Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Law Enforcement

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • New Zealand to use biometrics to monitor immigration

    Technology will allow border control staff to conduct biometric checks on inbound and outbound passengers

    • Read more
  • New rules for private guards

    Some 1,000 security companies operate in Greece, employing 50,000 people and making 90 million euros a year; the Greek parliament wants to tighten control of these companies

    • Read more
  • New crime: Forged eye biometrics recognition stamps

    How accurate is iris scanning biometric technology? read on: Three individuals are arresed at the Dubai airport for smuggling forged eye biometrics recognition stamps; the criminals’ goal: to facilitate the entry to the UAE of individuals who were previously banned

    • Read more
  • US-VISIT

    James Jasinski, CEO, Cogent Systems, comments on a young program that is discharging an immense responsibility

    • Read more
  • ACLU: Terrorist Watch List hits one million names

    ACLU claims terrorist watch list reached one million names; launches online watch list complaint form

    • Read more
  • TSA: ACLU’s terrorist watch list facts and figures are a myth

    The Transportation Security Administration refutes the facts and figures used by the ACLU in the latter’s claim that the list is now 1-million strong

    • Read more
  • Cyber cafes to be monitored in India

    Indian police places biometric systems and CCTV in more than 150 cyber cafes in order to catch cyber criminals in the act

    • Read more
  • Cybercrime gangs highly structured

    The chain of command of a cybercrime gang is not unlike the Mafia, an evolution which shows how online crime is becoming a broad, well-organized endeavor

    • Read more
  • Powerful laser blinds Moscow partygoers

    Organizers of a rave party north of Moscow use a powerful laser to beam the partygoers, causing retinal burns and permanent eye damage to many; engineers accuse party organizers of “technical illiteracy”

    • Read more
  • U.S. intelligence services aware of vast Chinese espionage campaign

    Multifaceted Chinese espionage campaign in the United States and other Western countries aims not only to steal military secrets, but also industrial secrets and intellectual property in order to help Chinese companies better compete in the global economy; Chinese government and state-sponsored industries have relied not only on trained intelligence officers, but also on the Chinese diaspora — using immigrants, students, and people of second- and third-generation Chinese heritage

    • Read more
  • Ground fighting and its tactical applications

    Every grappler, Jiu-Jitsu practitioner, and wrestler thinks that if he can take the fight to the ground, he will win; there are, however, a few inherent problems with this approach

    • Read more
  • An HS Daily Wire conversation with Walter Hamilton of the International Biometrics Industry Association (IBIA)

    Walter Hamilton, chairman of the Board of Directors of IBIA, talks about different biometric technologies, new and innovative biometric approaches, the role of biometric in security and commerce, biometrics in the theater of battle, and more

    • Read more
  • Banks' PIN codes susceptible to hackers' theft

    Network of PIN codes’ thieves nets millions of dollars; hackers are targeting the ATM system’s infrastructure, which is increasingly built on Microsoft’s Windows operating system and allows machines to be remotely diagnosed and repaired over the Internet

    • Read more
  • Air passnegers now must show an ID to be allowed on board

    Until this past weekend, a passenger who agreed to secondary search of his or her body and baggage at airport check-points was allowed to board even if they did not have — or refused to show — an ID; this policy was changed on Saturday

    • Read more
  • First conviction under the Economic Espionage Act of 1996

    Chinese-born software engineer sentenced for stealing industrial and military secrets on behalf of the PRC; first conviction under a 1996 law for misappropriating a trade secret with the intent to benefit a foreign government

    • Read more
  • « first
  • ‹ previous
  • …
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • …
  • next ›
  • last »

More headlines

  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Trump gutted key research programs studying violence. Experts say it will come at a heavy cost
  • New Jersey mom sues Homeland Security, TSA for 'threat-tagging' over Facebook post
  • ICE agents detain Tufts University grad student after pro-Palestinian opinion piece
  • Why are Department of Homeland Security agents in masks arresting students?
  • Man Pardoned in Jan. 6 Riot Is Fatally Shot by Sheriff’s Deputy During Traffic Stop
  • Super Bowl safety plan will lift from the Taylor Swift playbook, law enforcement officials say
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Minnesota man arrested after allegedly threatening to 'shoot up' synagogue
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report

    There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.

    • Read more
  • Twenty-One Things That Are True in Los Angeles

    To understand the dangers inherent in deploying the California National Guard – over the strenuous objections of the California governor – and active-duty Marines to deal with anti-ICE protesters, we should remind ourselves of a few elementary truths, writes Benjamin Wittes. Among these truths: “Not all lawful exercises of authority are wise, prudent, or smart”; “Not all crimes require a federal response”; “Avoiding tragic and unnecessary confrontations is generally desirable”; and “It is thus unwise, imprudent, and stupid to take actions for performative reasons that one might reasonably anticipate would increase the risks of such confrontations.”

    • Read more
  • Luigi Mangione and the Making of a ‘Terrorist’

    Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”

    • Read more
  • Are We Ready for a ‘DeepSeek for Bioweapons’?

    Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”

    • Read more
  • How DHS Laid the Groundwork for More Intelligence Abuse

    I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies