Nextgov - Authors - Aliya Sternsteinhttp://www.nextgov.com/voices/aliya-sternstein/2337/Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as <em>National Journal's Technology Daily</em>, <em>Federal Computer Week</em> and <em>Forbes</em>. Before joining <em>Government Executive</em>, Sternstein covered agriculture and derivatives trading for <em>Congressional Quarterly</em>. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.en-usFri, 27 Feb 2015 17:28:12 -0500White House Cyber Force Has a $140,000 Openinghttp://www.nextgov.com/cybersecurity/2015/02/white-house-cyber-force-has-140000-opening/106344/Our cyber defenders are always on guard. Take that, China.Aliya SternsteinFri, 27 Feb 2015 17:28:12 -0500http://www.nextgov.com/cybersecurity/2015/02/white-house-cyber-force-has-140000-opening/106344/CybersecurityOrhan Cam/Shutterstock.comAnthem Health Care Hack Snared Federal Employees Who Weren’t Anthem Customershttp://www.nextgov.com/cybersecurity/2015/02/anthem-healthcare-hack-snared-federal-employees-who-werent-anthem-customers/106260/But who knows how many?Aliya SternsteinFri, 27 Feb 2015 08:02:38 -0500http://www.nextgov.com/cybersecurity/2015/02/anthem-healthcare-hack-snared-federal-employees-who-werent-anthem-customers/106260/CybersecurityMichael Conroy/APSpy Research Agency Is Building Psychic Machines to Predict Hackshttp://www.nextgov.com/cybersecurity/2015/02/spy-research-agency-building-psychic-machines-predict-hacks/105882/Using publicly available Internet data, supercomputer-like systems will estimate when a prowler might try to breach a system.Aliya SternsteinMon, 23 Feb 2015 16:48:06 -0500http://www.nextgov.com/cybersecurity/2015/02/spy-research-agency-building-psychic-machines-predict-hacks/105882/CybersecurityThe Jaguar supercomputer at a Department of Energy lab in Oak Ridge, Tenn. Oak Ridge National Lab/APHackers Threaten Military Families, Penetrate Gas Pump and Expose Porn Site Visitors to Viruseshttp://www.nextgov.com/cybersecurity/2015/02/hackers-threaten-military-families-penetrate-gas-pump-and-expose-porn-site-visitors-viruses/105765/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinMon, 23 Feb 2015 06:00:00 -0500http://www.nextgov.com/cybersecurity/2015/02/hackers-threaten-military-families-penetrate-gas-pump-and-expose-porn-site-visitors-viruses/105765/Cybersecurityhxdbzxy/Shutterstock.comEXCLUSIVE: State Department Trashed 30,000 Log-in Key Fobs After Hackhttp://www.nextgov.com/cybersecurity/2015/02/state-trashed-30000-login-key-fobs-after-hack/105762/The decision to replace tens of thousands of passcodes and two-step authentication credentials "was based on sound cybersecurity best practices,” a State official said.Aliya SternsteinFri, 20 Feb 2015 17:42:12 -0500http://www.nextgov.com/cybersecurity/2015/02/state-trashed-30000-login-key-fobs-after-hack/105762/CybersecurityLuis M. Alvarez/APThe IRS Knows What Computer You Are Using -- and That Might Be a Good Thinghttp://www.nextgov.com/cybersecurity/2015/02/irs-knows-what-computer-you-are-using/105666/One counter-fraud measure the agency is piloting will capture identifying data from the PC used to file a tax return. Multiple returns from the same device could signal fraud.Aliya SternsteinThu, 19 Feb 2015 17:24:51 -0500http://www.nextgov.com/cybersecurity/2015/02/irs-knows-what-computer-you-are-using/105666/CybersecurityPressmaster/Shutterstock.comJustice, DHS Quarantine Smartphones Returning from Abroadhttp://www.nextgov.com/cybersecurity/2015/02/justice-dhs-quarantine-smartphones-returning-abroad/105576/Malicious software may already have infected some phones and tablets.Aliya SternsteinWed, 18 Feb 2015 18:16:12 -0500http://www.nextgov.com/cybersecurity/2015/02/justice-dhs-quarantine-smartphones-returning-abroad/105576/CybersecurityMark Lennihan/APThe Secret’s Out: NSA Personnel are Out-Hacking the Chinese and Russians http://www.nextgov.com/cybersecurity/2015/02/secrets-out-nsa-personnel-hack-better-chinese-and-russians/105483/The all-star hacker group purportedly affiliated with U.S. intelligence has breached perhaps tens of thousands of individuals in sectors spanning government, telecommunications, energy, encryption and academia.Aliya SternsteinTue, 17 Feb 2015 17:31:52 -0500http://www.nextgov.com/cybersecurity/2015/02/secrets-out-nsa-personnel-hack-better-chinese-and-russians/105483/CybersecurityThe National Security Agency's Utah Data Center in Bluffdale, Utah. Rick Bowmer/AP File PhotoHackers Poison Chipotle, Snoop on Forbes Readers and Swindle Commodities Tradershttp://www.nextgov.com/cybersecurity/2015/02/hackers-poison-chipotle-snoop-forbes-readers-and-swindle-commodities-traders/105372/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinMon, 16 Feb 2015 06:00:00 -0500http://www.nextgov.com/cybersecurity/2015/02/hackers-poison-chipotle-snoop-forbes-readers-and-swindle-commodities-traders/105372/CybersecurityFlickr user Michael SaechangThe Two Acronyms That are Key to Obama’s New Plan to Fight Hackershttp://www.nextgov.com/cybersecurity/2015/02/two-acronyms-are-key-obamas-new-plan-fight-hackers/105291/The terms are essential for explaining how the government will expand information sharing with the private sector.Aliya SternsteinFri, 13 Feb 2015 07:24:08 -0500http://www.nextgov.com/cybersecurity/2015/02/two-acronyms-are-key-obamas-new-plan-fight-hackers/105291/CybersecurityPresident Barack Obama speaks at the National Cybersecurity and Communications Integration Center in Arlington, Va.,Tuesday, Jan. 13, 2015. (AP Photo/Evan Vucci)Obama’s Geek Squad Could Not Rescue DHS Green Card System from High-Risk Listhttp://www.nextgov.com/defense/2015/02/obamas-geek-squad-could-not-rescue-dhs-green-card-system/105147/ELIS, short for Electronic Immigration System and a tribute to Lady Liberty’s hospitality, has wound up on the High-Risk List.Aliya SternsteinWed, 11 Feb 2015 17:35:34 -0500http://www.nextgov.com/defense/2015/02/obamas-geek-squad-could-not-rescue-dhs-green-card-system/105147/DefenseLeena Robinson/Shutterstock.comObama’s New Cyber Agency Puts Spies in Charge of Sharing Threat Tips with Agencieshttp://www.nextgov.com/cybersecurity/2015/02/obama-creates-cyber-cia-or-obama-creates-cyber-counterterrorism-center/105051/The new Cyber Threat Intelligence Integration Center will be patterned after the intelligence fusion center stood up in the aftermath of the Sept. 11, 2001, terrorist attacks.Aliya SternsteinTue, 10 Feb 2015 18:11:12 -0500http://www.nextgov.com/cybersecurity/2015/02/obama-creates-cyber-cia-or-obama-creates-cyber-counterterrorism-center/105051/CybersecurityAssistant to the President for Homeland Security and Counterterrorism Lisa Monaco.Carolyn Kaster/APHackers Block Animal Shelter Donations, Pose As Cute Syrian Rebels on Skype, and Bust Into HipChathttp://www.nextgov.com/cybersecurity/2015/02/hackers-block-animal-shelter-donations-pose-cute-syrian-rebels-skype-and-bust-hipchat/104829/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 06 Feb 2015 17:58:04 -0500http://www.nextgov.com/cybersecurity/2015/02/hackers-block-animal-shelter-donations-pose-cute-syrian-rebels-skype-and-bust-hipchat/104829/CybersecurityNeed a Job? Cyber Command Is Halfway Fullhttp://www.nextgov.com/cybersecurity/2015/02/need-job-cyber-command-halfway-full/104817/The Pentagon is at the midway point of staffing a projected 6,000-person Cyber Command.Aliya SternsteinFri, 06 Feb 2015 17:40:34 -0500http://www.nextgov.com/cybersecurity/2015/02/need-job-cyber-command-halfway-full/104817/CybersecurityUnited States Military Academy cadets watch data on computers at the Cyber Research Center at the United States Military Academy in West Point, N.Y., Wednesday, April 9, 2014. The West Point cadets are fending off cyber attacks this week as part of an exe(AP Photo/Mel Evans)Exclusive: OPM Monitoring Anthem Hack; Feds Might Be Affectedhttp://www.nextgov.com/cybersecurity/2015/02/exclusive-opm-monitoring-anthem-hack-breach-could-impact-13m-feds/104700/The Office of Personnel Management is keeping a close eye on details emerging about a hack at the second biggest U.S. health insurer, Anthem Inc.Aliya SternsteinThu, 05 Feb 2015 15:59:59 -0500http://www.nextgov.com/cybersecurity/2015/02/exclusive-opm-monitoring-anthem-hack-breach-could-impact-13m-feds/104700/CybersecurityThe Anthem logo hangs at the health insurer's corporate headquarters in Indianapolis.Michael Conroy/APPentagon Proposes At Least $27M to Grow Ranks of Cyber Forceshttp://www.nextgov.com/cybersecurity/2015/02/pentagon-proposes-least-27-million-grow-ranks-cyber-forces/104592/The military services each want to bring on board an additional 20 to 60 computer security whizzes starting next fall.Aliya SternsteinWed, 04 Feb 2015 16:17:45 -0500http://www.nextgov.com/cybersecurity/2015/02/pentagon-proposes-least-27-million-grow-ranks-cyber-forces/104592/CybersecurityArmy Sgt. 1st Class Michael Deblock, Vermont Army National Guard Computer Network Defense Team, left, discusses new ways to make the exercise more challenging for cyber defenders with a fellow Red Cell team member during the 2014 Cyber Shield exercise.US ArmyObama Budget: How Far Does $14 Billion In Cyber Spending Go?http://www.nextgov.com/cybersecurity/2015/02/how-far-does-14-billion-cyber-spending-go/104370/Among the government departments asking for more cyber resources are the Pentagon and the Department of Homeland Security.Aliya SternsteinTue, 03 Feb 2015 07:28:59 -0500http://www.nextgov.com/cybersecurity/2015/02/how-far-does-14-billion-cyber-spending-go/104370/Cybersecurityronfromyork/Shutterstock.comWhite House Debuts Dot-Gov Cyber Enforcement Squadhttp://www.nextgov.com/cybersecurity/2015/02/white-house-debuts-dot-gov-cyber-enforcement-squad/104313/"E-gov Cyber" will release data breach notification rules and score agencies' compliance with security policies.Aliya SternsteinMon, 02 Feb 2015 15:21:02 -0500http://www.nextgov.com/cybersecurity/2015/02/white-house-debuts-dot-gov-cyber-enforcement-squad/104313/CybersecurityDecorwith.me/Shutterstock.comUS Visitor Surveillance System Brings Some Solace to Families of MH17 Victimshttp://www.nextgov.com/defense/2015/01/us-visitor-surveillance-system-brings-some-solace-mh17-victims-families/104202/A database that houses the fingerprints of almost all foreign visitors to catch terrorists recently was used for a different purpose -- bringing closure to bereft families.Aliya SternsteinFri, 30 Jan 2015 17:05:14 -0500http://www.nextgov.com/defense/2015/01/us-visitor-surveillance-system-brings-some-solace-mh17-victims-families/104202/DefensePro-Russian rebel fighter guard an area of the Malaysia Airlines Flight 17 plane crash in the village of Hrabove, Donetsk region, eastern Ukraine.Mstyslan Chernov/Shutterstock.comHackers Redirect Malaysia Airlines, Pop Taylor Swift’s Twitter Account, and Harass Autistic Teenhttp://www.nextgov.com/cybersecurity/2015/01/hackers-redirect-malaysia-airlines-pop-taylor-swifts-twitter-account-and-harass-autistic-teen/104124/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 30 Jan 2015 06:00:00 -0500http://www.nextgov.com/cybersecurity/2015/01/hackers-redirect-malaysia-airlines-pop-taylor-swifts-twitter-account-and-harass-autistic-teen/104124/CybersecurityTaylor Swift performs in Times Square during New Year's Eve celebrations.Charles Sykes/APDHS Reveals Super Bowl Surveillance Techniques -- Sort Ofhttp://www.nextgov.com/defense/2015/01/dhs-reveals-super-bowl-surveillance-techniques-kinda/104016/Agents will not be using sarcasm-detecting software they have expressed an interest in buying, the Secret Service said.Aliya SternsteinWed, 28 Jan 2015 18:45:26 -0500http://www.nextgov.com/defense/2015/01/dhs-reveals-super-bowl-surveillance-techniques-kinda/104016/DefenseThe Super Bowl XLIX logo is displayed on the University of Phoenix Stadium, Tuesday, Jan. 27, 2015, in Glendale, Ariz.Charlie Riedel/APDHS to Launch Iris and Facial Recognition at the Borderhttp://www.nextgov.com/defense/2015/01/dhs-launch-iris-and-facial-recognition-border/103908/The project is part of a coming overhaul of DHS' biometric system, which currently contains more than 170 million foreigner fingerprints and facial images.Aliya SternsteinTue, 27 Jan 2015 18:08:49 -0500http://www.nextgov.com/defense/2015/01/dhs-launch-iris-and-facial-recognition-border/103908/Defensera2studio/Shutterstock.comTSA and Inspectors Tussle Over Redactions in JFK Tech Audithttp://www.nextgov.com/cybersecurity/2015/01/tsa-and-inspectors-fight-over-redactions-jfk-airport-cyber-audit/103770/A Jan. 23 review found numerous cyber gaps, most having to do with hazardous climates in computer rooms and missing fire protection systems.Aliya SternsteinMon, 26 Jan 2015 18:11:28 -0500http://www.nextgov.com/cybersecurity/2015/01/tsa-and-inspectors-fight-over-redactions-jfk-airport-cyber-audit/103770/CybersecurityPassengers line up to pass through the TSA security before boarding flights at John F. Kennedy International Airport.Mark Lennihan/APWhat Do CENTCOM’s Twitter Hack and GoDaddy Have in Common? http://www.nextgov.com/cybersecurity/2015/01/what-do-godaddy-and-centcoms-twitter-have-common/103635/Two Tennessee Valley Authority sites were compromised in 2013, when an adversary broke in through a software flaw.Aliya SternsteinMon, 26 Jan 2015 06:00:00 -0500http://www.nextgov.com/cybersecurity/2015/01/what-do-godaddy-and-centcoms-twitter-have-common/103635/CybersecurityThis screen grab made Monday, Jan. 12, 2015 show the front page of the U.S. Central Command twitter account after is was hacked. APHackers Defile Crayola, Borrow F-35 Designs and Tick off Madonnahttp://www.nextgov.com/cybersecurity/2015/01/hackers-defile-crayola-borrow-f-35-designs-and-tick-madonna/103638/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinMon, 26 Jan 2015 06:00:00 -0500http://www.nextgov.com/cybersecurity/2015/01/hackers-defile-crayola-borrow-f-35-designs-and-tick-madonna/103638/Cybersecurity Pablo Hidalgo - Fotos593/Shutterstock.com