Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Infrastructure

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • North Korea argues it had no plan to enrich uranium for weapons

    Another potential embarrassment for U.S. intelligence: North Korea says it will prove that it never had the plans or the means to enrich uranium for nuclear weapons

    • Read more
  • FLIR expanding Gulf presence

    FLIR’s sensor technology, used in border protection and perimeter defense, among other applications, has won the company several hefty contracts in the Gulf region; company eager to build on its success

    • Read more
  • New York contests power transmission corridor ruling

    In April the Department of Energy designated a large swath of New York State part of a National Interest Electric Transmission Corridor; the state government challenges the designation

    • Read more
  • Book shows importance of geospatial technology in homeland security

    Geographic information system (GIS) technology proves to be of growing importance in protecting the nation from natural disasters, diseases, and terrorist threats

    • Read more
  • More tools for preplanning, premapping emergency response

    Emergency preparedness software gives first responders a better view of the rescue scene with new mapping technologies

    • Read more
  • Private equity firms focus on India's clean technology sector

    Several PE firms allocate investments in India’s clean technology sector from their general funds, but others create India-only funds to focus on the sector even more

    • Read more
  • FitzPatrick nuclear power station

    Upstate New York nuclear power plant shut down for the third time in two months owing to wind blowing debris into the plant’s water intake

    • Read more
  • China's heavy use of coal degrades global environment

    Worldwide demand for coal will rise by about 60 percent through 2030 — to 6.9 billion tons a year; China’s voracious appetite is the main culprit; environmental, health costs in China — and around the world — mount

    • Read more
  • Phononic computer processes information with heat

    In addition to electronic computers and (theoretical) optical computers, we now have heat-based computers; such computers are based on logic gates in which inputs and outputs are represented by different temperatures; in run-of-the-mill electronic computers, inputs and outputs are represented by different voltages

    • Read more
  • DHS relaxes chemical plant reporting rules

    In April DHS issues a list of 344 hazardous chemicals which businesses would have to track and disclose to the department through an online reporting system; under pressure from several industries, the list is reduced to 300, and reporting threshold of many chemicals of highest security concern raised

    • Read more
  • North Korea to dismantle nuclear weapon capability

    U.S. nuclear experts today begin supervising the North’s main nuclear complex at Yongbyon

    • Read more
  • Green endurance race across Africa

    An endurance car race in Africa in January will pit different alternative energy technologies against each other

    • Read more
  • Bush administration's nuclear waste reprocessing plan criticized

    Reprocessing spent nuclear fuel creates more fuel for nuclear plants, and reduces the need for nuclear waste storage; trouble is, reprocessing also creates weapons-grade plutonium; Bush administration believes there is a new, safer reprocessing method, but a panel of scientists says there is not, and until there is, the U.S. should continue to oppose reprocessing

    • Read more
  • IBM will spend $1.5 billion to improve computer security

    IBM’s security initiative would double IBM’s security spending; company says its IT security is becoming more difficult because of collaborative business models, sophisticated criminal attacks, and increasingly complex infrastructures

    • Read more
  • DARPA-funded UCSD research yields world's most complex phased array

    Tritons researchers develop world’s most complex phased array; the 16-element chip is just 3.2 by 2.6 square millimeters, can send at 30-50 GHz

    • Read more
  • « first
  • ‹ previous
  • …
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • …
  • next ›
  • last »

More headlines

  • Cyber congressman demands answers before CISA gets cut down to size
  • AI's thirst for power keeps coal fires burning bright
  • CISA advisory committee approves four draft reports on critical infrastructure resilience
  • Hurricane Helene brought devastation — and an opportunity — to Appalachia’s power grids
  • Researchers propose hydrogen storage using existing infrastructure in lakes and reservoirs
  • DHS warns of escalating threats to US critical infrastructure in 2025 Homeland Threat Assessment
  • US wastewater tests show bird flu virus limited to areas with farm animals
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • China has a ‘near monopoly’ on many critical minerals. JPMorgan says it could be the next battleground with the U.S.
  • Is the nation’s water supply safe from attack?
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Hacking the Grid: How Digital Sabotage Turns Infrastructure into a Weapon

    The darkness that swept over the Venezuelan capital in the predawn hours of Jan. 3, 2026, signaled a profound shift in the nature of modern conflict: the convergence of physical and cyber warfare. The blackout was the result of a precise and invisible manipulation of the industrial control systems that manage the flow of electricity. This synchronization of traditional military action with advanced cyber warfare represents a new chapter in international conflict, one where lines of computer code that manipulate critical infrastructure are among the most potent weapons.

    • Read more
  • Entity Resolution: The Security Technology You Probably Haven’t Heard Of

    The concept “entity resolution” (ER) is probably unfamiliar, but it underpins much of the world’s security—in telecommunications, banking and national security.

    • Read more
  • West Coast Levee Failures Show Growing Risks from America’s Aging Flood Defenses

    Across the U.S., levees are getting older while weather is getting more extreme. Many of these structures were never designed for the enormous responsibility they now carry.

    • Read more
  • Mexico and U.S. Look for New Deal in Long-Running Battle Over 80-year Old Water Treaty

    Mexico and the US’s growing dispute over water rights further complicates an already strained relationship that must tackle existing challenges related to drug trafficking, security, migration and trade wars. Water is just the latest issue to rise to the top of the tension table.

    • Read more

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies