ISR

ISR

The NSA’s MYSTIC program, created in 2009, deploys a “retrospective retrieval” (RETRO) tool which allows agents to rewind and playback all phone conversations that...

Articles and issues discussed in this episode: U.S. DHS cancels national license plate database Israel hacks Iranian nuclear centrifuge system CIA may have acted against U.S. senators...

The proliferation of cyberthreats to communication networks has presented satellite operators with new challenges in protecting customer data against threats. According to Aviation Week security...

Facebook developed a new facial recognition software, operating on a near-human level Human beings, or at least our brains, are oiled facial recognition machines. Light,...

The European border security agency Frontex is calling on industry to present its border surveillance solutions to key stakeholders and EU member state authorities...

The trend is clear- Police forces want UASs for performing their mission. Recently the Sussex police in England began to use a small UAS to...

The U.S has proved again and again that it can utilize cyber weaponry to an effective degree. The employment of the Stuxnet virus by...

Israeli academia and industries invest in the development of UGVs, with the unmanned vehicles being ideal for security * Armies around the world, including...

A non-disclosure agreement that police departments around the country have been signing for years with the maker of a cell-phone spy tool explicitly prohibits...

Static surveillance balloons or blimps are considered almost standard equipment for monitoring borders, facilities, areas and army bases. Similar to unmanned aerial vehicles, modern...

Persistent Threat Detection System (PTDS) aerostats have surpassed more than one million flight hours of ISR work in Afghanistan and Iraq, according to an...

Articles and issues discussed in this report: New system for launching and retrieving ship-based UAVs Iranian hackers infiltrate U.S. Navy networks German Army UAV attrition rates revealed New...

Recently there's a growing demand by security forces and decision makers to achieve real time, continuous intelligence imagery covering a wide area in high...

According to Israel Rom, former Head of CIO and HLS Technologies Directorate at the Israel Prison Service, authorities have to use advanced technologies in...

Cyberspace is massive, flooded with almost incomprehensible amounts of information – some real, some wrong, some biased and some nonsensical. How can you use...

Articles and issues featured in this broadcast: Are F-35 figher jets vulnerable to hackers? The Obama administration's new cybersecurity framework The U.S. Marine Corps is evaluating a...

We know how to install thousands of advanced cameras that cover open and closed, safe and secured areas. We know how to store massive...

Only days after the US Department of Homeland Security began seeking a company to help it track license plates nationwide, the agency has reportedly...

Two brothers, John and Will Ackerly - a former NSA employee and a George W. Bush White House insider - have launched a cyber-privacy...

An analysis of 225 terrorism cases inside the United States since the Sept. 11, 2001, attacks has concluded that the bulk collection of phone...

Magna BSP developed a special application for various maritime targets detection, such as swimmers, vessels, boats, etc. One of the most complicated fields, if not...

iHLS is proud to launch its new TV channel. In today's first show we highlight some of our main stories from recent days, with comments...

Latest