author archives

Aliya Sternstein

Senior Correspondent

Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.

Results 21-30 of 2537

This Cyber ‘Safeguard’ Is Hurting US Defenses

January 13, 2016 A lawmaker from Virginia's high-tech corridor is pressing Congress to delete hacking tools from an international arms control agreement. The deal -- reached in 2013 -- bans multinational firms and cyber vendors from transmitting information about "intrusion software" across borders without first obtaining a license. When the Obama administration proposed...

DHS Cyber Czar, Tech Titans Tell Commerce to Rethink Hacking Arms Control

January 13, 2016 A lawmaker from Virginia's high-tech corridor is pressing Congress to delete hacking tools from an international arms control agreement. The deal -- reached in 2013 -- bans multinational firms and cyber vendors from transmitting information about "intrusion software" across borders without first obtaining a license. When the Obama administration proposed...

Pentagon Will Investigate NSA Crackdown on Would-Be Snowdens

January 12, 2016 A Defense Department inspector general is initiating a review of a National Security Agency crackdown on computer users who have access to too much information. Be it a rogue contractor or an unknowing employee with sloppy login and logoff habits, insiders are a major threat to U.S. secrets, sayresearchers and...

Pentagon Investigators to Probe NSA’s Crackdown on Rogue IT Employees

January 11, 2016 A Defense Department inspector general is initiating a review of a National Security Agency crackdown on computer users who have access to too much information. Be it a rogue contractor or an unknowing employee with sloppy login and logoff habits, insiders are a major threat to U.S. secrets, say researchers...

Hackers Steal IDs of Troubled DC Youths, Compromise Time Warner Cable Passwords & Deface Russian Minister’s Instagram

January 11, 2016 In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Ex-D.C. Juvenile Justice Employee Sold Identities of Youth Offenders Marc Bell, 49, of Bowie, Maryland., worked from 2005 to 2013 at the D.C. Department of Youth Rehabilitation Services, where he became a key...

OPM Hackers Netted Usernames, Social Security Numbers Years Ago

January 7, 2016 When a foreign power as early as 2013 first hacked the Office of Personnel Management and retrieved IT manuals for its network, swept up in the heist were the usernames and the last four digits of the Social Security numbers of certain system users. That detail was not disclosed to...

OPM Still Hasn’t Answered Questions on Background Check Hack, Republicans Say

January 6, 2016 Congress is still waiting for details requested five months ago from the Office of Personnel Management about an agency data breach that allowed U.S. adversaries to obtain information on 21.5 million federal employees, national security contractors and their families, according to some Republican lawmakers. During a House hearing Thursday, the...

Obama Dispatches White House Tech Team to Expand Gun Background Check System

January 5, 2016 The White House has dispatched its computer rescue squad to amp up the bandwidth of the FBI's instant background check system, a program at the center of sweeping firearm reforms. On Tuesday, an emotional President Obama unveiled a series of executive actions to curb gun violence. Among them is a...

Pentagon Grants Contractors an Extension on Hack Detection Rules

January 4, 2016 The Pentagon has updated data breach rules for defense contractors to allow companies an extra year-and-a-half to comply with one portion. The original regulations, titled "Network Penetration Reporting and Contracting for Cloud Services," took effect Aug. 26, 2015, and cover more network problems and types of information than past guidelines....

Hackers Intercept Hotmail of China’s Critics & Dox Minnesota Constituents; US Voter Database Escapes

January 4, 2016 In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Chinese Government Broke Into Hotmail Accounts of International Critics Several years ago, after witnessing the email hacks, Hotmail provider Microsoft decided not to tell the victims, allowing Chinese authorities to continue their surveillance...