Israeli-Owned Firm Competes for U.S. Border Security Contract
DHS’s plan to deploy fifty surveillance towers across southern Arizona is temporarily on hold, following a protest by Raytheon that the agency improperly awarded...
Islamic Recruits Favor ISIS Over Al-Qaeda
The appeal of Al-Qaeda is in a down slope while militant groups like the Islamic State of Iraq and Syria (ISIS) recruit more members.
Within...
New Israeli Drone Joins Fighting in Gaza
The Israeli Air Force (IAF) has introduced its Elbit systems Hermes-900 unmanned air system (UAS) into service ahead of schedule to support operation "Protective...
Israeli Fire Fighters to Train in Tunnel Environments
A delegation of Israeli fire fighters headed out to Spain recently, to receive special training covering fire fighting in tunnel environments. “Every tunnel carries...
Fast Draw – Temple Mount Riots
The sight of the burnt down police checkpoint at the Temple Mount last week seemed unreal. Rioters entered the station as part of a...
Experts: How Hackers Use Botnets to Mine Money
Two security experts demonstrated how hackers can exploit cloud services to build money-mining botnets.
Cloud computing is becoming the paradigm most abused by cybercrime, cloud...
U.S. Army to Select New Handgun
This week, the U.S. Army will brief arms manufacturers on the design requirements for a new standard-issue handgun. Several gun makers will compete for...
What Is the Role of Today’s CISOs?
When Chief Information Security Officers (CISOs) and Chief Security Officers (CSOs) talk, people listen, as evinced by the monthly Twitter #infosecChat hosted by IBM...
Egozi’s Fury
It's becoming routine. When Israel launches a war everything goes according to plan at first, and then the politicians begin to stutter and hesitate....
Israeli Defense Companies Infiltrated? A Different Theory by iHLS
Most of Israel's technology, economics and news media recently recycled a post originally uploaded by the American information security blog Krebs on Security, citing...
Have a Drone? Check the Map Before You Fly It
The popularity of drones is climbing quickly among companies, governments and citizens alike. But the rules surrounding where, when and why you can fly...
iHLS TV – Cyber Threats, Smart Drones and the Syrian War
Articles and issues mentioned in this episode:
Thousands of foreign fighters in Syria hold European passports
New and improved sensors for drones
Hackers attack Israeli networks
New Israeli...
New, Efficient Data Collection Algorithm
When you can’t collect all the data you need, a new algorithm tells you which to target. A new technique could help with both...
U.S. Drone Market: 15 Billion Dollars by 2020
The U.S. UAV market will triple in size over the next five years, growing to $15 billion * Watch out for the U.S. Air...
Bi-weekly Report – Jihadi Forums
By ICT’s Jihadi Websites Monitoring Group
This report summarizes notable events discussed on jihadist Web forums during the second half of March 2014. Following are...
Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI
July 15th, 2014
ISRAEL
Operation Protective Edge hits cyber realm
As Operation Edge rages on, hackers have increased their attempts to breach Israel, and while most of...
Israel’s New Emergency Messaging System
By Dov Lachman
A new Israeli emergency messaging system began operations on Friday, July 25, covering almost the entire country. The system, known as “Meser...
Pilots Arriving in Israel Blinded by Lasers
Pilots arriving at Ben Gurion Airport have reported powerful laser beams aimed at their cockpits. The source of the beams was identified as the...
Fast Draw – Terror Tunnels Threat
If anyone still doubts that Israel's security establishment had no clue as to the magnitude of the terror tunnels, here's a reminder: Last September...
U.S. Bans Russian AK-47 Rifles
Under Obama administration Ukraine-related sanctions in response to Russia’s incursions into Ukraine and the apparent downing of a Malaysian passenger jet by a Russian-made...
IDF: The new unified communication network
Everyone’s on the same Network – New IDF technology network enabled during "Protective Edge" operation.
"IDF Network" Technology is implemented by the ICT (Information and Communications Technology) division, and mainly uses an unified communication network between all arms of the army - land, sea and...
Israeli made loitering munitions on high demand
The Indian air force is a current user of Israeli made loitering weapon systems. This air force is evaluating the purchase of additional Israel...












































