Homeland Security

Crash analytics: How data can help eliminate highway deaths

Highway safety groups' strategy, called Toward Zero Deaths, is ambitious, but data analytics combined with the "Four Es" make it possible.

Social media, crime fighter

Police can use social networks to spot trends, counter threats and communicate with the public. But it also has potential pitfalls, law enforcement officers say.

'Elite' hacker done in by everyday iPhone function

A hacker who posted racy photos gloating about his hack of police officers' home addresses didn't realize the pictures were GPS-tagged and time-stamped.

DHS to track video-game consoles

DHS and the U.S. Navy are interested in extracting data from video game consoles purchased overseas, in order to catch terrorists and pedophiles.

National mobile alert system goes live; now phones have to catch up

CMAS can send text-based emergency alerts to all mobile phones in a targeted area, though many phones aren't yet equipped to receive them.

FCC, wireless industry battle 'epidemic' of smart-phone thefts

The PROTECT Initiative will use a database of phone and tablet serial numbers to render lost or stolen devices inactive and educate the public on protective steps.

Right on bin Laden, analyst would use tweets to predict future

A company that called Osama bin Laden's death four hours before it was announced claims it can use tweets to predict the future, and has partnered with Twitter to prove it.

iPad is the new search warrant

Butte County, Calif., says it's the first county in the state to let judges use digital signatures to issue search warrants via their iPads.

CBP exposes contractor trade secrets in surveillance project

Customs and Border Protection took down documents included in a solicitation for the "virtual border fence" project that may have included proprietary contractor information.

MIT team nabs 3 suspects in State's TAG Challenge, 2 go free

The contest to test social media's ability to work quickly across international borders produces a partial, but still pretty impressive, result.

When does online radicalism become real-world terrorism?

Though there is no litmus test to predetermine when or even if an extremist on the Web will become a violent terrorist, there are a few tell-tale signs.

Warrantless cell-phone tracking widespread, study finds

U.S. police routinely track cell phones in their investigations, but only a tiny minority obtain warrants to do so, according to an ACLU investigation.

DHS getting a bad rap on cybersecurity?

Sen. John McCain's recent rant about DHS could make even an airline passenger feel sorry for the department.

'No one would tolerate' Internet crime rates in physical world, FCC official says

Officials stop short of calling for regulation of industry cybersecurity but tell a House panel that current efforts are "not working."

Don't look now, but everybody (CIA, DHS, etc.) is watching

As social media analytics improves, the intelligence community and other agencies are monitoring the traffic on popular sites. But could they put privacy at risk?

More from 1105 Public Sector Media Group