Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Espionage

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Poisoning Critics: The Kremlin's Preferred Method of Dealing with Dissidents By Monir Ghaedi

    A recent report indicates the Kremlin might be responsible for the poisoning of Russian journalists in exile. The cases appear to fit into a broader pattern of targeting dissidents: these recent poisonings are but the latest in a series of poisonings targeting Kremlin opponents and critics. Poison has long been a weapon used by security services in Russia to silence prominent political dissidents.

    • Read more
  • Cyber-Attacks Against the U.K. Electoral Commission Reveal an Ongoing Threat to Democracy

    The revelations this month that data on 40 million UK voters had been exposed to hackers came as no surprise to many cybersecurity experts, who have long pointed out the vulnerability of democracies to malicious online interference. The attack reflects the serious and ongoing threat to democracies posed by cyber-interference from foreign nations and criminal organizations.

    • Read more
  • What Is Most Likely Going on in Area 51? A National Security Historian Explains Why You Won’t Find Aliens There

    One of the reasons people can never be entirely sure about what is going on at Area 51 is that it is a highly classified secret military facility. It was not until 2013 that the U.S. government even acknowledged the existence and name “Area 51.” As a national security historian, I know there’s a long history of secrets at Area 51. I also know that none of those secrets have anything to do with space aliens.

    • Read more
  • China Courts Germany's Far-Right Populist AfD, Now Polling at Above 20%

    As is the case with other far-right populist parties in Europe, the Alternative for Germany (AfD) party rejects a values-based foreign policy, just as much as it opposes NATO and the U.S. That approach has attracted the attention of Beijing.

    • Read more
  • Lessons for Today’s Cold War 2.0 with Russia, China

    The decades-long battle between Western intelligence services and the Soviet Union offers important lessons for the ongoing national security threat posed by Russia and China. Intelligence expert says both seek to topple U.S. from atop world stage, with Beijing’s blend of money, influence, all-hands-on-deck approach posing bigger threat.

    • Read more
  • New Cipher System Protects Computers Against Spy Programs

    Researchers have achieved a breakthrough in computer security with the development of a new and highly efficient cipher for cache randomization. The innovative cipher addresses the threat of cache side-channel attacks, offering enhanced security and exceptional performance.

    • Read more
  • Crashed UFOs? Non-Human “Biologics”? Professor Asks: Where’s the Evidence?

    Congressional testimony this week about reverse engineering from crashed UFOs and the recovery of non-human “biologics” sounds like science fiction. And that’s the realm in which it will remain unless scientific and other hard evidence enters the picture, says an expert.

    • Read more
  • De-Risking Authoritarian AI

    You may not be interested in artificial intelligence, but it is interested in you. AI-enabled systems make many invisible decisions affecting our health, safety and wealth. They shape what we see, think, feel and choose, they calculate our access to financial benefits as well as our transgressions. In a technology-enabled world, opportunities for remote, large-scale foreign interference, espionage and sabotage —via internet and software updates—exist at a ‘scale and reach that is unprecedented’.

    • Read more
  • China’s Cyber Interference and Transnational Crime Groups in Southeast Asia

    The Chinese Communist Party has a long history of engagement with criminal organizations and proxies to achieve its strategic objectives. This activity involves the Chinese government’s spreading of influence and disinformation campaigns using fake personas and inauthentic accounts on social media that are linked to transnational criminal organizations.

    • Read more
  • Not the X-Files: Where Are Unidentified Aerial Phenomena Sightings in the United States?

    The February 2023 Chinese surveillance balloon incident raised questions about the degree to which the U.S. government knows who is flying what over its skies. Public reporting of unidentified aerial phenomena may help officials identify potential threats.

    • Read more
  • How an “AI-tocracy” Emerges

    Many scholars, analysts, and other observers have suggested that resistance to innovation is an Achilles’ heel of authoritarian regimes. But in China, the use of AI-driven facial recognition helps the regime repress dissent while enhancing the technology, researchers report.

    • Read more
  • Chinese Intelligence-Linked Hackers Targeted U.S. Government Agencies in Microsoft Hack

    Hackers linked to China’s intelligence agencies, are behind a monthlong campaign that breached some unclassified U.S. email systems, allowing them to access to a small number of accounts at the U.S. State Department and a handful of other organizations.

    • Read more
  • Outlaw Alliance: How China and Chinese Mafias Overseas Protect Each Other’s Interests

    The rise of Chinese organized crime in Europe highlights its ties to the Chinese state, national security officials say. Recent cases show the suspected role of mobsters in Beijing’s campaign to repress diaspora communities and amass influence.

    • Read more
  • Maryland Think Tank Co-Director Charged for Acting as an Agent for China, Iran

    Gal Luft, a dual U.S.-Israeli citizen, allegedly evaded FARA registration while working to advance the interests of China in the United States and seeking to broker the illicit sales of Chinese-manufactured weapons to several countries, and the sale of Iranian oil to China.

    • Read more
  • Winning the 21st-Century Intelligence Contest

    The conduct of intelligence activities is inherently a strategic dynamic between rival actors simultaneously playing offence and defense. Analogies with war, sporting contests and competition abound. The prize for a nation’s leadership? Holding an advantage in decision-making and action.

    • Read more
  • « first
  • ‹ previous
  • …
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • White House forms emergency team to deal with China espionage hack
  • U.S. government unveils charges against Iranians who hacked into Trump 2024 campaign
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • FBI says Iran sent hacked Trump info to Biden campaign staffers
  • China select committee urges DHS to ‘aggressively’ enforce UFLPA
  • Chinese hackers nab 60,000 emails in State Department breach
  • CIA’s AI director says the new tech is our biggest threat, and resource
  • Aimed at Protests, Surveillance Contractor’s New Owners Expand Spy Tech Portfolio
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Kinetic Operations Bring Authoritarian Violence to Democratic Streets

    Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.

    • Read more
  • Romania, Foreign Election Interference, and a Dangerous U.S. Retreat

    The Romanian election is but one example of recent foreign election interference incidents. The Russian interference in 2016 U.S. election led Congress, on bipartisan basis, and the relevant agencies in the executive branch, to make many changes to address this threat, but under the new administration, “the U.S. is now moving full steam ahead to completely destroy its defenses against that threat,” Katie Kedian writes. All of the positive U.S. government developments “have been dismantled or severely downgraded,” leaving “the U.S. public less informed and less safe from foreign interference.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies