Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Surveillance

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Boeing's takes X-45C out of storage, renames it Phantom Ray

    The proposed 2010 U.S. defense budget is historic at least in one respect: for the first time, the U.S. Air Force will be buying more unmanned flying systems than manned ones; Boeing takes its X-45C unmanned combat air vehicle (UCAV) out of storage and renames it Phantom Ray; it will be completed and readied for flight by the end of 2010, and will be suitable for missions including ISR, SEAD, electronic attack, hunter/killer, and autonomous aerial refueling

    • Read more
  • Start-up offers technology to stop spread of communicable diseases

    Israeli start-up CartaSense has a monitoring technology — a tag that integrates a sensor, battery, micro controller, non-volatile memory, and a radio frequency circuit that transmits to a control unit — that allows farmers to know each animal’s vital statistics

    • Read more
  • Dutch police uses unmanned mini-helicopter to sniff out cannabis

    Police in the noerthwest region of the Netherlands asked their engineers to design an unmanned helicopter to hover over the region and sniff out traces of weed smell in the air samples it collects; new methods does not require a warrant to enter buildings

    • Read more
  • U.K. moves forward with comprehensive eavesdropping scheme

    The U.K. government announced last week that it was abandoning the plan to create a centralized super-database in which the personal information of Britons will be kept — but a £1 billion intelligence gathering project is moving forward; the scheme will monitor all all e-mails, Web site visits, and social networking sessions in Britain

    • Read more
  • Al-Qaeda plea deal details communication methods

    Last week Ali Saleh Kahlah al-Marri entered a plea deal in Illinois in which he admitted to entering the United States on 10 September 2001 in order to form a sleeper cell for future terrorist activities; plea details Al-Qaeda’s communication methods

    • Read more
  • Blast-proof CCTV tested by DHS's S&T

    CCTVs help the police identify terrorists who perpetrate an attack; trouble is, the blast set by the terrorists may destroy the camera and its video; there are two solutions: the more expensive one is a real-time streaming-video CCTV which sends images back to HQ until the moment the camera is destroyed; the cheaper alternative is an indestructible video CCTV

    • Read more
  • Drug cartels now use ultralight aircraft to smuggle drug into U.S.

    The drug cartels south of the U.S. border have a new weapon in their arsenal: Ultralight aircraft; these ultralights can carry up to 300 pounds of narcotics

    • Read more
  • DARPA awards Lockheed $399.9 million for blimp

    Lockheed Martin, the world’s largest defense contractor, receives nearly $400 million from the Pentagon to develop a blimp-carrying radar; the radar would be about 6,000 square meters (7,176 square yards) in size

    • Read more
  • Northrop Grumman acquires KillerBee UAV line from Swift

    The KillerBees are blended wing-body UAVs offered in sizes ranging from 6.5 feet to 33.2 feet in wingspan; NG changes name from KillerBee to Bat

    • Read more
  • IARPA dedicates a permanent home on the campus of U Maryland

    The Intelligence Advanced Research Projects Activity (IARPA) prepares to open a University of Maryland research site to develop tools, methods to combat future threats

    • Read more
  • New sensor system protects ports, bridges, and distribution centers

    Sensor networks are an efficient, cost-effective way to monitor critical infrastructure facilities, distributions centers, and more; trouble is, to work effectively you need a very large number of them, and they all have to work collaboratively; a Dutch university researcher offers a better way of achieving this

    • Read more
  • U.K. government drops central database scheme

    Burden of storing communication logs will now fall to ISPs

    • Read more
  • RAID surveillance system deployed along border

    Aerostats differ from blimps in that blimps are powered, while aerostats are anchored to the ground through a cranked tether that also supplies electrical power

    • Read more
  • Aerostats used along India-Pakistan border and in other hotspots

    Unpowered blimps have been used for two decades now; the one aerostat Kuwait owned alerted its leadership to the Iraqi tanks rolling toward the border in 1990; India, Pakistan buy them to bolster their border security

    • Read more
  • Growing problem: Private security companies pose risk to privacy

    Government mandates in the U.K. now require more and more businesses to collect more and more information about individuals who use these businesses’ services; private contractors are hired to handled the collection and handling of the personal information collected; these contractors are not bound by the tight rules governing the government handling of such information (not that the U.K. government is doing a very good job following these rules)

    • Read more
  • « first
  • ‹ previous
  • …
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • …
  • next ›
  • last »

More headlines

  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • Trump’s Homeland Security Ramps Up Surveillance of Legal Immigrants
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Congress aims to strip 'Trojan horse' Chinese drones from all levels of government
  • Spy agencies acquire commercial data with little coordination and few controls
  • States push back against Chinese drones
  • New records reportedly show Homeland Security buying smartphone data to track you
  • New documents reveal 'huge' scale of US government's cell phone location data tracking
  • DHS Opens Counter-Drone Testbed in Richmond
  • National Space Intelligence Center became the 18 member of the U.S. Intelligence Community in January 2021
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • How DHS Laid the Groundwork for More Intelligence Abuse

    I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies