The threat of chemical attacks against U.S. communities is "different" - based on an individual community's risk. This is according to a statement by...
US Visitor Surveillance System used for Emotional Healing
Ostensibly, the motivation behind storing the fingerprints of almost all foreign visitors to the US is in...
Register to iHLS Israel Homeland Security
In this weekly Video report (March 24th 2015):
Turkey and ISIS – more than meets the eye
US Navy resting exoskeletons
ISIS’s...
According to the Stockholm International Peace Research Institute (SIPRI), in the period between 1985 and 2014, 60.7% of all exported unmanned aircraft in the...
Anonymous is perhaps the most notorious of all hacker groups. It is a decentralized online community of tens of thousands of anonymous 'hacktivists', who...
Motorola Solutions adds technology to MTP3000 Series TETRA radios to meet mission-critical demands.
The entire MTP3000 Series of Terrestrial Trunked Radios (TETRA) from Motorola Solutions...
Homemade deadly viruses?
Scientists are warning that decades of public research on the sequencing of virus DNA are now posing unforeseen threats, as synthesis technologies...
One of the world’s fastest growing technological fields is called ’Lawful Interception’, namely enforcing the law in cyberspace and gathering cyber intelligence, as well...
In tandem with the defense budget hearings this past week in Congress, the Missile Defense Advocacy Alliance held an open roundtable discussion on Missile...
Elbit Systems U.S. Subsidiary Awarded a $73.4 Million USMC IDIQ Contract for Common Laser Range Finder - Integrated Capability.
Haifa, Israel, March 22, 2015 –...
Illustration
Flight simulators feature a major advance for air forces worldwide, not only in terms of pilots’ training and combat readiness, but also in terms...
This unmanned helicopter is designed to feature protection from hacking.
Boeing is set to replace 100,000 lines of code on its Little Bird drone before...
Voice biometrics, fingerprints, iris scans, and other authentication options are beginning to replace passwords as a means to verify a user's identity and simplify...
Britain’s cyber unit for soldiers familiar with social media.
Documents leaked by Edward Snowden demonstrate that the NSA and its allies are preparing for future...
Has Successful Terror Gone to Ground?
Terrorists have shifted their focus in recent years away from attacking airlines to attacking subway and rail systems. This,...
Britain’s intelligence agencies are leaving known terrorists to “carry out evil deeds” through a flawed approach which focuses on disrupting suspects rather than prosecuting...
Russian arms manufacturer Kalashnikov decided to establish a joint venture dedicated to producing unmanned aerial vehicles (UAVs). The weapons giant has decided to purchase...