Law Enforcement

Law Enforcement

Arazim is one of the participants in the upcoming IAMD conference on March 31 For everyday users such as commuters and drivers, losing their GPS...

According to various reports, back in 1990, the South African government at the time extracted the country's inventory of highly enriched uranium from its...

The threat of chemical attacks against U.S. communities is "different" - based on an individual community's risk. This is according to a statement by...

US Visitor Surveillance System used for Emotional Healing Ostensibly, the motivation behind storing the fingerprints of almost all foreign visitors to the US is in...

In this day and age of globalization and greater mass access (mostly thanks to the internet and to social media), mass demonstrations have become...
video

Register to iHLS Israel Homeland Security In this weekly Video report (March 24th 2015): Turkey and ISIS – more than meets the eye US Navy resting exoskeletons ISIS’s...

Anonymous is perhaps the most notorious of all hacker groups. It is a decentralized online community of tens of thousands of anonymous 'hacktivists', who...

Motorola Solutions adds technology to MTP3000 Series TETRA radios to meet mission-critical demands. The entire MTP3000 Series of Terrestrial Trunked Radios (TETRA) from Motorola Solutions...

Homemade deadly viruses? Scientists are warning that decades of public research on the sequencing of virus DNA are now posing unforeseen threats, as synthesis technologies...

One of the world’s fastest growing technological fields is called ’Lawful Interception’, namely enforcing the law in cyberspace and gathering cyber intelligence, as well...

Increasing cyber threats worldwide have been posing a menace to numerous sectors. It seems the global perplexion knowns no bounds when it comes to...

The threat in clear an imminent. In an effort to prevent attacks or surveillance by Unmanned Aerial Vehicles (UAV), the Secret Service issued a...

Has Successful Terror Gone to Ground? Terrorists have shifted their focus in recent years away from attacking airlines to attacking subway and rail systems. This,...

  Britain’s intelligence agencies are leaving known terrorists to “carry out evil deeds” through a flawed approach which focuses on disrupting suspects rather than prosecuting...

The U.S Homeland Security Department (DHS) is promoting innovative ideas around wearable technology that could benefit first responders. The department's Science and Technology Directorate launched...
video

Register to iHLS Israel Homeland Security In this weekly Video report (March 17th 2015): Converted Prop Guns Are Assassins’ Weapon of Choice Robot Firefighter Puts Out Its...

Threats from terrorism will continue to challenge the United States. This, according to U.S. counterterrorism analysts In a recent congressional testimony, James Clapper, Director of...

European countries are voluntarily providing the United States with large amounts of information about their citizens. Data transfers focus in particular on citizens attempting...

U.S. security officials have long considered sovereign citizen groups a growing threat to domestic security. In a 2014 survey of state and local law...

As though anyone still entertained any doubts, Europe’s counterterrorism laws cannot deal with the current situation where terror groups are flooding the continent. This...

Will the U.S aviation authorities succumb to the pressure for a wide use of UAV (unmanned aerial vehicles) for commercial purposes? For now, the US...
video

They are small and well hidden and they can detect an invasion. You can find them along the borders of more than 30 countries,...