Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Public Safety

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Could the EU Become a Military Superpower?

    Only two weeks after a European Union summit where the bloc’s leaders pledged to spend billions on defense in a “watershed moment for Europe,” they are returning to Brussels to solidify plans for strengthening Europe’s defense autonomy amid ongoing doubts about the US commitment to protecting European nations and sustaining military support for Ukraine.

    • Read more
  • The Rise and Fall of Terrorgram: Inside a Global Online Hate Network

    White supremacists from around the world used Telegram to spread hateful content promoting murder and destruction in a community they called Terrorgram. ProPublica and FRONTLINE identified 35 crimes linked to Terrorgram, including bomb plots, stabbings, and shootings. After several arrests of alleged Terrorgram members and reforms by Telegram, experts expect that extremists will find a new platform for their hate.

    • Read more
  • The Parallels Between Kash Patel and William J. Burns, a Scandal-Mongering 1920s FBI Director — an FBI Historian Explains

    As an FBI historian, I have researched political influence on the FBI. It’s still early days, but Kash Patel’s confirmation has one clear, if century-old, comparison in FBI history. It is not J. Edgar Hoover, but Hoover’s immediate predecessor, William J. Burns, who served as director from 1921 through 1924.With bogus charges and spurious probe, Burnsused the FBI to go after lawmakers who wanted to investigate the Teapot Dome Scandal. Trump’s and Patel’s own words portend the FBI returning to the open political targeting of the Teapot Dome era. History whispers a warning.

    • Read more
  • The Push to Restore Semiconductor Manufacturing Faces a Labor Crisis − Can the U.S. Train Enough Workers in Time?

    Semiconductors power nearly every aspect of modern life.The U.S. depends heavily on foreign countries – including China, a geopolitical rival – to manufacture semiconductors. This isn’t just an economic concern; it’s widely recognized as a national security risk. There is a bipartisan support to expanding domestic chip manufacturingby building new chip plants, but a major challenge remains: Who will operate them?

    • Read more
  • Is “Fake” Terrorism Still Terrorism? Here’s What the Sydney Caravan Incident Tells Us

    The recent discovery of a caravan full of explosives in Dural, in Sydney’s northwest, caused significant fear about the possibility of a mass casualty attack. The Australian Federal Police declared it and 14 antisemitic attacks a “con job” by organized criminals who were trying to distract police or use it as a bargaining chip to influence prosecutions. Can “fake” terrorism still be terrorism, especially if it causes significant fear?

    • Read more
  • From Home to Horror: The Association Between Domestic Violence and Terrorism

    Domestic violence is an under-recognized early indicator of terrorism. It is not a reliable solitary indicator, but when observed alongside risk factors, it can prompt authorities to take a closer look at a potential terrorist.

    • Read more
  • Making Airfield Assessments Automatic, Remote, and Safe

    U.S. Air Force engineer and PhD student Randall Pietersen is using AI and next-generation imaging technology to detect pavement damage and unexploded munitions.

    • Read more
  • On Hurricanes and Hoaxes: A Case for Finding Common Ground

    Conspiracy theories offer an easy, emotionally satisfying answer to a complicated problem. Instead of facing the reality of climate change, or reckoning with their own complicity, people can choose a different story: that climate disasters are manipulated, that scientists are corrupt, and that the crisis is exaggerated for political gain.

    • Read more
  • Europe Will Need Thousands More Tanks and Troops to Mount a Credible Military Defense without the U.S.

    Implementing a new defense strategy will mean answering many difficult questions, including whether an EU defense force would involve all EU member states, the potential roles of antagonistic EU members like Hungary and Slovakia (both pro-Trump and pro-Russia), and those of non-EU NATO members such as the UK, Norway, or even Canada.

    • Read more
  • French Nuclear Deterrence for Europe: How Effective Could It Be Against Russia?

    Does France have the capacity to defend Europe? Would the deployment of the French nuclear umbrella in Eastern Europe make Europe strategically autonomous, giving it the means to defend itself independently?

    • Read more
  • Security Veins: Advanced Biometric Authentication Through AI and Infrared

    Hyperspectral imaging and AI can identify individuals using blood vessels in palms.

    • Read more
  • U.S.-Pakistan Operation to Capture “Top Terrorist”' Signals Deep Counterterrorism Cooperation Despite Cold Ties: Experts

    The U.S. Justice Department plans Wednesday to present in a federal court in Virginia the alleged mastermind of the August 2021 bombing that killed 13 U.S. troops in Afghanistan. The justice department said Islamic State Khorasan operative Mohammad Sharifullah, also known as “Jafar,” was charged on March 2 with “providing and conspiring to provide material support and resources to a designated foreign terrorist organization resulting in death.”

    • Read more
  • How DHS Laid the Groundwork for More Intelligence Abuse

    I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.

    • Read more
  • Countering Blockship Attacks in Key U.S. Waterways

    Blockship attacks entail obstructing key waterways by deliberately scuttling ships, running them aground, or having them impale themselves onto infrastructure. Such attacks could delay maritime movements in U.S. or key overseas ports, affecting all U.S. military services and potentially disrupting billions of dollars in commerce.

    • Read more
  • B61-12 System Production Ends, Sustainment Begins

    A nuclear weapon milestone: in December, Sandia Lab has completed the last production unit of the B61-12 nuclear gravity bomb.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Trump 2026 Budget Plan Boosts Defense, Homeland Security
  • Trump wants $1 trillion for Pentagon
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • The FBI and other agencies are using polygraphs to find leakers. But do they work?
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Trump gutted key research programs studying violence. Experts say it will come at a heavy cost
  • How Behavioral Threat Assessment and Management Teams Make American Communities Safer
  • New Jersey mom sues Homeland Security, TSA for 'threat-tagging' over Facebook post
  • ICE agents detain Tufts University grad student after pro-Palestinian opinion piece
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • AI-Controlled Fighter Jets May Be Closer Than We Think — and Would Change the Face of Warfare

    Could we be on the verge of an era where fighter jets take flight without pilots – and are controlled by artificial intelligence (AI)? US R Adm Michael Donnelly recently said that an upcoming combat jet could be the navy’s last one with a pilot in the cockpit.

    • Read more
  • What We’ve Learned from Survivors of the Atomic Bombs

    Q&A with Dr. Preetha Rajaraman, New Vice Chair for the Radiation Effects Research Foundation in Hiroshima and Nagasaki, Japan.

    • Read more
  • Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report

    There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies