Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Business

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Can Europe Compete with China's Belt and Road Initiative?

    The European Union this week launched a $340 billion “Global Gateway” fund to boost global infrastructure, which analysts say is aimed at rivaling China’s Belt and Road Initiative. But can the EU’s project compete with Beijing’s billions?

    • Read more
  • “People Should Probably Be Worried”: Texas Hasn’t Done Enough to Prevent Another Winter Blackout, Experts Say

    Natural gas powers the majority of electricity in Texas, especially during winter. Some power companies say the state’s gas system is not ready for another deep freeze.

    • Read more
  • Stacked Deep Learning: Deeper Defense against Cyberattacks

    Internet-based industrial control systems are widely used to monitor and operate factories and critical infrastructure. Moving these systems online has made them cheaper and easier to access, but it has also made them more vulnerable to attack. Stacked deep learning offers a better way to detect hacking into industrial control systems. 

    • Read more
  • Big Batteries on Wheels: Zero-Emissions Rail While Securing the Grid

    Trains have been on the sidelines of electrification efforts for a long time in the U.S. because they account for only 2 percent of transportation sector emissions, but diesel freight trains emit 35 million metric tons of carbon dioxide annually and produce air pollution that leads to $6.5 billion in health costs, resulting in an estimated 1,000 premature deaths each year. Researchers show how battery-electric trains can deliver environmental benefits, cost-savings, and resilience to the U.S.

    • Read more
  • Chinese Force Labor Connections in Global Retail Brands’ Supply Chains

    More than 100 global retail brands could be at risk of using cotton that is produced by Uyghur forced labor according to new research. The findings suggest dozens of well-known international brands are at risk of using cotton that is produced or processed by forced labor in the Xinjiang Province in China.

    • Read more
  • How to Fix Global Supply Chains for Good

    Truck-driver shortages, “lean” inventories, and an overreliance on China plagued global supply chains long before the pandemic. Permanently addressing these and other issues will help the United States and rest of the world better cope with the next shock.

    • Read more
  • Congress Restarts Push for China Legislation by Year’s End

    Lawmakers are renewing a push to pass legislation that would boost U.S. competition with China, amid rising concerns about the global supply chain. Addressing U.S. competition with China is one of the few areas of broad bipartisan support on Capitol Hill, although lawmakers differ on the approach.

    • Read more
  • Supply Chain Disruptions—the Risks and Consequences

    Supply chain disruptions cause general economic disruption and key commodity shortages, which then in turn can, in fact, drive aggressive national behavior and international instability. And ironically, this reactive aggressive national behavior can happen even if the health of a national economy itself depends upon continued international economic interdependence. Indeed, this very interdependence can create vulnerabilities.

    • Read more
  • Interpol Unveils Emerging Cyberthreats

    The exceptional COVID-19 crisis has fueled the increase of cybercrime in all its forms, while grey infrastructure serves to facilitate the proliferation of crime.

    • Read more
  • German Engine Technology Used in Chinese Warships: Report

    Engines developed in Germany can evade export control bans due to their status as a so-called dual-use technology, a German media investigation has revealed.

    • Read more
  • Protecting Infrastructure from Hackers

    Two Midwestern universities lead an effort to form a coalition of regional research centers to work together to develop the region’s cyber defense talent with an eye to bolstering the defense of the region’s infrastructure against hackers.

    • Read more
  • U.S. Offers Reward for Information on Russian DarkSide Cybercrime Group

    The United States has announced a reward of up to $10 million for information leading to the identification or location of any individual holding a “key leadership” position in DarkSide, a cybercrime group believed to be tied to Russia.The DarkSide syndicate was behind the attack on Colonial Pipeline – the largest publicly disclosed cyberattack against critical infrastructure in the United States.

    • Read more
  • Face Recognition Is So Toxic, Facebook Is Dumping It

    Facebook’s decision to end its face-recognition program comes at a time when face recognition technology is receiving push back, criticisms, and legislative bans across the United States, and the globe.

    • Read more
  • Government Action Needed to Ensure Insurance Against Major Hacking of Driverless Vehicles: Experts

    Government action is needed so driverless vehicles can be insured against malicious hacks which could have potentially catastrophic consequences, experts say. Traditional vehicle insurance wouldn’t cover the mass hacking of driverless cars, and an incident like this could cost the industry tens of billions of pounds.

    • Read more
  • U.S. Sanctions NSO Group, Israeli Maker of Pegasus Spyware

    The U.S. authorities said the NSO Group’s spyware helped authoritarian governments “silence dissent.” The new measures will limit NSO Group’s access to U.S. components and technology.

    • Read more
  • « first
  • ‹ previous
  • …
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • …
  • next ›
  • last »

More headlines

  • Iran may go after US defense firms with cyber attacks, warn Pentagon, Homeland Security
  • DHS scraps $10B small business IT and software contract
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Recently-patched Firefox bug exploited against Tor browser users
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Homeland Security Blocked 500-Plus Ransomware Attacks Since 2021
  • 'Dark tourism' is attracting visitors to war zones and sites of atrocities in Israel and Ukraine. Why?
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report

    There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.

    • Read more
  • Trying to “Bring Back” Manufacturing Jobs Is a Fool’s Errand

    Advocates of recent populist policies like to focus on the supposed demise of manufacturing that occurred after the 1970s, but that focus is misleading. The populists’ bleak economic narrative ignores the truth that the service sector has always been a major driver of America’s success, for decades, even more so than manufacturing. Trying to “bring back” manufacturing jobs, through harmful tariffs or other industrial policies, is destined to end badly for Americans. It makes about as much sense as trying to “bring back” all those farm jobs we had before the 1870s.

    • Read more
  • The Potential Impact of Seabed Mining on Critical Mineral Supply Chains and Global Geopolitics

    The potential emergence of a seabed mining industry has important ramifications for the diversification of critical mineral supply chains, revenues for developing nations with substantial terrestrial mining sectors, and global geopolitics.

    • Read more
  • Are We Ready for a ‘DeepSeek for Bioweapons’?

    Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies