Border Security

Featured Videos

PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video...

News

Thu, 2016-04-14 01:49 AM
By Steve BittenbenderOfficials with Customs and Border Protection have issued a Request for Information to companies that develop body worn and vehicle mounted camera systems.The opportunity was...
Wed, 2016-04-13 02:58 AM
BIMCO, the world's largest international shipping association representing almost 60% of the world's commercial vessels, in conjunction with CLIA, ICS, INTERCARGO and INTERTANKO*, have announced...
Wed, 2016-04-13 02:45 AM
FORT WORTH, Texas, March 31, 2016 /PRNewswire/ --Elbit Systems of America, LLC, announced today that its Integrated Fixed Towers (IFT) border surveillance system was certified by the Chief of the U.S...
Wed, 2016-04-13 02:20 AM
By Joshua Breissblatt26 Mexican nationals say the Department of Homeland Security (DHS) deported them from the El Paso Border Patrol sector, which covers West Texas and all of New Mexico, without...
Fri, 2016-04-08 12:27 AM
After the successful launch of its LIVETOUCH quattro last year JENETRIC now presents new functions of their ID Flats scanner. The interaction between the scanner and user has been further optimized....
Wed, 2016-04-06 06:50 AM
 Bosch Security Systems, Inc., Genetec Inc. “Genetec”, and SecureXperts have collaborated in the design and development of an IP video solution that is resilient against unauthorized access,...
Tue, 2016-03-22 10:42 PM
By Walter Ewing When Donald Trump speaks of the Great Wall he would build between the United States and Mexico, he fails to account for a few inconvenient facts. For instance, there are millions of...
Tue, 2016-03-08 06:21 PM
By Joshua BreisblattMexican migrants no longer being deported back to Mexico in the middle of the night is one important feature in new Local Repatriation Agreements finalized between...
Tue, 2016-03-01 06:57 PM
U.S. Customs and Border Protection today announced additional enhancements to the Electronic System for Travel Authorization (ESTA), as part of the continued implementation of the Visa Waiver Program...
Tue, 2016-03-01 06:51 PM

Ronald Vitiello, acting chief, Border Patrol

By Steve Bittenbender The number of people apprehended by U.S. Customs and Border Protection officials dropped by nearly 30 percent last year, and officials with the agency hailed that drop as a sign...
Tue, 2016-02-23 11:19 AM
Washington, DC, February 2 - Border Security Expo (April 13-15, San Antonio, TX) is organizing an outdoor Demo Day for the first time as part of their exhibition, bringing a new platform and...

Commentary and Opinions

The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
We’re almost through hurricane season, and so far we’ve been lucky: none of the hurricanes or tropical storms have caused significant damage. Even so, we’re not out of the woods yet. Researchers at Colorado State University predicted the 2014 hurricane season would see three storms making landfall, and one will be a Category 3 or higher.
Active shooter, suicide by cop, ambush by homegrown terrorism -- these real-life scenarios require different types of officer response, but the resulting stress on the officer generates the same physical and psychological results during the incident. The question Meggitt Training Systems asked is, “Can this stress be recreated within a simulated environment?” The answer is yes.
 

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Aug 2016 Digital Edition

Click Here

July 2016 Digital Edition

 

Click Here

Technology Sectors

Market Sectors

New Products

Lehi, UT, January 5 - Converus, Utah technology start-up, says its new lie detection technology called "EyeDetect" is what the U.S. government needs to screen Syrian...

Westford, MA, December 10 – Tyco Security Products introduces the new Illustra Pro 2 megapixel 30x PTZ camera, offering a powerful 30x optical z...

San Diego – CohuHD Costar is proud to introduce the first in the RISE series of high-performance video cameras - the RISE 4260HD PTZ camera.  Designed and built using the l...

HySecurity’s HydraWedge SM50 and StrongArm M30 made a huge splash among the 30,000 ASIS security show attendees at the Anaheim Convention Center in September. ...

Greenville, RI and Uden, The Netherlands, October 27 - Videology announces a new CCD based camera board with 960 horizontal pixels, model 2XK17X.  Alrea...

White Papers

Establishing the first line of defense between a facility and a threat on its perimeter, the guard station can also define the image of a facility. Here are twelve questions to ask before specifying a guard booth.

 

To download this white paper please click here.