As a part of the GSA-led effort to bring federal buildings in compliance with the Homeland Security Presidential Directive, (HSPD-12) Vector Electric Inc. (VEI) was asked to explore the possibility of adding additional features to the standard FIPS-201 access control systems being upgraded at a number of Customs and Border Protection, Port of Entry (LPOE) facilities.
- By Ralph C. Jensen
- Nov 01, 2013
Phyllis Schneck, PhD, chief technology officer and VP at McAfee named new head of cybersecurity.
- By Ginger Hill
- Aug 19, 2013
Terahertz waves, which are electromagnetic waves with frequencies between those used for mobile phone communications and for optical fiber communications, are used for some airport body scanners and other security scanners to see through packages and clothes.
Cargo theft is the costliest crime in America, reporting an estimated $25 billion in merchandise stolen, with incidents on the rise, according to the International Cargo Security Council.
- By Rebecca Ufkes
- Jul 01, 2013
IP surveillance allows port officers access to relevant information from anywhere at any time, and delivers automatic incident alerts and alarms to reduce incident response times.
- By Olivier Thierry
- Jul 01, 2013
Are 3D printed guns the next nemesis for the Department of Homeland Security along with state and federal law enforcement agencies?
Despite the economic uncertainty in our nation’s capital, there is still plenty of upside to government security spending in fiscal 2013 with opportunities to be awarded significant contracts.
- By John Merlino
- Apr 01, 2013
Are our faces now like bar codes, easily scanned and instantly traceable? Not quite. But face recognition has grown into a tool that every investigator can benefit from.
- By Paul Schuepp
- Apr 01, 2013
Portable bunkers provide first responders the ability to make a difference in the early stages of critical crisis response. If staged in schools, airports or a mall, these tools become a needed resource for first responders regardless of the level of training or the equipment they may have.
- By Bob Bradshaw
- Apr 01, 2013
For the first time since the 9/11 terror attacks, airline passengers will be allowed to have small knives and some previously prohibited sports equipment as carry-on items.
The U.S. Department of Homeland Security has released a statement that cyber-attacks on critical U.S. infrastructure have jumped 52% compared to last year.
- By Ginger Hill
- Feb 22, 2013
PureTech Systems, specializing in wide-area surveillance software, today announced two completed installations of its PureActiv system for a major undisclosed Texas water utility.
Due to increases in maritime commercial trade and related terrorist activity, challenges to maritime security have produced a demand for better and smarter technology to support our forces and protect our offshore assets.
- By Thurston Brooks
- Sep 01, 2012
The Department of Homeland Security (DHS) Science and Technology Directorate’s (S&T) new low-cost device for dismantling dangerous pipe bombs may look like a tinkerer’s project, but that’s no accident.
In June 2012, the first class of U.S. Army soldiers completed mission operator training on the Raytheon Company JLENS elevated, persistent over-the-horizon sensor system.
Raytheon Company has been awarded two U.S. Navy contracts for the Dual Band Radar, the multimission air defense radar for the future USS Gerald R. Ford (CVN 78), America's next-generation aircraft carrier.
ITT Exelis (NYSE: XLS) has been awarded the Agile Cyber Technologies (ACT) indefinite delivery, indefinite quantity contract by the U.S. Air Force Research Laboratory (AFRL).
CACI International Inc. has been awarded more than $261 million in previously unannounced contracts with federal government clients in the Intelligence Community.
ChristieR, a visual display solutions company, recently gave new life to the Dallas Police Department's 24/7 Fusion Center, with a 6 units high by 12 units wide digital video wall.
Raytheon Company has received a $3.1 million contract to develop technology for Morphing Network Assets to Restrict Adversarial Reconnaissance (MORPHINATOR), a program that uses cyber maneuvering techniques to thwart potential attackers in high-threat environments.