Home / Security (page 10)

Security

USSOCOM Special Operations Forces technology requirements to support counterterrorism, crisis response to high-end conflicts

Special operations (S.O.) are military, law enforcement or intelligence operations that are “special” or unconventional and carried out by dedicated special forces and other special operations forces units using unconventional methods and resources. Special operations may be performed independently, or in conjunction with conventional military operations. The primary goal is …

Read More »

US Military, the world’s largest polluter is implementing energy security strategy reducing future resource risk and increasing mission assurance

In the domain of defense, energy has the potential to be both an enabler of hard power but also, via denial, arguably itself to be a weapon of war. Energy enables nearly everything the military does, and the primary objective is mission assurance and decisive advantage on the battlefield.  Energy security …

Read More »

US Army’s NGIA integrating multiple domain sensors for situational awareness

The United States Special Operations Command (USSOCOM or SOCOM) is the Unified Combatant Command charged with overseeing the various Special Operations Component Commands of the Army, Marine Corps, Navy, and Air Force of the United States Armed Forces. USSOCOM conducts several covert and clandestine missions, such as direct action, special …

Read More »

Civil Rights protection on Social Media through Human rights-based AI/Machine Learning

Security is the state of being free from threat. To mitigate the threat, we require technology. The technology uses scientific knowledge in the form of new processes, materials, devices, systems or tools. For all of us, most important is human security which means freedom from threats to our lives, safety and …

Read More »

Internet evolving from Globally conscious entity to consciousness of its own

In the last 30 years, the internet has become the main interface for publishing, accessing, and sharing information.  Access to the internet can provide an instant connection between any two conscious human minds almost anywhere on the planet. Smartphones and social media are enhancing and accelerating the internet’s ability to …

Read More »

Tethered Drones or UAS, Hovering platforms, and Towed parafoil system provide long range Communications and Surveillance for Combatting terrorism

Militaries have long recognized the  advantages of height for surveillance platforms to overcome the Horizon limitations because of curvature of earth, therefore it has been using many such platforms like baloons, and aerostats. Security forces have also found that countering today’s asymmetric threats, which can occur at any time and …

Read More »

Speech recognition and Speech translation technologies driving AI Chatbots and intelligent agents for global businesses, disaster relief and military operations

Speech Translation is the process by which conversational spoken phrases are instantly translated and spoken aloud in a second language. A speech translation system would typically integrate the following three software technologies: automatic speech recognition (ASR), machine translation (MT) and voice synthesis (TTS). Fast, accurate speech-to-speech translation can globalize the free …

Read More »

Unmanned Aerial vehicle (UAVs) swarms for Early warning of Chemical, Biological, Radiological and Nuclear (CBRN) Threats

The threats of chemical, biological, radiological, nuclear and explosive (CBRNE) hazards continue to advance. CBRN weapons are some of the most indiscriminate and deadly weapons in existence today, with capability to affect large population in wide geographical area and in short time. The release of Chemical, Biological, Radiological and Nuclear …

Read More »

Urban Warfare and urban terrorism are the greatest future security threat, require new tactics and technologies being developed and tested

Cities have become the new battleground and Hybrid or Urban Warfare the greatest threat being waged by ISIS to Boko Haram to Hamas to Ukraine rebels.  Boko Haram is carrying out its urban terror campaign against the Nigerian Army and its allies. In the Paris attacks, two teams of lightly armed …

Read More »

DARPA SubT developed tunnel warfare technologies to rapidly map, navigate, and search underground tunnels employed for missile and nuclear arsenal

In recent years, underground settings are becoming increasingly relevant to global security and safety. Factors such as rising populations and urbanization are requiring military and civilian first responders to perform their duties in below-ground conditions, in human-made tunnels, underground urban spaces, and natural cave networks. Military and Security forces also have …

Read More »
error: Content is protected !!