Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Law Enforcement Technology

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • ShotSpotter Improves Detection and Response to Gunfire, but Doesn't Reduce Crime, Research Finds

    ShotSpotter gunfire detection technology has delivered as promised in terms of enabling police to quickly detect and respond to gunshots in two American cities, but the controversial technology has not translated into public safety gains.

    • Read more
  • Seeing Behind the Mask

    There is a need for face recognition to be able to “see behind the mask” for security and safety. Researchers discusses the potential of new software which will allow facial recognition to work despite the mask you use.

    • Read more
  • A New Way to Detect Radiation Involving Cheap Ceramics

    The radiation detectors used today for applications like inspecting cargo ships for smuggled nuclear materials are expensive and cannot operate in harsh environments, among other disadvantages. Work by MIT engineers could lead to plethora of new applications, including better detectors for nuclear materials at ports.

    • Read more
  • Cops Running DNA-Manufactured Faces Through Face Recognition Is a Tornado of Bad Ideas

    In keeping with law enforcement’s grand tradition of taking antiquated, invasive, and oppressive technologies, making them digital, and then calling it innovation, police in the U.S. recently combined two existing dystopian technologies in a brand new way to violate civil liberties.

    • Read more
  • European Court of Human Rights Confirms: Weakening Encryption Violates Fundamental Rights

    In a milestone judgment—Podchasov v. Russia—the European Court of Human Rights (ECtHR) has ruled that weakening of encryption can lead to general and indiscriminate surveillance of the communications of all users and violates the human right to privacy.

    • Read more
  • Science Fiction Meets Reality: New Technique Overcome Obstructed Views

    Using a single photograph, researchers created an algorithm that computes highly accurate, full-color three-dimensional reconstructions of areas behind obstacles – a concept that can not only help prevent car crashes, but help law enforcement experts in hostage situations, search-and-rescue and strategic military efforts.

    • Read more
  • Charting the Future of Maritime Security

    The United States is a maritime nation surrounded by 95,000 miles of shoreline. Changes in economics, geopolitics, society, demography, or other factors, pose varied and evolving threats to the country’s maritime space – its waterways, ports of entry, and coastline borders.

    • Read more
  • Police Departments Are Turning to AI to Sift Through Millions of Hours of Unreviewed Body-Cam Footage

    Body camera video equivalent to 25 million copies of “Barbie” is collected but rarely reviewed. Some cities are looking to new technology to examine this stockpile of footage to identify problematic officers and patterns of behavior.

    • Read more
  • How Chicago Became an Unlikely Leader in Body-Camera Transparency

    The city has a long history of brutal, violent policing, but its latest approach to body-worn cameras and police oversight could serve as a national model.

    • Read more
  • The Hidden Cost of Being Branded a Terrorist by the U.S. Government

    The FBI credits its Terror Watchlist with keeping the country safe, but critics point to the experience of thousands of innocent American Muslims who were swept up by a screening system, and then found themselves trapped in a Kafkaesque nightmare as they tried to clear their names. The watchlist currently contains nearly two million names, of which about 15,000 are U.S. citizens and permanent residents.

    • Read more
  • Leveraging Artificial Intelligence in Explosives, Narcotic Detection

    DHS S&T is applying emerging technologies in the development of artificial intelligence / machine learning technologies – and searching for ways to use these technologies to identify dangerous compounds, like those found in explosives and narcotics.

    • Read more
  • Utah Supreme Court Upholds Right to Refuse to Tell Cops Your Passcode

    The Utah Supreme Court ruled that prosecutors violated a defendant’s Fifth Amendment privilege against self-incrimination when they presented testimony about his refusal to give police the passcode to his cell phone. The Utah court’s opinion is the latest in a thicket of state supreme court opinions dealing with whether law enforcement agents can compel suspects to disclose or enter their passwords.

    • Read more
  • What if Law Enforcement Could ‘See’ Through Walls?

    New technology allows law enforcement to easily and safely identify whether any individuals are inside a room when direct line-of-sight is not an option. This is especially critical when conducting breaching operations, searching for trafficked individuals or in potential hostage situations, where the device gives responders precious intelligence and situational awareness while reducing the risk of physical harm to themselves.

    • Read more
  • Preparing U.S., Partners for Radiological Response

    After the September 11th attacks, security professionals worried that terrorists might detonate a “dirty bomb” – an explosive device enhanced with radiological source materials. Responders for this type of event had to be trained.

    • Read more
  • EFF to Supreme Court: Fifth Amendment Protects People from Being Forced to Enter or Hand Over Cell Phone Passcodes to the Police

    The Electronic Frontier Foundation (EFF) last week asked the Supreme Court to overturn a ruling undermining Fifth Amendment protections against self-incrimination and find that constitutional safeguards prevent police from forcing people to provide or use passcodes for their cell phones so officers can access the tremendous amount of private information on phones.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • The FBI and other agencies are using polygraphs to find leakers. But do they work?
  • How Behavioral Threat Assessment and Management Teams Make American Communities Safer
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • WATCH: AI's Role at DHS with Gary Barber, Matthew Ferraro
  • Senators Press DHS for Details on GPS Jamming Protections
  • How AI found a missing girl — and what DHS is worried about
  • Aimed at Protests, Surveillance Contractor’s New Owners Expand Spy Tech Portfolio
  • Congress aims to strip 'Trojan horse' Chinese drones from all levels of government
  • Alumni of Human Identification Lab Attest to Its Influence
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies