Monthly Archives: June 2017

On the trail of the ghost ships

Timothy Compston discovers that more and more ships are turning off their AIS (Automatic Identification System) or even switching their identities completely to sail under the security radar. When employed properly AIS (Automatic Identification System), which provides a unique identification for each vessel as well as its position, course and speed, is invaluable from a… Read more »

Held to ransom

Nik Whitfield reports on the lessons learnt from the WannaCry ransomware attack and the proposed changes security professionals should make to better protect themselves WannaCry has clearly demonstrated that organisations of all sizes are exposed to the risk of destructive malware. However, before we get swept away in the media sensationalism that we could be… Read more »

Automated defence systems

Nicola Whiting argues that governments must look to automated defence systems to combat the rise in cyber-crime groups and nation-state hackers using automated tools to launch attacks The implications of recent developments are clear: easily accessible, automated software is enabling even amateurs to conduct sophisticated cyber attacks just as the pipeline of specialists needed to… Read more »

Call sign Ugly

Anthony Tucker-Jones reports on what happens when military law fails during intense counter-insurgency operations Few people outside the armed forces have ever heard of the Judge Advocate General and the Service Prosecution Authority. That was until the case of Royal Marine Sergeant Alexander Blackman. His trial for a war-time murder polarised the armed forces and… Read more »

Understanding thermographic imaging

Trevor Holt offers an overview of thermal imaging technology Thermographic imaging is the ability to detect infrared energy, which is emitted from objects as they become hotter. The technology has been around for almost 90 years and initially found favour in military applications and in recent years within search, rescue and law enforcement use cases…. Read more »

Fighting Electronic benefit fraud

Louis-James Davis examines the causes of problems and solutions that are emerging in the US The US electronic benefit transfer or EBT system is attractive to fraudsters due to lack of adoption and investment in new technologies. Processes for cloning cards that have minimal security – such as magnetic strips – are well developed and… Read more »

Hybrid warfare. Borders and terrorism

Lina Kolesnikova reports on the changing face of warfare During the last two years, hybrid warfare and hybrid war have become quite fashionable topics among both civilian and military leaders. When we talk about inter-state war with the use of conventional forces, we mean conventional warfare. After 9/11, however, everything changed and we started to… Read more »