Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Public Safety

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Blocking emergency exits to boost evacuation rates

    Placing an obstacle in front of an emergency exit door accelerates the pace at which people evacuate a room; the reason: by blocking access to the door from one side, the obstacles prevents too many people from occupying the area right in front of the door

    • Read more
  • Mustard-gas leak detected in Denver Army base

    No emergency at Army Pueblo Chemical Depot; the depot has 780,000 mustard-gas-filled projectiles that are about 60 years old; the 2-foot-long artillery shells were brought to the Pueblo depot in 1952; crews investigate

    • Read more
  • Simulation to help in preparing for wildfires

    Increasingly complex systems which combine simulation and monitoring tools could help emergency services prevent future ecological disasters on the scale witnessed in Greece this week

    • Read more
  • U.K. considers Taser's latest device

    Taser’s new “eXtended Range Electronic Projectile” is, according to the company, “the most technologically advanced projectile ever deployed from a 12-gauge shotgun”; the Home Office considers equipping policemen with the device

    • Read more
  • The technology: Israeli scientists find way to combat forged DNA

    Forensic DNA profiling is today one of the most powerful tools applied on crime scenes, and is often used to convict or acquit suspects in rape and murder cases

    • Read more
  • The company: Nucleix fighting biological identity theft

    Its assay technology is in advanced stages of development. Several patents have already been granted; CEO Elon Ganor made his name mainly at VocalTec, a company that pioneered telephony over Internet

    • Read more
  • Police to use DNA "mugshots" as a predictive tool to narrow search

    Scientist say that rather than simply try to match DNA to individuals already in their database, DNA should be used to suggest what a suspect might look like

    • Read more
  • Pentagon asks Congress for funds for 30,000 bunker-busting bombs

    Intensifying the preparations for an attack on Iran’s nuclear facilities, the Obama administration has asked Congress for funds to accelerate production of a 30,000-pound “ultra-large bunker-buster” bomb designed to destroy deeply buried installations

    • Read more
  • Justice sues bulletproof vest manufacturer for using faulty materials

    The Justice Department sues Massachusetts-based First Choice Armor for knowingly using faulty material in the bulletproof vests they sold the military and law enforcement; the company used Zylon, which degrades quickly, especially in hot and humid conditions

    • Read more
  • TeleContinuity, SRA to support national communication system

    TeleContinuity will help the National Communications System’s (NCS) national security and emergency preparedness programs in providing critical continuity of communications expertise, preserving the ability of federal agencies to maintain Continuity of Government (COG) when it is most vital - during disasters, emergencies, evacuations, or pandemics

    • Read more
  • Radiation safety

    A new book — Radiation Safety: Protection and Management for Homeland Security and Emergency Response — helps first responders, EMS, and medical personnel understand how to detect and cope with nuclear incidents

    • Read more
  • The cat did it: man blames cat for child porn downloads

    A Florida man who was arrested for possessing child pornography says his cat jumped onto his computer keyboard while he was in another room; according to the man, the cat’s walking back and forth on the keyboard resulted in 1,000 images of child porn being downloaded from the Web and stored on the PC’s hard drive

    • Read more
  • Pakistani jihadists attacked Pakistani nuclear sites three times since 2007

    When Pakistan was developing its nuclear weapons infrastructure in the 1970s and 1980s, its main concern was that India would overrun these nuclear weapons facilities in an armored offensive; Pakistan thus chose to locate much of its nuclear weapons infrastructure to the north and west of the country — but this decision means that most of Pakistan’s nuclear sites are close to or even within areas dominated by Pakistani Taliban militants and home to al-Qaeda

    • Read more
  • U.K. government trains shopping malls in counterterrorism

    Shopping centers are likely to feature in the attack plans of terrorist organizations in the future as they are usually locations with limited protective security measures; the U.K. government wants to change this

    • Read more
  • U.K. authorities made more than 500,000 surveillance requests last year

    U.K. police, councils, and the intelligence services made about 1,500 surveillance requests every day last year; this is the annual equivalent to one in every 78 people being targeted

    • Read more
  • « first
  • ‹ previous
  • …
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • …
  • next ›
  • last »

More headlines

  • DHS S&T Delivers New Capability for Detecting Presence of Life to Law Enforcement
  • Trump 2026 Budget Plan Boosts Defense, Homeland Security
  • Trump wants $1 trillion for Pentagon
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • The FBI and other agencies are using polygraphs to find leakers. But do they work?
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Trump gutted key research programs studying violence. Experts say it will come at a heavy cost
  • How Behavioral Threat Assessment and Management Teams Make American Communities Safer
  • New Jersey mom sues Homeland Security, TSA for 'threat-tagging' over Facebook post
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Why Ukraine’s AI Drones Aren’t a Breakthrough Yet

    Machine vision, a form of AI, allows drones to identify and strike targets autonomously. The drones can’t be jammed, and they don’t need continuous monitoring by operators. Despite early hopes, the technology has not yet become a game-changing feature of Ukraine’s battlefield drones. But its time will come.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies