As attack vectors increase with the burgeoning of the Internet of Things (IoT), the Defense sector is exposed to different risks that require increasingly advanced authentication techniques. Today’s threat players are using more sophisticated social engineering tactics, credential-stuffing botnets, and account takeover tactics to pull off all sorts of attacks. …
Read More »Requirement of New military technology for aircrews in Helicopters and small aircraft to detect and avoid thin artificial objects such as power lines
Helicopters and small aircraft flying at low altitude in the visual flight rules often strike against obstacles. According to the aircraft accident reports in Japan, many collisions by small aircraft were caused by long, thin artificial objects as power lines because they are often very difficult to find by pilot …
Read More »New counter-terrorism training technologies prepare security forces for every possible terror scenario
Today’s terrorist landscape is more fluid and complex than ever and the threat landscape is less predictable. The United States and our allies face an increasingly complex terrorist landscape, populated by a diverse array of actors employing new technologies and tactics to advance their agendas. The terrorist threat to the …
Read More »New Radiation detecting sensors and systems being developed for threat of dirty bomb attack and Nuclear accidents
There is also growing concern that the widespread availability of radiological materials may result in a dirty bomb attack. Recently a secret group of fewer than 10 people in undercover congressional operation was easily able to buy the raw ingredients for a dirty bomb in US. This has set off alarms among …
Read More »Attacking ISIS by Cyber warfare and dropping cyber bombs was new strategy implemented by US, UK & Australia
United States opened a new line of combat against the Islamic State, directing the military’s eight-year-old Cyber Command for the first time to mount computer-network attacks that are now being used alongside more traditional weapons. In 2009, US established, USCYBERCOM for more effective and coordinated efforts for conducting cyberspace operations. Cyber Command, …
Read More »Cyber criminals favouring stealthier attacks like Cryptojacking to make free money
Cyber criminals are switching away from ransomware to stealthier attacks as the main sources of generating revenue, according to analysis by British artificial intelligence (AI)-based cyber security firm Darktrace. Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Cryptocurrency is a form of digital currency that can …
Read More »DARPA SHRIMP developed microrobots for search and rescue, disaster relief, infrastructure inspection, and equipment maintenance
Imagine a natural disaster scenario, such as an earthquake, that inflicts widespread damage to buildings and structures, critical utilities and infrastructure, and threatens human safety. Having the ability to navigate the rubble and enter highly unstable areas could prove invaluable to saving lives or detecting additional hazards among the wreckage. …
Read More »Threat of terrorism to transportation requires new strategy and appropriate technologies
The threat of terrorism is not new to transportation. From jet airliners to mass transit buses and rail terminals, vehicles and transport facilities are all-too-familiar targets of terrorist attacks. The 1995 sarin gas attack on the Tokyo subway left 13 people dead and injured 6,000 others. The terror attack was …
Read More »Next Robot revolution is achieving Human-Like dexterous manipulation for home, Industry and Security
Robots have already become an indispensable part of our lives. However currently, most robots are relatively rigid machines which make unnatural movements. In contrast, humans seem to be able to manipulate objects with our fingers with incredible ease like sifting through a bunch of keys in the dark, tossing and …
Read More »Active and Passive Millimeter Wave imaging systems employed for security screening at the airports and finding landmines
Electromagnetic waves in the millimeter-wave band (with frequencies between 30 and 300 GHz, or wavelengths between 10 and 1.0 mm) have attractive characteristics. One of their features is the wider usable frequency band compared with waves in the microwave band or lower bands. Another feature of using the millimeter-wave band is the fact …
Read More »