Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Biometrics

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • ESPIONAGEHow Digital Identities Challenge Traditional Espionage

    By Kyle McCurdy

    It used to be so simple. An intelligence officer could fly to a country, change passports and, with a false identity, emerge as a completely different person. But those days are long since over.

    • Read more
  • EXTREMISM“The Federal Government Is Gone”: Under Trump, the Fight Against Extremist Violence Is Left Up to the States

    By Hannah Allam

    As President Donald Trump guts the main federal office dedicated to preventing terrorism, states say they’re left to take the lead in spotlighting threats. Some state efforts are robust, others are fledgling, and yet other states are still formalizing strategies for addressing extremism. With the federal government largely retreating from focusing on extremist dangers, prevention advocates say the threat of violent extremism is likely to increase.

    • Read more
  • REAL IDSecurity Theater REALized and Flying without REAL ID

    By Alexis Hancock

    After multiple delays of the REAL ID Act of 2005 and its updated counterpart, the REAL ID Modernization Act, in the United States, the May 7th deadline of REAL ID enforcement has finally arrived. Does this move our security forward in the skies?

    • Read more
  • REAL IDReal ID Is Useless, Unconstitutional, and Finally Here

    By Patrick G. Eddington

    At its core, the mentality behind REAL ID is that every American is a potential airline terrorist first and a citizen of the Republic a very distant second. Among other problems, a REAL ID requirement potentially creates an end-run around direct regulation of the right to travel. REAL ID obliterates the idea of freedom of travel, which is why it should be abolished.

    • Read more
  • BIOMETRICSSecurity Veins: Advanced Biometric Authentication Through AI and Infrared

    Hyperspectral imaging and AI can identify individuals using blood vessels in palms.

    • Read more
  • CYBERSECURITY EDUCATIONUA Little Rock Secures $4.65 Million Grant to Advance Cybersecurity Education

    By Angelita Faller

    The grant, funded by the National Centers of Academic Excellence in Cybersecurity (NCAE-C) within the National Security Agency, will enable UA Little Rock to enhance its efforts in preparing high school teachers to teach cybersecurity.

    • Read more
  • BIOMETRICSAI-driven Gait Analysis Bridges Health Care and Security Fields

    By Rhiannon Koch

    The analysis of a person’s individual walking pattern, or gait, can reveal details about their identity and reflect differences between individuals, groups and even populations.

    • Read more
  • ELECTION INTEGRITYMaking E-voting Safer from Coercion and Vote Buying

    By Tanya Petersen

    As we come to the end of a year in which half the world’s population went to the polls, EPFL researchers developed and field-tested a groundbreaking new technology to protect remote electronic voting or e-voting from voter coercion and vote buying.

    • Read more
  • CRISIS FORECASTINGMultipurpose Model Enhances Forecasting Across Epidemics, Energy, and Economics

    A new machine learning (ML) model from Georgia Tech could protect communities from diseases, better manage electricity consumption in cities, and promote business growth, all at the same time.

    • Read more
  • SURVEILLANCE'Significant' Risks as Facial Recognition in Russia's Subways Goes Regional

    By Andrei Grigoryev

    In a move that human rights advocates warn carries potential risks for civil rights, Russia has begun expanding its facial-recognition payment system for subways to six cities outside of Moscow.

    • Read more
  • SURVEIILANCEDetroit Takes Important Step in Curbing the Harms of Face Recognition Technology

    By Tori Noble

    In a first-of-its-kind agreement, the Detroit Police Department recently agreed to adopt strict limits on its officers’ use of face recognition technology as part of a settlement in a lawsuit brought by a victim of this faulty technology.

    • Read more
  • BIOMETRICSThe New Fintech That Knows Whether Your Voice Matches Your Face

    By John Jeffay

    Your face is no longer your own. Nor is your voice. Fraudsters can steal them both from the Internet. And, using the power of AI, they can create a deepfake version of you that’s so convincing it’ll beat bank security. Banks and financial institutions increasingly use voice biometrics these days to confirm a caller’s identity.

    • Read more
  • ELECTION INTEGRITYMore States Consider Voter ID Laws Amid Conflicting Research on Their Impact

    By Matt Vasilogambros

    36 states require some form of identification to cast a ballot. Voting rights advocates cite research showing that such rules block many legitimate voters — especially young, Black and Latino voters — from the polls. But backers of voter ID laws point to other studies which suggest that the rules have had a minimal effect on voter turnout, partly because Democrats often respond to them by amping up their voter mobilization efforts.

    • Read more
  • DIGITAL IDENTITYCollaborative Research Effort on Digital Identity to Support Secure Delivery of Public Benefits

    NIST has launched a collaborative project to adapt NIST’s digital identity guidelines to support public benefits programs, such as those designed to help beneficiaries pay for food, housing, medical and other basic living expenses.

    • Read more
  • FACIAL RECOGNITIONSeeing Behind the Mask

    There is a need for face recognition to be able to “see behind the mask” for security and safety. Researchers discusses the potential of new software which will allow facial recognition to work despite the mask you use.

    • Read more
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Real ID will change flying within the U.S.
  • Border standoff between Texas, feds intensifies as governor defies Supreme Court ruling
  • Withdraw of REAL ID Act requirements for driving licences temporarily as mDLs accelerate
  • Alumni of Human Identification Lab Attest to Its Influence
  • Congress rejects funding increase for DHS biometric system, directs independent review
  • Texas sues Google over biometric recognition features
  • CBP, Princess Cruise Line Introduces Facial Biometrics at Port of San Francisco
  • Israeli firm develops body cams with facial recognition
  • DHS wants AI forces working more as a department-wide team
  • Report Sheds light on extensive federal use of facial recognition technology
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies