Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Infrastructure protection

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • U.S. critical infrastructure security response system is broken

    Since its inception, DHS has urged states and cities to establish Fusion Centers to collect information from power companies and water utilities about infrastructure-related incidents with national security implications. There are now seventy-two Fusion Centers in the United States. A recent confusion about the causes of disruption of an Illinois water utility pump raised question about the effectiveness of the Fusion Center information collection and reporting system.

  • U.K. unveils new cyber defense strategy

    The U.K. government last week published its new Cyber Security Strategy; the government said the new strategy sets out “how the United Kingdom will support economic prosperity, protect national security, and safeguard the public’s way of life”

    • Read more
  • House Intelligence panel investigates Chinese telecom giants

    As Chinese telecom giants Huawei Technologies Co. and ZTE Corp continue to eye the lucrative American market, they have come under increasing scrutiny from U.S. lawmakers who fear their technology could be used by Chinese hackers to steal U.S. secrets; the two Chinese companies are now the subject of a House Intelligence Committee investigation aimed at determining whether they are a threat to the United States

    • Read more
  • Sector Report for Monday, 28 November 2011: Infrastructure protection

    This report contains the following stories.

    • * Pentagon confirms policy of military response to cyberatacks
    • * U.K. banks pass cyberdefense stress test
    • * Hackers fail in AT&T cyberattack
    Read more
  • DHS: Hackers did not cause Illinois water pump to fail

    Cybersecurity experts and critical infrastructure operators can rest a bit easier now that DHS investigators have determined there is nothing to suggest that hackers caused a water pump to fail in Springfield, Illinois

    • Read more
  • Pentagon confirms policy of military response to cyberatacks

    In a Pentagon report recently made public, the U.S. military confirmed that it would launch physical strikes in response to cyberattacks

    • Read more
  • U.K. banks pass cyberdefense stress test

    To bolster cyberdefenses in the financial industry, U.K. banks recently took part in a stress test to determine their ability to cope with a cyberattack; eighty-seven banks took participated in the drill including Barclays, HSBC, and Royal Bank of Scotland

    • Read more
  • The increasing risks of GPS systems

    During a recent meeting of the National Space-Based Positioning, Navigation, and Timing (PNT) Advisory Board, participants described how U.S. infrastructure is increasingly at risk due to the widespread use of GPS systems and the presence of interdependencies between different sectors

    • Read more
  • Building design lessons from the Christchurch earthquake

    A leading infrastructure expert believes an assessment needs to be made of the level of “very rare” earthquake that needs to be considered in structural design, perhaps one with a 10,000 year return period or higher, rather than the 500 year return period that is commonly adopted for many buildings in Australia

    • Read more
  • DHS investigates attacks on New Jersey water supply

    DHS agents and local authorities in New Jersey are investigating a series of attacks on the West Milford water system; since July there have been more than fifteen attacks on local water and sewage facilities that in some instances have resulted in sewage flooding the street or losses in service all together

    • Read more
  • Cyber attacks on critical infrastructure reach U.S.

    Most of the U.S. critical infrastructure is run by computers which are connected to the Internet; this makes them susceptible to cyber attacks; a few days ago, the control system of a water pump in Illinois was taken over by a hacker’s remote command, and then deliberately destroyed; what critical infrastructure facilities will hackers – nerdy teenagers, terrorists, or intelligence operatives of other nations – target next?

    • Read more
  • Europe faces rare Earth metal shortages

    The EU’s ambitious low-carbon energy production goal depends on five technologies: nuclear, solar, wind, bio-energy, and carbon capture; these technologies, in turn, depend on rare Earth metals; the EU estimates that a large-scale deployment of only one of these technologies — solar energy — will require half the current world supply of tellurium and 25 percent of the supply of indium

    • Read more
  • Sector Report for Monday, 14 November 2011: Infrastructure protection

    This report contains the following stories.

    • * Nations could cripple U.S. with retaliatory cyberattack
    • * Smart grid security market to jump to $2 billion in 2016
    • * DARPA to boost cyber research spending by 50 percent
    • * Also noted

    Plus 1 additional story.

    Read more
  • Nations could cripple U.S. with retaliatory cyberattack

    Last week Richard Clarke, a top adviser to three presidents, sounded a dire warning that the United States should avoid going to war with other nations because its computer networks systems are so vulnerable to attack

    • Read more
  • Smart grid security market to jump to $2 billion in 2016

    Analysts project that spending on smart grid security will exceed $2 billion in the next five years; according to ABI Research’s report, titled “Smart Grid Security,” $590 million was spent on securing the smart grid in 2010 and by 2016 that number will rocket to $2 billion

    • Read more
  • « first
  • ‹ previous
  • …
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • …
  • next ›
  • last »

More headlines

  • Cyber congressman demands answers before CISA gets cut down to size
  • CISA advisory committee approves four draft reports on critical infrastructure resilience
  • DHS warns of escalating threats to US critical infrastructure in 2025 Homeland Threat Assessment
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • China has a ‘near monopoly’ on many critical minerals. JPMorgan says it could be the next battleground with the U.S.
  • Kansas would benefit by returning to Trump-era funding of election infrastructure needs
  • Cotton introduces bill to study cybersecurity risks for U.S. agriculture
  • CISA needs better collaboration with the EPA and water sector, watchdog says
  • DHS Unveils new Shields Ready campaign to promote critical infrastructure security and resilience
  • Israel and US government agencies announced the BIRD Cyber Program, an investment of roughly $4M in projects to enhance the cyber resilience of critical infrastructure
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies