Category Security & Threat Management

DARPA MICE will quantify how authoritarian regimes control information

censorship

Authoritarianism is a form of government characterized by the rejection of political plurality, the use of strong central power to preserve the political status quo, and reductions in the rule of law, separation of powers, and democratic voting. Authoritarian states…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

CMOS image sensor (CIS) advancements enabling big growth in Smartphone camera, machine vision, medical imaging and security applications

yolecameras750

Innovations in CMOS image sensor (CIS) technology continue to enhance digital imaging landscape. While the demand has been driven by smartphone makers, leveraging enhanced photo-taking capabilities to differentiate their devices from the competition, there is also a growing market for…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Autonomous and Unmanned Ground Vehicle (UGV) for Security

AGV

National security has been described as the ability of a state to cater to the protection and defence of its citizenry. It includes Human security which means freedom from pervasive threats to people’s rights, safety, and lives. Homeland security means…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Targeted Violence and Terrorism Prevention Through Health and Well-Being

DHSvolnence

Since the start of the Covid pandemic,  as early research has indicated, the impact of social isolation and other life stressors on mental health has led to an increase in depression and anxiety. This can result in declines in social…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Geopolitics now encompasses military, economic, technological, to Industry domains

Top Risks 2021 collage 1200x630 1

The words geopolitical, strategic, and geostrategic are used to convey the following meanings: geopolitical reflects the combination of geographic and political factors determining the condition of a state or region, and emphasizing the impact of geography on politics; strategic refers…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Human Security and Science & Technology

humansecurity

For many people, today’s world is an insecure place, full of threats on many fronts. Protracted crises, violent conflicts, natural disasters, persistent poverty, epidemics and economic downturns impose hardships and undercut prospects for peace, stability, and sustainable development. Such crises…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Air purifiers from HEPA to Photocatalytic oxidation (PCO) have become essential in homes and for military

Suspended Particles

To stay healthy, we need to pay not only close attention to what is in the food we eat and the water we drink but also the quality of the air we breathe. The air we breathe both indoors and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Growing collision risk to commercial shipping and unmanned surface vehicle (USV) , call for new technologies to improve Safe Navigation

collision oil spill

The seas are becoming increasingly congested, with the IFT Transport Outlook 2019 predicting that demand for maritime trade could triple within the next 30 years. A large number of ships raises the chances of the collision.  Although the number of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Ground-penetrating radar for Autonomous driving, to detection of Tunnel, landmine and buried IEDs

Ground Penetrating Radar

Radar is an electromagnetic sensor used for detecting, locating, tracking, and recognizing objects of various kinds at considerable distances. It operates by transmitting electromagnetic energy toward objects, commonly referred to as targets, and observing the echoes returned from them.  Energy is…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber threats to critical Infrastructure (CII) require Effective Cyber Incident Response plan at National level

incident response planning

Networked technologies touch every corner of the globe and every facet of human life. They have driven innovation, nurtured freedoms, and spurred economic prosperity. Even so, the very technologies that enable these benefits offer new opportunities for malicious and unwanted…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here