Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Terrorism and counterterrorism

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • “Terror Granny” Charged with Plotting German Civil War to Bring Back the Kaiser

    A 75-year old retired theology professor was arrested and charged with organizing a nationalist, far-right terrorist group aiming to bring back the Kaiser. The group aimed to attack power stations and transmitters in order to plunge large parts of Germany into black out in the hope of promoting civic unrest.

    • Read more
  • What Is a Terrorist Movement?

    The analysis of terrorism is plagued with definitional disagreements, and most of the definition in use suffer from gaps, ambiguities, and inconsistencies. Daniel Byman writes that terms such as “groups” or organizations” no longer applies to many who engage in terrorist activities – but the term “lone wolf” is also misleading. He offers the term “network: “Network analysis can be another way to identify the contours of a dangerous movement.” Because so many of today’s terrorism challenges “are better characterized as movements or networks rather than as groups or organizations, it is valuable to explore how such amorphous concepts might be operationalized.”

    • Read more
  • Self-Identified “Incel” Plotted Mass Shooting of Women at OSU

    A 22-year old Ohio man admitted he plotted a mass shooting of women at a university in Ohio. The man identified as an “incel” or “involuntary celibate.” The incel movement is an online community of predominantly men who harbor anger towards women.

    • Read more
  • U.S. Strikes IS Leadership Twice in 24 Hours

    A weakened and wary Islamic State terror group suffered a new round of setbacks when U.S. forces targeted three key leaders in two operations across northern Syria in a single day.

    • Read more
  • Violent Extremists, terrorists Targeting U.S. Critical Infrastructure

    Violent extremists and terrorist organizations of numerous ideological persuasions have conducted devastating attacks on critical infrastructure in the United States. Today’s terrorism threat picture in the U.S. is incredibly fluid, dynamic, and dangerous, and under this backdrop authorities are increasingly worried about an uptick in terrorist plotting against critical infrastructure.

    • Read more
  • Terrorists Use Humor in English-language Propaganda Magazines to Reinforce Identity

    Humor is used in English-language jihadi terrorist magazines to reinforce identity and help groups bond, research suggests. The study says the regularity of dehumanizing humor in ISIS’s magazines reflects their overall aggressive and uncompromising stance on outsiders and opponents.

    • Read more
  • Facial Recognition Technology and Counter-Terror Operations

    The use of facial recognition technology in counterterrorism must address several formidable challenges before being adopted. This means we should proceed careful, even cautiously, before operationalizing the technology.

    • Read more
  • India Bans Islamic Group PFI Over “Terrorism” Concerns

    The Indian government called the Popular Front of India (PFI) an “unlawful association.” This month, at least 200 PFI members have been detained.

    • Read more
  • Violent Extremist Music Prevalent on Spotify, While Platform Largely Declines to Act

    Music has long been an effective way to radicalize extremists, allowing artists to both entertain and indoctrinate vulnerable listeners. Researchers have identified 40 racially or ethnically motivated violent extremist (RMVE) artists with a presence on Spotify, the world’s largest music streaming platform.

    • Read more
  • Scapegoating of Jews for the 1969 Al-Aqsa Arson Continued as Usual in 2022

    August 21 marked the 53rd anniversary of the 1969 al-Aqsa Mosque arson and the ongoing disinformation campaigns scapegoating Jews and Israel for the attack. The culprit, Denis Michael Rohan – a Protestant extremist from Australia who believed his actions would prompt the Second Coming of Jesus – but Middle Eastern outlets have been publishing inaccurate reports of the event to this day.

    • Read more
  • Guantanamo Bay: Twenty Years of Counterterrorism and Controversy

    The U.S. military detention center at Guantanamo Bay, Cuba, has generated intense debate for two decades, raising enduring questions about national security, human rights, and justice.

    • Read more
  • 9/11 Survivors’ Exposure to Toxic Dust and the Chronic Health Conditions That Followed Offer Lessons That Are Still Too Often Unheeded

    After the 9/11 attack, more than 100,000 responders and recovery workers from every U.S. state – along with some 400,000 residents and other workers around ground zero – were exposed to a toxic cloud of dust that fell as a ghostly, thick layer of ash and then hung in the air for more than three months. The World Trade Center dust plume consisted of a dangerous mixture of cement dust and particles, asbestos and a class of chemicals called persistent organic pollutants. The dust also contained heavy metals that are known to be poisonous to the human body and brain, such as lead and mercury, and PCB.

    • Read more
  • The Oath Keepers Data Leak: Unmasking Extremism in Public Life

    A data leak revealed the information of thousands of people whose names were in an Oath Keepers database as having paid for a membership at some point. The Oath Keepers are an anti-government extremist group associated with the militia movement.

    • Read more
  • Two Constables, Four Police Chiefs and More Than 3,000 other Texans Were Members of the Oath Keepers: Report

    A recent analysis of Oath Keepers’ membership rolls leaked last year found that Texas had more members of the far-right extremist group than any other state — and the most who worked as elected officials, law enforcement officers or members of the military.

    • Read more
  • A Protein Could Prevent Chemical Warfare Attack

    A team of scientists has designed a synthetic protein that quickly detects molecules of a deadly nerve agent that has been classified by the United Nations as a weapon of mass destruction and could be used in a chemical warfare attack.

    • Read more
  • « first
  • ‹ previous
  • …
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • …
  • next ›
  • last »

More headlines

  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • US judge limits Trump's ability to swiftly deport migrants held at Guantanamo Bay
  • Justice Department Announces Anticipated Distribution of at Least $2B to Victims of State Sponsored Terrorism in 2026
  • Antisemitic incidents in US surge to record high - report
  • Minnesota man arrested after allegedly threatening to 'shoot up' synagogue
  • Domestic extremists with "election-related grievances" could turn to violence, intel bulletin warns
  • New DHS report warns of ongoing ‘heightened threat environment’ ahead of presidential election
  • One-year mark of Oct. 7 attack prompts U.S. intelligence warning of violent extremism
  • Targeted Violence and Terrorism Prevention Grant Program Recipients
  • How the Secret Service will mitigate threats at the 2024 presidential conventions: ANALYSIS
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Patriots’ Day: How Far-Right Groups Hijack History and Patriotic Symbols to Advance Their Cause, According to an Expert on Extremism

    Extremist groups have attempted to change the meaning of freedom and liberty embedded in Patriots’ Day — a commemoration of the battles of Lexington and Concord – to serve their far-right rhetoric, recruitment, and radicalization. Understanding how patriotic symbols can be exploited offers important insights into how historical narratives may be manipulated, potentially leading to harmful consequences in American society.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies