UAV’s in Conventional Security: Will It Happen?

TpromoCom (image)
Professional Content and Social Media Services
UAV’s in Conventional Security: Will It Happen? | #TpromoCom #Drone #UAV #Security | The use of Unmanned Aerial Vehicles (UAV’s) in conventional security is almost a given when you stand back and look at the solution itself and what it can do to assist corporations as well as municipalities. Possibly one of the biggest hurdles that lie ahead of us, however, is public perception of its use and the intent behind those using it.

The following are a collection of news items that center on the use of UAV’s (i.e. Drones) in a variety of settings. The first is an article in #SDMag that touches on the current state of the industry in conventional security. Frankly, it’s well done and thoroughly researched. Case studies provide an in-depth look at how it’s being used, and surprisingly enough, we learn from Ford Motors that their use of drones has more to do with assisting security personnel than replacing them. Take a look. –Al Colombo

divider bar (image)

SDM Magazine (image)
The Security Industry Is Ripe for Disruption & Drones Might Be What Does It | #TpromoCom #Drone #Security #Safety | The security industry’s use of drones has exploded in the past 12 months, making adoption lightning-fast for an industry known as a bit of a dinosaur. If you haven’t started offering drone solutions for your customers, you’re already late. Click It!

divider bar (image)

Army Tech (image)
Alpha 800 Unmanned Aerial Vehicle (UAV) | #TpromoCom #Army #Drone #UAV | Alpha 800 unmanned aerial vehicle (UAV) is manufactured by Alpha Unmanned Systems (AUS). The unmanned rotorcraft is configured to perform multiple tasks including reconnaissance, surveillance, inspections, and delivery of emergency supplies.

The medium-range platform is designed for surveillance and target acquisition and is capable of detecting surface targets in all weather conditions. Click It!

divider bar (image)

Defense One (image)
Did the White House Use Drone Killing Technology? | #TpromoCom #WhiteHouse #Drone #Kill | At about 3 a.m. on Monday morning, a small quadcopter drone, or unmanned aerial vehicle, crashed on the White House lawn. White House officials said that the drone, by itself, was unarmed and didn’t represent a threat. Authorities quickly located the owner, a government employee, who has managed (so far at least) to convince the Secret Service that he made an innocent mistake flying his drone outside of the White House in the wee hours of the morning. Click It!

divider bar (image)

Government Executive (image)
The Endless Aerial Surveillance of the Border | #TpromoCom #Border #Police #Security | New reports suggest that drone activity at the southern border is spreading to nearby cities, erasing the line between police procedures and immigration enforcement.

A collaboration between journalism students and the Electronic Frontier Foundation, a civil-liberties group, probes this deceptively simple question. Click It!

divider bar (image)

Wall Street Journal (image)
Tackle Box for the Modern Fisherman: Rod, Reel, Drone | #TpromoCom #Drone #Fishing #Angler | Anglers use the flying machines to drop bait where the big fish swim; ‘Lots of things could go wrong.’

When fisherman Robbie Riches laments the ones that got away, he means his $1,000 drones. Click It!

divider bar (image)

Drone Life (image)
European Drone Regulations: The EASA High Level Conference at Amsterdam Drone Week | #TpromoCom #EU #Drone #Regulations #Event | Europe’s leading drone conference, Amsterdam Drone Week, takes place December 4 – 6: and the EASA High Level Conference on drones meeting there could have a major impact on the global drone industry. Click it!

divider bar (image)

Human Investigation Management – ISIO
Human Investigation Management – ISIO. Find out more by clicking!

Please follow and like us:
error

Is the US losing the artificial intelligence arms race?

Military Times, AI, Artificial Intelligence (image)

Is the US losing the artificial intelligence arms race? | #TpromoCom #AI #ArtificialIntelligence #War | The U.S. government, long a proponent of advancing technology for military purposes, sees artificial intelligence as key to the next generation of fighting tools.

The U.S. defense community is coming to understand that AI will significantly transform, if not completely reinvent, the world’s military power balance. The concern is more than military. As Chinese and Russian technologies become more sophisticated, they threaten U.S. domination of technological innovation and development, as well as global economic power and influence.

To read the remainder of this news article, click here.


Personal Perspective: The issue of AI in military hands is a frightening one in that once you open that bottle and the Genie jumps out, you’re NOT going to put him back. Elon Musk has been very vocal on this right from the start, especially since he works with AI in his engineering work.

A number of years ago when AI engineers began working on AI tech, I read a number of comments made by them. Most common, ordinary people would be just as concerned as I was, and still am with what I read. The brunt of it is, “We know there’s a potential for annihilation by our own contrived, mechanized children, but they will embody the essence of humanity by virtue of the fact that we made them.”

I’m not sure about you, but that kind of statement by the creators of the first AI prototypes is disconcerting. Here’s another report released over the past few daze that should also cause you some concern: Click Here! –Al Colombo

Human Investigation Management – ISIO
Human Investigation Management – ISIO. Find out more by clicking!
Please follow and like us:
error

Chinese AI unicorns target smart cities & public security

Security World Market (image)

Chinese AI unicorns target smart cities & public security | #TpromoCom #AI #Military #Chinese | According to research company, Memoori, in a bid to be at the forefront of the technology, China is pouring billions of dollars into companies that are researching AI technology, with video analytics and IoT platforms for smart cities being two of the prime applications.

Memoori estimates that China accounts for approx. 31% of global physical security revenues and says that it is now the biggest single country market for physical security products having increased its share by almost 50% in the last 7 years.

Video surveillance equipment has been the major contributor here, with the market growing rapidly through a boom in new construction and safe city projects in the public sector. Hundreds of cities in China, large and small, have jumped on the smart cities bandwagon, as advocated by Beijing, and have established budgets to support such initiatives.

To read the remainder of this story, click here.

Human Investigation Management – ISIO
Human Investigation Management – ISIO. Find out more by clicking!
Please follow and like us:
error

Security cams on West Texas ranch capture suspected illegal immigration

Security cams on West Texas ranch capture suspected illegal immigration | #TpromoCom #VideoSurveillance #Security #Safety | There’s a tremendous need for video surveillance in applications such as border and street surveillance. Some may think it’s too ‘Big Brother.’

border security photo

Looking for great content for your website or blog? Al Colombo, Senior Design Specialist with TpromoCom can help.
Looking for great content for your website or blog? Al Colombo, Senior Design Specialist with TpromoCom can help.

Texas (Border Report) — Brite Ranch trustee Jim White says security cameras he’s installed over the last few years have helped capture everything from migrants illegally entering Texas to people trying to run drugs across the border.

White told Anna Wiernicki he’s installed a security gate on the main road of his ranch outside Marfa to stop traffic coming in and out. He’s also invested in a wireless camera network installed across his ranch. The cameras are all controlled remotely through a computer or cell phone.

To read the remainder of this news article, click here.

Do you have news or a story to tell? Use the convenient form below or email us at 4Publication@SecurityeNews.com!

Please follow and like us:
error

Border & Maritime security to grow two-fold by 2028

#Border & #Maritime #security to grow two-fold by 2028 | #TpromoCom #Trending | Global instability due to terrorism and civil disruptions is leading to increased pressures among border and maritime security agencies to keep their borders safe from human, drugs, and weapons trafficking while streamlining operations to process genuine travellers.

According to Frost & Sullivan’s recent analysis, Global Border and Maritime Security Market, a high impetus on cross-border data sharing and integrated security systems is driving the need for technological solutions that act as force multipliers. Frost & Sullivan forecasts the market to grow two-fold from $19.22 billion in 2018 to reach $35.23 billion in 2028 at 6 percent CAGR.

“The adoption and integration of next-generation systems and technologies powered by artificial intelligence and real-time big data analytics will enable faster and more accurate threat detection, tracking, and decision making,” said Aravind Srimoolanathan, Senior Research Analyst, Security at Frost & Sullivan. “Robust network infrastructure and cyber security capabilities will be required with increasing inter-agency collaboration and cross-border data sharing.”

From a technology standpoint, Srimoolanathan predicts that multimodal biometrics for seamless security processing of travellers, tracking and identification through video analytics, and the concept of smart border management will gain prominence. Security industry consolidation and merger and acquisition activities with start-ups, which provide innovative solutions for the border security market, are also highly likely.

To read the remainder of this news article, click here.

TpromoCom [image]
Need help with a new website, blog, or social media outreach program? Call TpromoCom at 330-956-9003 for help.
Please follow and like us:
error

DoS Attack Blamed for U.S. Grid Disruptions

SecurityWeek news and information

#DoS Attack Blamed for U.S. #Grid Disruptions | #TpromoCom #Power #CyberSecurity #Hackers | According to the National Energy Technology Laboratory’s OE-417 Electric Emergency and Disturbance Report for the first quarter of 2019, a cyber event caused “interruptions of electrical system operations.”

The report shows that the incident impacted an unidentified utility in the region overseen by the Western Electricity Coordinating Council (WECC), which is responsible for compliance monitoring and enforcement in the Western Interconnection, and affected California (Kern County and Los Angeles County), Utah (Salt Lake County) and Wyoming (Converse County).

However, the report shows that the incident did not result in any power outages. The cyber event occured on March 5 — it started at 9:12 AM and systems were restored by 6:57 PM on the same day.

To read the remainder of this news article, click here.

[image] TpromoCom provides affordable websites & blogs.
TpromoCom provides affordable websites & blogs. Call 330-956-9003, or click on banner.
Please follow and like us:
error

NSA asks to end mass phone surveillance

NSA asks to end mass phone surveillance | #TpromoCom #NSA #Government #Intelligence | The National Security Agency (NSA) has asked to end its mass phone surveillance program because the work involved outweighs its intelligence value, according to reports this week.

Sources told the Wall Street Journal that the NSA has recommended the White House terminates its call data records (CDR) program. The logistics of operating it aren’t worth the intelligence that it provides, they said.

The NSA’s clandestine phone records gathering program dates back to the introduction of the Patriot Act in 2001, shortly after the 9/11 attacks on the US. Section 215 of the Act enabled the US intelligence community to collect extensive information.

To read the remainder of this news article, click here.

Please follow and like us:
error

A New Consensus Is Emerging On How to Handle The Risk from China’s 5G

A New Consensus Is Emerging On How to Handle The Risk from China’s 5G | #TpromoCom #China #Spy #5G | Chinese telecom tech is invading the physical world, but Europeans and industry have strategies to contain the threat.

“No one calls it an intelligence risk, but national security agencies across the world are concerned about China’s 5G modems and other devices,” says Al Colombo, Senior Design Specialist with TpromoCom of Canton, Ohio.

Much of the Western intelligence debate around Chinese high-speed 5G technology has focused on hardware and software. Once the hardware is already out in the wild — which most think is inevitable — the future of the fight is in managing risk. It’s doable, if not yet widely advertised, according to several experts speaking at a U.S. intelligence conference this week, by quarantining Chinese equipment and deploying smarter electromagnetic spectrum management tools to better handle threats.

Bottom line: Huawei leads the world in the ability to rapidly produce cheap telecom hardware (as well as the underlying software.) Recent reports, including one from NATO, state it plainly. It’s one reason why European countries, including U.S. allies like Germany and the U.K., have been reluctant to ban tech from Huawei outright, even in the face of heavy U.S. pressure.

To read the remainder of this extremely interesting and timely news article, click here.

Please follow and like us:
error