Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Espionage

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • U.S. Election: Turning Off TikTok Is a Big Risk for the Democrats

    Popular social media platform TikTok stands accused of holding US data in China, fostering censorship, and spreading disinformation. Its popularity poses a dilemma for US politicians, but especially Democrats who have heavily relied on the app to reach its core base of young voters.

    • Read more
  • Owners of China-Based Company Charged with Conspiracy to Send Trade Secrets Belonging to Leading U.S.-Based Electric Vehicle Company

    Defendants allegedly conspired to send millions of dollars-worth of trade secrets to undercover law enforcement officers posing as potential customers.

    • Read more
  • Russia Steps Up Spy War on West

    Russia has successfully relaunched its spy operations against the West after hundreds of its operatives were ejected following Moscow’s 2022 invasion of Ukraine, according to analysts. They warn that the Kremlin is using a network of proxies to infiltrate European nations and carry out a range of intelligence operations.

    • Read more
  • Artificial Intelligence Is Game Changer for Election Interference: FBI

    U.S. security officials are bracing for an onslaught of fast-paced influence operations, from a wide range of adversaries, aimed at impacting the country’s coming presidential election. FBI Director Christopher Wray issued the latest warning in a meeting with security professional Thursday, saying that technologies such as artificial intelligence are already altering the threat landscape.

    • Read more
  • Last of the ‘True Believers’ or Harbinger? Ana Montes and the Future of Espionage Against the West

    Ana Montes was U.S. Intelligence’s ‘Queen of Cuba’. The Defense Intelligence Agency’s leading Central America analyst; go-to voice on Cuban intentions and capabilities; eldest daughter of a family dedicated to U.S. government service. She was also a Cuban spy her entire professional life. She was a ’True Believer’ –motivated not by material rewards but by commitment to Castro’s revolution and opposition to U.S. policy in Latin America.

    • Read more
  • Research Espionage Is a Real Threat – but a Drastic Crackdown Could Stifle Vital International Collaboration

    In 2024, China is a peer of the US in research and knowledge creation. We must be clear-eyed about threats to “research security”. But a one-eyed focus on China, and adopting a simplistic and heavy-handed approach to managing these threats, will only leave us worse off.

    • Read more
  • How You Can Tell Propaganda from Journalism − Let’s Look at Tucker Carlson’s Visit to Russia

    In the 1930s, the New York Times’s Moscow bureau chief Walter Duranty wrote glowing reports about the achievements of the Soviet state while ignoring the Stalin dictatorship’s starvation of millions of Ukrainians. These days, conservative TV personality and former Fox News star Tucker Carlson is providing Vladimir Putin and his regime propaganda services similar to those Duranty offered Stalin – except that Carlson goes farther: narrating a series of reports extolling the glories of Russian society, culture, and governance under Putin, Carlson said that these achievements “radicalized” him “against our American leaders.”

    • Read more
  • Cybersecurity for Satellites Is a Growing challenge, as Threats to Space-Based Infrastructure Grow

    In today’s interconnected world, space technology forms the backbone of our global communication, navigation and security systems. As our dependency on these celestial guardians escalates, so too does their allure to adversaries who may seek to compromise their functionality through cyber means.

    • Read more
  • The List Is Long: Russians Who Have Died After Running Afoul of the Kremlin

    The list of influential Russians who have been killed or died in murky circumstances after opposing, criticizing, or crossing Russian President Vladimir Putin, the Kremlin, or the state is long. It has just gotten longer.

    • Read more
  • Has Trust in the U.S. Intelligence Community Eroded?

    Has trust in intelligence predictions and national estimates been degraded over time? If so, to what degree has trust been degraded? What internal and external factors have driven perceived or real changes in the relationship between policymakers and the IC?

    • Read more
  • Feds Deliver Stark Warnings to State Election Officials Ahead of November

    Federal law enforcement and cybersecurity officials are warning the nation’s state election administrators that they face serious threats ahead of November’s presidential election, as AI, ransomware attacks, and malicious mail could disrupt voting.

    • Read more
  • Social Media Posts Have Power, and So Do You

    In a healthy democracy, having accurate information is crucial for making informed decisions about voting and civic engagement. False and misleading information can lead to knowledge that is inaccurate, incomplete, or manipulated. Such knowledge can erode trust in democratic institutions and contribute to divisions within society. Fortunately, the ability to identify and resist false and misleading information is not static, because this ability relies on skills that can be learned.

    • Read more
  • U.S. Disrupts Botnet China Used to Conceal Hacking of Critical Infrastructure

    In December 2023, the FBI disrupted a botnet of hundreds of U.S.-based small office/home office (SOHO) routers hijacked by People’s Republic of China (PRC) state-sponsored hackers. The Chinese government hackers used privately-owned SOHO routers infected with the “KV Botnet” malware to conceal the PRC origin of further hacking activities directed against U.S. critical infrastructure and the critical infrastructure of other foreign victims.

    • Read more
  • Fake Biden Robocall to New Hampshire Voters Highlights How Easy It Is to Make Deepfakes − and How Hard It Is to Defend Against AI-Generated Disinformation

    Robocalls in elections are nothing new and not illegal; many are simply efforts to get out the vote. But they have also been used in voter suppression campaigns. Compounding this problem in this case is what I believe to be the application of AI to clone Biden’s voice.

    • Read more
  • The Spies Should Go Back into the Cold

    Recent Russian efforts to interfere in US elections, track down and eliminate defectors and other ‘disloyal elements’, and plant disinformation using social media are nothing new. Rather, they are the continuation by modern means of an intelligence war that has been going on since 1917. Following the end of the two world wars and the Cold War, the US and the UK reduced their intelligence capacity when they should have been countercyclical, gearing up for the inevitable next intelligence challenge.

    • Read more
  • « first
  • ‹ previous
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • White House forms emergency team to deal with China espionage hack
  • U.S. government unveils charges against Iranians who hacked into Trump 2024 campaign
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • FBI says Iran sent hacked Trump info to Biden campaign staffers
  • China select committee urges DHS to ‘aggressively’ enforce UFLPA
  • Chinese hackers nab 60,000 emails in State Department breach
  • CIA’s AI director says the new tech is our biggest threat, and resource
  • Aimed at Protests, Surveillance Contractor’s New Owners Expand Spy Tech Portfolio
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Kinetic Operations Bring Authoritarian Violence to Democratic Streets

    Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.

    • Read more
  • Romania, Foreign Election Interference, and a Dangerous U.S. Retreat

    The Romanian election is but one example of recent foreign election interference incidents. The Russian interference in 2016 U.S. election led Congress, on bipartisan basis, and the relevant agencies in the executive branch, to make many changes to address this threat, but under the new administration, “the U.S. is now moving full steam ahead to completely destroy its defenses against that threat,” Katie Kedian writes. All of the positive U.S. government developments “have been dismantled or severely downgraded,” leaving “the U.S. public less informed and less safe from foreign interference.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies