Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Argonne, UT to Strengthen Collaboration in Battery Sciences and Critical Materials Development

    New memorandum of understanding expands joint research to accelerate U.S. battery innovation and secure critical materials supply chains.

    • Read more
  • Cybersecurity Education in the Age of AI: Rethinking the Need for Human Capital in National Cyber Defense

    Just five years ago, headlines were filled with urgent calls for the United States to drastically increase its output of cybersecurity professionals. Fast forward to 2025, and the proliferation of AI —especially generative and autonomous models—has transformed both the threats we face and the tools we use to defend against them. AI-driven cybersecurity software now automates many of the functions that once required a skilled human analyst, and the argument is made that AI may soon render many human cybersecurity roles obsolete.

    • Read more
  • How Special Interests Keep Bad Laws on the Books: The Case of the Jones Act

    The 1920 Jones Act restricts intra-U.S. water transport to vessels that are U.S.-flagged, U.S.-owned, and built in U.S. shipyards The law serves as a tribute to how entrenched interests can hijack public policy and make the repeal of failed, costly laws among the heaviest of political lifts.

    • Read more
  • Plugging America's Forgotten Wells: Study Addresses Decades Long Problem

    Since the drilling of the first oil well in 1859, millions more oil and gas wells have been drilled across the nation. Today, millions of wells – bout 3.4 million of them — sit idle, some for decades. One option for limiting the environmental and health impacts of orphaned wells is to plug them. But the question remains, with so many orphaned wells in the United States, what’s the best way to address this issue?

    • Read more
  • Attacks on the U.S. Innovation Ecosystem Are an Attack on a Wellspring of American Prosperity

    The Trump administration’s attacks on the country’s science and innovation ecosystem — its cuts to federally funded R&D; its war on higher education; and its aggression toward immigrants, including skilled immigrants — are dismantling America’s science and technology advantage—putting the country’s future prosperity at risk. This frontal assault on the key source of U.S. industry’s competitive advantage is not a recipe for American greatness; it is a recipe for long-term decline.

    • Read more
  • U.S. Moves Decisively to Avoid Dependence on China’s Rare Earths

    The Pentagon’s package of support for rare earths company MP Minerals, announced on 10 July, should free the US military and eventually much of US industry from dependence on Chinese supply chains for rare earth magnets.

    • Read more
  • Microsoft Used China-Based Engineers to Support Product Recently Hacked by China

    Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in its popular SharePoint software but didn’t mention that it has long used China-based engineers to maintain the product.

    • Read more
  • Citing Potential for Fraud, Blue and Red States Pass New Crypto ATM Laws

    While the crypto machines can be used for legitimate reasons, they’ve become favored by scammers.

    • Read more
  • Nuclear Energy and AI Companies Seek Solutions at Argonne Summit

    Three U.S. Department of Energy labs host major forum dedicated to building the energy infrastructure needed to secure America’s digital competitiveness. Leaders in artificial intelligence and nuclear energy explored ideas for powering a digital future and streamlining nuclear technologies.

    • Read more
  • Trump Is Fast-Tracking New Coal Mines — Even When They Don’t Make Economic Sense

    In Appalachian Tennessee, mines shut down and couldn’t pay their debts. Now a new one is opening under the guise of an “energy emergency.”

    • Read more
  • Factories First: Winning the Drone War Before It Starts

    Wars are won by factories before they are won on the battlefield,Martin C. Feldmann writes, noting that the United States lacks the manufacturing depth for the coming drone age. Rectifying this situation “will take far more than procurement tweaks,” Feldmann writes. “It demands a national-level, wartime-scale industrial mobilization.”

    • Read more
  • Lessons From the Ledger

    The United States and Canada recently began designating drug cartels and other transnational criminal organizations as terrorist groups, in part to use counterterrorism tools against these organizations. Jessica Davis writes that some “counterterrorist financing tools might yield some results against cartels. But here, the lessons of decades of counterterrorist financing will need to be applied for maximum disruptive effect.”

    • Read more
  • Trump’s Deportations Could Cost 6M Jobs: Report

    President Donald Trump’s deportation plans could cost nearly 6 million jobs, according to a new analysis. The analysis warns that jobs held by both immigrants and US-born workers are at risk.

    • Read more
  • Texas Lawmaker Proposes Beefing Up Temporary Worker Program to Ease Farm Labor Shortages

    The South Texas Republican’s “Bracero 2.0” legislation —named after a 1940s temporary labor program —would raise wages for migrant farmers and simplify applications for employers, amid other changes.

    • Read more
  • A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers

    Microsoft is using engineers in China to help maintain the Defense Department’s computer systems —with minimal supervision by U.S. personnel. Digital escorts often lack the technical expertise to police foreign engineers with far more advanced skills, leaving highly sensitive data vulnerable to hacking. Microsoft has been warned that the arrangement is inherently risky, but the company launched and expanded it anyway.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • DHS scraps $10B small business IT and software contract
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Recently-patched Firefox bug exploited against Tor browser users
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Homeland Security Blocked 500-Plus Ransomware Attacks Since 2021
  • 'Dark tourism' is attracting visitors to war zones and sites of atrocities in Israel and Ukraine. Why?
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies