Posts By: Jacob Charles

Held to ransom

Nik Whitfield reports on the lessons learnt from the WannaCry ransomware attack and the proposed changes security professionals should make to better protect themselves WannaCry has clearly demonstrated that organisations of all sizes are exposed to the risk of destructive malware. However, before we get swept away in the media sensationalism that we could be… Read more »

Automated defence systems

Nicola Whiting argues that governments must look to automated defence systems to combat the rise in cyber-crime groups and nation-state hackers using automated tools to launch attacks The implications of recent developments are clear: easily accessible, automated software is enabling even amateurs to conduct sophisticated cyber attacks just as the pipeline of specialists needed to… Read more »

Call sign Ugly

Anthony Tucker-Jones reports on what happens when military law fails during intense counter-insurgency operations Few people outside the armed forces have ever heard of the Judge Advocate General and the Service Prosecution Authority. That was until the case of Royal Marine Sergeant Alexander Blackman. His trial for a war-time murder polarised the armed forces and… Read more »

Understanding thermographic imaging

Trevor Holt offers an overview of thermal imaging technology Thermographic imaging is the ability to detect infrared energy, which is emitted from objects as they become hotter. The technology has been around for almost 90 years and initially found favour in military applications and in recent years within search, rescue and law enforcement use cases…. Read more »

Fighting Electronic benefit fraud

Louis-James Davis examines the causes of problems and solutions that are emerging in the US The US electronic benefit transfer or EBT system is attractive to fraudsters due to lack of adoption and investment in new technologies. Processes for cloning cards that have minimal security – such as magnetic strips – are well developed and… Read more »

Hybrid warfare. Borders and terrorism

Lina Kolesnikova reports on the changing face of warfare During the last two years, hybrid warfare and hybrid war have become quite fashionable topics among both civilian and military leaders. When we talk about inter-state war with the use of conventional forces, we mean conventional warfare. After 9/11, however, everything changed and we started to… Read more »

Is Big Brother really watching?

James Wickes investigates if CCTV and surveillance are a protection measure or an invasion of our privacy CCTV has become one of the de-facto technologies used for the protection of people, property and assets. It’s everywhere – in shopping centres, offices and public transport, you name it. Yet questions are still raised about its effectiveness… Read more »

Candid cameras

Richie McBride explains how Body Worn Cameras represent the latest and perhaps most effective method for advancing prison security. One of the enduring trends among the majority of prisons internationally is the issue of overcrowding, and the associated problems this creates. The number of prisoners in England and Wales has nearly doubled over the last… Read more »

Fighting back against fraud

Julian Cook examines the importance of tackling document fraud through effective information management As organisations become increasingly inundated with massive volumes of business-critical information, decision makers are under growing pressure to find and implement solutions to ensure they effectively manage and control this information. One of the most important considerations for any business is how… Read more »

Privacy vs Security

Timothy Compston wonders if the balance for CCTV and the sharing of suspect images has gone too far towards privacy to the detriment of time-critical policing and counter terrorism. The reluctance of certain European countries, like Germany and Sweden, to release pictures and footage of suspects – including those captured by video surveillance cameras –… Read more »