Counter Terror

Counter Terror

Emergency communication is of the utmost importance. Emergency services need to coordinate their response in time, but the situation becomes more complicated when the...

If a hacker is capable of breaking in to our computer systems, with a little more effort surely they could disrupt larger targets as...

Cyber Security firm FireEye has published a report revealing that India has been the victim of an advanced capaign of cyber attacks over the...

By Rachel Ehrenfeld* It is surprising that the Islamic State’s use of chemical warfare has taken this long. On August 11, ISIS shelled the northern...

The Gaza strip tunnels are tuneels being dug by the Hamas and other terror organizations inside the strip as part of their fight against...

IBM’s security division has published its security threats reports for the third quarter of 2015 which it pointing out to an increasing danger of...

Paz Shabtai The attempted attack by an armed man aboard a train in Europe has brought attention in the United States and Europe to the...

Arie Egozi Europe has learned from Israel and is also treating recent terror attack as “Lone wolf terrorism”. Europe prefers to delude itself that isn’t...

It’s been said often that the modern warfare is nothing like that of the past since in the past, war was between two trained...

Paz Shabtai After the United States had said earlier this month that it would withdraw two Patriot missile-defense batteries from the border between Turkey and...

Electromagnetic threats such as strong solar flares or intentional nuclear blasts by terrorists could paralyze the entire power grid of a country for several...

The Russian company Systemprom has developed a universal robotic system. Defended by armor, the system can be used for a variety of military missions...

Since 2008, the Transportation Security Administration (TSA) has spent $160 million on scanners to identify passengers which may be carrying weapons. These scanners, however,...

The American Ministry of Defense has announced several days ago that it has decided to increase the number of daily attacks by unmanned aerial...

San Diego, California-based Pfenex Inc. announced it has signed a five year contract valued at up to $143.5 million with the Biomedical Advanced Research...

A group of supporters for the Islamic State terror organization who call themselves the Islamic State Hacking Division has published last week a list...

The GPS (Global Positioning System) is a navigation tool that supplies positioning data and guiding maps to a target point. Not only us drivers...

The evolution of war was a process of development and change throughout human history. At the beginning war was fought on ground, after which...

Earlier this month the U.S. Committee for Homeland Security has published a report that brought no good news. According to the report, the terror...

The field of unmanned aviation is becoming even more central around the world. Many countries are using Unmanned aerial vehicles for operational needs, both...

In the past, wars took place only in the real world: Armies battled each other in the physical spaces while using guns, cannons set...

The word “terrorism” is typically associated with bomb and bullets, but security experts say that there are other types of terrorism which may bring...