Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Infrastructure

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Vidsys, Objectvideo partner to offer security information solution

    Integration of ObjectVideo’s intelligent analytics with VidSys’ Physical Security Situation Management software would improve response by connecting intelligent monitoring to quick investigation

    • Read more
  • New material can find a needle in a nuclear waste haystack

    Nuclear power has advantages, but it also comes with a big problem: Nuclear waste; making nuclear power viable long term requires discovering new solutions to radioactive waste disposal and other problems

    • Read more
  • U.K. government lost more than 1,000 laptops in recent years

    The worries about how the U.K. government protects sensitive data continue: A report to parliament admits that the government has lost or had stolen more than 1,000 laptops in recent years

    • Read more
  • iRobot brings robotic WLAN to urban battlefield

    Everything you want a robot to be: Portable, small, inexpensive, intelligent, and robust; iRobot will develop robots to serve as relay node for urban battle-field WLAN

    • Read more
  • Where the wind is

    Seattle company issues the world’s first global wind map, showing where wind is powerful enough to justify building wind energy farms; more than 40 percent of the world’s land mass has wind speeds at more than 6 meter per second (the minimum for effective generation), even though some of that land is not accessible for commercial development

    • Read more
  • Resistance to a U.K. hedge fund's effort to control CSX

    Ever since the 2006 Dubai Ports World’s takeover of management operations in major U.S. seaports, Congress has shown increasing irritation with attempts by foreign companies to own U.S. critical infrastructure assets; there is a growing resistance in Congress to U.K.-based TCI to take control of rail operator CSX

    • Read more
  • San Antonio International Airport designated "first landing" airport

    The new status will allow private aircraft coming into the United States from foreign countries to fly directly to the airport and clear customs; boon to local businesses

    • Read more
  • Singapore embarks on water reclamation project

    Singapore suffers increasing water shortages; the country’s Public Utility Board (PUB) has joined with two specialists in the field in a joint development of wastewater reclamation technologies using separation membranes

    • Read more
  • Banking security measures can tackle terrorism and terrorist financing

    Mobile phones can be part of the banks’ security to prevent terrorist financing through fraud, but it can also be a direct tool in the pursuit of homeland security

    • Read more
  • VCs invest $3 billion in clean tech in 2007

    VCs investment in clean tech in 2007 increased 43 percent over similar investments in 2006; U.S.-based companies received $2.52 billion, or 83 percent of the total, in 159 clean-tech deals

    • Read more
  • Uniloc offers StrongPoint to protect critical infrastructure

    U.S. critical infrastructure is controlled by Supervisory Control and Data Acquisition (SCADA) networks; in the innocent pre-9/11 years, emphasis had been placed on performance, reliability, and safety, leaving these networks prone to attack; Uniloc shows physical device “fingerprint”-based solution to make SCADA networks more secure

    • Read more
  • Chevron, Weyerhaeuser to develop fuels from non-food sources

    Using food crops such as corn to produce fuel may not be such a good idea after all, as the contribution to pushing up the price of corn-based fuel would likely be greater than the contribution to reduce oil dependence or clean up the environment; two companies offer a way out

    • Read more
  • Planning ahead in Scotland

    Building infrastructure — roads, bridges, tunnels, dams — is expensive; Abertay University Ph.D. student develops virtualization software which allows infrastructure planners to produce 3D models of developments before a single brick is laid

    • Read more
  • Storing wind energy in batteries

    Integrating variable wind and solar power production with the needs of the power grid is a major problem of these two alternative sources of energy; a Minnesota company will test technology to to store wind energy and move it to the electricity grid when needed

    • Read more
  • Maryland leaders worry about shift in DHS priorities after elections

    Because of its proximity to the nation’s capital, the Baltimore metro area and Washington suburbs are particularly vulnerable to terrorist activity, Maryland leaders say; they want attention to security increased, not decreased

    • Read more
  • « first
  • ‹ previous
  • …
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • …
  • next ›
  • last »

More headlines

  • Cyber congressman demands answers before CISA gets cut down to size
  • AI's thirst for power keeps coal fires burning bright
  • CISA advisory committee approves four draft reports on critical infrastructure resilience
  • Hurricane Helene brought devastation — and an opportunity — to Appalachia’s power grids
  • Researchers propose hydrogen storage using existing infrastructure in lakes and reservoirs
  • DHS warns of escalating threats to US critical infrastructure in 2025 Homeland Threat Assessment
  • US wastewater tests show bird flu virus limited to areas with farm animals
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • China has a ‘near monopoly’ on many critical minerals. JPMorgan says it could be the next battleground with the U.S.
  • Is the nation’s water supply safe from attack?
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Data Centers’ Insatiable Demand for Electricity Will Change the Entire Energy Sector

    When the first large language models were unleashed, it triggered a headache for authorities around the world as they tried to figure out how to satisfy data centers’ endless demand for electricity.

    • Read more
  • Will Texas Actually Run Out of Water?

    You asked our AI chatbot about Texas’ water supply. We answered some of the questions that it couldn’t.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies