Workers could be charged with sexual assault, labeled sex offenders.
- By Cindy Horbrook
- Mar 23, 2011
ADT Security Services and Brivo Systems recently announced the implementation of a web-based access control solution for five federal facilities managed by the General Services Administration in Detroit and the Chicago area.
In his new role, Keefe will lead strategic initiatives and manage relationships between TSG and its customers, potential customers and strategic partners.
Smiths Detection recently announced it will provide advanced X-ray screening systems to enhance security at the 5th Military World Games being held in Brazil in July. The multi-sport competition for military athletes is organized by the International Military Sports Council (CISM).
Hello Alert Inc., a Babylon, New York security systems dealer, has installed thousands of Panasonic video surveillance cameras throughout the state of New York to provide surveillance of various municipal buildings, jails and approximately 50 fire houses in multiple jurisdictions on Long Island.
Telos ID has delivered its Mobile Authentication and Authorization Control (MAAC) Visitors system to FedExField, home of the Washington Redskins, substantially enhancing visitor tracking and accountability.
Benjamin Clough is dedicated to making the world a safer place for emergency first responders, police and military personnel, chemical plant employees, and many others. The Rensselaer Polytechnic Institute doctoral student has developed a novel method for extending the distance from which powerful terahertz technology can remotely detect hidden explosives, chemicals and other dangerous materials.
Occupying 27,000 square feet and employing up to 150 people, the new center will serve as the focus of Raytheon's civil communications business in the western United States and will provide test and research facilities, training, and maintenance and logistics, customer and systems support.
The AVATAR kiosk uses non-invasive artificial intelligence and sensor technologies to gauge suspicious behavior.
- By Cindy Horbrook
- Mar 09, 2011
The testing certifies that the products can be safely installed on any network to protect mission-critical resources without exposing the organization to security risks.
It took nearly a decade before University of Maryland researchers were allowed to talk about their work identifying the anthrax strain used in the 2001 deadly letter attacks. But now, they and the other key members of the high-powered science team have published the first account of the pioneering work, which launched the new field of “microbial forensics” and gave bioterrorism investigators a way to “fingerprint” bacteria.
U.S. Customs and Immigration Services recently updated the security in its permanent resident cards with optical security media and RFID tags.
- By Laura Williams
- Mar 07, 2011
Securityhunter will provide federal agencies with a simplified and accelerated means of securing a wide range of physical security solutions at discounted General Services Administration rates, including those that meet Homeland Security Presidential Directive-12 requirements.
Mostow will be based in AMAG's Arlington, Va., office where he will lead and manage the government systems sales and sales engineering team, and develop and implement strategies and plans to further expand and better support AMAG's growing base of Symmetry homeland security management system resellers and end users.
The science similar to the type used in airport body scanners could soon be used to detect everything from defects in aerospace vehicles or concrete bridges to skin cancer, thanks to researchers at Missouri University of Science and Technology.
API Technologies Corp., a provider of engineered systems, sub-systems and secure communications to the global defense and aerospace industries, announced the appointment of Bel Lazar as president and chief operating officer. Lazar will be responsible for the company's global operations.
The federal government's computer networks, vast and incredibly critical to the country's day-to-day functioning, are subject to millions of attacks per day. It has no stated overarching cybersecurity policy, and there is little in the way of international law to guide the way, either. How the government protects these networks, and interacts with other nations' networks, remains under debate.
- By Laura Williams
- Mar 03, 2011
The Department of Homeland Security Science and Technology Directorate's First Responder Communities of Practice recently launched a Virtual Social Media Working Group (VSMWG), comprised of first responders and homeland security professionals from various disciplines, localities, sectors and government agencies across the country.
Avigilon recently announced that Arden Fair Mall in Sacramento, Calif. has deployed the Avigilon HD Surveillance System as a key component of its security initiative aimed at reducing crime and increasing patron safety.
A critical element of protecting troops in the field of battle is proper identity management. A military installation in the Middle East, for example, must ensure that only authorized personnel can enter the camp. For soldiers, losing an access card to an enemy could be disastrous. Personal identification numbers are too easy to steal or share. To solve this problem, the military turned to biometrics just as other government entities have done as well.
- By Dan Kilgore
- Mar 01, 2011