Category Security & Threat Management

Aircrafts employing Directed InfraRed CounterMeasure (DIRCM) to counter threat of Manpads, the shoulder-fired anti-aircraft missiles

countemanpads

The West in its continuous support to Ukraine has been supplying the besieged country with military aid in the form of arms as well as anti-aircraft and anti-tank defence systems. Joe Biden said the US will be sending an additional…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Facial recognition widely employed in commercial, Security and Military applications

facial recognition technology

Facial recognition is a way of using software to determine the similarity between two face images in order to evaluate a claim. The technology is used for a variety of purposes, from signing a user into their phone to searching…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

High Value Targeting (HVT) Against Insurgents and Terrorists

A high-payoff target, also known as an HPT, is a high-value target whose loss to the enemy will significantly contribute to the success of a friendly course of action. Also called HVT, the loss of high-value targets would be  expected to seriously degrade important enemy functions throughout the friendly commander’s area of interest.   The term has been widely…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Facial recognition is advancing to Emotion recognition

emotionrecog

Facial recognition is a category of biometric software that maps an individual’s facial features mathematically and stores the data as a faceprint. The software uses deep learning algorithms to compare a live capture or digital image to the stored faceprint…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rise of Narco-Terrorism require new Contraband detector technologies

Narco-terrorism is a term that explains drug trafficking cartels/organized crime groups which resort to terrorism to achieve their aims. These terrorist organizations engage in drug trafficking activity to fund their operations and gain recruits and expertise. Such organizations include FARC,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Through the wall imaging (TTWS) or Wall-penetrating radar technologies assist security forces in counterterrorism and diaster management operations

throughhewall

Urban Warfare Operations are complicated by a three-dimensional environment, limited fields of view  because of buildings, enhanced concealment and cover for defenders, and the ease of placement of booby traps and snipers.  Unknown individuals hidden from view can slow emergency…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Global air pollution threat requires IoT-based Air quality monitoring solutions

IoTairpollution

Atmospheric conditions continue to deteriorate each year due to the growth of civilization and increasing unclean emissions from industries and automobiles. Although air is an indispensable resource for life, many people are indifferent to the severity of air pollution or…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

USSOCOM Special Operations Forces technology requirements to support counterterrorism, crisis response to high-end conflicts

USSOCOM

Special operations (S.O.) are military, law enforcement or intelligence operations that are “special” or unconventional and carried out by dedicated special forces and other special operations forces units using unconventional methods and resources. Special operations may be performed independently, or…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US Military, the world’s largest polluter is implementing energy security strategy reducing future resource risk and increasing mission assurance

energysecurity

In the domain of defense, energy has the potential to be both an enabler of hard power but also, via denial, arguably itself to be a weapon of war. Energy enables nearly everything the military does, and the primary objective…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US Army’s NGIA integrating multiple domain sensors for situational awareness

Multi domain graphic

The United States Special Operations Command (USSOCOM or SOCOM) is the Unified Combatant Command charged with overseeing the various Special Operations Component Commands of the Army, Marine Corps, Navy, and Air Force of the United States Armed Forces. USSOCOM conducts…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here