Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Infrastructure

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • TSA finds most railroad security measures inadequate

    $7 million study finds advanced explosives and screening methods suffer high false positive rates; yet traditional methods such as X-rays and canines suffer from poor economies of scale; study may upset congressional plans to boost railroad security spending

    • Read more
  • RAND lists thirty-nine options for mall security

    Shopping centers seen as a tempting terrorist target; RAND recommends vehicle barriers, bag and coat searches, and information campaigns; implementing procedures claimed to reduce risk 95 percent

    • Read more
  • The virtue of security syndication // by Ilan Meller

    In addition to doing everything they can to make themselves more secure, individual organizations may enhance their security by forming a security syndicate with other organizations for the purpose of sharing security-related information; with more organizationas sharing more terror-related “dots,” it may be possible to connect these dots more effectively to form a larger, clearer threat picture

    • Read more
  • MIT students invent wall crawling device

    Intended for first responders, the Atlas Powered Rope Ascender uses the capstan effect to pull a firefighter carrying one hundred pounds of equipment up a thirty-story building in thirty seconds; students have already sold units to Army and look to commercialize

    • Read more
  • Vista fails to make the antivirus grade

    Virus Bulletin puts Microsoft’s LiveOneCare to the test; it fails, along with antivirus software from McAfee and GDATA; criticism mounts about Vista’s ability to handle the WildList

    • Read more
  • Immunity offers a portable hacking device for penetration testing

    Nokia 770 tablet device is intended for companies to conduct their own white hat operations; tester turns on the $3,600 device, sticks it in his pocket, and waits to see whether his local wireless network is exploitable

    • Read more
  • Defense Information Systems Agency budgets $959 million for IT security

    As DoD prepares to sign a cybersecurity pact with NATO, DISA tries to get its own house in order; $819 million for operations and maintenance and $140 million for procurements; plans to improve defense of SIPRNET, develop a risk management system

    • Read more
  • DoD and NATA to sign cybersecurity pact

    National Cyber Response Coordination Group sees a great benefit to dealing with a single NATO cybersecurity agency, rather than working bilateralluy with twenty-six nations; Eastern European hackers a major concern

    • Read more
  • Javelin finds ID theft on the decline

    Survey finds a 12 percent drop in the overall cost of ID theft nationwide; 500,000 fewer victims; teenagers a growing target due to social networking and music sites

    • Read more
  • DHS offers infrastructure protection course

    It is one thing for a committee of experts to write lengthy and detailed plans on how to protect the nation’s critical infrastructure, and it is another thing to have these plans implemented effectively by thousands of government and private sector organizations; DHS offers a Web-based course which will help the relevant people to do so

    • Read more
  • Private sector responsible for infrastructure protection planning

    The U.S. government has a role to play in contingency planning for protecting critical infrastructure; security experts and government officials agree, though, that businesses should be self-sufficient when it comes to coping with emergencies; “The government is not going to save you,” said a former DHS official

    • Read more
  • Uniform European critical infrastructure protection policy a step closer

    It is not easy to fashion a coherent and unfirom critical infrastructure protection policy for an organization with more than a dozen sovereign nation states; the EU is moving a step closer to achieving this goal

    • Read more
  • Network security: A practical approach by Ilan Meller

    Location-based and time-based measures breach physical and logical security of organizational networks

    • Read more
  • Procera new data intrcepting solution meets CALEA new requirement

    What with the firestorm over the NSA domestic eavesdroping campaign, broadband providers have a 14 May deadline to allow law enforcement agencies to intercept and capture suspicious data transmission without compromising the privacy of innocent cstomers; a California company comes up with a solution

    • Read more
  • Marines in Iraq demand LE System's laser-based crowd control system

    Dazzler creates a wall of blinding green light that forces drivers away from senstive areas; while the brass favor a B.E. Meyers-produced device, the troops on the ground prefer LE; safety officials put their foot down

    • Read more
  • « first
  • ‹ previous
  • …
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • …
  • next ›
  • last »

More headlines

  • Cyber congressman demands answers before CISA gets cut down to size
  • AI's thirst for power keeps coal fires burning bright
  • CISA advisory committee approves four draft reports on critical infrastructure resilience
  • Hurricane Helene brought devastation — and an opportunity — to Appalachia’s power grids
  • Researchers propose hydrogen storage using existing infrastructure in lakes and reservoirs
  • DHS warns of escalating threats to US critical infrastructure in 2025 Homeland Threat Assessment
  • US wastewater tests show bird flu virus limited to areas with farm animals
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • China has a ‘near monopoly’ on many critical minerals. JPMorgan says it could be the next battleground with the U.S.
  • Is the nation’s water supply safe from attack?
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Helping Strengthen America’s Critical Infrastructure

    Everyday life depends on a robust infrastructure network that provides access to running water, communications technology and electricity, among other basic necessities. The experts who keep our national infrastructure secure and resilient also need a strong network to share their knowledge and train the next generation of professionals capable of solving complex infrastructure challenges.

    • Read more
  • AI and the Future of the U.S. Electric Grid

    Despite its age, the U.S. electric grid remains one of the great workhorses of modern life. Whether it can maintain that performance over the next few years may determine how well the U.S. competes in an AI-driven world.

    • Read more
  • Using Liquid Air for Grid-Scale Energy Storage

    New research finds liquid air energy storage could be the lowest-cost option for ensuring a continuous power supply on a future grid dominated by carbon-free but intermittent sources of electricity.

    • Read more
  • Enhanced Geothermal Systems: A Promising Source of Round-the-Clock Energy

    With its capacity to provide 24/7 power, many are warming up to the prospect of geothermal energy. Scientists are currently working to advance human-made reservoirs in Earth’s deep subsurface to stimulate the activity that exists within natural geothermal systems.

    • Read more
  • Experts Discuss Geothermal Potential

    Geothermal energy harnesses the heat from within Earth—the term comes from the Greek words geo (earth) and therme (heat). It is an energy source that has the potential to power all our energy needs for billions of years.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies