Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Unmanned Aerial Systems emerging promising alternative for IEDs and Landmine detection and Disruptionr

dronedis

Several countries suffer from the existence of millions of buried landmines in their territories. These landmines have indefinite life, and may still cause horrific personal injuries and economic dislocation for decades after a war has finished.   Landmines, improvised explosive…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Increasing cyber threats to commercial and military ground vehicles is driving new approaches and research on vehicle cybersecurity

vehiclecybersecurity

Increasingly, today’s vehicles feature driver assistance technologies, such as forward collision warning, automatic emergency braking, and vehicle safety communications. In the future, the deployment of driver assistance technologies may result in avoiding crashes altogether, particularly crashes attributed to human drivers’…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s RADICS develops Rapid Attack Detection, Isolation and Characterization Systems for cyber attacks on power grids

DARPARADICS

Across the United States, 3200 separate organizations own and operate electrical infrastructure. The widely dispersed nature of the nation’s electrical grid and associated control systems has a number of advantages, including a reduced risk that any single accident or attack…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s Brandeis program developing tools and techniques to protect the private the private and proprietary information of individuals and enterprises

darpa brandeis 24 aug 2015

Significant technological advances are being made across a range of fields, including information communications technology (ICT); artificial intelligence (AI), particularly in terms of machine learning and robotics; nanotechnology; space technology; biotechnology; and quantum computing. The technologies are mostly dual use,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Maritime terrorism require Unattended Sensor Technologies for Monitoring Riverine and Littoral Zone Vessel Traffic

Mumbai Boats

Terrorist groups and transnational criminal organizations continue to illegally cross porous land borders to traffic small arms and light weapons (SALW), ammunition and explosives, drugs, contraband, other illicit goods, and human beings, as well as deploy terrorist operatives to conduct…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Global threat of landmines and IED require new IED neutralization technologies

IED

IED’s have become an extremely significant and dangerous force protection issue in the wake of Operation Iraqi Freedom (OIF) and the Global War on Terror (GWOT). Insurgents and terrorists are using a variety of asymmetric techniques to attack militarily superior…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New detection technologies tracking terrorists through thick concrete, underground tunnels, and caves

trackfirefighter

In April  2017, the U.S. military dropped the most powerful non-nuclear bomb ever used in combat on a tunnel complex in Afghanistan’s Nangarhar province. The airstrike targeted the Islamic State’s Khorasan branch. The use of the GBU-43/B Massive Ordnance Air…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rapid rise in drone operations and cyber threats require safety and security solutions, secure hardware and software technologies and standards

UAVcyber

Drones are increasingly making an impact on society and economy. Drones are used by the military for intelligence gathering, anti-aircraft target practice, and also for weapons platforms. They are also used for many civilian roles such as agricultural surveillance, mapping,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s SHIELD developed technologies for secure reliable authentication for ICs subject to hardware Trojans, cloning, counterfeit or recycling in Military systems that pose critical National Security Risk

darpa ii 29 638

Outsourcing of integrated circuit (IC) and printed circuit board (PCB) design, fabrication, packaging, and testing have dramatically reduced the time and cost of product development. In doing so, this has enabled the widespread availability of microelectronics, which has indeed transformed…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Threats to ICT supply chains including Counterfeit electronic components and Hardware Trojans present critical risk to military and security systems

1d36d23b156ead252433d4ce2c21c387

Information and communications technology, encompassing digital services and infrastructure, cybersecurity and software, is ubiquitous throughout the economy and society. As the digital transformation gathers pace, the number and complexity of ICT services is accelerating.   Information and Communications Technology (ICT)…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here