Category Security & Threat Management

Rising Open Source Intelligence (OSINT) importance for Military

Intelligence, in military science, information concerning an enemy or an area. The term is also used for an agency that gathers such information. Military intelligence is as old as warfare itself. Even in biblical times, Moses sent spies to live with…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Armed Crop Dusters for Security and Military Missions

A crop duster, is usually, an aircraft used for dusting or spraying large acreages with pesticides. Aerial spraying and dusting permit prompt coverage of large areas at the moment when the application of pesticide is most effective and avoid the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

China controls internet to curb dissent , employs widespread surveillance for ‘anti-terror’ measures and for repression of people

terroristsChina

With President Xi Jinping at the helm, the Chinese government doubled down on repression inside and outside the country in 2021, says world report 2022 on human rights. Its “zero-tolerance” policy towards Covid-19 strengthened the authorities’ hand, as they imposed…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countering Foreign Interference and Knowledge security

State actors use a variety of methods to acquire knowledge and technology that they can use for military purposes or for objectives that are not consistent with our fundamental values. Examples include centrally controlled talent programmes, applying pressure to compatriots…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA devloping tool to assess Risks of Crypto to National Security

Blockchain, bitcoin, crypto assets, and virtual currencies have become a whole new vocabulary describing innovative technology to swiftly transfer value around the world. Blockchain originated just over 10 years ago. Since then, virtual assets have become widely available and have…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Voilent Extremist attacks on Critical Infrastructure and protection

Infrastructure protection

Critical infrastructure comprises facilities and assets that are essential for the normal functioning of day-to-day life within a country and range from energy and transportation to agriculture and public health.   Extremists tend to view critical infrastructure as an attractive…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Emerging Technologies, their impact on War fighting and Military technology requirements

militarytech

This century has seen rapid growth in new technologies such as 5G, AI, cloud computing, nanotechnology, biotechnology, smartphones, cryptocurrency, augmented reality, gene editing, social media platforms…and quantum. This is a perfect example of the Law of Accelerating Returns posited by…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Aircrafts employing Directed InfraRed CounterMeasure (DIRCM) to counter threat of Manpads, the shoulder-fired anti-aircraft missiles

countemanpads

The West in its continuous support to Ukraine has been supplying the besieged country with military aid in the form of arms as well as anti-aircraft and anti-tank defence systems. Joe Biden said the US will be sending an additional…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Facial recognition widely employed in commercial, Security and Military applications

facial recognition technology

Facial recognition is a way of using software to determine the similarity between two face images in order to evaluate a claim. The technology is used for a variety of purposes, from signing a user into their phone to searching…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

High Value Targeting (HVT) Against Insurgents and Terrorists

A high-payoff target, also known as an HPT, is a high-value target whose loss to the enemy will significantly contribute to the success of a friendly course of action. Also called HVT, the loss of high-value targets would be  expected to seriously degrade important enemy functions throughout the friendly commander’s area of interest.   The term has been widely…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here