Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Terrorism and counterterrorism

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • U.K. Home Office terrorism advisory site offered link to a porno site

    On Monday, a new EU regulation went into effect mandating that ISPs store details of user e-mails and Internet calls; a Home Office site contained a link for citizens who felt the measure was too intrusive, and who would want to send the Home Office a complaint about it; trouble is, those who clicked on the link were sent to a Japanese porno site

    • Read more
  • DARPA wants stealthy 3D building-interior mapping kit

    SWAT teams, special forces units, and first responders often are called upon to storm buildings in which terrorists hide; would it not be better if these units had up-to-date, accurate pictures of the insides of the structures they are about to storm? DARPA thinks it is a good idea

    • Read more
  • Sudan attack: update

    Israel used “dozens of aircraft” to destroy an Iranian arms convoy in Sudan in late January; UAVs were used for BDA (bomb damage assessment); sources: there was another Israeli attack in Sudan, in early February, and an attack on a ship in the Gulf of Aden

    • Read more
  • Sudan attack demonstrates new U.S.-Israel counter-Iran policy

    Israeli aircraft, with U.S. logistical and intelligence support, attack and destroy an Iranian arms convoy in Sudan; arms were part of an effort by Iran to resupply Hamas’s forces in Gaza

    • Read more
  • Indian security firms: IPL could have been held in India

    Cricket is near religion in India, but fear of terrorist attacks forced the organizers of the high profile Indian Premier League (IPL) to shift the competition from India to South Africa (this is like moving NFL games to, say, Bulgaria); a coalition of Indian private security firms says the move was unnecessary

    • Read more
  • Hi-G-Tek, Trojan Defense work on global nuclear threat early detection

    Hi-G-Tek and Trojan Defense collaborate on developing a global nuclear threat early detection and warning system; the wireless sensor is designed for rapid reporting of WMD in global shipments

    • Read more
  • Taliban continue campaign against cellular service in Waziristan

    Taliban and al-Qaeda militants believe that the CIA and U.S. military rely on cellular communication intercepts to track and kill members of the two organizations; Taliban leaders warned Pakistan not to expand the cellular network in the areas under Taliban control; those networks already in place must be shut down overnight

    • Read more
  • U.S., Germany to collaborate in homeland security research

    U.S., Germany sign a research and development collaboration agreement which will see secret U.S. laboratories open to German scientists

    • Read more
  • U.K. to train workers in counter-terrorism

    Home Office says 60,000 U.K. workers will be trained in counterterrorism so they can assist in responding to terror incidents; the trained workers will augment the existing force of 3,000 dedicated counterterrorism police officers

    • Read more
  • Northern Ireland terror attacks make for uneasy St. Patrick's Day

    The dissident republican splinter terror groups which killed two British soldiers and a Northern Ireland police officer this weekend hope to re-ignite sectarian violence in the province; far from igniting a new civil war, the attacks brought together Protestant and Catholics; for the sake of Northern Ireland’s stability and future, however, the unresolved policing issue should be addressed soon

    • Read more
  • Terrorist Watchlist reaches 1 million entries (representing about 400,000 individuals)

    U.S. Terrorist Watchlist reaches 1 million entries; since many individuals on the list have several entries owing to the different ways in which their names may be rendered, the number of individuals on the list is about 400,000

    • Read more
  • Innovative approach to science and technology education in Pakistan

    A unique experiment: a combination of private money, government support, and intellectual leadership is helping to build the first private research school for science and engineering in Pakistan

    • Read more
  • U.S. slow to pinpoint source of cyber attacks

    U.S. director of national intelligence tells lawmakers that “It often takes weeks and sometimes months of subsequent investigation [to identify the source of a cyber attack]… And even at the end of very long investigations you’re not quite sure who carried out the offensive”

    • Read more
  • Cost of bioterror false alarms, anthrax hoaxes rises

    The U.S. government has spent more than $50 billion since the 2001 anthrax attacks to beef up U.S. defenses against biological attacks; there has not been another attack so far, but the cost of hoaxes and false alarms is rising steeply

    • Read more
  • RAND: Organized crime, terrorists embrace film piracy

    New RAND report says that organized crime and terrorists turn to film piracy for financing their activities; in Malaysia, a pirated DVD costs 70 cents to make and sells on a corner in London for $9, more than 1,000 percent markup

    • Read more
  • « first
  • ‹ previous
  • …
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • next ›
  • last »

More headlines

  • Sentencing postponed for ex-Proud Boys leader Tarrio in Jan. 6 conspiracy
  • FBI Albany and Saratoga County Sheriff’s Office Announce $10,000 FBI Reward for Information Related to the Tampering of a Rail Line in Corinth
  • To Prevent Another 9/11, FAA Requires Secondary Barrier on Aircraft
  • UNOCT/UNCCT and INTERPOL launch publications on countering the use of new technologies for terrorist purposes
  • The unseen consequence of political violence
  • Tactics For Countering Violent Extremism
  • New Details Outline Depth of Former Massachusetts Police Officer’s Role in Charlottesville Race Riot
  • ‘Credible Threat’ Focused on Jewish Community in San Antonio Is Lifted, Suspect in Custody
  • Inspector General: 'DHS could do more to address threats of domestic terrorism'
  • Supreme Court justices face 'heightened threat' after overturning Roe v Wade, DHS secretary says
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Prosecuting Extremists in the U.K.: Charging, Prosecution, and Sentencing Outcomes

    There is a lack of data regarding prosecution and sentencing for terrorism and terrorism-related offences across the three legal jurisdictions of the UK (England and Wales, Scotland, and Northern Ireland). Does the prosecution landscape (charging, prosecution, and sentencing) vary in the UK for extremist actors depending upon the legal jurisdiction?

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies