Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • U.S. Offers Reward for Information on Russian DarkSide Cybercrime Group

    The United States has announced a reward of up to $10 million for information leading to the identification or location of any individual holding a “key leadership” position in DarkSide, a cybercrime group believed to be tied to Russia.The DarkSide syndicate was behind the attack on Colonial Pipeline – the largest publicly disclosed cyberattack against critical infrastructure in the United States.

    • Read more
  • Face Recognition Is So Toxic, Facebook Is Dumping It

    Facebook’s decision to end its face-recognition program comes at a time when face recognition technology is receiving push back, criticisms, and legislative bans across the United States, and the globe.

    • Read more
  • Government Action Needed to Ensure Insurance Against Major Hacking of Driverless Vehicles: Experts

    Government action is needed so driverless vehicles can be insured against malicious hacks which could have potentially catastrophic consequences, experts say. Traditional vehicle insurance wouldn’t cover the mass hacking of driverless cars, and an incident like this could cost the industry tens of billions of pounds.

    • Read more
  • U.S. Sanctions NSO Group, Israeli Maker of Pegasus Spyware

    The U.S. authorities said the NSO Group’s spyware helped authoritarian governments “silence dissent.” The new measures will limit NSO Group’s access to U.S. components and technology.

    • Read more
  • The Ripple Factor: Weather Extremes Amplify Economic Losses

    Weather extremes can cause economic ripples along our supply chains. A new study shows that if they occur at roughly the same time the ripples start interacting and can amplify even if they occur at completely different places around the world.

    • Read more
  • Hackers-for-Hire Drive Evolution of Threat Landscape

    Cybersecurity threats are on the rise. The new edition of the ENISA Threat Landscape (ETL) highlights the surge in cybercriminality motivated by monetization using ransomware or cryptojacking. Supply-chains attacks also rank highly among prime threats because of the significant potential they have in inducing catastrophic cascading effects.

    • Read more
  • Targeted: Masterminds of Global Ransomware Attacks Against Critical Infrastructure

    Twelve individuals who were wreaking havoc across the world with ransomware attacks against critical infrastructure have been targeted as the result of a law enforcement and judicial operation involving eight countries.

    • Read more
  • Warning Issued Over the Unintended Consequences of Wind for Achieving Net Zero Targets

    In the run-up to the COP26 global climate summit in Glasgow, an expert on geoengineering and energy transition highlights the need for joined up thinking if the U.K. is going to find the optimal use of the North Sea to achieve Net Zero targets.

    • Read more
  • FCC Revokes China’s Telecom Rights to Operate in U.S.

    The FCC on Tuesday revoked China’s Telecom rights to operate and provide services in the United States, and gave the company sixty days to terminate its operations. “Promoting national security is an integral part of the Commission’s responsibility to advance the public interest, and [Tuesday’s] action carries out that mission to safeguard the nation’s telecommunications infrastructure from potential security threats,” the FCC said. 

    • Read more
  • U.S. Tightens Export Controls on Items Used in Surveillance of Private Citizens, other Malicious Cyber Activities

    The Commerce Department has released an interim final rule, establishing controls on the export, reexport, or transfer (in-country) of certain items that can be used for surveillance of private citizens or other malicious cyber activities. 

    • Read more
  • Piracy, Armed Robbery Incidents on the High Seas Decline, but Threats Remain

    The first nine months of 2021 saw the lowest numbers of piracy and armed robbery incidents on the high seas since 1994. While the reduction of reported incidents is a welcome, the International Maritime Bureau warns that seafarers must remain vigilant as violence against crew remains high in many areas of the world.

    • Read more
  • Growing the U.S. AI Workforce

    A new policy brief Georgetown University’s Center for Security and Emerging Technology (CSET) addresses the need for a clearly defined artificial intelligence education and workforce policy.

    • Read more
  • U.S. Leads Global Conference to Combat Ransomware Attacks

    The White House is holding a two-day international conference starting Wednesday to combat ransomware computer attacks on business operations across the globe that cost companies, schools and health services an estimated $74 billion in damages last year.

    • Read more
  • China’s Belt and Road Initiative: Profits, Not Development

    A new study found that, during the pre-Belt and Road Initiative (BRI) era, China and the U.S. were overseas spending rivals. However, China is now outspending the U.S. and other major powers on a more than 2-to-1 basis. Beijing’s lending to low-income and middle-income countries is provided on less generous terms than loans from OECD-DAC and multilateral creditors.

    • Read more
  • The Effect of Imports of Neodymium Magnets on U.S. National Security

    The Commerce Department’s Bureau of Industry and Security (BIS) has initiated an investigation to determine the effects on U.S. national security from imports of Neodymium-iron-boron (NdFeB) permanent magnets.

    • Read more
  • « first
  • ‹ previous
  • …
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Recently-patched Firefox bug exploited against Tor browser users
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Homeland Security Blocked 500-Plus Ransomware Attacks Since 2021
  • 'Dark tourism' is attracting visitors to war zones and sites of atrocities in Israel and Ukraine. Why?
  • Is big tech harming society? To find out, we need research, but it's being manipulated by big tech itself
  • US bans new types of goods from China over allegations of forced labor
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report

    There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.

    • Read more
  • Trying to “Bring Back” Manufacturing Jobs Is a Fool’s Errand

    Advocates of recent populist policies like to focus on the supposed demise of manufacturing that occurred after the 1970s, but that focus is misleading. The populists’ bleak economic narrative ignores the truth that the service sector has always been a major driver of America’s success, for decades, even more so than manufacturing. Trying to “bring back” manufacturing jobs, through harmful tariffs or other industrial policies, is destined to end badly for Americans. It makes about as much sense as trying to “bring back” all those farm jobs we had before the 1870s.

    • Read more
  • The Potential Impact of Seabed Mining on Critical Mineral Supply Chains and Global Geopolitics

    The potential emergence of a seabed mining industry has important ramifications for the diversification of critical mineral supply chains, revenues for developing nations with substantial terrestrial mining sectors, and global geopolitics.

    • Read more
  • Are We Ready for a ‘DeepSeek for Bioweapons’?

    Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies