David Janson examines how AI-powered open-source intelligence can be a key tool in border security Every minute, thousands of posts promoting illegal immigration flood social media, fuelling dangerous journeys and organised crime. With 80 percent of Channel crossings linked to online activity, the challenge is clear: manual monitoring can’t keep pace. The fight against illegal… Read more »
Monthly Archives: February 2026
Vehicle sweeps: The VSS Approach
PD Turner examines the changing dynamics of TSCM vehicle inspections The role of the Vehicle Search Specialist (VSS) and the complexities of modern vehicle inspections have become a serious topic of discussion among professional technical operators and TSCM instructional technologists. Concern has been raised by organised government and private executive protection teams during the past… Read more »
Trump vs Greenland
Barry Scott Zellen discovers if NATO will survive this latest crisis as it has its many prior challenges since 1949 Just a few months ago, when the White House’s 2025 National Security Strategy was released in late November, many Northerners were puzzled by the omission of the Arctic from the document. There was no Arctic… Read more »
Physical security trends for 2026
Nicholas Smith explains why organisations will focus on flexibility, responsible AI and unified connected systems to strengthen security and operational performance In 2026, the conversation around cloud adoption will continue to mature. Organisations will prioritise solutions that offer deployment flexibility and scalability. Rather than committing to a single deployment model, enterprises will evaluate each workload… Read more »
The new battlespace
Ash Alexander-Cooper OBE, shines the spotlight on the evolving world of drone warfare For more than a century, air superiority was defined as the side with the most advanced aircraft and the best-trained pilots. That dominance was built on hardware, skill and financial might. Today, the balance has shifted. One of the cheapest devices on… Read more »
Beyond compliance
Ardon Anderson reveals how integrated security systems will define Martyn’s Law readiness When Martyn’s Law takes full effect across the UK in 2027 it will mark one of the most significant overhauls of public venue security in decades. The goal is clear: prevent another tragedy like the Manchester Arena bombing that killed 22 people in… Read more »
Running on empty
Melissa Bischoping identifies a new form of fatigue in cyber security Security teams are no strangers to fatigue. Over the years, they’ve dealt with a constant stream of alerts, managed increasingly complex toolsets, and defended IT environments that change by the hour. It’s demanding work and even the best-prepared teams can feel the strain of… Read more »
Crime without boundaries
Gary Higgins looks inside the evolving world of serious acquisitive crime When a van full of tools disappears overnight or copper cable worth thousands vanishes from wind farms or national network rail infrastructure, it is easy to chalk it up to the work of opportunistic thieves striking lucky. However, there is something much larger going… Read more »