Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Government

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • In Trade War with the U.S., China Holds a Lot More Cards Than Trump May Think − in Fact, It Might Have a Winning Hand

    While Trump’s tariffs will inevitably hurt parts of the Chinese economy, Beijing appears to have far more cards to play this time around, compared to the tariff conflict between the two countries during Trump’s first term in the White Houser. It has the tools to inflict meaningful damage on U.S. interests – and perhaps more importantly, Trump’s all-out tariff war is providing China with a rare and unprecedented strategic opportunity.

    • Read more
  • How and Where Is Nuclear waste stored in the U.S.?

    Around the U.S., about 90,000 tons of nuclear waste is stored at over 100 sites in 39 states, in a range of different structures and containers. For decades, the nation has been trying to send it all to one secure location. Perhaps there will be a temporary site whose location passes muster with the Supreme Court. But in the meantime, the waste will stay where it is.

    • Read more
  • The Institute for the Critical Study of Zionism: Five Things to Know

    The far-left Institute for the Critical Study of Zionism (ICSZ) uses scholastic veneer to establish anti-Zionist activism as an academic discipline and as the only acceptable moral and scholarly stance in academia.

    • Read more
  • Far-Right Party Could Use Marine Le Pen Election Ban as Part of Battle Plan for Power in France

    An expert in populist parties says the court’s decision could be exploited by the far-right party as part of its 2027 presidential election strategy.

    • Read more
  • Can Border Patrol Go Through Your Phone? A Legal Expert Explains What Rights Travelers Have Entering the U.S.

    A Northeastern legal expert explains the complexities involved with searches of phones and social media and what rights citizens and visitors have when entering the country.

    • Read more
  • Experts Explain Signal, Cybersecurity, and How a Journalist Was Sent High-Level Military Intelligence

    “The practice of not using SCIFs (Secure Compartmented Information Facilities) for the planning and implementation of conflict with a foreign state is an egregious breach of national security protocols,” said Virginia Tech’s cybersecurity expert Aron Brantly. “That the principals group was using this as a means of communications is a profound violation of US classification laws and standards and constitutes a grave threat to U.S. national security.”

    • Read more
  • “Not Just Measles”: Whooping Cough Cases Are Soaring as Vaccine Rates Decline

    Declining vaccination rates have caused the Texas measles outbreak, and vaccination rates for other childhood diseases have fallen as well. Deep cuts to public health jobs and funding, and HHS’s ambivalent messaging about vaccines, make it harder for agencies to fight outbreaks and prevent disease with vaccines.

    • Read more
  • Some Measles Response Plans Crash to a Halt after Trump Cuts

    Cities and states fighting a historic measles outbreak find themselves undermined by the Trump administration as they struggle to provide crucial vaccinations and overcome disinformation.

    • Read more
  • Public Health Groups Call for Kennedy to Resign or Be Fired as Biomed Sector Airs Concerns

    In the wake of dramatic cuts to US Department of Health and Human Services (HHS) staff, cutbacks for state public health efforts, and mixed messages on battling measles and other infectious diseases, two public health groups called for HHS Secretary Robert F. Kennedy Jr. to resign or be fired.

    • Read more
  • Kinetic Operations Bring Authoritarian Violence to Democratic Streets

    Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.

    • Read more
  • Defending American Interests Abroad

    Overseas malign information operations by foreign actors seek to undermine the strategic interests of the United States. These operations are intended to manipulate the global information environment for geostrategic purposes by disseminating false or misleading information to shape narratives, shift public discourse, and undermine other nations’ national security.

    • Read more
  • Trump Aims to Shut Down State Climate Policies

    President Donald Trump has launched an all-out legal attack on states’ authority to set climate change policy. Climate-focused state leaders say his administration has no legal basis to unravel their efforts.

    • Read more
  • Nearly 1 Million Facing Deportation Released into U.S. Through CBP One App

    More than 900,000 illegal foreign nationals who were unlawfully released into the country by the Biden administration through a now defunct CBP One phone app have been notified that their parole status is terminated and have been instructed to leave the U.S. immediately, or face deportation.

    • Read more
  • Trump Thinks Tariffs Can Bring Back the Glory Days of U.S. Manufacturing. Here’s Why He’s Wrong

    Trump’s “liberation day” tariffshave one thing in common – they are being applied to goods only.They are the perfect example of Trump’s peculiar focus on trade in goods and, by extension, his nostalgic but outdated obsession with manufacturing.Trump’s thinking is likely related to a combination of nostalgia for a bygone (somewhat imagined) age of manufacturing,and concern over the loss of quality jobs that provide a solid standard of living for blue collar workers – a core part of his political base.But nostalgia is not a sensible basis for forming economic policy.

    • Read more
  • Declassified JFK Files Provide “Enhanced Clarity on CIA Actions, Historian Says

    Fredrik Logevall, Pulitzer winner writing three-volume Kennedy biography, shares takeaways from declassified docs.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Trump 2026 Budget Plan Boosts Defense, Homeland Security
  • Another cybersecurity False Claims Act settlement
  • Trump wants $1 trillion for Pentagon
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • Trump’s use of Alien Enemies Act for swift deportations is illegal, Trump-appointed judge rules
  • DOGE Cuts Off Funds to Congressionally Mandated National Security Centers
  • The FBI and other agencies are using polygraphs to find leakers. But do they work?
  • US judge limits Trump's ability to swiftly deport migrants held at Guantanamo Bay
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • White House proposes sanctions, directs DHS to investigate immigration attorneys
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Economic Cyberespionage: A Persistent and Invisible Threat

    Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.

    • Read more
  • Researchers Calculate Cyberattack Risk for All 50 States

    Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.

    • Read more
  • How DHS Laid the Groundwork for More Intelligence Abuse

    I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.

    • Read more
  • Southport Attacks: Why the U.K. Needs a Unified Approach to All Violent Attacks on the Public

    The conviction of Axel Rudakubana for the murder of three young girls in Southport has prompted many questions about how the UK handles violence without a clear ideological motive. This case has also shown up the confusion in this area, and made clear the need for a basic reframing of how we understand murderous violence against the public today.

    • Read more
  • Water Is the Other U.S.-Mexico Border Crisis, and the Supply Crunch Is Getting Worse

    The United States and Mexico are aware of the political and economic importance of the border region. But if water scarcity worsens, it could supplant other border priorities. The two countries should recognize that conditions are deteriorating and update the existing cross-border governance regime so that it reflects today’s new water realities.

    • Read more
  • Sweden’s Deadliest Mass Shooting Highlights Global Reality of Gun Violence, Criminologist Says

    “We in the United States don’t have a monopoly on mass shootings,” James Alan Fox says, “though we certainly have more than our share.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies