Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Laws and regulations

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Trump’s Second Assassination Attempt Is Shocking, but Attempts on Presidents’ Lives Are Not Rare in U.S. History

    There have been 45 men elected president since the country’s founding. And 40% of them have experienced known attempts on their lives. Four presidents – Abraham Lincoln, James A. Garfield, William McKinley and John F. Kennedy – have been assassinated.

    • Read more
  • Supreme Court Ruling Threatens Gun Charges Filed in Trump’s Alleged Assassination Attempt

    A Trace review of federal court cases found that several defendants have had similar charges tossed out since the Supreme Court’s Bruen decision dramatically expanded Second Amendment protections.

    • Read more
  • The Second Assassination Attempt on Donald Trump in 64 Days Is a Troubling Turn of Events

    In American politics, the expression “October surprise” describes “a game-changing event that can irreparably damage one candidate’s chances and boost the other’s,” upending a presidential election. It is no longer hyperbolic thinking to consider that an October surprise may involve another assassination attempt.

    • Read more
  • Blocking the Nippon Steel Acquisition: Politics Versus Policy

    A decision by President Biden to block Nippon Steel’s purchase of U.S. Steel would not be good policy or good politics.

    • Read more
  • ICE Incapable of Monitoring Unaccompanied Minors Released into U.S.: IG

    The Inspector General for the U.S. Department of Homeland Security issued a management alert to U.S. Immigration and Customs Enforcement to make it aware of an urgent issue: ICE is incapable of monitoring hundreds of thousands of unaccompanied children (UACs) released into the country.

    • Read more
  • U.S. Adversaries Step Up Efforts to Influence Results of Next Election

    Russia, Iran and China are ramping up efforts to impact the outcome of the U.S. presidential election and down-ballot races, targeting American voters with an expanding array of sophisticated influence operations.

    • Read more
  • Protecting Voters and Election Workers from Armed Intimidation

    Although the United States is no stranger to political violence, our elections in the 21st century have been safe and secure. Rare events of violence closely covered by the media, but in reality, voter suppression by intimidation is much more likely to occur. While guns have rarely been used in elections to commit violent acts, they are increasingly being wielded as tools of intimidation.

    • Read more
  • The Country’s Biggest Ghost Gun Manufacturer Has Shuttered

    As its products increasingly turned up at crime scenes, Polymer80 drew scrutiny from law enforcement and policymakers.

    • Read more
  • No, Local Election Officials Can’t Block Certification of Results – There Are Plenty of Legal Safeguards

    Some local election officials have refused to certify election results in the past few years, and worries abound that election officials might subvert the results of the 2024 presidential election by refusing to certify the results. But there isn’t one weird trick to steal a presidential election. And there are ample safeguards to ensure ballots are tabulated accurately and election results are certified in a timely manner.

    • Read more
  • Free Legal Helpline Has Gained Pro Bono Support from 40+ Law Firms, 250+ Individual Practitioners Since Launching in November 2023

    The Campus Antisemitism Legal Line (CALL) has received more than 650 requests for assistance from university students across the country who experienced antisemitic harassment, violence or discrimination in the first nine months of the program.

    • Read more
  • Swing States Prepare for a Showdown Over Certifying Votes in November

    There is widespread concern in Michigan and Wisconsin over interference in finalizing election results. Despite the checks and balances built into the voting system, members of state and county boards tasked with certifying elections will be driven by conspiracy theories and refuse to fulfill their roles if former President Donald Trump loses again.

    • Read more
  • How the 14th Amendment Prevents State Legislatures from Subverting Popular Presidential Elections

    In November 2020, as it became clear that Trump had lost the popular vote and would lose the Electoral College, Trump and his supporters mounted a pressure campaign to convince legislatures in several states whose citizens voted for Joe Biden to appoint electors who would support Trump’s reelection in the Electoral College votes. Trump’s efforts to overturn the results of the 2020 presidential election not only failed, but some of them also rested on a misreading of the U.S. Constitution. There was a safeguard already in place – and it remains today, defending against this approach being used to subvert the 2024 presidential election.

    • Read more
  • Officials Voted Down a Controversial Georgia Election Rule, Saying It Violated the Law. Then a Similar Version Passed.

    The rule, which was pushed by nationally prominent election deniers, only changed in minor ways between being voted down in May and approved in August. Those adjustments made it even less compliant with existing law, experts say.

    • Read more
  • Election Experts Cautious as Abbott Touts Voter Roll Purge

    Federal and state law already required voter roll maintenance. Experts warn the governor’s framing of this routine process could be used to undermine trust in elections.

    • Read more
  • The Hacking of the Trump Campaign Is 2016 All Over Again

    Hackers affiliated with the intelligence service of a foreign county hack the campaign of a candidate for the U.S. presidency, scoop damaging material, and disseminate it to reporters. This describes both the 2016 hacking of the Clinton campaign by Russian hackers, and the 2024 hacking of the Trump campaign by Iranian hackers. But there are differences: In 2016, “The press seized on the hacked emails,” Quinta Jurecic writes, “and the Trump campaign capitalized exuberantly on Russia’s involvement in the election.” Trump called on Russia to do even more. Now, the press has behaved more responsibly, and “Kamala Harris has not yet weighed in on the campaign trail with any winking suggestions that Iran might want to continue rummaging around in the Trump campaign’s systems.”

    • Read more
  • « first
  • ‹ previous
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • …
  • next ›
  • last »

More headlines

  • Trump’s use of Alien Enemies Act for swift deportations is illegal, Trump-appointed judge rules
  • White House proposes sanctions, directs DHS to investigate immigration attorneys
  • The Supreme Court’s Mixed Signals on Trump’s Deportations to El Salvador
  • DHS suspends green card processing for refugees, asylees
  • Decoding Trump’s Border Counterterrorism Order
  • Trump administration ends extended protections for Venezuelans in US, official says
  • Man Pardoned in Jan. 6 Riot Is Fatally Shot by Sheriff’s Deputy During Traffic Stop
  • Can Donald Trump Wave a Wand to Get Rid of Birthright Citizenship?
  • Texas sues Department of Homeland Security for voter citizenship data
  • Homeland Security Secretary Alejandro Mayorkas says election disinformation is "extremely damaging"
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Luigi Mangione and the Making of a ‘Terrorist’

    Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”

    • Read more
  • Are We Ready for a ‘DeepSeek for Bioweapons’?

    Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies