perimeter & offshore security

Cutting-Edge Tech at Border, Perimeter & Offshore Security Conference & Exhibition

0
Attend the leading Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishon LeZion West. Israel is...

Mobile phone-detecting drones serve as disaster relief aids

0
US drone maker teams with European disaster relief firm to help make it easier to find victims in times of need US drone maker...

Video Analytics As Power Multiplier For Security Services

0
As time passes, Video Analytics capabilities in investigations carried out by security services turn from a luxury to necessity. Citizens expect the government to...

The Israeli solution for building a situational Awareness Picture

0
At an age in which the battlefield transforms within hours and even minutes, high quality tactical intelligence is the key to smart conduct in...

Innovative Face Recognition technology

0
In this day and age of highly advanced crimes on the one hand, and intensifying terrorism on the other, the sense among intelligence service,...
Self-Screening at Security

Self-Screening at Security Checkpoints

0
As technology develops and becomes more automated and user friendly, more and more self-service technologies have been installed. Whether it be self service banks...

Video Analytics Community Meets at iHLS Conference Today

0
iHLS Conference on Video Analytics today at Rishon LeZion was a great success. Hundreds of professionals and experts in this field participated in the...
improvised explosive

Improvised Explosive Detection – New Approach

0
  On the first floor of the Robert H. Mollohan Research Facility is a small team of researchers who are quietly developing a new, game-changing...

Different terms – same operational challenge – intelligence grip on a...

0
"Terrain Dominance" or "terrain intelligence" or "field presence" are various terms for the same concept: how any military force could have knowledge of the...
smartphone

World First Smartphone Security Scanner

0
Law enforcement teams can now determine if someone is carrying a weapon or explosive - all without the need for a physical search -...

Pentagon Counter-IED Group heads to Iraq as attacks surge

0
The Pentagon’s Joint IED Defeat Organization (JIEDDO) is preparing to deploy members to Iraq where 145 roadside bomb attacks carried out by Islamic State militants killed...

iHLS TV Intelligence Edition – OSINT

0
OSINT: Open Source Intelligence enables intercepting both terrorists and criminals and thwarting their activities

ODNI crowsources speech-recognition software

0
The Intelligence Advanced Research Projects Activity (IARPA) wants to crowdsource ideas for software that would make human speech recorded in noisy environments more easily...

MDA’s new cellular positioning technology

0
A traffic accident in some remote road in the middle of the night. Someone calls 911, at which point the call center asks 'what...

Secure Bridge Monitoring Solution

0
A recent analysis of U.S. Department of Transportation data shows more than one-third of U.S. bridges are in disrepair. There is an increasing national...
cctv industry

First AI-Based Camera in CCTV Industry

0
Artificial Intelligence can be a powerful and versatile new tool with huge potential to drive the public safety sector. The technology can be applied...

Is the Biometric Storage Safe? Hackers succeeded in replicating a fingerprint

0
Over the years, fingerprints have become one of the best decisive means of identification. Nevertheless, it would seem that technology has made a leap...

Israel’s Aviation Security – the Problems and the Solutions

0
Security measures encompassing Israel's aviation are unique. The special circumstances Israel faces, constantly threatened by terror attacks have lead to these solutions. When the...
Photo illust by Pixabay

License-Plate Recognition via Artificial Intelligence

0
Law-enforcement agencies often use automated license-plate recognition (ALPR) technologies to identify the location of vehicles associated with criminal activity. The readers can be mounted...
biometric technology

New Biometric Solutions Sought

0
The UK government is looking to meet with biometric technology firms to help determine existing marketplace capacity to provide fingerprint devices and capture software,...
terrorism

New Device Challenges Terrorists

0
Asymmetric warfare, meaning conventional militaries combatting guerrilla and terrorist organizations, has long posed a challenge for states. New technology combining mobile platforms with the...
cellphone tracking

What Limits to Police Cellphone Tracking?

0
Police departments across the USA quietly use a highly secretive technology developed for the military that can track the whereabouts of suspects by using...

Latest

Fighter Jet Without a Runway? X-BAT Makes It Real

0
A new unmanned vertical take-off and landing (VTOL) fighter platform has been revealed, designed to operate from ships, islands, and austere locations while carrying...