Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Trading on Tom Homan: Inside the Push to Cash in on the Trump Administration’s Deportation Campaign

    A Pennsylvania businessman who had Tom Homan on his payroll led companies to believe his connections to the future border czar could help advance their bids for government work, industry executives said.

    • Read more
  • Underground Data Fortresses: The Nuclear Bunkers, Mines and Mountains Being Transformed to Protect Our “New Gold” from Attack

    Bunker scholars have long noted that these buildings are as much about time as they are about space. Bunkers are designed to preserve and transport their contents through time, from an apocalyptic present into a safe future.

    • Read more
  • Funding Cuts, Policy Shifts, and the Erosion of U.S. Scientific and Public Health Capacity

    The U.S. continues to face mounting threats to its health, scientific enterprise, and national security. A recent report warns that proposed FY 2026 budget cuts to the National Science Foundation (NSF) could reduce its funding by more than half – from $9 billion in FY 2025 to under $4 billion. If passed by Congress, these cuts would result in an estimated ~$11 billion in economic losses.

    • Read more
  • The American TikTok Deal Doesn’t Address the Platform’s Potential for Manipulation, Only Who Profits

    If we want to protect democratic information systems, we need to focus on reducing the vulnerabilities in our relationship with media platforms – platforms with surveillance power to know what we will like, the algorithmic power to curate our information diet and control of platform incentives, and rules and features that affect who gains influence. The biggest challenge is to make platforms less riggable, and thus less weaponizable, if only for the reason that motivated the TikTok ban: we don’t want our adversaries, foreign or domestic, to have power over us.

    • Read more
  • Elon Musk’s SpaceX Took Money Directly from Chinese Investors, Company Insider Testifies

    The newly unsealed testimony marks the first time direct Chinese investment in the company has been disclosed, raising new questions about foreign ownership interests in one of America’s most important military contractors.

    • Read more
  • U.S. Department of Energy buys 5% of Lithium Americas

    Lithium Americas, founded 2023 in Canada, owns the permit to develop the Thacker Pass grounds in Humboldt County, Nevada for lithium mining. The U.S. Department of Energy settled government takeover reports of Lithium Americas Corp., announcing a 5% ownership of the $1.5 billion mining company.

    • Read more
  • Multitasking Raises Risk of Phishing

    In the information age, multitasking is often worn as a badge of honor. But according to new research, multitasking may also blind us to hidden threats, thereby increasing our chances of falling victim to cybercrime.

    • Read more
  • Kristi Noem Fast-Tracked Millions in Disaster Aid to Florida Tourist Attraction After Campaign Donor Intervened

    The DHS chief has been widely criticized for slowing down FEMA’s response after natural disasters. Texts and emails obtained by ProPublica point to an effective way to get help faster: have one of Noem’s big donors make the ask.

    • Read more
  • Market Incentives and Cybersecurity: Fixing the Broken System Before It Breaks Us

    Cybersecurity is not just an IT issue; it is a shared responsibility and an economic imperative. Only by ensuring resilience can we confidently adopt new technology and realize its benefits. The next horizon of the cyber security strategy would require a mix of incentives—including regulation, market forces and cultural change—to realize the objective of building a secure and resilient digital economy.

    • Read more
  • Pentagon Bans Tech Vendors from Using China-Based Personnel After ProPublica Investigation

    The Defense Department has tightened cybersecurity requirements for its cloud services providers. The changes come after ProPublica revealed how Microsoft’s use of China-based engineers left sensitive government data vulnerable to hacking.

    • Read more
  • The Government Shouldn’t Play “Truth Police”

    There is little doubt that ABC’s decision to suspend Jimmy Kimmel’s late-night show was the result of the not-so-veiled threats by FCC Chairman Brendan Carr that the network would face FCC action unless it removed Kimmel who, Carr argued (wrongly), had implicated MAGA in the killing of Charlie Kirk. But the government should not serve as the arbiter of truth in public debate. Government coercion to censor speech is wrong no matter which party is in power. We should all be concerned when the government takes upon itself the role of policing “truth” and uses that mantle as a tool to threaten and punish disfavored speakers.

    • Read more
  • The Security Industry’s Blind Spot - Management

    The global security industry is one of the fastest-growing sectors in the world. Driven by rising crime rates, growing urbanization, and heightened awareness of personal and property safety, the demand for private security services continues to soar.

    • Read more
  • Who Pays for Wildfire Damage? In the West, Utilities Are Shifting the Risk to Customers

    Utah laws cap wildfire damages and let utilities pass the cost onto customers. Utility lobbyists are pushing the model in other states.

    • Read more
  • Cybersecurity Training Programs Don't Prevent Employees from Falling for Phishing Scams

    Cybersecurity training programs as implemented today by most large companies do little to reduce the risk that employees will fall for phishing scams. Study involving 19,500 UC San Diego Health employees evaluated the effectiveness of two different types of cybersecurity training.

    • Read more
  • When Global Trade Is About More Than Money

    International trade can yield far more than imports and exports. Economist’s new tool looks at how China is more effective than U.S. in exerting political power through import, export controls

    • Read more
  • « first
  • ‹ previous
  • …
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • next ›
  • last »

More headlines

  • North Korean state hackers seen using Medusa ransomware in attacks on US, Middle East
  • Orbital datacenters are a pie-in-the-sky idea: Gartner
  • OpenAI says Chinese cops used ChatGPT to plan and track smear ops against opponents
  • Big Tech Confirms DHS Subpoenas: Meta and Google Users Targeted Over Anti-ICE Posts
  • Researchers report increased ransomware and hacktivist activities targeting industrial systems in 2025
  • New Study Claims GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale
  • UL Solutions withdraws as lead admin for FCC cyber label program amid probe into China ties
  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • DHS scraps $10B small business IT and software contract
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Entity Resolution: The Security Technology You Probably Haven’t Heard Of

    The concept “entity resolution” (ER) is probably unfamiliar, but it underpins much of the world’s security—in telecommunications, banking and national security.

    • Read more
  • “DeepSeek Is in the Driver’s Seat. That’s a Big Security Problem”

    Democratic countries have a smart-car problem. For those that don’t act quickly and decisively, it’s about to become a severe national security headache.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies