Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Privacy

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • DOJ Sues TikTok and Parent Company ByteDance for Widespread Violations of Children’s Privacy Laws

    U.S. law prohibits website operators from knowingly collecting, using, or disclosing personal information from children under the age of 13, unless they provide notice to and obtain consent from those children’s parents.

    • Read more
  • Data Privacy After Dobbs: Is Period Tracking Safe?

    Many people think all health care information is protected under the federal privacy law, known as HIPAA. But menstrual cycle tracking apps, along with other health care technologies, like texting platforms that patients can use with doctors, are not. There haven’t been any cases where a menstrual tracking app’s data has been subpoenaed yet, but that’s probably due to the slow speed of which cases proceed through the court system.

    • Read more
  • States Strike Out on Their Own on AI, Privacy Regulation

    There’s been no shortage of AI tech regulation bills in Congress, but none has passed. In the absence of congressional action, states have stepped up their own regulatory action. States have been legislating about AI since at least 2019, but bills relating to AI have increased significantly in the last two years.

    • Read more
  • Businesses Are Harvesting Our Biometric Data. The Public Needs Assurances on Security

    Visual data capturing and analysis are particularly critical compared to non-visual data. That’s why its growing use by businesses raises so many concerns about privacy and consent. While the public remains unaware of the extent to which their visual data is being captured and utilized, their information will be vulnerable to misuse or exploitation.

    • Read more
  • UN’s Global Digital Compact Is Looking Like an Authoritarian Dream

    This week, global representatives to the United Nations in New York will review the latest draft of the UN Global Digital Compact (GDC). The latest draft of the GDC is concerning. It would consolidate power within the UN, expand the reach of both the UN and national governments over digital matters and ultimately threaten the openness of the global internet.

    • Read more
  • Privacy-Enhancing Browser Extensions Fail to Meet User Needs, New Study Finds

    Popular web browser extensions designed to protect user privacy and block online ads are falling short, according to researchers, who are proposing new measurement methodologies to better uncover and quantify these shortcomings.

    • Read more
  • Evaluating U.S. Readiness to Prevent, Counter, and Respond to WMD

    Two new reports review the adequacy of U.S. strategies to prevent, counter, and respond to the threat of nuclear and chemical terrorism and highlight the strengths and limitations of U.S. efforts to prevent and counter threats from weapons of mass destruction (WMD), particularly in a changing terrorism threat landscape.

    • Read more
  • China Turns to Private Hackers as It Cracks Down on Online Activists on Tiananmen Square Anniversary

    Chinese authorities restrict the flow of information online by banning search terms, scanning social media for subversive messages and blocking access to foreign media and applications that may host censored content. Control of online activity is particularly stringent around the anniversary of the protests at Tiananmen Square in 1989 that ended with a bloody crackdown on demonstrators by troops on June 4 of that year.

    • Read more
  • The Alaska Supreme Court Takes Aerial Surveillance’s Threat to Privacy Seriously, Other Courts Should Too

    In March, the Alaska Supreme Court held that the Alaska Constitution required law enforcement to obtain a warrant before photographing a private backyard from an aircraft. The government argued that the ubiquity of small aircrafts flying overhead in Alaska; the commercial availability of the camera and lens; and the availability of aerial footage of the land elsewhere, meant that Alaska residents did not have a reasonable expectation of privacy The Court divorced the ubiquity and availability of the technology from whether people would reasonably expect the government to use it to spy on them.

    • Read more
  • Study Sheds Light on Shady World of Text Message Phishing Scams

    Researchers have collected and analyzed an unprecedented amount of data on SMS phishing attacks, shedding light on both the scope and nature of SMS phishing operations.

    • Read more
  • European Court of Human Rights Confirms: Weakening Encryption Violates Fundamental Rights

    In a milestone judgment—Podchasov v. Russia—the European Court of Human Rights (ECtHR) has ruled that weakening of encryption can lead to general and indiscriminate surveillance of the communications of all users and violates the human right to privacy.

    • Read more
  • Cybersecurity and Data Protection: Does ChatGPT Really Make a Difference?

    Cybersecurity and data privacy have become central concerns, affecting business operations and user safety worldwide. A new analysis has looked at the various approaches to cybersecurity and data protection taken by key global players, namely the European Union, the United States, and China.

    • Read more
  • Dozens of Rogue California Police Agencies Still Sharing Driver Locations with Anti-Abortion States

    In October 2023, California Attorney General Rob Bonta clarified that a 2016 state law, SB 34, prohibits California’s local and state police from sharing information collected from automated license plate readers (ALPR) with out-of-state or federal agencies. Despite the Attorney General’s definitive stance, dozens of law enforcement agencies have signaled their intent to continue defying the law by sharing ALPR information with law-enforcement agencies of states with restrictive abortion laws, putting abortion seekers and providers at risk.

    • Read more
  • Fighting European Threats to Encryption: 2023 Year in Review

    Private communication is a fundamental human right. In the online world, the best tool we have to defend this right is end-to-end encryption. Yet throughout 2023, politicians across Europe attempted to undermine encryption, seeking to access and scan our private messages and pictures.

    • Read more
  • EFF to Supreme Court: Fifth Amendment Protects People from Being Forced to Enter or Hand Over Cell Phone Passcodes to the Police

    The Electronic Frontier Foundation (EFF) last week asked the Supreme Court to overturn a ruling undermining Fifth Amendment protections against self-incrimination and find that constitutional safeguards prevent police from forcing people to provide or use passcodes for their cell phones so officers can access the tremendous amount of private information on phones.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Microsoft’s New Recall AI Tool May Be a ‘Privacy Nightmare’
  • DHS S&T Seeks Solutions for Privacy Preserving Digital Credential Wallets & Verifiers
  • How data on a billion people may have leaked from a Chinese police dashboard
  • Post-Roe reproductive privacy goes beyond period trackers, experts say
  • Mark Zuckerberg tells employees Facebook's 'encryption' will protect abortion-seeking user
  • 2 million government records exposed online in 'no-fly' watchlist, researcher says
  • Bipartisan Report Shows Federal Agencies’ Cybersecurity Failures Leaving Americans’ Personal Information at Risk
  • PII At Risk on Mobile Passport Control Apps!
  • Who in America is standing up to privacy-bothering facial-recognition tech? Maine is right now leading the pack
  • Warrantless Digital Device Searches at U.S. Border Ruled Valid
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies