Nextgov - All Contenthttp://www.nextgov.com/Federal technology news, best practices, and web 2.0 tools.en-usTue, 22 Jul 2014 18:03:12 -0400How Technology Is Unraveling the Clues of Flight MH17http://www.nextgov.com/defense/2014/07/how-technology-unraveling-clues-flight-mh17/89366/A look at the technology helping piece together what happened to Flight MH17 in Ukraine.Patrick Tucker, Defense OneTue, 22 Jul 2014 18:03:12 -0400http://www.nextgov.com/defense/2014/07/how-technology-unraveling-clues-flight-mh17/89366/DefenseUkrainian Emergency workers carry a victim's body in a plastic bag at the crash site of Malaysia Airlines Flight 17.Dmitry Lovetsky/APFeds Join Lawsuit Alleging Symantec Overcharged Agencies for Softwarehttp://www.nextgov.com/cio-briefing/2014/07/feds-join-lawsuit-alleging-symantec-overcharged-agencies-software/89339/The feds say the company failed to disclose discounts to agencies.Rebecca CarrollTue, 22 Jul 2014 17:05:39 -0400http://www.nextgov.com/cio-briefing/2014/07/feds-join-lawsuit-alleging-symantec-overcharged-agencies-software/89339/CIO BriefingFlickr user Martin McKeayEmbassies Get Phone System Upgrades Thanks to New $275M Contracthttp://www.nextgov.com/technology-news/2014/07/embassies-get-phone-system-upgrades-thanks-new-275m-contract/89321/The task order will provide secure communications to more than 30 diplomatic posts.Frank KonkelTue, 22 Jul 2014 15:38:39 -0400http://www.nextgov.com/technology-news/2014/07/embassies-get-phone-system-upgrades-thanks-new-275m-contract/89321/NewsKen Wolter / Shutterstock.comFalse Air Force One Crash Reported on Hacked WSJ Facebook Pagehttp://www.nextgov.com/cybersecurity/2014/07/false-air-force-one-crash-reported-hacked-wsj-facebook-page/89306/The newspaper’s official account described the disappearance of Obama’s plane over Russian airspace.Nextgov StaffTue, 22 Jul 2014 15:06:23 -0400http://www.nextgov.com/cybersecurity/2014/07/false-air-force-one-crash-reported-hacked-wsj-facebook-page/89306/CybersecuritySenohrabek/Shutterstock.comDid the White House Website Violate Its Own Privacy Rules?http://www.nextgov.com/technology-news/2014/07/did-white-house-website-violate-its-own-privacy-rules/89300/A social-media firm used a new, persistent form of online tracking.Brendan Sasso, National JournalTue, 22 Jul 2014 14:24:44 -0400http://www.nextgov.com/technology-news/2014/07/did-white-house-website-violate-its-own-privacy-rules/89300/NewsOrhan Cam/Shutterstock.comVA Still Mulling Timeline for New Scheduling Systemhttp://www.nextgov.com/defense/whats-brewin/2014/07/va-still-mulling-timeline-new-scheduling-system/89291/Agency IT officials are still hammering out details for the overhaul.Bob Brewin, Government ExecutiveTue, 22 Jul 2014 13:14:40 -0400http://www.nextgov.com/defense/whats-brewin/2014/07/va-still-mulling-timeline-new-scheduling-system/89291/Defense - What's BrewinActing Veterans Affairs Secretary Sloan Gibson Jose Luis Magana/AP File PhotoiPhones Have a Major Security Hole That Apple Installed on Purposehttp://www.nextgov.com/mobile/2014/07/iphones-have-major-security-hole-apple-installed-purpose/89279/If you use an iPhone or iPad, your photos, web history, and GPS logs are vulnerable to theft and surveillance via back-door protocols running on all iOS devices.Zach Wener-Fligner, QuartzTue, 22 Jul 2014 11:09:35 -0400http://www.nextgov.com/mobile/2014/07/iphones-have-major-security-hole-apple-installed-purpose/89279/MobileAhn Young-joon/APIRS Seeks to Destroy More Hard Drives -- The Right Way This Timehttp://www.nextgov.com/big-data/2014/07/irs-has-many-more-hard-drives-destroy-wants-do-it-right-time/89264/Agency is also ‘refreshing employees’ awareness’ of existing policies, documents say.Rebecca CarrollTue, 22 Jul 2014 11:01:05 -0400http://www.nextgov.com/big-data/2014/07/irs-has-many-more-hard-drives-destroy-wants-do-it-right-time/89264/Big DataLois Lerner's emails were destroyed when her hard drive was destroyed, IRS has said.J. Scott Applewhite/AP file photoEvaluate Aspiring Cyberwarriors Using Gaming, Not Gradeshttp://www.nextgov.com/cybersecurity/2014/07/vet-aspiring-agency-cyberwarriors-using-computer-games-not-grades/89243/Former Navy Secretary wonders why federal recruitment focuses on formal education, when computer security positions require on-the-job learning.Aliya SternsteinTue, 22 Jul 2014 09:22:28 -0400http://www.nextgov.com/cybersecurity/2014/07/vet-aspiring-agency-cyberwarriors-using-computer-games-not-grades/89243/Cybersecurity"Why recruit for cyber on the basis of college degrees and the like when, in fact, what we really care about are skills that don't really correlate with that?" Richard Danzig asked.Defense Department file photoThe Most Valuable Data on Earth? http://www.nextgov.com/emerging-tech/emerging-tech-blog/2014/07/most-valuable-data-earth/89246/That’s a pun. Here’s the White House plan for Earth data.Rebecca CarrollTue, 22 Jul 2014 09:18:47 -0400http://www.nextgov.com/emerging-tech/emerging-tech-blog/2014/07/most-valuable-data-earth/89246/Emerging Tech - Emerging TechNASA file photoHackers Exploit MH17 Sorrow; Redirect Online Tributes to Malwarehttp://www.nextgov.com/cybersecurity/2014/07/hackers-exploit-mh17-sorrow-redirect-online-tributes-malware/89189/Fake Facebook pages set up for crash victims are driving traffic to pop-up ads on external sites.Nextgov StaffMon, 21 Jul 2014 16:45:40 -0400http://www.nextgov.com/cybersecurity/2014/07/hackers-exploit-mh17-sorrow-redirect-online-tributes-malware/89189/CybersecurityA man holds a sign which reads " MH17 Victims Rest In Peace" during a candlelight vigil for the victims who were on board the Malaysia Airlines jetliner.Vincent Thian/APNew Surveillance Whistleblower: The NSA Violates the Constitutionhttp://www.nextgov.com/defense/2014/07/new-surveillance-whistleblower-nsa-violates-constitution/89207/A former Obama administration official calls attention to unaccountable mass surveillance conducted under a 1981 executive order.Conor Friedersdorf, The AtlanticMon, 21 Jul 2014 16:16:58 -0400http://www.nextgov.com/defense/2014/07/new-surveillance-whistleblower-nsa-violates-constitution/89207/DefenseRena Schild/Shutterstock.comSenate Bill Mandates Study of Nuclear-Arms Storage Siteshttp://www.nextgov.com/defense/2014/07/senate-bill-mandates-study-nuclear-arms-storage-sites/89201/The legislation would require the Pentagon to study how to modernize facilities storing U.S. nuclear warheads.Rachel Oswald, Global Security NewswireMon, 21 Jul 2014 16:03:38 -0400http://www.nextgov.com/defense/2014/07/senate-bill-mandates-study-nuclear-arms-storage-sites/89201/DefenseSen. Mary Landrieu, D-La.Manuel Balce Ceneta/AP File PhotoIs There a Place for Google Glass in Hospitals?http://www.nextgov.com/health/2014/07/there-place-google-glass-hospitals/89198/Medical professionals say the device could be helpful, but patient privacy is still a concern.Vidya Viswanathan, The AtlanticMon, 21 Jul 2014 15:46:30 -0400http://www.nextgov.com/health/2014/07/there-place-google-glass-hospitals/89198/HealthSeth Wenig/APNOAA Moves a Step Closer to More Accurate Weather Forecastshttp://www.nextgov.com/emerging-tech/2014/07/5-6-instruments-next-gen-weather-satellite-ready-integration/89186/The magnetometer is the fifth main instrument to fly aboard the first Geostationary Operational Environmental Satellite.Frank Konkel, Government ExecutiveMon, 21 Jul 2014 15:05:26 -0400http://www.nextgov.com/emerging-tech/2014/07/5-6-instruments-next-gen-weather-satellite-ready-integration/89186/Emerging TechNOAABonusland: Nuke Waste Dump Contractor Awarded $1.9M after Firehttp://www.nextgov.com/defense/whats-brewin/2014/07/bonusland-nuke-waste-dump-contractor-awarded-19m-after-fire/89177/Energy Department cites “excellent” performance.Bob BrewinMon, 21 Jul 2014 12:30:43 -0400http://www.nextgov.com/defense/whats-brewin/2014/07/bonusland-nuke-waste-dump-contractor-awarded-19m-after-fire/89177/Defense - What's BrewinFirefighters practice responding to a simulated incident involving a WIPP shipment during an exercise.Energy DepartmentHackathon Aims to Spread Global Information to North Koreahttp://www.nextgov.com/cybersecurity/2014/07/hackathon-aims-spread-global-information-north-korea/89162/The Human Rights Foundation hopes to bring more information inside the very high, guarded walls of North Korea.Polly Mosendz, The WireMon, 21 Jul 2014 11:36:23 -0400http://www.nextgov.com/cybersecurity/2014/07/hackathon-aims-spread-global-information-north-korea/89162/CybersecurityNorth Korean soldiers bring flowers to the statues of the late leaders Kim Il Sung, left, and Kim Jong Il in Pyongyang, North Korea.Kim Kwang Hyon/APSignificant Deficiencies Found in Treasury’s Computer Securityhttp://www.nextgov.com/cybersecurity/2014/07/significant-deficiencies-found-treasurys-computer-security/89144/Weaknesses could cause disruption of key operations at bureau that manages federal debt.Aliya SternsteinMon, 21 Jul 2014 08:51:53 -0400http://www.nextgov.com/cybersecurity/2014/07/significant-deficiencies-found-treasurys-computer-security/89144/CybersecurityBill Perry/Shutterstock.comGAO: Weaknesses Remain in FDIC's Information Securityhttp://www.nextgov.com/cybersecurity/2014/07/gao-weaknesses-remain-fdics-information-security/89126/Unaddressed vulnerabilities left key financial systems at risk for misuse.Frank KonkelFri, 18 Jul 2014 17:16:04 -0400http://www.nextgov.com/cybersecurity/2014/07/gao-weaknesses-remain-fdics-information-security/89126/CybersecurityLukas Radavicius/Shutterstock.comAttention, Passengers: $15,000 Prize for Whoever Can Speed TSA Screeninghttp://www.nextgov.com/emerging-tech/2014/07/attention-passengers-15000-prize-whoever-can-speed-tsa-screening/89096/Agency launches online contest for citizens to design 5-minute wait line systems.Aliya SternsteinFri, 18 Jul 2014 16:20:50 -0400http://www.nextgov.com/emerging-tech/2014/07/attention-passengers-15000-prize-whoever-can-speed-tsa-screening/89096/Emerging TechAirline passengers go through the Transportation Security Administration security checkpoint at Hartsfield-Jackson Atlanta International Airport.Erik S. Lesser/AP File PhotoHackers Compromise Porn, Improve CNET’s Security, and Reveal Malware Ingredientshttp://www.nextgov.com/cybersecurity/2014/07/hackers-compromise-porn-improve-cnets-security-and-reveal-malware-ingredients/89102/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 18 Jul 2014 16:00:06 -0400http://www.nextgov.com/cybersecurity/2014/07/hackers-compromise-porn-improve-cnets-security-and-reveal-malware-ingredients/89102/Cybersecuritymhatzapa/Shutterstock.comHere's What It Will Take to 3-D Print Replacement Rocket Parts in Spacehttp://www.nextgov.com/emerging-tech/2014/07/heres-what-it-will-take-3-d-print-replacement-rocket-parts-space/89099/Start with the government designing a research roadmap, NRC says.Rebecca CarrollFri, 18 Jul 2014 15:56:14 -0400http://www.nextgov.com/emerging-tech/2014/07/heres-what-it-will-take-3-d-print-replacement-rocket-parts-space/89099/Emerging TechTwo people monitoring the performance of extruders inside the Made In Space experiment box during a microgravity portion of flight aboard a modified Boeing 727 from the Zero G Corporation.Made In Space, Inc./NASAOne Congressman’s Crusade to Save the World From Killer Robotshttp://www.nextgov.com/defense/2014/07/one-congressmans-crusade-save-world-killer-robots/89048/Robots could one day keep troops out of combat, but opponents say deploying them will have dangerous consequences.Alex Brown, National JournalFri, 18 Jul 2014 13:28:35 -0400http://www.nextgov.com/defense/2014/07/one-congressmans-crusade-save-world-killer-robots/89048/DefenseOciacia/Shutterstock.comThe Rise of the Wedding Dronehttp://www.nextgov.com/emerging-tech/2014/07/rise-wedding-drone/89054/Drones can take photos, even stand in as the ring bearer. But are they legal?Daniel A. Medina, QuartzFri, 18 Jul 2014 12:05:51 -0400http://www.nextgov.com/emerging-tech/2014/07/rise-wedding-drone/89054/Emerging TechJan Faukner/Shutterstock.comU.S.-China Nuclear Security Exchanges Hampered by Lingering Suspicionshttp://www.nextgov.com/defense/2014/07/us-china-nuclear-security-exchanges-hampered-lingering-suspicions/89045/Years after Washington accused China of nuclear espionage, the subject of resuming laboratory-to-laboratory exchanges among scientists remains a sensitive one.Rachel Oswald, Global Security NewswireFri, 18 Jul 2014 11:59:47 -0400http://www.nextgov.com/defense/2014/07/us-china-nuclear-security-exchanges-hampered-lingering-suspicions/89045/DefensePlutonium pits for the U.S. nuclear arsenal are cast at Los Alamos National Laboratory in 2005.Los Alamos National Laboratory