Multiple UAVs perform autonomous formation flights
Unmanned aerial vehicles (UAV) typically fly alone with a team of ground operators controlling their activities through tele operation or waypoint-based routing. But one...
Equipment aging at federal radiological response center
The federal government's multiagency center that is on call to respond to radiological incidents has issues with aging equipment, says a recent report from...
Syrian chemical weapons – the big hoax
Good morning America. What every junior intelligence officer has known did not get into the oval office. While we in i-HLS again and again...
Home depot all but confirms doozy of a data breach
Home Depot may have experienced a massive security breach, which affected an estimated 110 million people.
Home Depot on Wednesday said it was investigating the possibility,...
ISIS trying to acquire bioterror weapons
While the U.S is still building a strategy against the extreme Islamic state (IS) terror group, aka ISIS / ISIL, it is accelerating efforts...
Hacking Gmail with 92% Success
A team of researchers, including an assistant professor at the University of California, Riverside Bourns College of Engineering, have identified a weakness believed to...
iHLS TV Special Edition – ISIS/ISIL
This iHLS Special Edition video is about the terror organization ISIL/ISIS: the al-Qaeda-al-Nusra Front (Jabhat al-Nusra) splinter-group that is making strides in Lebanon, Syria...
Could crowdsourcing boost America’s homeland security?
What should the US government do to keep the homeland secure? At least one government organization genuinely wants to listen to the public. The...
US Predator vs. China’s CH-4 drone
US Predator vs. China’s CH-4 drone
This is a real race for superiority. The People’s Liberation Army’s CH-4 unmanned aerial vehicle (UAV) is receiving high-profile...
CA PD’s secret counter-terror means
California police departments have begun using secret anti-terrorism technology capable of tracking data from every cellphone in a given area to do “routine police...
World leaders are behind in seeing the ISIS danger
The international press is many steps ahead of the west in understanding the danger posed by ISIS. News of a "laptop of terror" belonging...
Israel’s Policies during Operation “Protective Edge” – Defeat? Deterrence? Settlement?
Dr. Boaz Ganor
Operation “Protective Edge” began on July 8, 2014 in light of the serious escalation in rocket fire directed at Israel from the...
After the Flood: microdrone is finding land mines
Airborne support in the search for survivors and land mines: in the wake of a natural disaster in Serbia/Bosnia and Herzegovina, rescue teams have...
US to move drone base to northern niger
A repositioning of the U.S drone force in Africa.
//
The US military will shift its drone flights in Niger from Niamey to a...
iHLS TV Intelligence Edition – OSINT
OSINT: Open Source Intelligence enables intercepting both terrorists and criminals and thwarting their activities
JPMorgan cyberattacked
The FBI is investigating an alleged break-in to J.P. Morgan Chase & Co.'s computers. It appears as though the bank was the target of...
Egozi’s Fury
In case anyone had a doubt, ISIS is already here.
Last night on Channel 10, the promo for Zvi Yehezkeli's new documentary series about this...
ISIS eyeing Mexican border
Online posts show ISIS eyeing Mexican border, says law enforcement bulletin.
A Texas law enforcement bulletin sent out in recent dyas has raised concerns that...
Manned to Unmanned – an emerging trend?
Some Israeli manufacturers of unmanned air systems (UAS) are still evaluating the potential in converting manned air platforms to unmanned ones. Aeronautics is currently...
HomeLand security worldwide news
A video that shows the beheading of American Steven Sotloff was delivered as a "second message to America" to halt airstrikes in Iraq, following...
Airport security devices vulnerable to hackers
At the Black Hat 2014 conference, Billy Rios of Qualys Security revealed details about several vulnerabilities he was able to find, most notably in...
Is the Government Ready for 3-D-Printed Guns?
The technology is here, but will guns from 3-D printers become a problem?
These days, anyone with access to an Internet connection and a 3-D...












































