Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Espionage

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • CHINA WATCHWondering Where China’s Cyber Effort Will Go Next? Just Read the Five-Year Plan

    By Jack Evans

    Adversaries sometimes declare strategic priorities, yet cyber incidents that align with them are not assessed accordingly. We should in fact be guarding against intrusions before they happen by taking note of foreign and industrial policies that indicate where they’re likely to concentrate.

    • Read more
  • CYBER-STRATEGYTrump’s Cyber Strategy Falls Short on China, Iran, and the Threats That Matter Most

    By Matthew Ferren

    Iranian cyber retaliation is escalating. Chinese operators remain embedded in U.S. infrastructure. Ransomware groups continue to disrupt hospitals, schools, and local governments. Trump’s recently released cyber strategy raises doubts the administration is prepared to address these threats.

    • Read more
  • DISINFORMATIONFrance Strikes to Address Misinformation Weakening Western Alliance

    By Eric Frecon and Fitriani

    The key destabilizing feature of today’s information environment is no longer simply that democracies are targeted by adversaries’ misinformation and disinformation. Increasingly, the danger is coming from uninhibited partners in the allied ecosystem itself.

    • Read more
  • CHINA WATCHIf We Can’t Name China’s Cyberattacks, We Lose Trust in Ourselves

    By Justin Bassi

    In the space of just a few days, two big US tech companies took different approaches to China’s cyberattacks. Palo Alto Networks generically referred to a global cyber espionage operation by unnamed actors while Google specifically named China as the globe’s leading cyber security threat. That inconsistency hurts everyone but China.

    • Read more
  • ESPIONAGEA Whiff of Espionage Around the Epstein Files Points to How Intelligence and Influence Interact

    By Robert Dover

    The Epstein papers have thrown up speculation about whether the late financier and sex offender might have performed services for one or another of the big intelligence agencies.

    • Read more
  • CHINA WATCHAllfare: China’s Whole-of-Nation Strategy

    By Michael Margolius

    To analyze how states exert their influence, scholars often compartmentalize actions into rigid analytical frameworks, which obscures the holistic scope of the challenge.

    • Read more
  • SUSPICIONTrump Administration Orders USDA Employees to Investigate Foreign Researchers They Work With

    By Lisa Song and Sharon Lerner

    The new directive asks workers to check the backgrounds of foreign nationals collaborating with the department’s scientists for evidence of “subversive or criminal activity.” Their names are being sent to national security experts at the agency.

    • Read more
  • CYBERSECURITYThe Sky is Full of Secrets: Glaring Vulnerabilities Discovered in Satellite Communications

    With $800 of off-the-shelf equipment and months worth of patience, a team of U.S. computer scientists set out to find out how well geostationary satellite communications are encrypted. And what they found was shocking.

    • Read more
  • CHINA WATCH“DeepSeek Is in the Driver’s Seat. That’s a Big Security Problem”

    By Danielle Cave

    Democratic countries have a smart-car problem. For those that don’t act quickly and decisively, it’s about to become a severe national security headache.

    • Read more
  • COMMON-SENSE NOTES // By Idris B. OdunewuDiversity as National Security: Why Retreating from DEI Risks Repeating Pre-9/11 Failures

    One of often overlooked lessons of the 9/11 intelligence failure is that diversity — linguistic, cultural, experiential — was not simply a “nice to have” in intelligence work. It was essential infrastructure. The absence of diversity in America’s national security workforce thus represented more than a demographic imbalance; it represented a structural blind spot.

    • Read more
  • AI RISKS: UNSETTLING DEMONSTRATION AI-enabled Intrusions: What Anthropic’s Disclosure Really Means

    By ASPI contributors and External contributors

    Last week, AI company Anthropic reported with ‘high confidence’ that a Chinese state-sponsored hacking group had weaponized Anthropic’s own AI tools to run a largely automated cyberattack on several technology firms and government agencies. The September operation is the first publicly known case of an AI system conducting target reconnaissance with only minimal human direction.

    • Read more
  • DEMOCRACY WATCHFake survey Answers from AI Could Quietly Sway Election Predictions

    Public opinion polls and other surveys rely on data to understand human behavior. New research reveals that artificial intelligence can now corrupt public opinion surveys at scale—passing every quality check, mimicking real humans, and manipulating results without leaving a trace.

    • Read more
  • TECH SECURITYBuilding Trust into Tech: A Framework for Sovereign Resilience

    By Jason Van der Schyff and James Corera

    Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.

    • Read more
  • CHINA WATCHU.S.–China Cyber Relations and the Weaponization of Microsoft Platforms

    By Ishanya Sharma

    Cyber tensions between the United States and China show Microsoft’s central yet fragile role in global cybersecurity, where its platforms serve as both assets and targets. While both nations have exploited vulnerabilities within the platform to conduct cyber-espionage against each other, China has been particularly persistent in its operations.

    • Read more
  • CHINA WATCHReaction Isn’t Enough. Nexperia Case Shows We Must Pre-empt China’s Tech Grabs

    By Fitriani and Bart Hogeveen

    The Dutch government’s decision on 30 September to impose a last-resort restraint order on China-owned Netherlands-based chipmaker Nexperia is more than a trade dispute. It’s the consequence of a belated realization that technology competition with China is real. Economic security in open and liberal democracies demands foresight, not last-minute intervention.

    • Read more
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • North Korean state hackers seen using Medusa ransomware in attacks on US, Middle East
  • UL Solutions withdraws as lead admin for FCC cyber label program amid probe into China ties
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • White House forms emergency team to deal with China espionage hack
  • U.S. government unveils charges against Iranians who hacked into Trump 2024 campaign
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • FBI says Iran sent hacked Trump info to Biden campaign staffers
  • China select committee urges DHS to ‘aggressively’ enforce UFLPA
  • Chinese hackers nab 60,000 emails in State Department breach
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • CHINA WATCHAllfare: China’s Whole-of-Nation Strategy

    By Michael Margolius

    To analyze how states exert their influence, scholars often compartmentalize actions into rigid analytical frameworks, which obscures the holistic scope of the challenge.

    • Read more
  • DISINFORMATIONFrance Strikes to Address Misinformation Weakening Western Alliance

    By Eric Frecon and Fitriani

    The key destabilizing feature of today’s information environment is no longer simply that democracies are targeted by adversaries’ misinformation and disinformation. Increasingly, the danger is coming from uninhibited partners in the allied ecosystem itself.

    • Read more

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies