Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Military technology

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • A New U.S. Russia, China Nuclear Arms Race Spells Danger

    Unlike in the Cold War, the United States faces the prospect in the next decade of two peer nuclear adversaries, which will together have twice as many strategic nuclear weapons as it does. While extended nuclear assurance and persuasion have been important factors in the US for a long time, there does not appear to be any widely accepted methodology for reaching a decision on how many weapons are needed for these purposes.

    • Read more
  • ‘Killer Robots’ Are Becoming a Real Threat in Africa

    The use of drones in the Sahel, a region of Africa that has been plagued by violence driven by jihadist insurgency for much of the past decade, has become a real problem. But even more concerning is the fact that their AI-powered variants, which are known as lethal autonomous weapons systems (LAWS), have been deployed in Africa in recent years.

    • Read more
  • Insights on Valuable Byproduct Minerals

    Byproduct minerals are not the main target of the mining operation but are obtained as a result of processing the primary ore. Many critical minerals are byproducts of mining other minerals like copper, gold, and zinc.

    • Read more
  • Engineers Debut New Drone ID Tech After Yemen Strikes Israel

    Tel Aviv University researchers unveil an AI-powered drone ID radar system that enhances detection in challenging urban environments.

    • Read more
  • Resourcing the Ramp-Up: NATO and the Challenge of a Coherent Industrial Response to Russia's War in Ukraine

    Near the top of the new NATO Secretary-General’s in-tray will be an urgent question: why are efforts to mobilize the alliance’s industrial base and ramp up production still yielding underwhelming results, over two years since Russia’s full-scale invasion of Ukraine?

    • Read more
  • Taiwan May Yet Become a Porcupine

    It’s early days, but the signs are strong that Taiwan’s new government will insist on much more of a porcupine strategy for national defense than many officers in the country’s hidebound armed forces have been willing to accept.

    • Read more
  • New U.S. Arctic Strategy Focused on Russian, Chinese Inroads

    The United States is looking to boost intelligence collection in the Arctic and enhance cooperation with allies in the region, to prevent Russia and China from exploiting the cold and icy northern region at America’s expense.

    • Read more
  • Russia Spreads Disinformation to Cover Up Its Use of Chemical Weapons in Ukraine

    The United States determined Russia used the chemical weapon chloropicrin against Ukrainian troops and riot control agents (RCA) as a method of warfare in violation of the Chemical Weapons Convention (CWC).

    • Read more
  • Germany Foils Russian Plot to Assassinate German Arms Company Chief

    German politicians have voiced horror over a report that Russia planned to murder a German arms company boss. US intelligence is said to have uncovered the plot against Rheinmetall chief Armin Papperger.

    • Read more
  • To Guard Against Cyberattacks in Space, Researchers Ask ‘What If?’

    If space systems such as GPS were hacked and knocked offline, much of the world would instantly be returned to the communications and navigation technologies of the 1950s. Yet space cybersecurity is largely invisible to the public at a time of heightened geopolitical tensions.

    • Read more
  • How to Equip the U.S. Coast Guard Against China’s Grey-Zone Operations

    America’s allies in the Indo-Pacific are getting pretty familiar with China’s grey-zone maritime behavior, but the United States itself is ill-prepared for dealing with it. Yet it should be prepared. The U.S. must not only counter the threat to its national security posed by China’s coercive operations, but also support its allies against Chinese efforts to rewrite the rule of law in the region.

    • Read more
  • High Noon at Second Thomas Shoal

    China has identified the beleaguered garrison at Second Thomas Shoal as a weak link among the South China Sea features physically occupied by the Philippines and, by extension, the US-Philippines alliance.

    • Read more
  • Record Number of NATO Allies to Hit 2% Defense Spending Goal

    NATO Secretary-General Jens Stoltenberg has announced that more NATO member states than originally expected were set to fulfill the 2% target of GDP defense spending this year. The NATO defense investment target was agreed upon in 2014. Across the alliance, all member states aside from Slovenia and Italy have upped their defense budget.

    • Read more
  • Joining NATO Binds Countries to Defend Each Other – but This Commitment Is Not Set in Stone

    At the root of debates over policy toward alliances such as NATO is the assumption that NATO requires its members to step in and help with defense if another member of the alliance is attacked, but it is important to understand that, in reality, alliance agreements are more flexible than people think. In practice, it is possible for the U.S. and other Western countries to stay out of a conflict that involves a NATO country without having to break their alliance commitments.

    • Read more
  • Fact Check: Fake Footage of Russian Warships in Cuba

    The arrival of Russian navy ships, some carrying advanced weapons, off the coast of Havana has given rise to online disinformation. Some analysts breathlessly warned of a new Cuban Missile Crisis. But the story was fake news, using old footage and clever editing.

    • Read more
  • « first
  • ‹ previous
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • …
  • next ›
  • last »

More headlines

  • Trump 2026 Budget Plan Boosts Defense, Homeland Security
  • Trump wants $1 trillion for Pentagon
  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • Navy confronting hurdles to implementing 5G-enabled technologies at scale
  • DHS Approves Start of Construction for First Polar Security Cutter
  • China has a ‘near monopoly’ on many critical minerals. JPMorgan says it could be the next battleground with the U.S.
  • America's defense spending dragged into budget chaos
  • Expect ‘AI versus AI’ cyber activity between US and adversaries, Pentagon official says
  • CIA’s AI director says the new tech is our biggest threat, and resource
  • House Bipartisan Legislation Proposes to Categorize Space as Critical Infrastructure
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Factories First: Winning the Drone War Before It Starts

    Wars are won by factories before they are won on the battlefield,Martin C. Feldmann writes, noting that the United States lacks the manufacturing depth for the coming drone age. Rectifying this situation “will take far more than procurement tweaks,” Feldmann writes. “It demands a national-level, wartime-scale industrial mobilization.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies