Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Technological innovation

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Invisibility cloak as a protection against tsunamis

    Rather than fortifying sea platforms and coastal towns to withstand tsunamis, it may be possible to use invisibility cloaks to make off-shore platforms, islands, and even cities “invisible” to waves

    • Read more
  • Northrop tests Guardian anti-missile system

    On 8-9 September, Northrop Grumman successfully tested the Guardian anti-missile system; from heights exceeding 50,000 feet, the system successfully detected, tracked, and directed a laser to intercept a target missile

    • Read more
  • Breakthrough: "Math dyslexia," not intelignece, makes people bad at math

    Generations of students who struggled with mathematics in school accepted — and their teachers and parents accepted — that they were just “not good at math”; new research show that the cause was more likely “dyscalculia” — a syndrome which is similar to dyslexia

    • Read more
  • More debate about how best to defend Earth against asteroids

    U.C. Berkeley expert says protecting Earth against incoming asteroids “is not an astronomy problem. It is a financial problem, an accounting problem, an international problem, an organizational problem, a political problem”

    • Read more
  • Seucring airports by reading people's minds (or bodies)

    DHS is testing a machine which, from a distance, senses changes in individuals’ perspiration, respiration, and heart rate typically associated with anxiety one feels before committing a terrorist act

    • Read more
  • Age-guessing software has security, commercial applications

    Fighting Illini researchers develop an age-guessing software which can perform tasks such as security control and surveillance monitoring, and may also be used for electronic customer relationship management

    • Read more
  • GPS vulnerable to spoofing

    GPS technology is ubiquitous in civilian and military applications; Cornell University researchers raise uncomfortable questions by demonstrating how GPS navigation devices can be readliy duped by transmission of fake GPS signals that receivers accept as authentic ones

    • Read more
  • "Thought helmets" for silent, secure communication among soldiers

    U.S. Army funds research into helmets with embedded sensors which “read” a soldier’s thoughts (well, brain waves) and transmit them, telepathy-like, to their intended target

    • Read more
  • U.S. military to be offered flying hover bike

    An innovative Virginia company says its flying — or hovering — bike may be suitable for military missions; the machine offers vertical takeoff, range, and largely hands-off autopiloting

    • Read more
  • Terminating the terminators: Anti-robot defense company launched

    Dot.com 1.0 wonder boy Ben Way launches a company dedicated to anti-robot defense systems; unmanned systems proliferate on and above the battlefield, and more and more of these systems are endowed with autonomous life-and-death decision making capabilities; Way says he wants to make “sure we have control over our own weaponry”

    • Read more
  • Three companies compete for a long-endurance UAV concept

    DARPA’s quest for a long-endurance surveillance UAV — “long endurance” means staying in the air for five years — is not yet a reality, but it is no longer regarded as a pipe dream

    • Read more
  • IBM shows hardware-based encryption tool

    System x Vault protects data when a server’s hard drive is disposed or stolen, without affecting server performance

    • Read more
  • Small robotic drones to join Air Force's arsenal

    Micro Air Vehicles, or MAVs, will add surveillance capabilities to the military and law enforcements; scientists have studied the flight of fruit flies, the crawling of insects, and the perching of birds as they look for ideas for smaller and more effective surveillance machines, and MAVs are one result of these studies

    • Read more
  • Using quantum physics to make better detectors

    MIT researcher shows how entanglement, a peculiar property of quantum physics, may be harnessed for surveillance systems which are as much as a million times more efficient than existing systems

    • Read more
  • Drug-resistant plague may be a bioterrorism concern

    Researchers at Weill Cornell Medical College have located a gene that could mutate to make Yersinia pestis resistant to many common drugs; the bacteria might be used as a potential bioterrorism agent

    • Read more
  • « first
  • ‹ previous
  • …
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • …
  • next ›
  • last »

More headlines

  • Orbital datacenters are a pie-in-the-sky idea: Gartner
  • OpenAI says Chinese cops used ChatGPT to plan and track smear ops against opponents
  • Pentagon Threatens “Supply Chain Risk” Label Over AI Guardrails
  • New airport scanners are better at spotting liquid explosives, but many airports lack them
  • DHS S&T Delivers New Capability for Detecting Presence of Life to Law Enforcement
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Trump administration’s AI team comes into focus, as agencies reach 1,700 AI use cases
  • WATCH: AI's Role at DHS with Gary Barber, Matthew Ferraro
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Entity Resolution: The Security Technology You Probably Haven’t Heard Of

    By Kyle McCurdy

    The concept “entity resolution” (ER) is probably unfamiliar, but it underpins much of the world’s security—in telecommunications, banking and national security.

    • Read more
  • “DeepSeek Is in the Driver’s Seat. That’s a Big Security Problem”

    By Danielle Cave

    Democratic countries have a smart-car problem. For those that don’t act quickly and decisively, it’s about to become a severe national security headache.

    • Read more
  • There’s Little Evidence Tech Is Much Help Stopping School Shootings

    By Emily Greene-Colozzi

    Different security technologies appeal to institutions struggling to protect their communities, and are marketed aggressively as the future of school shooting prevention. I’m a criminologist who studies mass shootings and school violence. In my research, I’ve found that there’s a lack of evidence to support the effectiveness of these technological interventions.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies