Category Security & Threat Management

Telecoms are suffering more attacks than any other sector, Telcos Managing cyber security risks

Top Ten Tech Media Telecom Risks

Telecoms companies, their core infrastructure and the large volumes of personal data they hold on subscribers, all represent an attractive target for malicious actors. Telecoms have suffered more attacks than any other surveyed. Telecoms organisations admitted to having faced four…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Countries implementing Satellite Based Augmentation Systems (SBAS) to reduce aviation accidents

SBAS

Controlled Flight into Terrain (CFIT) is the #2 leading cause of General Aviation fatal accidents involving the loss of life. There have been over 9,000 deaths due to CFIT since the introduction of commercial jets.  Between 2000 and 2009 approximately…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

High profile Events have become preferred targets for Terrorists, comprehensive security demand proper security measures and new technologies

JacksonvilleFloridaEventSecurity

On 22 May 2017 a suicide bomber detonated an improvised explosive device, packed with nuts and bolts to act as shrapnel, in the foyer area of the Manchester Arena. The Manchester Arena bombing was an Islamist terror attack in Manchester,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Vehicular Terrorism or ramming attacks require new technologies including directed energy weapons

trucks

Recently in Toronto a rental van was deliberately driven into a crowd of people, killing 10 and injuring 14. Police arrested and charged 25-year-old Alek Minassian in connection with the attack. Though this attack was later found to be caused by…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s COMPASS developing artificial intelligence based decision making software to help commanders in Hybrid Warfare

DARPA COMPAS

Hybrid Warfare (HW) is a military strategy that blends conventional warfare, irregular warfare, cyber warfare and subversion, and blurs the formal distinction between war and peace. It is often characterised by the use of fictitious propaganda, deniable forces, espionage, the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Smart guns and other technologies need urgent commercialization to avoid blood of innocent children

8e5f062e9750688c028aaa3058da9ec4

In Feb 2018, a horrific school shooting in Parkland, Florida, that killed 17 people . Nikolas Cruz, 19, told police he was responsible for the shooting and added that he hid extra ammunition in his backpack and shot students in the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Challenges in humanitarian aid and disaster relief (HADR) missions and Operations and Technology requirements

HADR

International reinsurer Munich RE has projected that worldwide losses due to 2017’s string of natural disasters will reach $330 billion, with only $135 billion of those costs insured. Hurricanes Harvey, Irma and Maria alone, which left behind $215 billion in damages,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA MAA program aims to predict the terrorist threat of using weapons of mass terror (WMTs) through modeling and computational methods

DARPAMAA

DARPA launched the program Modeling Adversarial Activity (MAA) program with a goal  to develop mathematical and computational techniques for modeling adversarial activity for the purpose of producing high-confidence indications and warnings of efforts to acquire, fabricate, proliferate, and/or deploy weapons…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Global Maritime Security Risks and Global Marine Technology Trends 2030

фото worldmaritimenews

Recent years have seen multiple new security challenges emerge in the maritime arena. Navies, coast guards and other maritime security agencies face a proliferation of security challenges. These include: illegal fishing of territorial waters; incursion of mineral exploitation across legal…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Police use stingray, a secretive phone surveillance technology to solve crimes or foil a terror attack

xzen1 so 4

Smartphones carried by most people depend on cell site or cell tower for their operation.  A cell site or cell tower is a cellular telephone site where antennae and electronic communications equipment are placed — typically on a radio mast,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here