Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Government

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • “A Catastrophic Blow”: U.S. Shuts Unit Investigating War Crimes in Ukraine

    Offering more support for Russia’s policy goals, the Trump administration has cut all funding for efforts to document and gather evidence on Russian war crimes committed in Ukraine. Experts described the administration’s move as a “a catastrophic blow” to efforts to document war crimes and bring people to justice.

    • Read more
  • Congress: Retake Control of Tariffs and Let Businesses Get Back to the “Vision Thing”

    The Trump administration’s recent tariff actions are undermining congressional authority and sowing chaos for U.S. businesses. Lawmakers should reassert their constitutional power to correct course.

    • Read more
  • After COVID, Texas Is Less Prepared for the Next Pandemic

    Five years after Texas’ first COVID death, the state spends less on public health, vaccination rates have dropped and a distrust of authority has taken hold.

    • Read more
  • Trump Is Using the Alien Enemies Act to Deport Immigrants – but the 18th-century Law Has Been Invoked Only During Times of War

    The Alien Enemies Act empowers presidents to apprehend and remove foreign nationals from countries that are at war with the United States. U.S. presidents have issued executive proclamations and invoked this law three times: during the War of 1812, World War I and World War II. All three instances followed Congress declaring war.

    • Read more
  • Could the EU Become a Military Superpower?

    Only two weeks after a European Union summit where the bloc’s leaders pledged to spend billions on defense in a “watershed moment for Europe,” they are returning to Brussels to solidify plans for strengthening Europe’s defense autonomy amid ongoing doubts about the US commitment to protecting European nations and sustaining military support for Ukraine.

    • Read more
  • South Korea Has Acted Decisively on DeepSeek. Other Countries Must Stop Hesitating

    South Korea has suspended new downloads of DeepSeek, and it was right to do so. Chinese tech firms operate under the shadow of state influence, misusing data for surveillance and geopolitical advantage. Any country that values its data and sovereignty must watch this national security threat and take note of South Korea’s response.

    • Read more
  • The Far-Reaching Impacts of Agricultural Biorisk Research

    There is a deep interconnection between agricultural biorisks and human health. It is critical that this perspective is brought to the forefront of policy and research discussions so that agricultural biorisks are prioritized as a threat to national security and receive the necessary research funding: .A summary of the USDA ARS 8th International Biosafety & Biocontainment Symposium.

    • Read more
  • Bookshelf: Technology, Globalization and Civilizational Decline

    Robert Kaplan’s new book paints a portrait of civilization in flux. Drawing insights from history, literature and art, he examines the effect of modern technology, globalization and urbanization on the decline of great powers and increasing domestic polarization.

    • Read more
  • Under What Circumstances Can a U.S. Green Card Be Revoked?

    The recent arrest of Palestinian activist and U.S. legal permanent resident Mahmoud Khalil, who played a prominent role in last year’s Columbia University protests over the war in Gaza, has prompted questions about the limits of a green card.

    • Read more
  • Bill Introduced to Ban Student Visas to Chinese Nationals

    U.S. Rep. Riley Moore, R-WV, filed a bill on Friday to ban Chinese nationals from receiving student visas. “Every year we allow nearly 300,000 Chinese nationals to come to the U.S. on student visas. We’ve literally invited the CCP to spy on our military, steal our intellectual property, and threaten national security,” he said.

    • Read more
  • The Rise and Fall of Terrorgram: Inside a Global Online Hate Network

    White supremacists from around the world used Telegram to spread hateful content promoting murder and destruction in a community they called Terrorgram. ProPublica and FRONTLINE identified 35 crimes linked to Terrorgram, including bomb plots, stabbings, and shootings. After several arrests of alleged Terrorgram members and reforms by Telegram, experts expect that extremists will find a new platform for their hate.

    • Read more
  • The Parallels Between Kash Patel and William J. Burns, a Scandal-Mongering 1920s FBI Director — an FBI Historian Explains

    As an FBI historian, I have researched political influence on the FBI. It’s still early days, but Kash Patel’s confirmation has one clear, if century-old, comparison in FBI history. It is not J. Edgar Hoover, but Hoover’s immediate predecessor, William J. Burns, who served as director from 1921 through 1924.With bogus charges and spurious probe, Burnsused the FBI to go after lawmakers who wanted to investigate the Teapot Dome Scandal. Trump’s and Patel’s own words portend the FBI returning to the open political targeting of the Teapot Dome era. History whispers a warning.

    • Read more
  • Amid Growing Numbers of Measles Cases, Chaos Continues at HHS

    While continuing to peddle alternative remedies to those suffering from measles, Secretary Kennedy also did an interview in which he implied that contracting measles is better than being vaccinated for it. Unfortunately for Kennedy – and those who have contracted the disease — vitamin A and cod liver oil are not going to cut it in responding to this expanding outbreak.

    • Read more
  • Is “Fake” Terrorism Still Terrorism? Here’s What the Sydney Caravan Incident Tells Us

    The recent discovery of a caravan full of explosives in Dural, in Sydney’s northwest, caused significant fear about the possibility of a mass casualty attack. The Australian Federal Police declared it and 14 antisemitic attacks a “con job” by organized criminals who were trying to distract police or use it as a bargaining chip to influence prosecutions. Can “fake” terrorism still be terrorism, especially if it causes significant fear?

    • Read more
  • From Home to Horror: The Association Between Domestic Violence and Terrorism

    Domestic violence is an under-recognized early indicator of terrorism. It is not a reliable solitary indicator, but when observed alongside risk factors, it can prompt authorities to take a closer look at a potential terrorist.

    • Read more
  • « first
  • ‹ previous
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • …
  • next ›
  • last »

More headlines

  • Trump 2026 Budget Plan Boosts Defense, Homeland Security
  • Another cybersecurity False Claims Act settlement
  • Trump wants $1 trillion for Pentagon
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • Trump’s use of Alien Enemies Act for swift deportations is illegal, Trump-appointed judge rules
  • DOGE Cuts Off Funds to Congressionally Mandated National Security Centers
  • The FBI and other agencies are using polygraphs to find leakers. But do they work?
  • US judge limits Trump's ability to swiftly deport migrants held at Guantanamo Bay
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • White House proposes sanctions, directs DHS to investigate immigration attorneys
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Kinetic Operations Bring Authoritarian Violence to Democratic Streets

    Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.

    • Read more
  • Patriots’ Day: How Far-Right Groups Hijack History and Patriotic Symbols to Advance Their Cause, According to an Expert on Extremism

    Extremist groups have attempted to change the meaning of freedom and liberty embedded in Patriots’ Day — a commemoration of the battles of Lexington and Concord – to serve their far-right rhetoric, recruitment, and radicalization. Understanding how patriotic symbols can be exploited offers important insights into how historical narratives may be manipulated, potentially leading to harmful consequences in American society.

    • Read more
  • Trump Aims to Shut Down State Climate Policies

    President Donald Trump has launched an all-out legal attack on states’ authority to set climate change policy. Climate-focused state leaders say his administration has no legal basis to unravel their efforts.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies