Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • In an Era of Dam Removal, California Is Building More

    Earlier this year, the federal government finalized $216 million dollars in funding for a controversial dam project south of the Klamath River, adding to the $1 billion in direct grants already pledged to the project known as Sites Reservoir. This would be California’s first major new reservoir in half a century. Proponents say a new reservoir off the Sacramento River is environmentally friendly.

    • Read more
  • Germany Foils Russian Plot to Assassinate German Arms Company Chief

    German politicians have voiced horror over a report that Russia planned to murder a German arms company boss. US intelligence is said to have uncovered the plot against Rheinmetall chief Armin Papperger.

    • Read more
  • The New Fintech That Knows Whether Your Voice Matches Your Face

    Your face is no longer your own. Nor is your voice. Fraudsters can steal them both from the Internet. And, using the power of AI, they can create a deepfake version of you that’s so convincing it’ll beat bank security. Banks and financial institutions increasingly use voice biometrics these days to confirm a caller’s identity.

    • Read more
  • Transformers: Cooler Side of the Grid

    Failures in transformers cause widespread disruptions across electrical networks, severely affecting grid stability. The financial impact of such failures often goes beyond just the cost of replacing the transformer. Simulations on NSF-funded Stampede2 provide models for a resilient and sustainable electric grid.

    • Read more
  • Hundreds of Tech Companies Want to Cash In on Homeland Security Funding. Here's Who They Are and What They're Selling.

    Whenever concerns grow about the security along the U.S.-Mexico border and immigration, the U.S. government generate dollars — hundreds of millions of dollars — for tech conglomerates and start-ups. Who are the vendors who supply or market the technology for the U.S. government’s increasingly AI-powered homeland security efforts, including the so-called “virtual wall” of surveillance along the southern border with Mexico?

    • Read more
  • Will China's Economy Ever Overtake the U.S.'s?

    China’s ambition to be the world’s largest economy has been dented by COVID-19, the real estate crisis and an aging population. Boosting growth will be the prime focus at a Communist Party meeting.

    • Read more
  • Businesses Are Harvesting Our Biometric Data. The Public Needs Assurances on Security

    Visual data capturing and analysis are particularly critical compared to non-visual data. That’s why its growing use by businesses raises so many concerns about privacy and consent. While the public remains unaware of the extent to which their visual data is being captured and utilized, their information will be vulnerable to misuse or exploitation.

    • Read more
  • Some Firms Resisting Pressure to Take Sides in 'Chip War'

    New research has revealed why German firms are refusing to join the United States’ tech trade war with China over semiconductor chips, a key component in modern electrical devices.

    • Read more
  • Silicon Valley Steps Up Screening of Chinese Employees to Counter Espionage

    Leading U.S. technology companies reportedly have increased security screening of employees and job applicants, which experts say is necessary to counter the cyber espionage threat from China. Applicantswith family or other ties to China are thought to be particularly vulnerable to pressure from the Beijing government.

    • Read more
  • U.S. States Shape Foreign Policy Amid National China Unease: Research

    State-level officials such as governors, state legislators and attorneys general are shaping U.S.-China relations as the two countries navigate a strained geopolitical relationship. While the U.S. Constitution clearly states that foreign policy is the responsibility of the federal government, it also leaves space for cities and states to have international relationships and even to enter into certain kinds of agreements.

    • Read more
  • New Report Advises How Ransomware Victims Can Be Better Supported

    A new report aims to shed light on the experience of victims of ransomware and identify several key factors that typically shape these experiences.

    • Read more
  • China-Backed Hackers Step Up Spying on Taiwan: Security Firm

    Recorded Future said cyberespionage targeting Taiwan has intensified with a focus on its technology industry.

    • Read more
  • Startup Aims to Transform the Power Grid with Superconducting Transmission Lines

    VEIR, founded by alumnus Tim Heidel, has developed technology that can move more power over long distances, with the same footprint as traditional lines.

    • Read more
  • How to Equip the U.S. Coast Guard Against China’s Grey-Zone Operations

    America’s allies in the Indo-Pacific are getting pretty familiar with China’s grey-zone maritime behavior, but the United States itself is ill-prepared for dealing with it. Yet it should be prepared. The U.S. must not only counter the threat to its national security posed by China’s coercive operations, but also support its allies against Chinese efforts to rewrite the rule of law in the region.

    • Read more
  • What Are Tariffs?

    U.S. Presidents Trump and Biden have both turned to tariffs to support local industries amid economic confrontation with China. Here’s how these taxes work and how they’ve been used historically.

    • Read more
  • « first
  • ‹ previous
  • …
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Recently-patched Firefox bug exploited against Tor browser users
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Homeland Security Blocked 500-Plus Ransomware Attacks Since 2021
  • 'Dark tourism' is attracting visitors to war zones and sites of atrocities in Israel and Ukraine. Why?
  • Is big tech harming society? To find out, we need research, but it's being manipulated by big tech itself
  • US bans new types of goods from China over allegations of forced labor
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report

    There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.

    • Read more
  • Trying to “Bring Back” Manufacturing Jobs Is a Fool’s Errand

    Advocates of recent populist policies like to focus on the supposed demise of manufacturing that occurred after the 1970s, but that focus is misleading. The populists’ bleak economic narrative ignores the truth that the service sector has always been a major driver of America’s success, for decades, even more so than manufacturing. Trying to “bring back” manufacturing jobs, through harmful tariffs or other industrial policies, is destined to end badly for Americans. It makes about as much sense as trying to “bring back” all those farm jobs we had before the 1870s.

    • Read more
  • The Potential Impact of Seabed Mining on Critical Mineral Supply Chains and Global Geopolitics

    The potential emergence of a seabed mining industry has important ramifications for the diversification of critical mineral supply chains, revenues for developing nations with substantial terrestrial mining sectors, and global geopolitics.

    • Read more
  • Are We Ready for a ‘DeepSeek for Bioweapons’?

    Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies