Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Government

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • DHS 2010 budget increases by 6 percent

    Proposed $43 billion 2010 DHS budget emphasizes border and transportation security, de-emphasizes a national network of sensors to detect dirty bombs

    • Read more
  • U.S. "black" military budget is second biggest military budget in world

    Forget the $490 billion U.S. defense budget; just the secret, or “black,” budget portion of the defense budget — the money dedicated to secret operations and space activities — ranks second or third among the world’s military expenditures

    • Read more
  • New DHS S&T leader: U.S. should brace for "bio-Katrina"

    Dr. Tara O’Toole, new leader at DHS’s Science and Technology Directorate: “There is a possibility, a real possibility, that there could be the equivalent of a bio-Katrina on [Obama’s] watch”

    • Read more
  • The 2010 U.S. defense budget creates winners and losers

    The proposed 2010 U.S. defense budget is 4 percent larger than last year’s budget, but the cancellation of major weapon systems and the reorientation toward a nimbler, lighter military will see some defense contractors win while others will be disappointed; major winners will be defense contractors involved in cyber security, intelligence, surveillance and reconnaissance

    • Read more
  • Britain to remove some DNA profiles from database

    About 5.2 percent of the U.K. population is on the national DNA database, compared with just 0.5 percent in the United States; the European Court of Human Rights rules that Britain’s DNA database is incompatible with the requirements of democracy, and the Home Office says it will begin to remove the DNA of innocent citizens

    • Read more
  • European Court: Scottish DNA database system is "fairer and proportionate"

    the European Court of Human Rights ruled the DNA databases in Britain, Wales, and Northern Ireland “could not be regarded as necessary in a democratic society”; the European Court considered the system in Scotland “fair and proportionate”

    • Read more
  • ShotSpotter to acquire QinetiQ North America's SECURES

    ShotSpotter will acquire SECURES Acoustic Gunshot Detection System
    from QinetiQ North America, strengthening its position in the acoustic detection arena; 35 localities in the United States already deploy ShotSpotter systems in high-crime areas

    • Read more
  • Canada bolsters air travel security

    The government in Ottawa announced $350-million in funding to boost security at airports across the country

    • Read more
  • DoJ's IG criticizes DHS terrorist Watch List

    Inspector General says Watch List is flawed; FBI was also slow in removing names that should not have been on the list

    • Read more
  • Hackers hold medical records hostage

    Hackers broke into a Virgina pharmaceutical clearinghouse Web site, deleted records of more than 8 million patients, and replaced the site’s homepage with a ransom note demanding $10 million for the return of the records

    • Read more
  • Senators urges Gates to continue production of Stealth fighter

    Utah senators lead group of legislators urging Secretary of Defense Robert Gates to continue production and procurement of the F-22 Raptor and the C-117; other legislators form group to fight Gates’s cancellation of other weapon systems

    • Read more
  • The near future will see self-cleaning materials, water-striding robots

    Researchers at the University of Nebraska and Japan explain a property called super hydrophobia, in the process giving engineers and materials scientists important clues as to how to develop the long-sought super hydrophobic materials

    • Read more
  • Surge in armored car sales in Brazil

    Brazilians have to live with exceedingly high levels of crime — in the late 1990s, for example, the UN ranked the Jardim Ângela section of São Paulo as the most violent neighborhood in the world — at the same time that government agencies, owing to corruption or incompetence, fail to provide security; São Paulo leads the country — and the world — in making and selling armored cars; tax breaks now allow the middle class to buy protection which once was the reserve of the rich

    • Read more
  • Republican oppose Safran's FBI contract

    Republicans legislators express opposition to the FBI awarding a large biometric contract to French company Safran; the company is partly owned by the French government

    • Read more
  • Dutch police uses unmanned mini-helicopter to sniff out cannabis

    Police in the noerthwest region of the Netherlands asked their engineers to design an unmanned helicopter to hover over the region and sniff out traces of weed smell in the air samples it collects; new methods does not require a warrant to enter buildings

    • Read more
  • « first
  • ‹ previous
  • …
  • 702
  • 703
  • 704
  • 705
  • 706
  • 707
  • 708
  • 709
  • 710
  • …
  • next ›
  • last »

More headlines

  • Trump 2026 Budget Plan Boosts Defense, Homeland Security
  • Another cybersecurity False Claims Act settlement
  • Trump wants $1 trillion for Pentagon
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • Trump’s use of Alien Enemies Act for swift deportations is illegal, Trump-appointed judge rules
  • DOGE Cuts Off Funds to Congressionally Mandated National Security Centers
  • The FBI and other agencies are using polygraphs to find leakers. But do they work?
  • US judge limits Trump's ability to swiftly deport migrants held at Guantanamo Bay
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • White House proposes sanctions, directs DHS to investigate immigration attorneys
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Economic Cyberespionage: A Persistent and Invisible Threat

    Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.

    • Read more
  • Researchers Calculate Cyberattack Risk for All 50 States

    Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.

    • Read more
  • How DHS Laid the Groundwork for More Intelligence Abuse

    I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.

    • Read more
  • Southport Attacks: Why the U.K. Needs a Unified Approach to All Violent Attacks on the Public

    The conviction of Axel Rudakubana for the murder of three young girls in Southport has prompted many questions about how the UK handles violence without a clear ideological motive. This case has also shown up the confusion in this area, and made clear the need for a basic reframing of how we understand murderous violence against the public today.

    • Read more
  • Water Is the Other U.S.-Mexico Border Crisis, and the Supply Crunch Is Getting Worse

    The United States and Mexico are aware of the political and economic importance of the border region. But if water scarcity worsens, it could supplant other border priorities. The two countries should recognize that conditions are deteriorating and update the existing cross-border governance regime so that it reflects today’s new water realities.

    • Read more
  • Sweden’s Deadliest Mass Shooting Highlights Global Reality of Gun Violence, Criminologist Says

    “We in the United States don’t have a monopoly on mass shootings,” James Alan Fox says, “though we certainly have more than our share.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies