Perimeter Protection

Featured Videos

IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.

News

Tue, 2015-03-10 08:32 AM

Mark Tinker

By Mark A. Tinker, PhDIn late 2014, the Federal Energy Regulatory Commission (FERC) outlined new rules, which take effect in 2016, requiring electrical utility companies to determine the key electric...
Thu, 2015-02-26 01:39 AM
President Obama Wednesday directed the Director of National Intelligence (DNI) to establish the Cyber Threat Intelligence Integration Center (CTIIC). The CTIIC will be a national intelligence center...
Tue, 2015-02-17 05:54 PM
In recent days I have repeatedly stressed the need for a DHS appropriations bill for FY 2015, unburdened by politically charged amendments that attempt to defund our executive actions on immigration...
Sun, 2015-02-01 06:23 PM
The National Law Enforcement Officers Memorial Fund announced the selection Friday of Deputy US Marshals (DUSMs) Matthew Barger, Michael Cifu, Andrew Kottke, and Frank Morales as the recipients of...
Sun, 2015-01-25 10:09 PM
Jonathan Freed has been appointed as the National Security Agency's new Associate Director for Strategic Communications. Freed, a longtime public relations professional and former journalist, most...
Thu, 2015-01-22 10:20 PM
The Department of Energy (DOE) will provide a $25 million grant over the next five years to support the creation of a new cybersecurity consortium consisting of 13 Historically Black Colleges and...
Wed, 2015-01-21 09:31 PM
During bilateral meetings in Washington last week, President Obama and Prime Minister David Cameron agreed to further strengthen and deepen cybersecurity cooperation between the United States and the...
Tue, 2015-01-20 08:29 PM

John Walsh

The MacDonnell Group of Halifax, Nova Scotia has announced that John Walsh, CEO of Port Canaveral, will deliver the opening presentation and welcome remarks at its 2015 Port Security Operations...
Tue, 2015-01-13 07:47 PM
Director James B. Comey has named Roger C. Stanton special agent in charge of the FBI’s Birmingham Division. Stanton most recently served as section chief of the Counter-Improvised Explosive Devices...
Tue, 2014-12-23 07:10 PM

Sarah Saldana

In comments made following the confirmation of former U.S. Attorney Sarah R. Saldana of the Northern District of Texas as Assistant Secretary of U.S. Immigration and Customs Enforcement (ICE), DHS...
Tue, 2014-12-23 05:17 PM
Director James B. Comey has named David Bowdich the assistant director in charge of the Los Angeles Field Office. Since September 2012, Bowdich has served as special agent in charge (SAC) of the Los...
Sun, 2014-12-21 10:31 PM
The Federal Bureau of Investigation (FBI) is investigating the cyber attack targeting Sony Pictures Entertainment (SPE), the agency says. In late November, SPE confirmed that it was the victim of a...

Commentary and Opinions

While strolling up and down the aisles at the ASIS New York City Chapter’s security expo at the Javits Center on April 30, I tried to take a quick reading on the current state of the government security marketplace, but frankly the views of half a dozen exhibitors were all over the map. I wondered whether the economy-wide recession during the past two years was depressing government procurements, or whether the Obama administration’s pump-priming stimulus program had led to an increase in such government purchases.
By Rep. Ted Poe [Editor’s note: Rep. Ted Poe (R-TX), a member of the House Judiciary Committee, delivered the following remarks on the floor of the House on March 22, 2010.]    Once again, there's a new push for an amnesty bill to pass this Congress. Yesterday, tens of thousands of people marched in Washington, D.C., wanting amnesty. And it was interesting. As I looked over this very peaceful crowd and all those people marching, I wondered why there were no American flags.
By Jonathan McDonaldMany government organizations are charged with combating terrorism, identifying criminals and effectively applying immigration policies. All these activities require that persons of interests (and organizations and networks) be accurately identified. Identification is an extremely complex process that is only compounded by increasing data volumes, complex relationships, and tightly coupled application and data architectures.
A resident of the northern Israeli city of Migdal Haemek received two letter bombs by post earlier this month. The woman who received the packages, whose name has not been released, felt the packages were suspicious and called the police.Although she said she was not under threat and could not understand who could have sent her the bombs, she was vigilant enough to alert the professionals.The officers who arrived on the scene, called in the police IED unit to examine the letters and bomb techs determined that they were, indeed, letter bombs.
By Don SteinmanIn a recent statement, Senator Kay Bailey Hutchinson of Texas wrote, "Our nation’s aviation security relies on a multi-layered approach that includes information sharing, enhanced technology and security screening. On Christmas day, that system failed."Moving beyond the checkpoint
 

2017 GSN Airport, Seaport, Border Security Awards 

April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

San Diego, CA-based Sperry West, the video surveillance manufacturer, has introduced the Spyder Big...

Cambridge, MA-based MetaCarta, Inc., a provider of geographic search solutions, has announced the launch...

McLean, VA-based QinetiQ North America characterizes its SPO-7 standoff passive object detection system as the kind calle...

Waukesha, WI-based Magnasphere reports that its new high-security sensor, HSS, has completed its UL inspections and is r...

White Papers

Future Fibre Technologies
The Boundaries of Security is the industry's most comprehensive report on current global trends in perimeter security, containing invaluable information all security professionals need to keep abreat of in the fast paced world of perimeter protection.The Boundaries of Security 2011 covers:* The...