Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Government

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Sale of controlled technology to China brings two years

    China is engaging in a broad effort to obtain Western technology, and has instructed its intellignece agencies to engage in industrial espionage in the West; a California resident is sentenced to two years in prison for selling China night-vision cameras

    • Read more
  • Foreign investment boosts U.S. economy

    Last year the United States attracted $180 billion in foreign direct investment; U.S. subsidiaries of foreign companies employ 5.1 million Americans with a payroll of $336 billion; this translates into annual average worker compensation of $66,042 — well above the national average; one analyst argues that we should not allow protectionist sentiments and misplaced security concerns disrupt this contribution to the U.S. economy

    • Read more
  • U.S. teens lag behind in science and math

    U.S. teenagers continue to fall behind students from other industrialized countries in science and math; tests conducted among students in the 30 industrialized OECD countries place U.S. students at 23rd in math and 17th in science; when compared to tests conducted among students from two dozen non-industrialized countries, U.S. students fell in the middle of the pack in science and did somewhat worse in math

    • Read more
  • DHS's inspector general to take a close look at FEMA

    IG predicts that the number of FEMA investigations outnumber those planned for any of the ten other DHS divisions; for 2008, the IG plans to produce 173 management reports — 53 on FEMA and 31 on the department’s management division

    • Read more
  • Administration plans drastic cuts in antiterrorism funds to large cities

    New York politicians slam administration’s plans to cut antiterrorism funds to New York and other large cities; if Bush includes the cuts in his annual funding request to Congress, “They’ll be dead on arrival,” Representative Peter King (R-New York) vowed

    • Read more
  • U.K. government looks to private sector, academia for help on security

    U.K. Home Office organize a meeting of 150 scientists, venture capitalists, chief executives, and academics to exchange ideas on new capabilities and future research priorities in the figh against terrorism

    • Read more
  • Aussies debate creation of DHS-like super-department

    Kevin Rudd, leader of Australia’s opposition Labor Party, has proposed the creation of a DHS-like agency to coordinate responses to terrorism and natural disasters; critics say that the current, decentralized Australian first-response system is better

    • Read more
  • Main Northern Ireland's Protestant militant group declares "war is over"

    The UDA specialized in revenge murders of innocent Catholics after IRA attacks; it killed hundreds of people and extorted vast sums from its own community; in the last decades, many of its members turned to drug dealing and other crimes; leaders say that, as of yesterday, the “war is over” and that the organization will stand down; UDA say it will purge criminals from its ranks

    • Read more
  • Foreign students face tightened U.K. security checks

    Foreign students applying for graduate study in the U.K. in 41 science and engineering subjects now must pass extra security screening

    • Read more
  • Government agencies over-rely on outside contractors

    GAO criticizes DHS for profligate use of outside contractors; employees in other agencies write to say their agencies, too, are culpable

    • Read more
  • GAO criticizes DHS's reliance on contractors

    GAO says DHS spends too much money on contractors who do work which is usually reserved for government employees; as a result, DHS’s decision making may be unduly influenced by contractors

    • Read more
  • Checking on immigrants’ paperwork

    Checking on immigrants’ paperwork

    • Read more
  • Who’s in charge at DHS?

    Who’s in charge at DHS?

    • Read more
  • Opponnents say Social Security is not the way to track illegal immigrants

    Opponents of DHS’s tightening of no-match rule say this is not a good way to control illegal immigration; AFL-CIO estimates that 600,000 of its workers could be vulnerable to firing

    • Read more
  • Bush unveils updated national homeland security strategy

    President says “The purpose of our Strategy is to guide, organize, and unify our Nation’s homeland security efforts”

    • Read more
  • « first
  • ‹ previous
  • …
  • 639
  • 640
  • 641
  • 642
  • 643
  • 644
  • 645
  • 646
  • 647
  • …
  • next ›
  • last »

More headlines

  • Alabama Makes Plans to Gas Its Prisoners
  • Dozens of Texas Counties Declare Illegal Immigration ‘Invasion’ as Debate Over Texas’ Role Simmers
  • DHS warns of rt-wing firearms attacks, land mines laid on migration routes & gassing of migrants
  • Hundreds of migrants land in national park in the Florida Keys
  • Congress gives support for Plum Island preservation in $1.7 trillion omnibus bill
  • Ex-Capitol Police Chief Issues Chilling Warning: It's 'Only Going To Get Worse'
  • As Capitol police became overpowered on Jan. 6, the Pentagon sent security to the homes of military leaders, per the former Capitol police chief
  • Congress rejects funding increase for DHS biometric system, directs independent review
  • 'Complex threat environment' ahead of midterm elections, top cybersecurity official says
  • New Details Outline Depth of Former Massachusetts Police Officer’s Role in Charlottesville Race Riot
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • January 6th Report Summarizes Extremist Threat – But Leaves Key Gaps

    The House Jan. 6 committee’s 845-page report is unquestionably valuable, but significant questions remain largely unanswered around two interrelated components of the committee’s investigation: the scope of law enforcement and intelligence failures preceding the attack on the U.S. Capitol, and what concrete steps should be taken to combat both those failures and the rising threat of domestic violent extremism in the aftermath of January 6th.

    • Read more
  • Protecting Democracy: Jan. 6 Panel’s Recommendations, Proposed Reforms

    On Thursday, 22 December, the House committee examining last year’s attack on the U.S. Capitol issued its long-awaited final report. The final report also proposes eleven reforms aiming to ensure that Trump’s attempt to subvert the will of the voters and prevent the peaceful transition of power from one president to the next would not be repeated.

    • Read more
  • Far-Left Extremist Groups in the United States

    Far-left extremism in the United States was most active during the period between the 1960s and 1980s. In the 1990s, a new type of left-extremism began to emerge – what the FBI calls “special-interest extremism,” as expressed by groups such as the Animal Liberation Front (ALF) and Earth Liberation Front (ELF). The far left encompasses multiple ideologies, but security experts believe that a large percentage of far-left radicals subscribe to at least one of three main classifications: anarchism, communism/socialism/Marxism, and autonomous radicals.

    • Read more
  • Concerns About Extremists Targeting U.S. Power Stations

    Attacks on four power stations in Washington State over the weekend added to concerns of a possible nationwide campaign by far-right extremists to stir fears and spark civil conflict. Violent extremists “have developed credible, specific plans to attack electricity infrastructure since at least 2020, identifying the electric grid as a particularly attractive target given its interdependency with other infrastructure sectors,” the DHS said in a January.

    • Read more
  • New Bill Proposes Banning TikTok in the U.S.

    Both the administration and Congress have moved to limit, or even ban, TikTok in the United States because of worries about China using the Chinese-owned platform to gather personal data on millions of Americans. Justin Sherman writes that “all told, it is a noteworthy piece of legislation, and it delineates between the risk of data access and the risk of content manipulation better than then-President Trump’s executive order on TikTok.”

    • Read more
  • Was George Santos Groomed to be a Russian Agent?

    Among the multitude of lies and falsehoods newly elected Rep. George Santos (R-N.Y.) has concocted, the most intriguing item – and likely the source of Santos’s most serious potential legal trouble – are his campaign finances. What is especially noticeable, and disturbing, are the generous contributions Santos has received from Viktor Vekselberg, one of Vladimir Putin’s wealthiest and most influential courtiers. “For all we know,” writes one commentator, “some foreign power may have bought itself a congressman. This isn’t outlandish speculation.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies