Category Security & Threat Management

Vehicular Terrorism or ramming attacks require new technologies including directed energy weapons

trucks

Recently in Toronto a rental van was deliberately driven into a crowd of people, killing 10 and injuring 14. Police arrested and charged 25-year-old Alek Minassian in connection with the attack. Though this attack was later found to be caused by…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s COMPASS developing artificial intelligence based decision making software to help commanders in Hybrid Warfare

DARPA COMPAS

Hybrid Warfare (HW) is a military strategy that blends conventional warfare, irregular warfare, cyber warfare and subversion, and blurs the formal distinction between war and peace. It is often characterised by the use of fictitious propaganda, deniable forces, espionage, the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Smart guns and other technologies need urgent commercialization to avoid blood of innocent children

8e5f062e9750688c028aaa3058da9ec4

In Feb 2018, a horrific school shooting in Parkland, Florida, that killed 17 people . Nikolas Cruz, 19, told police he was responsible for the shooting and added that he hid extra ammunition in his backpack and shot students in the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Challenges in humanitarian aid and disaster relief (HADR) missions and Operations and Technology requirements

HADR

International reinsurer Munich RE has projected that worldwide losses due to 2017’s string of natural disasters will reach $330 billion, with only $135 billion of those costs insured. Hurricanes Harvey, Irma and Maria alone, which left behind $215 billion in damages,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA MAA program aims to predict the terrorist threat of using weapons of mass terror (WMTs) through modeling and computational methods

DARPAMAA

DARPA launched the program Modeling Adversarial Activity (MAA) program with a goal  to develop mathematical and computational techniques for modeling adversarial activity for the purpose of producing high-confidence indications and warnings of efforts to acquire, fabricate, proliferate, and/or deploy weapons…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Global Maritime Security Risks and Global Marine Technology Trends 2030

фото worldmaritimenews

Recent years have seen multiple new security challenges emerge in the maritime arena. Navies, coast guards and other maritime security agencies face a proliferation of security challenges. These include: illegal fishing of territorial waters; incursion of mineral exploitation across legal…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Police use stingray, a secretive phone surveillance technology to solve crimes or foil a terror attack

xzen1 so 4

Smartphones carried by most people depend on cell site or cell tower for their operation.  A cell site or cell tower is a cellular telephone site where antennae and electronic communications equipment are placed — typically on a radio mast,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

New Precision Guided Missiles and Munitions for Urban Warfare and in A2/AD Environment

LGB

Cities have become the new battleground and Hybrid or Urban Warfare the greatest threat being waged by ISIS to Boko Haram to Hamas to  Ukraine rebels.Urban warfare is the only way the Islamic State of Iraq and Greater Syria will…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cambridge Pixel’s multi-sensor surveillance system is useful for naval, air traffic control,commercial shipping, security, surveillance and airborne radar applications.

Cambridge Pixel Secure X SecureXI

Countering the growing threat posed by terrorists, smugglers, pirates, and political activists at military air and naval bases, airports, and ports requires sophisticated multisensor surveillance systems to ensure that incursions are rapidly detected and actioned.   Cambridge Pixel , a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US Navy asks for new technologies for confronting Irregular and Expeditionary Warfare Challenges

U.S. Navy surface warfare experts are reaching out to industry for identification of technologies that enhance and/or accelerate military capabilities which directly address irregular, expeditionary, and Naval Special Warfare (NSW) capability challenges by meeting operational needs.   The Navy’s primary…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here