Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Infrastructure

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • L-1 buys Maryland's Advanced Concepts

    Robert LaPenta moves forward with the second phase of his acquisition strategy; network security and engineering firm expected to widen federal market access

    • Read more
  • $100 laptop for developing world poses IT security concerns

    Mesh network system could turn a small African village into the largest botnet in the world; program’s enemies aim at the “$100 brick”

    • Read more
  • Israel's Ministry of Transport criticized for wartime transport policy

    Government’s failure to declare a state of emergency during Lebanon war resulted in widespread operational failures at the ports

    • Read more
  • DHS plans back-up cross-agency data center

    Worries about the Eastern Interconnect prompt DHS to build a mirror site in the west; contracts to be awarded this summer

    • Read more
  • Gonzales ignores critics, focuses on identity theft

    Attorney General proposes a national information sharing system; presidential task force suggests national standards

    • Read more
  • Radio used to hack computer screens

    An updated version of Van Eck Phreaking finds laptops vulnerable to this disturbing hacking technique

    • Read more
  • DHS unveils CFATS-reporting Web site

    Companies must name those responsibile for fulfilling Chemical Facility Anti-Terrorism Standards

    • Read more
  • Puerto Rico market attracts IT companies

    Lucrative tax advantages and bilingual employees attract American companies; federal government awards $362 million in IT contracts

    • Read more
  • Enterprise VoIP Primer: The Secure Investment // by Daniel Zubairi, CISSP

    VoIP offers many advantages to the organizations deploying them, but the technology also brings with it vulnerabilities that must be addressed

    • Read more
  • U.K. Home Secretary warns of cyber attack

    John Reid said that al-Qaeda’s aim was to “bleed us to bankruptcy” by attempting to “cripple” financial markets

    • Read more
  • Library confidentiality law stymies sharing of CCTV footage

    Dirty old man may get away scot free after the Wisconsin attorney general rules that prosecutors need a warrant

    • Read more
  • Security upgrades delayed at LAX

    $342 million effort to install in-line baggage explosive system now said to cost $873 million; city feuds with feds over reimbursement

    • Read more
  • BlastGard reports revenue decline

    Despite its popular bomb-proof garbage cans, company fails to break $1 million in revenue; project delays to blame, says CEO

    • Read more
  • EU leaders worry about critical infratructure vulnerability

    Protecting the critical infrastructure in one country is complicated enough; EU leaders must coordinate such protection in more than two dozen member states

    • Read more
  • GD wins $6 biillion IWN contract

    GD leads a team of IT heavyweights to build a nationwide interoperable wireless network linking the Justice, Homeland Security, and Treasury departments

    • Read more
  • « first
  • ‹ previous
  • …
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • …
  • next ›
  • last »

More headlines

  • Cyber congressman demands answers before CISA gets cut down to size
  • AI's thirst for power keeps coal fires burning bright
  • CISA advisory committee approves four draft reports on critical infrastructure resilience
  • Hurricane Helene brought devastation — and an opportunity — to Appalachia’s power grids
  • Researchers propose hydrogen storage using existing infrastructure in lakes and reservoirs
  • DHS warns of escalating threats to US critical infrastructure in 2025 Homeland Threat Assessment
  • US wastewater tests show bird flu virus limited to areas with farm animals
  • Potential China Threats to U.S. Port Infrastructure Security: House Homeland Security Committee
  • China has a ‘near monopoly’ on many critical minerals. JPMorgan says it could be the next battleground with the U.S.
  • Is the nation’s water supply safe from attack?
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Hacking the Grid: How Digital Sabotage Turns Infrastructure into a Weapon

    By Saman Zonouz

    The darkness that swept over the Venezuelan capital in the predawn hours of Jan. 3, 2026, signaled a profound shift in the nature of modern conflict: the convergence of physical and cyber warfare. The blackout was the result of a precise and invisible manipulation of the industrial control systems that manage the flow of electricity. This synchronization of traditional military action with advanced cyber warfare represents a new chapter in international conflict, one where lines of computer code that manipulate critical infrastructure are among the most potent weapons.

    • Read more
  • Entity Resolution: The Security Technology You Probably Haven’t Heard Of

    By Kyle McCurdy

    The concept “entity resolution” (ER) is probably unfamiliar, but it underpins much of the world’s security—in telecommunications, banking and national security.

    • Read more
  • West Coast Levee Failures Show Growing Risks from America’s Aging Flood Defenses

    By Farshid Vahedifard

    Across the U.S., levees are getting older while weather is getting more extreme. Many of these structures were never designed for the enormous responsibility they now carry.

    • Read more
  • Mexico and U.S. Look for New Deal in Long-Running Battle Over 80-year Old Water Treaty

    By Natasha Lindstaedt

    Mexico and the US’s growing dispute over water rights further complicates an already strained relationship that must tackle existing challenges related to drug trafficking, security, migration and trade wars. Water is just the latest issue to rise to the top of the tension table.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies