Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Sci-Tech

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • New AI Model Could Make Power Grids More Reliable Amid Rising Renewable Energy Use

    As renewable energy sources such as wind and solar become more widespread, managing the power grid has become increasingly complex. An AI model that can address the uncertainties of renewable energy generation and electric vehicle demand, making power grids more reliable and efficient.

    • Read more
  • Climate Change Threatens Bridges, Roads: Research Helps Engineers Adapt Infrastructure

    Across America, infrastructure built to handle peak stormwater flows from streams and rivers have been engineered under the assumption that rainfall averages stay constant over time. As extreme weather events become more frequent, these systems could be in trouble.

    • Read more
  • Major Lithium Mine Approved in Nevada, Supporting a Domestic Supply of Critical Minerals 

    Critical minerals are essential building blocks of the modern economy and America’s energy security, from clean energy technologies – like electric vehicle and grid storage batteries and wind turbines – to semiconductors to advanced defense systems and consumer electronics.

    • Read more
  • Accelerating Clean Energy Geothermal Development on Public Lands

    Geothermal energy is one of our greatest untapped clean energy resources on public lands. Replenished by heat sources deep in the Earth, geothermal energy generates electricity with minimal carbon emissions. Interior Department announces new leases and pioneering project approval, and proposes simplified permitting.

    • Read more
  • Emerging Tech and Terrorism: Adoption Patterns and Implications

    The diffusion of innovation theory highlights that most organizations, groups, and individuals adopt innovations in the mid-to-late product lifecycle. This applies to technology adoption by terror groups: most violent non-state actors will adopt technology once it has crossed several thresholds, including cost, availability, testing (i.e., proof of concept), and ease of use.

    • Read more
  • Navigating Uncharted Waters: ASU Drives Solutions for Water Resilience

    The Southwest has grappled with an ongoing megadrought since 2000, the driest period in the last 1,200 years. In a place already known for extreme heat and an arid climate, a secure water supply is especially crucial in order for humanity to thrive.

    • Read more
  • World War I Was the Crucible of Air Power. Ukraine Looks the Same for Drones

    We seem to be seeing a new kind of air battle—lower, slower at close quarters and in a physical environment where fighter aircraft cannot intervene affordably or effectively. Could it be that Ukraine is to small unmanned systems what World War I was to aircraft?

    • Read more
  • Voters: Here’s How to Spot AI “Deepfakes” That Spread Election-Related Misinformation

    For years, people have spread misinformation by manipulating photos and videos with tools such as Adobe Photoshop. These fakes are easier to recognize, and they’re harder for bad actors to replicate on a large scale. Generative AI systems, however, enable users to create content quickly and easily. Domestic and foreign adversaries can use deepfakes and other forms of generative AI to spread false information about a politician’s platform or doctor their speeches.

    • Read more
  • Leveraging AI to Enhance U.S. Cybersecurity

    Artificial intelligence (AI) and machine learning (ML) can potentially provide the homeland unprecedented opportunity to enhance its cybersecurity posture. DHS S&T is exploring the possibilities of using new advances in this technology to detect threats, increase resilience and provide more supply chain oversight.

    • Read more
  • CyberForce Competition Challenges College Students to Use Cybersecurity Skills to Defend Their Wind Energy System

    College teams will work to outsmart a simulated attack on a U.S. wind energy plant. The CyberForce Competition offers students hands-on experience, igniting their passion for cybersecurity.

    • Read more
  • Autonomous Disaster Response Technology Successfully Applied to Fire Extinguishing System of a 3,200-ton Vessel

    An innovative technology for autonomously responding, without crew intervention, to ruptures to the pipes within the fire extinguishing system of vessels has been successfully verified for the first time in Korea.

    • Read more
  • U. of California Faces Lawsuit for Not Hiring Illegal Aliens

    UC’s Board of Regents decided by a vote in January to suspend for one year the implementation of its policy that allowed the hiring of illegal aliens. Now, the university faces a lawsuit for not offering jobs to illegal aliens.

    • Read more
  • Social Media Platforms Aren’t Doing Enough to Stop Harmful AI Bots, Research Finds

    While artificial intelligence (AI) bots can serve a legitimate purpose on social media — such as marketing or customer service — some are designed to manipulate public discussion, incite hate speech, spread misinformation or enact fraud and scams.

    • Read more
  • To Make Children Better Fact-Checkers, Expose Them to More Misinformation — with Oversight

    “We need to give children experience flexing these skepticism muscles and using these critical thinking skills within this online context,” a psychology researcher said.

    • Read more
  • Oversight Revealed in AI Image Recognition Tools

    Artificial intelligence can help people process and comprehend large amounts of data with precision, but the image recognition platforms and computer vision models that are built into AI frequently overlook an important back-end feature called the alpha channel. Researchers developed a proprietary attack called AlphaDog to study how hackers can exploit this oversight.

    • Read more
  • « first
  • ‹ previous
  • …
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • …
  • next ›
  • last »

More headlines

  • Feds issue 'information requests' on University of Chicago international students, admissions practices
  • New airport scanners are better at spotting liquid explosives, but many airports lack them
  • DHS S&T Delivers New Capability for Detecting Presence of Life to Law Enforcement
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • The pioneering science linking climate to weather disasters
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Trump administration’s AI team comes into focus, as agencies reach 1,700 AI use cases
  • WATCH: AI's Role at DHS with Gary Barber, Matthew Ferraro
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • New Technology is Keeping the Skies Safe

    DHS S&T Baggage, Cargo, and People Screening (BCP) Program develops state-of-the-art screening solutions to help secure airspace, communities, and borders

    • Read more
  • Factories First: Winning the Drone War Before It Starts

    Wars are won by factories before they are won on the battlefield,Martin C. Feldmann writes, noting that the United States lacks the manufacturing depth for the coming drone age. Rectifying this situation “will take far more than procurement tweaks,” Feldmann writes. “It demands a national-level, wartime-scale industrial mobilization.”

    • Read more
  • How Artificial General Intelligence Could Affect the Rise and Fall of Nations

    Visions for potential AGI futures: A new report from RAND aims to stimulate thinking among policymakers about possible impacts of the development of artificial general intelligence (AGI) on geopolitics and the world order.

    • Read more
  • Smaller Nuclear Reactors Spark Renewed Interest in a Once-Shunned Energy Source

    In the past two years, half the states have taken action to promote nuclear power, from creating nuclear task forces to integrating nuclear into long-term energy plans.

    • Read more
  • Keeping the Lights on with Nuclear Waste: Radiochemistry Transforms Nuclear Waste into Strategic Materials

    How UNLV radiochemistry is pioneering the future of energy in the Southwest by salvaging strategic materials from nuclear dumps –and making it safe.

    • Read more
  • Model Predicts Long-Term Effects of Nuclear Waste on Underground Disposal Systems

    The simulations matched results from an underground lab experiment in Switzerland, suggesting modeling could be used to validate the safety of nuclear disposal sites.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies