Hypersonic missiles

This POSTnote looks at hypersonic missile technologies, efforts to develop them, potential applications, and the possible challenges they may present for missile defence and global stability.

Hypersonic missiles
  • POSTnote

    States’ use of cyber operations

    States are increasingly engaging in cyber operations to support their strategic aims. This POSTnote considers hostile state-backed cyber activities against the UK. It looks at how and why states use cyber operations against other nations and the threats these pose to the UK. It also considers mitigation measures, both internationally and in the UK.

  • POSTnote

    Smart Cities

    "Smart cities" describes places that incorporate a range of technologies (especially those that collect and use data) to address economic, social, and environmental challenges. Projects usually take place in urban areas, but are also deployed in rural settings. This POSTnote looks at smart city innovation in the UK and the technologies involved. It considers the factors driving the adoption of smart city technologies, and the potential benefits, barriers and risks associated with their implementation.

  • POSTnote

    Energy sector digitalisation

    The incorporation of digital technologies in the energy sector can support progress towards key UK objectives such as achieving Net Zero emissions targets. It can also transform current methods of energy generation, transmission, regulation, and trading. This POSTnote presents an overview of key digital technologies and their main applications in the energy sector. It provides an overview of the potential benefits to using these technologies, and recent developments in this area. It describes the role of data in underpinning digital technologies in the sector, and some of the issues raised by its use. It also discusses broader challenges associated with energy sector digitalisation and measures that could help address them, including issues related to technology, regulation, and impact on consumers.

  • POSTnote

    Defence of space-based assets

    Space-based assets (satellites and the terrestrial ground stations that communicate with them) provide critical support to military and civilian operations. They are vulnerable to unintentional damage and disruption, and to deliberate attack. This POSTnote outlines how the UK uses and accesses satellites, potential risks to satellites, and approaches to mitigation.

  • Rapid response

    Manufacturing COVID-19 vaccines

    The rapid production of safe, effective and consistent vaccines is essential for supporting COVID-19 immunisation programmes in the UK and globally. However, manufacturing vaccines is challenging for various reasons that include the complex processes involved, the specialist knowledge and experience required, and the natural variability of the biological materials and systems used. Urgent demand is leading to manufacturers and governments taking on significant financial risks in order to speed up production. What is the UK Government doing to accelerate vaccine manufacture? How are vaccines made? Why is manufacturing vaccines at large scales so challenging?

  • POSTnote

    Brain-computer interfaces

    Brain-Computer Interfaces (BCIs) measure brain activity and can be used to control digital devices. The focus of BCI development has been on using the technology to allow patients to control assistive equipment such as wheelchairs or prostheses. Beyond medicine they are under development for applications in entertainment, marketing and defence. This POSTnote looks at the underpinning technology, its applications and the associated ethical and regulatory challenges.

  • POSTnote

    Misuse of civilian drones

    Drones (also known as unmanned aircraft) are flying systems that do not carry a pilot. As the technology has become cheaper and more sophisticated, the use of drones for recreational and commercial purposes has grown, with the Civil Aviation Authority (CAA) reporting a significant increase in the number of permissions obtained for operating commercial drones in the UK. Despite their potential to reduce costs, improve efficiency and provide new services, drones may be misused accidentally or for malicious purposes. For example, reports of drone sightings at Gatwick Airport in December 2018 grounded around 1,000 flights for almost 36 hours, affecting more than 140,000 passengers. In 2018, the Government introduced new limits on where drones can be flown and new registration and education requirements for drone operators and pilots. In January 2020, the new Government introduced an Air Traffic Management and Unmanned Aircraft Bill to Parliament that included new police powers for enforcing aviation laws (such as the power to issue a fixed penalty notice for certain drone offences). This POSTnote looks at civilian drones and their applications, focusing on potential misuse and possible responses.

  • POSTnote

    Access to critical materials

    Critical materials (CMs) are key to UK manufacturing, including for the aerospace, automotive, energy and chemical sectors, which rely on materials typically extracted and processed abroad. CMs are vital components of several emerging technologies, including electric vehicles, renewable energy infrastructure such as wind turbines, and digital technologies such as computers and smartphones. The UK imports most of its CMs and faces international competition for key resources. This POSTnote looks at the demand and supply of CMs in the UK and ways of improving supply security.

  • POSTbrief

    Research for Parliament: Preparing for a changing world

    This document builds on POST's previous publication, Topics of Interest 2018 (POSTbrief 27). The subjects are listed under under six category headings based on the drivers of change identified in POSTnote 500: demographic change and healthcare; social and cultural trends; geopolitical and governance challenges; environmental pressures and climate change; resource security and sustainability; and technological advance.

  • POSTnote

    Cyber Security of Consumer Devices

    Weaknesses in the cyber security of internet-connected consumer devices can undermine the privacy and safety of individual users and can be used for large-scale cyber-attacks. This briefing looks at the cyber threats associated with consumer devices and their causes, as well as initiatives to improve device security, and the related challenges.

Total results (page 1 of 2)