Home Blog Page 620

Multiple UAVs perform autonomous formation flights

0
Unmanned aerial vehicles (UAV) typically fly alone with a team of ground operators controlling their activities through tele operation or waypoint-based routing.  But one...

Equipment aging at federal radiological response center

0
The federal government's multiagency center that is on call to respond to radiological incidents has issues with aging equipment, says a recent report from...

Syrian chemical weapons – the big hoax

0
Good morning America. What every junior intelligence officer has known did not get into the oval office. While we in i-HLS again and again...

Home depot all but confirms doozy of a data breach

0
Home Depot may have experienced a massive security breach, which affected an estimated 110 million people. Home Depot on Wednesday said it was investigating the possibility,...

ISIS trying to acquire bioterror weapons

0
While the U.S is still building a strategy against the extreme Islamic state (IS) terror group, aka ISIS / ISIL, it is accelerating efforts...

Hacking Gmail with 92% Success

0
A team of researchers, including an assistant professor at the University of California, Riverside Bourns College of Engineering, have identified a weakness believed to...

iHLS TV Special Edition – ISIS/ISIL

0
This  iHLS Special Edition video is about the terror organization ISIL/ISIS: the al-Qaeda-al-Nusra Front (Jabhat al-Nusra) splinter-group that is making strides in Lebanon, Syria...

Could crowdsourcing boost America’s homeland security?

0
What should the US government do to keep the homeland secure? At least one government organization genuinely wants to listen to the public. The...

US Predator vs. China’s CH-4 drone

0
US Predator vs. China’s CH-4 drone This is a real race for superiority. The People’s Liberation Army’s CH-4 unmanned aerial vehicle (UAV) is receiving high-profile...

CA PD’s secret counter-terror means

0
California police departments have begun using secret anti-terrorism technology capable of tracking data from every cellphone in a given area to do “routine police...

World leaders are behind in seeing the ISIS danger

0
The international press is many steps ahead of the west in understanding the danger posed by ISIS. News of a "laptop of terror" belonging...

Israel’s Policies during Operation “Protective Edge” – Defeat? Deterrence? Settlement?

0
Dr. Boaz Ganor Operation “Protective Edge” began on July 8, 2014 in light of the serious escalation in rocket fire directed at Israel from the...

After the Flood: microdrone is finding land mines

0
Airborne support in the search for survivors and land mines: in the wake of a natural disaster in Serbia/Bosnia and Herzegovina, rescue teams have...

US to move drone base to northern niger

0
A repositioning of the U.S drone force in Africa. // The US military will shift its drone flights in Niger from Niamey to a...

iHLS TV Intelligence Edition – OSINT

0
OSINT: Open Source Intelligence enables intercepting both terrorists and criminals and thwarting their activities

JPMorgan cyberattacked

0
The FBI is investigating an alleged break-in to J.P. Morgan Chase & Co.'s computers. It appears as though the bank was the target of...

Egozi’s Fury

0
In case anyone had a doubt, ISIS is already here. Last night on Channel 10, the promo for Zvi Yehezkeli's new documentary series about this...

ISIS eyeing Mexican border

0
Online posts show ISIS eyeing Mexican border, says law enforcement bulletin. A Texas law enforcement bulletin sent out in recent dyas has raised concerns that...

Manned to Unmanned – an emerging trend?

0
Some Israeli manufacturers of unmanned air systems (UAS) are still evaluating the potential in converting manned air platforms to unmanned ones. Aeronautics is currently...

HomeLand security worldwide news

0
A video that shows the beheading of American Steven Sotloff was delivered as a "second message to America" to halt airstrikes in Iraq, following...

Airport security devices vulnerable to hackers

0
At the Black Hat 2014 conference, Billy Rios of Qualys Security revealed details about several vulnerabilities he was able to find, most notably in...

Is the Government Ready for 3-D-Printed Guns?

0
The technology is here, but will guns from 3-D printers become a problem? These days, anyone with access to an Internet connection and a 3-D...

Latest

Image from ZARROUK LAB on Youtube

The Robot That Changes Shape to Beat Any Terrain

0
Ground robots often struggle with one recurring problem: every terrain demands a different movement strategy. Smooth surfaces favor wheels, rubble demands crawling, and narrow...