Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Laws and regulations

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • In-building public-safety communication a growing business

    The 9/11 attacks exposed a major weakness: rescue personnel had no communication coverage inside the towers; regulations now require that first responders have communications coverage everywhere in a building — or at least 95 percent of it; as businesses and local governments face deadlines for complying with these requirements, businesses offering in-building communication services will benefit

    • Read more
  • Patent systems may discourage innovation: study

    The traditional view is that patents foster innovation. A new study suggests instead that they may hinder technological progress, economic activity, and societal wealth

    • Read more
  • Sweeping food safety bill passes House

    House passes new, sweeping food safety bill requiring more government inspections and imposing new penalties on those who violate the law

    • Read more
  • Apple says jailbreaking may knock out transmission towers

    The Electronic Frontier Foundation (EFF) asked the U.S. Copyright Office to instruct Apple to allow “jailbreaking ” — that is, modification of the iPhone’s software without Apple’s approval; Apple responded that modifying the iPhone’s operating system could crash a mobile phone network’s transmission towers or allow people to avoid paying for phone calls

    • Read more
  • DHS unveils improved online presence

    DHS unveils new Web site; National Threat Advisory graphic is given much less prominence

    • Read more
  • U.S. considers cloud security standards

    Cloud computing is gaining among businesses, so the U.S. government says it may step up with a set of cloud-security standards to meet government requirements for protecting sensitive data

    • Read more
  • Concerns over E-Verify effectiveness as illegal immigration detentions drop

    The Obama administration has mandated that by 8 September, all contractors who do work with the federal government must use E-Verify to ensure their prospective employees can legally work in the United States; senators say it is too easy to fool the current E-Verify system

    • Read more
  • Opponents of Israeli Biometric Law: "It's a Step to a True Police State"

    Debate heats up in Israel over the creation of a national biometric database; the law empowers the Interior Ministry to set up a database that would include biometric identification information on every Israeli citizen

    • Read more
  • Napolitano highlights differences between Real ID and PASS ID

    DHS secretary Napolitano, in her previous post a governor of Arizona, opposed the Real ID Act and the mandates it imposes on states; now, as DHS secretary, she is charge of implementing the act; Napolitano offers the PASS ID program as a compromise

    • Read more
  • The Obama administration would require federal contractors to use E-Verify

    The Obama administration said it would support a George Bush administration regulation that would only award federal contracts to employers who use E-Verify to check employee work authorization

    • Read more
  • DHS's Einstein 3 plans raise questions

    DHS wants to use Einstein 3 to bolster cybersecurity; the deployment of this powerful program has its critics, though

    • Read more
  • To claim that swine flu has been "contained" is premature

    We have not yet reached the “containment” phase of the swine flu epidemics; to say we have is PR, not public health policy

    • Read more
  • U.S. designates North Korea's NCG as a nuclear-proliferation violator

    NCG is a North Korean nuclear-related company in Pyongyang; today, the U.S. Department of State froze the assets of the and took other measures to isolate it from the U.S. financial and commercial systems

    • Read more
  • U.S. treasury targets North Korea's missile proliferation network

    U.S. Treasury invokes Executive Order 13382 to freeze the assets of Hong Kong Electronics; since 2007, the company has transferred million so f dollars worth of missile equipment to North Korea

    • Read more
  • U.K. Home Office makes ID card trial voluntary

    Bowing to pressure, the Home Office has abandoned attempts to force workers at Manchester and London City airports to carry ID cards, opting to make the trial voluntary

    • Read more
  • « first
  • ‹ previous
  • …
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • …
  • next ›
  • last »

More headlines

  • Trump’s use of Alien Enemies Act for swift deportations is illegal, Trump-appointed judge rules
  • White House proposes sanctions, directs DHS to investigate immigration attorneys
  • The Supreme Court’s Mixed Signals on Trump’s Deportations to El Salvador
  • DHS suspends green card processing for refugees, asylees
  • Decoding Trump’s Border Counterterrorism Order
  • Trump administration ends extended protections for Venezuelans in US, official says
  • Man Pardoned in Jan. 6 Riot Is Fatally Shot by Sheriff’s Deputy During Traffic Stop
  • Can Donald Trump Wave a Wand to Get Rid of Birthright Citizenship?
  • Texas sues Department of Homeland Security for voter citizenship data
  • Homeland Security Secretary Alejandro Mayorkas says election disinformation is "extremely damaging"
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Luigi Mangione and the Making of a ‘Terrorist’

    Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”

    • Read more
  • Are We Ready for a ‘DeepSeek for Bioweapons’?

    Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies