Category Security & Threat Management

Harnessing Artificial Intelligence and Data Analytics to Combat Terrorism on Social Media: Promoting Cross-Platform and Transnational Cooperation

social media

In today’s digital age, social media platforms have become powerful tools for communication, information sharing, and social interaction. However, they have also become breeding grounds for extremist ideologies and terrorist propaganda. To counter this alarming trend, the integration of Artificial…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Protecting National Security: The Growing Market for Border Security Systems

Introduction: In an era of evolving global threats, safeguarding national security has become a top priority for governments around the world. As countries face challenges such as terrorism, transnational crime, smuggling, and illegal migration, the need for robust border security…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

India’s Smart and Comprehensive Integrated Border Management (CIBMS) to guard its long, difficult and porous borders

Security Challenges

The long, porous and difficult  borders have created the security challenges of illegal immigration, cross border terrorism, narcotics and arms smuggling, abetment of separatists and left -wing extremism and separatist movements aided by external powers. Pakistan policy of supporting cross…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rising Open Source Intelligence (OSINT) importance for Military

Intelligence, in military science, information concerning an enemy or an area. The term is also used for an agency that gathers such information. Military intelligence is as old as warfare itself. Even in biblical times, Moses sent spies to live with…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Armed Crop Dusters for Security and Military Missions

A crop duster, is usually, an aircraft used for dusting or spraying large acreages with pesticides. Aerial spraying and dusting permit prompt coverage of large areas at the moment when the application of pesticide is most effective and avoid the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

China controls internet to curb dissent , employs widespread surveillance for ‘anti-terror’ measures and for repression of people

terroristsChina

With President Xi Jinping at the helm, the Chinese government doubled down on repression inside and outside the country in 2021, says world report 2022 on human rights. Its “zero-tolerance” policy towards Covid-19 strengthened the authorities’ hand, as they imposed…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countering Foreign Interference and Knowledge security

State actors use a variety of methods to acquire knowledge and technology that they can use for military purposes or for objectives that are not consistent with our fundamental values. Examples include centrally controlled talent programmes, applying pressure to compatriots…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA devloping tool to assess Risks of Crypto to National Security

Blockchain, bitcoin, crypto assets, and virtual currencies have become a whole new vocabulary describing innovative technology to swiftly transfer value around the world. Blockchain originated just over 10 years ago. Since then, virtual assets have become widely available and have…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Voilent Extremist attacks on Critical Infrastructure and protection

Infrastructure protection

Critical infrastructure comprises facilities and assets that are essential for the normal functioning of day-to-day life within a country and range from energy and transportation to agriculture and public health.   Extremists tend to view critical infrastructure as an attractive…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Emerging Technologies, their impact on War fighting and Military technology requirements

militarytech

This century has seen rapid growth in new technologies such as 5G, AI, cloud computing, nanotechnology, biotechnology, smartphones, cryptocurrency, augmented reality, gene editing, social media platforms…and quantum. This is a perfect example of the Law of Accelerating Returns posited by…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here