Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Government

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Purdue University, 21CSI to pursue homeland security opportunities

    The two organizations will collaborate in implementing new decision support tools and processes at the federal, state, and local levels

    • Read more
  • Immigration reform without Kennedy

    Kennedy dramatically changed the U.S. immigration system with the Immigration Act of 1965, which eliminated the quota system and allowed immigration from Latin America and Asia to increase substantially

    • Read more
  • Mexico's Ciudad Juarez is the world's most violent city

    With 130 murders for every 100,000 residents per year on average last year, Ciudad Juarez, a manufacturing city of 1.6 million people across from El Paso, Texas, is more violent than any other city in the world

    • Read more
  • How effective is CBP in keeping U.S. borders safe?

    According to DHS, the vast majority — more than 70 percent — of illegal aliens and contraband attempting to move across our border through official ports of entry will succeed

    • Read more
  • Pakistan to build own UAV

    Under a program launched this month, Pakistan’s domestic version of the drone or unmanned aerial vehicle to be called Falco will be made in collaboration with Selex Galileo of Italy at the Pakistan Aeronautical Complex in Kamra in Punjab province

    • Read more
  • U.S. has a flawed approach to cyber security

    Critics call on courts to recognize that obsolete computer systems are a major cause of security breaches; “As the courts probe (the) causative issues, it will become increasingly clear that computer systems’ failure to embed automated alerts is the root problem”

    • Read more
  • Protecting DNA privacy

    New mathematical tool protects genetic privacy while giving genomic data to researchers

    • Read more
  • Understanding nuclear ignition better

    The U.S. nuclear warheads are aging; researchers looking for new ways to figure out safe and reliable ways to estimate their longevity and to understand the physics of thermonuclear reactions in the absence of underground testing currently prohibited under law

    • Read more
  • Ridge worries about complacency

    Former DHS secretary Tom Ridges says he is worries about a certain “complacency” about preparing the nation and preventing another attack that has set in on Capitol Hill, and among the wider American public

    • Read more
  • Pilot argues TSA is needlessly obsessive with airline security

    A pilot argues that TSA’s obsession with the improbable repetition of a 9/11-like attack has left the U.S. commercial aviation more vulnerable to terrorism; rather than worry about box cutters, he says, TSA should scan more baggage for explosives

    • Read more
  • President to be able to seize private-sector networks in an emergency

    A bill being drafted in Congress (the is a revised bill — the original went further) permits the president to seize temporary control of private-sector networks during a cybersecurity emergency

    • Read more
  • Handwriting analysis offers alternate lie detection method

    Israeli researchers discover that with the aid of a computerized tool, handwriting characteristics can be measured more effectively; they have found that these handwriting characteristics differ when an individual is in the process of writing deceptive sentences as opposed to truthful sentences

    • Read more
  • New disappearing ink developed

    Nanoparticle inks that fade away in hours could be ideal for secure communications, top-secret maps, and other sensitive documents

    • Read more
  • Laptops at border crossings may be searched without probable cause

    DHS formalized policy regarding searches of electronic devices and media at border crossings; such searches may be conducted without suspicion or probable cause

    • Read more
  • Stockton College to offer homeland security certificate

    Joining a growing number of colleges and universities, and responding to the growing demand for certifications in various homeland security fields, New Jersey’s Stockton College is offering a blended online and classroom-based certification program

    • Read more
  • « first
  • ‹ previous
  • …
  • 687
  • 688
  • 689
  • 690
  • 691
  • 692
  • 693
  • 694
  • 695
  • …
  • next ›
  • last »

More headlines

  • Trump 2026 Budget Plan Boosts Defense, Homeland Security
  • Another cybersecurity False Claims Act settlement
  • Trump wants $1 trillion for Pentagon
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • Trump’s use of Alien Enemies Act for swift deportations is illegal, Trump-appointed judge rules
  • DOGE Cuts Off Funds to Congressionally Mandated National Security Centers
  • The FBI and other agencies are using polygraphs to find leakers. But do they work?
  • US judge limits Trump's ability to swiftly deport migrants held at Guantanamo Bay
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • White House proposes sanctions, directs DHS to investigate immigration attorneys
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Economic Cyberespionage: A Persistent and Invisible Threat

    By Gatra Priyandita and Bart Hogeveen

    Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.

    • Read more
  • Researchers Calculate Cyberattack Risk for All 50 States

    By John Tucker

    Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.

    • Read more
  • How DHS Laid the Groundwork for More Intelligence Abuse

    I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.

    • Read more
  • Southport Attacks: Why the U.K. Needs a Unified Approach to All Violent Attacks on the Public

    By Barry Richards

    The conviction of Axel Rudakubana for the murder of three young girls in Southport has prompted many questions about how the UK handles violence without a clear ideological motive. This case has also shown up the confusion in this area, and made clear the need for a basic reframing of how we understand murderous violence against the public today.

    • Read more
  • Water Is the Other U.S.-Mexico Border Crisis, and the Supply Crunch Is Getting Worse

    By Gabriel Eckstein and Rosario Sanchez

    The United States and Mexico are aware of the political and economic importance of the border region. But if water scarcity worsens, it could supplant other border priorities. The two countries should recognize that conditions are deteriorating and update the existing cross-border governance regime so that it reflects today’s new water realities.

    • Read more
  • Sweden’s Deadliest Mass Shooting Highlights Global Reality of Gun Violence, Criminologist Says

    By Ian Thomsen

    “We in the United States don’t have a monopoly on mass shootings,” James Alan Fox says, “though we certainly have more than our share.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies