Category Global Risks & Future Threats

Countries advance Border management Strategy and technology to counter terrorists, and criminals, smuggling weapons, and illegal drugs, and counterfeit goods

Borderthreat

In an increasingly globalised and interconnected world it has become simple for people and goods to cross borders and so for terrorists. America’s borders and ports are busy places, with tens of millions of cargo containers and hundreds of millions…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Threat of Radiological warfare, Radiological weapons and Dirty Bombs

RadiologicalWeaponsThemainradiologicalweaponisthe‘DirtyBomb’

The threats of chemical, biological, radiological, nuclear and explosive (CBRNE) hazards continue to advance. CBRN weapons are some of the most indiscriminate and deadly weapons in existence today, with capability to affect large population in wide geographical area and in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

As melting ice bringing Arctic into geostrategic prominence, Russia quickly establishes its military dominance over it

russia just put the finishing touches on 6 arctic military bases

The Arctic is currently a staggering 36 degrees warmer than normal at this time of year, according to information from the Danish Meteorological Institute. NASA report also shows that a vast region in the Arctic Ocean has gone missing and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rising CBRN threats require Decontamination solutions and Technologies for soldiers, military equipment and vehicles

CBRNdecontamination scaled

According to the University of Maryland’s Global Terrorism Database, there were a total of 143 attacks – 35 biological, 95 chemical, and 13 radiological – using CBRN weapons across the world from 1970 to 2014. The relative ease with which…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Threat of Nuclear Waste require new storage, reprocessing and mitigation technologies

nuclearwaste

Nuclear power—with its high energy density and low carbon footprint—is a source with which the international community has decades of experience. However, the challenges that come along with the technology have kept it from becoming a more dominant factor in…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Nuclear Risk has increased because of Emerging technologies

NC3

Although nuclear weapons have not been used in conflict for decades, the risk of their use persists. Around the world, countries are still building and modernizing nuclear arsenals. Russia,  US and China are  rapidly upgrading and modernizing their strategic triad.…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Indian Threat Scenario, National security threats and future military capability requirements

multidomainmilitary

There are two approaches to connect Warfighting and emerging technologies. One is to consider the present and future threat environment and then through system analysis we can identify technologies required to mitigate those threats. Secondly, we can identify the emerging…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Remerging threat of Biological Weapons attack against Agricultural Targets and Agrobioterrorism, with advances in Gene editing, synthetic biology, and improved delivery systems

agriculturewarfare

Food and agriculture are key elements of the critical infrastructure of every country because they provide products that are essential for life. The United States is a country with a highly developed agricultural sector. Food and agriculture constitute a sixth…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Smart home devices have many security risks and threats to be exploited by hackers and Intelligence agencies for mass surveillance

IoTsurveiilance

The rise of the digital era has brought with it many wondrous changes to our daily lives, not least of which the fact that we now carry digital assistants with us everywhere we go in the form of smartphones, tablets,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Driverless cars vulnerable to hacking and could be used to carry out suicide attacks, Researchers developing new security solutions

Car Bomb

Automotive industry is currently undergoing an electrification process. In a few years, every new vehicle sold will have some degree of autonomy built in. Carmakers from Google to Apple, Tesla to Volkswagen are trying to make drivers obsolete, handing control of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here