Category Security & Threat Management

Border Agents can fight the Threat of Drug trafficking networks by portable Drug Detection Devices that can identify drugs within seconds

Drug Detection Devices

Criminal networks traffic a range of drugs including cannabis, cocaine, heroin and methamphetamine.  As international borders become increasingly porous, global abuse and accessibility to drugs have become increasingly widespread.   This international trade involves growers, producers, couriers, suppliers and dealers.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries demand new security features in Bank notes to stay ahead of currency counterfeiters

Counterfeit Money

Counterfeit money is imitation currency produced without the legal sanction of the state or government usually in a deliberate attempt to imitate that currency and so as to deceive its recipient. Producing or using counterfeit money is a form of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

ISIS still a threat to the US and the World capable of wreaking havoc and bloodshed

ISIS Threat New Years

In spite of repeated assertions by Trump of his administration’s success in defeating the terrorist organization and destroying its so-called caliphate in Iraq and Syria, experts still think that ISIS remains a threat. While ISIS’s so-called “caliphate” has been destroyed,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Defence and Security require advanced authentication techniques including high speed, and accurate biometric identification

militarybometrics 1

As attack vectors increase with the burgeoning of the Internet of Things (IoT), the Defense sector is exposed to different risks that require increasingly advanced authentication techniques. Today’s threat players are using more sophisticated social engineering tactics, credential-stuffing botnets, and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Requirement of New military technology for aircrews in Helicopters and small aircraft to detect and avoid thin artificial objects such as power lines

Helicoptorradar

Helicopters and small aircraft flying at low altitude in the visual flight rules often strike against obstacles. According to the aircraft accident reports in Japan, many collisions by small aircraft were caused by long, thin artificial objects as power lines…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New counter-terrorism training technologies prepare security forces for every possible terror scenario

counterterrorismtraining

Today’s terrorist landscape is more fluid and complex than ever and the threat landscape is less predictable. The United States and our allies face an increasingly complex terrorist landscape, populated by a diverse array of actors employing new technologies and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New Radiation detecting sensors and systems being developed for threat of dirty bomb attack and Nuclear accidents

dirtybomb

There is also  growing concern that the widespread availability of radiological materials may result in a dirty bomb attack. Recently a secret group of fewer than 10 people in undercover congressional operation was easily able to buy the raw ingredients for a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Attacking ISIS by Cyber warfare and dropping cyber bombs was new strategy implemented by US, UK & Australia

cyber attackISIS

United States opened a new line of combat against the Islamic State, directing the military’s eight-year-old Cyber Command for the first time to mount computer-network attacks that are now being used alongside more traditional weapons. In 2009, US established, USCYBERCOM for…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber criminals favouring stealthier attacks like Cryptojacking to make free money

Enisa cryptojacking

Cyber criminals are switching away from ransomware to stealthier attacks as the main sources of generating revenue, according to analysis by British artificial intelligence (AI)-based cyber security firm Darktrace. Cryptojacking is the unauthorized use of someone else’s computer to mine…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA SHRIMP developed microrobots for search and rescue, disaster relief, infrastructure inspection, and equipment maintenance

SHRIMP

Imagine a natural disaster scenario, such as an earthquake, that inflicts widespread damage to buildings and structures, critical utilities and infrastructure, and threatens human safety. Having the ability to navigate the rubble and enter highly unstable areas could prove invaluable…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here