Home Technology


"Not Trying to Be the Drone Police": Colorado Towns Writing UAV Rules Strive to Balance Privacy, Freedom

As unmanned aerial vehicles – or drones – multiply in number, more Colorado communities are putting in place regulations to control how and where the devices are used. But crafting those rules is not easy, as cities and towns strive to balance public safety and privacy with a burgeoning consumer industry that one market research firm estimates could be worth more than $9 billion by 2024.

US Calls For ‘Immediate End’ To Syria Offensive

Two Companies Pioneering the World of Mobile Biometrics

By Glynn Cosker
Managing Editor, In Homeland Security

One of the biggest takeaways from last week’s 10th Annual Homeland Security Week conference in Pentagon City, Va., was the fascinating subject of biometrics and the new mobile devices on offer to quickly obtain and analyze personal data from an individual.

Biometrics are technologies that capture and confirm the identity of people by analyzing their physical characteristics and comparing those attributes to records found in a database.

The Best Place to Manage Customer Identity Data? The Cloud

As the amount of data generated by always-connected consumers continues to increase, IT departments are scrambling to deploy technologies that are able to put said data to use. Understanding how to safely leverage this data using established business systems is a major challenge. Historically, this task fell to legacy identity and access management (IAM) technologies, which could easily manage hundreds or thousands of corporate employee identities and devices.

Toymakers are tracking more data about kids — leaving them exposed to hackers

AMU & VACCINE DHS Center of Excellence at Purdue University Co-Sponsor Webinar Series

The VACCINE Center and American Military University are proud to announce the launch of a bimonthly webinar series beginning July 31, 2015.

Established in July of 2009 in partnership with Purdue University, VACCINE is the Department of Homeland Security’s (DHS) Center of Excellence in Visual and Data Analytics. Its mission continues to focus on creating methods, tools, and applications to analyze and manage vast amounts of information for all mission areas of homeland security in the most efficient manner.

Will Drones Become Weapons For Terror Attacks?

The Cryogenic Computer Complexity Program

By Brett Daniel Shehadey
Special Contributor for In Homeland Security

The Cryogenic Computer Complexity Program (C3) is a supercomputer attempt to break the exaFLOP barrier. The exascale is measures in quintillions of calculations per second. The C3 Program is being run by the U.S. Intelligence Community’s Intelligence Advanced Research Projects Activity (IARPA).

Navy Warns of Al-Qaeda Threats to Yemeni Waters

DARPA’s Ground-X Vehicle Technology Program

By Brett Daniel Shehadey
Special Contributor for In Homeland Security

Whatever comes after military-grade Humvees will be something more akin to the popular video game known as HALO. The early October concept video release of the Ground-X Vehicle Technology Program (The GXV-T Program) shows a futuristic ground vehicle design that has more of a look and feel of a small and fast space rover than an earthbound military vehicle.

The Reasons Behind America’s Interest in only Specific Global Terror Attacks