Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Espionage

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • International Partnership Focuses on Insider Threats

    Insider threats can take many forms. They are real, and if not identified, they can be costly and damaging.

    • Read more
  • Fewer U.S. College Students Are Studying a Foreign Language − and That Spells Trouble for National Security

    In 1958, following the Soviet Union’s launch of Sputnik, the National Defense Education Act authorized funding to strengthen U.S. education in language instruction, in addition to math and science. More than six decades later, a new Modern Language Association report is raising concerns about America’s foreign language capabilities anew. Having fewer U.S. college students who learn a foreign language creates greater risks for national security.

    • Read more
  • Want to Prevent Misinformation? Present Data with an Interactive Visual

    Getting readers of a news story interested in numbers can be a challenge. But the benefits of engaging readers in data can lead to a better understanding, preventing misinformation, and misrepresentation in the news. New research explores a solution using interactive data visualization to inform and engage readers.

    • Read more
  • AI Should Be Better Understood and Managed – New Research Warns

    AI and algorithms are not just tools deployed by national security agencies to prevent malicious activity online, but can be contributors to polarization, radicalism and political violence - posing a threat to national security.

    • Read more
  • Study of Wartime Deepfakes Reveals Their Impact on News Media

    Deepfakes are artificially manipulated audio-visual material. A new study, the first empirical analysis of the use of deepfakes in wartime misinformation and propaganda, examined tweets about deepfakes during the Russo-Ukrainian war, demonstrating that deepfakes undermine peoples trust generally in news media.

    • Read more
  • Even War Has Rules, So Why No Rules for Espionage?

    There are even rules for war, which is why it makes little sense that there are none for espionage during times of peace. Espionage is “the second oldest profession,” says one expert, but it is often overlooked at law schools.

    • Read more
  • AI Disinformation Is a Threat to Elections − Learning to Spot Russian, Chinese and Iranian Meddling in Other Countries Can Help the U.S. Prepare for 2024

    Elections around the world are facing an evolving threat from foreign actors, one that involves artificial intelligence. Countries trying to influence each other’s elections entered a new era in 2016, when the Russians launched a series of social media disinformation campaigns targeting the U.S. presidential election. But there is a new element: generative AI and large language models. These have the ability to quickly and easily produce endless reams of text on any topic in any tone from any perspective, thus making generative AI and large language models a tool uniquely suited to internet-era propaganda. The sooner we know what to expect, the better we can deal with what comes.

    • Read more
  • U.S.-China “Tech War”: AI Sparks First Battle in Middle East

    The U.S. has restricted exports of some computer chips to the Middle East, to stop AI-enabling chips from getting to China. But there’s no information on which countries are affected, or how chips would get to China. What is becoming clear is that AI could well become a new source of friction between democratic and autocratic states.

    • Read more
  • Tech War: Is Huawei's New Chip a Threat?

    The US-China chip war is heating up after Huawei launched a new phone featuring technology that Washington was hoping to keep out of China’s reach: China’s largest chipmaker SMIC has surprised the West by creating a homegrown 7nm chip. Will the United States respond with more sanctions?

    • Read more
  • What Might We Learn from the Nijjar Affair and the Breakdown in Canada–India Relations?

    Khalistani activism overseas—not just in Canada, but also in the United Kingdom, United States and Australia—is a major concern for New Delhi, not a marginal one, as some governments might think. And whatever has occurred in this particular case, India has long since shed its earlier adherence to “strategic restraint”: it is clear that India is willing to use force and take risks to defend its interests. Moreover, this muscularity is popular within India and segments of the Indian diaspora overseas.

    • Read more
  • Canada-India Tensions Over Killing of Sikh Separatist: What to Know

    Canada’s stunning allegations of an India-directed plot to kill Sikh separatist Hardeep Singh Nijjar has stirred frictions between two major democracies and raised questions about India’s global actions to protect its interests.  

    • Read more
  • Increase in Chinese-Language Malware Could “Challenge” Russian Dominance of Cybercrime: Report

    For decades, Russian and eastern European hackers have dominated the cybercrime underworld. These days they may face a challenge from a new contender: China. Researchers have detected an increase in the spread of Chinese language malware through email campaigns since early 2023, signaling a surge in Chinese cybercrime activity and a new trend in the global threat landscape.

    • Read more
  • Walking the Artificial Intelligence and National Security Tightrope

    Artificial intelligence (AI) presents nations’ security as many challenges as it does opportunities. While it could create mass-produced malware, lethal autonomous weapons systems, or engineered pathogens, AI solutions could also prove the counter to these threats. Regulating AI to maximize national security capabilities and minimize the risks presented to them will require focus, caution and intent.

    • Read more
  • Deepfake Threats Advisory from NSA, U.S. Federal Agencies

    The National Security Agency (NSA) and U.S. federal agency partners have issued new advice on a synthetic media threat known as deepfakes. This emerging threat could present a cybersecurity challenge for National Security Systems (NSS), the Department of Defense (DoD), and DIB organizations.

    • Read more
  • Apple and Google Are Introducing New Ways to Defeat Cell Site Simulators, But Is it Enough?

    Cell-site simulators (CSS)—also known as IMSI Catchers and Stingrays—are a tool that law enforcement and governments use to track the location of phones, intercept or disrupt communications, spy on foreign governments, or even install malware.

    • Read more
  • « first
  • ‹ previous
  • …
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • White House forms emergency team to deal with China espionage hack
  • U.S. government unveils charges against Iranians who hacked into Trump 2024 campaign
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • FBI says Iran sent hacked Trump info to Biden campaign staffers
  • China select committee urges DHS to ‘aggressively’ enforce UFLPA
  • Chinese hackers nab 60,000 emails in State Department breach
  • CIA’s AI director says the new tech is our biggest threat, and resource
  • Aimed at Protests, Surveillance Contractor’s New Owners Expand Spy Tech Portfolio
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies