Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Technological innovation

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • People Are Overconfident About Spotting AI Faces: Study

    Most people believe they can spot AI-generated faces, but that confidence is out of date. With AI-generated faces now almost impossible to distinguish from real ones, this misplaced confidence could make individuals and organizations more vulnerable to scammers, fraudsters and bad actors.

    • Read more
  • Counter-Drone Technologies Are Evolving – but There’s No Surefire Way to Defend Against Drone Attacks

    Together, these three types of counter-drone technologies – radio frequency, directed energy and kinetic – provide a comprehensive tool kit for addressing the diverse threats posed by unauthorized drones. However, there is no single ideal solution to counter these threats.

    • Read more
  • Momentum Is Building to Meet Electricity Demand in Texas with Small Nuclear Reactors

    The first small modular nuclear reactor could be powering an industrial plant in Texas early in the next decade. And the state is pushing to become the leading site for testing and building the technology.

    • Read more
  • Geothermal Could Replace Almost Half of the EU’s Fossil Fuel Power

    If you’ve ever been to a hot spring or geyser or volcano, you’ve seen the future of energy. Advances in drilling and subsurface engineering are unlocking a constant, clean power source deep within the Earth.

    • Read more
  • Quickly and Precisely Localizing Radioactive Material

    Radioactive, chemical or biological substances are undetectable to humans in threatening situations and difficult to detect with remote sensing. Researchers at the Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE use specially equipped drones and robots to quickly and precisely localize radioactive sources.

    • Read more
  • We’ve Probably Just Seen the USAF’s Secret Electromagnetic Attacker

    Another element in the US Air Force’s plans for long-range operations, essential for Asia-Pacific deterrence, may have emerged from under cover of secrecy: a shadowy uncrewed aircraft designed to fly far and slip into an enemy’s defended zone, undetected until it starts jamming radars. Quite likely, it would carry missiles to knock out radars. Put another way, the evidence adds up to an electromagnetic attack aircraft.

    • Read more
  • Allfare: China’s Whole-of-Nation Strategy

    To analyze how states exert their influence, scholars often compartmentalize actions into rigid analytical frameworks, which obscures the holistic scope of the challenge.

    • Read more
  • What Are Risk Sciences? A New Framework for Understanding Risk and Uncertainty

    Uncertainty is a defining feature of the modern world—from climate change and pandemics to financial instability, cybersecurity threats, and disruptive technologies. Researchers offer a conceptual framework for “risk sciences” — an emerging interdisciplinary field dedicated to studying risk and uncertainty across diverse domains.

    • Read more
  • The Trump Administration’s Cyber Strategy Fundamentally Misunderstands China’s Threat

    The adoption of an offense-first strategy is a dangerous miscalculation. It will not diminish Beijing’s campaigns, and it coincides with a significant deterioration of cyber defenses that have kept U.S. networks and Americans safe.

    • Read more
  • What If We Used AI to Strengthen Democracy?

    AI is just the latest technology in a long line of innovations through history that have influenced politics. While many experts fear artificial intelligence will be deployed to weaken democracy, examples abound around the world of it being used to make systems fairer. Surveillance, control, propaganda aren’t the only options, says security technologist.

    • Read more
  • Cutting Nuclear Power Plant Costs: Argonne Develops Framework for Smarter Maintenance

    Merge a multiphysics simulation with real nuclear reactor inspection data and the result is a revolutionizing tool that predicts component failure before it happens. The study combines advanced simulations with real-world testing to predict how feedwater heater tubes, which preheat water before it enters a nuclear reactor, break down over time. The powerful new tool improves maintenance strategies and extend component lifespan.

    • Read more
  • INL Advances Department of Defense’s Project Pele Demonstration Microreactor with First TRISO Fuel Delivery

    The recent delivery of advanced nuclear fuel to the Idaho National Laboratory’s Transient Reactor Test Facility marks a major milestone for Project Pele, a first-of-its-kind mobile microreactor prototype designed to provide resilient power for military operations.

    • Read more
  • Generative AI Speeds up Cybersecurity Defenses

    Faster adversary emulation helps defenders stop cyberattacks: Scientists are using generative AI to accelerate a key step in the defense against cyberattacks, performing complex operations in minutes instead of weeks.

    • Read more
  • Three National Security Laboratories, One AI Model

    A significant milestone has been not only accomplished but exceeded in the effort to advance artificial intelligence for national security: A federated-learning model prototype. Federated learning is a technique for training AI models on decentralized data.

    • Read more
  • How Hollywood-Style “Break in” Rooms Are Securing the Future of Nuclear

    Security is paramount for the nation’s current fleet of light water reactors, but the stakes for small modular reactors are especially high. Small modular reactors promise quicker build timelines and lower operating costs than light water reactors. They achieve these enhancements through better designs, higher levels of automation and smaller operating crews. But those same design choices could expand the opportunity for cyber and insider threats.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • Orbital datacenters are a pie-in-the-sky idea: Gartner
  • OpenAI says Chinese cops used ChatGPT to plan and track smear ops against opponents
  • Pentagon Threatens “Supply Chain Risk” Label Over AI Guardrails
  • New airport scanners are better at spotting liquid explosives, but many airports lack them
  • DHS S&T Delivers New Capability for Detecting Presence of Life to Law Enforcement
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Trump administration’s AI team comes into focus, as agencies reach 1,700 AI use cases
  • WATCH: AI's Role at DHS with Gary Barber, Matthew Ferraro
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • What If We Used AI to Strengthen Democracy?

    AI is just the latest technology in a long line of innovations through history that have influenced politics. While many experts fear artificial intelligence will be deployed to weaken democracy, examples abound around the world of it being used to make systems fairer. Surveillance, control, propaganda aren’t the only options, says security technologist.

    • Read more
  • The Trump Administration’s Cyber Strategy Fundamentally Misunderstands China’s Threat

    The adoption of an offense-first strategy is a dangerous miscalculation. It will not diminish Beijing’s campaigns, and it coincides with a significant deterioration of cyber defenses that have kept U.S. networks and Americans safe.

    • Read more
  • Allfare: China’s Whole-of-Nation Strategy

    To analyze how states exert their influence, scholars often compartmentalize actions into rigid analytical frameworks, which obscures the holistic scope of the challenge.

    • Read more
  • Counter-Drone Technologies Are Evolving – but There’s No Surefire Way to Defend Against Drone Attacks

    Together, these three types of counter-drone technologies – radio frequency, directed energy and kinetic – provide a comprehensive tool kit for addressing the diverse threats posed by unauthorized drones. However, there is no single ideal solution to counter these threats.

    • Read more
  • A New Way to Make Steel Could Reduce America’s Reliance on Imports

    America has been making steel from iron ore the same way for hundreds of years. Unfortunately, it hasn’t been making enough of it. Today the U.S. is the world’s largest steel importer, relying on other countries to produce a material that serves as the backbone of our society. Hertha Metals uses natural gas and electricity to produce steel and high-purity iron for magnets.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies