Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Terrorism and counterterrorism

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • DARPA wants stealthy 3D building-interior mapping kit

    SWAT teams, special forces units, and first responders often are called upon to storm buildings in which terrorists hide; would it not be better if these units had up-to-date, accurate pictures of the insides of the structures they are about to storm? DARPA thinks it is a good idea

    • Read more
  • Sudan attack: update

    Israel used “dozens of aircraft” to destroy an Iranian arms convoy in Sudan in late January; UAVs were used for BDA (bomb damage assessment); sources: there was another Israeli attack in Sudan, in early February, and an attack on a ship in the Gulf of Aden

    • Read more
  • Sudan attack demonstrates new U.S.-Israel counter-Iran policy

    Israeli aircraft, with U.S. logistical and intelligence support, attack and destroy an Iranian arms convoy in Sudan; arms were part of an effort by Iran to resupply Hamas’s forces in Gaza

    • Read more
  • Indian security firms: IPL could have been held in India

    Cricket is near religion in India, but fear of terrorist attacks forced the organizers of the high profile Indian Premier League (IPL) to shift the competition from India to South Africa (this is like moving NFL games to, say, Bulgaria); a coalition of Indian private security firms says the move was unnecessary

    • Read more
  • Hi-G-Tek, Trojan Defense work on global nuclear threat early detection

    Hi-G-Tek and Trojan Defense collaborate on developing a global nuclear threat early detection and warning system; the wireless sensor is designed for rapid reporting of WMD in global shipments

    • Read more
  • Taliban continue campaign against cellular service in Waziristan

    Taliban and al-Qaeda militants believe that the CIA and U.S. military rely on cellular communication intercepts to track and kill members of the two organizations; Taliban leaders warned Pakistan not to expand the cellular network in the areas under Taliban control; those networks already in place must be shut down overnight

    • Read more
  • U.S., Germany to collaborate in homeland security research

    U.S., Germany sign a research and development collaboration agreement which will see secret U.S. laboratories open to German scientists

    • Read more
  • U.K. to train workers in counter-terrorism

    Home Office says 60,000 U.K. workers will be trained in counterterrorism so they can assist in responding to terror incidents; the trained workers will augment the existing force of 3,000 dedicated counterterrorism police officers

    • Read more
  • Northern Ireland terror attacks make for uneasy St. Patrick's Day

    The dissident republican splinter terror groups which killed two British soldiers and a Northern Ireland police officer this weekend hope to re-ignite sectarian violence in the province; far from igniting a new civil war, the attacks brought together Protestant and Catholics; for the sake of Northern Ireland’s stability and future, however, the unresolved policing issue should be addressed soon

    • Read more
  • Terrorist Watchlist reaches 1 million entries (representing about 400,000 individuals)

    U.S. Terrorist Watchlist reaches 1 million entries; since many individuals on the list have several entries owing to the different ways in which their names may be rendered, the number of individuals on the list is about 400,000

    • Read more
  • Innovative approach to science and technology education in Pakistan

    A unique experiment: a combination of private money, government support, and intellectual leadership is helping to build the first private research school for science and engineering in Pakistan

    • Read more
  • U.S. slow to pinpoint source of cyber attacks

    U.S. director of national intelligence tells lawmakers that “It often takes weeks and sometimes months of subsequent investigation [to identify the source of a cyber attack]… And even at the end of very long investigations you’re not quite sure who carried out the offensive”

    • Read more
  • Cost of bioterror false alarms, anthrax hoaxes rises

    The U.S. government has spent more than $50 billion since the 2001 anthrax attacks to beef up U.S. defenses against biological attacks; there has not been another attack so far, but the cost of hoaxes and false alarms is rising steeply

    • Read more
  • RAND: Organized crime, terrorists embrace film piracy

    New RAND report says that organized crime and terrorists turn to film piracy for financing their activities; in Malaysia, a pirated DVD costs 70 cents to make and sells on a corner in London for $9, more than 1,000 percent markup

    • Read more
  • Canada's next UAVs will carry bombs

    The UAVs Canadian forces are using in Afghanistan will soon do more than surveillance duty; Canada has leased Heron UAVs from Israel for the purpose of using them in offensive operations

    • Read more
  • « first
  • ‹ previous
  • …
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • next ›
  • last »

More headlines

  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • US judge limits Trump's ability to swiftly deport migrants held at Guantanamo Bay
  • Justice Department Announces Anticipated Distribution of at Least $2B to Victims of State Sponsored Terrorism in 2026
  • Antisemitic incidents in US surge to record high - report
  • Minnesota man arrested after allegedly threatening to 'shoot up' synagogue
  • Domestic extremists with "election-related grievances" could turn to violence, intel bulletin warns
  • New DHS report warns of ongoing ‘heightened threat environment’ ahead of presidential election
  • One-year mark of Oct. 7 attack prompts U.S. intelligence warning of violent extremism
  • Targeted Violence and Terrorism Prevention Grant Program Recipients
  • How the Secret Service will mitigate threats at the 2024 presidential conventions: ANALYSIS
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Patriots’ Day: How Far-Right Groups Hijack History and Patriotic Symbols to Advance Their Cause, According to an Expert on Extremism

    Extremist groups have attempted to change the meaning of freedom and liberty embedded in Patriots’ Day — a commemoration of the battles of Lexington and Concord – to serve their far-right rhetoric, recruitment, and radicalization. Understanding how patriotic symbols can be exploited offers important insights into how historical narratives may be manipulated, potentially leading to harmful consequences in American society.

    • Read more
  • Luigi Mangione and the Making of a ‘Terrorist’

    Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”

    • Read more
  • “Tulsi Gabbard as US Intelligence Chief Would Undermine Efforts Against the Spread of Chemical and Biological Weapons”: Expert

    The Senate, along party lines, last week confirmed Tulsi Gabbard as Director of National intelligence. One expert on biological and chemical weapons says that Gabbard’s “longstanding history of parroting Russian propaganda talking points, unfounded claims about Syria’s use of chemical weapons, and conspiracy theories all in efforts to undermine the quality of the community she now leads” make her confirmation a “national security malpractice.”

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies