Perimeter Protection

Featured Videos

IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.

News

Tue, 2014-12-23 05:17 PM
Director James B. Comey has named David Bowdich the assistant director in charge of the Los Angeles Field Office. Since September 2012, Bowdich has served as special agent in charge (SAC) of the Los...
Sun, 2014-12-21 10:31 PM
The Federal Bureau of Investigation (FBI) is investigating the cyber attack targeting Sony Pictures Entertainment (SPE), the agency says. In late November, SPE confirmed that it was the victim of a...
Thu, 2014-12-18 07:57 PM

Diego G. Rodriguez

Director James B. Comey has named Diego G. Rodriguez the assistant director in charge (ADIC) of the FBI’s New York Field Office. In this role, he will oversee all operations and personnel in the five...
Thu, 2014-12-11 07:51 PM
The House of Representatives Thursday unanimously passed S. 2519, the National Cybersecurity Protection Act of 2014, and a Senate amendment to H.R. 2952, the Cybersecurity Workforce Assessment Act,...
Tue, 2014-12-09 05:38 PM

Tom Gazsi

The Port of Los Angeles has appointed Tom Gazsi, the former City of Costa Mesa Police Chief, as a new deputy chief of police. Gazsi will oversee the Emergency Management and Field Operations Group...
Mon, 2014-12-08 06:24 PM
U.S. Attorney General Eric Holder announced Monday that the Justice Department (DOJ) will take new steps to bar profiling by federal law enforcement agencies, building upon a 2003 policy that had...
Wed, 2014-12-03 05:27 PM
The House of Representatives overwhelmingly passed three bills Monday aimed at strengthening nuclear security and detection, protecting critical infrastructure against the threat of electromagnetic...
Tue, 2014-12-02 06:06 PM
The United States Monday signed three customs agreements with Singapore, ensuring greater cooperation and mutual assistance on customs enforcement and the facilitation of lawful trade and travel,...
Tue, 2014-12-02 05:13 PM
A Danish citizen last week pleaded guilty in the Eastern District of Virginia and was ordered to pay a fine of $500,000 for advertising and selling StealthGenie, a spyware application that could...
Sun, 2014-11-30 08:58 PM
Dear GSN Readers: Government Security News has posted its October/November Digital Edition online. We will also be mailing out the new publication to our readers Monday morning. This edition has a...
Thu, 2014-11-27 03:26 AM
Happy Thanksgiving from Government Security News! In observance of the holiday, the Daily Insider e-newsletter will resume publication on Monday, December 1. Enjoy the holiday and safe...
Tue, 2014-11-25 07:29 PM

Charles Perez

U.S. Customs and Border Protection (CBP) recently announced the selection of a new CBP airport director for George Bush Intercontinental Airport (IAH).Charles Perez, a 28-year CBP veteran, assumed...

Commentary and Opinions

While strolling up and down the aisles at the ASIS New York City Chapter’s security expo at the Javits Center on April 30, I tried to take a quick reading on the current state of the government security marketplace, but frankly the views of half a dozen exhibitors were all over the map. I wondered whether the economy-wide recession during the past two years was depressing government procurements, or whether the Obama administration’s pump-priming stimulus program had led to an increase in such government purchases.
By Rep. Ted Poe [Editor’s note: Rep. Ted Poe (R-TX), a member of the House Judiciary Committee, delivered the following remarks on the floor of the House on March 22, 2010.]    Once again, there's a new push for an amnesty bill to pass this Congress. Yesterday, tens of thousands of people marched in Washington, D.C., wanting amnesty. And it was interesting. As I looked over this very peaceful crowd and all those people marching, I wondered why there were no American flags.
By Jonathan McDonaldMany government organizations are charged with combating terrorism, identifying criminals and effectively applying immigration policies. All these activities require that persons of interests (and organizations and networks) be accurately identified. Identification is an extremely complex process that is only compounded by increasing data volumes, complex relationships, and tightly coupled application and data architectures.
A resident of the northern Israeli city of Migdal Haemek received two letter bombs by post earlier this month. The woman who received the packages, whose name has not been released, felt the packages were suspicious and called the police.Although she said she was not under threat and could not understand who could have sent her the bombs, she was vigilant enough to alert the professionals.The officers who arrived on the scene, called in the police IED unit to examine the letters and bomb techs determined that they were, indeed, letter bombs.
By Don SteinmanIn a recent statement, Senator Kay Bailey Hutchinson of Texas wrote, "Our nation’s aviation security relies on a multi-layered approach that includes information sharing, enhanced technology and security screening. On Christmas day, that system failed."Moving beyond the checkpoint
 

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Aug 2016 Digital Edition

Click Here

July 2016 Digital Edition

 

Click Here

Technology Sectors

Market Sectors

New Products

San Diego, CA-based Sperry West, the video surveillance manufacturer, has introduced the Spyder Big...

Cambridge, MA-based MetaCarta, Inc., a provider of geographic search solutions, has announced the launch...

McLean, VA-based QinetiQ North America characterizes its SPO-7 standoff passive object detection system as the kind calle...

Waukesha, WI-based Magnasphere reports that its new high-security sensor, HSS, has completed its UL inspections and is r...

White Papers

Future Fibre Technologies
The Boundaries of Security is the industry's most comprehensive report on current global trends in perimeter security, containing invaluable information all security professionals need to keep abreat of in the fast paced world of perimeter protection.The Boundaries of Security 2011 covers:* The...