Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • CHINA WATCHThe American TikTok Deal Doesn’t Address the Platform’s Potential for Manipulation, Only Who Profits

    By Andrew Buzzell

    If we want to protect democratic information systems, we need to focus on reducing the vulnerabilities in our relationship with media platforms – platforms with surveillance power to know what we will like, the algorithmic power to curate our information diet and control of platform incentives, and rules and features that affect who gains influence. The biggest challenge is to make platforms less riggable, and thus less weaponizable, if only for the reason that motivated the TikTok ban: we don’t want our adversaries, foreign or domestic, to have power over us.

    • Read more
  • CHINA WATCHElon Musk’s SpaceX Took Money Directly from Chinese Investors, Company Insider Testifies

    By Justin Elliott and Joshua Kaplan

    The newly unsealed testimony marks the first time direct Chinese investment in the company has been disclosed, raising new questions about foreign ownership interests in one of America’s most important military contractors.

    • Read more
  • CYBERSECURITYMultitasking Raises Risk of Phishing

    By Michael Parker

    In the information age, multitasking is often worn as a badge of honor. But according to new research, multitasking may also blind us to hidden threats, thereby increasing our chances of falling victim to cybercrime.

    • Read more
  • DHSKristi Noem Fast-Tracked Millions in Disaster Aid to Florida Tourist Attraction After Campaign Donor Intervened

    By Joshua Kaplan, Justin Elliott and Alex Mierjeski

    The DHS chief has been widely criticized for slowing down FEMA’s response after natural disasters. Texts and emails obtained by ProPublica point to an effective way to get help faster: have one of Noem’s big donors make the ask.

    • Read more
  • CYBERSECURITYMarket Incentives and Cybersecurity: Fixing the Broken System Before It Breaks Us

    By Rajiv Shah and Debi Ashenden

    Cybersecurity is not just an IT issue; it is a shared responsibility and an economic imperative. Only by ensuring resilience can we confidently adopt new technology and realize its benefits. The next horizon of the cyber security strategy would require a mix of incentives—including regulation, market forces and cultural change—to realize the objective of building a secure and resilient digital economy.

    • Read more
  • CHINA WATCHPentagon Bans Tech Vendors from Using China-Based Personnel After ProPublica Investigation

    By Renee Dudley

    The Defense Department has tightened cybersecurity requirements for its cloud services providers. The changes come after ProPublica revealed how Microsoft’s use of China-based engineers left sensitive government data vulnerable to hacking.

    • Read more
  • DEMOCRACY WATCHThe Government Shouldn’t Play “Truth Police”

    By Thomas A. Berry

    There is little doubt that ABC’s decision to suspend Jimmy Kimmel’s late-night show was the result of the not-so-veiled threats by FCC Chairman Brendan Carr that the network would face FCC action unless it removed Kimmel who, Carr argued (wrongly), had implicated MAGA in the killing of Charlie Kirk. But the government should not serve as the arbiter of truth in public debate. Government coercion to censor speech is wrong no matter which party is in power. We should all be concerned when the government takes upon itself the role of policing “truth” and uses that mantle as a tool to threaten and punish disfavored speakers.

    • Read more
  • SECURITY INDUSTRYThe Security Industry’s Blind Spot - Management

    By Pierre Alcantara

    The global security industry is one of the fastest-growing sectors in the world. Driven by rising crime rates, growing urbanization, and heightened awareness of personal and property safety, the demand for private security services continues to soar.

    • Read more
  • WILDFIRESWho Pays for Wildfire Damage? In the West, Utilities Are Shifting the Risk to Customers

    By Will Peischel

    Utah laws cap wildfire damages and let utilities pass the cost onto customers. Utility lobbyists are pushing the model in other states.

    • Read more
  • CYBERSECURITYCybersecurity Training Programs Don't Prevent Employees from Falling for Phishing Scams

    By Ioana Patringenaru

    Cybersecurity training programs as implemented today by most large companies do little to reduce the risk that employees will fall for phishing scams. Study involving 19,500 UC San Diego Health employees evaluated the effectiveness of two different types of cybersecurity training.

    • Read more
  • CHINA WATCHWhen Global Trade Is About More Than Money

    By Christy DeSmith

    International trade can yield far more than imports and exports. Economist’s new tool looks at how China is more effective than U.S. in exerting political power through import, export controls

    • Read more
  • FLOODSElon Musk Pushed Back on Our Reporting on His Houston Tunnels Plan. Experts Say His Comments Are Misleading.

    By Yilun Cheng, Houston Chronicle

    Elon Musk is taking issue with a recent investition by the Houston Chronicle and The Texas Newsroom that raised questions about a flood tunnel project he’s pitching to address Houston’s chronic flooding woes. But experts said his response, which he did not explain to the newsrooms, isn’t supported by facts or data.

    • Read more
  • CRITICAL MINERALSSecuring South Korea's Critical Minerals Supply Chains Through Trilateral Cooperation

    South Korea, Japan, and the United States’ trilateral partnership has expanded to include collaboration on economic security, including on critical minerals supply chains (CMSCs). A new report offers analysis, tools, and recommendations to strengthen South Korea’s CMSCs and economic security.

    • Read more
  • CHINA WATCHPentagon Warns Microsoft: Company’s Use of China-Based Engineers Was a “Breach of Trust”

    By Renee Dudley

    The Defense Department is opening an investigation to determine if the tech giant’s use of overseas engineers to maintain sensitive U.S. government computer systems compromised national security.

    • Read more
  • TECHNOLOGY RACEU.S.-China Tech Rivalry: The Geopolitics of Semiconductors

    The United States and China are locked in a high‑stakes contest for dominance in computing power. In response to US sanctions and export controls, China has ramped domestic chip design and manufacturing, aiming to create an all‑Chinese semiconductor supply chain that reduces dependence on foreign technologies.

    • Read more
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • DHS scraps $10B small business IT and software contract
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Recently-patched Firefox bug exploited against Tor browser users
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Homeland Security Blocked 500-Plus Ransomware Attacks Since 2021
  • 'Dark tourism' is attracting visitors to war zones and sites of atrocities in Israel and Ukraine. Why?
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies