Category Security, Cyber & Counter-Threats

Security, Cyber & Counter-Threats examines the evolving landscape of digital conflict, hybrid warfare, and threat mitigation in an increasingly networked world.
This magazine covers cyber operations, information warfare, digital resilience, and security architectures shaping modern defense and intelligence ecosystems.
Designed for analysts, policymakers, and technology leaders, it delivers actionable insights into how states and non-state actors compete, defend, and adapt in the information age.

Queensland Government Counter-Terrorism Strategy for rising threat level in Australia, implementing plan and Hi-tech technology requirements

automatic number plate recognition in detail we go on patrol with queensland police 4

The last Queensland Government counter-terrorism strategy was released in 2013 and the Opposition believes it needs to be updated on current threat levels. In January, NSW announced its first-ever minister for counter terrorism. All States and territories under current laws…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New cyber security technologies Dispersing data packets over Multiple Network Paths and Continuously Scrambling Code

b1d237aad44a95e3871fc116e6241517

“United States adversaries are launching increasingly sophisticated cyberattacks on the complicated web of networked systems upon which our military relies,” explained Robert W. Twitchell, Jr., President and CEO of Dispersive Technologies. “These attacks impair connectivity, degrade mission effectiveness and threaten…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA plans for Revolutionary approaches for Real-Time Defense against DDoS attacks on Military Networks

As the name suggests, denial-of-service (DoS) attacks are designed to deny legitimate users access to websites and services by overwhelming them with illegitimate connections, requests and traffic.  A distributed denial-of-service attack is when the DoS attacks are being done by multiple attackers all…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA plans city wide network of tethered platforms and long-endurance UASs to track every terrorist drone

DARPAdragnet

Cities have become the new battleground and Hybrid or Urban Warfare the greatest threat being waged by ISIS to Boko Haram to Hamas to  Ukraine rebels.  One of the biggest emerging threat in cities is growth and proliferation of UAVs or…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Wireless Sensor Networks enable future IoT revolution, smart cities and detecting, classifying and tracking Military threats

wirelesssensors

A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions. The self-powered nodes are equipped with sensors of light, sound, heat, pressure, e.t.c, communicating components and data processing…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US brainstorming technology strategy to prevent terrorists exploiting Internet to mobilize, facilitate and operationalize attacks

download 20

White House officials are drafting a presidential directive from President Trump that calls on his newly appointed defense secretary to take a more aggressive approach to attacking ISIS fighters in Syria. The New York Times reported  that Trump is expected to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Top 10 emerging technologies of 2016 that will improve lives, revolutionize industries, and protect the planet according to the WEF

Fig 3 The Internet of Nano things application in Healthcare

The Top 10 Emerging Technologies 2016 list, compiled by the Forum’s Meta-Council on Emerging Technologies and published in collaboration with Scientific American, highlights technological advances its members believe have the power to improve lives, transform industries and safeguard the planet.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cisco Annual Security Report proposes Integrated Threat Defense Architecture to combat challenging cybersecurity landscape

images 3

“Our just-released 2016 Cisco Annual Security Report (ASR) presents a challenging cybersecurity landscape: cyber defense teams are fighting to keep up with rapid global digitization while trying to integrate dozens of vendor solutions, speed up detection, and educate their organizations…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s Edge-CT program to protect Military WANs from Cyber Attacks and Network Errors on the Fly

download 24

The United States military is heavily dependent on networked communication to fulfill its missions. The wide-area network (WAN) infrastructure that supports this communication is vulnerable to a wide range of failures and cyber attacks that can severely impair connectivity and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Pakistan employs indigenous combat drone against terrorists, reportedly developed with Chinese help

bbdd9bab523659f72e79235cef0a8565

Pakistan’s military says it has deployed a locally-made drone for the first time, killing three militants near the Afghan border. In a statement, the army said missiles fired by the drone had hit a compound in the North Waziristan Shawal…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here