Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Espionage

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Rising and Falling Tides: How Russia Has Benefited from Cuts to US Government-Funded Media in Moldova

    On 28 September, the Moldovan parliamentary election ended with a decisive victory for the pro-Europe, pro-democracy party. The victory was especially satisfying because it was the first election held since the Trump administration has dismantled the U.S. capabilities to track, monitor, and respond to Russian and Chinese anti-American disinformation campaigns and election interference around the world and in the United States.

    • Read more
  • Remote Work Has Opened Australia’s Cyber Backdoor

    The choice is stark. Either we treat remote-work infiltration as a national security priority now, or hostile operatives will continue slipping into networks under the cover of legitimate employment. By modernizing vetting, tightening oversight and raising awareness, we can turn the remote workforce from a vulnerability into a frontline defense.

    • Read more
  • China’s “Super Embassy” Proposal in London Sparks Spying Fears

    Fiber optic cables running near the proposed Chinese embassy’s Royal Mint Court site could make it “very easy” for hostile actors to intercept communications, says an expert. “This is what makes the proposed embassy site’s proximity to telecoms infrastructure significant from a security perspective.”

    • Read more
  • The American TikTok Deal Doesn’t Address the Platform’s Potential for Manipulation, Only Who Profits

    If we want to protect democratic information systems, we need to focus on reducing the vulnerabilities in our relationship with media platforms – platforms with surveillance power to know what we will like, the algorithmic power to curate our information diet and control of platform incentives, and rules and features that affect who gains influence. The biggest challenge is to make platforms less riggable, and thus less weaponizable, if only for the reason that motivated the TikTok ban: we don’t want our adversaries, foreign or domestic, to have power over us.

    • Read more
  • Elon Musk’s SpaceX Took Money Directly from Chinese Investors, Company Insider Testifies

    The newly unsealed testimony marks the first time direct Chinese investment in the company has been disclosed, raising new questions about foreign ownership interests in one of America’s most important military contractors.

    • Read more
  • Pentagon Bans Tech Vendors from Using China-Based Personnel After ProPublica Investigation

    The Defense Department has tightened cybersecurity requirements for its cloud services providers. The changes come after ProPublica revealed how Microsoft’s use of China-based engineers left sensitive government data vulnerable to hacking.

    • Read more
  • Pentagon Warns Microsoft: Company’s Use of China-Based Engineers Was a “Breach of Trust”

    The Defense Department is opening an investigation to determine if the tech giant’s use of overseas engineers to maintain sensitive U.S. government computer systems compromised national security.

    • Read more
  • What Just Happened? Dismantling the Intelligence Community’s Foreign Malign Influence Center

    Director of National Intelligence Tulsi Gabbard announced that the functions of the intelligence community’s Foreign Malign Influence Center (FMIC) would be significantly reduced. Gabbard has thus dismantled the last remaining U.S. federal government organ dedicated to tracking and analyzing state-sponsored efforts to interfere in U.S. institutions, elections, and society – following the Trump administration’s shutting down of related units at the State Department, Department of Homeland Security, FBI, and Department of Justice earlier this year.

    • Read more
  • Silencing America’s Voice

    The Trump administration has taken a series of steps which have substantially weakened U.S. government-funded media outlets whose task it was to tell the American story and counter the global propaganda and disinformation efforts of U.S. adversaries. These moves greatly benefit the anti-American propaganda efforts of Russia and China, which will now go unchallenged.

    • Read more
  • Australia’s Deepfake Dilemma and the Danish Solution

    Countries need to move beyond simply pleading with internet platforms for better content moderation and instead implement new legal frameworks that empower citizens directly. For a model of how to achieve this, policymakers should look to the innovative legal thinking emerging from Denmark.

    • Read more
  • Microsoft Failed to Disclose Key Details About Use of China-Based Engineers in U.S. Defense Work, Record Shows

    The tech giant is required to regularly provide U.S. officials with its plan for keeping government data safe from hacking. Yet a copy of Microsoft’s security plan obtained by ProPublica makes no reference to the company’s China-based operations.

    • Read more
  • Israel Secretly Recruited Iranian Dissidents to Attack Their Country from Within

    The Mossad made Iran its top priority in 1993 after Israelis and Palestinians signed the Oslo Accords on the White House lawn, seemingly ending decades of conflict. The main goal of Israel’s focus on Iran: To protect Israel’s nuclear monopoly in the region.

    • Read more
  • Microsoft Used China-Based Engineers to Support Product Recently Hacked by China

    Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in its popular SharePoint software but didn’t mention that it has long used China-based engineers to maintain the product.

    • Read more
  • The Taiwan Scenarios 2: Warning Signs

    At first, it may not be easy to see what’s afoot. The difference between China’s routine coercion of Taiwan and early signs of serious escalation to take control of the island may not be clear.

    • Read more
  • Congress Has a Chequered History of Overseeing U.S. Intelligence and National Security

    The role of Congress is to conduct oversight. It is the role of the governing administration to keep Congress informed of intelligence matters, particularly covert operations. History shows this has often been hard to achieve.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • North Korean state hackers seen using Medusa ransomware in attacks on US, Middle East
  • UL Solutions withdraws as lead admin for FCC cyber label program amid probe into China ties
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • White House forms emergency team to deal with China espionage hack
  • U.S. government unveils charges against Iranians who hacked into Trump 2024 campaign
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • FBI says Iran sent hacked Trump info to Biden campaign staffers
  • China select committee urges DHS to ‘aggressively’ enforce UFLPA
  • Chinese hackers nab 60,000 emails in State Department breach
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Allfare: China’s Whole-of-Nation Strategy

    To analyze how states exert their influence, scholars often compartmentalize actions into rigid analytical frameworks, which obscures the holistic scope of the challenge.

    • Read more
  • France Strikes to Address Misinformation Weakening Western Alliance

    The key destabilizing feature of today’s information environment is no longer simply that democracies are targeted by adversaries’ misinformation and disinformation. Increasingly, the danger is coming from uninhibited partners in the allied ecosystem itself.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies