Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Public Safety

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Detecting criminals coming back to the scene of the crime

    Law enforcement officials believe that perpetrators of certain crimes, most notably arson, do come back to the scene of the crime to witness their handiwork; similarly, U.S. military in the Middle East feel that improvised explosive device (IED) bomb makers return to see the results of their work in order to evolve their designs; scientists have developed a method to identify these individuals

    • Read more
  • DHS developing "pre-crime" surveillance tech

    Researchers at DHS are working to develop technology that could catch individuals before they commit a crime

    • Read more
  • U.S.: Iranian agents tried to kill Saudi ambassador to U.S.

    The U.S. attorney general Eric Holde rannounced yesterday that the U.S. government has foiled an Iranian plot to assassinate the Saudi ambassador to the United States; Iran wired $100,000 into a U.S. bank account in August as a down payment for the hit; the assassins — the Iranians thought they were members of a Mexican drug cartel — were to receive $1.5 million if the hit was successful

    • Read more
  • German police uses backdoor Trojan to monitor Skype calls

    A backdoor Trojan capable of monitoring online activity and recording Skype calls has been detected — and is allegedly being used by the German police force

    • Read more
  • TraceSpan Communications shows new interception device

    DOCSIS Phantom intercepts target communications directly from the line and collects a hundred percent of the information in both directions, to and from the ISP or communications provider; the device allows interception of all data, including peer-to-peer communication, even when it does not pass through the ISP server

    • Read more
  • Calif. Allows warrantless searches of cell phones

    California Governor Jerry Brown has vetoed a bill which aimed to prohibit California police from conducting warrantless searches of the cell phones of people under arrest

    • Read more
  • Former colleagues: accused anthrax killer could not have done it

    Two former colleagues of Bruce Ivins, a scientist who worked at the U.S. Army Medical Research Institute of Infectious Disease (USAMRIID) in Frederick, Maryland, and who was accused by the FBI of being behind the 2001 anthrax attacks in the United States, said he could not have done it (Ivins committed suicide in July 2008)

    • Read more
  • Innometrik, Lumidigm integrate technologies

    Lumidigm says that Innometriks’ Rhino reader, which combines embedded Lumidigm fingerprint biometrics, smart cards, PKI, and digital signature technologies, is now handling high security applications in extreme weather and rough environments for several organizations of the U.S. Department of Defense

    • Read more
  • U.S. army orders 315 reconnaissance micro-robots

    Recon Scout XT weighs 1.2lbs (540g), can be deployed in five seconds, and thrown up to 120 feet (36m); soldiers and law enforcement use the Recon Scout system to determine the layout of the enclosed spaces, identify potential IEDs, and the fix the location of friendly, indigenous, or enemy personnel

    • Read more
  • Mexico now dominated by two powerful cartels

    Five years and more than 35,000 deaths into Mexico’s bloody drug war, two cartels have emerged as the dominant force in narcotics and the two are poised to slug it out in a dangerous battle for control; the Mexican governmen’s crackdown on the drug cartels has left many gangs splintered and operationally less effective without their leaders; in the ensuing power vacuum, the Zetas and Joaquin “El Chapo” Guzman’s Sinaloa cartel have stepped up as the two leading gangs

    • Read more
  • ShotSpotter, Intrado join acoustic surveillance, 9-1-1 service

    ShotSpotter, Inc. and Intrado Inc. today announced the expansion of their partnership in delivering real-time acoustic surveillance and gunfire location alert and analysis services to public safety agencies. Intrado, a provider of 9-1-1 technology solutions, will host the ShotSpotter solution using its secure Intrado Co-location and Transport cloud service (I-CAT). ShotSpotter offers gunfire alert and analysis technology as a subscription-based service.

    • Read more
  • Sector Report for Tuesday, 4 October 2011: Law Enforcement Technology

    This report contains the following stories.

    • * Alabama explores shirt-cameras for police
    • * Colorado slashes auto-theft rate with fusion center
    • * Free database helps crack cold case from 1984
    • * Also noted

    Plus 1 additional story.

    Read more
  • Graduate student develops emergency communication Twitter app

    A graduate student at the University of Colorado has developed a smartphone app that makes it easier for first responders and emergency personnel to communicate via Twitter during disasters; without a standardized syntax, emergency personnel, affected individuals, information officers, and journalists were having trouble communicating on Twitter

    • Read more
  • Alabama explores shirt-cameras for police

    With the increasing availability of cheap wearable cameras, more and more police officers could be recording their every move

    • Read more
  • Colorado slashes auto-theft rate with fusion center

    In 2005 Colorado had one of the highest rates of vehicle theft in the country, but thanks to the dogged efforts of local law enforcement officials and the Auto Theft Intelligence Coordination Center the state is now below the national average

    • Read more
  • « first
  • ‹ previous
  • …
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • …
  • next ›
  • last »

More headlines

  • DHS S&T Delivers New Capability for Detecting Presence of Life to Law Enforcement
  • Trump 2026 Budget Plan Boosts Defense, Homeland Security
  • Trump wants $1 trillion for Pentagon
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • The FBI and other agencies are using polygraphs to find leakers. But do they work?
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Trump gutted key research programs studying violence. Experts say it will come at a heavy cost
  • How Behavioral Threat Assessment and Management Teams Make American Communities Safer
  • New Jersey mom sues Homeland Security, TSA for 'threat-tagging' over Facebook post
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • AI-Controlled Fighter Jets May Be Closer Than We Think — and Would Change the Face of Warfare

    Could we be on the verge of an era where fighter jets take flight without pilots – and are controlled by artificial intelligence (AI)? US R Adm Michael Donnelly recently said that an upcoming combat jet could be the navy’s last one with a pilot in the cockpit.

    • Read more
  • What We’ve Learned from Survivors of the Atomic Bombs

    Q&A with Dr. Preetha Rajaraman, New Vice Chair for the Radiation Effects Research Foundation in Hiroshima and Nagasaki, Japan.

    • Read more
  • Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report

    There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.

    • Read more
  • Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled

    “The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.

    • Read more
  • Twenty-One Things That Are True in Los Angeles

    To understand the dangers inherent in deploying the California National Guard – over the strenuous objections of the California governor – and active-duty Marines to deal with anti-ICE protesters, we should remind ourselves of a few elementary truths, writes Benjamin Wittes. Among these truths: “Not all lawful exercises of authority are wise, prudent, or smart”; “Not all crimes require a federal response”; “Avoiding tragic and unnecessary confrontations is generally desirable”; and “It is thus unwise, imprudent, and stupid to take actions for performative reasons that one might reasonably anticipate would increase the risks of such confrontations.”

    • Read more
  • Luigi Mangione and the Making of a ‘Terrorist’

    Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies