According to an anonymous whistleblower, British border guards are “virtually powerless to stop and detain” returning jihadists fighters, Britain’s Telegraph reports.
UK Border Force officers...
Border control officers will now be using drones to monitor the movement of unathorised migrants attempting to cross the English Channel tunnel into the...
China’s People Daily brings news of a new RoboCop type bot developed at China’s National Defence University. The Anbot is designed with anti-terrorism and...
Kenya, the region’s most advanced and biggest economic power, is still facing major hurdles. One of the issues impeding its development is the shaky...
During Operation Protective Edge in 2014, the Israeli military uncovered and destroyed 32 cross-border tunnels beneath Gaza, reaching into Israeli territory. Many of them,...
An El Centro Sector Border Patrol agent assigned to the Calexico Border Patrol Station discovered a cross border tunnel during a routine patrol along...
Russian photography student, Yegor Tsvetkov, has created a demonstration that shows quite how easy it is for computers to identify individuals - complete strangers,...
EU border patrol agency Frontex announced recently that it intends to use remotely piloted aircraft for maritime surveillance, adding drones to its existing portfolio...
The EU has responded favorably to a request from the new UN-backed Libyan unity government for security assistance – especially in managing migration, border monitoring,...
The annual Terrorism and Political Violence Map published recently has highlighted 2015 as the most lethal year for terrorist violence in Europe in nearly...
The United Kingdom may be significantly cutting down its budget for border policing. This worrying trend was revealed by the British Labour Party, that...
Much has been said recently of preparedness for cyberattacks. Intelligence, homeland security, and defence departments and agencies are tasked with setting up defences, coming...
A new report highlights the essential role of counter-terrorism technologies used by diverse partnerships formed across all levels of security services, from international agencies...
The US Department of Defence (DoD) has announced that it’s accepting applications for its “Hack the Pentagon” initiative. This would be the first time...
I-HLS is currently building a new and unique accelerator for Defense and Homeland Security. The accelerator is meant for technological projects after a feasibility...
When we think about protecting critical infrastructure, we usually imagine cameras, fences, men with guns, and other physical manifestations of security. But experts are...