Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Government

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • U.S. Finalizes Rule Restricting Investment in Chinese Tech Firms

    The Treasury Department on Monday finalized a new rule meant to prevent U.S.-based people and companies from investing in the development of a range of advanced technologies in China, thereby preventing Beijing from accessing cutting-edge expertise and equipment.

    • Read more
  • Election Skeptics Are Targeting Voting Officials with Ads That Suggest They Don’t Have to Certify Results

    The ads, which have been placed in swing states like Wisconsin and Pennsylvania, come from a new group with deep ties to activists who have challenged the legitimacy of recent elections.

    • Read more
  • False Narratives Around the 2024 Presidential Election

    False and misleading narratives about the upcoming 2024 U.S. presidential election are spreading widely among extremists and purveyors of hate and conspiracy theories.

    • Read more
  • Mexico Is Offering Water to South Texas. But There’s a Catch Farmers Aren’t Happy About.

    Farmers say they want the water, but not if it goes against the allotment they need for the spring planting season.

    • Read more
  • U.S. Officials Say Russia Behind Fake Video of Pro-Trump Votes Being Destroyed

    Russia, as part of its broad influence campaign to help Donald Trump win the November election, has released a fake video, which has been circulating on social media, purporting to show the destruction of mail-in votes cast for Trump in Pennsylvania. The fake video is the latest in a series of fake videos produced by an offshoot of the St. Petersburg-based Internet Research Agency, which helped Trump win the 2016 election.

    • Read more
  • How Is the Kremlin Meddling In 2024 Elections? Here Are 5 Tactics.

    Russia’s Plan A is always to cooperate with mainstream forces and then corrupt them to align with Russian foreign policy interests. In Plan A fails, Russia falls back on Plan B, which is aligning with far-right parties -– but, at times, even forming alliances with far-left parties. For the Kremlin, the cheapest and most efficient way of boosting its allies is to flood the market with disinformation.

    • Read more
  • Threatening ‘The Enemy Within’ with Force: Military Ethicists Explain the Danger to Important American Traditions

    In a time of increasing political polarization, military educational institutions are focusing even more explicitly on the oath military members take to the Constitution, rather than to a person or an office. Military members have a duty to obey orders from superior officers, but the content of an order is not the only factor that determines whether it is a moral one. The political motivation for an order may be equally important, because the military’s obligation to stay out of politics is deeply intertwined with the mutual obligation of civilian officials not to use the military for partisan reasons.

    • Read more
  • Is Donald Trump a Fascist? Here’s What an Expert Thinks

    Experts are divided over the question of whether or not the term “Fascist” applies to Donld Trump. New York University professor Ruth Ben-Ghiat says she is still divided on the issue. She wrote that “in some ways, the label of Fascism is too reductive for Trump” because he “praises Communist dictators as much as he praises the Fascistic leaders,” but “it is beyond doubt that Trump has provided a new stage and a new context for fascist ideologies and practices.”

    • Read more
  • Emerging Tech and Terrorism: Adoption Patterns and Implications

    The diffusion of innovation theory highlights that most organizations, groups, and individuals adopt innovations in the mid-to-late product lifecycle. This applies to technology adoption by terror groups: most violent non-state actors will adopt technology once it has crossed several thresholds, including cost, availability, testing (i.e., proof of concept), and ease of use.

    • Read more
  • ‘Firehose’ of Election Conspiracy Theories Floods Final Days of the Campaign

    In the final days of the presidential election, lies about noncitizens voting, the vulnerability of mail-in ballots and the security of voting machines are spreading widely over social media. Polls show that election disinformation fanned by former President Donald Trump and notable allies such as tech tycoon Elon Musk, is warping voters’ faith in the integrity of the democratic process.

    • Read more
  • Threats of Political Violence Are Distorting Reality

    Mobilizations by extremist groups in 2024 are on track to be at their lowest level since 2020, according to a new report, but public officials — particularly those who work on elections — continue to face hostile threats.

    • Read more
  • Don’t Panic Reading ‘Electoral Process Porn’: There Are Plenty of Safeguards to Make Sure Voters’ Wishes Are Respected

    Because of all the fail-safes built into the system, even very close is something the election process can handle, sys one expert. “I’m very confident that the voters are going to decide this election, not the lawyers or the courts.”

    • Read more
  • Model Reveals Why Debunking Election Misinformation Often Doesn’t Work

    When an election result is disputed, people who are skeptical about the outcome may be swayed to accept the fairness and integrity of the election. A new study identifies factors that can make these efforts more successful.

    • Read more
  • Right-Wing Activists Pushed False Claims About Election Fraud. Now They’re Recruiting Poll Workers in Swing States.

    Elections officials say they welcome skeptics. As the system is secure, they anticipate problems from spreading misinformation rather than interfering with the process.

    • Read more
  • Leveraging AI to Enhance U.S. Cybersecurity

    Artificial intelligence (AI) and machine learning (ML) can potentially provide the homeland unprecedented opportunity to enhance its cybersecurity posture. DHS S&T is exploring the possibilities of using new advances in this technology to detect threats, increase resilience and provide more supply chain oversight.

    • Read more
  • « first
  • ‹ previous
  • …
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • …
  • next ›
  • last »

More headlines

  • Feds issue 'information requests' on University of Chicago international students, admissions practices
  • US races to build migrant tent camps after $45 billion funding boost, WSJ reports
  • Travelers to the U.S. must pay a new $250 'visa integrity fee' — what to know
  • DHS scraps $10B small business IT and software contract
  • U.S. revokes visas for British band that chanted, ‘Death, death to the IDF’
  • Trump 2026 Budget Plan Boosts Defense, Homeland Security
  • Another cybersecurity False Claims Act settlement
  • Trump wants $1 trillion for Pentagon
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • Trump’s use of Alien Enemies Act for swift deportations is illegal, Trump-appointed judge rules
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Factories First: Winning the Drone War Before It Starts

    Wars are won by factories before they are won on the battlefield,Martin C. Feldmann writes, noting that the United States lacks the manufacturing depth for the coming drone age. Rectifying this situation “will take far more than procurement tweaks,” Feldmann writes. “It demands a national-level, wartime-scale industrial mobilization.”

    • Read more
  • No Nation Is an Island: The Dangers of Modern U.S. Isolationism

    The resurgence of isolationist sentiment in American politics is understandable but misguided. While the desire to refocus on domestic renewal is justified, retreating from the world will not bring the security, prosperity, or sovereignty that its proponents promise. On the contrary, it invites instability, diminishes U.S. influence, and erodes the democratic order the U.S. helped forge.

    • Read more
  • Fragmented by Design: USAID’s Dismantling and the Future of American Foreign Aid

    The Trump administration launched an aggressive restructuring of U.S. foreign aid, effectively dismantling the United States Agency for International Development (USAID). The humanitarian and geopolitical fallout of the demise of USAID includes shuttered clinics, destroyed food aid, and China’s growing influence in the global south. This new era of American soft power will determine how, and whether, the U.S. continues to lead in global development.

    • Read more
  • Water Wars: A Historic Agreement Between Mexico and US Is Ramping Up Border Tension

    As climate change drives rising temperatures and changes in rainfall, Mexico and the US are in the middle of a conflict over water, putting an additional strain on their relationship. Partly due to constant droughts, Mexico has struggled to maintain its water deliveries for much of the last 25 years, deliveries to which it is obligated by a 1944 water-sharing agreement between the two countries.

    • Read more
  • How Disastrous Was the Trump-Putin Meeting?

    In Alaska, Trump got played by Putin. Therefore, Steven Pifer writes, the European leaders and Zelensky have to “diplomatically offer suggestions to walk Trump back from a position that he does not appear to understand would be bad for Ukraine, bad for Europe, and bad for American interests. And they have to do so without setting off an explosion that could disrupt U.S.-Ukrainian and U.S.-European relations—all to the delight of Putin and the Kremlin.”

    • Read more
  • How Male Grievance Fuels Radicalization and Extremist Violence

    Social extremism is evolving in reach and form. While traditional racial supremacy ideologies remain, contemporary movements are now often fueled by something more personal and emotionally resonant: male grievance.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies