Perimeter Security

Perimeter Security

According to various reports, back in 1990, the South African government at the time extracted the country's inventory of highly enriched uranium from its...

In this day and age of globalization and greater mass access (mostly thanks to the internet and to social media), mass demonstrations have become...

The aviation industry is slow in responding to the threat posed by cyber criminality. This, whether it is posed by criminals, terrorists, nation states,...

This danger is imminent. Britain’s aging nuclear power plants are vulnerable to terrorist attacks by unmanned drones that could kill thousands of people. This...

Nigeria’s Islamist group Boko Haram has declared its allegiance to Islamic State. In a video posted online, Boko Haram’s leader, Abubakar Shekau, in an...

The country’s air traffic control systems are vulnerable to hackers. This, according to a 42-page document entitled "Information Security: FAA Needs to Address Weaknesses...
video

They are small and well hidden and they can detect an invasion. You can find them along the borders of more than 30 countries,...

U.S DHS launches $25K prize for innovative ways to track first responders indoors during incidents. The Homeland Security Department's research and development arm announced it...

  The Minsk II Agreement: Implications of a (Shaky) Ceasefire The Minsk II Agreement, reached on February 12, 2015 between Ukraine and the separatist provinces in...

A new way of detecting chemical weapons: thin-film materials change color in response to chemical warfare agents. In today’s world, in which the threat of...

In this day and age of highly advanced crimes on the one hand, and intensifying terrorism on the other, the sense among intelligence service,...

Advanced submarines, missile boats capable of attacking aircraft, radars capable of tracing underwater strikes. These are some of the features of the Israeli Navy...
video

What does the IDF's technological future have in store? The ground forces future arms systems and munitions, including the Armored Corps and Artillery Corps,...

All a hacker needs to be able to break into your car is an iPad. This, according to a report which was recently released...

  In a few weeks we shall mark the 23rd anniversary of the attack on Israel’s embassy in Buenos Aires, which killed 29 people, of...

Register to iHLS Israel Homeland Security In this weekly Video report (February 10th 2015): U.S Visa waiver program is under attack by many experts Terror attacks on...

Register to iHLS Israel Homeland Security In this weekly Video report (February 3rd 2015): Coalition against Isis: Too Little Too Late Kaspersky Technology Forecast for 2045 The US...

The number of missions unmanned systems are tasked with, as well as their diversity, is expanding each year. The roles they play include a...

Passengers in the U.S are trying to fly well armed. In 2014, the Transportation Security Administration (TSA) said it seized 2,212 firearms in carry-on bags...

There is currently no available off-the-shelf technology to cope with the danger posed by small unmanned aerial systems (UAS) - aka drones. According to experts,...

The European Parliament is considering reviving draft legislation which would force airline companies to give EU member governments a cohesive and uniform set of...

"This is a threat many worldwide prefer not to deal with," say Israeli experts in response to the incident in which a drone landed...