Nextgov - Authors - Aliya Sternstein Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as <em>National Journal's Technology Daily</em>, <em>Federal Computer Week</em> and <em>Forbes</em>. Before joining <em>Government Executive</em>, Sternstein covered agriculture and derivatives trading for <em>Congressional Quarterly</em>. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.en-usFri, 27 Feb 2015 17:28:12 -0500White House Cyber Force Has a $140,000 Opening cyber defenders are always on guard. Take that, China.Aliya SternsteinFri, 27 Feb 2015 17:28:12 -0500 Cam/Shutterstock.comAnthem Health Care Hack Snared Federal Employees Who Weren’t Anthem Customers who knows how many?Aliya SternsteinFri, 27 Feb 2015 08:02:38 -0500 Conroy/APSpy Research Agency Is Building Psychic Machines to Predict Hacks publicly available Internet data, supercomputer-like systems will estimate when a prowler might try to breach a system.Aliya SternsteinMon, 23 Feb 2015 16:48:06 -0500 Jaguar supercomputer at a Department of Energy lab in Oak Ridge, Tenn. Oak Ridge National Lab/APHackers Threaten Military Families, Penetrate Gas Pump and Expose Porn Site Visitors to Viruses another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinMon, 23 Feb 2015 06:00:00 -0500 State Department Trashed 30,000 Log-in Key Fobs After Hack decision to replace tens of thousands of passcodes and two-step authentication credentials "was based on sound cybersecurity best practices,” a State official said.Aliya SternsteinFri, 20 Feb 2015 17:42:12 -0500 M. Alvarez/APThe IRS Knows What Computer You Are Using -- and That Might Be a Good Thing counter-fraud measure the agency is piloting will capture identifying data from the PC used to file a tax return. Multiple returns from the same device could signal fraud.Aliya SternsteinThu, 19 Feb 2015 17:24:51 -0500, DHS Quarantine Smartphones Returning from Abroad software may already have infected some phones and tablets.Aliya SternsteinWed, 18 Feb 2015 18:16:12 -0500 Lennihan/APThe Secret’s Out: NSA Personnel are Out-Hacking the Chinese and Russians all-star hacker group purportedly affiliated with U.S. intelligence has breached perhaps tens of thousands of individuals in sectors spanning government, telecommunications, energy, encryption and academia.Aliya SternsteinTue, 17 Feb 2015 17:31:52 -0500 National Security Agency's Utah Data Center in Bluffdale, Utah. Rick Bowmer/AP File PhotoHackers Poison Chipotle, Snoop on Forbes Readers and Swindle Commodities Traders another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinMon, 16 Feb 2015 06:00:00 -0500 user Michael SaechangThe Two Acronyms That are Key to Obama’s New Plan to Fight Hackers terms are essential for explaining how the government will expand information sharing with the private sector.Aliya SternsteinFri, 13 Feb 2015 07:24:08 -0500 Barack Obama speaks at the National Cybersecurity and Communications Integration Center in Arlington, Va.,Tuesday, Jan. 13, 2015. (AP Photo/Evan Vucci)Obama’s Geek Squad Could Not Rescue DHS Green Card System from High-Risk List, short for Electronic Immigration System and a tribute to Lady Liberty’s hospitality, has wound up on the High-Risk List.Aliya SternsteinWed, 11 Feb 2015 17:35:34 -0500 Robinson/Shutterstock.comObama’s New Cyber Agency Puts Spies in Charge of Sharing Threat Tips with Agencies new Cyber Threat Intelligence Integration Center will be patterned after the intelligence fusion center stood up in the aftermath of the Sept. 11, 2001, terrorist attacks.Aliya SternsteinTue, 10 Feb 2015 18:11:12 -0500 to the President for Homeland Security and Counterterrorism Lisa Monaco.Carolyn Kaster/APHackers Block Animal Shelter Donations, Pose As Cute Syrian Rebels on Skype, and Bust Into HipChat another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 06 Feb 2015 17:58:04 -0500 a Job? Cyber Command Is Halfway Full Pentagon is at the midway point of staffing a projected 6,000-person Cyber Command.Aliya SternsteinFri, 06 Feb 2015 17:40:34 -0500 States Military Academy cadets watch data on computers at the Cyber Research Center at the United States Military Academy in West Point, N.Y., Wednesday, April 9, 2014. The West Point cadets are fending off cyber attacks this week as part of an exe(AP Photo/Mel Evans)Exclusive: OPM Monitoring Anthem Hack; Feds Might Be Affected Office of Personnel Management is keeping a close eye on details emerging about a hack at the second biggest U.S. health insurer, Anthem Inc.Aliya SternsteinThu, 05 Feb 2015 15:59:59 -0500 Anthem logo hangs at the health insurer's corporate headquarters in Indianapolis.Michael Conroy/APPentagon Proposes At Least $27M to Grow Ranks of Cyber Forces military services each want to bring on board an additional 20 to 60 computer security whizzes starting next fall.Aliya SternsteinWed, 04 Feb 2015 16:17:45 -0500 Sgt. 1st Class Michael Deblock, Vermont Army National Guard Computer Network Defense Team, left, discusses new ways to make the exercise more challenging for cyber defenders with a fellow Red Cell team member during the 2014 Cyber Shield exercise.US ArmyObama Budget: How Far Does $14 Billion In Cyber Spending Go? the government departments asking for more cyber resources are the Pentagon and the Department of Homeland Security.Aliya SternsteinTue, 03 Feb 2015 07:28:59 -0500 House Debuts Dot-Gov Cyber Enforcement Squad"E-gov Cyber" will release data breach notification rules and score agencies' compliance with security policies.Aliya SternsteinMon, 02 Feb 2015 15:21:02 -0500 Visitor Surveillance System Brings Some Solace to Families of MH17 Victims database that houses the fingerprints of almost all foreign visitors to catch terrorists recently was used for a different purpose -- bringing closure to bereft families.Aliya SternsteinFri, 30 Jan 2015 17:05:14 -0500 rebel fighter guard an area of the Malaysia Airlines Flight 17 plane crash in the village of Hrabove, Donetsk region, eastern Ukraine.Mstyslan Chernov/Shutterstock.comHackers Redirect Malaysia Airlines, Pop Taylor Swift’s Twitter Account, and Harass Autistic Teen another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 30 Jan 2015 06:00:00 -0500 Swift performs in Times Square during New Year's Eve celebrations.Charles Sykes/APDHS Reveals Super Bowl Surveillance Techniques -- Sort Of will not be using sarcasm-detecting software they have expressed an interest in buying, the Secret Service said.Aliya SternsteinWed, 28 Jan 2015 18:45:26 -0500 Super Bowl XLIX logo is displayed on the University of Phoenix Stadium, Tuesday, Jan. 27, 2015, in Glendale, Ariz.Charlie Riedel/APDHS to Launch Iris and Facial Recognition at the Border project is part of a coming overhaul of DHS' biometric system, which currently contains more than 170 million foreigner fingerprints and facial images.Aliya SternsteinTue, 27 Jan 2015 18:08:49 -0500 and Inspectors Tussle Over Redactions in JFK Tech Audit Jan. 23 review found numerous cyber gaps, most having to do with hazardous climates in computer rooms and missing fire protection systems.Aliya SternsteinMon, 26 Jan 2015 18:11:28 -0500 line up to pass through the TSA security before boarding flights at John F. Kennedy International Airport.Mark Lennihan/APWhat Do CENTCOM’s Twitter Hack and GoDaddy Have in Common? Tennessee Valley Authority sites were compromised in 2013, when an adversary broke in through a software flaw.Aliya SternsteinMon, 26 Jan 2015 06:00:00 -0500 screen grab made Monday, Jan. 12, 2015 show the front page of the U.S. Central Command twitter account after is was hacked. APHackers Defile Crayola, Borrow F-35 Designs and Tick off Madonna another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinMon, 26 Jan 2015 06:00:00 -0500 Pablo Hidalgo - Fotos593/