Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Sci-Tech

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • CodaOctopus delivers first of three Underwater Inspection Systems to U.S. Coast Guard

    CodaOctopus delivers first of three Underwater Inspection Systems (UIS) to U.S. Coast Guard; advanced, versatile system features several advanced technologies which allow for real-time 3D underwater inspection with accurate positioning (up to 10cm) for georeferencing

    • Read more
  • Penn State researchers increase data transmission rate of copper cables

    Nittany Lions electrical engineers show it is possible to increase the data transmission of Category-7 copper cables used to connect computers to each other and the Internet

    • Read more
  • Researchers slow down, stop, and capture light

    Slowing light would allow the use of light rather than electrons to store memory, enabling an increase in operating capacity of 1,000 percent by using light’s broad spectrum rather than single electrons

    • Read more
  • CANBERRA offers new interactive CD for popular UltraRadia radiation monitor

    Monitoring nuclear radiation and dosage levels is becoming more important for firefighters, HAZMAT teams, paramedics, and other first responders — but also for soldiers in the theater; it is also important for those in the nuclear power industry

    • Read more
  • GeoEye's technology monitors endangered gorilla population

    Specialist in satellite, aerial, and geospatial information donates high-duality maps of Africa’s Virunga National Park to help in mapping mountain gorilla habitat

    • Read more
  • Chinese espionage "single greatest risk" to U.S. technology sector

    China’s disregard of intellectual property law is a matter of record; European governments are increasingly alarmed by Chinese intelligence engaging in massive industrial espionage campaign on behalf of Chinese companies; now, congressional panel warns of dire consequences to U.S. technology sector from sustained, sophisticated Chinese espionage campaign

    • Read more
  • Pulse power harnessed to defeat IEDs

    Texas company wants to use pulse power as the basis of an anti-IED device; DHS will give the company $2.5 million to continue to develop the idea; company says the principle behind the anti-IED device can be use in killing cancer cells, cleansing polluted air, purifying water

    • Read more
  • Using pulse power to stop cars in their tracks

    A beam of microwave energy could stop vehicles in their tracks; good solution for perimeter defense, security check points, and police car chases; problem is, it may disable electronic systems in the neighborhood

    • Read more
  • Using visualization to see through fuzzy data

    Finding method in the madness: DHS’s S&T Directorate supports efforts, building on Edward Tufte’s work, to use visualization to find patterns in and make sense of fuzzy data

    • Read more
  • Carbon fiber UAV sets flight duration record

    QinetiQ Group’s Zephyr breaks record for the longest duration unmanned flight — 54 hours — nearly doubling Northrop Grumman’s RQ-4A Global Hawk 2001 record of 30 hours, 24 minutes

    • Read more
  • More opposition in Europe to Galileo

    Growing opposition in Europe to the Galileo Project, Europe’s response to the U.S. GPS network; behind schedule and over budget, many ask whether the benefits of the system would outweigh its costs

    • Read more
  • Octopus inspire new camouflage strategies for military applications

    New in personal protection equipment: The remarkable shape- and color-changing abilities of the octopus and its close relatives inspire researchers to attempt to understand one of nature’s most stunning feats of camouflage and self-preservation — and see whether such techniques can be applied in the military

    • Read more
  • Plasma antennas are stealthy, versatile, and jam resistant

    Soldiers in the field would soon benefit from a new antenna made of plasma — that is, a gas heated to the point at which the electrons are ripped free of atoms and molecules) works just like conventional metal antennas, except that it vanishes when you turn it off

    • Read more
  • D-Wave demonstrates quantum computer with Google image search

    This week in Reno, Nevada, D-Wave demonstrates the first commercial quantum computer by using Google’s forthcoming search-by-image tool; problems remain

    • Read more
  • Chinese intelligence engages in industrial spying in Europe

    China may be slowly integrating into the global economy, but its massive disregard of intellectual property laws shows that it has yet to internalize important norms of market conduct; and now this: Chinese intelligence is using its considerable assets to engage in industrial spying on behalf of Chinese companies

    • Read more
  • « first
  • ‹ previous
  • …
  • 590
  • 591
  • 592
  • 593
  • 594
  • 595
  • 596
  • 597
  • 598
  • …
  • next ›
  • last »

More headlines

  • Orbital datacenters are a pie-in-the-sky idea: Gartner
  • OpenAI says Chinese cops used ChatGPT to plan and track smear ops against opponents
  • Pentagon Threatens “Supply Chain Risk” Label Over AI Guardrails
  • Trump Administration Opens New Front to Strip Harvard of Federal Funding
  • Feds issue 'information requests' on University of Chicago international students, admissions practices
  • New airport scanners are better at spotting liquid explosives, but many airports lack them
  • DHS S&T Delivers New Capability for Detecting Presence of Life to Law Enforcement
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • The pioneering science linking climate to weather disasters
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • What If We Used AI to Strengthen Democracy?

    AI is just the latest technology in a long line of innovations through history that have influenced politics. While many experts fear artificial intelligence will be deployed to weaken democracy, examples abound around the world of it being used to make systems fairer. Surveillance, control, propaganda aren’t the only options, says security technologist.

    • Read more
  • The Trump Administration’s Cyber Strategy Fundamentally Misunderstands China’s Threat

    The adoption of an offense-first strategy is a dangerous miscalculation. It will not diminish Beijing’s campaigns, and it coincides with a significant deterioration of cyber defenses that have kept U.S. networks and Americans safe.

    • Read more
  • Allfare: China’s Whole-of-Nation Strategy

    To analyze how states exert their influence, scholars often compartmentalize actions into rigid analytical frameworks, which obscures the holistic scope of the challenge.

    • Read more
  • Counter-Drone Technologies Are Evolving – but There’s No Surefire Way to Defend Against Drone Attacks

    Together, these three types of counter-drone technologies – radio frequency, directed energy and kinetic – provide a comprehensive tool kit for addressing the diverse threats posed by unauthorized drones. However, there is no single ideal solution to counter these threats.

    • Read more
  • A New Way to Make Steel Could Reduce America’s Reliance on Imports

    America has been making steel from iron ore the same way for hundreds of years. Unfortunately, it hasn’t been making enough of it. Today the U.S. is the world’s largest steel importer, relying on other countries to produce a material that serves as the backbone of our society. Hertha Metals uses natural gas and electricity to produce steel and high-purity iron for magnets.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies