The NSA’s MYSTIC program, created in 2009, deploys a “retrospective retrieval” (RETRO) tool which allows agents to rewind and playback all phone conversations that...
Articles and issues discussed in this episode:
U.S. DHS cancels national license plate database
Israel hacks Iranian nuclear centrifuge system
CIA may have acted against U.S. senators...
The proliferation of cyberthreats to communication networks has presented satellite operators with new challenges in protecting customer data against threats.
According to Aviation Week security...
Facebook developed a new facial recognition software, operating on a near-human level
Human beings, or at least our brains, are oiled facial recognition machines. Light,...
The European border security agency Frontex is calling on industry to present its border surveillance solutions to key stakeholders and EU member state authorities...
Israeli academia and industries invest in the development of UGVs, with the unmanned vehicles being ideal for security * Armies around the world, including...
A non-disclosure agreement that police departments around the country have been signing for years with the maker of a cell-phone spy tool explicitly prohibits...
Static surveillance balloons or blimps are considered almost standard equipment for monitoring borders, facilities, areas and army bases. Similar to unmanned aerial vehicles, modern...
Persistent Threat Detection System (PTDS) aerostats have surpassed more than one million flight hours of ISR work in Afghanistan and Iraq, according to an...
Articles and issues discussed in this report:
New system for launching and retrieving ship-based UAVs
Iranian hackers infiltrate U.S. Navy networks
German Army UAV attrition rates revealed
New...
Recently there's a growing demand by security forces and decision makers to achieve real time, continuous intelligence imagery covering a wide area in high...
According to Israel Rom, former Head of CIO and HLS Technologies Directorate at the Israel Prison Service, authorities have to use advanced technologies in...
Cyberspace is massive, flooded with almost incomprehensible amounts of information – some real, some wrong, some biased and some nonsensical. How can you use...
Articles and issues featured in this broadcast:
Are F-35 figher jets vulnerable to hackers?
The Obama administration's new cybersecurity framework
The U.S. Marine Corps is evaluating a...
Only days after the US Department of Homeland Security began seeking a company to help it track license plates nationwide, the agency has reportedly...
Magna BSP developed a special application for various maritime targets detection, such as swimmers, vessels, boats, etc.
One of the most complicated fields, if not...