Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Eavesdropping

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • U.K. government drops central database scheme

    Burden of storing communication logs will now fall to ISPs

    • Read more
  • U.K. Tories charge government's legal dodge over Comms database debate

    The U.K. government last year revealed plans for creating a massive central database of e-mail, Web browsing, telephone, and social networking data; U.K. law mandates that such a database be approved by parliament; Tories charge that the government is using the European rules obliging data retention by ISPs — rules which come into effect today — to begin assembling this centralized system, or its prototype

    • Read more
  • U.K. government plans to monitor online social networks

    For the last three years, intelligence services in the United States and the United Kingdom have been examining the idea of keeping a close tab on communications made among members of social networks; the U.K. Home Office denies having plans for such monitoring, but critics are not convinced

    • Read more
  • Critics: Commercially driven deep packet inspection (DPI) is akin to wiretapping

    New technology now allows third parties to engage in deep packet inspection (DPI), a technique that makes it possible to peer inside packets of data transmitted across the Internet; data collected is then sold to other companies to allow them more targeted advertising

    • Read more
  • Spyware big seller in China

    The Chinese government no longer has a monopoly over domestic spying; sales of James Bond-like hidden surveillance tools such as cameras disguised as pens or buttons to companies and individuals soar

    • Read more
  • NSA gains support for cyber security role

    New Director of national Intelligence tells Congress DHS not up to task

    • Read more
  • EU may investigate VoIP eavesdropping

    Italian anti-crime authorities have asked the EU to look into regulating VoIP communication encryption; the Italian authorities presented evidence that crime rings and prostitution networks use Skype for the specific purpose of frustrating police investigators

    • Read more
  • Intelligence, law enforcement face another hurdle: encrypted VoIP

    The intelligence community and law enforcement already are concerned about the difficult they have eavesdropping in Skype communications; a U.K. start-up is going to make life more difficult for them by encryption VoIP communications and concealing more conversations

    • Read more
  • NSA may offer "billions" for a solution allowing eavesdropping on Skype

    Skype continues to be a major problem for government listening agencies, whether intelligence agencies tracking terrorists or the police trying to listen in on criminals; rumor has it that NSA is willing to pay handsomely for a Skype-code-breaking solution

    • Read more
  • Obama administration to support telco immunity over domestic spying

    Eric Holder, nominee for attorney general, says the incoming Obama administration will support congressional legislation immunizing U.S. telecommunication companies from lawsuits about their participation in the Bush administration’s domestic spy program

    • Read more
  • U.K. Home Office denies remote snooping plan

    There have been discussions among EU ministers about giving police more authority to snoop on crime and terror suspects remotely, but the legal framework to do so is yet be created; what is more, techies says it cannot be done

    • Read more
  • Here they go again: China demands access to Western computer security

    Another crisis in U.S.-China trade relations looms, as China, again, is about to introduce rules which would allow Chinese companies to steal Western industrial secrets, and would allow the Chinese government more tightly to monitor what the Chinese people say and read

    • Read more
  • U.K. government grants itself even more data sharing power

    A U.K. government proposal debated in Parliament this week would increase the ability of different government arms to share data

    • Read more
  • EU considers allowing police to place Trojans on suspects' computers

    Remote searches of suspects’ computers could become a mainstay of cybercrime investigations under a new EU strategy announced last week

    • Read more
  • Quantum calibration shows way for super-secure communication

    Scientists at Imperial College London have used a new approach to calibrating quantum mechanical measurement directly to calibrate a detector that can sense the presence of multiple individual photons; the ability to sense the presence of individual photons is an important requirement for the development of future long-distance quantum communication devices and networks

    • Read more
  • « first
  • ‹ previous
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • next ›
  • last »

More headlines

  • US suspects cellphone spying devices in DC
  • Privacy vs. Security: Experts Debate Merits of Each in Tech-Rich World
  • Australia to float 'not backdoors' that behave just like backdoors to Five-Eyes meeting
  • Homeland security misreported number of electronics searches, officials say
  • Scotland Yard accused of hacking campaigners' email accounts
  • Republicans Starting to Think the NSA Has Too Much Surveillance Power
  • The Latest: House intel chair 'concerned' about WikiLeaks
  • Donald Trump Meets the Surveillance State
  • How protesters at the RNC can protect themselves from digital surveillance
  • FBI informs many that their conversations were recorded during Allentown probe
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies