Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Privacy

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • DIGITAL IDThe UK Has It Wrong on Digital ID. Here’s Why.

    By Paige Collings

    In late September, the U.K. Prime Minister Keir Starmer announced his government’s plans to introduce a new digital ID scheme in the country to take effect before the end of the Parliament (no later than August 2029). This is the latest example of a government creating a new digital system that is fundamentally incompatible with a privacy-protecting and human rights-defending democracy.

    • Read more
  • SURVEILLNCE STATEState Election Officials in Letter Ask Whether They Were “Misled” by Trump Administration

    By Quentin Young

    A group of Democratic secretaries of state in a letter to top Trump administration officials say they’re concerned the administration misled them about how it would use voter data collected from their states.

    • Read more
  • PRIVACYDHS Wants States to Hand Over Driver’s License Data for Citizenship Checks

    By Jen Fifield and Zach Despart

    It’s the latest step in an unprecedented initiative to pool confidential data that the Trump administration claims will help identify noncitizens on voter rolls and tighten immigration enforcement.

    • Read more
  • PRIVACYWilliamson v. United States Brief: Ten Months of Warrantless Video Surveillance Violates the Fourth Amendment

    By Matthew Cavedon

    In October 2018, law enforcement, without a warrant, surreptitiously installed two video cameras near the top of utility poles to surveil Rolando Williamson’s home.The Eleventh Circuit reasoned that the police did not require a warrant because only parts of Williamson’s home and yard were visible from the alleyway. Cato Institute filed an amicus brief supporting Williamson, arguing that partial exposure does not automatically extinguish Fourth Amendment protections.

    • Read more
  • ACCOUNTABILITYThere’s a Right to Record ICE Raids–and There’s No Blanket Immunity for Raiders

    By Walter Olson

    DHS Secretary Kristi Noem and department spokeswoman Tricia McLaughlin have repeatedly asserted that citizens have no right to photograph or video record ICE raids or identify the officers by name. This is not an accurate description of the state of the law, and it is dangerous to tell ICE agents that they have blanket immunity whatever they do. If the agents are hearing a persistent message from their higher ups of “you’re immune no matter what you do,” it’s up to the rest of us to disabuse them of that error.

    • Read more
  • SURVEILLANCEThe Spy Who Came in from the Wi-Fi: Beware of Radio Network Surveillance

    New technology is able to infer the identity of persons with no WiFi device on them through signals in radio networks. Researchers warn of risks to privacy and call for protective measures.

    • Read more
  • SURVEILLANCEA Simple, Low-Cost Method Detects GPS Trackers Hidden in Vehicles, Empowering Cyberstalking Victims

    Novel algorithm transforms commercial radio device into user-friendly, effective tracker detector.

    • Read more
  • SURVEILLANCEPervasive Surveillance of People Is Being Used to Access, Monetize, Coerce, and Control

    New research has underlined the surprising extent to which pervasive surveillance of people and their habits is powered by computer vision research – and shone a spotlight on how vulnerable individuals and communities are at risk.

    • Read more
  • SURVEILLANCEFinancial Surveillance Is Expanding—but So Is the Resistance

    By Nicholas Anthony

    The last few months were hectic, but not all bad. Amidst the government surveilling cash, prosecuting people in bad faith, and creating new surveillance mechanisms, there were significant wins: Courts pushed back on overreach and Congress began to offer reforms to correct past mistakes.

    • Read more
  • DATA PROTECTIONHow We Think About Protecting Data

    By Peter Dizikes

    A new study shows public views on data privacy vary according to how the data are used, who benefits, and other conditions.

    • Read more
  • COMMON-SENSE NOTES // By Idris B. OdunewuThe Future of Open Data in the Age of AI: Safeguarding Public Assets Amid Growing Private Sector Demands

    AI offers immense potential, but that potential must be realized within a framework that protects the public’s right to its own information. The open data movement must evolve to meet this new challenge—not retreat from it.

    • Read more
  • SURVEILLANCEFrom Help to Harm: How the Government Is Quietly Repurposing Everyone’s Data for Surveillance

    By Nicole M. Bennett

    The data that people provide to U.S. government agencies for public services such as tax filing, health care enrollment, unemployment assistance and education support is increasingly being redirected toward surveillance and law enforcement.

    • Read more
  • DATA PROTECTIONProtecting Americans’ Sensitive Data from Foreign Adversaries

    Last week DOJ took steps to move forward with implementing a program to prevent China, Russia, Iran, and other foreign adversaries from using commercial activities to access and exploit U.S. government-related data and Americans’ sensitive personal data to commit espionage and economic espionage, conduct surveillance and counterintelligence activities, and otherwise undermine our national security.

    • Read more
  • PRIVACYCan Border Patrol Go Through Your Phone? A Legal Expert Explains What Rights Travelers Have Entering the U.S.

    By Cody Mello-Klein

    A Northeastern legal expert explains the complexities involved with searches of phones and social media and what rights citizens and visitors have when entering the country.

    • Read more
  • DATA SECURITYDOGE Threat: How Government Data Would Give an AI Company Extraordinary Power

    By Allison Stanger

    The Department of Government Efficiency, or DOGE, has secured unprecedented access to at least seven sensitive federal databases. Since information is power, concentrating unprecedented data in the hands of a private entity with an explicit political agenda represents a profound challenge to the republic. I believe that the question is whether the American people can stand up to the potentially democracy-shattering corruption such a concentration would enable. If not, Americans should prepare to become digital subjects rather than human citizens.

    • Read more
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Microsoft’s New Recall AI Tool May Be a ‘Privacy Nightmare’
  • DHS S&T Seeks Solutions for Privacy Preserving Digital Credential Wallets & Verifiers
  • How data on a billion people may have leaked from a Chinese police dashboard
  • Post-Roe reproductive privacy goes beyond period trackers, experts say
  • Mark Zuckerberg tells employees Facebook's 'encryption' will protect abortion-seeking user
  • 2 million government records exposed online in 'no-fly' watchlist, researcher says
  • Bipartisan Report Shows Federal Agencies’ Cybersecurity Failures Leaving Americans’ Personal Information at Risk
  • PII At Risk on Mobile Passport Control Apps!
  • Who in America is standing up to privacy-bothering facial-recognition tech? Maine is right now leading the pack
  • Warrantless Digital Device Searches at U.S. Border Ruled Valid
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies