Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Terrorism and counterterrorism

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • DOJ Charges High-Ranking Hezbollah Member for 1994 Bombing in Buenos Aires, Argentina

    Samuel Salman El Reda Participated in terrorist operations for Hezbollah in South America, Asia and Lebanon, and helped plan and execute Hezbollah’s July 18, 1994, bombing of the Asociación Mutual Israelita Argentina building in Buenos Aires, killing 85 people.

    • Read more
  • Claims That U.S. Abandoned Arms in Afghanistan are “Farce”: U.S.

    The United States has again denied leaving any weapons in Afghanistan during the American military’s withdrawal from the country in August 2021, dismissing such allegations as “farce.” An administration spokesperson said that over the course of 20 years in Afghanistan, the United States had equipped the Afghan national security forces. In the face of advances by the Taliban insurgency, many Afghan forces had decided not to fight and lay down their arms.

    • Read more
  • 100 Years Ago, the KKK Planted Bombs at a U.S. University – part of the Terror Group’s Crusade Against American Catholics

    The KKK is most infamous for violently terrorizing African Americans. But in the 1920s its hatred also had other targets, especially outside the South. This version of the KKK, known as the Second Ku Klux Klan, harassed Catholics, Jews and immigrants – including students and staff at Catholic universities like Dayton, where I am a historian of American religion.

    • Read more
  • Benbrika Case Shows Australia in Danger of Complacency About Violent Extremism

    The fact that convicted terrorist Abdul Nacer Benbrika is being released from jail should be of concern to all Australians. Alarmingly, it’s happening without the court system even being asked to consider a continuing detention order.

    • Read more
  • Why Pakistan Is Deporting Afghan Migrants

    Pakistan’s decision to deport undocumented migrants over perceived security risks is poised to affect almost two million Afghans.

    • Read more
  • Denialism in the Wake of the Oct. 7 Massacre

    In the wake of the October 7 Hamas massacre, many expressions of solidarity with the Palestinians displayed anti-Israel sentiment and support for Hamas. Most Americans have been exposed to hateful online misinformation and disinformation about the current war. One form of misleading propaganda effort stands out in the current war: Denialism. 

    • Read more
  • U.S. Middle East Vision Emerges as Biden Focuses Beyond Gaza War

    An American vision for a post-Gaza War Middle East is emerging as the Biden administration is exerting an increasing pressure on Prime Minister Benjamin Netanyahu’s war Cabinet to scale back Israel’s 10-week-old campaign to root out Hamas in Gaza amid mounting civilian casualties.

    • Read more
  • What European Security Services Say About the Muslim Brotherhood in Europe

    The Muslim Brotherhood in Europe is a controversial topic, and much of the confusion stems from the opaque and secretive nature of the Brotherhood and, consequently, the difficulty of obtaining clear and unequivocal information.

    • Read more
  • Countering Domestic Violent Extremism in the Ranks: Barriers to Recruitment Screening

    There an uncomfortably high number of Jan. 6 cases involving connections to military, law enforcement, and veteran personnel. These cases echo trends that have existed throughout the 1970s, 1980s, and 1990s. Carrie Cordero and Katherine L. Kuzminski write that these most recent cases once again raise the question of whether the United States has a problem with domestic violent extremism (DVE) in the military, veteran, and law enforcement ranks.

    • Read more
  • Cryptocurrency Tech Firm Blocks Terrorists’ Access to Cash

    Could Israel eradicate Hamas and other terrorist networks without a single person killed and without any boots on the ground or planes in the sky? For one technology firm, fighting terror doesn’t involve killing people, only killing the transfer of funds.

    • Read more
  • The Cross-Platform Evasion Toolbox of Islamic State Supporters

    Extremists exploiting platforms for their own ends and learning along the way is a tale as old as the internet and one that has become even more pronounced in the era of ubiquitous access to social media. Moustafa Ayad writes that over the past three years, a set of exploitation and evasion tactics have become central for Islamic State supporters online, and they are only getting more elaborate.

    • Read more
  • Can Hamas Really Be Completely “Eliminated”?

    The short answer, military analysts say, is “no.” The long answer is more complex. Israel’s campaign may degrade the group’s capabilities but defeating its ideology is likely impossible without a political solution.

    • Read more
  • Israelis and Palestinians Warring Over a Homeland Is Far from Unique

    Seen from the perspective of territorial conflict, the Israeli-Palestinian conflict is far from unique. Ultimately, the tragedy of deep attachment to a homeland territory lies in the fact that while it can create a sense of belonging for one group, it too often comes at the expense of another.

    • Read more
  • Preventing Armed Insurrection: Firearms in Political Spaces Threaten Public Health, Safety, and Democracy

    A new report by researchers at the Johns Hopkins Bloomberg School of Public Health examines the increased threat of armed insurrection to both public health and the functioning of democracy. The report highlights recommendations and policies to help prevent political violence.

    • Read more
  • Holocaust Comparisons Are Overused – but in the Case of Hamas’s Oct. 7 Attack on Israel, Such Comparisons May Reflect More Than Just the Emotional Response of a Traumatized People

    The horrors of Oct. 7 echo the brutal tactics Nazis used during the Holocaust, including not only murder but cruel humiliation of the victims. The testimonies of Oct. 7 survivors reveal the torture of parents and children, sometimes in front of each other, including rape and sexual violence and mutiliation, mocking and lingering in the murder process as the terrorists relished – and recorded — the atrocities they committed. Hamas also shares the Nazi ideological commitment to the annihilation of the Jews. But Oct. 7 is not the same as the Holocaust.

    • Read more
  • « first
  • ‹ previous
  • …
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • …
  • next ›
  • last »

More headlines

  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • US judge limits Trump's ability to swiftly deport migrants held at Guantanamo Bay
  • Justice Department Announces Anticipated Distribution of at Least $2B to Victims of State Sponsored Terrorism in 2026
  • Antisemitic incidents in US surge to record high - report
  • Minnesota man arrested after allegedly threatening to 'shoot up' synagogue
  • Domestic extremists with "election-related grievances" could turn to violence, intel bulletin warns
  • New DHS report warns of ongoing ‘heightened threat environment’ ahead of presidential election
  • One-year mark of Oct. 7 attack prompts U.S. intelligence warning of violent extremism
  • Targeted Violence and Terrorism Prevention Grant Program Recipients
  • How the Secret Service will mitigate threats at the 2024 presidential conventions: ANALYSIS
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Southport Attacks: Why the U.K. Needs a Unified Approach to All Violent Attacks on the Public

    The conviction of Axel Rudakubana for the murder of three young girls in Southport has prompted many questions about how the UK handles violence without a clear ideological motive. This case has also shown up the confusion in this area, and made clear the need for a basic reframing of how we understand murderous violence against the public today.

    • Read more
  • Mis- and Disinformation Trends and Tactics to Watch in 2025

    Predicting how extremists may weaponize false narratives requires an understanding of the strategies that allow them to spread most effectively.

    • Read more
  • Evidence-Based Solutions to Protect Against Mass Attacks

    Mass attacks like the New Year’s Day incident in New Orleans stir public emotion and have tragic consequences. While the investigations into this case will take time, we know from our work that there are things law enforcement and the public can do to mitigate and perhaps stop mass casualty events.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies