Researchers find that Android apps can secretly track users’ whereabouts

New research led by North­eastern pro­fessor Gue­vara Noubir reveals that some Android apps may auto­mat­i­cally transmit sen­si­tive infor­ma­tion, such as the routes you travel, through the phone’s built-​​in sen­sors. A mali­cious devel­oper, he says, “can infer where you live, where you’ve been, where you are going.”

The terror in Nice and security across the EU

France is reeling from its third major attack in 19 months after a lone ter­rorist sped a truck into a crowd of people gath­ered to watch Bastille Day fire­works. The attack killed at least 84 people and injured more than 200 others. We asked North­eastern experts to ana­lyze these types of “lone wolf” ter­rorist attacks, the media’s use of graphic footage from the scene, and what the terror in Nice could mean for the Euro­pean Union’s secu­rity procedures.

Students studying in Turkey are safe, Northeastern actively reaching out to Turkish students

In the wake of Tuesday’s ter­rorist attack at an Istanbul air­port, North­eastern con­firmed that stu­dents on uni­ver­sity pro­grams in the region are safe, and the uni­ver­sity is working to con­tact and offer sup­port to more than 100 Turkish students.

3Qs: What’s the key to keeping the world safe?

I have never been as con­cerned with the world as I am today,” says North­eastern pro­fessor Denise Garcia, who is taking a group of stu­dents to the 11th Inter­na­tional Secu­rity Forum in Geneva this week. Here, she dis­cusses the con­fer­ence, the United States’ stock­pile of nuclear weapons, and the biggest secu­rity threats facing the world today.

Obama’s 2016 State of the Union address, visualized

Pres­i­dent Barack Obama on Tuesday deliv­ered the final State of the Union address of his two-​​term pres­i­dency. To pro­vide analysis of the president’s remarks, we turned to pro­fessor Nick Beauchamp, an expert on U.S. pol­i­tics and polit­ical method­ology who has devel­oped a new method to visu­alize the lan­guage and themes of polit­ical speeches.

Researchers develop system to control information leaks from smartphone apps

A research team led by Northeastern’s David Choffnes has found “exten­sive” leakage of users’ per­sonal iden­ti­fying infor­ma­tion from apps on mobile devices, including pass­words. Their unique ReCon cloud-​​based system can detect those leaks and give you the tools to stop them.

Northeastern secures $20 million agreement with US Army to conduct critical defense research

The $20.4 mil­lion coop­er­a­tive agree­ment pro­vides a unique mech­a­nism for North­eastern to obtain expe­dited funding for research in designing and devel­oping advanced engi­neered mate­rials with secu­rity appli­ca­tions, and expands on the university’s lead­er­ship in secu­rity and resilience research.

Congressman tours Northeastern’s Kostas Research Institute for Homeland Security

U.S. Rep. Seth Moulton received a com­pre­hen­sive overview of Northeastern’s robust port­folio of secu­rity research on Thursday after­noon and under­scored the impor­tance of pro­viding research funding in this area.

Four-​​star general praises Northeastern’s National Guard partnership

National Guard Bureau Chief Gen­eral Frank J. Grass vis­ited the uni­ver­sity on Thursday after­noon to cel­e­brate the part­ner­ship, which will enable guardsmen to earn their master’s degree in home­land secu­rity through the Col­lege of Pro­fes­sional Studies.

New master’s program to prepare future security professionals

North­eastern will launch a first-​​of-​​its-​​kind, inter­dis­ci­pli­nary grad­uate pro­gram this fall to train the next gen­er­a­tion of secu­rity pro­fes­sionals to face the new and evolving chal­lenges of the 21st century.

3Qs: Who’s got your digital dossier?

North­eastern mobile sys­tems expert David Choffnes says data bro­kering, in which the data we share online is bought and sold by third par­ties, has blos­somed into a viable industry and is the reason many pop­ular apps are free. But he says the average user knows little about how their per­sonal infor­ma­tion is shared.