Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Government

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Germany’s China Policy: Has It Learned from Its Dependency on Russia?

    The German economy remains heavily dependent on China, its largest trading partner, despite mounting geopolitical tensions between the West and Beijing.

    • Read more
  • EFF's Atlas of Surveillance Database Now Documents 10,000+ Police Tech Programs

    The EFF has created a searchable and mappable repository of which law enforcement agencies in the U.S. use surveillance technologies such as body-worn cameras, drones, automated license plate readers, and face recognition.

    • Read more
  • Afghan Government to Blame for Rapid Collapse: U.S. Auditor Report

    A report by the Special Inspector General for Afghanistan Reconstruction (SIGAR), which examined the U.S. investment in the conflict-torn nation, blames Afghanistan’s internationally supported, now-defunct government for failing to recognize that the United States intended to withdraw from the country, one of several factors contributing to its rapid collapse in August 2021 before the Taliban seized power.

    • Read more
  • Schengen States Extend Border Checks, Ignoring EU Court

    Though the top EU court recently ruled that Germany, Denmark and other Schengen states have no legal basis for extending border checks reimposed in 2015, the European Commission is not initiating infringement procedures.

    • Read more
  • More U.S. Adults Carrying Loaded Handguns Daily: Study

    The number of U.S. adult handgun owners carrying a loaded handgun on their person doubled from 2015 to 2019, according to new research. S larger proportion of handgun owners carried handguns in states with less restrictive carrying regulation, where approximately one-third of handgun owners reported carrying in the past month.

    • Read more
  • This Gun Policy Platform Could Help Reduce Gun Violence by 28%: Researchers

    A new report with findings from Tufts University School of Medicine experts proposes policies molded from common ground found between gun owners and non-gun owners.

    • Read more
  • The Benefits of Integrating Electric Vehicles into Electricity Distribution Systems

    As the cost of EVs continues to decrease, the industry matures, incentives grow, and charging infrastructure improves, EVs could make up the vast majority of vehicles on the road in 2050. Many studies have looked at how increased electricity demand will affect the bulk power system in the United States, but public analysis of the impacts on the distribution system has been less prevalent.

    • Read more
  • FBI Says It has ‘National Security Concerns’ About TikTok

    FBI Director Christopher Wray said on Tuesday that the bureau has “national security concerns” about popular short-form video hosting app TikTok. The FBI’s concerns about TikTok include “the possibility that the Chinese government could use it to control data collection on millions of users.”

    • Read more
  • Anticipating Chinese Reactions to U.S. Posture Enhancements

    What are the key factors that U.S. policymakers and military planners should consider when assessing how China is likely to react to planned or proposed U.S. posture enhancements in the Indo-Pacific region?

    • Read more
  • Greatest Terrorism Threat to U.S.: Racially Motivated, Anti-Government, Anti-Authority, Domestic Violent Extremists Radicalized Online -- FBI

    “The greatest terrorism threat to our Homeland is posed by lone actors or small cells who typically radicalize to violence online and look to attack soft targets with easily accessible weapons,” FBI Director Christopher Wray told Lawmakers. “We see these threats manifested within both Domestic Violent Extremists (“DVEs”) and Homegrown Violent Extremists (“HVEs”), two distinct threats, both of which are located primarily in the United States and typically radicalize and mobilize to violence on their own.”

    • Read more
  • Three Charged with Giving Secrets to China, and Selling DOD Chinese-Origin Rare Earth Magnets

    DOJ charged three residents of Kentucky and Indiana with sending technical military data drawings to China, and then unlawfully supplying the U.S. Department of Defense with Chinese-origin rare earth magnets for aviation systems and military items.

    • Read more
  • U.S. Imposes Sanctions on Network Supplying Russia with Weapons Tech

    The United States has imposed sanctions on a network of entities and individuals that it says are involved in supplying Russia with military technology to use in its war against Ukraine.

    • Read more
  • What Would Happen If a Nuclear Bomb Was Used in Ukraine?

    Atomic bombs dropped on Hiroshima and Nagasaki, and meltdowns at the Chernobyl and Fukushima power plants clearly affected people’s health. But experts say it’s hard to predict the fallout from a nuclear war today.

    • Read more
  • How Foreign Intelligence Services Compromise, Exploit U.S. Technology

    Foreign intelligence services have intensified their efforts to compromise or exploit U.S. technology. A new report analyzes foreign collection attempts to obtain unauthorized access to sensitive or classified information and technology.

    • Read more
  • Reports of China's Overseas 'Police Stations' Spark Controversy

    Recent allegations of China operating 54 overseas “police stations” to pressure its citizens — including dissidents — to return home have sparked controversy and led to a number of investigations into their activities across Europe and North America.

    • Read more
  • « first
  • ‹ previous
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • …
  • next ›
  • last »

More headlines

  • Alabama Makes Plans to Gas Its Prisoners
  • Dozens of Texas Counties Declare Illegal Immigration ‘Invasion’ as Debate Over Texas’ Role Simmers
  • DHS warns of rt-wing firearms attacks, land mines laid on migration routes & gassing of migrants
  • Hundreds of migrants land in national park in the Florida Keys
  • Congress gives support for Plum Island preservation in $1.7 trillion omnibus bill
  • Ex-Capitol Police Chief Issues Chilling Warning: It's 'Only Going To Get Worse'
  • As Capitol police became overpowered on Jan. 6, the Pentagon sent security to the homes of military leaders, per the former Capitol police chief
  • Congress rejects funding increase for DHS biometric system, directs independent review
  • 'Complex threat environment' ahead of midterm elections, top cybersecurity official says
  • New Details Outline Depth of Former Massachusetts Police Officer’s Role in Charlottesville Race Riot
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • January 6th Report Summarizes Extremist Threat – But Leaves Key Gaps

    The House Jan. 6 committee’s 845-page report is unquestionably valuable, but significant questions remain largely unanswered around two interrelated components of the committee’s investigation: the scope of law enforcement and intelligence failures preceding the attack on the U.S. Capitol, and what concrete steps should be taken to combat both those failures and the rising threat of domestic violent extremism in the aftermath of January 6th.

    • Read more
  • Protecting Democracy: Jan. 6 Panel’s Recommendations, Proposed Reforms

    On Thursday, 22 December, the House committee examining last year’s attack on the U.S. Capitol issued its long-awaited final report. The final report also proposes eleven reforms aiming to ensure that Trump’s attempt to subvert the will of the voters and prevent the peaceful transition of power from one president to the next would not be repeated.

    • Read more
  • Far-Left Extremist Groups in the United States

    Far-left extremism in the United States was most active during the period between the 1960s and 1980s. In the 1990s, a new type of left-extremism began to emerge – what the FBI calls “special-interest extremism,” as expressed by groups such as the Animal Liberation Front (ALF) and Earth Liberation Front (ELF). The far left encompasses multiple ideologies, but security experts believe that a large percentage of far-left radicals subscribe to at least one of three main classifications: anarchism, communism/socialism/Marxism, and autonomous radicals.

    • Read more
  • Concerns About Extremists Targeting U.S. Power Stations

    Attacks on four power stations in Washington State over the weekend added to concerns of a possible nationwide campaign by far-right extremists to stir fears and spark civil conflict. Violent extremists “have developed credible, specific plans to attack electricity infrastructure since at least 2020, identifying the electric grid as a particularly attractive target given its interdependency with other infrastructure sectors,” the DHS said in a January.

    • Read more
  • New Bill Proposes Banning TikTok in the U.S.

    Both the administration and Congress have moved to limit, or even ban, TikTok in the United States because of worries about China using the Chinese-owned platform to gather personal data on millions of Americans. Justin Sherman writes that “all told, it is a noteworthy piece of legislation, and it delineates between the risk of data access and the risk of content manipulation better than then-President Trump’s executive order on TikTok.”

    • Read more
  • Was George Santos Groomed to be a Russian Agent?

    Among the multitude of lies and falsehoods newly elected Rep. George Santos (R-N.Y.) has concocted, the most intriguing item – and likely the source of Santos’s most serious potential legal trouble – are his campaign finances. What is especially noticeable, and disturbing, are the generous contributions Santos has received from Viktor Vekselberg, one of Vladimir Putin’s wealthiest and most influential courtiers. “For all we know,” writes one commentator, “some foreign power may have bought itself a congressman. This isn’t outlandish speculation.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies