Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Espionage

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Fake Biden Robocall to New Hampshire Voters Highlights How Easy It Is to Make Deepfakes − and How Hard It Is to Defend Against AI-Generated Disinformation

    Robocalls in elections are nothing new and not illegal; many are simply efforts to get out the vote. But they have also been used in voter suppression campaigns. Compounding this problem in this case is what I believe to be the application of AI to clone Biden’s voice.

    • Read more
  • The Spies Should Go Back into the Cold

    Recent Russian efforts to interfere in US elections, track down and eliminate defectors and other ‘disloyal elements’, and plant disinformation using social media are nothing new. Rather, they are the continuation by modern means of an intelligence war that has been going on since 1917. Following the end of the two world wars and the Cold War, the US and the UK reduced their intelligence capacity when they should have been countercyclical, gearing up for the inevitable next intelligence challenge.

    • Read more
  • Fifty-Five Hours of Risk: The Dangerous Implications of Slow Attack Attribution

    Assuming that its foreign adversaries’ recent violent threats are to be taken seriously, and that the likelihood of a direct attack against the United States is, if not on the rise, at least significant enough to warrant serious attention, the United States has an urgent mandate to prepare effective cognitive defenses. Foremost among these is the ability to quickly and accurately attribute attacks to their originators, and to deliver that information to the public through a trustworthy vehicle.

    • Read more
  • Cyber 'Kidnapping' Scams Target Chinese Students Around the World

    A recent cyber kidnapping incident involving a Chinese exchange student in Utah appears to be part of an international pattern in which unknown perpetrators, often masquerading as Chinese police or government officials, target Chinese students around the world and extort their families for upwards of tens of thousands of dollars.

    • Read more
  • Congress Bans Pentagon from Using Chinese Port Logistics Platform

    The U.S. Congress has passed legislation that would ban the Pentagon from using any seaport in the world that relies on a Chinese logistics platform known as LOGINK. LOGINK, by tracking cargo and ship movements, lets Beijing monitor America’s military supply chain, which relies on commercial ports.

    • Read more
  • Shadow Play: A Pro-China and Anti-U.S. Influence Operation Thrives on YouTube

    Experts have recently observed a coordinated inauthentic influence campaign originating on YouTube that’s promoting pro-China and anti-US narratives in an apparent effort to shift English-speaking audiences’ views of those countries’ roles in international politics, the global economy and strategic technology competition.

    • Read more
  • A U.S. Ambassador Working for Cuba? Charges Against Former Diplomat Victor Manuel Rocha Spotlight Havana’s Importance in the World of Spying

    The U.S. Department of Justice announced on Dec. 4, 2023, that Victor Manuel Rocha, a former U.S. ambassador to Colombia, had been arrested and faced federal charges for secretly acting for decades as an agent of the Cuban government. It remains to be seen what damage Rocha may have done while working as a Cuban spy. His tenure in the U.S. government, however, would place him right up there with the most successful, and thus damaging, spies in modern history.

    • Read more
  • Responding to Authoritarian Information Ops in Latin America

    The Russian government is currently financing an on-going, well-funded disinformation campaign across Latin America. The Kremlin’s campaign plans to leverage developed media contacts in several Latin American countries in order to carry out an information manipulation campaign designed to surreptitiously exploit the openness of Latin America’s media and information environment.

    • Read more
  • No, Japan Is Not Ready for AUKUS

    It is a natural strategic choice for Japan to join in advanced military technology cooperation under the trilateral Australia-UK-US (AUKUS) agreement – turning the alliance into “JAUKUS” – but there is a fundamental stumbling block: Japan’s lack of effective counter-espionage laws.

    • Read more
  • Former U.S. Ambassador and National Security Council Official Charged with Secretly Acting as an Agent of the Cuban Government

    Federal prosecutors have charged Victor Manuel Rocha, 73, of Miami, Florida, a former U.S. Department of State employee who served on the National Security Council from 1994 to 1995 and ultimately as U.S. Ambassador to Bolivia from 2000 to 2002, with committing multiple federal crimes by secretly acting for decades as an agent of the government of the Republic of Cuba.

    • Read more
  • British Documentary Alleges China Influences Universities, Spies on Hong Kongers in UK

    A BBC Channel 4 documentary claims the Chinese government is interfering with academic freedom and spying on Hong Kong activists in the United Kingdom. The film also alleges that Chinese government agents pretending to be journalists used fake profiles and avatars to target Hong Kong activists now living in the U.K.

    • Read more
  • Huawei’s New Mate 60 Phones Are a Lesson in Unintended Consequences

    In October 2022, the Commerce Department introduced a set of export-control measures designed to prevent the use of American chip technology for Chinese military purposes. Rules were also imposed that aimed to restrict China’s semiconductor production to older 14-nm technology. These controls have had varying degrees of success, but the 14-nm restriction is one of the more overt failures, as the 7-nm chips in the new Huawei’s Mate 60 phones shows.

    • Read more
  • International Partnership Focuses on Insider Threats

    Insider threats can take many forms. They are real, and if not identified, they can be costly and damaging.

    • Read more
  • Fewer U.S. College Students Are Studying a Foreign Language − and That Spells Trouble for National Security

    In 1958, following the Soviet Union’s launch of Sputnik, the National Defense Education Act authorized funding to strengthen U.S. education in language instruction, in addition to math and science. More than six decades later, a new Modern Language Association report is raising concerns about America’s foreign language capabilities anew. Having fewer U.S. college students who learn a foreign language creates greater risks for national security.

    • Read more
  • Want to Prevent Misinformation? Present Data with an Interactive Visual

    Getting readers of a news story interested in numbers can be a challenge. But the benefits of engaging readers in data can lead to a better understanding, preventing misinformation, and misrepresentation in the news. New research explores a solution using interactive data visualization to inform and engage readers.

    • Read more
  • « first
  • ‹ previous
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • …
  • next ›
  • last »

More headlines

  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • White House forms emergency team to deal with China espionage hack
  • U.S. government unveils charges against Iranians who hacked into Trump 2024 campaign
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • FBI says Iran sent hacked Trump info to Biden campaign staffers
  • China select committee urges DHS to ‘aggressively’ enforce UFLPA
  • Chinese hackers nab 60,000 emails in State Department breach
  • CIA’s AI director says the new tech is our biggest threat, and resource
  • Aimed at Protests, Surveillance Contractor’s New Owners Expand Spy Tech Portfolio
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Kinetic Operations Bring Authoritarian Violence to Democratic Streets

    Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.

    • Read more
  • Romania, Foreign Election Interference, and a Dangerous U.S. Retreat

    The Romanian election is but one example of recent foreign election interference incidents. The Russian interference in 2016 U.S. election led Congress, on bipartisan basis, and the relevant agencies in the executive branch, to make many changes to address this threat, but under the new administration, “the U.S. is now moving full steam ahead to completely destroy its defenses against that threat,” Katie Kedian writes. All of the positive U.S. government developments “have been dismantled or severely downgraded,” leaving “the U.S. public less informed and less safe from foreign interference.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies