Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Hidden Fortunes and Surprising Overestimations in Cybercrime Revenue

    To what extent methodological limitations and incomplete data impact the revenue estimations of cybercriminal groups using the Bitcoin blockchain was largely unknown. A new study challenges existing figures regarding cybercriminals’ Bitcoin earnings to date, revealing the full scale of the financial impact of cybercriminal activity.

    • Read more
  • Taking Illinois’ Center for Digital Agriculture into the Future

    The Center for Digital Agriculture (CDA) at the University of Illinois Urbana-Champaign has a new executive director, John Reid, who plans to support CDA’s growth across all dimensions of use-inspired research, translation of research into practice, and education and workforce development.

    • Read more
  • Biden’s Trade Policy U-Turn Bodes Ill for Indo-Pacific Security

    America’s economic isolationism is increasingly entrenched, with President Joe Biden’s administration no longer supporting the trade policies advocated by US multinational corporations, retreating instead to a nativist protectionism. The Biden administration’s U-turn last month on digital trade policy was a shock both to the US business community and to the nations that had been negotiating digital trade agreements with the US on the basis of its long-established position of lowering the barriers to digital commerce.

    • Read more
  • Cryptocurrency Tech Firm Blocks Terrorists’ Access to Cash

    Could Israel eradicate Hamas and other terrorist networks without a single person killed and without any boots on the ground or planes in the sky? For one technology firm, fighting terror doesn’t involve killing people, only killing the transfer of funds.

    • Read more
  • Costs of the Climate Crisis: An Insurance Umbrella for Nations at Risk

    International study in the run-up to COP28: Public-private partnerships may help protect developing countries from the financial consequences of climate change.

    • Read more
  • Security Officers: Occupational Employment and Wages

    There are more than 1.1 million security officers in the United States, and they form an essential part of the U.S. economy, playing an important role in maintaining safety and security across various sectors. The wages of security officers in the United States vary depending on several factors such as location, experience, and the specific industry they are employed in.

    • Read more
  • How Cryptocurrency Fueled Hamas' Terror Attack on Israel

    A crackdown on cryptocurrency accounts linked to Hamas has reignited scrutiny of digital assets after the terrorist group attacked Israel. Criminal and terrorist organizations use crypto to bypass laws and sanctions.

    • Read more
  • Terrorist Use of Cryptocurrencies

    Are terrorist groups currently using cryptocurrencies to support their activities? If not, why? What properties of new and potential future cryptocurrencies would make them more viable for terrorist use?

    • Read more
  • Strengthening Domestic Supply Chains for Critical Minerals

    The USGS is investing millions of dollars in strengthening domestic supply chains for mineral resources critical to every economic sector and every member of society. Central to this effort is a nationwide mapping effort for critical minerals.

    • Read more
  • Huawei’s New Mate 60 Phones Are a Lesson in Unintended Consequences

    In October 2022, the Commerce Department introduced a set of export-control measures designed to prevent the use of American chip technology for Chinese military purposes. Rules were also imposed that aimed to restrict China’s semiconductor production to older 14-nm technology. These controls have had varying degrees of success, but the 14-nm restriction is one of the more overt failures, as the 7-nm chips in the new Huawei’s Mate 60 phones shows.

    • Read more
  • Stop Venezuela's Aggression - Before It Creates a War in the Americas

    As a ploy to distract from his country’s domestic collapse, Venezuela’s dictator Nicolas Maduro - following the Putin and Hamas play-book - is suddenly demanding that neighboring Guyana “surrender” 2/3 of its territory - the entire western region called Essequibo - to him.

    • Read more
  • We Rarely Hear About the Disasters Which Were Avoided – but There’s a Lot We Can Learn from Them

    We frequently see headlines about disasters. But where are the headlines covering the good news of lives saved and damage averted when disasters do not happen? Our work, now published, offers examples we can learn from.

    • Read more
  • Global Shipping Rattled After Houthis Seize Israeli Vessels

    Since Houthis seized a ship owned by an Israeli businessman last week in the Red Sea, global shipping has been taking stock of potentially rising risks.

    • Read more
  • “Rogue” Security Officers Pose a Threat to Life and Public Safety

    Halo Solutions, a British security and safety technology firm helps stamp out fraudulent security guards at events and gigs. The issue of qualified and certified security officers becomes even more important now, ads the U.K. is about to mandate robust public security measures at public events.

    • Read more
  • The Historic Claims That Put a Few California Farming Families First in Line for Colorado River Water

    Twenty families in the Imperial Valley received a whopping 386.5 billion gallons of the river’s water last year — more than three Western states. Century-old water rights guarantee that supply.

    • Read more
  • « first
  • ‹ previous
  • …
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Recently-patched Firefox bug exploited against Tor browser users
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Homeland Security Blocked 500-Plus Ransomware Attacks Since 2021
  • 'Dark tourism' is attracting visitors to war zones and sites of atrocities in Israel and Ukraine. Why?
  • Is big tech harming society? To find out, we need research, but it's being manipulated by big tech itself
  • US bans new types of goods from China over allegations of forced labor
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Economic Cyberespionage: A Persistent and Invisible Threat

    Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.

    • Read more
  • Nuclear Has Changed. Will the U.S. Change with It?

    Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.

    • Read more
  • Calls Grow for U.S. to Counter Chinese Control, Influence in Western Ports

    Experts say Washington should consider buying back some ports, offer incentives to allies to decouple from China.

    • Read more
  • Exploring the New Nuclear Energy Landscape

    In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies