Special Section - Homeland & Cybersecurity - Washington Times
Skip to content

Homeland & Cybersecurity

The latest coverage of the Department of Homeland Security and cyber threats around the globe.

Feds were wiretapping head of Donald Trump's presidential campaign

By Victor Morton - The Washington Times

U.S. government investigators were wiretapping the head of Donald Trump's presidential campaign, both before and after the election, CNN reported Monday night. Published September 18, 2017

Recent Stories

Sen. Mark Warner, Virginia Democrat. (AP Photo/Susan Walsh)

FTC asked to investigate Equifax breach

- The Washington Times

The Federal Trade Commission is the latest government agency being asked to investigate the recent Equifax breach after receiving a formal request Wednesday from Sen. Mark Warner, Virginia Democrat.

Massachusetts to sue Equifax over data breach

Associated Press

Massachusetts Attorney General Maura Healey has filed notice of her intent to sue the credit reporting company Equifax after the company announced 143 million Americans had their information exposed - including Social Security numbers, birthdates and address histories.

Illustration on the impact of Chinese steel by Alexander Hunter/The Washington Times

When illegal goods cross the border

When we hear the president talk about the need for increased U.S. border security, we usually think of illegal immigration. But there is another crucial aspect to protecting our borders the president is working to address — the influx of illegal goods from foreign countries streaming across our borders — goods that threaten our domestic manufacturing industry, delay job growth and undermine our national security.

President Donald Trump smiles Kuwait leader Sheikh Sabah Al Ahmad Al Sabah during a news conference in the East Room of the White House, Thursday, Sept. 7, 2017, in Washington. (AP Photo/Evan Vucci)

State officials seek bigger say in fighting election hackers

- The Washington Times

Eleven months after the 2016 presidential vote, top election officials in the states say they still can't determine the level of Russian hacking in their electoral systems in part because they lack the security clearances to discuss the issue with the Department of Homeland Security.

A family looks towards metal bars marking the U.S. border where it meets the Pacific Ocean in Tijuana, Mexico, on March 2, 2016. (Associated Press) **FILE**

DHS picks four more border wall designs

- The Washington Times

Homeland Security awarded four contracts Thursday to build prototypes of a non-concrete border wall on the U.S.-Mexico boundary, rounding out the finalists for President Trump's signature campaign promise.

FILE - In this Feb. 2015 file photo, President Barack Obama speaks during a summit on cybersecurity and consumer protection, Friday, Feb. 13, 2015, at Stanford University in Palo Alto, Calif.   The House on Wednesday is expected to pass long-awaited legislation designed to thwart cyberattacks by encouraging private companies to share with the government information about the methods of their attackers.   (AP Photo/Evan Vucci) **FILE**

U.S. cybersecurity stuck in its own 'Groundhog Day'

When it comes to cybersecurity, the U.S. is stuck in its own "Groundhog Day." But a happy ending may not be in the cards. Unlike the weatherman, it's not clear that we are learning from the past.

This April 11, 2017, photo shows a Wells Fargo bank in northeast Jackson, Miss. Wells Fargo said Thursday, Aug. 31, 2017, that 3.5 million customers were impacted by its fake accounts scandal, a dramatic increase from the 2.1 million accounts it originally estimated. (AP Photo/Rogelio V. Solis, File)

Wells Fargo says 3.5 million accounts involved in scandal

- Associated Press

The scope of Wells Fargo's fake accounts scandal grew significantly on Thursday, with the bank now saying that 3.5 million accounts were potentially opened without customers' permission between 2009 and 2016.

Illustration on the challenge for Trump posed by North Korea by Nancy Ohanian/Tribune Content Agency

Making the best of a bad nuclear hand

- The Washington Times

That so many of the nation's leading Democrats believe President Trump poses a greater threat to world peace than the mad dog leader of a nuclearized North Korea says more about them than either the president or Kim Jong-un.

(Associated Press/File)

'Guccifer' hacker who exposed Clinton emails wishes to serve sentence in native Romania: Report

- The Washington Times

Marcel Lehel Lazar, the computer hacker known as "Guccifer" who first exposed Hillary Clinton's use of a private email server while secretary of state, said he'll fight against being extradited from his native Romania to the United States next year to serve the remainder of a 52-month prison sentence for hacking a handful of high-profile American politicos.

This summer's crackdowns on illicit bitcoin activity has been considerable, but the dramatic surge in the currency's overall value poses even more challenges. (Associated Press/File)

Military, intelligence agencies alarmed by surge in bitcoin value in 'dark web' fight

- The Washington Times

The value of the shadowy digital currency known as bitcoin has jumped to record highs this month, sending shock waves through America's defense and intelligence agencies, which fear its growth signals a surge in use by terrorists, drug kingpins, white-collar criminals and Russian cybercriminals who don't want to be tracked by the world's governments.

Clint Watts, a disinformation expert, says a propaganda tracking tool he helped develop found evidence the Kremlin is exploiting White House divisions online. (Associated Press)

Tracking tool charts how Russian bots target U.S. divisions

- The Washington Times

A former FBI special agent-turned disinformation expert says a propaganda tracking tool he helped develop took less than a week to pinpoint evidence of Kremlin efforts to exploit current White House political divisions at the highest levels of national security.

This image released by HBO shows Nikolaj Coster-Waldau as Jaime Lannister in an episode of "Game of Thrones," which aired Sunday, Aug. 6. An individual using the name "Mr. Smith" posted a fresh cache of stolen HBO files, including some apparently related to the show "Game of Thrones," online Monday, part of what the purported hacker has claimed is a much larger trove of stolen HBO material. (Macall B. Polay/HBO via AP)

Hackers demand millions in ransom for stolen HBO data

- Associated Press

A group of hackers posted a fresh cache of stolen HBO files online Monday, and demanded a multimillion-dollar ransom from the network to prevent the release of entire television series and other sensitive proprietary files.

Illustration on Russian cyber attacks on Ukraine by Alexander Hunter/The Washington Times

Why Ukraine deserves cyberattack help from the West

The first sign that the world had been afflicted by one of the worst cyberattacks in history came in a relatively innocent message: "Oops, your important files are encrypted." It almost sounds accidental; it was not. The attack began on the morning of June 27 in Ukraine and quickly spread across the globe, infecting systems in France, Germany, Italy, Poland, United Kingdom, Australia and the United States.

This June 6, 2013, file photo shows the National Security Administration (NSA) campus in Fort Meade, Md., where the U.S. Cyber Command is located. U.S. officials say the Trump administration, after months of delay, is finalizing plans to revamp the nation's military command for defensive and offensive cyber-operations. The plan would eventually split it from the intelligence-focused National Security Agency in hopes of intensifying America's ability to wage cyber war against the Islamic State group and other foes. (AP Photo/Patrick Semansky, File)

U.S. to create independent military cyber command

- Associated Press

After months of delay, the Trump administration is finalizing plans to revamp the nation's military command for defensive and offensive cyber operations in hopes of intensifying America's ability to wage cyberwar against the Islamic State group and other foes, according to U.S. officials.

This December 2015, file photo shows U.S. District Judge Derrick Watson in Honolulu. Watson on Thursday, July 13, 2017, expanded the list of family relationships needed by people seeking new visas from six mostly Muslim countries to avoid President Donald Trump's travel ban. Watson ordered the government not to enforce the ban on grandparents, grandchildren, brothers-in-law, sisters-in-law, aunts, uncles, nieces, nephews and cousins of people in the United States. (George Lee /The Star-Advertiser via AP, File)

Judge in Hawaii carves new hole in Trump travel ban

- The Washington Times

A federal judge took another swing at President Trump's travel ban late Thursday, ruling that the administration must expand the definition of family who are exempted from his policy -- and also dramatically expanding the number of refugees who can be admitted.

In this Friday, July 7, 2017, file photo U.S. President Donald Trump meets with Russian President Vladimir Putin at the G-20 Summit in Hamburg. (AP Photo/Evan Vucci, File)

Democrats back effort to block U.S.-Russia cyber deal

- The Washington Times

A Democratic bid to block the United States from establishing a cybersecurity alliance with Russia is gaining steam in Congress after President Trump discussed and then dismissed creating an "impenetrable" cybersecurity unit this week with his Kremlin counterpart.

Recent Opinion Columns

Erasing Radical Ideology Illustration by Greg Groesch/The Washington Times

A Marshall Plan to defeat global terrorism

Global terrorism is spreading like a dangerous cancer that knows no borders. It cannot be defeated by the military alone. As the Islamic State's grip on Mosul is faltering today, so must its grip on the young minds of Iraq through instruction in religious freedom and reconciliation.

Cyber Warfare Illustration by Greg Groesch/The Washington Times

Warfare goes digital in the 21st century

Russia's intelligence service hacks Democratic Party computer networks and puts out stolen emails in a bid to influence the 2016 election. China says it owns 90 percent of the South China Sea and begins building military bases under a vague historical claim to the strategic waterway. Iranian hackers break into American banks and a water control computer network at an upstate New York dam. Welcome to the new form of conflict in the 21st century: information warfare.

White House press secretary Sean Spicer speaks to the media during the daily press briefing at the White House, Tuesday, March 21, 2017, in Washington. Spicer discussed healthcare, immigration, and other topics. (AP Photo/Andrew Harnik)

Fake legal standing

The Hawaii federal court's recent nationwide block of President Trump's new executive order on immigration is troubling. The court's decision turns on its head the important requirement that persons have legitimate "standing" to invoke the power of the federal courts.

Trump Claims of Eavesdropping of His Campaign Illustration by Linas Garsys/The Washington Times

Tweets and trials

Two of the government's highest ranking intelligence officials will go before a House committee next week to testify about President Trump's bombastic claim that his predecessor "tapped" his phones during the 2016 election.

President Donald Trump arrives for a St. Patrick's Day reception in the East Room of the White House in Washington, Thursday, March 16, 2017. (AP Photo/Andrew Harnik)

Mr. Trump's travel ban

President Trump and the lower federal courts are playing a dangerous game of ping-pong, and the nation's security is paying for it. The president, who is responsible for the nation's safety, proposes and certain federal judges, who have no such responsibility dispose. The president proposes again, and again a judge or two dispose.

From The Vault

Huma Abedin, one of Hillary Clinton's top aides from her time in the State Department and again on the campaign trail, had shared the laptop with now-estranged husband Anthony Weiner. (Associated Press)

FBI feared Huma Abedin's laptop had been hacked, contained secret emails

- The Washington Times

The FBI believed Huma Abedin's laptop computer did have evidence she and her boss, former Secretary of State Hillary Clinton, mishandled classified information, according to a search warrant released Tuesday that shows the basis agents had for upending the presidential election with their controversial election-season probe.

In this July 25, 2016, file photo, John Podesta, Clinton Campaign Chairman, speaks during the first day of the Democratic National Convention in Philadelphia. Podesta, a top adviser to Hillary Clinton, on Tuesday, Oct. 11, accused Roger Stone, a longtime Donald Trump aide, of receiving "advance warning" about WikiLeaks' plans to publish thousands of hacked emails and suggested the Republican candidate is aiding the unprecedented Russian interference in American politics. (AP Photo/J. Scott Applewhite, File)

John Podesta links Donald Trump's campaign to Russian email hacking

- Associated Press

Hillary Clinton's top adviser said the FBI is investigating Russia's possible role in hacking thousands of his personal emails, an intrusion he said Donald Trump's campaign may have been aware of in advance.

Democratic presidential candidate Hillary Rodham Clinton peers over a podium while addressing an audience during a campaign stop at Trident Technical College, Wednesday, June 17, 2015, in North Charleston, S.C. (AP Photo/David Goldman) ** FILE **

New emails disprove Clinton's story

- The Washington Times

The Obama administration acknowledged Monday that the FBI found at least 14,900 more email messages former Secretary of State Hillary Clinton never turned over to the government, and officials are facing intense pressure to release them ahead of November's election.