Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Military technology

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • The Battle for Pentagon Acquisition Policy: Tradition Versus New-and-Cheaper

    The weapons that get bought in larger or smaller quantities, or are launched or cancelled, will indicate whether US President Donald Trump’s administration will strengthen long-range deterrent forces, order a retreat under his Golden Dome missile-defense system, or spend four years trying to blend incompatible visions of industrial and technological strategy.

    • Read more
  • How the U.S. Can Mine Its Own Critical Minerals − without Digging New Holes

    Critical materials are the tiny building blocks powering modern life, yet the U.S. depends heavily on imports for most critical materials. Could the U.S. mine and process more critical minerals at home?

    • Read more
  • Operation Opera Redux? Iran’s Nuclear Program and the Preventive War Paradox

    The 1981 Israeli destruction of Iraq’s Osirak nuclear reactor was an operational success, but is regarded by many as a strategic failure. Scholars call this the preventive war paradox: compromising one’s security in the long term through military action that is operationally successful.

    • Read more
  • AI-Controlled Fighter Jets May Be Closer Than We Think — and Would Change the Face of Warfare

    Could we be on the verge of an era where fighter jets take flight without pilots – and are controlled by artificial intelligence (AI)? US R Adm Michael Donnelly recently said that an upcoming combat jet could be the navy’s last one with a pilot in the cockpit.

    • Read more
  • MIT Lincoln Laboratory Is a Workhorse for National Security

    The US Air Force and MIT renew contract for operating the federally funded R&D center, a long-standing asset for defense innovation and prototyping.

    • Read more
  • Latest Reasoning Models from OpenAI to Be Used for Energy and National Security Applications on Los Alamos’s Venado Supercomputer

    Los Alamos National Laboratory has entered a partnership with OpenAI to install its latest o-series models — capable of expert reasoning for a broad span of complex scientific problems — on the Lab’s Venado supercomputer.

    • Read more
  • Can Europe Defend Itself Against a Nuclear-Armed Russia?

    National security expert details what’s being done, what can be done as U.S. appears to rethink decades-long support. Regarding the U.S. nuclear umbrella, which has covered Europe since the 1950s, Richard Hooker says: “Is it reliable? I wouldn’t think so. If Putin were to threaten or actually use tactical nuclear weapons in Ukraine or, let’s say in Estonia, would the administration respond with nuclear threats of its own? Personally, I have my doubts.”

    • Read more
  • The Siege of the Red Sea

    With the degradation of Hamas and Hezbollah, the Houthis stand out as one of Iran’s proxies that continues to pose a serious threat to U.S. interests in the region. But with Iran on its back foot and Trump’s determination to bring the full capabilities of the U.S. military to bear against the Houthis, the group’s days running roughshod in the Red Sea may be numbered.

    • Read more
  • Bolt from the Blue: What We Know (and Don’t Know) About the U.S. Powerful F-47 Fighter

    When the F-47 enters service, at a date to be disclosed, it will be a new factor in US air warfare. The design will have much more range than earlier fighters, both at supersonic and subsonic speed. But it is not even a fighter as it is generally understood. It will be more stealthy. It will be larger, trading dogfight maneuverability for reach, and it will be designed to work within a family of systems, many of them unmanned.

    • Read more
  • Air Force Options Plentiful for Basing of New F-47 Fighter

    The need for the F-47 was crystalized as potential foe China has already flown a pair of tailless sixth generation prototypes and already has two fifth generation fighters, the Chengdu J-20 and the smaller Shenyang J-35, in service.

    • Read more
  • Could the EU Become a Military Superpower?

    Only two weeks after a European Union summit where the bloc’s leaders pledged to spend billions on defense in a “watershed moment for Europe,” they are returning to Brussels to solidify plans for strengthening Europe’s defense autonomy amid ongoing doubts about the US commitment to protecting European nations and sustaining military support for Ukraine.

    • Read more
  • The Push to Restore Semiconductor Manufacturing Faces a Labor Crisis − Can the U.S. Train Enough Workers in Time?

    Semiconductors power nearly every aspect of modern life.The U.S. depends heavily on foreign countries – including China, a geopolitical rival – to manufacture semiconductors. This isn’t just an economic concern; it’s widely recognized as a national security risk. There is a bipartisan support to expanding domestic chip manufacturingby building new chip plants, but a major challenge remains: Who will operate them?

    • Read more
  • Making Airfield Assessments Automatic, Remote, and Safe

    U.S. Air Force engineer and PhD student Randall Pietersen is using AI and next-generation imaging technology to detect pavement damage and unexploded munitions.

    • Read more
  • Europe Will Need Thousands More Tanks and Troops to Mount a Credible Military Defense without the U.S.

    Implementing a new defense strategy will mean answering many difficult questions, including whether an EU defense force would involve all EU member states, the potential roles of antagonistic EU members like Hungary and Slovakia (both pro-Trump and pro-Russia), and those of non-EU NATO members such as the UK, Norway, or even Canada.

    • Read more
  • Countering Blockship Attacks in Key U.S. Waterways

    Blockship attacks entail obstructing key waterways by deliberately scuttling ships, running them aground, or having them impale themselves onto infrastructure. Such attacks could delay maritime movements in U.S. or key overseas ports, affecting all U.S. military services and potentially disrupting billions of dollars in commerce.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Trump 2026 Budget Plan Boosts Defense, Homeland Security
  • Trump wants $1 trillion for Pentagon
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • Navy confronting hurdles to implementing 5G-enabled technologies at scale
  • DHS Approves Start of Construction for First Polar Security Cutter
  • China has a ‘near monopoly’ on many critical minerals. JPMorgan says it could be the next battleground with the U.S.
  • America's defense spending dragged into budget chaos
  • Expect ‘AI versus AI’ cyber activity between US and adversaries, Pentagon official says
  • CIA’s AI director says the new tech is our biggest threat, and resource
  • House Bipartisan Legislation Proposes to Categorize Space as Critical Infrastructure
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled

    “The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.

    • Read more
  • Ukraine Drone Strikes on Russian Airbase Reveal Any Country Is Vulnerable to the Same Kind of Attack

    Air defense systems are built on the assumption that threats come from above and from beyond national borders. But Ukraine’s coordinated drone strike on 1 June on five airbases deep inside Russian territory exposed what happens when states are attacked from below and from within. In low-level airspace, visibility drops, responsibility fragments, and detection tools lose their edge. Drones arrive unannounced, response times lag, coordination breaks.

    • Read more
  • Shots to the Dome—Why We Can’t Model US Missile Defense on Israel’s “Iron Dome”

    Starting an arms race where the costs are stacked against you at a time when debt-to-GDP is approaching an all-time high seems reckless. All in all, the idea behind Golden Dome is still quite undercooked.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies