Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Espionage

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Is DOGE a Cybersecurity Threat? Explaining the Dangers of Violating Protocols and Regulations That Protect Government Computer Systems

    Teams from the Department of Government Efficiency (DOGE) are dropping into federal agencies with a practically unlimited mandate to reform the federal government in accordance with recent executive orders. As a 30-year cybersecurity veteran, I find the activities of DOGE thus far concerning. Its broad mandate across government, seemingly nonexistent oversight, and the apparent lack of operational competence of its employees have demonstrated that DOGE could create conditions that are ideal for cybersecurity or data privacy incidents that affect the entire nation.

    • Read more
  • Channeling Frustrations: Russian and Chinese Messaging Exploit the US-Panama Canal Dispute

    Russian and Chinese messaging underscores a strategic effort to reshape global perceptions of the United States. Moscow and Beijing seek to erode Washington’s international credibility, particularly in Latin America.

    • Read more
  • China’s DeepSee Has Close Ties to Beijing

    Rising AI star DeepSeek has close ties to the Chinese government that could explain its rapid progress from a 1 million yuan (US$138,000) startup in 2023 to a major global challenger in the industry, according to a recent investigation by RFA Cantonese. Founder Liang Wenfeng recently met with Premier Li Qiang to comment on his annual work report.

    • Read more
  • DeepSeek: How a Small Chinese AI Company Is Shaking Up U.S. Tech Heavyweights

    For consumers, access to AI may also become cheaper. For researchers who already have a lot of resources, more efficiency may have less of an effect. It is unclear whether DeepSeek’s approach will help to make models with better performance overall, or simply models that are more efficient.

    • Read more
  • DeepSeek Shatters Beliefs About the Cost of AI, Leaving U.S. Tech Giants Reeling

    Society may benefit from less computationally intensive, and therefore more energy-efficient, AI. However, the geopolitical risk of a single country capturing the market, together with concerns about data privacy, intellectual property and censorship may outweigh the benefits.

    • Read more
  • Treasury Sanctions Company, Hacker Associated with Salt Typhoon

    The Department of the Treasury has sanctioned a Chinese national and a Chinese company for their direct involvement in the Salt Typhoon cyber group, which recently compromised the network infrastructure of multiple major U.S. telecommunication and internet service provider companies.

    • Read more
  • A Russian Airline Bomb Plot? What We Know About the Polish PM's Accusations

    The accusation was as blunt as it was serious: Russia is plotting terror attacks against unspecified targets utilizing aircraft, Poland’s prime minister said. Though shocking, the Polish leader’s comments were not out of the blue: there’s been a growing number of suspicious, alarming, and unexplained incidents in recent months.

    • Read more
  • U.S. Representative Who Backed Aid to Ukraine Removed from Committee Chairmanship

    U.S. House Speaker Mike Johnson has removed the chairman of the powerful House Intelligence Committee who has been an outspoken supporter of assistance for Ukraine.

    • Read more
  • U-M Ends Partnership with Chinese University

    The University of Michigan has announced it will end its Joint Institute with Chinese Shanghai Jiao Tong University, following growing concerns from lawmakers about national security.

    • Read more
  • Baltic Subsea Sabotage: China Gets Away with Non-cooperation

    On Christmas Day, one of two cables connecting Finland’s electricity grid to Estonia, Latvia and Lithuania was cut. Four data cables—three linking Finland and Estonia and one between Finland and Germany—were broken at the same time. This and two earlier instances have heightened concerns about the vulnerability of Europe’s undersea infrastructure.

    • Read more
  • The World’s Most Bizarre Secret Weapons: How Pigeons, Cats, Whales and Even Robotic Catfish Have Acted as Spies Through the Ages

    The death of a spy is rarely newsworthy, but when a white beluga whale suspected of spying for Moscow was found dead in Norwegian waters in September, the animal soon became a minor celebrity. The whale is one in a long line of animals which have been used by the intelligence services.

    • Read more
  • U.S. Slow to React to Pervasive Chinese Hacking: Experts

    As new potential threats from Chinese hackers were identified this week, the federal government issued one of its strongest warnings to date about the need for Americans —and in particular government officials and other “highly targeted” individuals —to secure their communications against eavesdropping and interception.

    • Read more
  • China-Based Hacker Conspired to Develop and Deploy Malware That Exploited Tens of Thousands of Firewalls Worldwide

    Chinese hacker and his co-conspirators worked at the offices of Sichuan Silence Information Technology Co. Ltd. to discover and exploit a previously-unknown vulnerability (an “0-day” vulnerability) in certain firewalls.

    • Read more
  • Interference Interrupted: The US Government’s Strides Defending Against Foreign Threats to the 2024 Election

    Foreign interference in U.S. elections has undoubtedly evolved, becoming more sophisticated and extensive, since Russia’s sweeping operation in 2016. But so have the US government’s strategies to expose, counter, and mitigate these attacks.

    • Read more
  • Rep. Michael McCaul Calls Tulsi Gabbard a “baffling” Pick to Lead Intelligence Community

    The Austin Republican leads the House Foreign Affairs Committee and predicted Gabbard’s nomination would fail in the Senate.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • White House forms emergency team to deal with China espionage hack
  • U.S. government unveils charges against Iranians who hacked into Trump 2024 campaign
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • FBI says Iran sent hacked Trump info to Biden campaign staffers
  • China select committee urges DHS to ‘aggressively’ enforce UFLPA
  • Chinese hackers nab 60,000 emails in State Department breach
  • CIA’s AI director says the new tech is our biggest threat, and resource
  • Aimed at Protests, Surveillance Contractor’s New Owners Expand Spy Tech Portfolio
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Kinetic Operations Bring Authoritarian Violence to Democratic Streets

    Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.

    • Read more
  • Romania, Foreign Election Interference, and a Dangerous U.S. Retreat

    The Romanian election is but one example of recent foreign election interference incidents. The Russian interference in 2016 U.S. election led Congress, on bipartisan basis, and the relevant agencies in the executive branch, to make many changes to address this threat, but under the new administration, “the U.S. is now moving full steam ahead to completely destroy its defenses against that threat,” Katie Kedian writes. All of the positive U.S. government developments “have been dismantled or severely downgraded,” leaving “the U.S. public less informed and less safe from foreign interference.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies