Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Law Enforcement Technology

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • WMD Threat Sensors Deployed on Police Vehicles

    DARPA’s SIGMA+ program completed a 3-month test in Indianapolis, in which CBRNE sensors were deployed on IMPD vehicles.

    • Read more
  • U.S. Tightens Export Controls on Items Used in Surveillance of Private Citizens, other Malicious Cyber Activities

    The Commerce Department has released an interim final rule, establishing controls on the export, reexport, or transfer (in-country) of certain items that can be used for surveillance of private citizens or other malicious cyber activities. 

    • Read more
  • Weapons-Detection Algorithm Studied at Las Vegas International Airport

    This summer, DHS S&T demonstrated a new advanced algorithm to better detect non-explosive weapons like guns, knives, and other items that are prohibited on commercial aircraft in a real-world setting at Las Vegas’ McCarran International Airport.

    • Read more
  • Surveillance Equipment: Scrutiny Necessary for the Police, Manufacturers

    Facial recognition, body cameras and other digital technologies are increasingly used by police departments, municipalities and even gated communities, but these tools, manufactured by private companies, raise the specter of unchecked surveillance.

    • Read more
  • Calif. Sheriff Sued for Sharing Drivers’ License Plate Data With ICE, CBP, Other Out-of-State Agencies

    License plate scans occur through Automated License Plate Readers (ALPRs): high-speed cameras mounted in a fixed location or atop police cars moving through the community that automatically capture all license plates that come into view, recording the exact location, date, and time that the vehicle passes by. The information can paint a detailed picture of our private lives, our daily schedules, and our social networks.

    • Read more
  • Forensic Analysis of Lipstick Trace

    Forensic scientists find a new way of identifying brands of lipstick at a crime scene without removing evidence from its bag.

    • Read more
  • Detecting, Identifying Small Drones in Urban Environment

    DHS has awarded $750K to a Texas company to develop a detection and tracking sensor system that can identify nefarious small unmanned aerial vehicles (UAV) in an urban environment.

    • Read more
  • An App for Safe Handling of Drones

    Nearly every day, U.S. Customs and Border Protection (CBP) agents come across drones that may have been used to facilitate the movement of illicit drugs or people across the southern border. These drones usually carry smuggled narcotics and often contain surveillance cameras; however, they could easily be modified to carry other threats or hazards.

    • Read more
  • What is Pegasus? Explaining How the Spyware Invades Phones and What It Does When It Gets In

    Pegasus is a spyware that can stealthily enter a smartphone and gain access to everything on it, including its camera and microphone. Pegasus is designed to infiltrate devices running Android, Blackberry, iOS and Symbian operating systems and turn them into surveillance devices.

    • Read more
  • Ban Use of Affective Computing in Federal Law Enforcement

    Affective computing uses algorithms to analyze bodies, faces, and voices to infer human emotion and state of mind. Even though there clearly needs to be more research done on this technology, law enforcement agencies are starting to experiment with it to extract information, detect deception, and identify criminal behavior. Alex Engler says that President Biden should ban affective computing before it starts to threaten civil liberties.

    • Read more
  • Imaging Tool under Development Reveals Concealed Detonators — and Their Charge

    A Sandia Lab researcher is working on building a new kind of neutron-based imaging system which will enable people to safely examine sealed metal boxes when opening them could be dangerous, whether this is because inside is an explosive weapon or a malfunctioning, high-voltage fire set at a missile range.

    • Read more
  • Ensuring Reliability of Air Cargo Screening Systems

    DHS, which is responsible for ensuring the security of air cargo transported to the United States, says the threat from explosives in air cargo remains significant. A new GAO report addresses how DHS secures inbound air cargo, and the extent to which TSA’s field assessment of a CT screening system included key practices for design and evaluation.

    • Read more
  • Deterring Terrorist Attacks in Sports Megaevents

    Large sports events – the Olympic Games, the Superbowl, the Soccer World Cup – are ideal targets for terrorists. What is the best method to identify the most effective defense measures to minimize the chances of a terrorist attack during a sports mega-event?

    • Read more
  • Pegasus Project Shows the Need for Real Device Security, Accountability and Redress for those Facing State-Sponsored Malware

    It is no surprise that people around the world are angry to learn that surveillance software sold by NSO Group to governments has been found on cellphones worldwide. People all around the world deserve the right to have a private conversation. Communication privacy is a human right, a civil liberty, and one of the centerpieces of a free society. And while we all deserve basic communications privacy, the journalists, NGO workers, and human rights and democracy activists among us are especially at risk, since they are often at odds with powerful governments.

    • Read more
  • Spyware: Why the Booming Surveillance Tech Industry Is Vulnerable to Corruption and Abuse

    The latest revelations about NSO Group’s Pegasus spyware are the latest indication that the spyware industry is out of control, with licensed customers free to spy on political and civilian targets as well as suspected criminals. We may be heading to a world in which no phone is safe from such attacks.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Alumni of Human Identification Lab Attest to Its Influence
  • Alabama Makes Plans to Gas Its Prisoners
  • US, Canada Deliver Armored Vehicles to Haitian Police
  • New records reportedly show Homeland Security buying smartphone data to track you
  • New documents reveal 'huge' scale of US government's cell phone location data tracking
  • DHS Opens Counter-Drone Testbed in Richmond
  • Lawmakers Question When Discarded U.S. Military Equipment is Used in Terror Attacks
  • Israeli firm develops body cams with facial recognition
  • DHS Begins Deploying Body Cameras for Some Border-Based Law Enforcement Personnel
  • Newark Is Installing Gunshot Detectors on Mostly Black Schools as City Shootings Rise
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • U.S. Reliance on Chinese Drones: A Sector for the Next CHIPS Act?

    More and more lawmakers from both parties are beginning to pay attention to the issue of drones and national security. Different bills seek to regulate federal agency procurement and use of certain foreign-made unmanned aircraft systems (UASs), or drones. Annie I. Antón and Olivia C. Mauger write that “Building on the bipartisan consensus to enact the 2022 Creating Helpful Incentives to Produce Semiconductors and Science (CHIPS) Act, there is a compelling case that UASs should be a next sector for similar action.”

    • Read more
  • PEGA Committee Votes on Spyware Recommendations

    In July 2021, the Pegasus Project—a consortium of 80 journalists from 17 media organizations in 10 countries—broke the story that several governments were using the Israel-made Pegasus spyware against journalists, activists, politicians, academics, and even heads of state. Responding to the public backlash, the European Parliament set up a committee of inquiry (PEGA committee) to investigate the allegations concerning misuse of spyware on the continent.

    • Read more
  • Enhanced Community Safety by Reimagining Gunshot Detection

    A new gunshot detection system delivers new capabilities that significantly improve the response and management of outdoor shootings. The portable system employs two methods of detection for increased accuracy and reduced false positives.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies