Border Security

Featured Videos

PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video...

News

Wed, 2017-01-04 05:46 AM

McAleenan

WASHINGTON Dec. 21, 2016 The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced today a $162,302 award to Tamr to build additional capability into U.S....
Tue, 2017-01-03 05:24 AM

Twitter image via @MolinaAshli

By Steve BittenbenderEditor, Government Security NewsThe final day of the 2016-17 holiday travel season hit a snag as the computer system responsible for processing international travelers entering...
Wed, 2016-12-28 04:10 AM
By Michele Waslin, American Immigration CouncilWith all the focus on what to expect at the national level on immigration under President-elect Donald Trump’s administration, it’s easy to overlook the...
Wed, 2016-12-28 03:37 AM
DETROIT Dec. 22, 2016 Officers from U.S. Immigration and Customs Enforcement's (ICE) Enforcement and Removal Operations (ERO) arrested 74 individuals during a two-state operation that concluded Dec....
Wed, 2016-12-21 10:15 AM
By Michele Waslin, American Immigration Council
Wed, 2016-12-14 08:05 AM

Gillibrand

Dec. 10, 2016 U.S. Senators Charles E. Schumer and Kirsten Gillibrand, and U.S. Representative Elise Stefanik today announced legislation that would enable the pre-clearance program that more easily...
Thu, 2016-12-08 06:30 PM
WASHINGTON Dec. 2, 2016 According to recent media reports in Dakar, Senegal, a French National who was apprehended for acts of armed robbery and wanted by Interpol, was intercepted and detected...
Wed, 2016-11-30 08:02 AM

Stein

WASHINGTON Nov. 29, 2016 The Federation for American Immigration Reform (FAIR) today issued its Priorities for the 2017 Presidential Transition, a blueprint for true immigration reform in the next...
Tue, 2016-11-22 07:39 AM

Stein

WASHINGTON Nov. 21, 2016 President-elect Donald Trump has vowed to restore public interest to immigration policy. His initial appointments – including naming Sen. Jeff Sessions to be attorney general...
Thu, 2016-11-10 01:15 AM

Trump

By Steve BittenbenderEditor, Government Security NewsDonald Trump’s victory in Tuesday’s Presidential election came to some as a surprise, and in the hours after the Republican businessman defeated...
Wed, 2016-11-09 09:14 AM

Walach

FALFURRIAS, TX Nov. 8, 2016 U.S. Border Patrol agents assigned to the Falfurrias Checkpoint had a busy weekend rescuing undocumented immigrants from locked trunks and even toolboxes.Sixteen...
Tue, 2016-11-08 11:11 AM

Veneziano

WASHINGTON, Nov. 7, 2016 /PRNewswire/ -- Food importers have precious little time to design, test and implement a Foreign Supplier Verification Plan, warned the FDA's former Director of Import...

Commentary and Opinions

By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of the U.S. government. Often, its starts with an incoming email that looks innocuous. That’s exactly what happened to the White House recently, when a group of Russian hackers launched a sustained attack armed only with a phishing email and a piece of malware.
By John HarrisWith the 1998 implementation of the Government Paperwork Elimination Act, the United States government made clear its intentions to become more efficient and save taxpayer dollars by reducing its dependence on paper documents.
By Steve SpatigWith reports of widespread data breaches in the global spotlight, data center managers are under increasing pressure by regulatory bodies to ensure that access to restricted information is protected. Cyber security remains a number one priority, but in many cases, data breaches occur because an employee is given temporary physical access to that data in some way. Within the data center environment, preventing unauthorized physical access to sensitive government data is crucial.
By Kirk Spring As we’ve seen by recently reported hacks of healthcare networks, security breaches are becoming commonplace. Attacks on secure networks can come from internal or external sources. “Breach prevention” is no longer a workable strategy.
 

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Lehi, UT, January 5 - Converus, Utah technology start-up, says its new lie detection technology called "EyeDetect" is what the U.S. government needs to screen Syrian...

Westford, MA, December 10 – Tyco Security Products introduces the new Illustra Pro 2 megapixel 30x PTZ camera, offering a powerful 30x optical z...

San Diego – CohuHD Costar is proud to introduce the first in the RISE series of high-performance video cameras - the RISE 4260HD PTZ camera.  Designed and built using the l...

HySecurity’s HydraWedge SM50 and StrongArm M30 made a huge splash among the 30,000 ASIS security show attendees at the Anaheim Convention Center in September. ...

Greenville, RI and Uden, The Netherlands, October 27 - Videology announces a new CCD based camera board with 960 horizontal pixels, model 2XK17X.  Alrea...

White Papers

Establishing the first line of defense between a facility and a threat on its perimeter, the guard station can also define the image of a facility. Here are twelve questions to ask before specifying a guard booth.

 

To download this white paper please click here.