Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • I Studied ShotSpotter in Chicago and Kansas City – Here’s What People in Detroit and the More Than 167 Other Cities and Towns Using This Technology Should Know

    One method Detroit and other cities facing high levels of gun violence have employed is gunshot detection technology, specifically the industry-leading ShotSpotter product, which uses acoustic sensors to notify police when the system hears gunfire. Since 2020, my colleagues and I have conducted the largest study on this technology. Our research was designed to test both the efficiency and effectiveness of this technology.

    • Read more
  • Are Mass Layoffs and Data Breaches Connected?

    Layoffs create conditions where disgruntled employees face added stress or job insecurity, so they are more likely to engage in risky behaviors that heighten the company’s vulnerability to data breaches.

    • Read more
  • New U.S. Arctic Strategy Focused on Russian, Chinese Inroads

    The United States is looking to boost intelligence collection in the Arctic and enhance cooperation with allies in the region, to prevent Russia and China from exploiting the cold and icy northern region at America’s expense.

    • Read more
  • Not Just Beijing’s Doing: Market Factors Are Also Hitting Rare Earths Prices

    Have depressed rare earths prices been engineered by the Chinese state to snuff out non-Chinese rivals before they get going? Or do they simply reflect a weak market, with demand rising more slowly than was expected by the promotors of a slew of new projects?

    • Read more
  • Why the Experts Should Answer to the Amateurs

    Tension between experts and non-experts is an inevitable part of modern organizations and societies. Highly trained experts are necessary to keep things functioning smoothly —but accountability matters. We need specialists to solve hard problems, but they need to be accountable to non-experts.

    • Read more
  • Climate Change Has Forced America’s Oldest Black Town to Higher Ground

    Princeville, North Carolina, is relocating with help from a new federal grant. Hurricane Matthew, which submerged the town under more than 10 feet of water, was the final straw. The town has just received millions of dollars in new funding from FEMA to build a new site on higher ground.

    • Read more
  • A $40B Critical Mineral Supply Chain Could Start in Pennsylvania

    Pennsylvania has a mine pollution problem. America has a critical mineral shortage. And both problems may get solved as researchers find these critical and strategic elements in the polluted waters that come from acid mine drainage.

    • Read more
  • Why Chinese Technology Set Off Alarm Bells in Germany

    Even as the German government moves to bar components made by China’s Huawei and ZTE from core parts of the country’s 5G networks, some German companies are looking to work with Chinese firms in other critical areas.

    • Read more
  • In an Era of Dam Removal, California Is Building More

    Earlier this year, the federal government finalized $216 million dollars in funding for a controversial dam project south of the Klamath River, adding to the $1 billion in direct grants already pledged to the project known as Sites Reservoir. This would be California’s first major new reservoir in half a century. Proponents say a new reservoir off the Sacramento River is environmentally friendly.

    • Read more
  • Germany Foils Russian Plot to Assassinate German Arms Company Chief

    German politicians have voiced horror over a report that Russia planned to murder a German arms company boss. US intelligence is said to have uncovered the plot against Rheinmetall chief Armin Papperger.

    • Read more
  • The New Fintech That Knows Whether Your Voice Matches Your Face

    Your face is no longer your own. Nor is your voice. Fraudsters can steal them both from the Internet. And, using the power of AI, they can create a deepfake version of you that’s so convincing it’ll beat bank security. Banks and financial institutions increasingly use voice biometrics these days to confirm a caller’s identity.

    • Read more
  • Transformers: Cooler Side of the Grid

    Failures in transformers cause widespread disruptions across electrical networks, severely affecting grid stability. The financial impact of such failures often goes beyond just the cost of replacing the transformer. Simulations on NSF-funded Stampede2 provide models for a resilient and sustainable electric grid.

    • Read more
  • Hundreds of Tech Companies Want to Cash In on Homeland Security Funding. Here's Who They Are and What They're Selling.

    Whenever concerns grow about the security along the U.S.-Mexico border and immigration, the U.S. government generate dollars — hundreds of millions of dollars — for tech conglomerates and start-ups. Who are the vendors who supply or market the technology for the U.S. government’s increasingly AI-powered homeland security efforts, including the so-called “virtual wall” of surveillance along the southern border with Mexico?

    • Read more
  • Will China's Economy Ever Overtake the U.S.'s?

    China’s ambition to be the world’s largest economy has been dented by COVID-19, the real estate crisis and an aging population. Boosting growth will be the prime focus at a Communist Party meeting.

    • Read more
  • Businesses Are Harvesting Our Biometric Data. The Public Needs Assurances on Security

    Visual data capturing and analysis are particularly critical compared to non-visual data. That’s why its growing use by businesses raises so many concerns about privacy and consent. While the public remains unaware of the extent to which their visual data is being captured and utilized, their information will be vulnerable to misuse or exploitation.

    • Read more
  • « first
  • ‹ previous
  • …
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • …
  • next ›
  • last »

More headlines

  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • DHS scraps $10B small business IT and software contract
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Recently-patched Firefox bug exploited against Tor browser users
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Homeland Security Blocked 500-Plus Ransomware Attacks Since 2021
  • 'Dark tourism' is attracting visitors to war zones and sites of atrocities in Israel and Ukraine. Why?
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Are We Ready for a ‘DeepSeek for Bioweapons’?

    Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”

    • Read more
  • A Brief History of Federal Funding for Basic Science

    Biomedical science in the United States is at a crossroads. For 75 years, the federal government has partnered with academic institutions, fueling discoveries that have transformed medicine and saved lives. Recent moves by the Trump administration — including funding cuts and proposed changes to how research support is allocated — now threaten this legacy.

    • Read more
  • Bookshelf: Preserving the U.S. Technological Republic

    The United States since its founding has always been a technological republic, one whose place in the world has been made possible and advanced by its capacity for innovation. But our present advantage cannot be taken for granted.

    • Read more
  • Critical Minerals Don’t Belong in Landfills – Microwave Tech Offers a Cleaner Way to Reclaim Them from E-waste

    E-waste recycling focuses on retrieving steel, copper, aluminum, but ignores tiny specks of critical materials. Once technology becomes available to recover these tiny but valuable specks of critical materials quickly and affordably, the U.S. can transform domestic recycling and take a big step toward solving its shortage of critical materials.

    • Read more
  • Microbes That Extract Rare Earth Elements Also Can Capture Carbon

    A small but mighty microbe can safely extract the rare earth and other critical elements for building everything from satellites to solar panels – and it  has another superpower: capturing carbon dioxide.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies