Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Surveillance

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • SURVEILLANCEFISA Reauthorization Fearmongering and Disinformation Kicks Into Overdrive

    By Patrick G. Eddington

    With just 10 days to go before Title VII of the Foreign Intelligence Surveillance Act (FISA) expires, surveillance hawks have intensified their propaganda and fearmongering campaign. But FISA’s many problems are reasons for Congress to hit the “pause” button on FISA Section 702 reauthorization, unless and until these problems are eliminated.

    • Read more
  • CHINA WATCHAI Governance Is not Just Top-Down in China, Research Finds

    By Patrick Daly

    Political scientist Xuechen Chen said traditional Chinese values and market driven factors have also driven moves to regulate generative AI platforms.

    • Read more
  • SURVEILLANCEWorried About Surveillance, States Enact Privacy Laws and Restrict License Plate Readers

    By Shalina Chatlani

    As part of its deportation efforts, the Trump administration has made a push for personal data from voter rolls, driver’s license records and programs such as Medicaid and food stamps.

    • Read more
  • DIGITAL IDThe UK Has It Wrong on Digital ID. Here’s Why.

    By Paige Collings

    In late September, the U.K. Prime Minister Keir Starmer announced his government’s plans to introduce a new digital ID scheme in the country to take effect before the end of the Parliament (no later than August 2029). This is the latest example of a government creating a new digital system that is fundamentally incompatible with a privacy-protecting and human rights-defending democracy.

    • Read more
  • SURVEILLANCEThe Spy Who Came in from the Wi-Fi: Beware of Radio Network Surveillance

    New technology is able to infer the identity of persons with no WiFi device on them through signals in radio networks. Researchers warn of risks to privacy and call for protective measures.

    • Read more
  • DEMOCRACY WATCHTrump’s Targeting of “Enemies” Like James Comey Echoes FBI’s Dark History of Mass Surveillance, Dirty Tricks, and Perversion of Justice Under J. Edgar Hoover

    By Betty Medsger

    As a candidate last year, Donald Trump promised retribution against his perceived enemies. As president, he is doing that. His campaign of vengeance will be helped by the FBI, the independence of which has been sacrificed by Director Kash Patel, who has, essentially, made the bureau an arm of the White House. It marks the first time since J. Edgar Hoover’s 48-year reign as FBI director that the FBI has been used to target people perceived to be political enemies.

    • Read more
  • SURVEILLANCEDOJ Files Suit Against Six States That Refused to Share Voter Data

    By Barbara Barrett

    The Trump administration is seeking personal data on millions of Americans., but some states refuse to hand over the information to the government. The U.S. Department of Justice announced Thursday it is suing six states —California, Michigan, Minnesota, New York, New Hampshire and Pennsylvania —that have refused to turn over detailed voter roll data demanded by federal attorneys earlier this year.

    • Read more
  • PERSISTENT SURVEILLANCEThe Toxic Legacy of 9/11…and How to End It

    By Patrick G. Eddington

    Restoring the Bill of Rights to its proper shape and place in our civic life would be one way to honor those killed on 9/11 and in the wars that followed.

    • Read more
  • SURVEILLANCEFlock Safety’s Feature Updates Cannot Make Automated License Plate Readers Safe

    By Sarah Hamid and Rindala Alajaji

    Two recent statements from the surveillance company reveal a troubling pattern: when confronted by evidence of widespread abuse, Flock Safety has blamed users, downplayed harms, and doubled down on the very systems that enabled the violations in the first place.

    • Read more
  • SURVEILLANCEPervasive Surveillance of People Is Being Used to Access, Monetize, Coerce, and Control

    New research has underlined the surprising extent to which pervasive surveillance of people and their habits is powered by computer vision research – and shone a spotlight on how vulnerable individuals and communities are at risk.

    • Read more
  • SURVEILLANCEFinancial Surveillance Is Expanding—but So Is the Resistance

    By Nicholas Anthony

    The last few months were hectic, but not all bad. Amidst the government surveilling cash, prosecuting people in bad faith, and creating new surveillance mechanisms, there were significant wins: Courts pushed back on overreach and Congress began to offer reforms to correct past mistakes.

    • Read more
  • DRONESUnmanned Systems Are Not Revolutionary (but Could Be)

    By Layton Mandle

    Rather than revolutionizing warfare, unmanned systems have emerged as evolutions within the larger information revolution; advancements to be sure, but failing to render conventional militaries obsolete or dramatically reshaping force structures.

    • Read more
  • SURVEILLANCEFrom Help to Harm: How the Government Is Quietly Repurposing Everyone’s Data for Surveillance

    By Nicole M. Bennett

    The data that people provide to U.S. government agencies for public services such as tax filing, health care enrollment, unemployment assistance and education support is increasingly being redirected toward surveillance and law enforcement.

    • Read more
  • ARGUMENT: REINING IN DHS I&A How DHS Laid the Groundwork for More Intelligence Abuse

    I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.

    • Read more
  • SURVEILANCESpyware Is Spreading Far Beyond Its National-Security Role

    By Angela Suriyasenee

    Spyware is increasingly exploited by criminals or used to suppress civil liberties, and this proliferation is in part due to weak regulation.

    • Read more
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Trump administration admits DOGE accessed personal Social Security data
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • Trump’s Homeland Security Ramps Up Surveillance of Legal Immigrants
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Congress aims to strip 'Trojan horse' Chinese drones from all levels of government
  • Spy agencies acquire commercial data with little coordination and few controls
  • States push back against Chinese drones
  • New records reportedly show Homeland Security buying smartphone data to track you
  • New documents reveal 'huge' scale of US government's cell phone location data tracking
  • DHS Opens Counter-Drone Testbed in Richmond
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies