Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Technological innovation

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • AI and the Spread of Fake News Sites: Experts Explain How to Counteract Them

    With national elections looming in the United States, concerns about misinformation are sharper than ever, and advances in artificial intelligence (AI) have made distinguishing genuine news sites from fake ones even more challenging.

    • Read more
  • How to Keep Robots from Killing Us

    By Zachy Hennessey

    Closer robot-human interaction presents positive opportunities, but also some danger. An expert gives us 3 key insights on managing the relationship.

    • Read more
  • Cybersecurity Software Wins a 2024 Federal Laboratory Consortium Excellence in Technology Transfer Award

    By Ariana Tantillo

    Lincoln Laboratory–developed Timely Address Space Randomization (TASR) was transferred to two commercial providers of cloud-based services.

    • Read more
  • Science Fiction Meets Reality: New Technique Overcome Obstructed Views

    By Cassidy Delamarter

    Using a single photograph, researchers created an algorithm that computes highly accurate, full-color three-dimensional reconstructions of areas behind obstacles – a concept that can not only help prevent car crashes, but help law enforcement experts in hostage situations, search-and-rescue and strategic military efforts.

    • Read more
  • Earthquake Fatality Measure Offers New Way to Estimate Impact on Countries

    A new measure that compares earthquake-related fatalities to a country’s population size concludes that Ecuador, Lebanon, Haiti, Turkmenistan, Iran and Portugal have experienced the greatest impact from fatalities in the past five centuries.

    • Read more
  • Cybersecurity for Satellites Is a Growing challenge, as Threats to Space-Based Infrastructure Grow

    By Sylvester Kaczmarek

    In today’s interconnected world, space technology forms the backbone of our global communication, navigation and security systems. As our dependency on these celestial guardians escalates, so too does their allure to adversaries who may seek to compromise their functionality through cyber means.

    • Read more
  • Cybersecurity and Data Protection: Does ChatGPT Really Make a Difference?

    Cybersecurity and data privacy have become central concerns, affecting business operations and user safety worldwide. A new analysis has looked at the various approaches to cybersecurity and data protection taken by key global players, namely the European Union, the United States, and China.

    • Read more
  • If Russia Is Developing Some Kind of Space-Based Weapon, Putin May Never Get to Use It. Here’s Why.

    By Tanner Stening

    Although it’s unclear exactly what the feared Russian capability is, the country may be too crippled by the war in Ukraine to ever test such a weapon, says an expert who focuses on space diplomacy.

    • Read more
  • Cult of the Drone: At the 2-Year Mark, UAVs Have Changed the Face of War in Ukraine – but Not Outcomes

    By Paul Lushenko

    Unmanned aerial vehicles, or drones, have been central to the war in Ukraine. Some analysts claim that drones have reshaped war, yielding not just tactical-level effects, but shaping operational and strategic outcomes as well. Mounting evidence, however, suggests that drones have delivered some tactical and operational successes for both Ukraine and Russia. Yet they are strategically ineffective.

    • Read more
  • Are Drones Revolutionizing Warfare? They Do Not, Skeptics Argue

    Drones have been employed by both sides to the Russia-Ukraine war on unprecedented scale. The prevalence of drones in Ukraine and other recent conflicts has led some observers to conclude that drones are revolutionizing warfare, while other analysts argue that drones are incremental improvements to existing technologies. These drone-skeptics contend that drones are not fundamentally shifting the character of war.

    • Read more
  • Study Projects Geothermal Heat Pumps’ Impact on Electrical Grid, Carbon Emissions

    New study gives the first detailed look at how geothermal energy can relieve the electric power system and reduce carbon emissions if widely implemented across the United States within the next few decades.

    • Read more
  • Using AI to Develop Enhanced Cybersecurity Measures

    Using artificial intelligence to address several critical shortcomings in large-scale malware analysis, researchers are making significant advancements in the classification of Microsoft Windows malware and paving the way for enhanced cybersecurity measures.

    • Read more
  • China’s Chip Industry Is Gaining Momentum – It Could Alter the Global Economic and Security Landscape

    By Robyn Klingler-Vidra and Steven Hai

    China is advancing its semiconductor capabilities. The economic, geopolitical and security implications will be profound and far-reaching. Given the stakes that both superpowers face, what we can be sure about is that Washington will not easily acquiesce, nor will Beijing give up.

    • Read more
  • American Nuclear Power Plants Are Among the Most Secure in the World — What If They Could Be Less Expensive, Too?

    By Kristen Mally Dean

    Researchers harness the power of machine learning-driven models to study nuclear reactor performance as scientists seek to develop cost-effective small nuclear reactors.

    • Read more
  • Using AI to Monitor the Internet for Terror Content Is Inescapable – but Also Fraught with Pitfalls

    By Stuart Macdonald, Ashley A. Mattheis, and David Wells

    This vast ocean of online material needs to be constantly monitored for harmful or illegal content, like promoting terrorism and violence. The sheer volume of content means that it’s not possible for people to inspect and check all of it manually, which is why automated tools, including artificial intelligence (AI), are essential. But such tools also have their limitations.

    • Read more
  • « first
  • ‹ previous
  • …
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • …
  • next ›
  • last »

More headlines

  • DHS S&T Delivers New Capability for Detecting Presence of Life to Law Enforcement
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Trump administration’s AI team comes into focus, as agencies reach 1,700 AI use cases
  • WATCH: AI's Role at DHS with Gary Barber, Matthew Ferraro
  • 42.5% of Fraud Attempts Are Now AI-Driven: Financial Institutions Rushing to Strengthen Cyber Defenses
  • Researchers propose hydrogen storage using existing infrastructure in lakes and reservoirs
  • China, Clean Technologies, and National Security
  • Bill ordering DHS to explore AI for border security passes House
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Are We Ready for a ‘DeepSeek for Bioweapons’?

    Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”

    • Read more
  • Bookshelf: Preserving the U.S. Technological Republic

    By John West

    The United States since its founding has always been a technological republic, one whose place in the world has been made possible and advanced by its capacity for innovation. But our present advantage cannot be taken for granted.

    • Read more
  • Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled

    “The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.

    • Read more
  • Ukraine Drone Strikes on Russian Airbase Reveal Any Country Is Vulnerable to the Same Kind of Attack

    By Michael A. Lewis

    Air defense systems are built on the assumption that threats come from above and from beyond national borders. But Ukraine’s coordinated drone strike on 1 June on five airbases deep inside Russian territory exposed what happens when states are attacked from below and from within. In low-level airspace, visibility drops, responsibility fragments, and detection tools lose their edge. Drones arrive unannounced, response times lag, coordination breaks.

    • Read more
  • Shots to the Dome—Why We Can’t Model US Missile Defense on Israel’s “Iron Dome”

    By Justin Logan

    Starting an arms race where the costs are stacked against you at a time when debt-to-GDP is approaching an all-time high seems reckless. All in all, the idea behind Golden Dome is still quite undercooked.

    • Read more
  • Our Online World Relies on Encryption. What Happens If It Fails?

    By Maureen Stanton

    Quantum computers will make traditional data encryption techniques obsolete; BU researchers have turned to physics to come up with better defenses.

    • Read more
  • Virtual Models Paving the Way for Advanced Nuclear Reactors

    By Marguerite Huber

    Computer models predict how reactors will behave, helping operators make decisions in real time. The digital twin technology using graph-neural networks may boost nuclear reactor efficiency and reliability.

    • Read more
  • Critical Minerals Don’t Belong in Landfills – Microwave Tech Offers a Cleaner Way to Reclaim Them from E-waste

    E-waste recycling focuses on retrieving steel, copper, aluminum, but ignores tiny specks of critical materials. Once technology becomes available to recover these tiny but valuable specks of critical materials quickly and affordably, the U.S. can transform domestic recycling and take a big step toward solving its shortage of critical materials.

    • Read more
  • Microbes That Extract Rare Earth Elements Also Can Capture Carbon

    By Krisy Gashler

    A small but mighty microbe can safely extract the rare earth and other critical elements for building everything from satellites to solar panels – and it  has another superpower: capturing carbon dioxide.

    • Read more
  • Virtual Models Paving the Way for Advanced Nuclear Reactors

    By Marguerite Huber

    Computer models predict how reactors will behave, helping operators make decisions in real time. The digital twin technology using graph-neural networks may boost nuclear reactor efficiency and reliability.

    • Read more
  • Critical Minerals Don’t Belong in Landfills – Microwave Tech Offers a Cleaner Way to Reclaim Them from E-waste

    E-waste recycling focuses on retrieving steel, copper, aluminum, but ignores tiny specks of critical materials. Once technology becomes available to recover these tiny but valuable specks of critical materials quickly and affordably, the U.S. can transform domestic recycling and take a big step toward solving its shortage of critical materials.

    • Read more
  • Microbes That Extract Rare Earth Elements Also Can Capture Carbon

    By Krisy Gashler

    A small but mighty microbe can safely extract the rare earth and other critical elements for building everything from satellites to solar panels – and it  has another superpower: capturing carbon dioxide.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies