Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Sci-Tech

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • New Approach Detects Adversarial Attacks in Multimodal AI Systems

    New vulnerabilities have emerged with the rapid advancement and adoption of multimodal foundational AI models, significantly expanding the potential for cybersecurity attacks. Topological signatures key to revealing attacks, identifying origins of threats.

    • Read more
  • Groundwater Is Drying Out, Heating Up, and Causing Sea Level Rise

    Overuse has created zones of “mega-drying” around the world —and caused more sea level rise than Greenland’s ice sheet.

    • Read more
  • How Poisoned Data Can Trick AI − and How to Stop It

    The quality of the information that the AI offers depends on the quality of the data it learns from If someone tries to interfere with those systems by tampering with their training data –either the initial data used to build the system or data the system collects as it’s operating to improve –trouble could ensue.

    • Read more
  • First-of-its-Kind Industrial System Security Course

    The University of Arkansas at Little Rock (UA Little Rock) is giving students the tools to protect the systems that power modern life through a new course focused on industrial system security.

    • Read more
  • Climate Models Reveal How Human Activity May Be Locking the Southwest into Permanent Drought

    A new wave of climate research is sounding a stark warning: Human activity may be driving drought more intensely –and more directly –than previously understood. One example: The southwestern United States has been in a historic megadrought for much of the past two decades, with its reservoirs including lakes Mead and Powell dipping to record lows and legal disputes erupting over rights to use water from the Colorado Rive.

    • Read more
  • Filtered Data Stops Openly Available AI Models from Performing Dangerous Tasks

    Researchers have reported a major advance in safeguarding open-weight language models. By filtering out potentially harmful knowledge during training, the researchers were able to build models that resist subsequent malicious updates – especially valuable in sensitive domains such as biothreat research.

    • Read more
  • Asteroid Hunting Using Heliostats?

    Most planetary defense efforts use observatory-grade telescopes to produce images of the stars. Within those images, computational methods identify streaks, which are asteroids. This process is precise but time-consuming, and building new observatories is expensive. A Researcher says that heliostats, which typically turn solar energy into electricity, could help find asteroids at night. Most planetary defense efforts use observatory-grade telescopes to produce images of the stars. Within those images, computational methods identify streaks, which are asteroids. This process is precise but time-consuming, and building new observatories is expensive. A Researcher says that heliostats, which typically turn solar energy into electricity, could help find asteroids at night.

    • Read more
  • Risk Assessment with Machine Learning

    Researchers utilize geological survey data and machine learning algorithms for accurately predicting liquefaction risk in earthquake-prone areas.

    • Read more
  • HHS Scraps Further Work on Life-Saving mRNA Vaccine Platform

    In what experts say will hobble pandemic preparedness, HHS Secretary Robert F. Kennedy Jr. announced the dismantling of the country’s mRNA vaccine-development programs—the same innovation that allowed rapid scale-up of COVID-19 vaccines during the public health emergency.

    • Read more
  • RFK Jr Is Wrong About mRNA Vaccines – a Scientist Explains How They Make COVID Less Deadly

    In announcing the cancellation of US government support for research into mRNA vaccines, Kennedy has claimed that mRNA vaccines “encourage new mutations and can actually prolong pandemics” – a misleading statement that contradicts the scientific consensus on viral evolution and effects of vaccination. The false assertions by RFK Jr. and other vaccine-skeptics notwithstanding, mRNA vaccines do not cause viruses to mutate. Mutations are part of viral evolution: a natural process that happens regardless of our intervention. What vaccines do is give us a fighting chance.

    • Read more
  • Incentives for U.S.-China Conflict, Competition, and Cooperation Across Artificial General Intelligence’s Five Hard National Security Problems

    The prospect of either the United States or the People’s Republic of China —or both—achieving artificial general intelligence (AGI) is likely to heighten tensions and could even increase the risk of competition spiraling into conflict. But the emergence of AGI could also create incentives for risk reduction and cooperation. We argue that both will not only be possible but essential.

    • Read more
  • Securing South Korea's Critical Minerals Supply Chains Through Trilateral Cooperation

    South Korea, Japan, and the United States’ trilateral partnership has expanded to include collaboration on economic security, including on critical minerals supply chains (CMSCs). A new report offers analysis and tools for supply chain net assessment, supply chain cooperation, and economic security.

    • Read more
  • Hundreds of Old EV Batteries Have New Jobs in Texas: Stabilizing the Power Grid

    After reaching the end of their automotive lives, the batteries are being reused to provide lower-cost grid energy storage.

    • Read more
  • To Better Detect Chemical Weapons, Materials Scientists Are Exploring New Technologies

    Chemical warfare is one of the most devastating forms of conflict. It leverages toxic chemicals to disable, harm or kill without any physical confrontation. Across various conflicts, it has caused tens of thousands of deaths and affected over a million people through injury and long-term health consequences.

    • Read more
  • DHS S&T Launches Third Phase of Industry Competition to Develop Remote Identity Verification Tech

    DHS S&T’s has announced the third phase of the Remote Identity Validation Rally (RIVR), which challenges the private sector to deliver secure, accurate, and user-friendly technologies that can combat identity fraud when users apply for government services, open bank accounts, or verify social media accounts.

    • Read more
  • « first
  • ‹ previous
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • …
  • next ›
  • last »

More headlines

  • Trump Administration Opens New Front to Strip Harvard of Federal Funding
  • Feds issue 'information requests' on University of Chicago international students, admissions practices
  • New airport scanners are better at spotting liquid explosives, but many airports lack them
  • DHS S&T Delivers New Capability for Detecting Presence of Life to Law Enforcement
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • The pioneering science linking climate to weather disasters
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Trump administration’s AI team comes into focus, as agencies reach 1,700 AI use cases
  • WATCH: AI's Role at DHS with Gary Barber, Matthew Ferraro
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Building Trust into Tech: A Framework for Sovereign Resilience

    Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.

    • Read more
  • Researchers Unveil First-Ever Defense Against Cryptanalytic Attacks on AI

    Security researchers have developed the first functional defense mechanism capable of protecting against “cryptanalytic” attacks used to “steal” the model parameters that define how an AI system works.

    • Read more
  • Data Centers’ Insatiable Demand for Electricity Will Change the Entire Energy Sector

    When the first large language models were unleashed, it triggered a headache for authorities around the world as they tried to figure out how to satisfy data centers’ endless demand for electricity.

    • Read more
  • Will Texas Actually Run Out of Water?

    You asked our AI chatbot about Texas’ water supply. We answered some of the questions that it couldn’t.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies