Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Technological innovation

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Safer and More Precise Nuclear Plant Dismantlement

    As the need for technologies to cut and dismantle reactors and internal structures increases due to the end of the operational lifespan of nuclear power plants, an innovative laser cutting technology for nuclear dismantlement has been developed.

    • Read more
  • Hybrid Reef-Mimicking Experiment Could Provide Protection from Storms and Coastal Flooding

    The U.S. Air Force installed a new kind of structure in the waters of St. Andrew Bay on the shore of the Tyndall U.S. Air Force Base in Florida. The first section of the “self-healing” reef is made of custom-designed concrete modules and living oysters. The reef is designed to protect the base and its people from hurricanes and tidal surges.

    • Read more
  • AI-driven Cyberattacks More Sophisticated and Scalable, but There Are Solutions

    Cyberattacks used to be engineered by crafty hackers looking to infiltrate computer systems. Artificial intelligence now allows hackers to create a new scale of attacks that penetrate banking, critical infrastructure, intellectual property, and even traffic lights and baby monitors.

    • Read more
  • First Tidal Turbine in the Pacific Northwest Signals Wave of the Future

    New tidal turbine tested at PNNL-Sequim showcases the lab’s growing role as a regional center for marine energy research.

    • Read more
  • Recent Hurricanes and Geoengineering

    The recent back-to-back hurricanes that made landfall in the United States have sparked conspiracy theories about the government creating these disasters through geoengineering. While such theories are false, they have drawn attention to the risky idea of geoengineering, which typically refers to the large-scale, intentional manipulation of the earth’s processes to modify weather.

    • Read more
  • New AI Model Could Make Power Grids More Reliable Amid Rising Renewable Energy Use

    As renewable energy sources such as wind and solar become more widespread, managing the power grid has become increasingly complex. An AI model that can address the uncertainties of renewable energy generation and electric vehicle demand, making power grids more reliable and efficient.

    • Read more
  • Accelerating Clean Energy Geothermal Development on Public Lands

    Geothermal energy is one of our greatest untapped clean energy resources on public lands. Replenished by heat sources deep in the Earth, geothermal energy generates electricity with minimal carbon emissions. Interior Department announces new leases and pioneering project approval, and proposes simplified permitting.

    • Read more
  • Emerging Tech and Terrorism: Adoption Patterns and Implications

    The diffusion of innovation theory highlights that most organizations, groups, and individuals adopt innovations in the mid-to-late product lifecycle. This applies to technology adoption by terror groups: most violent non-state actors will adopt technology once it has crossed several thresholds, including cost, availability, testing (i.e., proof of concept), and ease of use.

    • Read more
  • World War I Was the Crucible of Air Power. Ukraine Looks the Same for Drones

    We seem to be seeing a new kind of air battle—lower, slower at close quarters and in a physical environment where fighter aircraft cannot intervene affordably or effectively. Could it be that Ukraine is to small unmanned systems what World War I was to aircraft?

    • Read more
  • Voters: Here’s How to Spot AI “Deepfakes” That Spread Election-Related Misinformation

    For years, people have spread misinformation by manipulating photos and videos with tools such as Adobe Photoshop. These fakes are easier to recognize, and they’re harder for bad actors to replicate on a large scale. Generative AI systems, however, enable users to create content quickly and easily. Domestic and foreign adversaries can use deepfakes and other forms of generative AI to spread false information about a politician’s platform or doctor their speeches.

    • Read more
  • Leveraging AI to Enhance U.S. Cybersecurity

    Artificial intelligence (AI) and machine learning (ML) can potentially provide the homeland unprecedented opportunity to enhance its cybersecurity posture. DHS S&T is exploring the possibilities of using new advances in this technology to detect threats, increase resilience and provide more supply chain oversight.

    • Read more
  • CyberForce Competition Challenges College Students to Use Cybersecurity Skills to Defend Their Wind Energy System

    College teams will work to outsmart a simulated attack on a U.S. wind energy plant. The CyberForce Competition offers students hands-on experience, igniting their passion for cybersecurity.

    • Read more
  • Autonomous Disaster Response Technology Successfully Applied to Fire Extinguishing System of a 3,200-ton Vessel

    An innovative technology for autonomously responding, without crew intervention, to ruptures to the pipes within the fire extinguishing system of vessels has been successfully verified for the first time in Korea.

    • Read more
  • Social Media Platforms Aren’t Doing Enough to Stop Harmful AI Bots, Research Finds

    While artificial intelligence (AI) bots can serve a legitimate purpose on social media — such as marketing or customer service — some are designed to manipulate public discussion, incite hate speech, spread misinformation or enact fraud and scams.

    • Read more
  • Oversight Revealed in AI Image Recognition Tools

    Artificial intelligence can help people process and comprehend large amounts of data with precision, but the image recognition platforms and computer vision models that are built into AI frequently overlook an important back-end feature called the alpha channel. Researchers developed a proprietary attack called AlphaDog to study how hackers can exploit this oversight.

    • Read more
  • « first
  • ‹ previous
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • …
  • next ›
  • last »

More headlines

  • DHS S&T Delivers New Capability for Detecting Presence of Life to Law Enforcement
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Trump administration’s AI team comes into focus, as agencies reach 1,700 AI use cases
  • WATCH: AI's Role at DHS with Gary Barber, Matthew Ferraro
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Researchers propose hydrogen storage using existing infrastructure in lakes and reservoirs
  • China, Clean Technologies, and National Security
  • Bill ordering DHS to explore AI for border security passes House
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Are We Ready for a ‘DeepSeek for Bioweapons’?

    Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”

    • Read more
  • Bookshelf: Preserving the U.S. Technological Republic

    The United States since its founding has always been a technological republic, one whose place in the world has been made possible and advanced by its capacity for innovation. But our present advantage cannot be taken for granted.

    • Read more
  • Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled

    “The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.

    • Read more
  • Ukraine Drone Strikes on Russian Airbase Reveal Any Country Is Vulnerable to the Same Kind of Attack

    Air defense systems are built on the assumption that threats come from above and from beyond national borders. But Ukraine’s coordinated drone strike on 1 June on five airbases deep inside Russian territory exposed what happens when states are attacked from below and from within. In low-level airspace, visibility drops, responsibility fragments, and detection tools lose their edge. Drones arrive unannounced, response times lag, coordination breaks.

    • Read more
  • Shots to the Dome—Why We Can’t Model US Missile Defense on Israel’s “Iron Dome”

    Starting an arms race where the costs are stacked against you at a time when debt-to-GDP is approaching an all-time high seems reckless. All in all, the idea behind Golden Dome is still quite undercooked.

    • Read more
  • Our Online World Relies on Encryption. What Happens If It Fails?

    Quantum computers will make traditional data encryption techniques obsolete; BU researchers have turned to physics to come up with better defenses.

    • Read more
  • Virtual Models Paving the Way for Advanced Nuclear Reactors

    Computer models predict how reactors will behave, helping operators make decisions in real time. The digital twin technology using graph-neural networks may boost nuclear reactor efficiency and reliability.

    • Read more
  • Critical Minerals Don’t Belong in Landfills – Microwave Tech Offers a Cleaner Way to Reclaim Them from E-waste

    E-waste recycling focuses on retrieving steel, copper, aluminum, but ignores tiny specks of critical materials. Once technology becomes available to recover these tiny but valuable specks of critical materials quickly and affordably, the U.S. can transform domestic recycling and take a big step toward solving its shortage of critical materials.

    • Read more
  • Microbes That Extract Rare Earth Elements Also Can Capture Carbon

    A small but mighty microbe can safely extract the rare earth and other critical elements for building everything from satellites to solar panels – and it  has another superpower: capturing carbon dioxide.

    • Read more
  • Virtual Models Paving the Way for Advanced Nuclear Reactors

    Computer models predict how reactors will behave, helping operators make decisions in real time. The digital twin technology using graph-neural networks may boost nuclear reactor efficiency and reliability.

    • Read more
  • Critical Minerals Don’t Belong in Landfills – Microwave Tech Offers a Cleaner Way to Reclaim Them from E-waste

    E-waste recycling focuses on retrieving steel, copper, aluminum, but ignores tiny specks of critical materials. Once technology becomes available to recover these tiny but valuable specks of critical materials quickly and affordably, the U.S. can transform domestic recycling and take a big step toward solving its shortage of critical materials.

    • Read more
  • Microbes That Extract Rare Earth Elements Also Can Capture Carbon

    A small but mighty microbe can safely extract the rare earth and other critical elements for building everything from satellites to solar panels – and it  has another superpower: capturing carbon dioxide.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies