Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Conspiracy Theories, Some with Antisemitic Roots, Crop Up in 2023 Shareholder Proposals

    The 2023 shareholder season heralded a new element of shareholder proposals: conspiracy theories. Some of the proposals demand a “congruency report” on relationships between companies and “globalist organizations” — a demand that could be interpreted as an antisemitic dog whistle. The second primary conspiracy theory focuses on transhumanism. In its more conspiratorial form, proponents believe a “Satanist” or elite cabal of humans, on a mission to replace humans with machines/governments, are modifying bodies and DNA via secretly inserted chips.

    • Read more
  • United Federation LEOS-PBA to Represent Court Security Officers in Washington, DC

    The Washington, DC Court Security Officers (CSOs) and Special Security Officers (SSOs), who were represented by SPFPA and its Local 439, voted in August on a new representation.The United Federation LEOS-PBA was successful in organizing several SPFPA groups from around the country.

    • Read more
  • “Do Your Job.” How the Railroad Industry Intimidates Employees Into Putting Speed Before Safety

    Railroad companies have penalized workers for taking the time to make needed repairs and created a culture in which supervisors threaten and fire the very people hired to keep trains running safely. Regulators say they can’t stop this intimidation.

    • Read more
  • Is the Fear of Cyberwar Worse Than Cyberwar Itself?

    Unrealistic cyberwar expectations could hold the insurance industry back, and that’s the real economic security problem. The “hyperbolic characterization of cyberwar is likely a bigger problem than the threat of cyberwar itself. The problem is one of economic security,” Tom Johansmeyer writes.

    • Read more
  • Money Helps States Identify Critical Mineral Potential in Mine Waste

    Funds from the Bipartisan Infrastructure Law will allow 14 states to study the potential for critical mineral resources in mine waste. This funding will allow the USGS and these states to better map locations of mine waste and measure the potential for critical minerals that might exist there.

    • Read more
  • First 10 Months of 2023 See Record 25 Billion-Dollar Disasters

    NOAA confirmed another billion-dollar disaster in October, bringing the total to a record 25 disasters in the first 10 months — the largest number of disasters for any year since NOAA has kept track of these types of events. The Mississippi River’s water level dropped to historic lows along parts of the river.

    • Read more
  • Tracking China’s Control of Overseas Ports

    China has become the world’s largest trading country and second-largest economy, and conducts about 95 percent of its international trade through sea-lanes. As of September 2023, China has signed seventy bilateral and regional shipping agreements with sixty-six countries and regions. Today, China’s shipping routes and service networks cover major countries and regions worldwide.

    • Read more
  • Hunt for Answers Continues Over Chinese Ship's Suspected Role In Damaging Baltic Pipeline

    A Chinese ship suspected of damaging an underwater gas pipeline and two telecom cables in the Baltic Sea is returning to China through the Russian Arctic as Finnish investigators continue to search for answers about the vessel’s role in the incident.

    • Read more
  • Resiliency and Vulnerability of Global Supply Chains During the Covid-19 Pandemic

    It’s no secret that the Covid-19 pandemic disrupted supply chains across the globe. In the United States, it often seemed like stores couldn’t keep certain items in stock. New research is diving more closely into the resiliency and vulnerability of global supply chains during the Covid-19 pandemic.

    • Read more
  • As Philadelphia Struggles to Hire Cops, More Businesses Are Turning to Private Armed Guards

    In Philadelphia, armed guards are summoned to stand sentinel in places where they’ve rarely — if ever — been before. Concern about homicides is also contributing to the rise of private security. But there are questions about limited training and regulation.

    • Read more
  • Arrest Made in Central California Bio-Lab Investigation

    Jia Bei Zhu, a citizen of China, was arrested earlier this week in California on a criminal complaint for manufacturing and distributing misbranded medical devices. Zhu and others manufactured, imported, sold, and distributed hundreds of thousands of COVID-19 test kits, in addition to test kits for HIV, pregnancy, clinical urinalysis, and other conditions in the United States and China.

    • Read more
  • Working with Banks Around the World to Prevent Weapons Proliferation

    Most banks have no interest in facilitating a risky weapons sale or contributing to instability in the global landscape. But most are either unaware of the issue or do not know how to address it. Through live and virtual events, the financial sector is learning how to avoid inadvertently facilitating illicit weapons trade.

    • Read more
  • Adtech Surveillance and Government Surveillance are Often the Same Surveillance

    In the absence of comprehensive federal privacy legislation in the United States, the targeted advertising industry, fueled by personal information harvested from our cell phone applications, has run roughshod over our privacy.

    • Read more
  • Israel-Hamas War a Reality Check for India-Middle East-Europe Economic Corridor

    The ongoing violence between Israel and Hamas has underlined the challenges facing an ambitious initiative to build a new trade route from India through the Middle East to Europe, according to analysts.

    • Read more
  • Training Future Supply Chain Leaders

    The field of supply chain management (SCM) deals with managing the complex, global webs of product design, manufacturing, inventory, warehousing, inbound and outbound logistics, and returns activities that underpin everything we use or consume.

    • Read more
  • « first
  • ‹ previous
  • …
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Recently-patched Firefox bug exploited against Tor browser users
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Homeland Security Blocked 500-Plus Ransomware Attacks Since 2021
  • 'Dark tourism' is attracting visitors to war zones and sites of atrocities in Israel and Ukraine. Why?
  • Is big tech harming society? To find out, we need research, but it's being manipulated by big tech itself
  • US bans new types of goods from China over allegations of forced labor
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Economic Cyberespionage: A Persistent and Invisible Threat

    Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.

    • Read more
  • Nuclear Has Changed. Will the U.S. Change with It?

    Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.

    • Read more
  • Calls Grow for U.S. to Counter Chinese Control, Influence in Western Ports

    Experts say Washington should consider buying back some ports, offer incentives to allies to decouple from China.

    • Read more
  • Exploring the New Nuclear Energy Landscape

    In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies