Cutting-Edge Tech at Border, Perimeter & Offshore Security Conference & Exhibition
Attend the leading Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishon LeZion West.
Israel is...
Mobile phone-detecting drones serve as disaster relief aids
US drone maker teams with European disaster relief firm to help make it easier to find victims in times of need US drone maker...
Video Analytics As Power Multiplier For Security Services
As time passes, Video Analytics capabilities in investigations carried out by security services turn from a luxury to necessity. Citizens expect the government to...
The Israeli solution for building a situational Awareness Picture
At an age in which the battlefield transforms within hours and even minutes, high quality tactical intelligence is the key to smart conduct in...
Innovative Face Recognition technology
In this day and age of highly advanced crimes on the one hand, and intensifying terrorism on the other, the sense among intelligence service,...
Self-Screening at Security Checkpoints
As technology develops and becomes more automated and user friendly, more and more self-service technologies have been installed. Whether it be self service banks...
Video Analytics Community Meets at iHLS Conference Today
iHLS Conference on Video Analytics today at Rishon LeZion was a great success. Hundreds of professionals and experts in this field participated in the...
Improvised Explosive Detection – New Approach
On the first floor of the Robert H. Mollohan Research Facility is a small team of researchers who are quietly developing a new, game-changing...
Different terms – same operational challenge – intelligence grip on a...
"Terrain Dominance" or "terrain intelligence" or "field presence" are various terms for the same concept: how any military force could have knowledge of the...
World First Smartphone Security Scanner
Law enforcement teams can now determine if someone is carrying a weapon or explosive - all without the need for a physical search -...
Pentagon Counter-IED Group heads to Iraq as attacks surge
The Pentagon’s Joint IED Defeat Organization (JIEDDO) is preparing to deploy members to Iraq where 145 roadside bomb attacks carried out by Islamic State militants killed...
iHLS TV Intelligence Edition – OSINT
OSINT: Open Source Intelligence enables intercepting both terrorists and criminals and thwarting their activities
ODNI crowsources speech-recognition software
The Intelligence Advanced Research Projects Activity (IARPA) wants to crowdsource ideas for software that would make human speech recorded in noisy environments more easily...
MDA’s new cellular positioning technology
A traffic accident in some remote road in the middle of the night. Someone calls 911, at which point the call center asks 'what...
Secure Bridge Monitoring Solution
A recent analysis of U.S. Department of Transportation data shows more than one-third of U.S. bridges are in disrepair. There is an increasing national...
First AI-Based Camera in CCTV Industry
Artificial Intelligence can be a powerful and versatile new tool with huge potential to drive the public safety sector. The technology can be applied...
Is the Biometric Storage Safe? Hackers succeeded in replicating a fingerprint
Over the years, fingerprints have become one of the best decisive means of identification. Nevertheless, it would seem that technology has made a leap...
Israel’s Aviation Security – the Problems and the Solutions
Security measures encompassing Israel's aviation are unique. The special circumstances Israel faces, constantly threatened by terror attacks have lead to these solutions. When the...
License-Plate Recognition via Artificial Intelligence
Law-enforcement agencies often use automated license-plate recognition (ALPR) technologies to identify the location of vehicles associated with criminal activity. The readers can be mounted...
New Biometric Solutions Sought
The UK government is looking to meet with biometric technology firms to help determine existing marketplace capacity to provide fingerprint devices and capture software,...
New Device Challenges Terrorists
Asymmetric warfare, meaning conventional militaries combatting guerrilla and terrorist organizations, has long posed a challenge for states. New technology combining mobile platforms with the...
What Limits to Police Cellphone Tracking?
Police departments across the USA quietly use a highly secretive technology developed for the military that can track the whereabouts of suspects by using...
















































