Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Espionage

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Who Was Lee Harvey Oswald?

    Fifty-nine years ago yesterday, 22 November, President John F. Kennedy was assassinated in Dallas, Texas. The shooter, Lee Harvey Oswald, was himself killed two days later in a Dallas police station by Jack Ruby, a local nightclub owner. A new book by Paul Gregory, a fellow at Stanford University’s Hoover Institution, recounts the author’s experiences knowing Oswald.

    • Read more
  • American Investor Known for Russian Nightclub Died of “Blunt Force Injuries” Due to Fall

    An American stockbroker who made a fortune in the Russian market in the 1990s and 2000s and later co-founded a posh Moscow nightclub before leaving the country died of blunt force injuries suffered as a result of a fall from a Washington, D.C. building.

    • Read more
  • Germany’s China Policy: Has It Learned from Its Dependency on Russia?

    The German economy remains heavily dependent on China, its largest trading partner, despite mounting geopolitical tensions between the West and Beijing.

    • Read more
  • FBI Says It has ‘National Security Concerns’ About TikTok

    FBI Director Christopher Wray said on Tuesday that the bureau has “national security concerns” about popular short-form video hosting app TikTok. The FBI’s concerns about TikTok include “the possibility that the Chinese government could use it to control data collection on millions of users.”

    • Read more
  • Three Charged with Giving Secrets to China, and Selling DOD Chinese-Origin Rare Earth Magnets

    DOJ charged three residents of Kentucky and Indiana with sending technical military data drawings to China, and then unlawfully supplying the U.S. Department of Defense with Chinese-origin rare earth magnets for aviation systems and military items.

    • Read more
  • How Foreign Intelligence Services Compromise, Exploit U.S. Technology

    Foreign intelligence services have intensified their efforts to compromise or exploit U.S. technology. A new report analyzes foreign collection attempts to obtain unauthorized access to sensitive or classified information and technology.

    • Read more
  • Reports of China's Overseas 'Police Stations' Spark Controversy

    Recent allegations of China operating 54 overseas “police stations” to pressure its citizens — including dissidents — to return home have sparked controversy and led to a number of investigations into their activities across Europe and North America.

    • Read more
  • German Ministry Seeks to Block Chinese Chip Factory Takeover

    German Economy Minister Robert Habeck wants to stop the sale of a chip production plant to a Chinese investor. The Green Party politician has expressed concern about giving China control over key infrastructure.

    • Read more
  • How China’s Military Plugs into the Global Space Sector

    China is using seemingly civilian and academic Chinese research institutions to advance its military goals in space. International organizations like the International GNSS Service need to be aware that even overtly civilian entities can be intertwined with the Chinese military. Collaboration with high-risk Chinese institutions must be done with extreme care to ensure data and products intended to support international science and commerce are not redirected towards unwanted military uses.

    • Read more
  • U.S. Charges Chinese Spies in Huawei case

    Prosecutors allege that Chinese spies were foiled by a double agent. The U.S. Justice Department says China is trying to undermine the U.S. judicial system.

    • Read more
  • Russia Working Hard to Acquire Sensitive Western Military Technology

    Russia has struggled for years, if not decades, to acquire sensitive Western technology and military hardware: everything from night-vision goggles for soldiers to powerful computer chips for advanced fighter jets. How successful the effort has been is an open question, but according to news reports and military analysts, sensitive Western technologies are widely employed in Russian weaponry and military equipment.

    • Read more
  • Washington Raises Stakes in War on Chinese Technology

    The Biden administration is expanding its list of technology-focused sanctions on China, drawing parallels to U.S. controls targeting the Soviet Union during the Cold War – and the new U.S. sanctions are in some ways more restrictive than Cold-War era controls.

    • Read more
  • China’s Challenge: Why the West Should Fear President Xi’s Quest to “Catch and Surpass It’ with Technology

    Beijing’s bid for technological dominance is a threat to global security and liberty. The Western democracies must not shirk the task of confronting it.

    • Read more
  • China Faces Major Challenges in Achieving Goal of Global Technological Pre-Eminence

    China has overtaken the United States to top the world in the number of high-quality scientific papers it is producing, and there has been a marked improvement in the quality of China’s scientific and technological development over the past two decades. But at the same time, China has attempted to become fully self-sufficient in core technologies – a policy which is creating its own dilemma: The more the Chinese leadership promotes self-sufficiency, the harder it will be to maintain an open-door policy—and to realize its dream of becoming a science and technology great power.

    • Read more
  • Ukraine Warns of Looming Russian Cyberattacks

    Ukraine is again urging its companies and private organizations to immediately bolster their cybersecurity ahead of what could be a new wave of Russian attacks. The government advisory further warned that the vulnerabilities could allow Russia to launch a renewed series of targeted cyberattacks on Ukraine aimed at disabling communication and information systems.

    • Read more
  • « first
  • ‹ previous
  • …
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • White House forms emergency team to deal with China espionage hack
  • U.S. government unveils charges against Iranians who hacked into Trump 2024 campaign
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • FBI says Iran sent hacked Trump info to Biden campaign staffers
  • China select committee urges DHS to ‘aggressively’ enforce UFLPA
  • Chinese hackers nab 60,000 emails in State Department breach
  • CIA’s AI director says the new tech is our biggest threat, and resource
  • Aimed at Protests, Surveillance Contractor’s New Owners Expand Spy Tech Portfolio
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Kinetic Operations Bring Authoritarian Violence to Democratic Streets

    Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.

    • Read more
  • Romania, Foreign Election Interference, and a Dangerous U.S. Retreat

    The Romanian election is but one example of recent foreign election interference incidents. The Russian interference in 2016 U.S. election led Congress, on bipartisan basis, and the relevant agencies in the executive branch, to make many changes to address this threat, but under the new administration, “the U.S. is now moving full steam ahead to completely destroy its defenses against that threat,” Katie Kedian writes. All of the positive U.S. government developments “have been dismantled or severely downgraded,” leaving “the U.S. public less informed and less safe from foreign interference.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies