Counter Terror

Counter Terror

Photo illust. US Navy

Stun grenades are a non-lethal weapon used by law enforcement, SWAT teams and military servicemen in order to temporarily disorient a suspect’s or an...
Photo US Coast Guard

The energy industry needs more advanced security tools to help thwart threats to its increasingly connected infrastructure. With the industrial “internet of things” taking...
Photo Mi-24 US Air Force

The Afghan National Defense and Security Forces (ANDSF) have been enhancing their counter-insurgency capabilities. India has recently delivered to Afghanistan the first two of...
acpistoc sensors

An increasing public safety and security risk has been posed by unauthorized drone flights. The U.S. Federal Aviation Administration (FAA) currently receives more than...

We are delighted to invite ground-breaking startups developing disruptive solutions in the security, defense and HLS fields to take part in the prestigious iHLS...

Research found that when an explosion starts, it requires a reaction speed of 120-150 milliseconds to halt it. After an explosion is detected, gas...
computer vision

Computer vision is a type of artificial intelligence that allows computers to interpret images and videos. Many law enforcement and public safety organizations already...
startup competition

We are delighted to invite ground-breaking startups developing disruptive solutions in the security, defense and HLS fields to take part in the prestigious iHLS...

The conference and exhibition Border, Perimeter and Offshore Security, organized by iHLS for the sixth year, was especially important this year over the backdrop...

For security practitioners, it could seem impossible to catch everything that happens in wide, crowded spaces such as airports, stadiums and other large, public...

A Russian face recognition system can be used to control access and prevent unsanctioned access in the military sector. The monitoring cameras of the...

The deployment of 5G technologies offers opportunities for innovation, efficiency, and economic growth, but it may also present risks. The US administration seeks innovative...

Navy vessels occasionally encounter swarms of enemy boats. Navy destroyers, cruisers and littoral combat ships are powerful weapon systems, but a dozen or more...

Warfare in subterranean areas can be a perilous challenge. Subterranean settings can be dangerous to explore because of visual, technical, or environmental challenges. Personnel,...

US border patrol teams need training and instruction from time to time. A new training solution will maximize the efficiency and effectiveness of border...
perimeter & offshore security

Attend the leading Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishon LeZion West. Israel is...
critical infrastructure security

One of the most important aspects of national security is the protection of national critical infrastructures. The incapacity or destruction of such vital physical...

The use of facial recognition technologies has become a widespread phenomenon all over the world. Google, Apple, Facebook, Amazon, and Microsoft have developed their...

At a time when military forces are preparing for an era of urban warfare, a new technology could fulfil an important capability gap for...

The US Homeland Security has been integrating Artificial Intelligence (AI) into its various operations, initiated and overseen primarily by the S&T. One AI technology...

Attend the leading Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishon LeZion West. Israel is...

Attempts to hack public utilities are increasing in frequency and sophistication, making them harder to combat. One of the central targets of hackers are...

iHLS Events