Special Section - Homeland & Cybersecurity - Washington Times
Skip to content

Homeland & Cybersecurity

The latest coverage of the Department of Homeland Security and cyber threats around the globe.

In this June 15, 2017, file photo, people walk inside the Oculus, the new transit station at the World Trade Center in New York. Data collection practices of tech firms are increasingly under the microscope. An Associated Press investigation shows that using Google services on Android devices and iPhones allows the search giant to record your whereabouts as you go about your day. (AP Photo/Frank Franklin II, File)

Google tracks your movements, like it or not

By Ryan Nakashima - Associated Press

Google wants to know where you go so badly that it records your movements even when you explicitly tell it not to. Published August 13, 2018

Recent Stories

Workers wearing yellow hard hats are seen at upper right from the air Saturday, Aug. 11, 2018, near Steilacoom, Wash., at the site on Ketron Island in Washington state where an Horizon Air turboprop plane crashed Friday after it was stolen from Sea-Tac International Airport. Investigators were working to find out how an airline employee stole the plane and crashed it after being chased by military jets that were quickly scrambled to intercept the aircraft. (AP Photo/Ted S. Warren)

'Insider threat': Plane theft illustrates potential for airline employee mayhem

- Associated Press

The theft of an empty plane by an airline worker who performed dangerous loops before crashing into a remote island in Puget Sound illustrated what aviation experts have long known: One of the biggest potential perils for commercial air travel is airline or airport employees causing mayhem.

In this Wednesday, April 19, 2017, file photo, Alex Jones, a right-wing radio host and conspiracy theorist, arrives for a child custody trial at the Heman Marion Sweatt Travis County Courthouse in Austin, Texas. (Jay Janner/Austin American-Statesman via AP, File)

Alex Jones winning: He's now more popular than ever

- The Washington Times

Alex Jones of Infowars has been booted from YouTube, Apple, Spotify and Facebook for what the tech giants consider his rampant hate speech. And with that, Jones has become the face of the censorship fight. This seems counterproductive to those who would silence him, yes?

Alex Jones, center, an American conspiracy theorist and radio show host, is escorted out of a crowd of protesters after he said he was attacked in Public Square on Tuesday, July 19, 2016, in Cleveland, during the second day of the Republican convention. (AP Photo/John Minchillo)

Alex Jones shutdown ignites debate over social media content policing, censorship

- The Washington Times

Facebook and YouTube shut down accounts Monday run by radio host Alex Jones, saying his charged rhetoric violated their policies and were detracting from their efforts to spawn a civil conversation. Apple also said it nixed Mr. Jones' podcast from its iTunes subscription lists, and Spotify erased the host's program from its feed, as social media companies began to take a more active role in policing their content.

Confronting the reality of cyber warfare

Since the advent of nuclear weapons, American deterrence has been based on the notion that only adversarial nations with nuclear weapons pose an existential threat to the country's security. In "The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age," David Sanger argues that an additional existential threat now confronts America because we live in a world in which virtually everything we rely on -- whether computers, phones, transportation, electrical power grids, water supplies or global navigation and communications satellites -- is interconnected in cyberspace. It is there that everything is vulnerable to disruption, if not destruction, through the use of cyber-weapons by malevolent adversaries.

Post Leak Helps Terrorists Illustration by Greg Groesch/The Washington Times

When the media acts irresponsibly

When White House Press Secretary Sarah Sanders said media reports compromised the fact that the U.S. government was intercepting Osama bin Laden's satellite phone calls, the media clobbered her.

FBI Director Christopher Wray speaks during the daily press briefing at the White House, Thursday, Aug. 2, 2018, in Washington, as from left, Director of National Intelligence Dan Coats, National Security Agency Director Gen. Paul Nakasone, and Secretary of Homeland Security Kirstjen Nielsen listen. (AP Photo/Evan Vucci)

Trump intel team outlines plans to block foreign threats

- The Washington Times

Top U.S. national security and intelligence officials said Thursday that President Trump is leading a comprehensive, governmentwide effort to stop Russia and others from interfering in the midterm elections, as the White House sought to counter accusations that Mr. Trump is downplaying the threat.

In this file photo dated Friday, March 30, 2018, a Kurdish security officer escorts Alexanda Kotey, left, and El Shafee Elsheikh, who were allegedly among four British jihadis who made up a brutal Islamic State cell dubbed "The Beatles," at a security center in Kobani, Syria. (AP Photo/Hussein Malla, FILE)

Terrorist attacks are down worldwide, new data shows

- The Washington Times

The number of terrorist attacks and associated deaths worldwide declined for a third consecutive year in 2017, according to University of Maryland data released Wednesday, citing a particular drop in incidents by the Islamic State.

This March 29, 2018, file photo shows the Facebook logo on screens at the Nasdaq MarketSite in New York's Times Square. Facebook plummeted 19 percent Thursday, July 26, 2018, after warning of slower growth ahead, erasing more than $100 billion in value. (AP Photo/Richard Drew, File)

U.K. lawmakers recommend tougher rules on Facebook

- Associated Press

The U.K. government should increase oversight of social media like Facebook and election campaigns to protect democracy in the digital age, a parliamentary committee has recommended in a scathing report on fake news, data misuse and interference by Russia.

"I encourage anyone who would characterize a single piece of of this three-part strategy as anything less than mission critical to further investigate," said Rep. Kevin Yoder, Kansas Republican and chairman of the homeland security spending subcommittee. (Associated Press)

House appropriations committee passes 2019 homeland security funding bill; includes cash for wall

- The Washington Times

The House Appropriations Committee on Wednesday passed its 2019 spending bill that funds the Department of Homeland Security, provides about $5 billion for border security efforts -- including President Trump's desired U.S.-Mexico border wall -- and includes several checks on the administration tied to the ongoing child separation crisis at the border.

FILE - In this July 11, 2018 file photo, students and community activists march at Northeastern University in Boston demanding the school cancel a multimillion-dollar research contract with U.S. Immigration and Customs Enforcement. Northeastern was hired by ICE to research U.S. technology exports. Several colleges with ties to ICE are being pressured to split with the agency amid uproar over the separation of migrant families along the nation's border. (AP Photo/Sarah Betancourt, File)

Fanatics unbound

Eliminating law enforcement on the nation's southern border is a cherished goal of a noisy segment of undetermined size among Democrats. Cooler Democratic heads think it's party suicide, and it wouldn't help the nation, either. But cool heads in the party are scarce. Playing the "I'm crazier than thou" game is more fun.

The attacks on Finnish internet-connected devices originating from ChinaNet, began spiking July 12, four days before President Trump and Russian President Vladimir Putin met in Helsinki, according to analysis from the Seattle-based cybersecurity firm F5. (ASSOCIATED PRESS)

Chinese hackers struck days before Helsinki summit

- The Washington Times

Chinese hackers launched a massive attack on internet-connected devices in Finland in an attempt to sweep up audio and visual intelligence ahead of President Trump's summit there with Russian President Vladimir Putin, according to a private cyber analysis released Thursday.

FILE - In this Feb. 7, 2018 File, photo, a neon sign hanging in the window of Healthy Harvest Indoor Gardening in Hillsboro, Ore., shows that the business accepts bitcoin as payment. The Wisconsin Ethics Commission is considering a policy guiding what to do about political contributions made in bitcoin and other cryptocurrencies. Bitcoin is gaining in popularity as a type of privately issued digital money. The Wisconsin Ethics Commission is holding a hearing Tuesday, April 24, 2018, in response to February request from the Libertarian Party of Wisconsin for public input and a policy on the use of campaigns accepting cryptocurrencies and making payments with them.(AP Photo/Gillian Flaccus File)

Capitol Hill lawmakers wrestle with regulating cryptocurrencies

- The Washington Times

Lawmakers have expressed mounting concern over the ever-expanding and still almost completely unregulated world of cryptocurrencies, from tax issues to preventing them from causing anarchy to simply tying the digital dollars into the world's mainstream banking system.

Cyber Security Illustration by Greg Groesch/The Washington Times

Beyond corporate cybersecurity

Cybersecurity presents an unprecedented risk costing companies billions of dollars in market valuation, lost revenue and expenses. Every 39 seconds, there is a cyberattack and 64 percent of companies have experienced a web-based attack.

Recent Opinion Columns

Caitlin Sanger, of Franklin Park, N.J., pauses to cry outside the Supreme Court in Washington, Tuesday, June 26, 2018, as she speaks about her father being detained by ICE and protests immigrant families being split up. Naomi Liem, 10, of Franklin Park, N.J., cries lower right and Jocelyn Pangemanan of Highland Park, N.J., stands right. (AP Photo/Carolyn Kaster)

A needed tutorial in the law

The U.S. Supreme Court had a lesson Tuesday for the good-hearted folk who would apply feelings instead of the Constitution to the interpretation of the law. By the familiar 5 to 4 vote on constitutional issues, the High Court upheld the clear language of Congress in support of President Trump's order limiting the entry of risky foreign nationals to the United States.

Illustration on Federal contracting by Greg Groesch/The Washington Times

Protecting the Pentagon's cloud data

Alexa, how do we get competition? When Democrats rule D.C., you have to hand it to them. They know how to take care of their fellow Democrats. When Republicans rule D.C., they take care of the Democrats, too.

Removing Obama Net Neutrality Regulations Illustration by Greg Groesch/The Washington Times

Restoring a light touch to Internet regulations

Over the last two weeks, there has been a vigorous debate about internet regulation. Under the plan I recently proposed, the Federal Communications Commission (FCC) would restore internet freedom by rolling back heavy-handed government regulations imposed during the Obama administration. Some have tried to whip Americans into a frenzy by making outlandish claims. Feeding the hysteria are silly accusations that the plan will "end the internet as we know it" or threaten American democracy itself.

Erasing Radical Ideology Illustration by Greg Groesch/The Washington Times

A Marshall Plan to defeat global terrorism

Global terrorism is spreading like a dangerous cancer that knows no borders. It cannot be defeated by the military alone. As the Islamic State's grip on Mosul is faltering today, so must its grip on the young minds of Iraq through instruction in religious freedom and reconciliation.

Cyber Warfare Illustration by Greg Groesch/The Washington Times

Warfare goes digital in the 21st century

Russia's intelligence service hacks Democratic Party computer networks and puts out stolen emails in a bid to influence the 2016 election. China says it owns 90 percent of the South China Sea and begins building military bases under a vague historical claim to the strategic waterway. Iranian hackers break into American banks and a water control computer network at an upstate New York dam. Welcome to the new form of conflict in the 21st century: information warfare.

Trump Claims of Eavesdropping of His Campaign Illustration by Linas Garsys/The Washington Times

Tweets and trials

Two of the government's highest ranking intelligence officials will go before a House committee next week to testify about President Trump's bombastic claim that his predecessor "tapped" his phones during the 2016 election.

President Donald Trump arrives for a St. Patrick's Day reception in the East Room of the White House in Washington, Thursday, March 16, 2017. (AP Photo/Andrew Harnik)

Mr. Trump's travel ban

President Trump and the lower federal courts are playing a dangerous game of ping-pong, and the nation's security is paying for it. The president, who is responsible for the nation's safety, proposes and certain federal judges, who have no such responsibility dispose. The president proposes again, and again a judge or two dispose.

From The Vault

China cyber spy chief revealed

The activities of one of China's cyber spymasters has been revealed for the first time in a government report on Beijing's unfair trade practices made public last week.

Huma Abedin, one of Hillary Clinton's top aides from her time in the State Department and again on the campaign trail, had shared the laptop with now-estranged husband Anthony Weiner. (Associated Press)

FBI feared Huma Abedin's laptop had been hacked, contained secret emails

- The Washington Times

The FBI believed Huma Abedin's laptop computer did have evidence she and her boss, former Secretary of State Hillary Clinton, mishandled classified information, according to a search warrant released Tuesday that shows the basis agents had for upending the presidential election with their controversial election-season probe.

In this July 25, 2016, file photo, John Podesta, Clinton Campaign Chairman, speaks during the first day of the Democratic National Convention in Philadelphia. Podesta, a top adviser to Hillary Clinton, on Tuesday, Oct. 11, accused Roger Stone, a longtime Donald Trump aide, of receiving "advance warning" about WikiLeaks' plans to publish thousands of hacked emails and suggested the Republican candidate is aiding the unprecedented Russian interference in American politics. (AP Photo/J. Scott Applewhite, File)

John Podesta links Donald Trump's campaign to Russian email hacking

- Associated Press

Hillary Clinton's top adviser said the FBI is investigating Russia's possible role in hacking thousands of his personal emails, an intrusion he said Donald Trump's campaign may have been aware of in advance.