Category Security & Threat Management

Next Robot revolution is achieving Human-Like dexterous manipulation for home, Industry and Security

desterousrobot

Robots have already become an indispensable part of our lives. However currently, most robots are relatively rigid machines which make unnatural movements. In contrast, humans seem to be able to manipulate objects with our fingers with incredible ease like sifting…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Active and Passive Millimeter Wave imaging systems employed for security screening at the airports and finding landmines

millimeter waves collage

Electromagnetic waves in the millimeter-wave band  (with frequencies between 30 and 300 GHz, or wavelengths between 10 and 1.0 mm) have attractive characteristics. One of their features is the wider usable frequency band compared with waves in the microwave band or lower bands.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Militaries employ ‘The mother of all bombs’ or MOABs for wiping out fortified ground targets and creating ‘shock and awe’

MOAB

The US’s  GBU-43/B Massive Ordnance Air Blast (MOAB) is a precision-guided munition weighing 21,500 pounds and was dropped from a C-130 Hercules aircraft. The MOAB isn’t the heaviest non-nuclear bomb in the US arsenal (that’s the 30,000-pound Massive Ordinance Penetrator…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Nigerian Military’s offensive using latest technology to push Boko Haram back out of most territory, UN asks to address ‘Roots of conflict’

nigerean

The claims by Nigeria’s government that terrorist group Boko Haram has been “defeated” continue to ring hollow. An attack by the terrorist group on an army base  in Nov 2018 led to as many as 100 soldiers being killed, Reuters…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Military ATAK situational awareness tool serving Fire Fighters, law enforcement, and first-responder communities.

Atak

When Hurricane Harvey hit Texas, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) deployed the Android Team Awareness Kit (ATAK) to support the complex communication and coordination needs of the multi-jurisdictional responders. Most of the operators provided…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries developing bomb disposal robots having exceptional level of versatility, dexterity and diversity

bombdisposalrobot

EOD operators or ammunition technical officers conduct some of the military’s most dangerous jobs, who has the daunting task of dismantling, defusing and disposing bombs and other explosive ordnance, often in the most hostile and challenging of environments. Making this job…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Synthetic Identity Fraud is one the fastest-growing forms of identity theft used by fraudsters and terrorists

syntheic fraud

Synthetic identity theft is a type of fraud in which a criminal combines real and fake information to create a new identity, which is used to open fraudulent accounts and make fraudulent purchases. Fraudsters use this fictitious identity for obtaining…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New technology to fight human and drug smuggling across maritime borders

drug 1

One of the threat of maritime security is human and drug smuggling across maritime borders. This is particularly important because terrorists may use similar pathways to sneak illegal weapons through the border or to deliver a dirty bomb to seaports.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

UAVs are proving to be disruptive technology for disaster planning, response and relief operations

UK CHINA DRONES

A disaster can be defined as any tragic event stemming from events such as earthquakes, floods, accidents, fires, or explosions. It is a phenomenon that can cause damage to life and property and destroy the economic, social or cultural life…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Wireless and Emergency Communication Tech for Disasters: New Technologies Address Obstacles

SJ EmergencySat 3 in 1FirstNet web

The occurrence of a large natural or man-made disaster is often combined with the destruction of the local infrastructures on the ground. For example, the earthquake in Wenchuan in May, 2008 did not only has a huge destructive power, but…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here