Category Security & Threat Management

Defence and Security require advanced authentication techniques including high speed, and accurate biometric identification

militarybometrics 1

As attack vectors increase with the burgeoning of the Internet of Things (IoT), the Defense sector is exposed to different risks that require increasingly advanced authentication techniques. Today’s threat players are using more sophisticated social engineering tactics, credential-stuffing botnets, and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Requirement of New military technology for aircrews in Helicopters and small aircraft to detect and avoid thin artificial objects such as power lines

Helicoptorradar

Helicopters and small aircraft flying at low altitude in the visual flight rules often strike against obstacles. According to the aircraft accident reports in Japan, many collisions by small aircraft were caused by long, thin artificial objects as power lines…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New counter-terrorism training technologies prepare security forces for every possible terror scenario

counterterrorismtraining

Today’s terrorist landscape is more fluid and complex than ever and the threat landscape is less predictable. The United States and our allies face an increasingly complex terrorist landscape, populated by a diverse array of actors employing new technologies and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New Radiation detecting sensors and systems being developed for threat of dirty bomb attack and Nuclear accidents

dirtybomb

There is also  growing concern that the widespread availability of radiological materials may result in a dirty bomb attack. Recently a secret group of fewer than 10 people in undercover congressional operation was easily able to buy the raw ingredients for a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Attacking ISIS by Cyber warfare and dropping cyber bombs was new strategy implemented by US, UK & Australia

cyber attackISIS

United States opened a new line of combat against the Islamic State, directing the military’s eight-year-old Cyber Command for the first time to mount computer-network attacks that are now being used alongside more traditional weapons. In 2009, US established, USCYBERCOM for…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber criminals favouring stealthier attacks like Cryptojacking to make free money

Enisa cryptojacking

Cyber criminals are switching away from ransomware to stealthier attacks as the main sources of generating revenue, according to analysis by British artificial intelligence (AI)-based cyber security firm Darktrace. Cryptojacking is the unauthorized use of someone else’s computer to mine…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA SHRIMP developed microrobots for search and rescue, disaster relief, infrastructure inspection, and equipment maintenance

SHRIMP

Imagine a natural disaster scenario, such as an earthquake, that inflicts widespread damage to buildings and structures, critical utilities and infrastructure, and threatens human safety. Having the ability to navigate the rubble and enter highly unstable areas could prove invaluable…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Next Robot revolution is achieving Human-Like dexterous manipulation for home, Industry and Security

desterousrobot

Robots have already become an indispensable part of our lives. However currently, most robots are relatively rigid machines which make unnatural movements. In contrast, humans seem to be able to manipulate objects with our fingers with incredible ease like sifting…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Active and Passive Millimeter Wave imaging systems employed for security screening at the airports and finding landmines

millimeter waves collage

Electromagnetic waves in the millimeter-wave band  (with frequencies between 30 and 300 GHz, or wavelengths between 10 and 1.0 mm) have attractive characteristics. One of their features is the wider usable frequency band compared with waves in the microwave band or lower bands.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Militaries employ ‘The mother of all bombs’ or MOABs for wiping out fortified ground targets and creating ‘shock and awe’

MOAB

The US’s  GBU-43/B Massive Ordnance Air Blast (MOAB) is a precision-guided munition weighing 21,500 pounds and was dropped from a C-130 Hercules aircraft. The MOAB isn’t the heaviest non-nuclear bomb in the US arsenal (that’s the 30,000-pound Massive Ordinance Penetrator…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here