Counter Terror

Counter Terror

counter-uav

Frequently, counter drone warfare demands detection and attack capabilities on-the-move, from ground vehicles. A counter Unmanned Aerial Vehicle (UAV) technology was successfully integrated in-vehicle...
security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.? We...
video analytics

Artificial intelligence algorithms form the basis of video analytics next-generation technologies. The numerous visitors who attended the iHLS Video Analytics 2018 Conference today learned...
world's first helmet

Protecting law enforcement officers and supplying them with situational awareness has become more and more important over the backdrop of evolving threats. A new...
mail bombs

Screening inbound mail against postal IEDs and other personal harm devices is becoming a standard practice in organizations. The past series of mail bombs...
combat drone

China has exported numerous drones to countries across the Middle East, presenting them as comparable to US products with less restrictions and for a...
drone swarms

The U.S. Military has been facing the threat of drones, including commercially available ones, capable of spying on and attacking U.S. forces. The threat...
armor-piercing bullets

With the advancements in weapon technology and the emergence of new models of bullets, soldiers and law enforcement officers need more advanced bulletproof vests....
iron dome

Dozens of rockets fired from the Gaza Strip during the recent 24-hours to Israel’s territory were intercepted by Iron Dome system. This world's only...

According to Israel's Home Front Command directions: When the siren is sounded or an explosion is heard, enter the protected space within the amount of...
security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.? We...
video analytics

Video analytics technology, the advanced security camera based algorithm analysis, has been undergoing a major revolution in recent years. Israel is at the forefront...
fortnight gaming

Schools and campuses in the US have been target to a large number of violent attacks. First responders and educators now have a new,...
counter-drone

Given the recent drone attack on the Venezuelan president and the high profile mailbomb terrorist attacks in the United States, a new counter-drone jamming...

A recent publication by the Meir Amit Intelligence and Terrorism Information Center evaluates that ISIS still has drone warfare capabilities despite setbacks and Syria...
video analytics

Video analytics technology, the advanced security camera based algorithm analysis, has been undergoing a major revolution in recent years. Israel is at the forefront...
audio

About 27% of Singapore’s national budget currently goes to security and national defense. In the face of rising and complex security threats, Singapore’s major...
terrorism

Asymmetric warfare, meaning conventional militaries combatting guerrilla and terrorist organizations, has long posed a challenge for states. New technology combining mobile platforms with the...
video analytics

Video analytics technology, the advanced security camera based algorithm analysis, has been undergoing a major revolution in recent years. Israel is at the forefront...

Whether accidental or malicious, unauthorized unmanned aerial vehicles in proximity to critical infrastructure could have devastating impacts. New airborne and ground-based ultra-long-range radar systems...
machine gun

A new US Army initiative aims to produce a smart, ultra-compact weapon design for specific missions. This discreet and easy-to-conceal weapon will also enable...

Manual authentication in airports means that passengers need to present different forms of ID such as boarding cards, booking reference numbers as well as...

iHLS Events