Border Security

Featured Videos

PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video...


Fri, 2016-06-10 01:30 PM


Now In its 7th year of saluting the top leaders in new technologies and innovative security strategies, GSN is pleased to announce the Winners and Finalists in the 2016 targeted Airport, Seaport,...
Wed, 2016-06-08 07:00 AM
DALLAS, June 3, 2016 COPsync, Inc.
Mon, 2016-06-06 07:00 AM
Special Notice:Due to a change in strategy by one of the companies submitting entries in GSN’s 2016 Airport, Seaport, Border Security Awards Program, GSN has agreed to postpone the announcements for...
Wed, 2016-06-01 08:02 AM

Rep. McSally

By Steve Bittenbender Editor, Government Security News Most people agree that technology is an essential part of any solution that secures the United States’ border with Mexico. However, an Arizona...
Wed, 2016-05-25 07:00 AM

CBP AMO Blackhawk helicopter

AGUADILLA, PR – U.S. Customs and Border Protection (CBP) Border Patrol Agents apprehended between Sunday and Monday 29 undocumented migrants, 28 from Cuba and one from the Dominican Republic, after...
Mon, 2016-05-16 02:49 AM
WASHINGTON (HOMELAND.HOUSE.GOV) MAY 12, 2016This week U.S. Rep. Michael McCaul (R-TX), chairman of the House Homeland Security Committee, returned to Washington, D.C. after leading a bipartisan...
Wed, 2016-05-11 02:39 AM
TUCSON, AZ (CUSTOMS AND BORDER PROTECTION) MAY 10, 2016It all began just after 5 p.m. Monday when camera operators got a brief look at a suspicious vehicle traveling north on a Forest Service road...
Wed, 2016-05-04 02:47 AM
By Steve BittenbenderEditor, Government Security NewsThe National Transportation Safety Board announced on Tuesday that a short circuit in electrical wiring led to smoke pouring into a Washington...
Wed, 2016-05-04 02:09 AM
By Steve BittenbenderEditor, Government Security NewsSaying they’re acting on behalf of their constituents, New Mexico’s U.S. senators have reached out to the commissioner for U.S. Customs and Border...
Wed, 2016-04-27 03:32 AM
The mega-ship the CMA CGM Benjamin Franklin called in at the Port of Los Angeles in December, 2015. Capable of carrying 18,000 TEUs and only 80% full, it took four full days to unload 11,200 cargo...
Wed, 2016-04-27 03:06 AM
By Steve BittenbenderThe city of Phoenix is well represented on a list that every city wants to avoid.The Arizona state capital has three of the five worst railroad crossings in the United States....
Wed, 2016-04-27 02:53 AM
By Steve BittenbenderOfficials from the National Transportation Safety Board announced Tuesday afternoon that the second mission succeeded in finding the data recorder from the sunken El Faro cargo...

Commentary and Opinions

The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
We’re almost through hurricane season, and so far we’ve been lucky: none of the hurricanes or tropical storms have caused significant damage. Even so, we’re not out of the woods yet. Researchers at Colorado State University predicted the 2014 hurricane season would see three storms making landfall, and one will be a Category 3 or higher.
Active shooter, suicide by cop, ambush by homegrown terrorism -- these real-life scenarios require different types of officer response, but the resulting stress on the officer generates the same physical and psychological results during the incident. The question Meggitt Training Systems asked is, “Can this stress be recreated within a simulated environment?” The answer is yes.

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Lehi, UT, January 5 - Converus, Utah technology start-up, says its new lie detection technology called "EyeDetect" is what the U.S. government needs to screen Syrian...

Westford, MA, December 10 – Tyco Security Products introduces the new Illustra Pro 2 megapixel 30x PTZ camera, offering a powerful 30x optical z...

San Diego – CohuHD Costar is proud to introduce the first in the RISE series of high-performance video cameras - the RISE 4260HD PTZ camera.  Designed and built using the l...

HySecurity’s HydraWedge SM50 and StrongArm M30 made a huge splash among the 30,000 ASIS security show attendees at the Anaheim Convention Center in September. ...

Greenville, RI and Uden, The Netherlands, October 27 - Videology announces a new CCD based camera board with 960 horizontal pixels, model 2XK17X.  Alrea...

White Papers

Establishing the first line of defense between a facility and a threat on its perimeter, the guard station can also define the image of a facility. Here are twelve questions to ask before specifying a guard booth.


To download this white paper please click here.