Counter Terror

Counter Terror

Revolutions in IDF Ground Arm

0
The technological and organizational revolutions in IDF Ground Arm has been gaining momentum. The multiple changes include a response to the offensive, border-crossing tunnels...
artificial intelligence

0
Artificial intelligence technology is infiltrating the travel industry, and it’s bringing a host of new conveniences and capabilities with it, from personalized recommendations and...
homeland security market

0
The Middle East homeland security market is on course for significant growth. A recent study by Analysts Frost & Sullivan (F&S) says revenues are...

0
Intelligence analysis shows terrorist groups are actively pursuing Weapons of Mass Destruction (WMD) capabilities, are using battlefield environments to test them, and may be...
electroshock weapon

2
A revolutionary wireless electroshock weapon is in the process of issue by the US Patent Office. The device is defined as a non-lethal weapon...
close-quarter combat

3
US Army soldiers fighting in Iraq and Afghanistan have been gaining more than a decade of experience in close-quarter combat, an ability to maneuver...
blockchain

1
Police and security agencies around the world have so far only taken an interest in blockchain – the distributed ledger technology behind cryptocurrencies like...
face recognition

1
Moscow has been bringing CCTV (Closed Circuit TV) security to the next level, through a partnership that brings artificial intelligence to bear in ways...
anti-terror

0
Forest surveillance in northeast China is the latest mission to add to the list of civil tasks conducted by drones in the Rainbow series,...
bomb disposal

0
First responders must stay up-to-date on the latest tactics and techniques for improvised explosive devices (IED) response. How does the Department of Homeland Security...
robot

3
Missions such as clearing buildings, detecting explosive charges etc. in a hostile environment often endanger the lives of soldiers and law enforcement officers. A...
dual-use technologies

0
Lawmakers in the European Union have advanced plans to subject hacking tools to export controls currently reserved for depleted uranium, human pathogens and other...
socom

3
Snipers are often equipped with various rifles to use in different situations. But when a mission evolves quickly, they have to choose which ones...
simulation

1
Gaming and AR/VR technologies are applied to simulate real-world challenges in various fields. The Virtual Heroes Division of Applied Research Associates (ARA) has been...
pistol

0
The new VP9SK pistol by Heckler & Koch is a subcompact version of its highly popular and reliable VP9 full-size pistol in 9mm. A...
iot conference

0
Constantly updating systems capable of confronting the changing threats should be developed, this is one of the recommendations regarding IoT cyber threats, according to...
groundbreaking technologies

0
We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian defense, securing government institutions vital infrastructure and borders,...
Heron-1

1
UAVs from Singapore's UAV Command have been deployed in the fight against terror in Afghanistan. The unmanned aerial vehicles are the Heron-1 manufactured by...
emotion scanning

0
The ability to tell us live in real time what a certain person is feeling and give insight into certain personality traits which can...
social media

1
Data found on social media can be used for a variety of missions including psychological operations, intelligence gathering etc. “It’s vital for information about...

3
Unlike airplanes and helicopters, smart surveillance balloons don’t need human operators in the sky. And in contrast to drones, they can spend long periods...
shooter

1
Several cases of mass shooting in public places have occurred in the US in recent years. A small, relatively inexpensive device could make the...

iHLS Events

1034