data Privacy Panel as Part of NSA Reform

January 17, 2014 FROM NEXTGOV arrow President Obama on Friday announced major reforms to the National Security Agency, a response to revelations that the agency has been collecting massive amounts of data on nearly all U.S. citizens. Here's what he said about a new group he's tasked with reviewing privacy concerns in big data analysis. I ...

Congress Tries to Curtail NSA Spying, Sort Of

January 16, 2014 FROM NEXTGOV arrow Buried in a soon-to-pass government spending bill is a ban on the monitoring of any specific U.S. citizen's phone calls and online activities. The small, vague passage, however, leaves wiggle room for the National Security Agency to continue sweeping up Americans' call and Internet data en masse. The fiscal 2014 ...

Air Force Nuke Officers Used Text Messages to Cheat on Exam

January 16, 2014 FROM NEXTGOV arrow Thirty-four intercontinental ballistic missile launch officers at the Malmstrom Base in Montana are tied to a cheating scandal that came to light during a separate investigation into alleged drug possession, Air Force officials said. “This is not about the compromise of nuclear weapons. It's about compromise of the integrity of ...

Congress Cracks Down on Purchases of Chinese-Made IT

January 15, 2014 FROM NEXTGOV arrow Legislation expected to pass both the House and Senate by late this week bars several departments from buying Chinese-manufactured computer equipment until federal authorities conduct special inspections. The stipulation faces opposition from some unlikely corners though: U.S. businesses allegedly hacked by China have said the move will probably slow acquisitions ...

Cyber Command Budget More Than Doubles

January 14, 2014 The House approved a short-term federal spending bill on Tuesday to allow time for the expected passage of a fiscal 2014 spending package that includes $447 million for the Pentagon component that launches cyber weapons and deflects hacks against civilian and military networks. That’s more than a two-fold increase over ...