Skip to content

Homeland & Cybersecurity

The latest coverage of the Department of Homeland Security and cyber threats around the globe.

Senate Intelligence Committee Chair Sen. Dianne Feinstein, D-Calif. arrives to make a statement on Capitol Hill in Washington, Thursday, April 3, 2014, after a closed hearing to examine intelligence matters. The Senate Intelligence Committee's expected vote to approve declassifying part of a secret report on Bush-era interrogations of terrorism suspects puts the onus on the CIA and a reluctant White House to speed the release of one of the most definitive accounts about the government's actions after the 9/11 attacks. (AP Photo/Molly Riley)

Feinstein's aides first spied on the CIA and swiped documents, Bayh charges

By Rowan Scarborough - The Washington Times

The Evan Bayh report's bottom line: The unnamed CIA officers acted reasonably when trying to confirm their suspicions that the Feinstein cadre took documents that the CIA had designated as privileged, a designation the White House counsel backed up. Published January 21, 2015

Recent Stories

"Intelligent' computer keyboard can identify users by the pattern of their key taps. (American Chemical Society)

True cybersecurity: 'Intelligent' computer keyboard identifies users by pattern of their key taps

- The Washington Times

Protective computer passwords have some competition. Researchers at the Georgia Institute of Technology have developed a novel intelligent computer keyboard that not only cleans itself - but can identify users by the pattern and style of their fingertips and keystrokes. The "human-machine interfacing" device, reported in the American Chemical Society's academic journal "Nano," could provide a foolproof way to prevent unauthorized users from gaining direct access to computers.

Obama's 'lone wolf' focus misguided as terrorist threat expands, critics say

- The Washington Times

President Obama has assured Americans for years that the core of al Qaeda is "decimated," but the group's claimed role in last week's massacres in France, the spread of splinter terrorist groups throughout the Middle East and rise of the Islamic State underscore how the terrorist threat is expanding as the administration tries to prevent such commando-style attacks in the U.S.

Boko Haram leader Abubakar Shekau pledged support to al-Baghdadi's group in a video circulated in July, and has, in the months since, begun including the jihadi black banner as well as the Islamic State's de facto anthem, 'My Umma, Dawn has Arrived,' to "the musical repertoire on its videos," said Peter J. Pham, who heads the Africa Center at the Atlantic Council. (Associated Press)

Boko Haram embraces Islamic State model for extremist jihad

- The Washington Times

With the world's attention focused on Paris, analysts and intelligence officials are picking up an equally disturbing development on the global jihadi landscape: the growing connection between the Middle East-based Islamic State and the shadowy Nigerian terrorist group Boko Haram.

President Barack Obama speaks at the Federal Trade Commission (FTC) offices at the Constitution Center in Washington, Monday, Jan. 12, 2015, about his plan to improve confidence in technology by tackling identify theft and improving consumer and student privacy. (AP Photo/Carolyn Kaster)

Obama lays out new data-protection bills

- The Washington Times

Marching toward his State of the Union address later this month, President Obama on Monday laid out new privacy proposals to protect American consumers and students from identity theft and data breaches.

Recent Opinion Columns

James Clapper          T.J. Kirkpatrick/The Washington Times

Throwing Clapper under the bus

When President Obama attributed the rise in Iraq of the Islamic State, or ISIS, to the failures of the U.S. intelligence community earlier this week, naming and blaming directly National Intelligence Director James R. Clapper, he was attempting to deflect criticism of his own incompetence.