Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Privacy

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Worries about Iraq's biometric database

    The U.S. biometric database in Iraq, now containing identification information on more than 2.5 million Iraqis, has been helpful to U.S. troops in identifying the bad guys and thwarting acts of terror; as the U.S. forces prepare to leave Iraq, worries grow that the same database may be used for monitoring critics of the regime and for political repression

    • Read more
  • U.K. to share fingerprints with Canada, Australia

    U.K., Canada, and Australia have begun to implement the fingerprint data sharing among g them, aiming to catch criminals and better evaluate the cases of asylum seekers; U.S., New Zealand will soon join

    • Read more
  • Über-hacker Albert "Segvec" Gonzalez's plea scuttled by indictment

    Gonzalez’s attorney was close to taking responsibility for his crimes and agreeing to a sentence of about twenty years when hew was indicted on new counts on Monday

    • Read more
  • Kemesa: Solving the identity theft problem

    The ideal solution to the online identity theft problem is to not transmit personal information to Web sites in the first place; with Kemesa’s Shop Shield, personal information can not be stolen because it is never revealed during the online transaction process

    • Read more
  • Cyber-criminals targeting social networks

    Cyber-criminals are drawn to the wealth of personal information supplied by users of social networks

    • Read more
  • Widespread privacy failings in online social networks

    A Cambridge University study finds serious privacy weaknesses in the way social networking sites are run; those who join such site are often unaware of these weaknesses

    • Read more
  • This product description will self-destruct

    Huskies researchers develop a tool to make online personal data vanish; after a set time period, electronic communications such as e-mail, Facebook posts, and chat messages would automatically self-destruct, becoming irretrievable from all Web sites, inboxes, outboxes, backup sites, and home computers

    • Read more
  • New technology uses encrypted CCTV to protect the innocent

    San Francisco-based 3VR developed a technology that uses face-recognition algorithms to home in on known faces in crowds — but an image-scrambling algorithm then blurs the faces and bodies of those who are not of interest to the authorities

    • Read more
  • DHS's Einstein 3 plans raise questions

    DHS wants to use Einstein 3 to bolster cybersecurity; the deployment of this powerful program has its critics, though

    • Read more
  • Criminals can figure out an individual's Social Security number

    Researchers show that statistical techniques can be used to determine an individual’s Social Security number, based on the person’s birth date and birth location

    • Read more
  • Method discovered to process encrypted data without knowing its content

    IBM researcher solves thorny mathematical problem that has confounded scientists since the invention of public-key encryption several decades ago; the breakthrough makes possible the analysis of encrypted information — data that has been intentionally scrambled — without sacrificing confidentiality

    • Read more
  • U.K. government to give up on massive Internet snoop scheme

    The Home Office admits that its IMP (Interception Modernization Program) — the cost of which was to be £2 billion over ten years — cannot be realized because the technology does not yet exist

    • Read more
  • China uses stolen software in its new Internet censorship scheme

    The Chinese government will impose strict Internet censorship beginning 1 July; the software the Chinese will use for filtering Web sites was stolen from California-based Solid Oak Software; the Chinese piracy was exceedingly clumsy: a file containing a 2004 Solid Oak news bulletin has been accidentally included in the Chinese filtering coding

    • Read more
  • NYCLU sues DHS over mid-Manhattan surveillance scheme

    DHS wants to build a $92 million surveillance system in Lower Manhattan; civil liberties organizations sues DHS over plans to expand plan to mid-Manhattan

    • Read more
  • Identity fundamentals. pt. 1: Who cares who you are anyway?

    Identity can be defined as a combination of the uniqueness of an individual (or device) and the attributes which are associated with that uniqueness; in the absence of a standard unique personal identification number, personal names are often used to build a single view across different unconnected applications

    • Read more
  • « first
  • ‹ previous
  • …
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • next ›
  • last »

More headlines

  • Microsoft’s New Recall AI Tool May Be a ‘Privacy Nightmare’
  • DHS S&T Seeks Solutions for Privacy Preserving Digital Credential Wallets & Verifiers
  • How data on a billion people may have leaked from a Chinese police dashboard
  • Post-Roe reproductive privacy goes beyond period trackers, experts say
  • Mark Zuckerberg tells employees Facebook's 'encryption' will protect abortion-seeking user
  • 2 million government records exposed online in 'no-fly' watchlist, researcher says
  • Bipartisan Report Shows Federal Agencies’ Cybersecurity Failures Leaving Americans’ Personal Information at Risk
  • PII At Risk on Mobile Passport Control Apps!
  • Who in America is standing up to privacy-bothering facial-recognition tech? Maine is right now leading the pack
  • Warrantless Digital Device Searches at U.S. Border Ruled Valid
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies