Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Government

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Threatening ‘The Enemy Within’ with Force: Military Ethicists Explain the Danger to Important American Traditions

    In a time of increasing political polarization, military educational institutions are focusing even more explicitly on the oath military members take to the Constitution, rather than to a person or an office. Military members have a duty to obey orders from superior officers, but the content of an order is not the only factor that determines whether it is a moral one. The political motivation for an order may be equally important, because the military’s obligation to stay out of politics is deeply intertwined with the mutual obligation of civilian officials not to use the military for partisan reasons.

    • Read more
  • Is Donald Trump a Fascist? Here’s What an Expert Thinks

    Experts are divided over the question of whether or not the term “Fascist” applies to Donld Trump. New York University professor Ruth Ben-Ghiat says she is still divided on the issue. She wrote that “in some ways, the label of Fascism is too reductive for Trump” because he “praises Communist dictators as much as he praises the Fascistic leaders,” but “it is beyond doubt that Trump has provided a new stage and a new context for fascist ideologies and practices.”

    • Read more
  • Emerging Tech and Terrorism: Adoption Patterns and Implications

    The diffusion of innovation theory highlights that most organizations, groups, and individuals adopt innovations in the mid-to-late product lifecycle. This applies to technology adoption by terror groups: most violent non-state actors will adopt technology once it has crossed several thresholds, including cost, availability, testing (i.e., proof of concept), and ease of use.

    • Read more
  • ‘Firehose’ of Election Conspiracy Theories Floods Final Days of the Campaign

    In the final days of the presidential election, lies about noncitizens voting, the vulnerability of mail-in ballots and the security of voting machines are spreading widely over social media. Polls show that election disinformation fanned by former President Donald Trump and notable allies such as tech tycoon Elon Musk, is warping voters’ faith in the integrity of the democratic process.

    • Read more
  • Threats of Political Violence Are Distorting Reality

    Mobilizations by extremist groups in 2024 are on track to be at their lowest level since 2020, according to a new report, but public officials — particularly those who work on elections — continue to face hostile threats.

    • Read more
  • Don’t Panic Reading ‘Electoral Process Porn’: There Are Plenty of Safeguards to Make Sure Voters’ Wishes Are Respected

    Because of all the fail-safes built into the system, even very close is something the election process can handle, sys one expert. “I’m very confident that the voters are going to decide this election, not the lawyers or the courts.”

    • Read more
  • Model Reveals Why Debunking Election Misinformation Often Doesn’t Work

    When an election result is disputed, people who are skeptical about the outcome may be swayed to accept the fairness and integrity of the election. A new study identifies factors that can make these efforts more successful.

    • Read more
  • Right-Wing Activists Pushed False Claims About Election Fraud. Now They’re Recruiting Poll Workers in Swing States.

    Elections officials say they welcome skeptics. As the system is secure, they anticipate problems from spreading misinformation rather than interfering with the process.

    • Read more
  • Leveraging AI to Enhance U.S. Cybersecurity

    Artificial intelligence (AI) and machine learning (ML) can potentially provide the homeland unprecedented opportunity to enhance its cybersecurity posture. DHS S&T is exploring the possibilities of using new advances in this technology to detect threats, increase resilience and provide more supply chain oversight.

    • Read more
  • The Middle Road: Why the United States Needs a Dynamic Approach to Its Foreign Policy

    The world finds itself in a precarious calm before a potential storm of great power rivalry. The United States is in yet another crucial presidential election cycle. Both tickets offer largely contrasting stances for America’s position on the international stage. However, must America’s approach to its role on the international stage be one of two extremes, or can it be more nuanced?

    • Read more
  • Is the American Empire collapsing?

    The United States remains a global power unparalleled in history. So what would it take for this situation to change? Four possible developments or events seem to be plausible candidates.

    • Read more
  • U. of California Faces Lawsuit for Not Hiring Illegal Aliens

    UC’s Board of Regents decided by a vote in January to suspend for one year the implementation of its policy that allowed the hiring of illegal aliens. Now, the university faces a lawsuit for not offering jobs to illegal aliens.

    • Read more
  • Public Trust in U.S. Elections Is Decreasing. But Should It Be?

    Recent polls show public trust in the integrity of U.S. elections is decreasing, largely among Republicans. But this doesn’t signal that our elections are getting less reliable, scholars said.

    • Read more
  • Salt Typhoon Hack Shows There's No Security Backdoor That's Only for The "Good Guys"

    If U.S. policymakers care about China and other foreign countries engaging in espionage on U.S. citizens, it’s time to speak up in favor of encryption by default. If these policymakers don’t want to see bad actors take advantage of their constituents, domestic companies, or security agencies, again—they should speak up for encryption by default.

    • Read more
  • Ohio Is Home to About 50 White Extremist Groups, but the State’s Social and Political Landscape Is Undergoing Rapid Racial Change

    Rapidly changing social conditions in Ohio have played a significant role in the growth of extremism. Between 1990 and 2019, manufacturing jobs shrank from 21.7% of all employment in the state to 12.5%, mostly affecting white men. For many of these alienated men, extremist ideologies offer easy answers to complex questions that involve their sense of disenfranchisement.

    • Read more
  • « first
  • ‹ previous
  • …
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • …
  • next ›
  • last »

More headlines

  • Feds issue 'information requests' on University of Chicago international students, admissions practices
  • US races to build migrant tent camps after $45 billion funding boost, WSJ reports
  • Travelers to the U.S. must pay a new $250 'visa integrity fee' — what to know
  • DHS scraps $10B small business IT and software contract
  • U.S. revokes visas for British band that chanted, ‘Death, death to the IDF’
  • Trump 2026 Budget Plan Boosts Defense, Homeland Security
  • Another cybersecurity False Claims Act settlement
  • Trump wants $1 trillion for Pentagon
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • Trump’s use of Alien Enemies Act for swift deportations is illegal, Trump-appointed judge rules
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Factories First: Winning the Drone War Before It Starts

    Wars are won by factories before they are won on the battlefield,Martin C. Feldmann writes, noting that the United States lacks the manufacturing depth for the coming drone age. Rectifying this situation “will take far more than procurement tweaks,” Feldmann writes. “It demands a national-level, wartime-scale industrial mobilization.”

    • Read more
  • No Nation Is an Island: The Dangers of Modern U.S. Isolationism

    The resurgence of isolationist sentiment in American politics is understandable but misguided. While the desire to refocus on domestic renewal is justified, retreating from the world will not bring the security, prosperity, or sovereignty that its proponents promise. On the contrary, it invites instability, diminishes U.S. influence, and erodes the democratic order the U.S. helped forge.

    • Read more
  • Fragmented by Design: USAID’s Dismantling and the Future of American Foreign Aid

    The Trump administration launched an aggressive restructuring of U.S. foreign aid, effectively dismantling the United States Agency for International Development (USAID). The humanitarian and geopolitical fallout of the demise of USAID includes shuttered clinics, destroyed food aid, and China’s growing influence in the global south. This new era of American soft power will determine how, and whether, the U.S. continues to lead in global development.

    • Read more
  • Water Wars: A Historic Agreement Between Mexico and US Is Ramping Up Border Tension

    As climate change drives rising temperatures and changes in rainfall, Mexico and the US are in the middle of a conflict over water, putting an additional strain on their relationship. Partly due to constant droughts, Mexico has struggled to maintain its water deliveries for much of the last 25 years, deliveries to which it is obligated by a 1944 water-sharing agreement between the two countries.

    • Read more
  • How Disastrous Was the Trump-Putin Meeting?

    In Alaska, Trump got played by Putin. Therefore, Steven Pifer writes, the European leaders and Zelensky have to “diplomatically offer suggestions to walk Trump back from a position that he does not appear to understand would be bad for Ukraine, bad for Europe, and bad for American interests. And they have to do so without setting off an explosion that could disrupt U.S.-Ukrainian and U.S.-European relations—all to the delight of Putin and the Kremlin.”

    • Read more
  • How Male Grievance Fuels Radicalization and Extremist Violence

    Social extremism is evolving in reach and form. While traditional racial supremacy ideologies remain, contemporary movements are now often fueled by something more personal and emotionally resonant: male grievance.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies