Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Smartphones increasingly vulnerable from hacking and spying through malware attacks, holes in hardware, Geolocation devices and cameras

phone malware

  Today, mobile devices are coming under increasing attack.  The number of mobile malware is rapidly on the rise with malicious activities, such as stealing users data, sending premium messages and making phone call to premium numbers that users have…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s COMPASS developing artificial intelligence based decision making software to help commanders in Hybrid Warfare

DARPA COMPAS

Hybrid Warfare (HW) is a military strategy that blends conventional warfare, irregular warfare, cyber warfare and subversion, and blurs the formal distinction between war and peace. It is often characterised by the use of fictitious propaganda, deniable forces, espionage, the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Smart guns and other technologies need urgent commercialization to avoid blood of innocent children

8e5f062e9750688c028aaa3058da9ec4

In Feb 2018, a horrific school shooting in Parkland, Florida, that killed 17 people . Nikolas Cruz, 19, told police he was responsible for the shooting and added that he hid extra ammunition in his backpack and shot students in the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Challenges in humanitarian aid and disaster relief (HADR) missions and Operations and Technology requirements

HADR

International reinsurer Munich RE has projected that worldwide losses due to 2017’s string of natural disasters will reach $330 billion, with only $135 billion of those costs insured. Hurricanes Harvey, Irma and Maria alone, which left behind $215 billion in damages,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA MAA program aims to predict the terrorist threat of using weapons of mass terror (WMTs) through modeling and computational methods

DARPAMAA

DARPA launched the program Modeling Adversarial Activity (MAA) program with a goal  to develop mathematical and computational techniques for modeling adversarial activity for the purpose of producing high-confidence indications and warnings of efforts to acquire, fabricate, proliferate, and/or deploy weapons…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Global Maritime Security Risks and Global Marine Technology Trends 2030

фото worldmaritimenews

Recent years have seen multiple new security challenges emerge in the maritime arena. Navies, coast guards and other maritime security agencies face a proliferation of security challenges. These include: illegal fishing of territorial waters; incursion of mineral exploitation across legal…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber domain command and control should be resilient, survivable, and reliable supported by Artificial intelligence (AI), automation, and the cloud technologies

CyberMission

NATO ministers have designated cyber as an official operational domain of warfare, along with air, sea, and land. Cyber warfare has developed into a more sophisticated type of combat between countries, where you can destroy communications infrastructure, said Marc Rogers,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Scientists develop FontCode, that hides information by imperceptibly changing the shapes of fonts in text.

zheng fontcode 400

Wikipedia defines Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning “covered, concealed, or protected,” and graphein (γράφειν) meaning “writing”.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Police use stingray, a secretive phone surveillance technology to solve crimes or foil a terror attack

xzen1 so 4

Smartphones carried by most people depend on cell site or cell tower for their operation.  A cell site or cell tower is a cellular telephone site where antennae and electronic communications equipment are placed — typically on a radio mast,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New Precision Guided Missiles and Munitions for Urban Warfare and in A2/AD Environment

LGB

Cities have become the new battleground and Hybrid or Urban Warfare the greatest threat being waged by ISIS to Boko Haram to Hamas to  Ukraine rebels.Urban warfare is the only way the Islamic State of Iraq and Greater Syria will…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here