Category Security & Threat Management

Civil Rights protection on Social Media through Human rights-based AI/Machine Learning

Security is the state of being free from threat. To mitigate the threat, we require technology. The technology uses scientific knowledge in the form of new processes, materials, devices, systems or tools. For all of us, most important is human security…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Internet evolving from Globally conscious entity to consciousness of its own

idea ESSAY med FINAL PYRAMID

In the last 30 years, the internet has become the main interface for publishing, accessing, and sharing information.  Access to the internet can provide an instant connection between any two conscious human minds almost anywhere on the planet. Smartphones and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Tethered Drones or UAS, Hovering platforms, and Towed parafoil system provide long range Communications and Surveillance for Combatting terrorism

5fa21cd9e0d2531a2f1dfdffbab46f70

Militaries have long recognized the  advantages of height for surveillance platforms to overcome the Horizon limitations because of curvature of earth, therefore it has been using many such platforms like baloons, and aerostats. Security forces have also found that countering…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Speech recognition and Speech translation technologies driving AI Chatbots and intelligent agents for global businesses, disaster relief and military operations

e529a8dc22bd84a37f6f8ae6b8ce40d3

Speech Translation is the process by which conversational spoken phrases are instantly translated and spoken aloud in a second language. A speech translation system would typically integrate the following three software technologies: automatic speech recognition (ASR), machine translation (MT) and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Unmanned Aerial vehicle (UAVs) swarms for Early warning of Chemical, Biological, Radiological and Nuclear (CBRN) Threats

CBRN

The threats of chemical, biological, radiological, nuclear and explosive (CBRNE) hazards continue to advance. CBRN weapons are some of the most indiscriminate and deadly weapons in existence today, with capability to affect large population in wide geographical area and in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Urban Warfare and urban terrorism are the greatest future security threat, require new tactics and technologies being developed and tested

d383d2a7f18b38f50f531c6f6759cc5a

Cities have become the new battleground and Hybrid or Urban Warfare the greatest threat being waged by ISIS to Boko Haram to Hamas to Ukraine rebels.  Boko Haram is carrying out its urban terror campaign against the Nigerian Army and its…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA SubT developed tunnel warfare technologies to rapidly map, navigate, and search underground tunnels employed for missile and nuclear arsenal

DARPAsubTC

In recent years, underground settings are becoming increasingly relevant to global security and safety. Factors such as rising populations and urbanization are requiring military and civilian first responders to perform their duties in below-ground conditions, in human-made tunnels, underground urban…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Accurate, realtime Geospatial intelligence (GEOINT) critical for Military and Security operations, experiencing many new technology trends

WhatisGEOINTandWhyisitImportant

Geoint is imagery and information that relates human activity to geography. It typically is collected from satellites and aircraft and can illuminate patterns not easily detectable by other means. GEOINT (GEOspatial INTelligence) is the foundation of intelligence, it is the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Critical communications broadband capabilities

critical communications

Public safety organizations and many other professionals need to communicate when coordinating operations and tasks.  Critical Communication is essential to react and respond effectively and at the core of the functioning of emergency services. Critical communications include mobile, radio telecommunication systems…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Quantum enhanced LIDAR will help reduce environmentally damaging methane leaks from the oil and gas industry

Quantum enhanced LIDAR

In purely economic terms, methane leaks from well-heads and pipelines cost the oil and gas industry between $6bn and $30bn a year. In the US, methane leaks from the natural gas and petroleum industry are now the number one source…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here