Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Government

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • The Weaponization of the Federal Government Has a Long History

    The House Republicans have created a “Select Subcommittee on Weaponization of the Federal Government,” which should be an occasion for revisiting a classic of that power-abusing genre, featuring its greatest star, Richard Nixon. There were others. Congress has the power, even the obligation, to unearth and eliminate government weaponization. But if the subcommittee abuses its power for partisan ends, it will merely be an example of the problem it’s supposed to solve.

    • Read more
  • Science and Supercomputers Help Utilities Adapt to Climate Change

    Northern Illinois traditionally enjoys four predictable seasons. But climate is changing, with big repercussions for the people who live in the region and the power grid that supports them.

    • Read more
  • When Could a College or a University Hosting a Confucius Institute Receive DOD Funding?

    A new report proposes a set of criteria for the U.S. Department of Defense to consider in developing a waiver process that would potentially allow U.S. institutions of higher education to receive DOD funding while hosting a Confucius Institute.

    • Read more
  • How Chinese Companies Are Challenging National Security Decisions That Could Delay 5G Network Rollout

    In many countries, governments have decided to block Chinese companies from participating in building communication infrastructure in their countries because of national security concerns.  Chinese companies and investors often refuse to take such national security changes lying down. With varying degrees of success, firms have mounted a range of formal and informal challenges in recent years.

    • Read more
  • How China’s Maritime Militia Takes Advantage of the Grey Zone

    In recent years, China has used paramilitary forces to put pressure on neighboring countries that have conflicting claims with Beijing. Japan has been one of the targets over which China seeks to gain dominance by deliberately creating grey-zone situations at sea.

    • Read more
  • New Web Tracking Technique is Bypassing Privacy Protections

    Advertisers and web trackers have been able to aggregate users’ information across all of the websites they visit for decades, primarily by placing third-party cookies in users’ browsers. Two years ago, several browsers that prioritize user privacy – and advertisers have responded by pioneering a new method for tracking users across the Web, known as user ID (or UID) smuggling.

    • Read more
  • 2022 UFO Report Released by U.S. Intelligence Community

    The 2022 UFO report says that 510 objects were reported – they include 144 objects previously reported and 366 new sightings. Most of both the old and new cases were determined, after analysis, to exhibit “unremarkable characteristics.”

    • Read more
  • Pentagon Overhauls Chem-Bio Defense

    DOD last week said it was overhauling its approach to countering chemical and biological weapons. Rather than continuing to focus on developing countermeasures for a specific list of threat agents, the Pentagon will develop measures that can adapt to a range of evolving biological and chemical threats.

    • Read more
  • Effects of Gun Policies: Evidence Grows to Supports Laws Intended to Restrict Child Access to Guns

    More than 45,000 Americans die annually from deliberate and unintentional gun injuries, just over half of which are suicides. Another 50,000 to 150,000 Americans per year receive care in a hospital for a nonfatal gun injury.

    • Read more
  • How Does a Child Become a Shooter? Research Suggests Easy Access to Guns and Exposure to Screen Violence Increase the Risk

    In the aftermath of a shocking incident in which a first grader shot and seriously injured a teacher at a school in Newport News, Virginia, the city’s mayor asked the question: “How did this happen?” As experts in media use and its connections to violence, we have reported some disturbing findings about how children are influenced by gun violence depicted in media like television, movies and video games. What makes this more troubling is the fact that millions of children in the U.S. have easy access to firearms in their homes, increasing the risk of gun deaths, including suicides.

    • Read more
  • Flooding in California: What Went Wrong, and What Comes Next

    Battered by storm after storm, California is facing intense flooding, with at least 19 lives lost so far and nearly 100,000 people evacuated from their homes. And there’s no sign that the storms will be letting up soon.

    • Read more
  • EV Transition Will Benefit Most U.S. Vehicle Owners, but Lowest-Income Americans Could Get Left Behind

    More than 90% of vehicle-owning households in the United States would see a reduction in the percentage of income spent on transportation energy—the gasoline or electricity that powers their cars, SUVs and pickups—if they switched to electric vehicles. But more than half of the lowest-income U.S. households (an estimated 8.3 million households) would continue to experience high transportation energy burdens.

    • Read more
  • What Does China's Arctic Presence Mean to the United States?

    Researchers looked at where China is operating in the Arctic, what it wants, and what that could mean for regional security. They concluded that China has made only limited inroads in the Arctic, but that’s not for lack of trying.

    • Read more
  • Leveraging U.S. Capital Markets to Support the Future Industrial Network

    $56 trillion is nearly three times the size of the U.S. economy.  This vast pool of capital in U.S. capital markets — $46 trillion in public capitalization and another $10 trillion in private money – dwarfs that of China. Tapping U.S. equity and debt markets would enable the Department of Defense to remedy current capability shortfalls, fund technological advances from leading private-sector innovators, invest in generational transformation efforts across the military services, and upgrade antiquated global infrastructure to sustain U.S. forces.

    • Read more
  • Bringing Manufacturing Back to the U.S. Requires Political Will, but Success Hinges on Training American Workers

    The lack of manufacturing competitiveness in the U.S. leaves the U.S. vulnerable to shortages of critical goods during times of geopolitical disruption and global competition. The strategies the U.S. employs in bringing back manufacturing, along with innovative practices, will be key to ensure national security.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Alabama Makes Plans to Gas Its Prisoners
  • Dozens of Texas Counties Declare Illegal Immigration ‘Invasion’ as Debate Over Texas’ Role Simmers
  • DHS warns of rt-wing firearms attacks, land mines laid on migration routes & gassing of migrants
  • Hundreds of migrants land in national park in the Florida Keys
  • Congress gives support for Plum Island preservation in $1.7 trillion omnibus bill
  • Ex-Capitol Police Chief Issues Chilling Warning: It's 'Only Going To Get Worse'
  • As Capitol police became overpowered on Jan. 6, the Pentagon sent security to the homes of military leaders, per the former Capitol police chief
  • Congress rejects funding increase for DHS biometric system, directs independent review
  • 'Complex threat environment' ahead of midterm elections, top cybersecurity official says
  • New Details Outline Depth of Former Massachusetts Police Officer’s Role in Charlottesville Race Riot
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • January 6th Report Summarizes Extremist Threat – But Leaves Key Gaps

    The House Jan. 6 committee’s 845-page report is unquestionably valuable, but significant questions remain largely unanswered around two interrelated components of the committee’s investigation: the scope of law enforcement and intelligence failures preceding the attack on the U.S. Capitol, and what concrete steps should be taken to combat both those failures and the rising threat of domestic violent extremism in the aftermath of January 6th.

    • Read more
  • Protecting Democracy: Jan. 6 Panel’s Recommendations, Proposed Reforms

    On Thursday, 22 December, the House committee examining last year’s attack on the U.S. Capitol issued its long-awaited final report. The final report also proposes eleven reforms aiming to ensure that Trump’s attempt to subvert the will of the voters and prevent the peaceful transition of power from one president to the next would not be repeated.

    • Read more
  • Far-Left Extremist Groups in the United States

    Far-left extremism in the United States was most active during the period between the 1960s and 1980s. In the 1990s, a new type of left-extremism began to emerge – what the FBI calls “special-interest extremism,” as expressed by groups such as the Animal Liberation Front (ALF) and Earth Liberation Front (ELF). The far left encompasses multiple ideologies, but security experts believe that a large percentage of far-left radicals subscribe to at least one of three main classifications: anarchism, communism/socialism/Marxism, and autonomous radicals.

    • Read more
  • Concerns About Extremists Targeting U.S. Power Stations

    Attacks on four power stations in Washington State over the weekend added to concerns of a possible nationwide campaign by far-right extremists to stir fears and spark civil conflict. Violent extremists “have developed credible, specific plans to attack electricity infrastructure since at least 2020, identifying the electric grid as a particularly attractive target given its interdependency with other infrastructure sectors,” the DHS said in a January.

    • Read more
  • New Bill Proposes Banning TikTok in the U.S.

    Both the administration and Congress have moved to limit, or even ban, TikTok in the United States because of worries about China using the Chinese-owned platform to gather personal data on millions of Americans. Justin Sherman writes that “all told, it is a noteworthy piece of legislation, and it delineates between the risk of data access and the risk of content manipulation better than then-President Trump’s executive order on TikTok.”

    • Read more
  • Was George Santos Groomed to be a Russian Agent?

    Among the multitude of lies and falsehoods newly elected Rep. George Santos (R-N.Y.) has concocted, the most intriguing item – and likely the source of Santos’s most serious potential legal trouble – are his campaign finances. What is especially noticeable, and disturbing, are the generous contributions Santos has received from Viktor Vekselberg, one of Vladimir Putin’s wealthiest and most influential courtiers. “For all we know,” writes one commentator, “some foreign power may have bought itself a congressman. This isn’t outlandish speculation.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies