Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Sci-Tech

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • ENERGY WEAPONSWar at the Speed of Light: The Emerging Role of Directed-Energy Weapons

    By Malcolm Davis

    For decades, notions of laser weapons have been the stuff of science fiction. Now they are becoming military reality, as directed-energy weapons, including high-energy lasers and high-power microwave weapons, open new approaches to counter swarms of cheap drones.

    • Read more
  • CLIMATE CHALLENGESHow the Trump administration’s climate math doesn’t add up

    By Kate Yoder

    There’s an old argument that protecting the environment hurts the economy. It’s wrong for a lot of reasons.

    • Read more
  • NUCLEAR ENERGYDOME, World’s First Nuclear Reactor Test Bed, Ready for Privately Developed Advanced Reactors

    The Idaho National Laboratory’s Demonstration of Microreactor Experiments (DOME) is a first-of-its-kind microreactor test bed that will enable rapid development, testing and demonstration of privately developed advanced nuclear reactors.

    • Read more
  • DOOMSDAYWhat to Expect When You’re Expecting the End of the World

    By Kate Yoder

    Jem Bendell predicted that society would collapse because of climate change. Then he tried to get on with his life.

    • Read more
  • GROVES OF ACADEMEFrom Lecture Halls to Jail Cells: The Rising Risks of University Research

    By Christopher J Watterson

    Universities should be clear-eyed about the need to negotiate trade-offs between research security and international engagement. National export-control authorities also need to provide adequate guidance and support to university institutions and researchers navigating increasingly onerous export-control regimes.

    • Read more
  • AIAI Can Design and Run Thousands of Lab Experiments without Human Hands. Humanity Isn’t Ready for the New Risks This Brings to Biology

    By Stephen D. Turner

    What happens when the same capabilities operate outside those controls is a question that policy has not yet answered. Overreact, and talent and investment may move elsewhere while the technology continues advancing anyway. Underreact, and the risks of that technology could be exploited to cause real harm.

    • Read more
  • AIThe Federal Government Is Rushing Toward AI. Our Reporting Offers Three Cautionary Tales.

    By Renee Dudley

    I’ve studied how the federal government has handled — and mishandled — the AI transition over the past two decades, and my reporting offers some cautionary tales and valuable lessons as policymakers encourage the use of AI and federal agencies adopt the technology.

    • Read more
  • SEA MINESHow Sea Mines Threaten Global Trade, and How Navies Detect Them

    By John Femiani

    Artificial intelligence techniques, such as machine learning, can help navies detect modern sea mines. Here’s what I’ve learned about how the mines work and how they can be neutralized.

    • Read more
  • MOVING MOUNTAINSBypass the Strait of Hormuz with Nuclear Explosives? The U.S. Studied That in Panama and Colombia in the 1960s

    By Christine Keiner

    The idea of a new canal to move oil from the Middle East had emerged in the context of another Middle East conflict, the 1956 Suez crisis. Project Plowshare advocates, led by Edward Teller, sought to use what they called “peaceful nuclear explosions” to reduce the costs of large-scale earthmoving projects.

    • Read more
  • GUNSNew York City’s Spike in 3D-Printed Guns Prompts Push for Tougher Laws

    By Chip Brownlee

    Police in the nation’s biggest city are recovering a growing number of 3D-printed guns. Manhattan District Attorney Alvin Bragg is advocating legislation that would make 3D-printing guns a crime.

    • Read more
  • AI RISKSArtificial Intelligence Is Facing a Crisis of Control—and the Industry Knows It

    By Gordon M. Goldstein

    Washington appears to be years away from consensus on the expanding security risks posed by advanced artificial intelligence (AI). Concrete international agreements also do not yet exist. There is a tenuous potential path forward to avoid a disaster, but it will require out-of-the-box thinking, intense determination, and unprecedented cooperation.

    • Read more
  • AI & CYBER PROTECTIONAI Effort Moves from Novelty to Front Lines of National Lab’s Cyber Protection

    By Tom Rickey

    A research effort to explore how artificial intelligence can offer an advantage to cyber defenders has made the leap into computing operations: Modeling by PNNL research team is tapped to help defend Lab operations.

    • Read more
  • CRITICAL MINERALSResearchers Advance Critical Materials Recycling Technologies

    By Brandon Hallmark

    The U.S. has deposits of nearly all critical materials, but mining capabilities cannot meet the nation’s growing demand. Most extraction and processing are done overseas, much of it in China. This reliance on foreign critical materials risks supply disruptions that could affect U.S. national security, economic growth and everyday life.

    • Read more
  • IRAN WARWhy Iran Targeted Amazon Data Centers and What That Does – and Doesn’t – Change About Warfare

    By Dennis Murphy

    It seems likely that as the use of AI tools and other cloud-based resources continues to grow in importance for countries around the world, commercial data centers will be targets in future conflicts.

    • Read more
  • CHINA WATCHWondering Where China’s Cyber Effort Will Go Next? Just Read the Five-Year Plan

    By Jack Evans

    Adversaries sometimes declare strategic priorities, yet cyber incidents that align with them are not assessed accordingly. We should in fact be guarding against intrusions before they happen by taking note of foreign and industrial policies that indicate where they’re likely to concentrate.

    • Read more
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Orbital datacenters are a pie-in-the-sky idea: Gartner
  • OpenAI says Chinese cops used ChatGPT to plan and track smear ops against opponents
  • Pentagon Threatens “Supply Chain Risk” Label Over AI Guardrails
  • Trump Administration Opens New Front to Strip Harvard of Federal Funding
  • Feds issue 'information requests' on University of Chicago international students, admissions practices
  • New airport scanners are better at spotting liquid explosives, but many airports lack them
  • DHS S&T Delivers New Capability for Detecting Presence of Life to Law Enforcement
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • The pioneering science linking climate to weather disasters
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • AIWhat If We Used AI to Strengthen Democracy?

    By Liz Mineo

    AI is just the latest technology in a long line of innovations through history that have influenced politics. While many experts fear artificial intelligence will be deployed to weaken democracy, examples abound around the world of it being used to make systems fairer. Surveillance, control, propaganda aren’t the only options, says security technologist.

    • Read more
  • CHINA WATCHThe Trump Administration’s Cyber Strategy Fundamentally Misunderstands China’s Threat

    By Matthew Ferren

    The adoption of an offense-first strategy is a dangerous miscalculation. It will not diminish Beijing’s campaigns, and it coincides with a significant deterioration of cyber defenses that have kept U.S. networks and Americans safe.

    • Read more
  • CHINA WATCHAllfare: China’s Whole-of-Nation Strategy

    By Michael Margolius

    To analyze how states exert their influence, scholars often compartmentalize actions into rigid analytical frameworks, which obscures the holistic scope of the challenge.

    • Read more
  • DRONESCounter-Drone Technologies Are Evolving – but There’s No Surefire Way to Defend Against Drone Attacks

    By Jamey Jacob

    Together, these three types of counter-drone technologies – radio frequency, directed energy and kinetic – provide a comprehensive tool kit for addressing the diverse threats posed by unauthorized drones. However, there is no single ideal solution to counter these threats.

    • Read more
  • STEELA New Way to Make Steel Could Reduce America’s Reliance on Imports

    By Zach Winn

    America has been making steel from iron ore the same way for hundreds of years. Unfortunately, it hasn’t been making enough of it. Today the U.S. is the world’s largest steel importer, relying on other countries to produce a material that serves as the backbone of our society. Hertha Metals uses natural gas and electricity to produce steel and high-purity iron for magnets.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies