Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Government

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Annual space trajectory competition begins

    European Space Agency announces Global Trajectory Optimization Competition; competition seeks to find the best solution to an interplanetary trajectory problem

    • Read more
  • Bomb-proof concrete developed

    Liverpool University researchers develop blast-resistant concrete; the Ultra High Performance Fiber Reinforced Concrete is able to absorb a thousand times more energy than conventional mixtures

    • Read more
  • U.K. companies invest in R&D

    Survey of R&D spending by the 850 U.K. companies most active in R&D and the 1,400 most active companies globally show that U.K. companies increased their R&D budgets by 6 percent (the top 88 companies increased their budgets by 10.3 percent); global competitors average a 9.5 percent increase

    • Read more
  • Antelopes as soldiers -- cont.

    In Vietnam, the United States used Agent Orange to defoliate jungles and deny the Viet Cong cover; in northern Israel, the IDF uses antelopes to eat the foliage to deny Hezbollah fighters cover

    • Read more
  • Fake Internet drugs risk lives, fund terrorism

    Study finds that 62 percent of the prescription-only medicines offered on the Internet are fakes; some of the fake-drug schemes are operated by terrorist organizations as a means of raising funds

    • Read more
  • Israel uses antelopes against Hezbollah

    IDF deploys antelopes to Israel’s northern borders to clear the foliage which the military fears could function as cover for Hezbollah fighters

    • Read more
  • Beyond fingerprints: The FBI's next generation database

    New, mammoth database will include not only enhanced fingerprint capabilities, but also other forms of biometric identification like palm prints, iris scans, facial imaging, scars, marks, and tattoos — in one searchable system

    • Read more
  • Midwest states critical of DHS's Large Aircraft Security Program

    In the large, sparsely populated states of the U.S. Midwest, many businesses rely on small aircraft transportation to get from here to there; Kansas is also home to general aviation manufacturers Cessna Aircraft Company and Hawker Beechcraft

    • Read more
  • USDA's IG warns about flood of genetically modified crops

    Experts expect the number of genetically modified crops and traits, and the number of countries producing them, to double by 2015, raising the risks of imports of GM crops unknown to the USDA; worry centers on countries such as China, India, and Brazil where health and safety standards are more lax

    • Read more
  • Their brothers' keepers: Spy satellites spy on each other

    If you thought spy satellites in the sky only look down at what is going on on Earth, think again; the United States admits two covert inspection satellites got real close to a failed geostationary satellite to see what was wrong with it; experts worry this is the beginning of anti-satellite arms race

    • Read more
  • U.S. Border Protection agency to hire 11,000 in 2009

    CBP launches National Career Day around the United States to announce CBP’s goal for hiring approximately 11,000 frontline and mission and operations support positions in 2009

    • Read more
  • Napolitano issues additional action directives

    DHS secretary Napolitano issues additional Action Directives on cyber security and northern border strategy

    • Read more
  • Homeland security-related college courses bolster graduates' job chances

    There are now more than 150 academic institutions offering homeland security related undergraduate and graduate programs and degrees; this growth mirrors trends and needs in the job market

    • Read more
  • Honey laundering: Tainted, mislabeled honey makes it to store shelves

    Two-thirds of the honey Americans consume is imported; almost half of that comes from China; Chinese honey often contains chloramphenicol or other antibiotics which are illegal in any food; Chinese producers, government mislabel honey jars to mislead consumers

    • Read more
  • N.Y. policeman illegally obtains, uses U.S. terror watch-list information

    NYPD sergeant uses a colleague username and password to access the FBI terrorist watch-list; he then obtains information about an individual on the list — an individual locked in a child custody fight with a friend of the sergeant — and provide the information to the friend’s lawyer

    • Read more
  • « first
  • ‹ previous
  • …
  • 749
  • 750
  • 751
  • 752
  • 753
  • 754
  • 755
  • 756
  • 757
  • …
  • next ›
  • last »

More headlines

  • DHS IG auditing ICE hiring, use of biometric data
  • How public opinion shifting against ICE may affect the DHS funding showdown in Congress
  • Far-right leader Marine Le Pen tries new tack in appeal critical to France’s political future
  • Europe's far right and populists distance themselves from Trump over Greenland
  • DHS spending bill bolsters staffing at CISA, FEMA, Secret Service
  • 2 DOGE staffers at Social Security agency may have violated Hatch Act, DOJ says
  • Trump administration admits DOGE accessed personal Social Security data
  • A "tough" vote to fund DHS and ICE gives Democrats heartburn
  • Democratic lawmaker to introduce bill to cripple DHS' ability to detain immigrants
  • DHS restricts congressional visits to ICE facilities in Minneapolis with new policy
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Diversity as National Security: Why Retreating from DEI Risks Repeating Pre-9/11 Failures

    One of often overlooked lessons of the 9/11 intelligence failure is that diversity — linguistic, cultural, experiential — was not simply a “nice to have” in intelligence work. It was essential infrastructure. The absence of diversity in America’s national security workforce thus represented more than a demographic imbalance; it represented a structural blind spot.

    • Read more
  • Online Mobilization and Violence in the United States

    Even before the Charlie Kirk assassination, the United States was facing a resurgence of politically motivated violence that is deeply intertwined with the digital sphere. Extremists across the ideological spectrum exploit acts of violence to recruit followers, justify their ideologies, and sustain propaganda networks.

    • Read more
  • Nick Fuentes Is a Master of Exploiting the Current Social Media Opportunities for Extremism

    That the antisemitic white nationalist Nick Fuentes and his followers have managed to get what their 20th-century predecessors could not — widespread awareness and political influence — reveals how fringe ideologies operate differently today compared to the mid-20th century, when institutional gatekeepers –political parties, law enforcement, the media –could more effectively contain extremist movements.

    • Read more
  • White Nationalism Fuels Tolerance for Political Violence Nationwide

    Political violence is certainly not new in American society, but current patterns differ in key ways. We found that, today, white nationalism is a key driver of support for political violence –a sign that white nationalism poses substantial danger to U.S. political stability.

    • Read more
  • Political Violence Offers Extremist “Trigger Events” for Recruiting Supporters

    Extremists are exploiting political violence by using online platforms to recruit new people to their causes and amplify the use of violence for political goals. High-profile incidents of political violence are useful trigger events for justifying extremist ideologies and calls for retaliation.

    • Read more
  • Fake survey Answers from AI Could Quietly Sway Election Predictions

    Public opinion polls and other surveys rely on data to understand human behavior. New research reveals that artificial intelligence can now corrupt public opinion surveys at scale—passing every quality check, mimicking real humans, and manipulating results without leaving a trace.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies