Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Government

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Schneier: no need to worry about terrorists poisoning food

    Security maven Bruce Schneier says that fears of food-based bioterrorism are exaggerated: The quantities involved for mass poisonings are too great, the nature of the food supply too vast, and the details of any plot too complicated and unpredictable to be a real threat

    • Read more
  • IT spending to increase on Obama's watch

    New OMB report says that IT spending will increase by 7 percent in fiscal 2010 — to $75.8 billion

    • Read more
  • U.K. information commissioner: data collection trend will be reversed

    Richard Thomas, the outgoing U.K. information commissioner: “If you are looking for a needle in a haystack, it does not make sense to make the haystack bigger”

    • Read more
  • U.S.-Pakistan cooperate in UAV campaign, but it is a qualified cooperation

    The United States offered to give Pakistan a much larger amount of imagery, including real-time video feeds and communications intercepts gleaned by remotely piloted aircraft; information about the UAVs’ operating patterns, blind spots, and takeoff and landing locations is not shared for fear that elements inside the Pakistani intelligence and military would leak it to the insurgents

    • Read more
  • The suicide bomber

    Suicide bombers are a fact of life, so we must learn how to deal with them; there are ways to identify them, and ways to disable them and prevent them from carrying their deadly mission; doing so is not easy or simple, but it can be done

    • Read more
  • China deploys secure computer operating system

    China has installed a secure operating system known as “Kylin” on government and military computers designed to be impenetrable to U.S. military and intelligence agencies

    • Read more
  • NERC approves strengthened cyber security standards

    The North American Electric Reliability Corp.’s (NERC) independent Board of Trustees last week approved eight revised cyber security standards; entities found in violation of the standards can be fined up to $1 million per day, per violation in the United States

    • Read more
  • UCI awarded $45 million for infectious disease research

    Research facility receives finds to improve detection, treatment, and vaccine development

    • Read more
  • Somali pirates benefit from a global network of informers

    These are not your father’s pirates: Somali pirates benefit from information sent to them by informers planted in key shipping hubs around the world; this information includes vessels’ cargo, layout, and route — and is transmitted early enough to allow the pirates enough time to practice their assault based on the information they received

    • Read more
  • Boeing's takes X-45C out of storage, renames it Phantom Ray

    The proposed 2010 U.S. defense budget is historic at least in one respect: for the first time, the U.S. Air Force will be buying more unmanned flying systems than manned ones; Boeing takes its X-45C unmanned combat air vehicle (UCAV) out of storage and renames it Phantom Ray; it will be completed and readied for flight by the end of 2010, and will be suitable for missions including ISR, SEAD, electronic attack, hunter/killer, and autonomous aerial refueling

    • Read more
  • Highlights of the U.S. 2010 defense budget

    U.S. defense budget increase 4 percent over 2009, to $533.8 billion; weapons procurement, at $107.4 billion, comes third after Operations & Maintenance ($185.7 billion) and personnel costs ($136 billion)

    • Read more
  • U.S. Coast Guard budget reduced by $20 million relative to 2009

    USCG supporters fret over cuts in the Coast Guard budget; the cuts would have been even deeper had it not been for a slight injection of stimulus package funds and the inclusion of DoD supplemental money of $241 million for Operating Expenses Appropriation in support of Overseas Contingency Operations

    • Read more
  • How DHS plans to use the stimulus package's funds

    The stimulus package has added billions of dollars to the DHS budget; the department details how it plans to spend the money

    • Read more
  • Hackers break into UC Berkeley health-services databases

    Hackers began breaking into the databases back in October, and continued to steal information until breach was discovered on 9 April; about 160,000 individuals believed to be affected by breach

    • Read more
  • Canceling U.K. national ID scheme will save £400 million annually

    If start up costs of £300 million are included, the U.K. National Identity Scheme will, over a decade, cost government and citizens around £4.3 billion more than the cost of current passports

    • Read more
  • « first
  • ‹ previous
  • …
  • 717
  • 718
  • 719
  • 720
  • 721
  • 722
  • 723
  • 724
  • 725
  • …
  • next ›
  • last »

More headlines

  • Feds issue 'information requests' on University of Chicago international students, admissions practices
  • US races to build migrant tent camps after $45 billion funding boost, WSJ reports
  • Travelers to the U.S. must pay a new $250 'visa integrity fee' — what to know
  • DHS scraps $10B small business IT and software contract
  • U.S. revokes visas for British band that chanted, ‘Death, death to the IDF’
  • Trump 2026 Budget Plan Boosts Defense, Homeland Security
  • Another cybersecurity False Claims Act settlement
  • Trump wants $1 trillion for Pentagon
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • Trump’s use of Alien Enemies Act for swift deportations is illegal, Trump-appointed judge rules
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Factories First: Winning the Drone War Before It Starts

    Wars are won by factories before they are won on the battlefield,Martin C. Feldmann writes, noting that the United States lacks the manufacturing depth for the coming drone age. Rectifying this situation “will take far more than procurement tweaks,” Feldmann writes. “It demands a national-level, wartime-scale industrial mobilization.”

    • Read more
  • No Nation Is an Island: The Dangers of Modern U.S. Isolationism

    The resurgence of isolationist sentiment in American politics is understandable but misguided. While the desire to refocus on domestic renewal is justified, retreating from the world will not bring the security, prosperity, or sovereignty that its proponents promise. On the contrary, it invites instability, diminishes U.S. influence, and erodes the democratic order the U.S. helped forge.

    • Read more
  • Fragmented by Design: USAID’s Dismantling and the Future of American Foreign Aid

    The Trump administration launched an aggressive restructuring of U.S. foreign aid, effectively dismantling the United States Agency for International Development (USAID). The humanitarian and geopolitical fallout of the demise of USAID includes shuttered clinics, destroyed food aid, and China’s growing influence in the global south. This new era of American soft power will determine how, and whether, the U.S. continues to lead in global development.

    • Read more
  • Water Wars: A Historic Agreement Between Mexico and US Is Ramping Up Border Tension

    By Natasha Lindstaedt

    As climate change drives rising temperatures and changes in rainfall, Mexico and the US are in the middle of a conflict over water, putting an additional strain on their relationship. Partly due to constant droughts, Mexico has struggled to maintain its water deliveries for much of the last 25 years, deliveries to which it is obligated by a 1944 water-sharing agreement between the two countries.

    • Read more
  • How Disastrous Was the Trump-Putin Meeting?

    In Alaska, Trump got played by Putin. Therefore, Steven Pifer writes, the European leaders and Zelensky have to “diplomatically offer suggestions to walk Trump back from a position that he does not appear to understand would be bad for Ukraine, bad for Europe, and bad for American interests. And they have to do so without setting off an explosion that could disrupt U.S.-Ukrainian and U.S.-European relations—all to the delight of Putin and the Kremlin.”

    • Read more
  • How Male Grievance Fuels Radicalization and Extremist Violence

    By Haily Tran

    Social extremism is evolving in reach and form. While traditional racial supremacy ideologies remain, contemporary movements are now often fueled by something more personal and emotionally resonant: male grievance.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies