Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Tech Diplomacy: What It Is, and Why It’s Important

    By Bronte Munro

    We need to get used to a new concept in international security: tech diplomacy. It means technological collaboration across sectors and between countries, but the simplicity of the idea shouldn’t disguise its importance.

    • Read more
  • Cybersecurity Education Varies Widely in U.S.

    By Tina Hilding

    Cybersecurity programs vary dramatically across the country, a review has found. The authors argue that program leaders should work with professional societies to make sure graduates are well trained to meet industry needs in a fast-changing field.

    • Read more
  • Knocking Cloud Security Off Its Game

    By Daniel Meierhans

    Public cloud services employ special security technologies. Computer scientists at ETH Zurich have now discovered a gap in the latest security mechanisms used by AMD and Intel chips. This affects major cloud providers.

    • Read more
  • China Seeks to Harvest User Data from Global Apps to Boost Propaganda Efforts

    By Fergus Ryan

    In the global discussion around data privacy and security, much attention has been rightfully placed on the Chinese-owned platform TikTok, with concerns that the user data it collects is accessible to Chinese authorities. But the issue of data collection on behalf of the Chinese Communist Party (CCP), and its integration into propaganda efforts, extends far beyond a single app.

    • Read more
  • The Sources of Renewed National Dynamism

    What does the historical record reveal about national recovery from long-term national decline? What factors distinguish cases of successful anticipatory renewal from those that fail? Is the United States entering a period of decline, and does it meet the preconditions for anticipatory renewal?

    • Read more
  • Securing Competitiveness of Energy-Intensive industries Through Relocation: The Pulling Power of Renewables

    Countries with limited potential for renewables could save up to 20 percent of costs for green steel and up to 40 percent for green chemicals from green hydrogen if they relocated their energy-intensive production and would import from countries where renewable energy is cheaper.

    • Read more
  • What Is the CHIPS Act?

    By Michelle Kurilla

    Extraordinary U.S. government incentives are proving popular with many large chipmakers, but it is too early to tell how much of the semiconductor industry can be lured back to the United States. 

    • Read more
  • How Artificial Intelligence Can Transform U.S. Energy Infrastructure

    By Michael Kooi

    Groundbreaking report provides ambitious framework for accelerating clean energy deployment while minimizing risks and costs in the face of climate change.

    • Read more
  • Cybersecurity Researchers Spotlight a New Ransomware Threat – Be Careful Where You Upload Files

    By Selcuk Uluagac

    Today’s web browsers are much more powerful than earlier generations of browsers. Unfortunately, these capabilities also mean that hackers can find clever ways to abuse the browsers to trick you into letting ransomware lock up your files when you think that you’re simply doing your usual tasks online.

    • Read more
  • Transporting Hazardous Materials Across the Country Isn’t Easy − That’s Why There’s a Host of Regulations in Place

    By Michael F. Gorman

    Transporting hazardous materials such as dangerous gases, poisons, harmful chemicals, corrosives and radioactive material across the country is risky. But because approximately 3 billion pounds of hazardous material needs to go from place to place in the U.S. each year, it’s unavoidable.

    • Read more
  • Baltimore Bridge Collapse Tests U.S. Supply Chains

    By Zongyuan Zoe Liu

    The Baltimore bridge accident and the Houthi attacks in the Red Sea have raised concern about the security of global supply chains. But supply chains have been resilient thus far, and U.S. efforts to fortify them are accelerating.

    • Read more
  • Chinese Government Poses 'Bold and Unrelenting' Threat to U.S. Critical Infrastructure: FBI

    FBI Director Christopher Wray on 18 April warned that risks the government of China poses to U.S. national and economic security are “upon us now”—and that U.S. critical infrastructure is a prime target. He said that partnerships, joint operations, and private sector vigilance can help us fight back.

    • Read more
  • Spyware as Service: What the i-Soon Files Reveal About China’s Targeting of the Tibetan Diaspora

    Governments are increasingly incorporating cyber operations into the arsenal of statecraft. This sophisticated integration combines open-source intelligence, geospatial intelligence, human intelligence, and cyber espionage with artificial intelligence, allowing for the gathering and analysis of ever-expanding data sets. Increasingly, such operations are being outsourced.

    • Read more
  • In a First, California Cracks Down on Farms Guzzling Groundwater

    By Jake Bittle

    In much of the United States, groundwater extraction is unregulated and unlimited. This lack of regulation has allowed farmers nationwide to empty aquifers of trillions of gallons of water for irrigation and livestock. In many places, such as California’s Central Valley, the results have been devastating. California has just imposed a first-of-its-kind mandatory fee on water pumping by farmers in the Tulare Lake subbasin, one of the state’s largest farming areas.

    • Read more
  • Australia’s Leadership Imperatives in Critical Minerals

    By Ian Satchwell

    Australia, like Canada, is well placed to be a global leader in the critical minerals sector. The country has the natural endowment, technical expertise and experience, global mining footprint, and mining capital base to back a claim to worldwide leadership.

    • Read more
  • « first
  • ‹ previous
  • …
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • …
  • next ›
  • last »

More headlines

  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • DHS scraps $10B small business IT and software contract
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Recently-patched Firefox bug exploited against Tor browser users
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Homeland Security Blocked 500-Plus Ransomware Attacks Since 2021
  • 'Dark tourism' is attracting visitors to war zones and sites of atrocities in Israel and Ukraine. Why?
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Factories First: Winning the Drone War Before It Starts

    Wars are won by factories before they are won on the battlefield,Martin C. Feldmann writes, noting that the United States lacks the manufacturing depth for the coming drone age. Rectifying this situation “will take far more than procurement tweaks,” Feldmann writes. “It demands a national-level, wartime-scale industrial mobilization.”

    • Read more
  • Trump Is Fast-Tracking New Coal Mines — Even When They Don’t Make Economic Sense

    By Katie Myers

    In Appalachian Tennessee, mines shut down and couldn’t pay their debts. Now a new one is opening under the guise of an “energy emergency.”

    • Read more
  • Smaller Nuclear Reactors Spark Renewed Interest in a Once-Shunned Energy Source

    By David Montgomery

    In the past two years, half the states have taken action to promote nuclear power, from creating nuclear task forces to integrating nuclear into long-term energy plans.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies