Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Infrastructure protection

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • L-3 travels south

    Mexico moves to comply with ICAO’s baggage screening requirements

    • Read more
  • UAVs to protect US airports

    DHS chooses an unexpected technology for its counter-MANPAD effort; but is it safe?

    • Read more
  • States choose their own paths in regulating RFID

    HID Global’s Kathleen Carroll takes on lawmakers in California, Massachusetts, and New Hampshire; Golden State legislators want to force full technical disclosure to consumers

    • Read more
  • IndigoVision cameras to protect new Canada light rail system

    $2 billion effort to protect Vancouver’s Canada Line will deploy 400 analog cameras; signals will be converted into MPEG-4 format for transmission to an eighty screen command center

    • Read more
  • Delta Scientific enters the secure mail sorting business

    Company ships its first BioBooth to a U.S. embassy in Europe; prefabricated building offers ample space for storing and state of the art decontamination tools; if an attack occurs, booth can be quickly sealed and moved off premises

    • Read more
  • UC Davis scientists use bacteria to fight earthquake liquification

    Application of Bacillus pasteurii during or after construction creates a shell of calcium carbonate around sand grains; approach avoids use of dangerous chemicals; funding required for larger studies

    • Read more
  • Duke students invent "wisdom door"

    System uses nine sensors to measure height, weight, and girth; passing through the door can activate any number of responses, including home entertainment preferences; tandem use with RFID envisioned

    • Read more
  • DHS to offer $1-2 million in tunnel-sensing technology

    Concerned about illegal immigration, government asks private sector for a solution; sensors, IT, and geospatial imaging to play a role; temperature differences between soil within the tunnel and without may be a key indicator

    • Read more
  • Delta to install vehicle barriers at U.S. embassies worldwide

    Shallow foundation system to be deployed to China, Austria, Saudia Arabia, and various cities in Germany, among others; more than 1,000 have already been sold; U.S. Air Force plans to use same to protect all of its bases around the world

    • Read more
  • India dumps airport Backscatter machine

    Revealing images upset socially conservative security guards; cultural values often underappreciated by security officials

    • Read more
  • TSA finds most railroad security measures inadequate

    $7 million study finds advanced explosives and screening methods suffer high false positive rates; yet traditional methods such as X-rays and canines suffer from poor economies of scale; study may upset congressional plans to boost railroad security spending

    • Read more
  • RAND lists thirty-nine options for mall security

    Shopping centers seen as a tempting terrorist target; RAND recommends vehicle barriers, bag and coat searches, and information campaigns; implementing procedures claimed to reduce risk 95 percent

    • Read more
  • The virtue of security syndication // by Ilan Meller

    In addition to doing everything they can to make themselves more secure, individual organizations may enhance their security by forming a security syndicate with other organizations for the purpose of sharing security-related information; with more organizationas sharing more terror-related “dots,” it may be possible to connect these dots more effectively to form a larger, clearer threat picture

    • Read more
  • MIT students invent wall crawling device

    Intended for first responders, the Atlas Powered Rope Ascender uses the capstan effect to pull a firefighter carrying one hundred pounds of equipment up a thirty-story building in thirty seconds; students have already sold units to Army and look to commercialize

    • Read more
  • DHS offers infrastructure protection course

    It is one thing for a committee of experts to write lengthy and detailed plans on how to protect the nation’s critical infrastructure, and it is another thing to have these plans implemented effectively by thousands of government and private sector organizations; DHS offers a Web-based course which will help the relevant people to do so

    • Read more
  • « first
  • ‹ previous
  • …
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • …
  • next ›
  • last »

More headlines

  • Flood sensors give Montgomery Co. new way to track water levels remotely
  • 100 day cybersecurity resilience plan for water and wastewater sector
  • Water, schools, among major concerns for Utah earthquake commission
  • MyShake early warning app ready for Seattle earthquake alerts
  • What CISA Incident Response Playbooks Mean for Your Organization
  • SolarWinds hackers targeted Autodesk in latest confirmed fallout from cyber-espionage campaign
  • Computer scientist warns global internet is not prepared for a large solar storm
  • TSA Issues Second Security Directive for "Critical" Pipelines and LNG Facilities and Plans to Revise Pipeline Cybersecurity Guidelines
  • What TSA's New Cybersecurity Standards Mean For Pipelines
  • Using SOCs and Cybersecurity Hubs to Prioritize Security Operations in a Critical Era
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Preparing National Security Officials for the Challenges of AI

    Artificial intelligence (AI) is one of several rapidly emerging technologies that promise to disrupt not only multiple sectors of the U.S. economy but also the manner in which the U.S. government carries out its foundational responsibility to protect national security consistent with the rule of law and constitutional values. Steve Bunnell writes that “The United States’ national security apparatus is not known for nimbleness, nor is the law that governs it. When it comes to AI, the risk is not just that our generals will fight tomorrow’s war with yesterday’s strategy but also that the United States will lack the legal and policy guardrails that are essential to a lawful, accountable, and ethical protection of the nation’s security.”

    • Read more
  • Food Production Vulnerable to Cyberattacks

    Wide-ranging use of smart technologies is raising global agricultural production but cyber experts warn this digital-age phenomenon could reap a crop of another kind – cybersecurity attacks.

    • Read more
  • The "Rock-to-Metal Ratio" of Critical Minerals

    A new metric to quantify the amount of waste rock generated by mining for minerals essential to 21st century society has been created by the U.S. Geological Survey and Apple.

    • Read more
  • Challenges to Tidal Flats Pose Risks to 41M Americans Living in Coastal Counties

    About 29 percent of the United States’ population live in coastline counties – more than 41 million are in Atlantic counties. This high population density poses a critical challenge to sustainable developments in coastal areas.

    • Read more
  • Boosting Efforts to Predict Harmful Solar Weather Events

    When big blasts of energy from the sun envelop the Earth, they can very strong: a 2015 event so weakened Earth’s protective magnetic field that it penetrated to the atmosphere, posing a threat to everything from circling space station astronauts to delicate electronics and communication systems.

    • Read more
  • Mitigating Flood Disasters

    Engineers have proposed a flood control measure which recommends designing permeable pavements to specifically suit local rainfall and soil conditions and reduce flood impacts.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies