Category Security & Threat Management

Ion beam accelerator for nuclear device characterization, detection of contraband materials, and Directed energy weapons

Ionbeamaccelerator

Ion beam accelerators are machines providing kinetic energy to charged particles called ions, which bombard the target sample – the material to be irradiated and subsequently analyzed. The target can be a thin foil or a piece of mineral, rubber,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA ‘s PROTEUS urban combat software allows Marine commanders to explore and develop new multidomain fighting concepts

Cities have become the new battleground and Hybrid or Urban Warfare the greatest threat being waged by ISIS to Boko Haram to Hamas to Ukraine rebels.  Urban warfare is fundamentally unchanged since World War I in many regards: battle is…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Growing threat of Cryptocurrency in terrorism for terror financing

crypto terrorism 780x470 1

Modern terrorist attacks display increasingly sophisticated ICT skills in both conducting their attacks and communicating them globally through digital technologies, combined with, in some cases, an awareness of counter-intelligence measures, largely enabled by Web 2.0. The Paris attackers displayed the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Modernization of military intelligence spying and espionage

military intelligence

Intelligence, in military science, information concerning an enemy or an area. The term is also used for an agency that gathers such information. Military intelligence is as old as warfare itself. Even in biblical times, Moses sent spies to live with…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Media Manipulation strategies and techniques

mediamanipulation

Media manipulation is a series of related techniques in which partisans create an image or argument that favours their particular interests. Such tactics may include the use of logical fallacies, psychological manipulations, outright deception (disinformation), rhetorical and propaganda techniques, and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Security forces require throwable robots that can send video of inside buildings

Bounce Imaging MAY18HP 1

Cities have become the new battleground and Hybrid or Urban Warfare the greatest threat being waged by ISIS to Boko Haram to Hamas to Ukraine rebels.  The terrorists resort to Asymmetric Warfare exploiting the limitations and vulnerabilities of high-tech weapons…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Pollution control strategies and technologies to fight growing menace of pollution deaths

eb9f08edcd19a73e7b2e7191ffc64bef

Atmospheric pollution is a growing problem, particularly in urban areas and in less developed countries.  With half the world has no access to clean fuels or technologies (e.g. stoves, lamps), the very air we breathe is growing dangerously polluted. More…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA SIGMA+ using advanced intelligence analytics to detect chemical, biological, and explosives threats

SIGMA plus 619 316

Since the invention of nuclear power, there have been numerous “accidents.” From Three Mile Island and Chernobyl to the more recent problems in Fukushima, it would seem nuclear power is not fully under our control. Recently  a Chinese scientist  has…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Crime reduction, prevention and response is being bolstered though 5G, data analytics and AI tools

predictive policing how emerging technologies are helping prevent crimes 2 638

Criminal activity continues to be a major concern in modern civilisations, with most nations facing unacceptable levels of crime and delinquency. The results show that African and Latin American countries suffer from the highest levels of various types of crime across…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Chemical/Biological Threat to Air Transportation

aircraftcbrn 1

Historically, most terrorist attacks on civilian targets have involved the use of firearms or explosives, and current defensive strategies are aimed at preventing attacks perpetrated by such means. However, the use of the nerve agent sarin in 1995 to attack…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here