Nextgov - Authors - Aliya Sternsteinhttp://www.nextgov.com/voices/aliya-sternstein/2337/Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as <em>National Journal's Technology Daily</em>, <em>Federal Computer Week</em> and <em>Forbes</em>. Before joining <em>Government Executive</em>, Sternstein covered agriculture and derivatives trading for <em>Congressional Quarterly</em>. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.en-usFri, 24 Oct 2014 15:43:53 -0400Hackers Seize Terminally Ill Newborn’s Tribute Page, Take From Staples’ Till and Avenge Snapchat Archivist http://www.nextgov.com/cybersecurity/2014/10/hackers-seize-terminally-ill-newborns-tribute-page-rob-staples-till-and-avenge-snapchat-archivist/97361/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 24 Oct 2014 15:43:53 -0400http://www.nextgov.com/cybersecurity/2014/10/hackers-seize-terminally-ill-newborns-tribute-page-rob-staples-till-and-avenge-snapchat-archivist/97361/CybersecurityLynne Sladky/AP File Photo10 Crazy Devices the Secret Service Could Use to Put the Kibosh on Fence Jumpinghttp://www.nextgov.com/emerging-tech/2014/10/10-devices-secret-service-needs-put-kibosh-fence-jumping/97280/Terminator-like "RoBo," modeled after first dog Bo, should replace human agents.Aliya SternsteinThu, 23 Oct 2014 18:48:12 -0400http://www.nextgov.com/emerging-tech/2014/10/10-devices-secret-service-needs-put-kibosh-fence-jumping/97280/Emerging TechA Secret Service police officer keeps an eye on visitors on the sidewalk in front of the White House in Washington.Pablo Martinez Monsivais/APNOAA Considers Whether to Ax Employee Accused of Breaching Army Dam Fileshttp://www.nextgov.com/cybersecurity/2014/10/noaa-considers-whether-axe-employee-accused-breaching-army-dam-files/97094/Hydrologist Xiafen Chen was arrested at work for supposedly stealing sensitive, restricted information on critical infrastructure.Aliya SternsteinTue, 21 Oct 2014 18:45:44 -0400http://www.nextgov.com/cybersecurity/2014/10/noaa-considers-whether-axe-employee-accused-breaching-army-dam-files/97094/CybersecurityA view of the recently completed Portugues Dam. The dam, located near Ponce, Puerto Rico, is designed to reduce the impacts of flooding along the Portugues River.US ArmyThe Number of Industries Getting Classified Cyberthreat Tips from DHS Has Doubled Since Julyhttp://www.nextgov.com/cybersecurity/2014/10/number-industries-getting-classified-cyberthreat-tips-dhs-has-doubled-july/96923/The banking, chemical, water, information technology and transportation sectors all recently joined.Aliya SternsteinMon, 20 Oct 2014 16:34:20 -0400http://www.nextgov.com/cybersecurity/2014/10/number-industries-getting-classified-cyberthreat-tips-dhs-has-doubled-july/96923/CybersecurityFinchen/Shutterstock.comHackers ‘Sandworm’ NATO, Incite Pakistan-India Cyber-rattling and Save Nude Snapchatshttp://www.nextgov.com/cybersecurity/2014/10/hackers-sandworm-nato-incite-pakistan-india-cyber-rattling-and-save-nude-snapchats/96806/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 17 Oct 2014 16:52:05 -0400http://www.nextgov.com/cybersecurity/2014/10/hackers-sandworm-nato-incite-pakistan-india-cyber-rattling-and-save-nude-snapchats/96806/Cybersecurityscyther5/Shutterstock.comObama Orders Two-Step IDs to Combat Credit Card Hackshttp://www.nextgov.com/cybersecurity/2014/10/obama-orders-two-step-ids-tamp-credit-card-hacks/96785/The executive order also requires agencies to switch to multifactor authentication to access sites that store citizens' personal information.Aliya SternsteinFri, 17 Oct 2014 15:30:41 -0400http://www.nextgov.com/cybersecurity/2014/10/obama-orders-two-step-ids-tamp-credit-card-hacks/96785/Cybersecurity Hamik/Shutterstock.comDo Not Click on That Ebola Vaccine Adhttp://www.nextgov.com/cybersecurity/2014/10/do-not-click-ebola-vaccine-ad/96710/DHS issues alert on contagion-inspired phishing schemes and online fraud.Aliya SternsteinFri, 17 Oct 2014 09:34:55 -0400http://www.nextgov.com/cybersecurity/2014/10/do-not-click-ebola-vaccine-ad/96710/Cybersecuritywk1003mike/Shutterstock.comJPMorgan Says Government Purchase Cards Not Affected by Hackhttp://www.nextgov.com/cybersecurity/2014/10/fed-jpmorgan-cardholders-can-breathe-sigh-relief/96662/Expense cards and government customers were not affected by this summer’s bank hack.Aliya SternsteinThu, 16 Oct 2014 16:59:00 -0400http://www.nextgov.com/cybersecurity/2014/10/fed-jpmorgan-cardholders-can-breathe-sigh-relief/96662/CybersecurityTK Kurikawa/Shutterstock.comHow Should the Government Respond to JPMorgan Hack?http://www.nextgov.com/cybersecurity/2014/10/how-should-government-respond-jpmorgan-hack/96485/If a nation state hacked JPMorgan, that deserves a government response, former top cop said.Aliya SternsteinWed, 15 Oct 2014 10:33:03 -0400http://www.nextgov.com/cybersecurity/2014/10/how-should-government-respond-jpmorgan-hack/96485/CybersecurityGil C/Shutterstock.comFBI’s Most Wanted Hackers: A Bingo Buff, Chinese Military Members and a PI for the Brokenhearted http://www.nextgov.com/cybersecurity/2014/10/fbis-most-wanted-hackers-bingo-player-chinese-military-members-and-pi-brokenhearted/96467/Pulling them from the keyboard likely won’t dent cybercrime, research indicates.Aliya SternsteinTue, 14 Oct 2014 17:08:12 -0400http://www.nextgov.com/cybersecurity/2014/10/fbis-most-wanted-hackers-bingo-player-chinese-military-members-and-pi-brokenhearted/96467/CybersecurityFBIDHS: Attackers Hacked Critical Manufacturing Firm For Monthshttp://www.nextgov.com/cybersecurity/2014/10/dhs-attackers-hacked-critical-manufacturing-firm-months/96317/An unnamed manufacturing firm vital to the U.S. economy recently suffered a prolonged hack.Aliya SternsteinFri, 10 Oct 2014 17:21:20 -0400http://www.nextgov.com/cybersecurity/2014/10/dhs-attackers-hacked-critical-manufacturing-firm-months/96317/Cybersecurityscyther5/Shutterstock.comHackers Cause Schizophrenia, Eavesdrop on Yahoo in China, and Hijack Unemployed Peoplehttp://www.nextgov.com/cybersecurity/2014/10/hackers-cause-schizophrenia-eavesdrop-yahoo-china-and-hijack-unemployed-people/96335/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 10 Oct 2014 16:55:59 -0400http://www.nextgov.com/cybersecurity/2014/10/hackers-cause-schizophrenia-eavesdrop-yahoo-china-and-hijack-unemployed-people/96335/CybersecurityEyePress/AP File PhotoCDC Tracks Cell Phone Location Data to Halt Ebolahttp://www.nextgov.com/mobile/2014/10/cdc-tracks-cell-phone-location-data-halt-ebola/96239/Meanwhile, the Pentagon is adapting a WMD surveillance system to map the spread of the disease.Aliya SternsteinThu, 09 Oct 2014 18:59:03 -0400http://www.nextgov.com/mobile/2014/10/cdc-tracks-cell-phone-location-data-halt-ebola/96239/MobileA youth under quarantine sits behind a cordon outside his house in Moyamba town on the outskirts of Freetown, Sierra Leone.Michael Duff/APDo We Really Need More Cyber Awareness or Should We Put the Robots in Charge?http://www.nextgov.com/cybersecurity/2014/10/do-we-really-need-more-cyber-awareness/95981/Maybe the answer is making robots responsible for fighting hackers.Aliya SternsteinTue, 07 Oct 2014 16:34:31 -0400http://www.nextgov.com/cybersecurity/2014/10/do-we-really-need-more-cyber-awareness/95981/CybersecuritySergey Nivens/Shutterstock.comYes, Sunbathers, That's a Government-Commissioned Drone Above Youhttp://www.nextgov.com/emerging-tech/2014/10/yes-sunbathers-government-commissioned-drone-above-you/95894/Small Coast Guard robot planes would be deployed for public-safety missions.Aliya SternsteinTue, 07 Oct 2014 09:36:44 -0400http://www.nextgov.com/emerging-tech/2014/10/yes-sunbathers-government-commissioned-drone-above-you/95894/Emerging TechThese drones can see where you put your sunscreen.Zoom Team/Shutterstock.comShould Feds Be Afraid of a Popular Chinese Chat App?http://www.nextgov.com/cybersecurity/2014/10/should-feds-be-afraid-popular-chinese-chat-app/95696/WeChat’s U.S. footprint is increasing, despite allegations of spyware.Aliya SternsteinMon, 06 Oct 2014 04:00:00 -0400http://www.nextgov.com/cybersecurity/2014/10/should-feds-be-afraid-popular-chinese-chat-app/95696/Cybersecuritydolphfyn/Shutterstock.comHackers Out Sex Offenders, Infect New Country and Breach Security Firm’s Databasehttp://www.nextgov.com/cybersecurity/2014/10/hackers-out-sex-offenders-infect-new-country-and-breach-security-firms-database/95810/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 03 Oct 2014 17:37:53 -0400http://www.nextgov.com/cybersecurity/2014/10/hackers-out-sex-offenders-infect-new-country-and-breach-security-firms-database/95810/Cybersecuritycozyta/Shutterstock.comDHS No Longer Needs Permission Slips to Monitor Other Agencies' Networks for Vulnerabilitieshttp://www.nextgov.com/cybersecurity/2014/10/dhs-no-longer-needs-permission-slips-monitor-other-agencies-networks-vulnerabilities/95807/New rules published by the Office of Management and Budget require agencies to agree to proactive scanning.Aliya SternsteinFri, 03 Oct 2014 17:34:55 -0400http://www.nextgov.com/cybersecurity/2014/10/dhs-no-longer-needs-permission-slips-monitor-other-agencies-networks-vulnerabilities/95807/CybersecurityA reflection of the Department of Homeland Security logo in the eyeglasses of a cybersecurity analyst at the watch and warning center of the Department of Homeland Security's secretive cyber defense facility in Idaho Falls, Idaho. Mark J. Terrill/AP File PhotoContractors, Expect 72-hour Rule for Disclosing Corporate Hackshttp://www.nextgov.com/cybersecurity/2014/09/contractors-expect-72-hour-rule-disclosing-corporate-hacks/95399/The military requires breaches of company systems holding technical data be reported within three days – and so might the rest of the government.Aliya SternsteinMon, 29 Sep 2014 22:11:33 -0400http://www.nextgov.com/cybersecurity/2014/09/contractors-expect-72-hour-rule-disclosing-corporate-hacks/95399/CybersecurityJeff Wasserman/Shutterstock.comHush-hush Data Firm Palantir Snags ICE Case-Tracking Dealhttp://www.nextgov.com/big-data/2014/09/hush-hush-data-firm-palantir-snags-ice-case-tracking-deal/95333/The deal is part of an $818 million program to replace a 1980s-era watch-list system.Aliya SternsteinMon, 29 Sep 2014 14:31:50 -0400http://www.nextgov.com/big-data/2014/09/hush-hush-data-firm-palantir-snags-ice-case-tracking-deal/95333/Big DataIn this March 30, 2012 photo, Immigration and Customs Enforcement agents take a suspect into custody.Gregory Bull/AP File PhotoHackers Zero In on Subs, Steal Kentucky Patient Data and Foul Web Developer Site http://www.nextgov.com/cybersecurity/2014/09/hackers-zero-subs-steal-kentucky-patients-and-foul-web-developer-site/95252/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 26 Sep 2014 20:44:13 -0400http://www.nextgov.com/cybersecurity/2014/09/hackers-zero-subs-steal-kentucky-patients-and-foul-web-developer-site/95252/CybersecurityFlickr user Matthew C. WrightForget Supersonic Jets. The Military Needs an Odometer for Computer Chips.http://www.nextgov.com/cybersecurity/2014/09/forget-supersonic-jets-military-needs-odometer-computer-chips/95246/Project could keep out Chinese counterfeit chips from military systemsAliya SternsteinFri, 26 Sep 2014 17:05:29 -0400http://www.nextgov.com/cybersecurity/2014/09/forget-supersonic-jets-military-needs-odometer-computer-chips/95246/CybersecurityRaimundas/Shutterstock.comFBI Can’t Find Files After Spending $550M to Digitize Themhttp://www.nextgov.com/cio-briefing/2014/09/fbi-cant-find-files-after-spending-550m-digitize-them/95024/Fumbling with computerized case-management system leaves less time for investigations, IG says.Aliya SternsteinWed, 24 Sep 2014 17:20:44 -0400http://www.nextgov.com/cio-briefing/2014/09/fbi-cant-find-files-after-spending-550m-digitize-them/95024/CIO BriefingFling cabinets at FBI headquarters/FBIFBI Plans Rapid DNA Dragnetshttp://www.nextgov.com/emerging-tech/2014/09/fbi-plans-rapid-dna-dragnets/94892/FBI could collect stop-and-swab genetic records in biometric ID database.Aliya SternsteinTue, 23 Sep 2014 16:50:35 -0400http://www.nextgov.com/emerging-tech/2014/09/fbi-plans-rapid-dna-dragnets/94892/Emerging TechWinfried Rothermel/AP File PhotoCould the Internet Have Prevented $5.2 Billion From Going to IRS Refund Thieves?http://www.nextgov.com/cybersecurity/2014/09/could-internet-have-prevented-52-billion-going-id-thieves/94751/Mailed-in forms are the culprit in growing tax refund fraud.Aliya SternsteinMon, 22 Sep 2014 16:50:15 -0400http://www.nextgov.com/cybersecurity/2014/09/could-internet-have-prevented-52-billion-going-id-thieves/94751/CybersecurityIevgenia Tkach/Shutterstock.com