Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Texas Regulators Limit Oil and Gas Disposal Wells in Bid to Reduce Earthquakes in West Texas

    Injecting saltwater back into the ground “is likely contributing to recent seismic activity,” the Railroad Commission of Texas has said.

    • Read more
  • How Houthi Attacks in the Red Sea Threaten Global Shipping

    Houthi attacks against commercial ships in the Red Sea have upended global shipping. The disruptions could soon ripple through the global economy.

    • Read more
  • Ethiopia and Somalia: Conflict Intensifies Over Port Deal

    Ethiopia’s agreement with breakaway region Somaliland, seeking port access in exchange for potential sovereignty recognition, could cause upheaval in the Horn of Africa. Somalia views it as an attack on its sovereignty.

    • Read more
  • 2023’s Billion-Dollar Disasters List Shattered the U.S. Record with 28 Big Weather and Climate Disasters Amid Earth’s Hottest Year on Record

    The U.S. set an unwelcome record for weather and climate disasters in 2023, with 28 disasters that exceeded more than US$1 billion in damage each. While it wasn’t the most expensive year overall – the costliest years included multiple hurricane strikes – it had the highest number of billion-dollar storms, floods, droughts and fires of any year since counting began in 1980, with six more than any other year, accounting for inflation.

    • Read more
  • Extreme Weather Cost $80 Billion in 2023. The True Price Is Far Higher.

    The U.S. saw 25 billion-dollar weather disasters in 2023 — more than ever before. 2024 could be worse. Congress has long punted on reforming FEMA and the nation’s disaster relief policy, but it’s only a matter of time before there’s a disaster bad enough that legislators feel pressure to act. That catastrophe didn’t arrive in in 2023, but it is surely coming.

    • Read more
  • Identifying Types of Cyberattacks That Manipulate Behavior of AI Systems

    AI systems can malfunction when exposed to untrustworthy data – what is called “adversarial machine learning” — and attackers are exploiting this issue. New guidance documents the types of these attacks, along with mitigation approaches. No foolproof method exists as yet for protecting AI from misdirection, and AI developers and users should be wary of any who claim otherwise.

    • Read more
  • The True Dangers of Long Trains

    Trains are getting longer. Rail companies had recently adopted a moneymaking strategy to move cargo faster than ever, with fewer workers, on trains that are consistently longer than at any time in history. Railroads are getting richer, but these “monster trains” are jumping off of tracks across America and regulators are doing little to curb the risk.

    • Read more
  • Australia Should Learn from Canada and Take a Truly Global Approach to Critical Minerals

    Canada and Australia are key players in the global supply chain for critical minerals. Simultaneously the top two nations for receiving minerals investment and for providing minerals investment, they are perfectly placed to use critical minerals to facilitate the global energy transition, foster innovation and build their security capabilities.

    • Read more
  • Vietnam Isn’t North Korea—and 50 Years of Australian Aid Has Helped

    How have Australia and Vietnam, two countries with extremely different political systems, built such a successful partnership? It was done through long-term investment across all the tools of statecraft—including diplomacy, trade and defense—with development cooperation as a key element. This enabled a progression from battlefield enemy to major economic and development partner in a surprisingly short period.

    • Read more
  • Congress Bans Pentagon from Using Chinese Port Logistics Platform

    The U.S. Congress has passed legislation that would ban the Pentagon from using any seaport in the world that relies on a Chinese logistics platform known as LOGINK. LOGINK, by tracking cargo and ship movements, lets Beijing monitor America’s military supply chain, which relies on commercial ports.

    • Read more
  • How Verified Accounts on X Thrive While Spreading Misinformation About the Israel-Hamas Conflict

    With the gutting of content moderation initiatives at X, accounts with blue checks, once a sign of authenticity, are disseminating debunked claims and gaining more followers. Community Notes, X’s fact-checking system, hasn’t scaled sufficiently. “The blue check is flipped now. Instead of a sign of authenticity, it’s a sign of suspicion, at least for those of us who study this enough,” said one expert.

    • Read more
  • Tainted Applesauce Pouches May Have Been Intentionally Contaminated: FDA

    Cinnamon applesauce pouches available at Weis, WanaBanana, and Schnucks have been pulled from shelves after they were found to be contaminated with lead. The FDA says it currently believes the adulteration is “economically motivated.”

    • Read more
  • Red Sea Attacks: Why Arab Nations Won't Join Naval Coalition

    The U.S. has announced a naval coalition to protect shipping from Houthi attacks, but only one Middle Eastern country has joined. Why have others — like Saudi Arabia, the UAE, and Egypt — not done so? Each of these states has its own reasons, but analysts say that the one thing the three powers have in common is the fact that they don’t want to be seen as working in defense of Israel.

    • Read more
  • Red Sea Houthi Attacks: Implications for Global Trade

    After a rise in attacks by the Iran-backed Houthis, the world’s largest shipping firms are staying away from the Red Sea and Suez Canal. Will we see another supply chain crisis?

    • Read more
  • U.S.-Led Taskforce Deploys in Red Sea as Middle East Crisis Threatens to Escalate Beyond Gaza

    The world economy is strongly dependent on the global maritime supply chain. About 80% of international trade by volume is transported by sea. It does not take much to disrupt the global maritime supply chain. Intentional disruptions of the maritime supply chain by pirates or terrorists pose a challenge that goes beyond simple logistics. Attacks on civilian shipping directly affect insurance premiums and deter operators from transiting through certain areas for financial and security reasons.

    • Read more
  • « first
  • ‹ previous
  • …
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Recently-patched Firefox bug exploited against Tor browser users
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Homeland Security Blocked 500-Plus Ransomware Attacks Since 2021
  • 'Dark tourism' is attracting visitors to war zones and sites of atrocities in Israel and Ukraine. Why?
  • Is big tech harming society? To find out, we need research, but it's being manipulated by big tech itself
  • US bans new types of goods from China over allegations of forced labor
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Economic Cyberespionage: A Persistent and Invisible Threat

    Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.

    • Read more
  • Nuclear Has Changed. Will the U.S. Change with It?

    Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.

    • Read more
  • Calls Grow for U.S. to Counter Chinese Control, Influence in Western Ports

    Experts say Washington should consider buying back some ports, offer incentives to allies to decouple from China.

    • Read more
  • Exploring the New Nuclear Energy Landscape

    In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies