-
Ituran to acquire Mapa Group
Location-based applications company receives approval to proceed with acquisition of tion and Control Ltd. Announces the Approval of the Israeli Commissioner for Trade for the Acquisition of Mapa Group
-
-
More technology providers to offer RFID technology
Most technology resellers and solution providers will add RFID solutions to their portfolios; customers have been slow to embrace the technology
-
-
DHS computer systems vulnerable to hackers
DHS reports that during the past two years, its computer systems suffered more than 800 hacker break-ins, virus outbreaks, and other computer security problems
-
-
Senate, House DHS budget bills differ on programs, technologies
The House and Senate versions of the proposed DHS budget are similar in many ways, but also contain important differences on funding for programs, technologies
-
-
Honeywell Micro Air Vehicle deployed in Iraq
Small ducted-fan UAV — 16 pounds in weight, 13 inches in diameter — deployed in combat missions in Iraq; vehicle suitable for law enforcement and first response missions
-
-
CyberBug receives FAA certification
FAA awards small, hand-launched UAV certificate to operate in national airspace; vehicle equally suitable for law enforcement and commercial applications
-
-
Growing interest in autonomous undersea vehicles
UAVs are already widely used by the military, homeland security, and, increasdigly, law enforcement; could AUVs (autonomous underwater vehicles) be far behind?
-
-
DARPA solicits bids for LANdroids
U.S. military, first responders may scatter droids carrying communication gear to form self-forming, self-healing WiFi network; project aims to improve communication in urban warfare settings
-
-
First round of tests for entrants in DARPA's Urban Challenge
In DARPA’s Grand Challenge, driverless cars competed in traversing a 130-mile course in the Mojave Desert; in Urban Challenge, driverless cars will compete in navigating through urban traffic
-
-
Autonomous see-shoot systems drawing interest
Remotely controlled weapon systems are deployed in the DMZ and around the Gaza strip; we may soon see humans taken out of the see-shoot chain, and such systems deployed around critical infrastructure facilities
-
-
Self-healing plastic demonstrated
University of Illionis researchers show material that can repair itself multiple times without any external intervention
-
-
Identec shows satellite-assisted RFID tag
Security agencies and shippers alike will be able to ascertain “absolute location identification” of tagged assets and personnel
-
-
House deadlocked on DHS budget; Bush threatens veto
Hill Democrats want to add $23 billion, or 6%, to DHS budget over Bush’s February request; White House threatens veto
-
-
Bear-faced robot developed for rescuing wounded troops, first responders
Extracting wounded soldiers from a battlefield — or wounded first responders from a disaster scene — may be dangerous, and a Maryland company is developing a robot to that just that
-
-
EU regulation may limit use of MRI technology
To protect employees in the electricity and mobile-phone industries, the EU formulated regulations limiting exposure to radiation — regulation which may have unintended consequences
-
More headlines
The long view
What If We Used AI to Strengthen Democracy?
AI is just the latest technology in a long line of innovations through history that have influenced politics. While many experts fear artificial intelligence will be deployed to weaken democracy, examples abound around the world of it being used to make systems fairer. Surveillance, control, propaganda aren’t the only options, says security technologist.
The Trump Administration’s Cyber Strategy Fundamentally Misunderstands China’s Threat
The adoption of an offense-first strategy is a dangerous miscalculation. It will not diminish Beijing’s campaigns, and it coincides with a significant deterioration of cyber defenses that have kept U.S. networks and Americans safe.
Allfare: China’s Whole-of-Nation Strategy
To analyze how states exert their influence, scholars often compartmentalize actions into rigid analytical frameworks, which obscures the holistic scope of the challenge.
Counter-Drone Technologies Are Evolving – but There’s No Surefire Way to Defend Against Drone Attacks
Together, these three types of counter-drone technologies – radio frequency, directed energy and kinetic – provide a comprehensive tool kit for addressing the diverse threats posed by unauthorized drones. However, there is no single ideal solution to counter these threats.
A New Way to Make Steel Could Reduce America’s Reliance on Imports
America has been making steel from iron ore the same way for hundreds of years. Unfortunately, it hasn’t been making enough of it. Today the U.S. is the world’s largest steel importer, relying on other countries to produce a material that serves as the backbone of our society. Hertha Metals uses natural gas and electricity to produce steel and high-purity iron for magnets.
