Trending News
Home / Security (page 16)


Militaries employ ‘The mother of all bombs’ or MOABs for wiping out fortified ground targets and creating ‘shock and awe’

The US’s  GBU-43/B Massive Ordnance Air Blast (MOAB) is a precision-guided munition weighing 21,500 pounds and was dropped from a C-130 Hercules aircraft. The MOAB isn’t the heaviest non-nuclear bomb in the US arsenal (that’s the 30,000-pound Massive Ordinance Penetrator ), but with a length of 30 feet and an …

Read More »

Nigerian Military’s offensive using latest technology to push Boko Haram back out of most territory, UN asks to address ‘Roots of conflict’

The claims by Nigeria’s government that terrorist group Boko Haram has been “defeated” continue to ring hollow. An attack by the terrorist group on an army base  in Nov 2018 led to as many as 100 soldiers being killed, Reuters reports. The attack has been attributed to Islamic State West …

Read More »

Military ATAK situational awareness tool serving Fire Fighters, law enforcement, and first-responder communities.

When Hurricane Harvey hit Texas, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) deployed the Android Team Awareness Kit (ATAK) to support the complex communication and coordination needs of the multi-jurisdictional responders. Most of the operators provided with ATAK in Texas had never used it before. Still, …

Read More »

China and Israel develop Unmanned Surface Vehicles (USV ) that could fire missiles

Unmanned Surface Vehicles (USV ) is a vehicle that operates at or near the sea surface and  has no vehicle operators on board. The USV are increasingly employed as they collect data for longer periods of time, at a fraction of the cost of Research ships, and with wide ranging …

Read More »

Countries developing bomb disposal robots having exceptional level of versatility, dexterity and diversity

EOD operators or ammunition technical officers conduct some of the military’s most dangerous jobs, who has the daunting task of dismantling, defusing and disposing bombs and other explosive ordnance, often in the most hostile and challenging of environments. Making this job safer  are bomb disposal robots, unmanned vehicles capable of disabling …

Read More »

Synthetic Identity Fraud is one the fastest-growing forms of identity theft used by fraudsters and terrorists

Synthetic identity theft is a type of fraud in which a criminal combines real and fake information to create a new identity, which is used to open fraudulent accounts and make fraudulent purchases. Fraudsters use this fictitious identity for obtaining credit, opening deposit accounts and obtaining driver’s licenses and passports. …

Read More »

New technology to fight human and drug smuggling across maritime borders

One of the threat of maritime security is human and drug smuggling across maritime borders. This is particularly important because terrorists may use similar pathways to sneak illegal weapons through the border or to deliver a dirty bomb to seaports.   There has been a noticeable growth in maritime criminal …

Read More »

UAVs are proving to be disruptive technology for disaster planning, response and relief operations

A disaster can be defined as any tragic event stemming from events such as earthquakes, floods, accidents, fires, or explosions. It is a phenomenon that can cause damage to life and property and destroy the economic, social or cultural life of people. Over the past two decades, the impact of disasters …

Read More »

Wireless and Emergency Communication Tech for Disasters: New Technologies Address Obstacles

The occurrence of a large natural or man-made disaster is often combined with the destruction of the local infrastructures on the ground. For example, the earthquake in Wenchuan in May, 2008 did not only has a huge destructive power, but also made the disaster area into many information isolated islands …

Read More »

Telecoms are suffering more attacks than any other sector, Telcos Managing cyber security risks

Telecoms companies, their core infrastructure and the large volumes of personal data they hold on subscribers, all represent an attractive target for malicious actors. Telecoms have suffered more attacks than any other surveyed. Telecoms organisations admitted to having faced four attacks on average over the last twelve months, according latest …

Read More »
error: Content is protected !!