Category Strategy, Policy & Governance

Smart home devices have many security risks and threats to be exploited by hackers and Intelligence agencies for mass surveillance

IoTsurveiilance

The rise of the digital era has brought with it many wondrous changes to our daily lives, not least of which the fact that we now carry digital assistants with us everywhere we go in the form of smartphones, tablets,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Driverless cars vulnerable to hacking and could be used to carry out suicide attacks, Researchers developing new security solutions

Car Bomb

Automotive industry is currently undergoing an electrification process. In a few years, every new vehicle sold will have some degree of autonomy built in. Carmakers from Google to Apple, Tesla to Volkswagen are trying to make drivers obsolete, handing control of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Wireless Power Transfer(WPT) set to complete the transition to Wireless life for Consumers and Military, Countries trialling WPT for electric vehicles

4b9f9da50cf2f358abdcd4a4321104f9

Electronics has revolutionized our society by providing many devices e.g. laptops, palm pilots, digital cameras, household robots, etc. Every electronic system or device needs electric power to operate, whether it is from  walled AC supply or a battery. This electric…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Corona virus or COVID-19 widely impacted World’s economy, geopolitics, military to technology and industry

coronavirusworldmap fordigest march31

More than 248 million people have been reported to be infected by the novel coronavirus globally and 5 million have died, according to a Reuters tally.   From herpes and legionnaires’ disease in the 1970s, to AIDS, Ebola, the severe…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Rising importance of Non- Acoustic detection technologies of Stealthy submarines in Anti Submarine Warfare

ssbn secure 1

Ship detection for offshore production operations, military activities, transportation and other marine applications is very important. Submarine is one of the most important weapon in modern wars. strategic submarines seem to be key to strategic stability, providing what is generally believed…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Indian Ocean maritime security threats and Indian Navy’s Maritime Domain Awareness (MDA) technology requirements and solutions

international armour co 36 638

Indian Ocean has always been vulnerable to criminals and anti-national activities. The Indian Ocean is an area of conflict. According to a recent analysis of global conflicts by the Heidelberg Institute for International Conflict Research, altogether 42% of world conflicts can…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

The denial of GPS services during Kargil War has driven ISRO to develop Indian Regional Navigation Satellite System (IRNSS), superior to GPS

IRNSS Indian regional navigation satellite system 1

The Global Positioning System (GPS), is a global navigation satellite system (GNSS) that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US Army developing Manned-Unmanned Teaming ( MUM-T ) technologies in multiple domains for operation in A2/AD environments

mannedunmannedteam scaled

US military is facing increasingly Anti-access /Area denial environment, a set of overlapping military capabilities and operations designed to slow the deployment of U.S. forces to a region, reduce the tempo of those forces once there, and deny the freedom…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

US Army’s Network strategy for Army Network Modernization includes Dynamic Transport, Computing and Networked Edge capability

Purpose chart of US Army Transformation

In 2016, The Army’s chief information officer announced the release of the Army’s new, long-term, network strategy called “Shaping the Army Network (2025-2040).” The document discusses the projected operational environment and required capabilities to set the context for what the…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Passive and active multistatic radars capable of detecting stealth fighters and guiding missiles to destroy them

56dab2b3675237b0ba79395c67ee9ae4

Stealth technology has proven to be one of the effective approaches to enhance the survivability of Aircrafts. Aircraft/helicopter designers are making them stealthier by reducing their signatures; viz. visual, aural, infrared (IR), and RADAR cross section. Advancements in stealth technologies,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here