Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Hundreds of Tech Companies Want to Cash In on Homeland Security Funding. Here's Who They Are and What They're Selling.

    Whenever concerns grow about the security along the U.S.-Mexico border and immigration, the U.S. government generate dollars — hundreds of millions of dollars — for tech conglomerates and start-ups. Who are the vendors who supply or market the technology for the U.S. government’s increasingly AI-powered homeland security efforts, including the so-called “virtual wall” of surveillance along the southern border with Mexico?

    • Read more
  • Will China's Economy Ever Overtake the U.S.'s?

    China’s ambition to be the world’s largest economy has been dented by COVID-19, the real estate crisis and an aging population. Boosting growth will be the prime focus at a Communist Party meeting.

    • Read more
  • Businesses Are Harvesting Our Biometric Data. The Public Needs Assurances on Security

    Visual data capturing and analysis are particularly critical compared to non-visual data. That’s why its growing use by businesses raises so many concerns about privacy and consent. While the public remains unaware of the extent to which their visual data is being captured and utilized, their information will be vulnerable to misuse or exploitation.

    • Read more
  • Some Firms Resisting Pressure to Take Sides in 'Chip War'

    New research has revealed why German firms are refusing to join the United States’ tech trade war with China over semiconductor chips, a key component in modern electrical devices.

    • Read more
  • Silicon Valley Steps Up Screening of Chinese Employees to Counter Espionage

    Leading U.S. technology companies reportedly have increased security screening of employees and job applicants, which experts say is necessary to counter the cyber espionage threat from China. Applicantswith family or other ties to China are thought to be particularly vulnerable to pressure from the Beijing government.

    • Read more
  • U.S. States Shape Foreign Policy Amid National China Unease: Research

    State-level officials such as governors, state legislators and attorneys general are shaping U.S.-China relations as the two countries navigate a strained geopolitical relationship. While the U.S. Constitution clearly states that foreign policy is the responsibility of the federal government, it also leaves space for cities and states to have international relationships and even to enter into certain kinds of agreements.

    • Read more
  • New Report Advises How Ransomware Victims Can Be Better Supported

    A new report aims to shed light on the experience of victims of ransomware and identify several key factors that typically shape these experiences.

    • Read more
  • China-Backed Hackers Step Up Spying on Taiwan: Security Firm

    Recorded Future said cyberespionage targeting Taiwan has intensified with a focus on its technology industry.

    • Read more
  • Startup Aims to Transform the Power Grid with Superconducting Transmission Lines

    VEIR, founded by alumnus Tim Heidel, has developed technology that can move more power over long distances, with the same footprint as traditional lines.

    • Read more
  • How to Equip the U.S. Coast Guard Against China’s Grey-Zone Operations

    America’s allies in the Indo-Pacific are getting pretty familiar with China’s grey-zone maritime behavior, but the United States itself is ill-prepared for dealing with it. Yet it should be prepared. The U.S. must not only counter the threat to its national security posed by China’s coercive operations, but also support its allies against Chinese efforts to rewrite the rule of law in the region.

    • Read more
  • What Are Tariffs?

    U.S. Presidents Trump and Biden have both turned to tariffs to support local industries amid economic confrontation with China. Here’s how these taxes work and how they’ve been used historically.

    • Read more
  • Will Climate Change Make Insurance Too Expensive?

    Extreme weather events influenced by climate change are causing ever greater destruction, forcing insurers to increase their premiums where they can. What does this mean for the future?

    • Read more
  • How Would a Switch to Nuclear Affect Electricity Prices for Households and Industry?

    In a free market, it is very unlikely nuclear could be competitive. But if a future Australian government were to bring nuclear into the mix, energy costs for residential and especially industrial customers would very likely increase.

    • Read more
  • New Study Reveals the Costs of Sanctions

    What effect do economic sanctions have on the countries affected, such as Russia or Iran? Economic sanctions can be a double-edged sword. On the one hand, they usually reduce gross domestic product and thus prosperity in the affected countries, as intended. On the other hand, however, they can also have a severe impact on the economies of the sanctioning countries.

    • Read more
  • Countering Coercion: Australia Must Engage with Allies on Critical Minerals Supply

    China’s use of coercion to control critical mineral mining and processing projects, their output and even whole supply chains has motivated several countries to take increasingly strong measures to secure alternative supply chains. Meanwhile, China’s state-linked companies continue to use multiple channels to manipulate markets at scale.

    • Read more
  • « first
  • ‹ previous
  • …
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • …
  • next ›
  • last »

More headlines

  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • DHS scraps $10B small business IT and software contract
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Recently-patched Firefox bug exploited against Tor browser users
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Homeland Security Blocked 500-Plus Ransomware Attacks Since 2021
  • 'Dark tourism' is attracting visitors to war zones and sites of atrocities in Israel and Ukraine. Why?
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • U.S.-China Tech Rivalry: The Geopolitics of Semiconductors

    The United States and China are locked in a high‑stakes contest for dominance in computing power. In response to US sanctions and export controls, China has ramped domestic chip design and manufacturing, aiming to create an all‑Chinese semiconductor supply chain that reduces dependence on foreign technologies.

    • Read more
  • The American TikTok Deal Doesn’t Address the Platform’s Potential for Manipulation, Only Who Profits

    If we want to protect democratic information systems, we need to focus on reducing the vulnerabilities in our relationship with media platforms – platforms with surveillance power to know what we will like, the algorithmic power to curate our information diet and control of platform incentives, and rules and features that affect who gains influence. The biggest challenge is to make platforms less riggable, and thus less weaponizable, if only for the reason that motivated the TikTok ban: we don’t want our adversaries, foreign or domestic, to have power over us.

    • Read more
  • Underground Data Fortresses: The Nuclear Bunkers, Mines and Mountains Being Transformed to Protect Our “New Gold” from Attack

    Bunker scholars have long noted that these buildings are as much about time as they are about space. Bunkers are designed to preserve and transport their contents through time, from an apocalyptic present into a safe future.

    • Read more
  • Funding Cuts, Policy Shifts, and the Erosion of U.S. Scientific and Public Health Capacity

    The U.S. continues to face mounting threats to its health, scientific enterprise, and national security. A recent report warns that proposed FY 2026 budget cuts to the National Science Foundation (NSF) could reduce its funding by more than half – from $9 billion in FY 2025 to under $4 billion. If passed by Congress, these cuts would result in an estimated ~$11 billion in economic losses.

    • Read more
  • U.S. Energy Supply Chains Are Unlikely to Meet Anticipated Demand

    The U.S. fast-growing energy demands for clean energy sources faces a problem: Under current supply chain conditions, the United States is on track to fall significantly short of surging demand for three clean energy sources: wind, solar, and battery. The shortage is due to the scarcity of critical raw materials such as nickel, aluminum, and silicon.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies