Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Law Enforcement

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Edged weapon defenses in extremely close proximity

    Defending against an edged weapon is always difficult — even more so in small and confined spaces such as elevators or bathrooms; often injury cannot be avoided, only minimized

    • Read more
  • Barry Manilow as the ultimate weapon

    Two small cities — one in Australia, the other in New Zealand — found the perfect solution for hundreds of unruly youth who roam the cities’ malls, covering walls with graffiti, and disrupting commerce: Piping Barry Manilow’s music through the mall district

    • Read more
  • India's private security companies flourish

    As a result of the Mumbai attacks, the Indian private security industry has been growing by leaps and bounds; already the country’s private security force numbers 5 million, 1.3 million more than India’s police forces

    • Read more
  • Schneier: Perverse incentives drive bad security decisions

    Many security-related decisions are less than optimal because those who have to make the decisions face perverse incentives; in the post-9/11 era, we have to make sure the incentives driving security decisions are the right incentives

    • Read more
  • Intelligence, law enforcement face another hurdle: encrypted VoIP

    The intelligence community and law enforcement already are concerned about the difficult they have eavesdropping in Skype communications; a U.K. start-up is going to make life more difficult for them by encryption VoIP communications and concealing more conversations

    • Read more
  • EU may investigate VoIP eavesdropping

    Italian anti-crime authorities have asked the EU to look into regulating VoIP communication encryption; the Italian authorities presented evidence that crime rings and prostitution networks use Skype for the specific purpose of frustrating police investigators

    • Read more
  • Arresting me softly: NYPD to use Velcro handcuffs on kids

    NYPD approves Velcro handcuffs for use on unruly children; cuffs are gentler than the steel model, and safer than Taser guns

    • Read more
  • U.S. Army, law enforcement agencies, working on EMP grenades

    Electromagnetic pulse, or EMP, has been typically associated with high-altitude nuclear explosions — explosions which disable electronic devices hundreds of miles away from the explosion; militaries and law enforcement want a hand-grenade-size EMP device for use in war and crime-fighting

    • Read more
  • Trend: Manned-unmanned UAVs for battle, domestic surveillance

    In both military and domestic missions, there are situations in which UAVs are preferable, and other situations in which manned aircraft are preferable (or even required); the solution: manned UAVs

    • Read more
  • U.S. faces lethal combination of transnational terrorism and criminal gangs

    Sometime in the near future a lethal combination of transnational terrorism and criminal gangs is going to cross the U.S. border in force

    • Read more
  • More bad news for Taser guns: They raise deaths in custody

    University of California-San Francisco study finds that sudden death of people held by California police increased sixfold in the first year after police departments there began using Taser stun guns

    • Read more
  • Tampa authorities use a new Super Bowl security system

    The system uses a software program called E-SPONDER, which is built into Microsoft Surface, a tabletop, touch-screen display

    • Read more
  • Beyond fingerprints: The FBI's next generation database

    New, mammoth database will include not only enhanced fingerprint capabilities, but also other forms of biometric identification like palm prints, iris scans, facial imaging, scars, marks, and tattoos — in one searchable system

    • Read more
  • N.Y. policeman illegally obtains, uses U.S. terror watch-list information

    NYPD sergeant uses a colleague username and password to access the FBI terrorist watch-list; he then obtains information about an individual on the list — an individual locked in a child custody fight with a friend of the sergeant — and provide the information to the friend’s lawyer

    • Read more
  • New car-stopper uses squids' tentacle-based approach

    Looking for an answer to stop fleeing cars or suicide trucks hurtling toward their target, an Arizona company developed a tentacle-based device that ensnares the vehicle and brings it to a halt

    • Read more
  • « first
  • ‹ previous
  • …
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • …
  • next ›
  • last »

More headlines

  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Trump gutted key research programs studying violence. Experts say it will come at a heavy cost
  • New Jersey mom sues Homeland Security, TSA for 'threat-tagging' over Facebook post
  • ICE agents detain Tufts University grad student after pro-Palestinian opinion piece
  • Why are Department of Homeland Security agents in masks arresting students?
  • Man Pardoned in Jan. 6 Riot Is Fatally Shot by Sheriff’s Deputy During Traffic Stop
  • Super Bowl safety plan will lift from the Taylor Swift playbook, law enforcement officials say
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Minnesota man arrested after allegedly threatening to 'shoot up' synagogue
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report

    There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.

    • Read more
  • Twenty-One Things That Are True in Los Angeles

    To understand the dangers inherent in deploying the California National Guard – over the strenuous objections of the California governor – and active-duty Marines to deal with anti-ICE protesters, we should remind ourselves of a few elementary truths, writes Benjamin Wittes. Among these truths: “Not all lawful exercises of authority are wise, prudent, or smart”; “Not all crimes require a federal response”; “Avoiding tragic and unnecessary confrontations is generally desirable”; and “It is thus unwise, imprudent, and stupid to take actions for performative reasons that one might reasonably anticipate would increase the risks of such confrontations.”

    • Read more
  • Luigi Mangione and the Making of a ‘Terrorist’

    Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”

    • Read more
  • Are We Ready for a ‘DeepSeek for Bioweapons’?

    Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”

    • Read more
  • How DHS Laid the Groundwork for More Intelligence Abuse

    I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies