Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Infrastructure protection

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Organizational security: Alion takes stock and offer remedies

    Organizations which take their security seriously want to evaluate continuously their security situation and security policies; often they also must see that they are in compliance with government security mandates; serious organizations should take a look at Alion’s CounterMeasures

    • Read more
  • 2007 Maritime Security Expo: Security challenges, business opportunities

    The U.S. maritime transportation system — ports, ships, warehouses, access roads — is vast and sprawling; securing this system offers many opportunities for security-related businesses for two reasons: It is essential to the welfare and national security of the United States, and many of its nodes are vulnerable to attack and disruption

    • Read more
  • Penn State researchers increase data transmission rate of copper cables

    Nittany Lions electrical engineers show it is possible to increase the data transmission of Category-7 copper cables used to connect computers to each other and the Internet

    • Read more
  • Chinese espionage "single greatest risk" to U.S. technology sector

    China’s disregard of intellectual property law is a matter of record; European governments are increasingly alarmed by Chinese intelligence engaging in massive industrial espionage campaign on behalf of Chinese companies; now, congressional panel warns of dire consequences to U.S. technology sector from sustained, sophisticated Chinese espionage campaign

    • Read more
  • U.K. uses new law to force hand-over of encryption keys

    In October 2007 Parliament passed a law allowing authorities to force people to hand over encryption keys to data stored on their private computers; an animal rights activist is among first to be ordered to hand over encryption keys for her computer, which was seized in May

    • Read more
  • U.S. power grid remains vulnerable

    As was the case with the chemical industry, the lobbyists for the utilities have blocked meaningful reform and left the North American power grid exceedingly vulnerable

    • Read more
  • More questions than answers in South Africa's nuclear facility attack

    What was the purpose of the two coordinated, “military-style” attacks on South Africa’s Pelindaba nuclear facility last week? The answer may lie in the facility’s history: Two decades ago the apartheid regime used it to produce six operational nuclear bombs; were the intruders after bomb-making records, blueprints, and computer files?

    • Read more
  • Britain launches broad homeland defense plan

    Gordon Brown offers details of new homeland defense initiative, increasing the security budget from £2.5 billion to £3.5 billion by 2011, placing emphasis on protecting venues where crowds gather; budget includes £400 million for fighting radicalization abroad

    • Read more
  • Major conference on illicit nuclear trafficking to open next week

    The IAEA next week will hold a major conference on illegal possession and illicit trafficking of nuclear materials; in 1995 the IAEA established the Illicit Trafficking Database; to date, it has received reports on approximately 1,250 incidents

    • Read more
  • Teenager drills a hole in ammonia pipeline, forcing evacuation

    Three teenagers believed money was hidden in 6-inch-diameter ammonia pipeline, so they drilled a hole in it; cloud of amonia forces evacuation, road closure

    • Read more
  • White House plans to weaken CFIUS security review powers

    DHS, Justice, the Pentagon, and the U.S. intelligence community oppose the merger of 3Com and Huawei Technology, arguing it will bolster Chinese military computer network attack operations; the White House plans to issue presidential order which would undermine the law designed to tighten security review of foreign companies, thus allowing the merger to go through

    • Read more
  • North Korea argues it had no plan to enrich uranium for weapons

    Another potential embarrassment for U.S. intelligence: North Korea says it will prove that it never had the plans or the means to enrich uranium for nuclear weapons

    • Read more
  • FLIR expanding Gulf presence

    FLIR’s sensor technology, used in border protection and perimeter defense, among other applications, has won the company several hefty contracts in the Gulf region; company eager to build on its success

    • Read more
  • New York contests power transmission corridor ruling

    In April the Department of Energy designated a large swath of New York State part of a National Interest Electric Transmission Corridor; the state government challenges the designation

    • Read more
  • Book shows importance of geospatial technology in homeland security

    Geographic information system (GIS) technology proves to be of growing importance in protecting the nation from natural disasters, diseases, and terrorist threats

    • Read more
  • « first
  • ‹ previous
  • …
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • …
  • next ›
  • last »

More headlines

  • Cyber congressman demands answers before CISA gets cut down to size
  • CISA advisory committee approves four draft reports on critical infrastructure resilience
  • DHS warns of escalating threats to US critical infrastructure in 2025 Homeland Threat Assessment
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • China has a ‘near monopoly’ on many critical minerals. JPMorgan says it could be the next battleground with the U.S.
  • Kansas would benefit by returning to Trump-era funding of election infrastructure needs
  • Cotton introduces bill to study cybersecurity risks for U.S. agriculture
  • CISA needs better collaboration with the EPA and water sector, watchdog says
  • DHS Unveils new Shields Ready campaign to promote critical infrastructure security and resilience
  • Israel and US government agencies announced the BIRD Cyber Program, an investment of roughly $4M in projects to enhance the cyber resilience of critical infrastructure
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Helping Strengthen America’s Critical Infrastructure

    Everyday life depends on a robust infrastructure network that provides access to running water, communications technology and electricity, among other basic necessities. The experts who keep our national infrastructure secure and resilient also need a strong network to share their knowledge and train the next generation of professionals capable of solving complex infrastructure challenges.

    • Read more
  • AI and the Future of the U.S. Electric Grid

    Despite its age, the U.S. electric grid remains one of the great workhorses of modern life. Whether it can maintain that performance over the next few years may determine how well the U.S. competes in an AI-driven world.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies