Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Sci-Tech

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Incentives for U.S.-China Conflict, Competition, and Cooperation Across Artificial General Intelligence’s Five Hard National Security Problems

    The prospect of either the United States or the People’s Republic of China —or both—achieving artificial general intelligence (AGI) is likely to heighten tensions and could even increase the risk of competition spiraling into conflict. But the emergence of AGI could also create incentives for risk reduction and cooperation. We argue that both will not only be possible but essential.

    • Read more
  • Securing South Korea's Critical Minerals Supply Chains Through Trilateral Cooperation

    South Korea, Japan, and the United States’ trilateral partnership has expanded to include collaboration on economic security, including on critical minerals supply chains (CMSCs). A new report offers analysis and tools for supply chain net assessment, supply chain cooperation, and economic security.

    • Read more
  • Hundreds of Old EV Batteries Have New Jobs in Texas: Stabilizing the Power Grid

    After reaching the end of their automotive lives, the batteries are being reused to provide lower-cost grid energy storage.

    • Read more
  • To Better Detect Chemical Weapons, Materials Scientists Are Exploring New Technologies

    Chemical warfare is one of the most devastating forms of conflict. It leverages toxic chemicals to disable, harm or kill without any physical confrontation. Across various conflicts, it has caused tens of thousands of deaths and affected over a million people through injury and long-term health consequences.

    • Read more
  • DHS S&T Launches Third Phase of Industry Competition to Develop Remote Identity Verification Tech

    DHS S&T’s has announced the third phase of the Remote Identity Validation Rally (RIVR), which challenges the private sector to deliver secure, accurate, and user-friendly technologies that can combat identity fraud when users apply for government services, open bank accounts, or verify social media accounts.

    • Read more
  • Geological Mapping Project Supports Critical Mineral Explorations, Enhances Public Safety in the Southeast

    A key focus of a new USGS mapping project is to identify where critical minerals vital to the economy and national security might be located. As demand for rare earth elements and other critical minerals grows for use in technology, energy, and defense sectors, this project can provide vital data that helps the U.S. secure domestic sources of critical minerals, thus reducing the nation’s dependence on foreign sources.

    • Read more
  • Argonne, UT to Strengthen Collaboration in Battery Sciences and Critical Materials Development

    New memorandum of understanding expands joint research to accelerate U.S. battery innovation and secure critical materials supply chains.

    • Read more
  • Cybersecurity Education in the Age of AI: Rethinking the Need for Human Capital in National Cyber Defense

    Just five years ago, headlines were filled with urgent calls for the United States to drastically increase its output of cybersecurity professionals. Fast forward to 2025, and the proliferation of AI —especially generative and autonomous models—has transformed both the threats we face and the tools we use to defend against them. AI-driven cybersecurity software now automates many of the functions that once required a skilled human analyst, and the argument is made that AI may soon render many human cybersecurity roles obsolete.

    • Read more
  • Not Just Drones, but Massed Swarms of Them. Defenses Can’t Cope

    A new and sophisticated phase of aerial warfare has emerged from the conflicts in Ukraine and the Middle East over the past month, defined by the systematic use of massed drone saturation attacks. This evolving doctrine uses quantity and simultaneity to overwhelm even the most advanced air-defense systems.

    • Read more
  • Attacks on the U.S. Innovation Ecosystem Are an Attack on a Wellspring of American Prosperity

    The Trump administration’s attacks on the country’s science and innovation ecosystem — its cuts to federally funded R&D; its war on higher education; and its aggression toward immigrants, including skilled immigrants — are dismantling America’s science and technology advantage—putting the country’s future prosperity at risk. This frontal assault on the key source of U.S. industry’s competitive advantage is not a recipe for American greatness; it is a recipe for long-term decline.

    • Read more
  • Why the U.S. Is Letting China Win on Energy Innovation

    The frontiers of global technology have pivoted to AI and next generation energy. In AI, the U.S. has far outpaced any other nation, but in energy, the U.S. has just tied its shoelaces together. The reason isn’t technology, economics or, despite the administration’s misleading official line, even national security. Rather, it is politics. The fact is, the U.S. does not have an energy security problem. It does, however, have an energy cost problem combined with a growing climate change crisis. These issues will only be made worse by Trump’s enthusiasm for fossil fuels.

    • Read more
  • Building Nevada’s Cyber Future One Summer Camp at a Time

    UNLV’s Howard R. Hughes College of Engineering launched GenCyber Camp to create awareness of college and career pathways in cybersecurity among Nevada’s youth. The program has secured an impressive share of success stories. Organizers search for funding to keep the momentum going.

    • Read more
  • U.S. Moves Decisively to Avoid Dependence on China’s Rare Earths

    The Pentagon’s package of support for rare earths company MP Minerals, announced on 10 July, should free the US military and eventually much of US industry from dependence on Chinese supply chains for rare earth magnets.

    • Read more
  • New Research Dispels Myth of Conspiracy Theorists as Isolated Outsiders

    A five-year study dispels the stereotype of conspiracy theorists as angry loners or keyboard warriors. The study finds that the participatory culture offered by conspiracy theorists is expanding the scope of fringe ideas, and that the social and emotional connections provided by conspiracy theorists are recruiting diverse participants.

    • Read more
  • AI System Identifies Fake Videos Beyond Face Swaps and Altered Speech

    In an era where manipulated videos can spread disinformation, bully people, and incite harm, UC Riverside, in collaboration with Google, have developed a new model which spots fakes by interpreting faces and backgrounds.

    • Read more
  • « first
  • ‹ previous
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • …
  • next ›
  • last »

More headlines

  • Trump Administration Opens New Front to Strip Harvard of Federal Funding
  • Feds issue 'information requests' on University of Chicago international students, admissions practices
  • New airport scanners are better at spotting liquid explosives, but many airports lack them
  • DHS S&T Delivers New Capability for Detecting Presence of Life to Law Enforcement
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • The pioneering science linking climate to weather disasters
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Trump administration’s AI team comes into focus, as agencies reach 1,700 AI use cases
  • WATCH: AI's Role at DHS with Gary Barber, Matthew Ferraro
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Technology Evolves the Tactics: Preparing for the Rise of Terrorist AI Harms

    Terrorist groups, like the societies they emerge from, adapt to new technologies. As AI capabilities evolve, so too do the tactics of extremist actors. While the full effects may take years to observe, as the technologies continue to develop, we are starting to see them directly alter extremism tradecraft.

    • Read more
  • Bookshelf: A Tale of American Lawyers and Chinese Engineers

    The U.S. and China have fundamental differences, a new book argues. China would be an “engineering state” whereas the U.S. is a “lawyerly society.” Most Chinese Communist Party leaders have been engineers focused on building mega projects such as highways, bridges, fast trains. and airports. In recent decades the U.S. has become a “lawyerly society” as the country’s elite, dominated by lawyers, focused on procedure and process rather than getting things done.

    • Read more
  • Europe’s Banks Quietly Mobilize for Economic Warfare

    For years, banks treated defense as a reputational issue, as well as an environmental, social and governance risk, often lumping it with tobacco or fossil fuels as something to be managed at arm’s length. That era is ending. Russia’s war in Ukraine, China’s coercive trade tactics and the United States’ pressure on Europe to shoulder more of its defense burden have exposed the limits of moralistic restraint. Financial mobilization is the new norm.

    • Read more
  • A New Generation of Industries Emerges in Texas as Feds Push to Mine More Rare Minerals

    The U.S. doesn’t produce the minerals and metals needed for renewable energy, microchips or military technology. Major oil companies are drilling in East Texas again, but not for oil. This time, they’re after lithium for batteries and other rare elements.

    • Read more
  • U.S. and Australia Deepen Critical-Minerals Engagement to Counter China

    Engagement between Australia and the United States on critical minerals has matured from technical cooperation into a strategic partnership, aligning resource security with clean energy and defense priorities. 

    • Read more
  • Bookshelf: Critical Mineral Dilemmas

    Whoever controls the production and processing of lithium, copper and other critical minerals could dominate the 21st century economy, much as producers of fossil fuels defined the 20th century, writes Ernest Scheyder in a new book.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies