Border Security

Featured Videos

PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video...

News

Wed, 2017-04-12 01:44 PM
FORT LAUDERDALE, FL April 4, 2017 Mountain RF Sensors will have a presence at the Border Security Expo (BSE), April 11th through April 12th, located at the Henry B. Gonzalez Convention Center, San...
Thu, 2017-04-06 08:55 AM

Heller

ARLINGTON, VA April 3, 2017 PAE today announced it has signed a definitive agreement to acquire FCi Federal. FCi, headquartered in Ashburn, Va., provides essential services for immigration and...
Wed, 2017-04-05 03:45 PM

Freska

WASHINGTON March 28, 2017 Securiport, the global leader in intelligent immigration controls and civil aviation security solutions, was pleased to present at this year’s exclusive World Border...
Wed, 2017-04-05 03:42 PM
POWAY, CA March 31, 2017 Single Eagle Inc., which does business as Concrete Contractors Interstate (CCI), a structural and decorative concrete specialist, has submitted a response to the U.S....
Thu, 2017-03-16 03:13 PM

Stein

WASHINGTON March 15, 2017 The following statement was issued by Dan Stein, president of the Federation for American Immigration Reform (FAIR) in response to today's temporary restraining order issued...
Wed, 2017-03-08 12:46 PM

Breisblatt

By Joshua Breisblatt in “Border Enforcement, Enforcement, Executive Action, Interior Enforcement”
Wed, 2017-03-08 12:40 PM

Timian

RANDOLPH, VT March 02, 2017 In response to recent United States (U.S.) Customs and Border Protection initiatives along the U.S. southern border, Applied Research Associates' Security Products...
Tue, 2017-03-07 08:10 AM
STURBRIDGE, MA, March 6, 2017 Optim LLC, a premier manufacturer of flexible videoscopes for contraband detection, proudly displayed their FreedomView Videoscope to key military personnel at the...
Mon, 2017-03-06 01:47 PM

Kelly

By Steve BittenbenderEditor, Government Security NewsMore than five weeks after signing his initial executive order, President Donald Trump signed a revised order Monday morning that removes Iraq...
Mon, 2017-02-27 08:05 AM

Lhamon

WASHINGTON Feb. 24, 2017 Today, by majority vote, the U. S. Commission on Civil Rights expressed deep concern that recent Executive Orders – in particular, 13768 and 13769 -- promote and endorse...
Fri, 2017-02-24 08:16 AM
MELBOURNE Feb. 23, 2017 According to a joint media release from the Australian Federal Police (AFP) and the Australian Border Force (ABF), US$186 million worth of drugs was seized in Melbourne on Feb...
Wed, 2017-02-22 09:57 AM

Kelly

By Steve BittenbenderEditor, Government Security NewsHomeland Security Secretary John Kelley issued two memos earlier this week indicating how he expects immigration and border control officials to...

Commentary and Opinions

By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of the U.S. government. Often, its starts with an incoming email that looks innocuous. That’s exactly what happened to the White House recently, when a group of Russian hackers launched a sustained attack armed only with a phishing email and a piece of malware.
By John HarrisWith the 1998 implementation of the Government Paperwork Elimination Act, the United States government made clear its intentions to become more efficient and save taxpayer dollars by reducing its dependence on paper documents.
By Steve SpatigWith reports of widespread data breaches in the global spotlight, data center managers are under increasing pressure by regulatory bodies to ensure that access to restricted information is protected. Cyber security remains a number one priority, but in many cases, data breaches occur because an employee is given temporary physical access to that data in some way. Within the data center environment, preventing unauthorized physical access to sensitive government data is crucial.
By Kirk Spring As we’ve seen by recently reported hacks of healthcare networks, security breaches are becoming commonplace. Attacks on secure networks can come from internal or external sources. “Breach prevention” is no longer a workable strategy.
 

2017 GSN Airport, Seaport, Border Security Awards 

April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Lehi, UT, January 5 - Converus, Utah technology start-up, says its new lie detection technology called "EyeDetect" is what the U.S. government needs to screen Syrian...

Westford, MA, December 10 – Tyco Security Products introduces the new Illustra Pro 2 megapixel 30x PTZ camera, offering a powerful 30x optical z...

San Diego – CohuHD Costar is proud to introduce the first in the RISE series of high-performance video cameras - the RISE 4260HD PTZ camera.  Designed and built using the l...

HySecurity’s HydraWedge SM50 and StrongArm M30 made a huge splash among the 30,000 ASIS security show attendees at the Anaheim Convention Center in September. ...

Greenville, RI and Uden, The Netherlands, October 27 - Videology announces a new CCD based camera board with 960 horizontal pixels, model 2XK17X.  Alrea...

White Papers

Establishing the first line of defense between a facility and a threat on its perimeter, the guard station can also define the image of a facility. Here are twelve questions to ask before specifying a guard booth.

 

To download this white paper please click here.