Category Security & Threat Management

Nigerian Military’s offensive using latest technology to push Boko Haram back out of most territory, UN asks to address ‘Roots of conflict’

nigerean

The claims by Nigeria’s government that terrorist group Boko Haram has been “defeated” continue to ring hollow. An attack by the terrorist group on an army base  in Nov 2018 led to as many as 100 soldiers being killed, Reuters…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Military ATAK situational awareness tool serving Fire Fighters, law enforcement, and first-responder communities.

Atak

When Hurricane Harvey hit Texas, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) deployed the Android Team Awareness Kit (ATAK) to support the complex communication and coordination needs of the multi-jurisdictional responders. Most of the operators provided…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries developing bomb disposal robots having exceptional level of versatility, dexterity and diversity

bombdisposalrobot

EOD operators or ammunition technical officers conduct some of the military’s most dangerous jobs, who has the daunting task of dismantling, defusing and disposing bombs and other explosive ordnance, often in the most hostile and challenging of environments. Making this job…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Synthetic Identity Fraud is one the fastest-growing forms of identity theft used by fraudsters and terrorists

syntheic fraud

Synthetic identity theft is a type of fraud in which a criminal combines real and fake information to create a new identity, which is used to open fraudulent accounts and make fraudulent purchases. Fraudsters use this fictitious identity for obtaining…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New technology to fight human and drug smuggling across maritime borders

drug 1

One of the threat of maritime security is human and drug smuggling across maritime borders. This is particularly important because terrorists may use similar pathways to sneak illegal weapons through the border or to deliver a dirty bomb to seaports.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

UAVs are proving to be disruptive technology for disaster planning, response and relief operations

UK CHINA DRONES

A disaster can be defined as any tragic event stemming from events such as earthquakes, floods, accidents, fires, or explosions. It is a phenomenon that can cause damage to life and property and destroy the economic, social or cultural life…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Wireless and Emergency Communication Tech for Disasters: New Technologies Address Obstacles

SJ EmergencySat 3 in 1FirstNet web

The occurrence of a large natural or man-made disaster is often combined with the destruction of the local infrastructures on the ground. For example, the earthquake in Wenchuan in May, 2008 did not only has a huge destructive power, but…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Telecoms are suffering more attacks than any other sector, Telcos Managing cyber security risks

Top Ten Tech Media Telecom Risks

Telecoms companies, their core infrastructure and the large volumes of personal data they hold on subscribers, all represent an attractive target for malicious actors. Telecoms have suffered more attacks than any other surveyed. Telecoms organisations admitted to having faced four…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries implementing Satellite Based Augmentation Systems (SBAS) to reduce aviation accidents

SBAS

Controlled Flight into Terrain (CFIT) is the #2 leading cause of General Aviation fatal accidents involving the loss of life. There have been over 9,000 deaths due to CFIT since the introduction of commercial jets.  Between 2000 and 2009 approximately…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

High profile Events have become preferred targets for Terrorists, comprehensive security demand proper security measures and new technologies

JacksonvilleFloridaEventSecurity

On 22 May 2017 a suicide bomber detonated an improvised explosive device, packed with nuts and bolts to act as shrapnel, in the foyer area of the Manchester Arena. The Manchester Arena bombing was an Islamist terror attack in Manchester,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here