Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Espionage

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Former FBI Informant Pleads Guilty to Fabricating Biden Bribery Story

    Alexander Smirnov, a former FBI informant, pleaded guilty Monday in Los Angeles federal court to faking the story about a phony bribery scheme involving President Joe Biden and his son Hunter. The fabricated story was the central element of a House impeachment inquiry.

    • Read more
  • What is Salt Typhoon? A Security Expert Explains the Chinese Hackers and Their Aattack on U.S. Telecommunications Networks

    Lost in the noise of the story is that Salt Typhoon has proved that the decades of warnings by the internet security community were correct. No mandated secret or proprietary access to technology products is likely to remain undiscovered or used only by “the good guys” – and efforts to require them are likely to backfire.

    • Read more
  • Chinese Hackers Still Lurk in U.S. Telecommunications systems

    Chinese hackers blamed for compromising U.S. telecommunications infrastructure and spying on American presidential campaigns and American officials are still entrenched in those systems.

    • Read more
  • Protecting U.S. Allies and Partners from Chinese Economic Coercion

    China’s growing willingness to defy the international order, and its increasingly aggressive leadership, have led it to increasingly utilize economic coercion against countries it believes have defied China’s interests. This coercion can be powerful, and the United States and its partners have not been well-prepared for Beijing’s actions. The U.S. and others need to develop a response immediately.

    • Read more
  • Chinese Vessel Suspected of Severing Submarine Cables Still Anchored in Baltic Sea

    European allies in the Baltic region are investigating how two fiber-optic data cables were severed earlier this week, with suspicion falling on a Chinese vessel in the area. Germany has said the incident was clearly sabotage.

    • Read more
  • Downsides of China’s Port Investments Go Beyond Immediate Security Risks

    Chinese companies own or operate at least one port on every continent. These investments present more than immediate security concerns; they position China to fully exploit the economic potential of ports at the expense of other countries.

    • Read more
  • Suspected Chinese Hack of U.S. Telecoms Reveals Broader Plot

    A hack of U.S. telecommunications systems linked to China that initially appeared to focus on the American presidential campaigns goes much deeper, according to investigators, and is likely part of a vast effort by Beijing to spy on the United States.

    • Read more
  • FBI: Bomb Threats Against U.S. Voting Locations Appear to Be Coming from Russia

    A series of bomb threats sent to polling locations across the United States appears to be coming from Russia, according to new assessments from both federal and state officials.

    • Read more
  • Russian Disinformation Campaign Creates 'Climate of Chaos,' Say Experts

    In the last two years, Russian agents have created  fake websites which are employed in a “persistent” disinformation campaign. The Russian agents are creating false news websites that mimic reputable sources and posting fake stories to those phony sites. The websites may look like trusted European media outlets but in fact mislead readers with malicious stories and propaganda.

    • Read more
  • Understanding the Threats to U.S. Election Security in 2024

    Despite widespread concern that foreign interference and generative AI would pose major threats to the 2024 election, the greatest risks emanate from rising domestic extremists and diminishing domestic trust.

    • Read more
  • Concerns about Elon Musk, Russia's Putin Not Fading Yet

    Reports that billionaire Elon Musk has been talking on a consistent basis with Russian President Vladimir Putin are cause of concern. Musk’s companies are doing work for the Pentagon NASA. Some of that work is so sensitive that Musk has been given high-level security clearances due to his knowledge of the programs, raising concerns among some that top secret U.S. information and capabilities could be at risk.

    • Read more
  • U.S. Finalizes Rule Restricting Investment in Chinese Tech Firms

    The Treasury Department on Monday finalized a new rule meant to prevent U.S.-based people and companies from investing in the development of a range of advanced technologies in China, thereby preventing Beijing from accessing cutting-edge expertise and equipment.

    • Read more
  • U.S. Officials Say Russia Behind Fake Video of Pro-Trump Votes Being Destroyed

    Russia, as part of its broad influence campaign to help Donald Trump win the November election, has released a fake video, which has been circulating on social media, purporting to show the destruction of mail-in votes cast for Trump in Pennsylvania. The fake video is the latest in a series of fake videos produced by an offshoot of the St. Petersburg-based Internet Research Agency, which helped Trump win the 2016 election.

    • Read more
  • How Is the Kremlin Meddling In 2024 Elections? Here Are 5 Tactics.

    Russia’s Plan A is always to cooperate with mainstream forces and then corrupt them to align with Russian foreign policy interests. In Plan A fails, Russia falls back on Plan B, which is aligning with far-right parties -– but, at times, even forming alliances with far-left parties. For the Kremlin, the cheapest and most efficient way of boosting its allies is to flood the market with disinformation.

    • Read more
  • Salt Typhoon Hack Shows There's No Security Backdoor That's Only for The "Good Guys"

    If U.S. policymakers care about China and other foreign countries engaging in espionage on U.S. citizens, it’s time to speak up in favor of encryption by default. If these policymakers don’t want to see bad actors take advantage of their constituents, domestic companies, or security agencies, again—they should speak up for encryption by default.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • White House forms emergency team to deal with China espionage hack
  • U.S. government unveils charges against Iranians who hacked into Trump 2024 campaign
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • FBI says Iran sent hacked Trump info to Biden campaign staffers
  • China select committee urges DHS to ‘aggressively’ enforce UFLPA
  • Chinese hackers nab 60,000 emails in State Department breach
  • CIA’s AI director says the new tech is our biggest threat, and resource
  • Aimed at Protests, Surveillance Contractor’s New Owners Expand Spy Tech Portfolio
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Kinetic Operations Bring Authoritarian Violence to Democratic Streets

    Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.

    • Read more
  • Romania, Foreign Election Interference, and a Dangerous U.S. Retreat

    The Romanian election is but one example of recent foreign election interference incidents. The Russian interference in 2016 U.S. election led Congress, on bipartisan basis, and the relevant agencies in the executive branch, to make many changes to address this threat, but under the new administration, “the U.S. is now moving full steam ahead to completely destroy its defenses against that threat,” Katie Kedian writes. All of the positive U.S. government developments “have been dismantled or severely downgraded,” leaving “the U.S. public less informed and less safe from foreign interference.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies