author archives

Aliya Sternstein

Senior Correspondent

Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.

Results 21-30 of 2401

White House Details Draft Contractor Data Breach Rules

August 11, 2015 Agencies could have a template for data breach contract clauses as early as this fall, according to a detailed draft policy. Until now, federal standards, White House polices and governmentwide information security laws have offered departments and contractors a jumble of information security regulations from which to choose. The new...

Obama Asks for 72 Percent Raise in IRS Cyber Funding to Combat ID Thieves

August 11, 2015 This story has been updated. A flood of cybersecurity funding could rush into the Internal Revenue Service in fiscal 2016 -- under an updated budget document from the White House that includes a 72 percent raise in information security dollars. Following raids on taxpayer coffers by identity thieves, the Obama...

How Uber Could Help Change Spycraft

August 10, 2015 The intelligence community this month quietly released an unprecedented, unclassified five-year-roadmap charting the future of data analysis it wants commercial startups like ride-sharing firm Uber to read. The chart, part of a larger science and technology strategy, is aimed at encouraging unconventional makers like the car service app-developer and traditional...

How Uber Could Contribute to the Future of Spycraft

August 10, 2015 The intelligence community this month quietly released an unprecedented, unclassified five-year-roadmap charting the future of data analysis it wants commercial startups like ride-sharing firm Uber to read. The chart, part of a larger science and technology strategy, is aimed at encouraging unconventional makers like the car service app-developer and traditional...

Hackers Eye American Airlines Travelers, Con Ubiquiti C-Suite, and Vandalize Trump’s Place Online

August 10, 2015 In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: OPM Attackers Nabbed Data from American Airlines and Global Travel Booker Sabre A crew of Chinese cyberspies connected to the hack of federal personnel records also allegedly infiltrated computers at American Airlines and...

DHS Alerted Agencies to Malicious Email Attacks Days After Joint Staff Hack

August 7, 2015 The Department of Homeland Security's U.S. Computer Emergency Readiness Team warned agencies about targeted malicious emails, days after government officials reportedly detected that spearphishing was used to penetrate an unclassified Joint Staff network. A threat analyst who helped establish US-CERT criticized the alert's paucity of information on what infected computer...

The Pentagon Wants a Secretive Cyber Arms Dealer To Hack Its Networks

August 6, 2015 The protection arm of the U.S. Cyber Command says it needs products from Endgame, a company known for crafting hacking tools, but purely to safeguard military networks. The once uber-secretive vendor is part of the cyber arms trade, a legal but controversial industry that sells governments so-called exploits, or "zero...

CYBERCOM Wants Secretive Cyber Arms Dealer To Hack the Pentagon

August 6, 2015 The protection arm of the U.S. Cyber Command says it needs products from Endgame, a company known for crafting hacking tools, but purely to safeguard military networks. The once uber-secretive vendor is part of the cyber arms trade, a legal but controversial industry that sells governments so-called exploits, or "zero...

Contract to Notify and Protect OPM Hack Victims Now Out

August 5, 2015 Vendors who win the job of protecting the identities of 21.5 million victims of the largest known federal data breach will have to let the government inside their own databases, according to new contracting papers. The obligation to give up some confidentiality follows allegations that a background check contractor hacked...

Hackers Copy Secret Army Files, Follow United Fliers, and Expose Planned Parenthood Employee Names

August 3, 2015 In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Former Chinese Military Member Caught Downloading Secret Army Files Wei Chen, while serving as a U.S. defense contractor, allegedly plugged a personal thumb drive into computers connected to classified and unclassified networks, against...