Counter Terror

Counter Terror

The secret hacking tactics of Canada’s intelligence agency Canada’s electronic surveillance agency has secretly developed an arsenal of cyber weapons capable of stealing data and...

According to various reports, back in 1990, the South African government at the time extracted the country's inventory of highly enriched uranium from its...

The U.S has blocked any sales of surplus American-made weapon systems by Israel to Nigeria. The Americans also indicated that Israeli made systems should...

The threat of chemical attacks against U.S. communities is "different" - based on an individual community's risk. This is according to a statement by...

US Visitor Surveillance System used for Emotional Healing Ostensibly, the motivation behind storing the fingerprints of almost all foreign visitors to the US is in...
video

Register to iHLS Israel Homeland Security In this weekly Video report (March 24th 2015): Turkey and ISIS – more than meets the eye US Navy resting exoskeletons ISIS’s...

Anonymous is perhaps the most notorious of all hacker groups. It is a decentralized online community of tens of thousands of anonymous 'hacktivists', who...

The Israeli Air Force (IAF) is getting ready to handle terror acts involving civilian aircraft. Aerial terrorism is always on the agenda and demands...

It was only a matter of time. Kurdish sources in Iraq have said they have evidence that the Islamic State (ISIS) used chlorine gas as...

Homemade deadly viruses? Scientists are warning that decades of public research on the sequencing of virus DNA are now posing unforeseen threats, as synthesis technologies...

The hacking group known as Lizard Squad has been making quite a nuisance of itself, associating the hackers with two high profile events. Lizrad...

The threat in clear an imminent. In an effort to prevent attacks or surveillance by Unmanned Aerial Vehicles (UAV), the Secret Service issued a...

Britain’s cyber unit for soldiers familiar with social media. Documents leaked by Edward Snowden demonstrate that the NSA and its allies are preparing for future...

Has Successful Terror Gone to Ground? Terrorists have shifted their focus in recent years away from attacking airlines to attacking subway and rail systems. This,...

  Britain’s intelligence agencies are leaving known terrorists to “carry out evil deeds” through a flawed approach which focuses on disrupting suspects rather than prosecuting...
video

Register to iHLS Israel Homeland Security In this weekly Video report (March 17th 2015): Converted Prop Guns Are Assassins’ Weapon of Choice Robot Firefighter Puts Out Its...

Threats from terrorism will continue to challenge the United States. This, according to U.S. counterterrorism analysts In a recent congressional testimony, James Clapper, Director of...

The aviation industry is slow in responding to the threat posed by cyber criminality. This, whether it is posed by criminals, terrorists, nation states,...

Pakistan’s Army announced the country has recently made a successful launch of a laser-guided missile from an indigenously-developed armed drone, or UAV (unmanned aerial...

The Barak-8 is one of the most advanced air defense systems in the world today. A source in the program told i-HLS the system...

European countries are voluntarily providing the United States with large amounts of information about their citizens. Data transfers focus in particular on citizens attempting...

U.S. security officials have long considered sovereign citizen groups a growing threat to domestic security. In a 2014 survey of state and local law...