-
DHS collects -- and keeps -- large amount of information on U.S. citizens traveling abroad
Are you an American citizen frequently traveling abroad? You may be surprised by how much of your personal information DHS collects — and stores; now you have a way of finding out
-
-
Analyzing Congress's homeland security agenda
Heritage Foundation’s report offers useful analysis of what Congress should — and should not — do on the homeland security legal front
-
-
Judge allows E-Verify rule to go into effect
The U.S. District Court for Maryland denied an injunction for another delay to five industry groups that are appealing the court’s earlier decision to allow implementation of the rule to go forward
-
-
Pennsylvania bio-terror laboratory fails inspection
Pennsylvania-based BSL-3 BioLab fails, yet again, a safety inspection; the facility was finished in 2007 but has been beset by an assortment of delays, poor construction, and breakdowns
-
-
FDA requires faster food safety reporting
FDA unveiled a new electronic database where manufacturers must notify the government, within 24 hours, if one of their products is likely to cause sickness or death in people or animals
-
-
Russian security services step up snooping
The heightened interest might stem from authorities’ fear about possible public unrest connected to the economic crisis; in the first half of this year, the secret services filed nearly 77,200 requests for search warrants, more than 66,000 requests to tap phones and nearly 7,800 requests to read mail
-
-
Businesses seek to delay implementation of E-Verify
A business coalition files suit to prevent DHS from implementing E-verify as of next Tuesday; E-Verify would require federal contractors to verify the legal status of their workers
-
-
Immigration reform without Kennedy
Kennedy dramatically changed the U.S. immigration system with the Immigration Act of 1965, which eliminated the quota system and allowed immigration from Latin America and Asia to increase substantially
-
-
U.S. has a flawed approach to cyber security
Critics call on courts to recognize that obsolete computer systems are a major cause of security breaches; “As the courts probe (the) causative issues, it will become increasingly clear that computer systems’ failure to embed automated alerts is the root problem”
-
-
Pilot argues TSA is needlessly obsessive with airline security
A pilot argues that TSA’s obsession with the improbable repetition of a 9/11-like attack has left the U.S. commercial aviation more vulnerable to terrorism; rather than worry about box cutters, he says, TSA should scan more baggage for explosives
-
-
President to be able to seize private-sector networks in an emergency
A bill being drafted in Congress (the is a revised bill — the original went further) permits the president to seize temporary control of private-sector networks during a cybersecurity emergency
-
-
Laptops at border crossings may be searched without probable cause
DHS formalized policy regarding searches of electronic devices and media at border crossings; such searches may be conducted without suspicion or probable cause
-
-
Judge prohibits VIP from selling customers' personal data
VIP shut down its Clear airport fast pass service on 22 June; the 260,000 customers who gave their full names, Social Security numbers, and biometric identifiers such as finger prints and iris scans to the company do not want the defunct company to sell their information a third party; a judge agrees, but the order could be withdrawn
-
-
Security experts float plan for GA airport security ratings
There are 15,000 private planes flying in the United States with no security rules; these planes use a network of 4,700 small airports which themselves are only lightly monitored for security; security experts say it is time for general aviation to be monitored more carefully for security
-
-
In Photo ID case, security concerns win out over religious beliefs
An employee of Sunoco refused, on religious grounds, to allow his picture for an ID; a judge rules that owing to security considerations, the company does not have to accommodate the employee
-
More headlines
The long view
Nick Fuentes Is a Master of Exploiting the Current Social Media Opportunities for Extremism
That the antisemitic white nationalist Nick Fuentes and his followers have managed to get what their 20th-century predecessors could not — widespread awareness and political influence — reveals how fringe ideologies operate differently today compared to the mid-20th century, when institutional gatekeepers –political parties, law enforcement, the media –could more effectively contain extremist movements.
Fake survey Answers from AI Could Quietly Sway Election Predictions
Public opinion polls and other surveys rely on data to understand human behavior. New research reveals that artificial intelligence can now corrupt public opinion surveys at scale—passing every quality check, mimicking real humans, and manipulating results without leaving a trace.
