Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

DARPA Media forensics to detect fake photos and videos on social media to support National Security

MediFoe

In recent years consumer imaging technology (digital cameras, mobile phones, etc.) has become ubiquitous, allowing people the world over to take and share images and video instantaneously. Mirroring this rise in digital imagery is the associated ability for even relatively…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries demand new security features in Bank notes to stay ahead of currency counterfeiters

Counterfeit Money

Counterfeit money is imitation currency produced without the legal sanction of the state or government usually in a deliberate attempt to imitate that currency and so as to deceive its recipient. Producing or using counterfeit money is a form of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Blockchain technology of decentralized digital currency to enhance security of additive manufacturing in Internet of Things to Military 3D printing

Vantage Points 1

Blockchain is based on open, global infrastructure, decentralized public ledger of transactions that no one person or company owns or controls, ensures security of transfer of funds through public and private cryptology and third parties to verify that they shook,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Quantum Cryptography emerging alternative to secure Military Internet of things (MIOT) from cyber attacks even in post Quantum Computer Era

IoTQKD

The Internet of things (IoT) is the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data. Each thing is uniquely identifiable through its…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

ISIS still a threat to the US and the World capable of wreaking havoc and bloodshed

ISIS Threat New Years

In spite of repeated assertions by Trump of his administration’s success in defeating the terrorist organization and destroying its so-called caliphate in Iraq and Syria, experts still think that ISIS remains a threat. While ISIS’s so-called “caliphate” has been destroyed,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Defence and Security require advanced authentication techniques including high speed, and accurate biometric identification

militarybometrics 1

As attack vectors increase with the burgeoning of the Internet of Things (IoT), the Defense sector is exposed to different risks that require increasingly advanced authentication techniques. Today’s threat players are using more sophisticated social engineering tactics, credential-stuffing botnets, and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Requirement of New military technology for aircrews in Helicopters and small aircraft to detect and avoid thin artificial objects such as power lines

Helicoptorradar

Helicopters and small aircraft flying at low altitude in the visual flight rules often strike against obstacles. According to the aircraft accident reports in Japan, many collisions by small aircraft were caused by long, thin artificial objects as power lines…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Hacking of Electronic Voting Machines is a threat to Democracy, DARPA Is Building a Open Source, Secure Voting System

securevoting

The introduction of the electronic voting machines in India at the turn of the century  had aided in  reducing instances of capturing of polling stations and stuffing of ballot boxes by mobs hired by political parties. Using data from state elections,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s RACE developing Secure Messaging Platform to provide WhatsApp like communication for troops on ground

RACE anonymous communication DARPA

Military is integrating Smartphones and tablets into their military operations, to enhance situational awareness and as backup communication in denied situations. Marines are considering airborne operations with tablets, Air Force looks at maintenance efficiencies, they have also widely used for…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New counter-terrorism training technologies prepare security forces for every possible terror scenario

counterterrorismtraining

Today’s terrorist landscape is more fluid and complex than ever and the threat landscape is less predictable. The United States and our allies face an increasingly complex terrorist landscape, populated by a diverse array of actors employing new technologies and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here