Home / Security (page 5)

Security

High Value Targeting (HVT) Against Insurgents and Terrorists

A high-payoff target, also known as an HPT, is a high-value target whose loss to the enemy will significantly contribute to the success of a friendly course of action. Also called HVT, the loss of high-value targets would be  expected to seriously degrade important enemy functions throughout the friendly commander’s area of interest.   The term has been widely used in the news media for Osama Bin Laden and …

Read More »

Growing threat to military bases, require ‘Smart Base’ capabilities, concepts and technologies

The U.S. Department of Defense (DoD) maintains installations worldwide; worth over $1.2 trillion and critical to U.S. national security. Physical changes to the environment such as flooding, drought, and extreme storms disrupt U.S. military capabilities and facilities, including training ranges, bases, and housing. A 2019 DoD assessment found that out …

Read More »

Facial recognition is advancing to Emotion recognition

Facial recognition is a category of biometric software that maps an individual’s facial features mathematically and stores the data as a faceprint. The software uses deep learning algorithms to compare a live capture or digital image to the stored faceprint in order to verify an individual’s identity. Facial recognition technology  …

Read More »

Rise of Narco-Terrorism require new Contraband detector technologies

Narco-terrorism is a term that explains drug trafficking cartels/organized crime groups which resort to terrorism to achieve their aims. These terrorist organizations engage in drug trafficking activity to fund their operations and gain recruits and expertise. Such organizations include FARC, ELN, AUC in Colombia, PCP-SL in Peru, Hamas, Hezbollah, and …

Read More »

Through the wall imaging (TTWS) or Wall-penetrating radar technologies assist security forces in counterterrorism and diaster management operations

Urban Warfare Operations are complicated by a three-dimensional environment, limited fields of view  because of buildings, enhanced concealment and cover for defenders, and the ease of placement of booby traps and snipers.  Unknown individuals hidden from view can slow emergency efforts and can increase the inherent dangers of tactical operations. …

Read More »

Global air pollution threat requires IoT-based Air quality monitoring solutions

Atmospheric conditions continue to deteriorate each year due to the growth of civilization and increasing unclean emissions from industries and automobiles. Although air is an indispensable resource for life, many people are indifferent to the severity of air pollution or have only recently recognized the problem.   According to the …

Read More »

USSOCOM Special Operations Forces technology requirements to support counterterrorism, crisis response to high-end conflicts

Special operations (S.O.) are military, law enforcement or intelligence operations that are “special” or unconventional and carried out by dedicated special forces and other special operations forces units using unconventional methods and resources. Special operations may be performed independently, or in conjunction with conventional military operations. The primary goal is …

Read More »

US Military, the world’s largest polluter is implementing energy security strategy reducing future resource risk and increasing mission assurance

In the domain of defense, energy has the potential to be both an enabler of hard power but also, via denial, arguably itself to be a weapon of war. Energy enables nearly everything the military does, and the primary objective is mission assurance and decisive advantage on the battlefield.  Energy security …

Read More »

US Army’s NGIA integrating multiple domain sensors for situational awareness

The United States Special Operations Command (USSOCOM or SOCOM) is the Unified Combatant Command charged with overseeing the various Special Operations Component Commands of the Army, Marine Corps, Navy, and Air Force of the United States Armed Forces. USSOCOM conducts several covert and clandestine missions, such as direct action, special …

Read More »

Civil Rights protection on Social Media through Human rights-based AI/Machine Learning

Security is the state of being free from threat. To mitigate the threat, we require technology. The technology uses scientific knowledge in the form of new processes, materials, devices, systems or tools. For all of us, most important is human security which means freedom from threats to our lives, safety and …

Read More »
error: Content is protected !!