Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Privacy

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • SURVEILLANCEFinancial Surveillance Is Expanding—but So Is the Resistance

    By Nicholas Anthony

    The last few months were hectic, but not all bad. Amidst the government surveilling cash, prosecuting people in bad faith, and creating new surveillance mechanisms, there were significant wins: Courts pushed back on overreach and Congress began to offer reforms to correct past mistakes.

    • Read more
  • DATA PROTECTIONHow We Think About Protecting Data

    By Peter Dizikes

    A new study shows public views on data privacy vary according to how the data are used, who benefits, and other conditions.

    • Read more
  • COMMON-SENSE NOTES // By Idris B. OdunewuThe Future of Open Data in the Age of AI: Safeguarding Public Assets Amid Growing Private Sector Demands

    AI offers immense potential, but that potential must be realized within a framework that protects the public’s right to its own information. The open data movement must evolve to meet this new challenge—not retreat from it.

    • Read more
  • SURVEILLANCEFrom Help to Harm: How the Government Is Quietly Repurposing Everyone’s Data for Surveillance

    By Nicole M. Bennett

    The data that people provide to U.S. government agencies for public services such as tax filing, health care enrollment, unemployment assistance and education support is increasingly being redirected toward surveillance and law enforcement.

    • Read more
  • DATA PROTECTIONProtecting Americans’ Sensitive Data from Foreign Adversaries

    Last week DOJ took steps to move forward with implementing a program to prevent China, Russia, Iran, and other foreign adversaries from using commercial activities to access and exploit U.S. government-related data and Americans’ sensitive personal data to commit espionage and economic espionage, conduct surveillance and counterintelligence activities, and otherwise undermine our national security.

    • Read more
  • PRIVACYCan Border Patrol Go Through Your Phone? A Legal Expert Explains What Rights Travelers Have Entering the U.S.

    By Cody Mello-Klein

    A Northeastern legal expert explains the complexities involved with searches of phones and social media and what rights citizens and visitors have when entering the country.

    • Read more
  • DATA SECURITYDOGE Threat: How Government Data Would Give an AI Company Extraordinary Power

    By Allison Stanger

    The Department of Government Efficiency, or DOGE, has secured unprecedented access to at least seven sensitive federal databases. Since information is power, concentrating unprecedented data in the hands of a private entity with an explicit political agenda represents a profound challenge to the republic. I believe that the question is whether the American people can stand up to the potentially democracy-shattering corruption such a concentration would enable. If not, Americans should prepare to become digital subjects rather than human citizens.

    • Read more
  • SURVEILANCESpyware Is Spreading Far Beyond Its National-Security Role

    By Angela Suriyasenee

    Spyware is increasingly exploited by criminals or used to suppress civil liberties, and this proliferation is in part due to weak regulation.

    • Read more
  • SURVEILANCEThe U.K. Demands for Apple to Break Encryption Is an Emergency for Us All

    By Thorin Klosowski

    The United Kingdom is demanding that Apple create an encryption backdoor to give the government access to end-to-end encrypted data in iCloud. Encryption is one of the best ways we have to reclaim our privacy and security in a digital world filled with cyberattacks and security breaches, and there’s no way to weaken it in order to only provide access to the “good guys.”

    • Read more
  • PRIVACYEFF Tells the Second Circuit a Second Time That Electronic Device Searches at the Border Require a Warrant

    By Sophia Cope

    The number of warrantless device searches at the border and the significant invasion of privacy they represent is only increasing. In Fiscal Year 2023, U.S. Customs and Border Protection (CBP) conducted 41,767 device searches.

    • Read more
  • SURVEILLANCE'Significant' Risks as Facial Recognition in Russia's Subways Goes Regional

    By Andrei Grigoryev

    In a move that human rights advocates warn carries potential risks for civil rights, Russia has begun expanding its facial-recognition payment system for subways to six cities outside of Moscow.

    • Read more
  • CHINA WATCHChina May Be Putting the Great Firewall into Orbit

    By Mercedes Page

    The first satellites for China’s ambitious G60 mega-constellation are in orbit in preparation for offering global satellite internet services—and we should worry about how this will help Beijing export its model of digital authoritarianism around the world.

    • Read more
  • SURVEILLANCEHow Smart Toys May e Spying on Kids: What Parents Need to Know

    By Angelika Jacobs

    Toniebox, Tiptoi, and Tamagotchi are smart toys, offering interactive play through software and internet access. However, many of these toys raise privacy concerns, and some even collect extensive behavioral data about children.

    • Read more
  • AITo Win the AI Race, China Aims for a Controlled Intelligence Explosion

    By Nathan Attrill

    China’s leader Xi Jinping has his eye on the transformative forces of artificial intelligence to revolutionize the country’s economy and society in the coming decades. But the disruptive, and potentially unforeseen, consequences of this technology may be more than the party-state can stomach.

    • Read more
  • CHINA WATCHDOJ Sues TikTok and Parent Company ByteDance for Widespread Violations of Children’s Privacy Laws

    U.S. law prohibits website operators from knowingly collecting, using, or disclosing personal information from children under the age of 13, unless they provide notice to and obtain consent from those children’s parents.

    • Read more
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Microsoft’s New Recall AI Tool May Be a ‘Privacy Nightmare’
  • DHS S&T Seeks Solutions for Privacy Preserving Digital Credential Wallets & Verifiers
  • How data on a billion people may have leaked from a Chinese police dashboard
  • Post-Roe reproductive privacy goes beyond period trackers, experts say
  • Mark Zuckerberg tells employees Facebook's 'encryption' will protect abortion-seeking user
  • 2 million government records exposed online in 'no-fly' watchlist, researcher says
  • Bipartisan Report Shows Federal Agencies’ Cybersecurity Failures Leaving Americans’ Personal Information at Risk
  • PII At Risk on Mobile Passport Control Apps!
  • Who in America is standing up to privacy-bothering facial-recognition tech? Maine is right now leading the pack
  • Warrantless Digital Device Searches at U.S. Border Ruled Valid
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies