Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Surveillance

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • U.K. military employs hovering droids in Afghanistan

    Hovering petrol-powered prowler patrols to check Afghan ambush alleys so soldiers do not have to; device may be used by law enforcement in urban areas — and future systems may carry weapons

    • Read more
  • U.K. Home Office denies remote snooping plan

    There have been discussions among EU ministers about giving police more authority to snoop on crime and terror suspects remotely, but the legal framework to do so is yet be created; what is more, techies says it cannot be done

    • Read more
  • Not yet ready for prime time: RFID technology

    RFID technology is incorporated into more and more documents (e-passports, enhanced driver’s licenses); trouble is, the technology still suffers from privacy and security vulnerabilities

    • Read more
  • NORAD continues tradition of tracking Santa Claus

    The North American Aerospace Defense Command (NORAD) is using twenty-first century gear to track Santa Claus: Streaming video, Santa Cams, Google Maps, and Google Earth (and Google Analytics, to watch the watchers)

    • Read more
  • SwissCopter in $15 million Middle East deal

    Swiss developer of manned and unmanned systems for surveillance and search-and-rescue — and the innovative software these systems use — receives an order from an “unnamed Middle Eastern government”

    • Read more
  • Israel-made UAVs gain popularity among world's armies

    Israeli-made Heron UAVs will be introduced to the Afghani theater by the Canadian military; Turkey, India, and Georgia have struck deals for various Israeli UAVs; Russia was impressed with the UAV performance (in Georgian hands) during the August 2008 Russia-Georgia war, that the Russian military is buying them

    • Read more
  • New surveillance system identifies suspicious, lost people

    New surveillance software will attempt to recognize whether a person on the street is acting suspiciously or appears to be lost; intelligent video cameras will be connected to large video screens and geo-referencing software to help law enforcement and security agencies

    • Read more
  • Northrop Grumman unveils the X-47B

    The large UAV — it has a 62-ft. wingspan and weighs around 45,000 pounds at takeoff — is the U.S. military’s principal vanguard for a potential new age of stealthy, autonomous combat aircraft

    • Read more
  • The Blackwater example: Private security booming

    The war on terror has been a boon for private security companies; Blackwater is one of the more obvious success stories; the company is expanding its menu of offerings: it is wrapping up work on its own armored vehicle, the Grizzly, as well as its Polar Airship 400, a surveillance blimp

    • Read more
  • UAV to patrol U.S. northern border in January

    The first UAV is expected to begin patrolling the U.S.-Canada border in January

    • Read more
  • U.K. government grants itself even more data sharing power

    A U.K. government proposal debated in Parliament this week would increase the ability of different government arms to share data

    • Read more
  • High-powered laser for refueling aircraft

    Moving military units from theater to theater is a challenge for the military’s lift capabilities; an integral part of such capabilities is the ability to refuel aircraft in mid-flight, which is dangerous; researchers offer a way to use laser to recharge the plane’s batteries; for now the system is limited to surveillance UAVs, but the developers envision it being used for larger planes

    • Read more
  • Here they go again: China demands access to Western computer security

    Another crisis in U.S.-China trade relations looms, as China, again, is about to introduce rules which would allow Chinese companies to steal Western industrial secrets, and would allow the Chinese government more tightly to monitor what the Chinese people say and read

    • Read more
  • Boeing's new UAV idea

    Boeing has applied for a patent for a UAV that can stay aloft for 10 days or more at 60,000 feet, and for as long as 30 days at lower altitudes, all while carrying payloads of up to 450 kilograms

    • Read more
  • EU considers allowing police to place Trojans on suspects' computers

    Remote searches of suspects’ computers could become a mainstay of cybercrime investigations under a new EU strategy announced last week

    • Read more
  • « first
  • ‹ previous
  • …
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • …
  • next ›
  • last »

More headlines

  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • Trump’s Homeland Security Ramps Up Surveillance of Legal Immigrants
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Congress aims to strip 'Trojan horse' Chinese drones from all levels of government
  • Spy agencies acquire commercial data with little coordination and few controls
  • States push back against Chinese drones
  • New records reportedly show Homeland Security buying smartphone data to track you
  • New documents reveal 'huge' scale of US government's cell phone location data tracking
  • DHS Opens Counter-Drone Testbed in Richmond
  • National Space Intelligence Center became the 18 member of the U.S. Intelligence Community in January 2021
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • How DHS Laid the Groundwork for More Intelligence Abuse

    I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies