Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Law Enforcement

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • U.S. secret service forms three new task forces

    New task forces will deal with electronic crimes, and the agency says the partnerships will bring together law enforcement, academia, and private sector

    • Read more
  • Senate moves to tighten federal buildings security

    The GAO reported that undercover investigators were able to smuggle explosives-making materials into federal buildings, then assemble explosive devices — all without security guards being aware of what was taking place under their noses; the Congress is unhappy

    • Read more
  • U.K. government: Best cyber defense is cyber offense

    New National Security Strategy document includes, for the first time, a public cyber security strategy; unnamed high government source: “We don’t want to engage in cyber war but we can’t remain a target for criminals to take a pop at”

    • Read more
  • Lockheed Martin in management contract continuation of FBI database

    Lockheed martin wins $47 million, five-year contract to continue to manage the FBI’s criminal justice database; the contract calls for converting paper fingerprint, palm print, and photo records into high-quality electronic records for the FBI

    • Read more
  • Drug smuggling becomes more sophisticated, II

    Drug smugglers now use semi-submersibles which are 60 foot long and 12 feet wide fiberglass boats powered by a diesel engine, with a very low freeboard and a small “conning tower” providing the crew (usually of four) and engine with fresh air, and permitting the crew to navigate the boat

    • Read more
  • U.S. cybersecurity chief says there is a lucrative market in malware

    Philip Reitinger: “There is an entire community of people who are involved, organized crime is involved” in cybercrime underground market economy

    • Read more
  • Knives: Rescue tools or edged weapons?

    Few agencies have written policies regarding the use of knives as weapons; they need such policies, and they need training, because deploying a knife and cutting or stabbing another human being have significant ramifications to the officer; there are physical, psychological, and legal issues to consider

    • Read more
  • Texas cop uses Taser gun on 72-year old combative granny

    Kathryn Winkfein, 72, was stopped for doing 60 mph in a 45 mph zone; when she began to argue with the cop, he tased her

    • Read more
  • Technology to prevent police friendly-fire accidents "nonviable"

    Following a recent killing of a plain clothes policeman by fellow officers, the NYPD asked the Pacific Northwestern Laboratory to look into the possibility of developing a technology which would prevent such accidents in the future; PNL says such technology is currently nonviable

    • Read more
  • Drug traffickers turn to self-propelled semi-submersibles

    Trying to stay ahead of U.S. drug interdiction efforts, Colombian drug traffickers are looking to build remote-controlled SPSSs to smuggle drugs risk-free from Colombia into the United States

    • Read more
  • U.K. security services acted properly with the information they had

    Parliament’s Intelligence and Security Committee: “we cannot criticize the judgments made by MI5 and the police based on the information that they had and their priorities at the time”

    • Read more
  • NYPD looking for technology to prevent friendly fire

    The recent accidental shooting of a plain clothes policeman by fellow officers has prompted NYPD to seek technology to prevent friendly fire accidents; the Pacific Northwest National Laboratory will help

    • Read more
  • San Diego uses biometrics to identify and remove criminal aliens

    San Diego County Sheriff’s Department deputies are the first law enforcement unit in California to use DHS Secure Community program to receive biometric-based immigration information

    • Read more
  • Hardin, Montana, wants to take in Guantanamo prisoners

    Hardin, Montana (pop. 4,300) had a problem: it invested $27 million in a 464-bed modern prison facility which is standing empty; the city council offered to use it to house Guantanamo prisoners; Montana’s congressional delegation objects

    • Read more
  • Scientists unsure how Tasers work

    There is a growing interest in nonlethal weapon, and Taser stun devices are among the most heavily used — and researched — nonlethal systems; scientists are still unsure how, exactly, these devices achieve their stunning effect

    • Read more
  • « first
  • ‹ previous
  • …
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • …
  • next ›
  • last »

More headlines

  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Trump gutted key research programs studying violence. Experts say it will come at a heavy cost
  • New Jersey mom sues Homeland Security, TSA for 'threat-tagging' over Facebook post
  • ICE agents detain Tufts University grad student after pro-Palestinian opinion piece
  • Why are Department of Homeland Security agents in masks arresting students?
  • Man Pardoned in Jan. 6 Riot Is Fatally Shot by Sheriff’s Deputy During Traffic Stop
  • Super Bowl safety plan will lift from the Taylor Swift playbook, law enforcement officials say
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Minnesota man arrested after allegedly threatening to 'shoot up' synagogue
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report

    There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.

    • Read more
  • Twenty-One Things That Are True in Los Angeles

    To understand the dangers inherent in deploying the California National Guard – over the strenuous objections of the California governor – and active-duty Marines to deal with anti-ICE protesters, we should remind ourselves of a few elementary truths, writes Benjamin Wittes. Among these truths: “Not all lawful exercises of authority are wise, prudent, or smart”; “Not all crimes require a federal response”; “Avoiding tragic and unnecessary confrontations is generally desirable”; and “It is thus unwise, imprudent, and stupid to take actions for performative reasons that one might reasonably anticipate would increase the risks of such confrontations.”

    • Read more
  • Luigi Mangione and the Making of a ‘Terrorist’

    Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”

    • Read more
  • Are We Ready for a ‘DeepSeek for Bioweapons’?

    Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”

    • Read more
  • How DHS Laid the Groundwork for More Intelligence Abuse

    I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies