Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Eavesdropping

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Israel says it will continue to listen-in on Hezbollah communication

    Hezbollah has its own communication network in Lebanon, separate and independent from the government’s sanctioned carrier networks; Israel says that bugging the organization’s network does not amount to a violation of Lebanon’s sovereignty

    • Read more
  • Robust hierarchical metropolitan quantum cryptography network

    The security of a majority of classical cryptography is based on the complexity of the cipher algorithms and the development of distributed computing and specific hacking chips; this may no longer be sufficient, as quantum computing has become a serious threat to classical cryptography; the solution: quantum encryption

    • Read more
  • UK.gov's G Cloud may have security silver lining after all

    Cloud computing offers many benefits, but enhanced security is not one of them — or is it? An expert says that the emergence of cloud computing is making it possible to take a new approach to security; until now, the U.K. government has kept its work on information security in specialist bodies such as GCHQ and CESG, separate from the development of business functions; “The cloud gives us the opportunity to get the specification right before we get too far down the track,” he says

    • Read more
  • The personal spy: the smartphone in your pocket may be spying on you, II

    The advances in smartphone technology could well be exploited in much the same way that e-mail and the Internet can be used to “phish” for personal information such as bank details

    • Read more
  • The personal spy: the smartphone in your pocket may be spying on you, I

    The advances in smartphone technology could well be exploited in much the same way that e-mail and the Internet can be used to “phish” for personal information such as bank details

    • Read more
  • Russian security services step up snooping

    The heightened interest might stem from authorities’ fear about possible public unrest connected to the economic crisis; in the first half of this year, the secret services filed nearly 77,200 requests for search warrants, more than 66,000 requests to tap phones and nearly 7,800 requests to read mail

    • Read more
  • U.K. authorities made more than 500,000 surveillance requests last year

    U.K. police, councils, and the intelligence services made about 1,500 surveillance requests every day last year; this is the annual equivalent to one in every 78 people being targeted

    • Read more
  • Maryland transportation chief halts audio surveillance plans

    Maryland Transportation Administration considered using listening devices on its buses and trains for recording conversations of passengers and employees; acting director of the agency suspends plan

    • Read more
  • Red tape frustrates U.K. government's eavesdroppers

    A new report says that bureaucracy and red tape hampers the ability of the U.K. government to cope with an increased demand for intelligence and security testing

    • Read more
  • Western companies help Iranian government to monitor citizens

    Nokia Siemens provides the Iranian government with technology to monitor, control, and read local telephone calls; the product allows authorities to monitor any communications across a network, including voice calls, text messaging, instant messages, and Web traffic

    • Read more
  • U.K. government to give up on massive Internet snoop scheme

    The Home Office admits that its IMP (Interception Modernization Program) — the cost of which was to be £2 billion over ten years — cannot be realized because the technology does not yet exist

    • Read more
  • U.K. to emulate some of China's Olympic security practices

    The British police wants to implement during the 2012 London Olympic Games some of the security practices employed by the Chinese during the 2008 Beijing Games — some, but not all: A Scotland Yard report says that a “balance must be maintained between the use of technology to support security requirements and individual rights to privacy” (the Chinese were less concerned with that balance)

    • Read more
  • U.K. information commissioner: data collection trend will be reversed

    Richard Thomas, the outgoing U.K. information commissioner: “If you are looking for a needle in a haystack, it does not make sense to make the haystack bigger”

    • Read more
  • U.K. moves forward with comprehensive eavesdropping scheme

    The U.K. government announced last week that it was abandoning the plan to create a centralized super-database in which the personal information of Britons will be kept — but a £1 billion intelligence gathering project is moving forward; the scheme will monitor all all e-mails, Web site visits, and social networking sessions in Britain

    • Read more
  • Al-Qaeda plea deal details communication methods

    Last week Ali Saleh Kahlah al-Marri entered a plea deal in Illinois in which he admitted to entering the United States on 10 September 2001 in order to form a sleeper cell for future terrorist activities; plea details Al-Qaeda’s communication methods

    • Read more
  • « first
  • ‹ previous
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • next ›
  • last »

More headlines

  • US suspects cellphone spying devices in DC
  • Privacy vs. Security: Experts Debate Merits of Each in Tech-Rich World
  • Australia to float 'not backdoors' that behave just like backdoors to Five-Eyes meeting
  • Homeland security misreported number of electronics searches, officials say
  • Scotland Yard accused of hacking campaigners' email accounts
  • Republicans Starting to Think the NSA Has Too Much Surveillance Power
  • The Latest: House intel chair 'concerned' about WikiLeaks
  • Donald Trump Meets the Surveillance State
  • How protesters at the RNC can protect themselves from digital surveillance
  • FBI informs many that their conversations were recorded during Allentown probe
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies