Category Security & Threat Management

Facial recognition is advancing to Emotion recognition

emotionrecog

Facial recognition is a category of biometric software that maps an individual’s facial features mathematically and stores the data as a faceprint. The software uses deep learning algorithms to compare a live capture or digital image to the stored faceprint…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rise of Narco-Terrorism require new Contraband detector technologies

Narco-terrorism is a term that explains drug trafficking cartels/organized crime groups which resort to terrorism to achieve their aims. These terrorist organizations engage in drug trafficking activity to fund their operations and gain recruits and expertise. Such organizations include FARC,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Through the wall imaging (TTWS) or Wall-penetrating radar technologies assist security forces in counterterrorism and diaster management operations

throughhewall

Urban Warfare Operations are complicated by a three-dimensional environment, limited fields of view  because of buildings, enhanced concealment and cover for defenders, and the ease of placement of booby traps and snipers.  Unknown individuals hidden from view can slow emergency…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Global air pollution threat requires IoT-based Air quality monitoring solutions

IoTairpollution

Atmospheric conditions continue to deteriorate each year due to the growth of civilization and increasing unclean emissions from industries and automobiles. Although air is an indispensable resource for life, many people are indifferent to the severity of air pollution or…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

USSOCOM Special Operations Forces technology requirements to support counterterrorism, crisis response to high-end conflicts

USSOCOM

Special operations (S.O.) are military, law enforcement or intelligence operations that are “special” or unconventional and carried out by dedicated special forces and other special operations forces units using unconventional methods and resources. Special operations may be performed independently, or…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US Military, the world’s largest polluter is implementing energy security strategy reducing future resource risk and increasing mission assurance

energysecurity

In the domain of defense, energy has the potential to be both an enabler of hard power but also, via denial, arguably itself to be a weapon of war. Energy enables nearly everything the military does, and the primary objective…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US Army’s NGIA integrating multiple domain sensors for situational awareness

Multi domain graphic

The United States Special Operations Command (USSOCOM or SOCOM) is the Unified Combatant Command charged with overseeing the various Special Operations Component Commands of the Army, Marine Corps, Navy, and Air Force of the United States Armed Forces. USSOCOM conducts…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Civil Rights protection on Social Media through Human rights-based AI/Machine Learning

Security is the state of being free from threat. To mitigate the threat, we require technology. The technology uses scientific knowledge in the form of new processes, materials, devices, systems or tools. For all of us, most important is human security…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Internet evolving from Globally conscious entity to consciousness of its own

idea ESSAY med FINAL PYRAMID

In the last 30 years, the internet has become the main interface for publishing, accessing, and sharing information.  Access to the internet can provide an instant connection between any two conscious human minds almost anywhere on the planet. Smartphones and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Tethered Drones or UAS, Hovering platforms, and Towed parafoil system provide long range Communications and Surveillance for Combatting terrorism

5fa21cd9e0d2531a2f1dfdffbab46f70

Militaries have long recognized the  advantages of height for surveillance platforms to overcome the Horizon limitations because of curvature of earth, therefore it has been using many such platforms like baloons, and aerostats. Security forces have also found that countering…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here