Category Security & Threat Management

Modernization of military intelligence spying and espionage

military intelligence

Intelligence, in military science, information concerning an enemy or an area. The term is also used for an agency that gathers such information. Military intelligence is as old as warfare itself. Even in biblical times, Moses sent spies to live with…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Media Manipulation strategies and techniques

mediamanipulation

Media manipulation is a series of related techniques in which partisans create an image or argument that favours their particular interests. Such tactics may include the use of logical fallacies, psychological manipulations, outright deception (disinformation), rhetorical and propaganda techniques, and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Security forces require throwable robots that can send video of inside buildings

Bounce Imaging MAY18HP 1

Cities have become the new battleground and Hybrid or Urban Warfare the greatest threat being waged by ISIS to Boko Haram to Hamas to Ukraine rebels.  The terrorists resort to Asymmetric Warfare exploiting the limitations and vulnerabilities of high-tech weapons…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Pollution control strategies and technologies to fight growing menace of pollution deaths

eb9f08edcd19a73e7b2e7191ffc64bef

Atmospheric pollution is a growing problem, particularly in urban areas and in less developed countries.  With half the world has no access to clean fuels or technologies (e.g. stoves, lamps), the very air we breathe is growing dangerously polluted. More…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA SIGMA+ using advanced intelligence analytics to detect chemical, biological, and explosives threats

SIGMA plus 619 316

Since the invention of nuclear power, there have been numerous “accidents.” From Three Mile Island and Chernobyl to the more recent problems in Fukushima, it would seem nuclear power is not fully under our control. Recently  a Chinese scientist  has…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Crime reduction, prevention and response is being bolstered though 5G, data analytics and AI tools

predictive policing how emerging technologies are helping prevent crimes 2 638

Criminal activity continues to be a major concern in modern civilisations, with most nations facing unacceptable levels of crime and delinquency. The results show that African and Latin American countries suffer from the highest levels of various types of crime across…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Chemical/Biological Threat to Air Transportation

aircraftcbrn 1

Historically, most terrorist attacks on civilian targets have involved the use of firearms or explosives, and current defensive strategies are aimed at preventing attacks perpetrated by such means. However, the use of the nerve agent sarin in 1995 to attack…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA MICE will quantify how authoritarian regimes control information

censorship

Authoritarianism is a form of government characterized by the rejection of political plurality, the use of strong central power to preserve the political status quo, and reductions in the rule of law, separation of powers, and democratic voting. Authoritarian states…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

CMOS image sensor (CIS) advancements enabling big growth in Smartphone camera, machine vision, medical imaging and security applications

yolecameras750

Innovations in CMOS image sensor (CIS) technology continue to enhance digital imaging landscape. While the demand has been driven by smartphone makers, leveraging enhanced photo-taking capabilities to differentiate their devices from the competition, there is also a growing market for…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Autonomous and Unmanned Ground Vehicle (UGV) for Security

AGV

National security has been described as the ability of a state to cater to the protection and defence of its citizenry. It includes Human security which means freedom from pervasive threats to people’s rights, safety, and lives. Homeland security means…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here