Nextgov - Authors - Aliya Sternsteinhttp://www.nextgov.com/voices/aliya-sternstein/2337/Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as <em>National Journal's Technology Daily</em>, <em>Federal Computer Week</em> and <em>Forbes</em>. Before joining <em>Government Executive</em>, Sternstein covered agriculture and derivatives trading for <em>Congressional Quarterly</em>. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.en-usMon, 20 Oct 2014 16:34:20 -0400The Number of Industries Getting Classified Cyberthreat Tips from DHS Has Doubled Since Julyhttp://www.nextgov.com/cybersecurity/2014/10/number-industries-getting-classified-cyberthreat-tips-dhs-has-doubled-july/96923/The banking, chemical, water, information technology and transportation sectors all recently joined.Aliya SternsteinMon, 20 Oct 2014 16:34:20 -0400http://www.nextgov.com/cybersecurity/2014/10/number-industries-getting-classified-cyberthreat-tips-dhs-has-doubled-july/96923/CybersecurityFinchen/Shutterstock.comHackers ‘Sandworm’ NATO, Incite Pakistan-India Cyber-rattling and Save Nude Snapchatshttp://www.nextgov.com/cybersecurity/2014/10/hackers-sandworm-nato-incite-pakistan-india-cyber-rattling-and-save-nude-snapchats/96806/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 17 Oct 2014 16:52:05 -0400http://www.nextgov.com/cybersecurity/2014/10/hackers-sandworm-nato-incite-pakistan-india-cyber-rattling-and-save-nude-snapchats/96806/Cybersecurityscyther5/Shutterstock.comObama Orders Two-Step IDs to Combat Credit Card Hackshttp://www.nextgov.com/cybersecurity/2014/10/obama-orders-two-step-ids-tamp-credit-card-hacks/96785/The executive order also requires agencies to switch to multifactor authentication to access sites that store citizens' personal information.Aliya SternsteinFri, 17 Oct 2014 15:30:41 -0400http://www.nextgov.com/cybersecurity/2014/10/obama-orders-two-step-ids-tamp-credit-card-hacks/96785/Cybersecurity Hamik/Shutterstock.comDo Not Click on That Ebola Vaccine Adhttp://www.nextgov.com/cybersecurity/2014/10/do-not-click-ebola-vaccine-ad/96710/DHS issues alert on contagion-inspired phishing schemes and online fraud.Aliya SternsteinFri, 17 Oct 2014 09:34:55 -0400http://www.nextgov.com/cybersecurity/2014/10/do-not-click-ebola-vaccine-ad/96710/Cybersecuritywk1003mike/Shutterstock.comJPMorgan Says Government Purchase Cards Not Affected by Hackhttp://www.nextgov.com/cybersecurity/2014/10/fed-jpmorgan-cardholders-can-breathe-sigh-relief/96662/Expense cards and government customers were not affected by this summer’s bank hack.Aliya SternsteinThu, 16 Oct 2014 16:59:00 -0400http://www.nextgov.com/cybersecurity/2014/10/fed-jpmorgan-cardholders-can-breathe-sigh-relief/96662/CybersecurityTK Kurikawa/Shutterstock.comHow Should the Government Respond to JPMorgan Hack?http://www.nextgov.com/cybersecurity/2014/10/how-should-government-respond-jpmorgan-hack/96485/If a nation state hacked JPMorgan, that deserves a government response, former top cop said.Aliya SternsteinWed, 15 Oct 2014 10:33:03 -0400http://www.nextgov.com/cybersecurity/2014/10/how-should-government-respond-jpmorgan-hack/96485/CybersecurityGil C/Shutterstock.comFBI’s Most Wanted Hackers: A Bingo Buff, Chinese Military Members and a PI for the Brokenhearted http://www.nextgov.com/cybersecurity/2014/10/fbis-most-wanted-hackers-bingo-player-chinese-military-members-and-pi-brokenhearted/96467/Pulling them from the keyboard likely won’t dent cybercrime, research indicates.Aliya SternsteinTue, 14 Oct 2014 17:08:12 -0400http://www.nextgov.com/cybersecurity/2014/10/fbis-most-wanted-hackers-bingo-player-chinese-military-members-and-pi-brokenhearted/96467/CybersecurityFBIDHS: Attackers Hacked Critical Manufacturing Firm For Monthshttp://www.nextgov.com/cybersecurity/2014/10/dhs-attackers-hacked-critical-manufacturing-firm-months/96317/An unnamed manufacturing firm vital to the U.S. economy recently suffered a prolonged hack.Aliya SternsteinFri, 10 Oct 2014 17:21:20 -0400http://www.nextgov.com/cybersecurity/2014/10/dhs-attackers-hacked-critical-manufacturing-firm-months/96317/Cybersecurityscyther5/Shutterstock.comHackers Cause Schizophrenia, Eavesdrop on Yahoo in China, and Hijack Unemployed Peoplehttp://www.nextgov.com/cybersecurity/2014/10/hackers-cause-schizophrenia-eavesdrop-yahoo-china-and-hijack-unemployed-people/96335/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 10 Oct 2014 16:55:59 -0400http://www.nextgov.com/cybersecurity/2014/10/hackers-cause-schizophrenia-eavesdrop-yahoo-china-and-hijack-unemployed-people/96335/CybersecurityEyePress/AP File PhotoCDC Tracks Cell Phone Location Data to Halt Ebolahttp://www.nextgov.com/mobile/2014/10/cdc-tracks-cell-phone-location-data-halt-ebola/96239/Meanwhile, the Pentagon is adapting a WMD surveillance system to map the spread of the disease.Aliya SternsteinThu, 09 Oct 2014 18:59:03 -0400http://www.nextgov.com/mobile/2014/10/cdc-tracks-cell-phone-location-data-halt-ebola/96239/MobileA youth under quarantine sits behind a cordon outside his house in Moyamba town on the outskirts of Freetown, Sierra Leone.Michael Duff/APDo We Really Need More Cyber Awareness or Should We Put the Robots in Charge?http://www.nextgov.com/cybersecurity/2014/10/do-we-really-need-more-cyber-awareness/95981/Maybe the answer is making robots responsible for fighting hackers.Aliya SternsteinTue, 07 Oct 2014 16:34:31 -0400http://www.nextgov.com/cybersecurity/2014/10/do-we-really-need-more-cyber-awareness/95981/CybersecuritySergey Nivens/Shutterstock.comYes, Sunbathers, That's a Government-Commissioned Drone Above Youhttp://www.nextgov.com/emerging-tech/2014/10/yes-sunbathers-government-commissioned-drone-above-you/95894/Small Coast Guard robot planes would be deployed for public-safety missions.Aliya SternsteinTue, 07 Oct 2014 09:36:44 -0400http://www.nextgov.com/emerging-tech/2014/10/yes-sunbathers-government-commissioned-drone-above-you/95894/Emerging TechThese drones can see where you put your sunscreen.Zoom Team/Shutterstock.comShould Feds Be Afraid of a Popular Chinese Chat App?http://www.nextgov.com/cybersecurity/2014/10/should-feds-be-afraid-popular-chinese-chat-app/95696/WeChat’s U.S. footprint is increasing, despite allegations of spyware.Aliya SternsteinMon, 06 Oct 2014 04:00:00 -0400http://www.nextgov.com/cybersecurity/2014/10/should-feds-be-afraid-popular-chinese-chat-app/95696/Cybersecuritydolphfyn/Shutterstock.comHackers Out Sex Offenders, Infect New Country and Breach Security Firm’s Databasehttp://www.nextgov.com/cybersecurity/2014/10/hackers-out-sex-offenders-infect-new-country-and-breach-security-firms-database/95810/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 03 Oct 2014 17:37:53 -0400http://www.nextgov.com/cybersecurity/2014/10/hackers-out-sex-offenders-infect-new-country-and-breach-security-firms-database/95810/Cybersecuritycozyta/Shutterstock.comDHS No Longer Needs Permission Slips to Monitor Other Agencies' Networks for Vulnerabilitieshttp://www.nextgov.com/cybersecurity/2014/10/dhs-no-longer-needs-permission-slips-monitor-other-agencies-networks-vulnerabilities/95807/New rules published by the Office of Management and Budget require agencies to agree to proactive scanning.Aliya SternsteinFri, 03 Oct 2014 17:34:55 -0400http://www.nextgov.com/cybersecurity/2014/10/dhs-no-longer-needs-permission-slips-monitor-other-agencies-networks-vulnerabilities/95807/CybersecurityA reflection of the Department of Homeland Security logo in the eyeglasses of a cybersecurity analyst at the watch and warning center of the Department of Homeland Security's secretive cyber defense facility in Idaho Falls, Idaho. Mark J. Terrill/AP File PhotoContractors, Expect 72-hour Rule for Disclosing Corporate Hackshttp://www.nextgov.com/cybersecurity/2014/09/contractors-expect-72-hour-rule-disclosing-corporate-hacks/95399/The military requires breaches of company systems holding technical data be reported within three days – and so might the rest of the government.Aliya SternsteinMon, 29 Sep 2014 22:11:33 -0400http://www.nextgov.com/cybersecurity/2014/09/contractors-expect-72-hour-rule-disclosing-corporate-hacks/95399/CybersecurityJeff Wasserman/Shutterstock.comHush-hush Data Firm Palantir Snags ICE Case-Tracking Dealhttp://www.nextgov.com/big-data/2014/09/hush-hush-data-firm-palantir-snags-ice-case-tracking-deal/95333/The deal is part of an $818 million program to replace a 1980s-era watch-list system.Aliya SternsteinMon, 29 Sep 2014 14:31:50 -0400http://www.nextgov.com/big-data/2014/09/hush-hush-data-firm-palantir-snags-ice-case-tracking-deal/95333/Big DataIn this March 30, 2012 photo, Immigration and Customs Enforcement agents take a suspect into custody.Gregory Bull/AP File PhotoHackers Zero In on Subs, Steal Kentucky Patient Data and Foul Web Developer Site http://www.nextgov.com/cybersecurity/2014/09/hackers-zero-subs-steal-kentucky-patients-and-foul-web-developer-site/95252/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 26 Sep 2014 20:44:13 -0400http://www.nextgov.com/cybersecurity/2014/09/hackers-zero-subs-steal-kentucky-patients-and-foul-web-developer-site/95252/CybersecurityFlickr user Matthew C. WrightForget Supersonic Jets. The Military Needs an Odometer for Computer Chips.http://www.nextgov.com/cybersecurity/2014/09/forget-supersonic-jets-military-needs-odometer-computer-chips/95246/Project could keep out Chinese counterfeit chips from military systemsAliya SternsteinFri, 26 Sep 2014 17:05:29 -0400http://www.nextgov.com/cybersecurity/2014/09/forget-supersonic-jets-military-needs-odometer-computer-chips/95246/CybersecurityRaimundas/Shutterstock.comFBI Can’t Find Files After Spending $550M to Digitize Themhttp://www.nextgov.com/cio-briefing/2014/09/fbi-cant-find-files-after-spending-550m-digitize-them/95024/Fumbling with computerized case-management system leaves less time for investigations, IG says.Aliya SternsteinWed, 24 Sep 2014 17:20:44 -0400http://www.nextgov.com/cio-briefing/2014/09/fbi-cant-find-files-after-spending-550m-digitize-them/95024/CIO BriefingFling cabinets at FBI headquarters/FBIFBI Plans Rapid DNA Dragnetshttp://www.nextgov.com/emerging-tech/2014/09/fbi-plans-rapid-dna-dragnets/94892/FBI could collect stop-and-swab genetic records in biometric ID database.Aliya SternsteinTue, 23 Sep 2014 16:50:35 -0400http://www.nextgov.com/emerging-tech/2014/09/fbi-plans-rapid-dna-dragnets/94892/Emerging TechWinfried Rothermel/AP File PhotoCould the Internet Have Prevented $5.2 Billion From Going to IRS Refund Thieves?http://www.nextgov.com/cybersecurity/2014/09/could-internet-have-prevented-52-billion-going-id-thieves/94751/Mailed-in forms are the culprit in growing tax refund fraud.Aliya SternsteinMon, 22 Sep 2014 16:50:15 -0400http://www.nextgov.com/cybersecurity/2014/09/could-internet-have-prevented-52-billion-going-id-thieves/94751/CybersecurityIevgenia Tkach/Shutterstock.comLess than Half of Feds Say Security Is Key Part of Their Mobile Strategyhttp://www.nextgov.com/cybersecurity/2014/09/less-half-feds-say-security-key-part-their-mobile-strategy/94667/It’s very likely employees are uploading work to Dropbox and Box.net without consent.Aliya SternsteinMon, 22 Sep 2014 07:36:55 -0400http://www.nextgov.com/cybersecurity/2014/09/less-half-feds-say-security-key-part-their-mobile-strategy/94667/CybersecurityMaksim Kabakou/Shutterstock.comHackers Compromise iPhone Ads, Go Incognito 12 Years in Europe, and Infect Bloggershttp://www.nextgov.com/cybersecurity/2014/09/hackers-compromise-iphone-ads-go-incognito-12-years-europe-and-infect-bloggers/94640/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 19 Sep 2014 17:03:06 -0400http://www.nextgov.com/cybersecurity/2014/09/hackers-compromise-iphone-ads-go-incognito-12-years-europe-and-infect-bloggers/94640/CybersecurityGil C/Shutterstock.comNCI Seals $41 Million Deal to Support Army Cyber Opshttp://www.nextgov.com/cybersecurity/2014/09/nci-seals-41-million-deal-support-army-cyber-ops/94550/Will provide NETCOM synchronized and secure information operations for missions.Aliya SternsteinFri, 19 Sep 2014 09:09:26 -0400http://www.nextgov.com/cybersecurity/2014/09/nci-seals-41-million-deal-support-army-cyber-ops/94550/Cybersecurityjcjgphotography/Shutterstock.com