Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Laws and regulations

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • FBI worried about increased cyber crime

    Head of the FBI cyber division says the number of victims of cyber crime, and the cost of that crime, are increasing; moreover, as many as two dozen countries have taken an “aggressive interest” in penetrating the networks of U.S. companies and government agencies

    • Read more
  • Chertoff urges industry to invest in cybersecurity

    About 85 percent of the U.S. critical infrastructure is owned and operated by private industry; DHS secretary Chertoff says this fact makes cybersecurity a shared responsibility between government and the corporations that control most computer networks

    • Read more
  • Chertoff says there will be no Big Brother approach to Internet security

    Earlier this year Director of U.S. National Intelligence Mike McConnell said the government would require broad powers to monitor all Internet traffic in order to secure the U.S. critical information infrastructure; Chertoff outlines a more modest approach

    • Read more
  • Body-armor manufacturer settles with U.S. Justice Department

    The U.S. Justice Department charged that a body armor manufacturer knowingly used Zylon fiber in body army it sold to the federal government and local law enforcement; Zylon fiber degrades quickly and is not suitable for ballistic use

    • Read more
  • ISF annual congress in Barcelona, 16-18 November

    More than 500 IT security leaders will meet in Barcelona in November for the ISF 19th annual congress

    • Read more
  • New surveillance program will use military satellites to cover U.S.

    President Bush signed bill which allows the National Applications Office (NAO) to begin operating a stringently limited version of a program which would turn military spy satellites on the United States, sharing imagery with other federal, state, and local government agencies

    • Read more
  • Alternatives to the H-1B visa, pt. 2: L-1 "International Transferees"

    The demand for H1-B visas far outstrips its supply; one alternative is the L-1 visa which allows companies to transfer employees to, and allows investors to form start-up operations in, the United States

    • Read more
  • Group tells FTC more RFID security guidance is needed

    As RFID technology proliferates, so do worries about its potential for violating people’s privacy. the Federal Trade Commission is charged with protecting consumers, and privacy advocates urge it to take a close look at RFID

    • Read more
  • Alternatives to the H-1B visa, pt. 1: O-1 "Extraordinary ability"

    The U.S. immigration services received more than 163,000 petitions for the 65,000 regular H-1B visas allocated for FY2009; the homeland security, hi-tech, and services sectors, as well as academic and research institutions, need another way to bring to the United States qualified foreign workers and researchers; one such way is the O-1 “Extraordinary Ability” visa

    • Read more
  • Neither presidential campaign has contacted DHS about transition

    DHS has set up transition teams to facilitate a smooth and effective transmission of information and transition of authority to the new administration, but neither the McCain or the Obama campaign has contacted the teams

    • Read more
  • Chinese dairies add organic base found in plastics and resins to products

    Lab tests in Hong Kong find that Chinese company’s dairy offerings, including milk, ice cream, and yogurt, were contaminated with melamine — an organic base usually found in plastics and resins, and banned in food

    • Read more
  • Colorado to remove Social Security numbers from public Web sites

    Colorado attorney general asks counties to remove documents containing Social Security numbers from public Web sites, saying that the “The availability of this information online increases the possibility of Colorado citizens becoming the victims of identity theft”

    • Read more
  • U.K. start-up develops file-sharing monitoring tool

    Businesses can face serious consequences from illegal file sharing which takes place on their network, whether the files contain confidential client data or copyrighted material; new tool helps companies monitor file sharing

    • Read more
  • Panel says nearly $15 billion wasted in 11 failed DHS contracts

    A House homeleand security subcommittee charges that there is nearly $15 billion in waste in 11 failed DHS contract

    • Read more
  • DHS: Progress and priorities, II

    Since its creation more than five years ago, DHS has made significant progress — uneven progress — in protecting the United States from dangerous people and goods, protecting the U.S. critical infrastructure, strengthen emergency response, and unifying department operations

    • Read more
  • « first
  • ‹ previous
  • …
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • next ›
  • last »

More headlines

  • Trump’s use of Alien Enemies Act for swift deportations is illegal, Trump-appointed judge rules
  • White House proposes sanctions, directs DHS to investigate immigration attorneys
  • The Supreme Court’s Mixed Signals on Trump’s Deportations to El Salvador
  • DHS suspends green card processing for refugees, asylees
  • Decoding Trump’s Border Counterterrorism Order
  • Trump administration ends extended protections for Venezuelans in US, official says
  • Man Pardoned in Jan. 6 Riot Is Fatally Shot by Sheriff’s Deputy During Traffic Stop
  • Can Donald Trump Wave a Wand to Get Rid of Birthright Citizenship?
  • Texas sues Department of Homeland Security for voter citizenship data
  • Homeland Security Secretary Alejandro Mayorkas says election disinformation is "extremely damaging"
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Luigi Mangione and the Making of a ‘Terrorist’

    Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”

    • Read more
  • Are We Ready for a ‘DeepSeek for Bioweapons’?

    Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies