Aliya Sternstein

Senior Correspondent Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.
Results 1641-1650 of 2710

ATF officials ignored red flags on website intended to help stop gun-trafficking

June 17, 2011 FROM NEXTGOV arrow Agents with the Bureau of Alcohol, Tobacco, Firearms and Explosives in Phoenix recorded abnormal sales of firearms in an electronic weapons-tracking system but no one intervened to stop the cross-border gunrunning, aides for Rep. Darrell Issa, R-Calif., chairman of the House Oversight and Government Reform Committee told Nextgov. Instead of...

Pentagon Concerned About Terrorists' Cyberwar Capabilities

June 16, 2011 FROM NEXTGOV arrow The Pentagon and foreign partners will follow the Cold War construct of "shared warning" to pursue enemies in cyberspace, Deputy Defense Secretary William J. Lynn III said on Thursday at the International Workshop on Global Security in Paris. Neither America nor its international partners have faced a true cyber attack...

Lawmakers finalize measure restricting government's use of GPS data

June 15, 2011 FROM NEXTGOV arrow A bipartisan group of House and Senate lawmakers on Wednesday finalized a bill that prohibits law enforcement officials from tracking the location of people's wireless devices without a warrant or parental consent, or unless an emergency is under way. The finished proposal represents a departure from an earlier version that...

On the Cyber Beat

June 15, 2011 Chief information security officers must balance mission requirements against threats to vital data. From the document leaking website WikiLeaks to the rise of smartphone computing, chief information security officers are confronting ever more threats to the data they are responsible for protecting. The number of attacks against federal networks increased...

Businesses urged to share more information on cyber threats

June 14, 2011 FROM NEXTGOV arrow The top counterterrorism official at the Homeland Security Department on Tuesday called on businesses to cooperate more with government when hit by hackers. "Let's face it -- cybersecurity primarily is a civilian space -- it is used mostly by businesses, but it is tied closely to national security," said Rand...

Hack of International Monetary Fund data raises global worries

June 13, 2011 FROM NEXTGOV arrow As world leaders grapple with the news that unidentified hackers have infiltrated the International Monetary Fund and obtained a large quantity of data -- the effects of which remain unknown -- some computer security and financial services experts speculated that such an attack on U.S. financial regulatory agencies would not...

From Nextgov: Hack of IMF data raises global worries

June 13, 2011 As world leaders grapple with the news that unidentified hackers have infiltrated the International Monetary Fund and obtained a large quantity of data -- the effects of which remain unknown -- some computer security and financial services experts speculated that such an attack on U.S. financial regulatory agencies would not...

Immigration Services Agency and FTC to Share Scam Tips Online

June 10, 2011 FROM NEXTGOV arrow The Federal Trade Commission is allowing the U.S. Citizenship and Immigration Services arm of the Homeland Security Department access to its secure consumer complaint database so USCIS officials can investigate scammers posing as immigration legal advisers, federal officials announced on Thursday. Typically only law enforcement officials can search through the...

ICE agents nab almost $15 million from software pirate's Swiss bank account

June 10, 2011 FROM NEXTGOV arrow U.S. Immigration and Customs Enforcement agents traced and seized about $15 million from sales of counterfeit antivirus software to a fugitive's Swiss bank account by relying on footwork and phone calls -- a nice break from cyber forensics, ICE investigators said on Friday. Witnesses tipped off ICE's Homeland Security Investigations...

FEMA watchdog endorses data mining to uncover overpayments

June 10, 2011 FROM NEXTGOV arrow Federal inspectors are calling for the Federal Emergency Management Agency to employ data mining software -- similar to that used by the board monitoring stimulus spending-- for preventing future losses, now that the agency is saddled with recovering about $643 million worth of potential overpayments for housing assistance. In a...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.