Teaming Up to Secure Little League Baseball World Series (Multi-Video)

Four industry leading security manufacturers have teamed up to provide safety and security solutions for the players, coaches and fans at the 71st Annual Little League Baseball® World Series (LLBWS). For...
Ensure that your child is sharing every social media account and instant messaging service she has with you, including the passwords. Check those accounts—as well as instant messaging programs and texts—for disturbing content on a regular basis.

FBI: Keep Your Kids Safe from Cyber Predators & Bullying (Multi-Video)

Courtesy of the Oregon FBI (Repost) Building a digital defense to protect your kids as they head back to school with cell phones. Summer is about to begin, and it’s time to fill...

SWN Direct Competes in ‘ASTORS’ Homeland Security Awards (Video)

When it comes to increasing public safety and homeland security, the success of your response plan to emergency events - whether they are natural or man-made - depends on your ability...

Key Issues Surrounding Concerns with FirstNet (Learn More, Videos)

In the letter below, Don Brittingham, Vice President of Public Safety Policy for Verizon, outlines some of the key issues surrounding their concerns with FirstNet, including: That the Middle Class Tax...
Genasys is a leading software provider of advanced location-based mass messaging solutions for Emergency Warning Systems and Workforce Management.

LRAD Acquires Genasys, Location-Based Mass Messaging Provider

LRAD Corporation,Two-Time 2017 ‘ASTORS’ Homeland Security Award Winner for Best Long Range Acoustic Hailing System & Best Mass Notification/Siren System, has acquired Genasys, a leading software provider of advanced location-based mass messaging solutions for...
NIST is releasing a guide that describes procedures for documenting and populating test data on a mobile device before testing a mobile forensic tool—the recovery and interpretation of data found on digital devices is often part of a criminal or civil investigation.

NIST Helps Forensic Investigators Place Data on Mobile Devices

Data recovered from digital devices is often helpful in providing clues for incidents and potential criminal activity. For example, data found on a suspect’s computer, cell phone or tablet may prove to...

FCC: Transforming 2.5 GHz for Next-Gen 5G Connectivity (Learn More, Videos)

The Federal Communications Commission (FCC) has adopted a Notice of Proposed Rulemaking (NPRM) effective immediately to consider updating the framework for licensing Educational Broadband Service (EBS) spectrum in the 2.5 GHz...
"While prosecutors do not hesitate to obtain warrants when feasible, cell site information plays a pivotal role in the early stages of an investigation, winnowing out the unorganized mass of information that surrounds a crime and helping distinguish the guilty from the innocent." John M. Castellano

Supreme Court Hands Law Enforce a Defeat on Cellphone Privacy (Videos)

By The Editorial Board, USA TODAY The Supreme Court on Friday struck a blow against Big Brother for everyone who has a cellphone, nudging the constitutional right to privacy one more step into...
With state-of-the-art indoor and outdoor location technology, streaming video calling, and call prioritization, Carbyne is set to be 9-1-1's most important upgrade in more than 40 years.

Carbyne Brings Next-Gen 911 to Mexico City (See in Action, Video)

With a touch on a smartphone, to a telephone application using Israeli security technology, the emergency center ‘C-2’ will know the exact location, the name of the issuer of the alert...

The Cognitive Science Behind Cybersecurity

Guest Editorial by Margaret Cunningham, Principal Research Scientist, Forcepoint Artificial intelligence, cognitive computing, and machine learning are among the most discussed technologies in the cybersecurity realm, but what do these solutions really...