author archives

Aliya Sternstein

Senior Correspondent

Aliya Sternstein reports on cybersecurity and homeland security systems. She’s covered technology for more than a decade at such publications as National Journal's Technology Daily, Federal Computer Week and Forbes. Before joining Government Executive, Sternstein covered agriculture and derivatives trading for Congressional Quarterly. She’s been a guest commentator on C-SPAN, MSNBC, WAMU and Federal News Radio. Sternstein is a graduate of the University of Pennsylvania.

Results 31-40 of 2343

Watchdog Says Pentagon Needs to Crank Up ‘Insider Threat’ Monitoring

June 4, 2015 Work to rein in some post-Sept. 11 domestic surveillance practices ended with passage of a bill that limits the National Security Agency’s collection of U.S. call records. But regular Joes inside the Pentagon -- or at least those with access to sensitive or classified information -- should expect even greater...

After Breach, IRS Considers PINs for All Taxpayers

June 3, 2015 The first step to enhance security on an Internal Revenue Service website that identity thieves rigged to steal other people's tax returns was to pull the cord on it. Now, the tax agency is contemplating a range of identity-theft protections, including issuing taxpayers annual passcodes, before bringing the "Get Transcript"...

At IRS, Two-Factor Authentication Means Waiting For a Letter in Your Mailbox

June 3, 2015 You might assume the Internal Revenue Service online service for accessing tax returns exploited via a weak login system would quickly switch to two-factor authentication. After all, that's what Apple and Twitter did after the nude celebrity selfie breach and countless other high-profile tweet hijackings. But it's not that easy...

New Guidance Aims to Plug Peepholes in City Surveillance Systems

June 1, 2015 A Commerce Department standards body has released preliminary guidelines for masking the personal data of individuals captured by traffic sensors, speed cameras and other Internet-connected government systems. Coincidentally, the publication came out the day a Spanish researcher demonstrated that any stalker can monitor the driving habits of customers patronizing dozens...

Hackers Air Feds’ Sexual Preferences and Pose as Baltimore Prosecutor in Freddie Gray Case

May 29, 2015 In case you missed our coverage this week in ThreatWatch, Nextgov’s regularly updated index of cyber breaches: Sexual Preferences of Government Employees Allegedly Leaked The hack of dating site Adult FriendFinder has potentially subjected nearly 4 million people, including federal personnel, to the risk of blackmail and identity theft. “Andrew...

Pentagon Will Relaunch $475 Million Cyber Effort This Fall

May 29, 2015 After abandoning last week a $475 million job posting for cyberattack and network defense experts, the Pentagon now says a retooled solicitation that takes into account private sector questions will be out by Oct. 1. "Given significant interest along with technical and clarification questions from industry, U.S. Cyber Command is...

Cyber Command Says New Mega-Contract Will Be Out by Fall

May 28, 2015 After abandoning last week a $475 million job posting for cyberattack and network defense experts, the Pentagon now says a retooled solicitation that takes into account private sector questions will be out by Oct. 1. "Given significant interest along with technical and clarification questions from industry, U.S. Cyber Command is...

Other Agencies Use Same Log-on Procedures as Exploited IRS Site

May 27, 2015 Login procedures exploited by crooks to steal tens of millions of dollars from the Internal Revenue Service are also used by HealthCare.gov, the Social Security Administration, and the U.S. Citizenship and Immigration Services to help administer benefits. And that’s raising questions about once tried-and-true identity-protection measures. First, let’s explain how...

NSA Trying to Track Your Smartphone Finger Strokes

May 25, 2015 The National Security Agency has tested the use of smartphone-swipe recognition technology, according to the tool’s manufacturer. The mobile device feature, created by Lockheed Martin, verifies a user's identity based on the swiftness and shape of the individual’s finger strokes on a touch screen. The technology is but one incarnation...

The Pentagon Is Rethinking a $475 Million Cyber Defense Proposal

May 25, 2015 Cyber Command has called off a sweeping solicitation that would have outsourced support for cyberspying and network attacks against foreigners, as well as the defense of military networks. As of Friday afternoon, there were few details on why the five-year-old command, which is racing to staff up, revoked an April...