Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Intelligence gathering / analysis

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • More Governments Use Spyware to Monitor Their People, Compromising Privacy

    The right to privacy is under siege as an increasing number of governments are using spyware to keep tabs on their people. Many governments are using modern digital networked technologies to monitor, control and oppress their populations.

    • Read more
  • EFF’s “Cover Your Tracks” Will Detect Your Use of iOS 16’s Lockdown Mode

    Apple’s new iOS 16 offers a powerful tool for its most vulnerable users. Lockdown Mode reduces the avenues attackers have to hack into users’ phones by disabling certain often-exploited features. But there is a catch.

    • Read more
  • Government Surveillance Doesn’t Stop at Your Bank’s Door

    Warrantless surveillance may be novel for technology and media companies, but it is nothing new when it comes to the government’s surveillance of Americans’ financial activity.

    • Read more
  • Pegasus Spyware Maker NSO Is Conducting a Lobbying Campaign to Get Off U.S. Blacklist

    The cybersecurity firm has invested heavily in top lobbyists and law firms in an effort to lift restrictions on doing business in America. NSO is hoping the Israeli prime minister will raise the issue with Joe Biden when the two meet this week.

    • Read more
  • One Year On: Marking Progress on Biden’s Counter-Domestic Terrorism Strategy

    Early in the Biden administration, the president instructed the intelligence community to evaluate the domestic terrorist threat – and intelligence officials concluded that it’s severe. On 15 June 2021, the Biden administration released the National Strategy to Counter Domestic Terrorism. Ryan B. Greer writes that now that it has been a full year since the launch, there is an opportunity to review the administration’s progress made toward countering the threat of domestic violent extremism.

    • Read more
  • Spain Sacks Intelligence Chief in Wake of Pegasus Scandal

    Paz Esteban was replaced after a controversy over the use of the Pegasus spyware to hack top Spanish officials’ cellphones, as well as spying on Catalan separatists.

    • Read more
  • The Movement to Ban Government Use of Face Recognition

    Our faces are unique identifiers that can’t be left at home, or replaced like a stolen ID or compromised password. Facial recognition technology facilitates covert mass surveillance of the places we frequent, people we associate with, and, purportedly, our emotional state. Communities across the country are fighting back.

    • Read more
  • Google Fights Dragnet Warrant for Users’ Search Histories Overseas, but It Is Continuing to Give Data to Police in the U.S.

    Google is fighting back against a Brazilian court order to turn over data on all users who searched for specific terms, including the name of a well-known elected official and a busy downtown thoroughfare. Google should be applauded for challenging this digital dragnet search in Brazil, but the company must also stand up for the rights of its users against similar searches in the U.S. and elsewhere.

    • Read more
  • DHS Sued Over Vetting Program to Collect and Data Mine

    The Electronic Frontier Foundation (EFF) the other day filed a Freedom of Information Act (FOIA) lawsuit against the Department of Homeland Security (DHS) for records about a multi-million dollar, secretive program that surveils immigrants and other foreign visitors’ speech on social media.

    • Read more
  • We Need Answers about the CIA’s Mass Surveillance

    The Central Intelligence Agency has been collecting American’s private data without any oversight or even the minimal legal safeguards that apply to the NSA and FBI, an unconstitutional affront to our civil liberties. The whos, whats, whys, and hows of this semi-disclosed CIA program are still unknown, and the public deserves the right to know exactly what damage has been done.

    • Read more
  • In 2021, the Police Took a Page Out of the NSA’s Playbook: 2021 in Review

    Dragnet searches were once thought to be just the province of the NSA, but they are now easier than ever for domestic law enforcement to conduct as well. With increasing frequency, law enforcement has been using unconstitutional, suspicionless digital dragnet searches in an attempt to identify unknown suspects in criminal cases.

    • Read more
  • U.S. Supreme Court Hears Case of Surveillance of Muslims

    A decade ago, three Muslim men filed suit against the FBI, alleging the Bureau deployed a confidential informant who claimed to be a convert to Islam to spy on them based solely on their religious identity. On Monday, the Supreme Court heard the argument by the administration that it has the right to invoke the protection of “state secrets” to withhold information from the plaintiffs.

    • Read more
  • Face Recognition Is So Toxic, Facebook Is Dumping It

    Facebook’s decision to end its face-recognition program comes at a time when face recognition technology is receiving push back, criticisms, and legislative bans across the United States, and the globe.

    • Read more
  • U.S. Tightens Export Controls on Items Used in Surveillance of Private Citizens, other Malicious Cyber Activities

    The Commerce Department has released an interim final rule, establishing controls on the export, reexport, or transfer (in-country) of certain items that can be used for surveillance of private citizens or other malicious cyber activities. 

    • Read more
  • Surveillance Equipment: Scrutiny Necessary for the Police, Manufacturers

    Facial recognition, body cameras and other digital technologies are increasingly used by police departments, municipalities and even gated communities, but these tools, manufactured by private companies, raise the specter of unchecked surveillance.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Trump administration admits DOGE accessed personal Social Security data
  • Trump’s Homeland Security Ramps Up Surveillance of Legal Immigrants
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Spy agencies acquire commercial data with little coordination and few controls
  • New records reportedly show Homeland Security buying smartphone data to track you
  • New documents reveal 'huge' scale of US government's cell phone location data tracking
  • National Space Intelligence Center became the 18 member of the U.S. Intelligence Community in January 2021
  • China’s Expanding Surveillance State
  • Civil Liberties Worries Loom in Plan to Identify Insider Threats
  • Warrantless Digital Device Searches at U.S. Border Ruled Valid
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies