Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Government

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Briefly noted

    Smart cluster bomb hunts down targets… Anthrax-case documents reveal bizarre Ivins’s behavior… New FISMA bill receives committee OK… L-1 in $5.9 million Mississippi driver’s license contract…

    • Read more
  • NATO in major anti-terror drill

    NATO will hold a two-week comprehensive anti-terrorrism drill in Sardinia; 15 nations, 10 agencies will coordinate land, air, sea, space assets in an effort to smooth communication, information sharing, and operational execution

    • Read more
  • Briefly noted

    Aussie cyber security needs work… D.C. policy carry iPhones… Surveillance radar in Indonesian straits… HUD awards Iowa critical infrastructure funds…

    • Read more
  • Alternatives to the H-1B visa, pt. 1: O-1 "Extraordinary ability"

    The U.S. immigration services received more than 163,000 petitions for the 65,000 regular H-1B visas allocated for FY2009; the homeland security, hi-tech, and services sectors, as well as academic and research institutions, need another way to bring to the United States qualified foreign workers and researchers; one such way is the O-1 “Extraordinary Ability” visa

    • Read more
  • Neither presidential campaign has contacted DHS about transition

    DHS has set up transition teams to facilitate a smooth and effective transmission of information and transition of authority to the new administration, but neither the McCain or the Obama campaign has contacted the teams

    • Read more
  • India eases foreign borrowing rules to aid infrastructure

    The U.S. infrastructure is often described as “aging” or “crumbling”; in india they refer to the country’s “ramshackle infrastructure”; the Indian government, as part of a move to have $500 billion invested in improving the country’s infrastructure, eases borrowing rule, allowing Indian companies involved in infrastructure improvement to borrow more money abroad

    • Read more
  • Infrared lie detector

    Rather than measure what are taken to be the symptoms of lying — increased heart and respiration rate, perspiration — new infrared detector measures brain activity

    • Read more
  • USPS to deploy IPv6-capable video surveillance

    The U.S. Postal Services wants to increase security inside the more than 40,000 post offices around the country; it will install IPv6-capable CCTV systems — complying with the federal government encouragment of agnecies to migrate to IPv6

    • Read more
  • FAST-certified trucker tries to smuggle drugs into U.S.

    The Free And Secure Trade (FAST) program allows truckers who drive back and forth across the U.S. border to pre-register with Customs, thus giving them the status of low-risk traveler; one FAST-certified driver used status to smuggle drugs

    • Read more
  • Treasury grants cannot be used for chemical detection

    The federal government told the Boston transit authority and other municipal transportation agencies that they cannot use anti-terrorism grants to install chemical threat detection systems at subway stations

    • Read more
  • Lockheed Martin team delivers first littoral combat ship to U.S. Navy

    Dealing with terrorist threats from the sea, and with other threats in the shallows, the Navy requires a different type of equipment, the and the littoral combat ship is part of the answer

    • Read more
  • Chinese dairies add organic base found in plastics and resins to products

    Lab tests in Hong Kong find that Chinese company’s dairy offerings, including milk, ice cream, and yogurt, were contaminated with melamine — an organic base usually found in plastics and resins, and banned in food

    • Read more
  • Colorado to remove Social Security numbers from public Web sites

    Colorado attorney general asks counties to remove documents containing Social Security numbers from public Web sites, saying that the “The availability of this information online increases the possibility of Colorado citizens becoming the victims of identity theft”

    • Read more
  • Senators skeptical about FBI's anthrax attacks conclusions

    Senators of both voice doubt about the FBI’s conclusion that Bruce Ivins was the sole culprit in the 2001 anthrax attacks; criticize the FBI for its handling of the case

    • Read more
  • China, INTERPOL celebrate security success during Summer Games

    The Summer Games and the Paralympics passed without any major security incident; China says this highlights the success of security efforts for the Games, in particular the collaboration between China and INTERPOL

    • Read more
  • « first
  • ‹ previous
  • …
  • 755
  • 756
  • 757
  • 758
  • 759
  • 760
  • 761
  • 762
  • 763
  • …
  • next ›
  • last »

More headlines

  • DHS restricts congressional visits to ICE facilities in Minneapolis with new policy
  • ICE more than doubled its workforce in 2025
  • The Trump administration is building a ‘national voter roll’, former DOJ lawyers warn
  • Cyber takes back seat to immigration in global threats hearing
  • UL Solutions withdraws as lead admin for FCC cyber label program amid probe into China ties
  • The data system behind key U.S. decisions is losing staff, funding and trust
  • After judge’s ruling, HHS authorized to resume sharing some Medicaid data with deportation officers
  • DHS deploys 2,000 federal agents to Minneapolis area to carry out ‘largest immigration operation ever’
  • Trump’s USAID pause stranded lifesaving drugs. Children died waiting.
  • Trump targeting of pro-Palestinian campus activists for deportation is unlawful, US judge rules
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Diversity as National Security: Why Retreating from DEI Risks Repeating Pre-9/11 Failures

    One of often overlooked lessons of the 9/11 intelligence failure is that diversity — linguistic, cultural, experiential — was not simply a “nice to have” in intelligence work. It was essential infrastructure. The absence of diversity in America’s national security workforce thus represented more than a demographic imbalance; it represented a structural blind spot.

    • Read more
  • Online Mobilization and Violence in the United States

    Even before the Charlie Kirk assassination, the United States was facing a resurgence of politically motivated violence that is deeply intertwined with the digital sphere. Extremists across the ideological spectrum exploit acts of violence to recruit followers, justify their ideologies, and sustain propaganda networks.

    • Read more
  • Nick Fuentes Is a Master of Exploiting the Current Social Media Opportunities for Extremism

    That the antisemitic white nationalist Nick Fuentes and his followers have managed to get what their 20th-century predecessors could not — widespread awareness and political influence — reveals how fringe ideologies operate differently today compared to the mid-20th century, when institutional gatekeepers –political parties, law enforcement, the media –could more effectively contain extremist movements.

    • Read more
  • White Nationalism Fuels Tolerance for Political Violence Nationwide

    Political violence is certainly not new in American society, but current patterns differ in key ways. We found that, today, white nationalism is a key driver of support for political violence –a sign that white nationalism poses substantial danger to U.S. political stability.

    • Read more
  • Political Violence Offers Extremist “Trigger Events” for Recruiting Supporters

    Extremists are exploiting political violence by using online platforms to recruit new people to their causes and amplify the use of violence for political goals. High-profile incidents of political violence are useful trigger events for justifying extremist ideologies and calls for retaliation.

    • Read more
  • Fake survey Answers from AI Could Quietly Sway Election Predictions

    Public opinion polls and other surveys rely on data to understand human behavior. New research reveals that artificial intelligence can now corrupt public opinion surveys at scale—passing every quality check, mimicking real humans, and manipulating results without leaving a trace.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies