Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Espionage

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Octopus Maps Encourage Conspiratorial Thinking, Research Shows

    Octopuses have been one of mapmakers’ favorite symbols for hundreds of years — used primarily to portray threats of political movements, financial systems, warring empires and the unknown.

    • Read more
  • Pervasive Surveillance of People Is Being Used to Access, Monetize, Coerce, and Control

    New research has underlined the surprising extent to which pervasive surveillance of people and their habits is powered by computer vision research – and shone a spotlight on how vulnerable individuals and communities are at risk.

    • Read more
  • Targeting Nuclear Scientists

    The killing of Iranian nuclear scientists has been an integral part of Israel’s campaign, stretching back more than two decades, to disrupt and derail Iran’s nuclear weapons program. The 14 Iranian scientists killed on and since 13 June were all leading members of the Iran’s nuclear weaponization group.

    • Read more
  • Nuclear Scientists  Have Long Been Targets in Covert Ops – Israel Has Brought That Policy Out of the Shadows

    Since 1944, there have been at least 100 instances of what researchers call nuclear “scientist targeting.” The most recent example are the 14 senior Iranian nuclear scientists Israel killed on 13 June as part of the opening move of its surprise attack on Iran, in which Israel has also decapitated the Iranian military, intelligence services, and Revolutionary Guard by killing practically all of these organizations’ leaders and senior officers – several dozen in all. In the week since the attack was launched, Israel has killed three more Iranian nuclear scientists.

    • Read more
  • The Shadow Architects of Power

    Intelligence agencies in authoritarian regimes have distinct foreign policy preferences and actively work to advance them. MIT Ph.D. candidate Suzanne Freeman reveals how these intelligence agencies do it.

    • Read more
  • The Hole in Canada’s Intelligence System Is ASIS-shaped

    A hardy perennial in Ottawa politics is whether Canada should create a foreign intelligence service equivalent to the United States’ Central Intelligence Agency (CIA) or Britain’s Secret Intelligence Service (SIS, aka MI6).

    • Read more
  • How Digital Identities Challenge Traditional Espionage

    It used to be so simple. An intelligence officer could fly to a country, change passports and, with a false identity, emerge as a completely different person. But those days are long since over.

    • Read more
  • Europe’s Moment of Truth: A Democracy Shield for Today and Tomorrow

    Democracy in Europe is under growing pressure. Authoritarian regimes like Russia and the People’s Republic of China are conducting increasingly sophisticated foreign interference campaigns. Internally, illiberal actors – who are often the beneficiaries of this foreign interference — are eroding the rule of law and civic freedoms as democratic norms deteriorate in the EU’s immediate neighborhood. The EU’s European Democracy Shield, announced in 2024 and expected in 2025, aims to counter these threats to democracy.

    • Read more
  • A British University’s Technology Entanglements with Russia and China

    A major British research university’s joint venture campus in China maintains partnerships and close links with entities sanctioned by Britain, the US, EU and others for supporting Russia’s invasion of Ukraine and assisting China’s military modernization and human rights violations. The links to sanctions highlight the risks posed by foreign science, technology and academic partnerships in China in a period of heightened geopolitical rivalry, intensifying technological competition and deepening China-Russia cooperation.

    • Read more
  • Circuit Boards Must Be Trusted. So We’d Better Make Them in Australia

    While national security debates have focused on chips and microelectronics, the role of printed circuit board (PCBs) in underpinning system trust has gone largely unexamined. In today’s contested environment, that carries strategic consequences.

    • Read more
  • It’s Not Just Software. Physical Critical Equipment Can’t Be Trusted, Either

    Just auditing the software in critical equipment isn’t enough. We must assume that adversaries, especially China, will also exploit the hardware if they can.

    • Read more
  • Romania at the Crossroads as Europe Watches On

    George Simion and Nicușor Dan will contest the second round of Romania’s presidential election on 18 May. The election could have profound implications for both Romania and Europe.

    • Read more
  • Romania, Foreign Election Interference, and a Dangerous U.S. Retreat

    The Romanian election is but one example of recent foreign election interference incidents. The Russian interference in 2016 U.S. election led Congress, on bipartisan basis, and the relevant agencies in the executive branch, to make many changes to address this threat, but under the new administration, “the U.S. is now moving full steam ahead to completely destroy its defenses against that threat,” Katie Kedian writes. All of the positive U.S. government developments “have been dismantled or severely downgraded,” leaving “the U.S. public less informed and less safe from foreign interference.”

    • Read more
  • Memes and Conflict: Study Shows Surge of Imagery and Fakes Can Precede International and Political Violence

    The widespread use of social media during times of political trouble and violence has made it harder to prevent conflict and build peace.

    • Read more
  • What Happened to Putin’s Friends? How Europe’s Radical Right Navigated the Ukraine Crisis on Social Media

    Russia’s invasion of Ukraine created a dilemma for European radical right parties: these parties had cultivated friendly ties with Vladimir Putin. An analysis of a decade of Facebook posts reveals how these parties strategically managed their communications to avoid the political fallout while maintaining their Eurosceptic agenda.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • White House forms emergency team to deal with China espionage hack
  • U.S. government unveils charges against Iranians who hacked into Trump 2024 campaign
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • FBI says Iran sent hacked Trump info to Biden campaign staffers
  • China select committee urges DHS to ‘aggressively’ enforce UFLPA
  • Chinese hackers nab 60,000 emails in State Department breach
  • CIA’s AI director says the new tech is our biggest threat, and resource
  • Aimed at Protests, Surveillance Contractor’s New Owners Expand Spy Tech Portfolio
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies