Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Espionage

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Kinetic Operations Bring Authoritarian Violence to Democratic Streets

    Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.

    • Read more
  • Defending American Interests Abroad

    Overseas malign information operations by foreign actors seek to undermine the strategic interests of the United States. These operations are intended to manipulate the global information environment for geostrategic purposes by disseminating false or misleading information to shape narratives, shift public discourse, and undermine other nations’ national security.

    • Read more
  • Declassified JFK Files Provide “Enhanced Clarity on CIA Actions, Historian Says

    Fredrik Logevall, Pulitzer winner writing three-volume Kennedy biography, shares takeaways from declassified docs.

    • Read more
  • To Fight Disinformation, Treat It as an Insurgency

    Today, state purveyors of disinformation operate in an environment more susceptible to their tactics than at any moment since the end of World War II. Such infiltrations by our adversaries pose significant risks to both strategic competition and the digital health of future generations.

    • Read more
  • Foreign Influence in Higher Ed Addressed in Expanded Oversight Bill

    The DETERRENT Act is billed –and its acronym derived from –as “defending education transparency and ending rogue regimes engaging in nefarious transactions.” It aims to increase transparency and tighten  foreign gift reporting requirements for higher education institutions. The top three countries in giving in 2024 were Qatar ($342.8 million), China ($176.6 million) and Saudi Arabia ($175.2 million).

    • Read more
  • Understanding Russian Hybrid Warfare Elections in Moldova and Georgia

    While most Americans would be hard pressed to locate Moldova or Georgia on a map, these elections serve as a lesson in how Russia employs hybrid warfare to undermine U.S. security and advance Russia’s interests globally.

    • Read more
  • South Korea Has Acted Decisively on DeepSeek. Other Countries Must Stop Hesitating

    South Korea has suspended new downloads of DeepSeek, and it was right to do so. Chinese tech firms operate under the shadow of state influence, misusing data for surveillance and geopolitical advantage. Any country that values its data and sovereignty must watch this national security threat and take note of South Korea’s response.

    • Read more
  • Bill Introduced to Ban Student Visas to Chinese Nationals

    U.S. Rep. Riley Moore, R-WV, filed a bill on Friday to ban Chinese nationals from receiving student visas. “Every year we allow nearly 300,000 Chinese nationals to come to the U.S. on student visas. We’ve literally invited the CCP to spy on our military, steal our intellectual property, and threaten national security,” he said.

    • Read more
  • Trump Is Giving Russian Cyber Ops a Free Pass – and Putting Western Democracy on the Line

    Secretary of Defense Pete Hegseth last weekend announced that the U.S. will halt all offensive cyber operations –and planning for such operations –against Russia. The Kremlin has long sought to sow chaos in the United States and other democracies by using “information confrontation.” That job just got a lot easier.

    • Read more
  • In Case We Forgot, Typhoon Attacks Remind Us of China’s Cyber Capability—and Intent

    The Salt Typhoon incident reminds us that China has the intent, and increasingly the capability, to seriously challenge US and Western technology advantage.

    • Read more
  • Concern Grows in Washington, Seoul about China's Disinformation Campaign

    South Korean President Yoon Suk Yeol in the closing statements of his impeachment trial this week said that a Chinese-backed disinformation campaign is threatening South Korea’s democracy. The United States has acknowledged Beijing’s global disinformation campaign amid growing concerns in Seoul and Washington about China’s alleged interference in South Korean politics and elections.

    • Read more
  • Election Officials Blast Trump’s “Retreat” from Protecting Voting Against Foreign Threats

    The Trump administration has begun dismantling the nation’s defenses against foreign interference in voting, a sweeping retreat that has alarmed state and local election officials. The administration is shuttering the FBI’s Foreign Influence Task Force and last week cut more than 100 positions at the U.S. Cybersecurity and Infrastructure Security Agency.

    • Read more
  • Economic Cyberespionage: A Persistent and Invisible Threat

    Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.

    • Read more
  • Democracies Should Learn the TikTok Lesson and Restrict Risky Apps from Day One

    With its recent halt on implementing a legally mandated ban on TikTok, the United States is learning the hard way that when it comes to Chinese technology, an ounce of prevention is worth a pound of cure.

    • Read more
  • McConnell’s Comments on Gabbard Nomination

    “The nation should not have to worry that the intelligence assessments the President receives are tainted by a Director of National Intelligence with a history of alarming lapses in judgment,” Senator Mitch McConnell (R-KY) said. “Tulsi Gabbard failed to demonstrate that she is prepared to assume this tremendous national trust.”

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • White House forms emergency team to deal with China espionage hack
  • U.S. government unveils charges against Iranians who hacked into Trump 2024 campaign
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • FBI says Iran sent hacked Trump info to Biden campaign staffers
  • China select committee urges DHS to ‘aggressively’ enforce UFLPA
  • Chinese hackers nab 60,000 emails in State Department breach
  • CIA’s AI director says the new tech is our biggest threat, and resource
  • Aimed at Protests, Surveillance Contractor’s New Owners Expand Spy Tech Portfolio
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Kinetic Operations Bring Authoritarian Violence to Democratic Streets

    Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.

    • Read more
  • Romania, Foreign Election Interference, and a Dangerous U.S. Retreat

    The Romanian election is but one example of recent foreign election interference incidents. The Russian interference in 2016 U.S. election led Congress, on bipartisan basis, and the relevant agencies in the executive branch, to make many changes to address this threat, but under the new administration, “the U.S. is now moving full steam ahead to completely destroy its defenses against that threat,” Katie Kedian writes. All of the positive U.S. government developments “have been dismantled or severely downgraded,” leaving “the U.S. public less informed and less safe from foreign interference.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies