Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Government

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • GPO reveals confidential U.S. nuclear information by mistake

    A 2004 agreement between the United States and the International Atomic Energy Agency (IAEA) requires the United States to submit to the agency a detailed list of the addresses and specifications of hundreds of U.S. nuclear-weapons-related facilities, laboratories, reactors, and research activities, including the location of fuel for bombs; the Department of Energy (DOE) prepared the report, and Government Printing Office (GPO) printed it so it could be submitted to the IAEA — but the GPO went ahead and, mistakenly, posted 268-page dossier on its Web site

    • Read more
  • Brookline says "No" to CCTVs

    Two months ago the town of Brookline, Massachusetts, installed surveillance cameras at major intersections; on Tuesday, members of the city council voted to remove the cameras because of privacy concerns

    • Read more
  • House passes TSA authorization, tells agency to consult GA

    The House of Representatives the Transportation Security Administration Authorization Act; bill sends a message to TSA to increase general aviation (GA) industry participation on security initiatives

    • Read more
  • House limits whole body imaging

    Worries about privacy lead Congress to vote, 310-118, to ban whole body imaging at airports; the bill would ban TSA from using whole-body imaging instead of metal detectors as the first-screening device at airports

    • Read more
  • Obama's emphasis on IT security a boon to Michigan companies

    Focus on cybersecurity technology offers Michigan IT companies chance to grow; the state has been quietly building a respectable range of network security companies

    • Read more
  • San Diego uses biometrics to identify and remove criminal aliens

    San Diego County Sheriff’s Department deputies are the first law enforcement unit in California to use DHS Secure Community program to receive biometric-based immigration information

    • Read more
  • Pakistan's security gadgets market booming

    Dealers say people more interested in installing CCTVs, night-vision cameras at houses, filling stations, jewelry shops, hotels, restaurants

    • Read more
  • Obama to call for better security for computers

    President Barack Obama today will outline his administration’s plans to bolster U.S. cybersecurity; the president will announce the creation of a cyber czar position

    • Read more
  • 9/11 attacks cloud Americans' view of terrorism

    There were 80,000 terrorist attacks around the world from 1970 to 2007; of those attacks, only 1,350 attacks, or 1.6 percent, hit American targets — mostly overseas; this percentage plummets to 0.08 percent when attacks on domestic targets are calculated

    • Read more
  • The government's new mail room // by Keith James

    How CRF regulations overhaul mail security — and the keys to timely compliance

    • Read more
  • Tensions arise over White House reorganization plan

    President Obama plans to merge the staffs of the White House National Security Council and Homeland Security Council — while stipulating that John Brennan, his homeland security adviser, will still be reporting directly to the president; tensions rise

    • Read more
  • Hardin, Montana, wants to take in Guantanamo prisoners

    Hardin, Montana (pop. 4,300) had a problem: it invested $27 million in a 464-bed modern prison facility which is standing empty; the city council offered to use it to house Guantanamo prisoners; Montana’s congressional delegation objects

    • Read more
  • ABI Research: DHS a "potential goldmine" for wireless kit providers

    Obama’s stimulus package earmarks $6.8 billion for wireless communications upgrades and new deployments; the health care and education market will receive some of it, but the real money is in selling wireless equipment to DHS and U.S. Customs and Border Protection (CBP), a new ABI Research report says

    • Read more
  • U.S. Air Force uncomfortable with the idea of a pilotless bomber

    Secretary of Defense Robert Gates said he is considering making the next-generation long-range bomber a pilotless aircraft; USAF chief begs to differ, saying “We would have to think seriously” about having a nuclear-delivery aircraft without a pilot

    • Read more
  • IG: TSA's financial data jeopardized by lax controls

    Inspector General reports finds that TSA’s financial statements are vulnerable to tampering; TSA does not review computer accounts to ensure people who have left the agency are locked out, and does not check the privileges associated with each active account regularly to ensure that level of access remains necessary

    • Read more
  • « first
  • ‹ previous
  • …
  • 699
  • 700
  • 701
  • 702
  • 703
  • 704
  • 705
  • 706
  • 707
  • …
  • next ›
  • last »

More headlines

  • Trump 2026 Budget Plan Boosts Defense, Homeland Security
  • Another cybersecurity False Claims Act settlement
  • Trump wants $1 trillion for Pentagon
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • Trump’s use of Alien Enemies Act for swift deportations is illegal, Trump-appointed judge rules
  • DOGE Cuts Off Funds to Congressionally Mandated National Security Centers
  • The FBI and other agencies are using polygraphs to find leakers. But do they work?
  • US judge limits Trump's ability to swiftly deport migrants held at Guantanamo Bay
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • White House proposes sanctions, directs DHS to investigate immigration attorneys
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Economic Cyberespionage: A Persistent and Invisible Threat

    Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.

    • Read more
  • Researchers Calculate Cyberattack Risk for All 50 States

    Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.

    • Read more
  • How DHS Laid the Groundwork for More Intelligence Abuse

    I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.

    • Read more
  • Southport Attacks: Why the U.K. Needs a Unified Approach to All Violent Attacks on the Public

    The conviction of Axel Rudakubana for the murder of three young girls in Southport has prompted many questions about how the UK handles violence without a clear ideological motive. This case has also shown up the confusion in this area, and made clear the need for a basic reframing of how we understand murderous violence against the public today.

    • Read more
  • Water Is the Other U.S.-Mexico Border Crisis, and the Supply Crunch Is Getting Worse

    The United States and Mexico are aware of the political and economic importance of the border region. But if water scarcity worsens, it could supplant other border priorities. The two countries should recognize that conditions are deteriorating and update the existing cross-border governance regime so that it reflects today’s new water realities.

    • Read more
  • Sweden’s Deadliest Mass Shooting Highlights Global Reality of Gun Violence, Criminologist Says

    “We in the United States don’t have a monopoly on mass shootings,” James Alan Fox says, “though we certainly have more than our share.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies