Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Infrastructure

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • New distance record for quantum encryption

    Quantum encryption (or quantum key distribution [QKD]) holds the promise of unbreakable communication encryption; the technology has a weakness, though: the short distance of key distribution; researchers break distribution distance record by distributing keys over a distance of 250 kilometers (it may not look like much, but back in 1992 the record was 32 centimeters)

    • Read more
  • Houston computer forensics lab accredited

    Newly accredited Houston lab expands Regional Computer Forensics Laboratory Network (RCFL), a national network of sixteen FBI-sponsored digital forensics laboratories and training centers devoted entirely to the scientific examination of digital evidence in support of criminal investigations

    • Read more
  • GSA adds more cybersecurity software to SmartBuy program

    GSA estimates the contracts could be worth $20 million over five years

    • Read more
  • Congress wants FCC cyber security updates

    FCC among a list of eleven agencies which may have been affected by a 4 July service attack

    • Read more
  • Questions raised about cost of, need for new electricity grid

    A new national grid system for the United States would involve stringing 19,000 miles of high-voltage lines at a cost of$60 billion; some experts say this is too expensive — and unnecessary

    • Read more
  • Glass fibers can make a building sturdier

    Conventional means to reinforce concrete involve the use of steel bars; the use of fiber reinforced polymer (FRP) is emerging as a valuable option, owing to its natural resistance to corrosion, its high strength, light weight, transparency to electrical and magnetic fields and ease of manufacturing and installment

    • Read more
  • U.S. secret service forms three new task forces

    New task forces will deal with electronic crimes, and the agency says the partnerships will bring together law enforcement, academia, and private sector

    • Read more
  • Cyber crime bigwigs using big-business tactics

    Cisco cybercrime reports says “The novel thing is that [cybercriminals] have taken the Harvard Business School, General Electric board room business training and applied it to their old techniques”

    • Read more
  • SAIC acquires Atlan

    Large federal contractor acquires McLean, Virginia-based Atlan, a specialist in cybersecurity product testing and certification of FIPS 140-2 and 201 for product vendors

    • Read more
  • Competition between Symantec, McAfee intensifies

    With growing consumer awareness of cybersecurity threats, the competition between the two leading cybersecurity companies intensifies; McAfee has been lagging, but new leadership and willingness to take risks have improved its market position

    • Read more
  • Inkjet printer technology to be used in biosensors

    Researchers describe a method for printing a toxin-detecting biosensor on paper using a FujiFilm Dimatix Materials Printer; the method relies on a “lateral flow” sensing approach similar to that used in a home pregnancy test strip

    • Read more
  • Practical guides to disaster recovery planning in SMEs

    Gartner says that “40% of all SMBs will go out of business if they cannot get to their data in the first 24 hours after a crisis”; two papers aim to help SMBs prepare for disaster

    • Read more
  • Using cell phones to predict floods

    Researchers show that variations in microwave transmissions, specifically those used to connect up cell towers, can be used to measure humidity and thus predict flooding

    • Read more
  • Experts: local and regional approach better for addressing radioactive waste

    The Obama administration has stopped funding for the Yucca Mountain nuclear waste repository, so experts say it is now time for a regional and local approach to solving the nuclear waste problem

    • Read more
  • South Korea says cyber attackers used IP address in 16 nations

    South Korea’s intelligence agency — the NIS — said that the 4-8 July attacks on U.S. and South Korean Web sites and networks used 86 IP addresses in 16 countries; the NIS also briefed South Koran lawmakers on circumstantial and technical reasons for believing that North Korea could be behind the attacks

    • Read more
  • « first
  • ‹ previous
  • …
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • …
  • next ›
  • last »

More headlines

  • Cyber congressman demands answers before CISA gets cut down to size
  • AI's thirst for power keeps coal fires burning bright
  • CISA advisory committee approves four draft reports on critical infrastructure resilience
  • Hurricane Helene brought devastation — and an opportunity — to Appalachia’s power grids
  • Researchers propose hydrogen storage using existing infrastructure in lakes and reservoirs
  • DHS warns of escalating threats to US critical infrastructure in 2025 Homeland Threat Assessment
  • US wastewater tests show bird flu virus limited to areas with farm animals
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • China has a ‘near monopoly’ on many critical minerals. JPMorgan says it could be the next battleground with the U.S.
  • Is the nation’s water supply safe from attack?
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Virtual Models Paving the Way for Advanced Nuclear Reactors

    Computer models predict how reactors will behave, helping operators make decisions in real time. The digital twin technology using graph-neural networks may boost nuclear reactor efficiency and reliability.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies