Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Laws and regulations

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Study highlights air cargo security failings

    New study: “these weak spots [in air cargo security] increase the security risk of worldwide transport, which can result in the disruption of logistical processes with considerable economic losses”

    • Read more
  • NRC seeks tighter oversight of often-lost radioactive devices

    A 3 August proposal by the Nuclear Regulatory Commission (NRC) would expand the agency’s oversight, giving federal and state officials more muscle by stiffening regulations on almost 2,000 items — mostly industrial gauges containing radioactive material; there are approximately 2 million radioactive devices in factories, hospitals, research facilities — and the GAO estimates that up to 500,000 of those devices are unaccounted for

    • Read more
  • In-building public-safety communication a growing business

    The 9/11 attacks exposed a major weakness: rescue personnel had no communication coverage inside the towers; regulations now require that first responders have communications coverage everywhere in a building — or at least 95 percent of it; as businesses and local governments face deadlines for complying with these requirements, businesses offering in-building communication services will benefit

    • Read more
  • Patent systems may discourage innovation: study

    The traditional view is that patents foster innovation. A new study suggests instead that they may hinder technological progress, economic activity, and societal wealth

    • Read more
  • Sweeping food safety bill passes House

    House passes new, sweeping food safety bill requiring more government inspections and imposing new penalties on those who violate the law

    • Read more
  • Apple says jailbreaking may knock out transmission towers

    The Electronic Frontier Foundation (EFF) asked the U.S. Copyright Office to instruct Apple to allow “jailbreaking ” — that is, modification of the iPhone’s software without Apple’s approval; Apple responded that modifying the iPhone’s operating system could crash a mobile phone network’s transmission towers or allow people to avoid paying for phone calls

    • Read more
  • DHS unveils improved online presence

    DHS unveils new Web site; National Threat Advisory graphic is given much less prominence

    • Read more
  • U.S. considers cloud security standards

    Cloud computing is gaining among businesses, so the U.S. government says it may step up with a set of cloud-security standards to meet government requirements for protecting sensitive data

    • Read more
  • Concerns over E-Verify effectiveness as illegal immigration detentions drop

    The Obama administration has mandated that by 8 September, all contractors who do work with the federal government must use E-Verify to ensure their prospective employees can legally work in the United States; senators say it is too easy to fool the current E-Verify system

    • Read more
  • Opponents of Israeli Biometric Law: "It's a Step to a True Police State"

    Debate heats up in Israel over the creation of a national biometric database; the law empowers the Interior Ministry to set up a database that would include biometric identification information on every Israeli citizen

    • Read more
  • Napolitano highlights differences between Real ID and PASS ID

    DHS secretary Napolitano, in her previous post a governor of Arizona, opposed the Real ID Act and the mandates it imposes on states; now, as DHS secretary, she is charge of implementing the act; Napolitano offers the PASS ID program as a compromise

    • Read more
  • The Obama administration would require federal contractors to use E-Verify

    The Obama administration said it would support a George Bush administration regulation that would only award federal contracts to employers who use E-Verify to check employee work authorization

    • Read more
  • DHS's Einstein 3 plans raise questions

    DHS wants to use Einstein 3 to bolster cybersecurity; the deployment of this powerful program has its critics, though

    • Read more
  • To claim that swine flu has been "contained" is premature

    We have not yet reached the “containment” phase of the swine flu epidemics; to say we have is PR, not public health policy

    • Read more
  • U.S. designates North Korea's NCG as a nuclear-proliferation violator

    NCG is a North Korean nuclear-related company in Pyongyang; today, the U.S. Department of State froze the assets of the and took other measures to isolate it from the U.S. financial and commercial systems

    • Read more
  • « first
  • ‹ previous
  • …
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • …
  • next ›
  • last »

More headlines

  • Far-right leader Marine Le Pen tries new tack in appeal critical to France’s political future
  • 2 DOGE staffers at Social Security agency may have violated Hatch Act, DOJ says
  • The Trump administration is building a ‘national voter roll’, former DOJ lawyers warn
  • After judge’s ruling, HHS authorized to resume sharing some Medicaid data with deportation officers
  • Trump targeting of pro-Palestinian campus activists for deportation is unlawful, US judge rules
  • Feds issue 'information requests' on University of Chicago international students, admissions practices
  • US races to build migrant tent camps after $45 billion funding boost, WSJ reports
  • Travelers to the U.S. must pay a new $250 'visa integrity fee' — what to know
  • Trump’s use of Alien Enemies Act for swift deportations is illegal, Trump-appointed judge rules
  • White House proposes sanctions, directs DHS to investigate immigration attorneys
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Social Media Research Tool Lowers the Political Temperature

    Researchers created a method to downrank antidemocratic and highly partisan posts on X, reducing polarization while potentially giving users greater control over their feeds.The method reprioritizes social media posts, pushing those that breach democratic norms and use hostile partisan language lower in a feed.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies