Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Military technology

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • The Role of Drones in Ukraine’s Military Defense

    Drones are playing a critical role in Ukraine’s military defense against the Russian invasion, but they will likely become more vulnerable as the war expands.

    • Read more
  • Is Russia Using Vacuum Bombs in Ukraine?

    Ukraine has accused Russia of using a vacuum bomb during its invasion. The use of these weapons, whose destructive power is immense, is prohibited in populated areas. DW looks at how they work and the harm they inflict.

    • Read more
  • A War Within a War: Cyberattacks Signal a New Approach to Combat

    In addition to fighting with troops on the ground, Ukraine is also defending itself on another front, from cyberattack.

    • Read more
  • Cyberspace: The New Battleground in Modern-Day Warfare

    Twenty-first century battles are now being fought digitally, as well as with missiles on land, sea and air. Bolstering cybersecurity is thus becoming ever more important as nation states wage war in new and complex arenas.

    • Read more
  • What Are Russia’s Strategic Aims and How Effectively Are They Achieving Them?

    In his “declaration of war” speech to the nation on February 24, Putin made clear that his overarching strategic goal is to blur, if not eradicate, the distinction between Russia and Ukraine. He aims to achieve that goal by decapitating the Ukrainian political leadership, defeating of the Ukrainian armed forces, and destroying Ukraine as a functioning independent state. How will the Russian high command achieve these goals?

    • Read more
  • How Are Western Arms Supplies for Ukraine Getting There?

    In an unprecedented move, the EU is financing the purchase and delivery of arms and weapons to Ukraine. Other Western countries are committing to arms deliveries, too. But how will they get there and how quickly?

    • Read more
  • Heavy Shelling in Kharkiv on 6th Day of War

    Tuesday saw an increased shelling of Kharkiv by Russian forces, while a column of Russian forces stretched out along a road north of the Ukrainian capital of Kyiv on the sixth day of Russia’s invasion of its neighbor.

    • Read more
  • Hacker Underground | Belarus to Join the Fight | Western Arms, and more

    Vladimir Putin accused of war crimes, while Belarus’s military is ready to join the war on Russia’s side. Ukraine hackers vow to stop Russia, as fears grow the Russia’s likely cyber attack on Ukraine will spill over into other countries.

    • Read more
  • Five Comments on the Evolving Situation in Ukraine

    Russia’s initial tactical approach was flawed, but it appears that corrections are being made. This is not good news for Ukraine and the Ukrainians, because Russia is reverting to fighting as Russia typically fights, and the civilians on the other side are those who typically pay the price.

    • Read more
  • Ukraine-Russia War Drives Major German Policy Changes

    The Russian invasion of Ukraine marks a turning point in German politics. Many longstanding principles have been thrown overboard.

    • Read more
  • How the Russian Military Remade Itself into a Modern, Efficient and Deadly Fighting Machine

    The war in Ukraine is the first chance the world has had to see the full force of Russia’s new-look military machine – a modernized, professional fighting force that has been completely revamped since Russia’s 2008 war with Georgia. So, what did Russia learn from that conflict militarily, and how are we seeing it play out on the battlefield in Ukraine?

    • Read more
  • Why Putin’s War with Ukraine Is a Miscalculation

    Putin’s invasion of Ukraine is a geopolitical earthquake that will cause repercussions far beyond Europe. But the Russian president might be planting the seeds for the demise of his regime by overreaching.

    • Read more
  • How Much Damage Could a Russian Cyberattack Do in the U.S.?

    U.S. intelligence analysts have determined that Moscow would consider a cyberattack against the U.S. as the Ukraine crisis grows. As a scholar of Russian cyber operations, I know the Kremlin has the capacity to damage critical U.S. infrastructure systems.

    • Read more
  • Wide Range of Possible Targets for Russian Cyberstrikes, from Infrastructure to Smartphones

    For years prior to Russia’s invasion of Ukraine, Vladimir Putin’s government waged cyberwar aimed at destabilizing the country’s infrastructure, government, and financial systems, including several distributed-denial-of-service (DDoS) attacks in the run-up to this week’s assault. What are Russia’s cyberwarfare capabilities, and what would a cyberattack against the U.S. look like?

    • Read more
  • What to Expect with Cyber Surprise

    The cyber domain has three critical characteristics which differentiate it from the kinetic domain: it is connected across the globe; it is pervasive in the economic life-blood of the world; and it is asymmetric in its ability to enable power projection. What, then, can we expect from a strategic surprise which we expect Russia to launch as part of its campaign in Ukraine? “We are about to see what war in the cyber era really looks like and, truthfully, nobody can tell you what will happen next,” Paul Rosenzweig writes.

    • Read more
  • « first
  • ‹ previous
  • …
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • …
  • next ›
  • last »

More headlines

  • Trump 2026 Budget Plan Boosts Defense, Homeland Security
  • Trump wants $1 trillion for Pentagon
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • Navy confronting hurdles to implementing 5G-enabled technologies at scale
  • DHS Approves Start of Construction for First Polar Security Cutter
  • China has a ‘near monopoly’ on many critical minerals. JPMorgan says it could be the next battleground with the U.S.
  • America's defense spending dragged into budget chaos
  • Expect ‘AI versus AI’ cyber activity between US and adversaries, Pentagon official says
  • CIA’s AI director says the new tech is our biggest threat, and resource
  • House Bipartisan Legislation Proposes to Categorize Space as Critical Infrastructure
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Time to Reassess the Costs of Euro-Atlantic Security

    The undeniable truth is that security comes at a cost. If Europeans fail to invest more now to deter Russia and China, the alliance will face far greater expenses and risks. The problem is that Europeans, with few exceptions, fail to grasp the immense costs such a scenario would inflict on allied security.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies