Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Laws and regulations

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • How the 14th Amendment Prevents State Legislatures from Subverting Popular Presidential Elections

    By Eric Eisner and David B. Froomkin

    In November 2020, as it became clear that Trump had lost the popular vote and would lose the Electoral College, Trump and his supporters mounted a pressure campaign to convince legislatures in several states whose citizens voted for Joe Biden to appoint electors who would support Trump’s reelection in the Electoral College votes. Trump’s efforts to overturn the results of the 2020 presidential election not only failed, but some of them also rested on a misreading of the U.S. Constitution. There was a safeguard already in place – and it remains today, defending against this approach being used to subvert the 2024 presidential election.

    • Read more
  • Officials Voted Down a Controversial Georgia Election Rule, Saying It Violated the Law. Then a Similar Version Passed.

    By Doug Bock Clark

    The rule, which was pushed by nationally prominent election deniers, only changed in minor ways between being voted down in May and approved in August. Those adjustments made it even less compliant with existing law, experts say.

    • Read more
  • Election Experts Cautious as Abbott Touts Voter Roll Purge

    By Juan Salinas II and Natalia Contreras

    Federal and state law already required voter roll maintenance. Experts warn the governor’s framing of this routine process could be used to undermine trust in elections.

    • Read more
  • The Hacking of the Trump Campaign Is 2016 All Over Again

    Hackers affiliated with the intelligence service of a foreign county hack the campaign of a candidate for the U.S. presidency, scoop damaging material, and disseminate it to reporters. This describes both the 2016 hacking of the Clinton campaign by Russian hackers, and the 2024 hacking of the Trump campaign by Iranian hackers. But there are differences: In 2016, “The press seized on the hacked emails,” Quinta Jurecic writes, “and the Trump campaign capitalized exuberantly on Russia’s involvement in the election.” Trump called on Russia to do even more. Now, the press has behaved more responsibly, and “Kamala Harris has not yet weighed in on the campaign trail with any winking suggestions that Iran might want to continue rummaging around in the Trump campaign’s systems.”

    • Read more
  • Texas Election Officials Are Dealing with a Flood of Challenges to Voter Registrations

    By Natalia Contreras

    Conservative groups and individual activists have targeted tens of thousands of Texans over their eligibility. But state and federal protections are in place.

    • Read more
  • Election Deniers Secretly Pushed Rule That Would Make It Easier to Delay Certification of Georgia’s Election Results

    By Doug Bock Clark

    On Monday, the GOP-controlled State Election Board is poised to adopt the rule, which would potentially allow county officials, including one who secretly backed the rule, to throw the election results of the swing state into chaos this fall.

    • Read more
  • Red Flag Gun Laws Under Fire

    By Mike Spies

    Laws meant to keep firearms away from unstable people are under attack by Second Amendment radicals. An investigation by The Trace and Rolling Stone exposes the ugly campaign to undermine a bipartisan compromise to stop mass shootings.

    • Read more
  • Foreign Actors Could Sow 'Chaos' in the 2024 Presidential Election, Cybersecurity Expert Says

    By Tanner Stening and Cesareo Contreras

    In a tightly contested election, a “hack and leak” campaigns can be hugely “consequential” at the margins, says an expert.

    • Read more
  • AI Disinformation: Lessons from the U.K. Election

    By Sam Stockwell

    The record-breaking 2024 figure of about 4 billion voters eligible to go to the polls across more than 60 countries coincided with the full-fledged arrival and widespread uptake of multimodal generative artificial intelligence (AI), which enables almost anyone to make fake images, videos and sound.

    • Read more
  • What Is the Online Safety Act and Why Have Riots in the U.K. Reopened Debates About It?

    By Olivia Brown and Alicia Cork

    Social media played a key role in the widespread coordination of riots in locations across the country. Online platforms have also served as a vehicle through which misinformation and hateful rhetoric has spread.

    • Read more
  • Protecting Our Elections Against Tech-Enabled Disinformation

    By Tom Rogers

    Electoral administrators around the world are dealing with a radically changed democratic landscape. Concerns focus on the pervasive presence of disinformation and false narratives, the rise of new technologies such as generative artificial intelligence, occasional madcap conspiracy theories, threats to electoral workers, and the need to maintain citizens’ confidence in electoral outcomes.

    • Read more
  • Study Highlights Challenges in Detecting Violent Speech Aimed at Asian Communities

    A study of language detection software found that algorithms struggle to differentiate anti-Asian violence-provoking speech from general hate speech. Left unchecked, threats of violence online can go unnoticed and turn into real-world attacks.

    • Read more
  • Election Deniers Continue Attempts to Meddle with Certification – But the Process Is Resilient

    By Lauren Miller Karalunas and Kendall Karson Verhovek

    Georgia’s State Election Board made it easier to delay certification, but disputes do not mean problems with the election.

    • Read more
  • Today's Autocracies Are Networked In Efforts To Erode Democracy, Says Author Anne Applebaum

    By Robert Coalson

    Autocracies around the world have become increasingly mutually reinforcing in their competition with democratic societies, Pulitzer Prize winning U.S. journalist and historian Anne Applebaum said.

    • Read more
  • A Call to Protect Democracy from Political Violence

    By Joshua Horwitz and Tim Carey

    As the nation reels from the recent assassination attempt on Donald Trump, experts at the Johns Hopkins Center for Gun Violence Solutions say we must be clear about the threat of guns in a heated election.

    • Read more
  • « first
  • ‹ previous
  • …
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • …
  • next ›
  • last »

More headlines

  • Trump’s use of Alien Enemies Act for swift deportations is illegal, Trump-appointed judge rules
  • White House proposes sanctions, directs DHS to investigate immigration attorneys
  • The Supreme Court’s Mixed Signals on Trump’s Deportations to El Salvador
  • DHS suspends green card processing for refugees, asylees
  • Decoding Trump’s Border Counterterrorism Order
  • Trump administration ends extended protections for Venezuelans in US, official says
  • Man Pardoned in Jan. 6 Riot Is Fatally Shot by Sheriff’s Deputy During Traffic Stop
  • Can Donald Trump Wave a Wand to Get Rid of Birthright Citizenship?
  • Texas sues Department of Homeland Security for voter citizenship data
  • Homeland Security Secretary Alejandro Mayorkas says election disinformation is "extremely damaging"
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Luigi Mangione and the Making of a ‘Terrorist’

    Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”

    • Read more
  • Are We Ready for a ‘DeepSeek for Bioweapons’?

    Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies