South Korea Developing Its Own Attack Helicopter
South Korea is planning to develop an indigenous attack helicopter to meet a Republic of Korea Marine Corps (RoKMC) requirement for 20–24 such rotorcraft....
Manned-Unmanned Teaming at Naval Arena
Manned-unmanned teaming provides added value to military operations. Using a blend of information from unmanned and manned ships and aircraft, a US guided-missile destroyer...
New Counter-EW Capability Demonstrated
To navigate in electronic-warfare (EW) environments, armed forces need reliable and resilient GNSS/GPS positioning with anti-jam technology.
A new anti-jam technology for assured positioning, navigation...
From Training Drone into Kamikaze Drone
Turkey has converted a target drone into a kamikaze drone. Turkish Aerospace Industries (TAI) has converted its Simsek training system into a kamikaze drone...
Register Now! INNOTECH 2021 Cyber, HLS and Innovation Conference & Exhibition
iHLS is proud to present the international Homeland Security Technologies, Cyber, and Innovation Conference and Exhibition: INNOTECH 2021.
iHLS is celebrating the return to normal...
Technological Responses, Challenges, and Directions in Physical Security Layers Planning
By Or Shalom
The design, planning and deployment of physical security layers are based, among others, on technological systems and tools. In spite of the...
Smart System Triggers Parachute Deployment in Case of Drone Failure
Drones are often equipped with a parachute system as a support in case of failure. A software update of a system that detects failure...
Ransomware Has Crossed Dangerous Threshold
“Ransomware is a national security threat,” claims the US Department of Homeland Security (DHS). Threat actors have figured out how to exploit US bureaucratic...
RAFAEL’s Air-to-Air Missile Trialed Successfully by India
India’s Defense Research and Development Organisation (DRDO) has successfully trialed the 5th generation Python-5 air-to-air missile (AAM) for the Tejas, India’s indigenous light combat...
When There is No Communication Between Robots at Battlefield
Robots working in teams need a method to ensure that they do not duplicate effort. A new technique allows robots to remain resilient when...
Tesla Vehicle Hacked Via Drone
Vehicles connected to the network offer plenty of advantages, but they can also be a target to cyber attacks.
A Tesla car was hacked remotely...
Military Solution to Deepfake Threat
Deepfake refers to artificial intelligence-synthesized, hyper-realistic video content that falsely depicts individuals saying or doing something. Most state-of-the-art deepfake video detection and media forensics...
Airport Security Checks Revolutionized?
One of the most inconvenient parts of flying is having to take your shoes off for screening. A new shoe scanner will provide a...
Miniaturized Solution Against Drone Swarms
While there are many optional solutions against rogue drones, a swarm of a number of drones operating together is more challenging.
A new solution uses...
Next-Gen Rugged Tablet to Help Troops Operate in Harsh Conditions
Rugged computing equipment helps military troops communicate and share critical information in harsh conditions.
A new next-generation tablet, K120 Windows 10 tablet, is a fully...
Triple-Drop Mechanism Makes this Delivery Platform Unique
A new delivery system establishes a new industry standard in drone-based logistics.
The Wingcopter 198, introduced by Wingcopter, is an all-electric vertical take off and...
Soon: Exoskeletons to Be Adapted to Soldiers’ Needs
Exoskeletons (external skeletons) are designed to help soldiers with heavy loads and give their limbs extra movement, strength and endurance. But soldiers often face...
Watch Vanilla UAV Demonstrating Unique Capabilities
An ultra-endurance land-launched unmanned aerial vehicle (UAV) participated in U.S. Pacific Fleet’s exercise in Point Mugu, California.
The VA001 Vanilla is long-endurance aircraft (MALE) unmanned...
Improved Display Helmet Now Available for Special Forces Units
Special forces units are specially trained to gather intelligence and operate behind enemy lines. Upgrades to the NH90 helicopter for special forces significantly improve...
Cybersecurity – What are the Boundaries of Active Defense?
The US has been practicing active defense against hackers. As part of a government effort to contain the continuing attacks on corporate networks running...
Immediate Commercial Advantage to Military 5G Research
Remote work and collaboration, the Internet of Things, multimedia, edge networks, and intelligent apps – all of these and more are dependent on network...
This Move will Hamper Drone Operations
In drone terminology, the term avigation is a cross between aviation and navigation. An avigation easement is an “easement or right of overflight in...