Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Terrorism and counterterrorism

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Moving Targets: Implications of the Russo-Ukrainian War for Drone Terrorism

    Small and commercially available drones in the hands of violent extremists pose a rapidly growing terrorist threat. This threat hasimplications for global counterterrorism, especially when considering the psychological impact, scalability, and low operational risk of drone attacks.

    • Read more
  • The Quiet War: What’s Fueling Israel’s Surge of Settler Violence – and the Lack of State Response

    Since Oct. 7, 2023, as Israel’s war against Hamas drags on in the Gaza Strip, a quieter but escalating war has unfolded in the West Bank between Israelis and Palestinians. The Jewish settlers’ campaign is not merely a result of rising tension between the settlers and their Palestinian neighbors amid the Gaza conflict. Rather, it is fueled by a confluence of ideological fervor, opportunism and far-right Israelis’ political vision for the region.

    • Read more
  • How Male Grievance Fuels Radicalization and Extremist Violence

    Social extremism is evolving in reach and form. While traditional racial supremacy ideologies remain, contemporary movements are now often fueled by something more personal and emotionally resonant: male grievance.

    • Read more
  • Lessons From the Ledger

    The United States and Canada recently began designating drug cartels and other transnational criminal organizations as terrorist groups, in part to use counterterrorism tools against these organizations. Jessica Davis writes that some “counterterrorist financing tools might yield some results against cartels. But here, the lessons of decades of counterterrorist financing will need to be applied for maximum disruptive effect.”

    • Read more
  • The Psychosocial Imperative of Food Security Preparedness

    The dust has barely settled on the 2025 Australian federal election and the returning government has already reaffirmed its commitment to delivering a national food security strategy. But unless we address the psychological and cultural barriers that shape Australians’ perceptions of food security, even the most technically sound strategies will fail to achieve their intended effect.

    • Read more
  • Terrorgram Block Is a Welcome Step Towards Countering Violent Extremism

    Terrorgram has been linked to lone-actor attacks in Slovakia, Turkey, Brazil and the United States. Its listing places it among the likes of Hamas, Islamic State, and violent white supremacist groups such as Sonnenkrieg Division and The Base.

    • Read more
  • Brazil’s Dangerous Flirtation with Counterterrorism

    The main conversation about terrorism in Brazil is focused on mistaken efforts to label criminal groups as terrorists. This is dangerous, as the term “terrorism” contains within it a power to dress state repression as a proportionate response to emergency. Brazil should not adopt the term “ counterterrorism,” and all that it implies and permits, to address the very serious – but very separate – problem of organized crime.

    • Read more
  • Minnesota Assassination Prompts Many Lawmakers to Wonder: Is Service Worth the Danger?

    More public officials across the country are taking stock of their safety. Nearly 9 in 10 state lawmakers reported facing insults and 4 in 10 facing harassment and threats.

    • Read more
  • Feds Warn Americans at Home and Abroad of Potential Terrorist Attacks

    The U.S. departments of State and Homeland Security issued warnings to Americans on Sunday in all 50 states and living abroad of heightened security concerns and potential terrorist attacks after the U.S. targeted strikes against Iranian nuclear sites.

    • Read more
  • Why U.S. Should Be Worried About Ukrainian Attack on Russian Warplanes

    Audacious — and wildly successful — use of inexpensive drones against superior force can be used anywhere, against anyone.

    • Read more
  • Violent Extremists Like the Minnesota Shooter Are Not Lone Wolves

    The threat of domestic violence and terrorism is high in the United States – especially the danger posed by white power extremists, many of whom believe white people are being “replaced” by people of color. Contrary to popular myth, the vast majority of far-right extremists are not abnormal deviants with anti-social personalities, but are, in fact, otherwise ordinary men and women.

    • Read more
  • Escalation Between Israel, Iranian Regime Sparks Vicious Antisemitic, Anti-Israel Rhetoric Online

    As reports emerged of preemptive Israeli airstrikes against the Iranian regime late Thursday evening (early Friday local time), antisemites and extremists of varying ideologies quickly reacted with their predictable rhetoric: open hatred of Jews and hoping for the destruction of Israel.

    • Read more
  • Trump’s Justifications for the Latest Travel Ban Aren’t Supported by the Data on Immigration and Terrorism

    This travel ban, like the earlier ones, will not significantly improve national security and public safety in the United States. That’s because migrants account for a minuscule portion of violence in the U.S. And migrants from the latest travel ban countries account for an even smaller portion.

    • Read more
  • Trump Practically Bans Travel and Immigration from 12 Countries with Flimsy Security Justifications

    The US government has a responsibility to keep terrorists and criminals out of the country and to remove those who make it through. But the government should pursue a rational and evidence-based approach when evaluating the threat posed by foreign nationals. The Trump administration has banned large swaths of travelers and immigrants from many countries based on evidence that it likely won’t release and, if it does, will likely raise more questions than answers.

    • Read more
  • Boulder Fire-Attack Suspect's Family in ICE Custody, Pending Deportation

    The family members of the suspect in Sunday’s Colorado attack have been detained by U.S. Immigration and Customs Enforcement officials and could be deported as early as Tuesday evening.

    • Read more
  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »

More headlines

  • DOD to deploy counter-drone capabilities at US-Mexico border as cartels surveil troops
  • US judge limits Trump's ability to swiftly deport migrants held at Guantanamo Bay
  • Justice Department Announces Anticipated Distribution of at Least $2B to Victims of State Sponsored Terrorism in 2026
  • Antisemitic incidents in US surge to record high - report
  • Minnesota man arrested after allegedly threatening to 'shoot up' synagogue
  • Domestic extremists with "election-related grievances" could turn to violence, intel bulletin warns
  • New DHS report warns of ongoing ‘heightened threat environment’ ahead of presidential election
  • One-year mark of Oct. 7 attack prompts U.S. intelligence warning of violent extremism
  • Targeted Violence and Terrorism Prevention Grant Program Recipients
  • How the Secret Service will mitigate threats at the 2024 presidential conventions: ANALYSIS
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Online Mobilization and Violence in the United States

    Even before the Charlie Kirk assassination, the United States was facing a resurgence of politically motivated violence that is deeply intertwined with the digital sphere. Extremists across the ideological spectrum exploit acts of violence to recruit followers, justify their ideologies, and sustain propaganda networks.

    • Read more
  • White Nationalism Fuels Tolerance for Political Violence Nationwide

    Political violence is certainly not new in American society, but current patterns differ in key ways. We found that, today, white nationalism is a key driver of support for political violence –a sign that white nationalism poses substantial danger to U.S. political stability.

    • Read more
  • Political Violence Offers Extremist “Trigger Events” for Recruiting Supporters

    Extremists are exploiting political violence by using online platforms to recruit new people to their causes and amplify the use of violence for political goals. High-profile incidents of political violence are useful trigger events for justifying extremist ideologies and calls for retaliation.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies