Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Government

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • The Chilling Crime Spree of The Order – and Its Lasting Effect on Today’s White Supremacists

    The new historical crime drama, “The Order,” starring Jude Law and Nicholas Holt, is being described as a riveting “cat-and-mouse thriller.” But for criminologists like us, the white supremacist extremism that takes place in the film is not a nod to a distant past, but a reflection of beliefs and rhetoric that still percolate on social media and inspire acts of terror.

    • Read more
  • After Fall of Assad Dynasty, Syria’s Risky New Moment

    The swift collapse of Syria’s regime brings a humiliating end to Russia’s and Iran’s sway and opens the door for greater Turkish influence. But the Islamist movement that seized power has yet to show its full intentions.

    • Read more
  • Lines on a 1916 Map May Not Keep Syria Together

    The question most observers are now asking is: what if any form of stable central government might emerge from this lightning fast upending of the power dynamics in Syria? A possible lesson from history is that insurgent armies of diverse allegiance, religion and ideology are capable of capturing cities, but their ability to administrate them is less certain.

    • Read more
  • Why Bashar al-Assad’s Security State Collapsed So Dramatically in Syria

    While it may seem like the events in Syria in the last ten days came out of nowhere, the rapid fall of the Assad regime has a long history.

    • Read more
  • How Polarization Drives Republicans to Spread Misinformation

    Researchers say people most likely to spread misinformation are Republicans, i.e., conservatives, but mainly only under certain conditions. “Both liberals and conservatives have a baseline tendency to do this,” says one expert, “but we see these big spikes only among the Republicans when they’re in a situation that feels like there is political conflict. When they’re in a competitive situation, Republicans want to win—almost at any cost.”

    • Read more
  • What is Salt Typhoon? A Security Expert Explains the Chinese Hackers and Their Aattack on U.S. Telecommunications Networks

    Lost in the noise of the story is that Salt Typhoon has proved that the decades of warnings by the internet security community were correct. No mandated secret or proprietary access to technology products is likely to remain undiscovered or used only by “the good guys” – and efforts to require them are likely to backfire.

    • Read more
  • Smart Pressure: Conceptualizing Counterterrorism for a New Era

    When it comes to counterterrorism, the United States has been living through an inflection point. It wants to focus less on terrorism so it can place more emphasis on strategic competition, but key terrorist adversaries remain committed. The terrorism landscape and the approaches used by key terror adversaries have also been evolving

    • Read more
  • A 2006 Study Found Undocumented Immigrants Contribute More Than They Cost Texas. The State Hasn’t Updated It Since.

    A comptroller’s report found that deporting the estimated 1.4 million undocumented immigrants living in Texas in 2005 would have cost the state about $17.7 billion in gross domestic product.

    • Read more
  • Supply Chain Uncertainty

    Supply chains are extremely complex, to the point that almost no business or organization is likely to know the details of its supply chain below the immediate level. This opacity can result in vulnerabilities developing without the affected parties even being aware of them. There is thus a need to building resilience in the face of impending threats.

    • Read more
  • What Is a Self-Coup? South Korea President’s Attempt Ended in Failure − a Notable Exception in a Growing Global Trend

    South Kore’s President Yoon Suk Yeol short-lived martial law declaration was an example of “autogolpe,” or, in English, a “self-coup.” Self-coups are becoming more common, with more in the past decade compared with any other 10-year period since the end of World War II. Why that’s happening? What self-coups involve? And why, unlike in around 80% of self-coups, Yoon’s gambit failed.

    • Read more
  • Chinese Hackers Still Lurk in U.S. Telecommunications systems

    Chinese hackers blamed for compromising U.S. telecommunications infrastructure and spying on American presidential campaigns and American officials are still entrenched in those systems.

    • Read more
  • The Russia-Iran-Assad ‘Axis of the Vulnerable’ Is Cracking in Syria

    Starting in 2016, Russia and Iran, propping up the regime of Bashar al-Assad. Since 2020, Assad has presided in name over part of a fractured country. Now Assad does not even preside over his share of the partition. And his Russian and Iranian enablers, overstretched and isolated by much of the world, are not in a position to restore his paper rule.

    • Read more
  • Washington Office Begins Tracking Statewide Deadly Use of Force Incidents

    This month, the Washington State Office of Independent Investigation began tracking deadly use of force incidents involving law enforcement officers.

    • Read more
  • Protecting U.S. Allies and Partners from Chinese Economic Coercion

    China’s growing willingness to defy the international order, and its increasingly aggressive leadership, have led it to increasingly utilize economic coercion against countries it believes have defied China’s interests. This coercion can be powerful, and the United States and its partners have not been well-prepared for Beijing’s actions. The U.S. and others need to develop a response immediately.

    • Read more
  • The Apocalypse That Wasn’t: AI Was Everywhere in 2024’s Elections, but Deepfakes and Misinformation Were Only Part of the Picture

    2024 is a “super-cycle” year in which 3.7 billion eligible voters in 72 countries had the chance to go the polls. The vast majority of various surveys’ respondents expected AI to be used for mostly bad purposes in these elections, but the dreaded “death of truth” has not materialized – at least, not due to AI.

    • Read more
  • « first
  • ‹ previous
  • …
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • …
  • next ›
  • last »

More headlines

  • Feds issue 'information requests' on University of Chicago international students, admissions practices
  • US races to build migrant tent camps after $45 billion funding boost, WSJ reports
  • Travelers to the U.S. must pay a new $250 'visa integrity fee' — what to know
  • DHS scraps $10B small business IT and software contract
  • U.S. revokes visas for British band that chanted, ‘Death, death to the IDF’
  • Trump 2026 Budget Plan Boosts Defense, Homeland Security
  • Another cybersecurity False Claims Act settlement
  • Trump wants $1 trillion for Pentagon
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • Trump’s use of Alien Enemies Act for swift deportations is illegal, Trump-appointed judge rules
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Factories First: Winning the Drone War Before It Starts

    Wars are won by factories before they are won on the battlefield,Martin C. Feldmann writes, noting that the United States lacks the manufacturing depth for the coming drone age. Rectifying this situation “will take far more than procurement tweaks,” Feldmann writes. “It demands a national-level, wartime-scale industrial mobilization.”

    • Read more
  • No Nation Is an Island: The Dangers of Modern U.S. Isolationism

    The resurgence of isolationist sentiment in American politics is understandable but misguided. While the desire to refocus on domestic renewal is justified, retreating from the world will not bring the security, prosperity, or sovereignty that its proponents promise. On the contrary, it invites instability, diminishes U.S. influence, and erodes the democratic order the U.S. helped forge.

    • Read more
  • Fragmented by Design: USAID’s Dismantling and the Future of American Foreign Aid

    The Trump administration launched an aggressive restructuring of U.S. foreign aid, effectively dismantling the United States Agency for International Development (USAID). The humanitarian and geopolitical fallout of the demise of USAID includes shuttered clinics, destroyed food aid, and China’s growing influence in the global south. This new era of American soft power will determine how, and whether, the U.S. continues to lead in global development.

    • Read more
  • Water Wars: A Historic Agreement Between Mexico and US Is Ramping Up Border Tension

    As climate change drives rising temperatures and changes in rainfall, Mexico and the US are in the middle of a conflict over water, putting an additional strain on their relationship. Partly due to constant droughts, Mexico has struggled to maintain its water deliveries for much of the last 25 years, deliveries to which it is obligated by a 1944 water-sharing agreement between the two countries.

    • Read more
  • How Disastrous Was the Trump-Putin Meeting?

    In Alaska, Trump got played by Putin. Therefore, Steven Pifer writes, the European leaders and Zelensky have to “diplomatically offer suggestions to walk Trump back from a position that he does not appear to understand would be bad for Ukraine, bad for Europe, and bad for American interests. And they have to do so without setting off an explosion that could disrupt U.S.-Ukrainian and U.S.-European relations—all to the delight of Putin and the Kremlin.”

    • Read more
  • How Male Grievance Fuels Radicalization and Extremist Violence

    Social extremism is evolving in reach and form. While traditional racial supremacy ideologies remain, contemporary movements are now often fueled by something more personal and emotionally resonant: male grievance.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies