Nextgov - Authors - Aliya Sternsteinhttp://www.nextgov.com/voices/aliya-sternstein/2337/Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as <em>National Journal's Technology Daily</em>, <em>Federal Computer Week</em> and <em>Forbes</em>. Before joining <em>Government Executive</em>, Sternstein covered agriculture and derivatives trading for <em>Congressional Quarterly</em>. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.en-usFri, 27 Mar 2015 17:13:54 -0400Hackers Take on Amazon’s Twitch Gaming Service, Con Car Accident Victims and Cause ‘Deep Shido’ for Judo Club http://www.nextgov.com/cybersecurity/2015/03/hackers-take-amazons-twitch-gaming-service-con-car-accident-victims-and-cause-deep-shido-judo-club/108688/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 27 Mar 2015 17:13:54 -0400http://www.nextgov.com/cybersecurity/2015/03/hackers-take-amazons-twitch-gaming-service-con-car-accident-victims-and-cause-deep-shido-judo-club/108688/CybersecurityHuman Trust Overpowered High-Tech Security in German Air Plane Crashhttp://www.nextgov.com/defense/2015/03/human-trust-overpowered-high-tech-security-german-air-plane-crash/108592/Experts say the downing of Germanwings flight 9525 seems like the classic case of the insider threat -- which belies easy tech fixes.Aliya SternsteinThu, 26 Mar 2015 18:22:35 -0400http://www.nextgov.com/defense/2015/03/human-trust-overpowered-high-tech-security-german-air-plane-crash/108592/DefenseRescue workers work on debris of the Germanwings jet at the crash site near Seyne-les-Alpes, France, Thursday, March 26, 2015.Laurent Cipriani/APThe Smartest Hackers in the Room (Hint: They're Not the Humans)http://www.nextgov.com/cybersecurity/2015/03/smartest-hackers-room-or-these-are-smartest-hackers-world/108466/The $2 million “Cyber Grand Challenge” pits hacker-fighting software against malicious code programmed by Pentagon personnel.Aliya SternsteinWed, 25 Mar 2015 17:48:26 -0400http://www.nextgov.com/cybersecurity/2015/03/smartest-hackers-room-or-these-are-smartest-hackers-world/108466/Cybersecuritywk1003mike/Shutterstock.comAgencies Waited Nearly a Month and a Half to Fix High-Threat Vulnerabilitieshttp://www.nextgov.com/cybersecurity/2015/03/agencies-waited-nearly-month-and-half-fix-high-threat-vulnerabilities/108232/Initial "anti-phishing" and malware defense reports show the mean time for dealing with "high findings" flagged by vulnerability scans was 42 days.Aliya SternsteinTue, 24 Mar 2015 16:08:55 -0400http://www.nextgov.com/cybersecurity/2015/03/agencies-waited-nearly-month-and-half-fix-high-threat-vulnerabilities/108232/CybersecurityEugene Sergeev/Shutterstock.comState Says It Mistakenly Gave Itself an F on Email Security http://www.nextgov.com/cybersecurity/2015/03/state-says-it-mistakenly-gave-itself-f-email-security-or-state-says-it-mistakenly-reported-flunking-email-security/108142/A buggy scoring system and self-reporting mistakes are partly to blame for State earning "0" marks on email encryption, officials say.Aliya SternsteinMon, 23 Mar 2015 12:23:18 -0400http://www.nextgov.com/cybersecurity/2015/03/state-says-it-mistakenly-gave-itself-f-email-security-or-state-says-it-mistakenly-reported-flunking-email-security/108142/CybersecurityMark Van Scyoc/Shutterstock.comHackers Fleece Sam’s Club, Snoop on Chinese Military Projects, and Poach IDs from Blue Cross, Againhttp://www.nextgov.com/cybersecurity/2015/03/hackers-fleece-sams-club-snoop-chinese-military-projects-and-poach-ids-blue-cross-again/108120/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 20 Mar 2015 16:49:20 -0400http://www.nextgov.com/cybersecurity/2015/03/hackers-fleece-sams-club-snoop-chinese-military-projects-and-poach-ids-blue-cross-again/108120/CybersecurityKen Wolter/Shutterstock.comThis Is How the Military Eyes ISIS Oil Laundering from the Skyhttp://www.nextgov.com/defense/2015/03/how-military-eyes-isis-oil-laundering-sky/108006/By watching signs of the black market oil industry, NGA can glean clues to help its partners choke off the source of ISIS' money and fuel.Aliya SternsteinFri, 20 Mar 2015 07:00:00 -0400http://www.nextgov.com/defense/2015/03/how-military-eyes-isis-oil-laundering-sky/108006/DefenseFighters from the al-Qaida linked Islamic State of Iraq and the Levant (ISIL) during a parade in Raqqa, Syria.Raqqa Media Center/APIn Nod To Privacy, Feds Say Every Agency Website Will Be Encrypted http://www.nextgov.com/cybersecurity/2015/03/every-federal-website-will-be-https-encryptedsomeday/107805/While the "HTTPS-Only Standard" makeover likely won’t happen overnight, privacy proponents cheered the effort.Aliya SternsteinWed, 18 Mar 2015 05:00:00 -0400http://www.nextgov.com/cybersecurity/2015/03/every-federal-website-will-be-https-encryptedsomeday/107805/CybersecurityWhitehouse.gov/APUS Military Cybersecurity by the Numbershttp://www.nextgov.com/cybersecurity/2015/03/us-military-cybersecurity-numbers/107637/Money for the Cyber Command – tasked with orchestrating network defense maneuvers and offensive cyberattacks – eventually will stabilize over the next five years, totaling out at $1 billion.Aliya SternsteinMon, 16 Mar 2015 15:35:07 -0400http://www.nextgov.com/cybersecurity/2015/03/us-military-cybersecurity-numbers/107637/CybersecurityCyber Command chief Adm. Mike RogersAP PhotoUnpaid Suspension of Federal Hydrologist Once Accused of Illegal Army Downloads Is Under Reviewhttp://www.nextgov.com/cybersecurity/2015/03/unpaid-suspension-federal-hydrologist-once-accused-illegal-army-downloads-under-review/107553/Justice has dropped charges against the naturalized citizen for stealing sensitive dam records.Aliya SternsteinMon, 16 Mar 2015 09:14:25 -0400http://www.nextgov.com/cybersecurity/2015/03/unpaid-suspension-federal-hydrologist-once-accused-illegal-army-downloads-under-review/107553/CybersecurityThe Hoover Dam, as seen from the heliport in Boulder City, Nev.Pablo Martinez Monsivais/APHackers Infiltrate University of Chicago, Violate Privacy of Ex-Wife’s Medical Patients, and Aid Private Eyeshttp://www.nextgov.com/cybersecurity/2015/03/hackers-infiltrate-university-chicago-violate-privacy-ex-wifes-medical-patients-and-aid-private-eyes/107532/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 13 Mar 2015 15:51:07 -0400http://www.nextgov.com/cybersecurity/2015/03/hackers-infiltrate-university-chicago-violate-privacy-ex-wifes-medical-patients-and-aid-private-eyes/107532/CybersecurityEQRoy/Shutterstock.comNew USCIS Computer Was Supposed to Speed Up Immigration Processing. What Went Wrong?http://www.nextgov.com/cio-briefing/2015/03/new-uscis-computer-was-supposed-speed-immigration-processing-what-went-wrong/107505/The online system to automate the processing of Green Cards and other immigration benefits has struggled to function properly since at least 2009Aliya SternsteinFri, 13 Mar 2015 13:40:47 -0400http://www.nextgov.com/cio-briefing/2015/03/new-uscis-computer-was-supposed-speed-immigration-processing-what-went-wrong/107505/CIO BriefingChrist ChavezTreasury Begins Automating Cyber Tip-Sharing with Bankshttp://www.nextgov.com/cybersecurity/2015/03/treasury-begins-automating-cyber-tip-sharing-banks/107382/The technology upgrade follows heavy assaults on Wall Street networks over the past few years.Aliya SternsteinThu, 12 Mar 2015 13:58:08 -0400http://www.nextgov.com/cybersecurity/2015/03/treasury-begins-automating-cyber-tip-sharing-banks/107382/CybersecurityTrader Robert McQuade, right, works on the floor of the New York Stock Exchange, Thursday, March 5, 2015.Richard Drew/APPentagon on Path to Launch Hacker-Proof Boeing Drone by 2018http://www.nextgov.com/cybersecurity/2015/03/pentagon-path-launch-hacker-proof-boeing-drone-2018/107250/Defense industry programmers are rewriting software on the helicopter drone to prevent outsiders from digitally infiltrating the aerial vehicle.Aliya SternsteinWed, 11 Mar 2015 16:18:53 -0400http://www.nextgov.com/cybersecurity/2015/03/pentagon-path-launch-hacker-proof-boeing-drone-2018/107250/CybersecurityBoeing's unmanned little bird drone.BoeingState Says it Needs to Rebuild Classified Computer Networks after Hackhttp://www.nextgov.com/cybersecurity/2015/03/state-rebuild-classified-computer-networks-after-hack/107157/State has asked Congress for $10 million to support "the necessary re-architecting of the classified and unclassified networks” at the departmentAliya SternsteinTue, 10 Mar 2015 17:13:40 -0400http://www.nextgov.com/cybersecurity/2015/03/state-rebuild-classified-computer-networks-after-hack/107157/CybersecurityState Department headquarters.J. Scott Applewhite/AP File PhotoWhy the National Geospatial Intelligence Agency Has Eyes on the Arctichttp://www.nextgov.com/defense/2015/03/wanna-see-spy-maps-coming-cold-war-arctic/107028/NGA’s focus on the North Pole could allow the agency to go even more open source.Aliya SternsteinMon, 09 Mar 2015 16:07:28 -0400http://www.nextgov.com/defense/2015/03/wanna-see-spy-maps-coming-cold-war-arctic/107028/DefenseNGA Director Robert CardilloNational Geospatial-Intelligence AgencyIsis -- No, Not That One -- Wins $7 Million Pentagon Cyber Contract http://www.nextgov.com/defense/2015/03/isis-no-not-one-wins-7-million-pentagon-cyber-contract/106959/The Pentagon has hired a little-known Virginia startup with an unfortunate name to work on a big data project.Aliya SternsteinSun, 08 Mar 2015 21:41:31 -0400http://www.nextgov.com/defense/2015/03/isis-no-not-one-wins-7-million-pentagon-cyber-contract/106959/DefenseFrontpage/Shutterstock.comHackers Con Telecom IT Support Worker, Bilk Mandarin Oriental Guests and Trigger Bogus Bomb Alarm at a Mallhttp://www.nextgov.com/cybersecurity/2015/03/hackers-con-telecom-it-support-worker-bilk-mandarin-oriental-guests-and-trigger-bogus-bomb-alarm-mall/106929/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 06 Mar 2015 14:58:21 -0500http://www.nextgov.com/cybersecurity/2015/03/hackers-con-telecom-it-support-worker-bilk-mandarin-oriental-guests-and-trigger-bogus-bomb-alarm-mall/106929/CybersecurityGordon Bell/Shutterstock.comAttention, Cyber Pros: The Pentagon Wants You -- 3,000 of Youhttp://www.nextgov.com/cybersecurity/2015/03/pentagon-has-until-2016-extend-3000-jobs-offers-civilian-cyber-whizzes/106842/The military has been given the go-ahead to fast-track the hiring of 3,000 computer whiz civilians.Aliya SternsteinThu, 05 Mar 2015 17:12:24 -0500http://www.nextgov.com/cybersecurity/2015/03/pentagon-has-until-2016-extend-3000-jobs-offers-civilian-cyber-whizzes/106842/CybersecurityThree military cyber professionals conduct an exercise during Cyber Flag 13-1, Nov. 8, 2012, at Nellis Air Force Base, Nev. US Air ForceFallout from Clinton’s Private Emails: How Secure are Agency Email Systems?http://www.nextgov.com/cybersecurity/2015/03/how-easy-it-dox-official-secretary-state/106746/Official government email accounts are no locked fortresses, and some shirk key federal security regulations.Aliya SternsteinThu, 05 Mar 2015 09:08:38 -0500http://www.nextgov.com/cybersecurity/2015/03/how-easy-it-dox-official-secretary-state/106746/CybersecurityBebeto Matthews/AP File Photo6 Biggest Blunders in Government's Annual Cyber Report Cardhttp://www.nextgov.com/cybersecurity/2015/03/6-biggest-blunders-governments-annual-cyber-report-card/106512/The White House has released its yearly assessment of agency compliance with the governmentwide cyber laws.Aliya SternsteinMon, 02 Mar 2015 19:03:24 -0500http://www.nextgov.com/cybersecurity/2015/03/6-biggest-blunders-governments-annual-cyber-report-card/106512/CybersecuritySergey NivensClapper: Maintaining Phone Call Surveillance is Like Buying Insurancehttp://www.nextgov.com/cybersecurity/2015/03/clapper-running-phone-call-surveillance-buying-insurance/106485/The nation's top spy said keeping logs of U.S. citizens' phone calls is a preventive measure for discerning potential threats.Aliya SternsteinMon, 02 Mar 2015 16:33:41 -0500http://www.nextgov.com/cybersecurity/2015/03/clapper-running-phone-call-surveillance-buying-insurance/106485/CybersecurityDirector of National Intelligence James Clapper J. Scott Applewhite/APHackers Cut In Line for Burning Man Tickets, Hack Back Against Lenovo and Scam Illinois Copshttp://www.nextgov.com/cybersecurity/2015/03/hackers-cut-line-burning-man-tickets-hack-back-against-lenovo-and-scam-illinois-cops/106350/Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinMon, 02 Mar 2015 09:45:14 -0500http://www.nextgov.com/cybersecurity/2015/03/hackers-cut-line-burning-man-tickets-hack-back-against-lenovo-and-scam-illinois-cops/106350/CybersecurityA scene from the 2014 Burning Man festival.Flickr user Gwen SchroederWhite House Cyber Force Has a $140,000 Openinghttp://www.nextgov.com/cybersecurity/2015/02/white-house-cyber-force-has-140000-opening/106344/Our cyber defenders are always on guard. Take that, China.Aliya SternsteinFri, 27 Feb 2015 17:28:12 -0500http://www.nextgov.com/cybersecurity/2015/02/white-house-cyber-force-has-140000-opening/106344/CybersecurityOrhan Cam/Shutterstock.comAnthem Health Care Hack Snared Federal Employees Who Weren’t Anthem Customershttp://www.nextgov.com/cybersecurity/2015/02/anthem-healthcare-hack-snared-federal-employees-who-werent-anthem-customers/106260/But who knows how many?Aliya SternsteinFri, 27 Feb 2015 08:02:38 -0500http://www.nextgov.com/cybersecurity/2015/02/anthem-healthcare-hack-snared-federal-employees-who-werent-anthem-customers/106260/CybersecurityMichael Conroy/AP