Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Espionage

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • CHINA WATCHPentagon Bans Tech Vendors from Using China-Based Personnel After ProPublica Investigation

    By Renee Dudley

    The Defense Department has tightened cybersecurity requirements for its cloud services providers. The changes come after ProPublica revealed how Microsoft’s use of China-based engineers left sensitive government data vulnerable to hacking.

    • Read more
  • CHINA WATCHPentagon Warns Microsoft: Company’s Use of China-Based Engineers Was a “Breach of Trust”

    By Renee Dudley

    The Defense Department is opening an investigation to determine if the tech giant’s use of overseas engineers to maintain sensitive U.S. government computer systems compromised national security.

    • Read more
  • UNILTERAL DISRMAMENT What Just Happened? Dismantling the Intelligence Community’s Foreign Malign Influence Center

    By David Salvo

    Director of National Intelligence Tulsi Gabbard announced that the functions of the intelligence community’s Foreign Malign Influence Center (FMIC) would be significantly reduced. Gabbard has thus dismantled the last remaining U.S. federal government organ dedicated to tracking and analyzing state-sponsored efforts to interfere in U.S. institutions, elections, and society – following the Trump administration’s shutting down of related units at the State Department, Department of Homeland Security, FBI, and Department of Justice earlier this year.

    • Read more
  • UNILTERAL DISRMAMENT Silencing America’s Voice

    The Trump administration has taken a series of steps which have substantially weakened U.S. government-funded media outlets whose task it was to tell the American story and counter the global propaganda and disinformation efforts of U.S. adversaries. These moves greatly benefit the anti-American propaganda efforts of Russia and China, which will now go unchallenged.

    • Read more
  • DEEPFAKESAustralia’s Deepfake Dilemma and the Danish Solution

    By Andrew Horton and Elizabeth Lawler

    Countries need to move beyond simply pleading with internet platforms for better content moderation and instead implement new legal frameworks that empower citizens directly. For a model of how to achieve this, policymakers should look to the innovative legal thinking emerging from Denmark.

    • Read more
  • CHINA WATCHMicrosoft Failed to Disclose Key Details About Use of China-Based Engineers in U.S. Defense Work, Record Shows

    By Renee Dudley, with research by Doris Burke

    The tech giant is required to regularly provide U.S. officials with its plan for keeping government data safe from hacking. Yet a copy of Microsoft’s security plan obtained by ProPublica makes no reference to the company’s China-based operations.

    • Read more
  • IRAN’S THREATIsrael Secretly Recruited Iranian Dissidents to Attack Their Country from Within

    By Yossi Melman and Dan Raviv for ProPublica

    The Mossad made Iran its top priority in 1993 after Israelis and Palestinians signed the Oslo Accords on the White House lawn, seemingly ending decades of conflict. The main goal of Israel’s focus on Iran: To protect Israel’s nuclear monopoly in the region.

    • Read more
  • CHINA WATCHMicrosoft Used China-Based Engineers to Support Product Recently Hacked by China

    By Renee Dudley

    Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in its popular SharePoint software but didn’t mention that it has long used China-based engineers to maintain the product.

    • Read more
  • CHINA WATCHThe Taiwan Scenarios 2: Warning Signs

    By Nathan Attrill and ASPI Defense Strategy Staff

    At first, it may not be easy to see what’s afoot. The difference between China’s routine coercion of Taiwan and early signs of serious escalation to take control of the island may not be clear.

    • Read more
  • INTELLIGENCE COMMUNITYCongress Has a Chequered History of Overseeing U.S. Intelligence and National Security

    By Luca Trenta

    The role of Congress is to conduct oversight. It is the role of the governing administration to keep Congress informed of intelligence matters, particularly covert operations. History shows this has often been hard to achieve.

    • Read more
  • TRUTH DECAYHow the QAnon Movement Entered Mainstream Politics – and Why the Silence on Epstein Files Matters

    By Art Jipson

    QAnon followers fervently believe that the United States is secretly controlled by a cabal of elites who are pedophiles, sex traffickers, and satanists, and that Trump is a mythological, heroic figure fighting this elite pedophile ring. The QAnon movement continues to evolve, even as its central figure hedges and hesitates, showing how potent myths can be in times of uncertainty. Understanding why this belief continues to gain traction is essential for understanding the current state of American democracy.

    • Read more
  • CYBERSECURITYA Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers

    By Renee Dudley, with research by Doris Burke

    Microsoft is using engineers in China to help maintain the Defense Department’s computer systems —with minimal supervision by U.S. personnel. Digital escorts often lack the technical expertise to police foreign engineers with far more advanced skills, leaving highly sensitive data vulnerable to hacking. Microsoft has been warned that the arrangement is inherently risky, but the company launched and expanded it anyway.

    • Read more
  • THE RUSSIA CONNECTIONRussian Imperial Movement: How a Far-Right Group Outlawed by the U.K. Is Spreading Terror Across Europe

    By Dale Pankhurst

    The decision by the British government to proscribe the RIM indicates concern that the far-right group is increasing its operational capacity both in Ukraine and throughout Europe. With its extensive network, the movement will become an increasing threat to security if it is allowed to continue acting as a proxy for Putin’s foreign policy objectives.

    • Read more
  • THE RUSSIA CONNECTIONCountering Russia’s Cognitive Warfare Against the United States

    China, Russia, Iran, and North Korea increasingly use cognitive warfare against the United States in order to shape U.S. decision-making.

    • Read more
  • DEEPFKESMarco Rubio Impersonator Contacted Officials Using AI Voice Deepfakes – Computer Security Experts Explain What They Are and How to Avoid Getting Fooled

    By Matthew Wright

    Ongoing advances in deep-learning algorithms, audio editing and engineering, and synthetic voice generation have meant that it is increasingly possible to convincingly simulate a person’s voice. Even worse, chatbots like ChatGPT are capable of generating realistic scripts with adaptive real-time responses.

    • Read more
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • White House forms emergency team to deal with China espionage hack
  • U.S. government unveils charges against Iranians who hacked into Trump 2024 campaign
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • FBI says Iran sent hacked Trump info to Biden campaign staffers
  • China select committee urges DHS to ‘aggressively’ enforce UFLPA
  • Chinese hackers nab 60,000 emails in State Department breach
  • CIA’s AI director says the new tech is our biggest threat, and resource
  • Aimed at Protests, Surveillance Contractor’s New Owners Expand Spy Tech Portfolio
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies