Posts By: Jacob Charles

Open source

Nigel Somerville discusses the importance of open source intelligence gathering in countering the growing terrorist threat to critical infrastructure   Terrorist groups today are relying more and more on modern technology to facilitate their objectives. Global and decentralised in nature, extremist groups are now exploiting the Internet, mobile phones, social media and widely available software… Read more »

Disruptive technology

David Brooker discusses the evolving IED threat and calls for greater partnership between governments and industry to ensure disruptor technology can meet the challenge Improvised explosive devices (IEDs) continue to be the weapon of choice for the modern day terrorist; this is evident in the Middle East – and in particular Iraq and Afghanistan – but… Read more »

Inside inspection

Kirstine Wilson asks whether handheld backscatter or dual X-ray imaging technologies can better enhance onsite inspection of suspect bags and packages   Following the Charlie Hebdo attacks earlier in the year, the number of suspect bags reported has proliferated due to an escalation in security levels and heightened alertness from the general public. Although incidents… Read more »

Proliferation Games

Timothy Compston assesses the fallout from the negotiations over Iran’s nuclear programme and asks whether current efforts to curb nuclear proliferation are working With a resolution to the issue of Iran’s nuclear programme apparently more likely thanks to the recently announced framework agreement, this is a good time to reflect the current state of international… Read more »

The power of delusion

As the number of fighters heading to Syria to join ISIS continues to grow, John Chisholm explores the group’s allure and asks whether their success is a sign that liberal democracy is failing   What is it that makes people in liberal democracies want to move to become part of ISIS? What is so wrong… Read more »

Sole sourcing security

Alastair Henman argues that government and commercial buyers of critical national infrastructure protection equipment increasingly want to single-source their procurement to improve integration, drive up standards and reduce costs The trend towards sole sourcing was established long ago, built on a drive for lower costs, quicker lead times and accelerated innovation. It began more than… Read more »

Fighting on the new frontier

Dr David Abrutat asks why Chinese counter-insurgency efforts are failing to subdue Uighur Separatism in Xinjiang province   In the early morning hue of bustling vegetable market stalls, a scene of horror unfurled as two vehicles ploughed through the crowds. The attack on a shopping street in central Urumqi on 22 May 2014 was another… Read more »

 Curing PREVENT

Anthony Tucker-Jones reports on Britain’s counter-radicalisation strategy and asks whether it still working   In 2014 the UK’s highly controversial Prevent counter-radicalisation strategy was rocked by allegations that militant Islam had set up shop in Birmingham’s state schools. The so-called “Trojan Horse” plot highlighted the ongoing failure to safeguard the country’s young Muslims from an… Read more »

The heat of the night

David Lee assesses the value of thermal imaging technology for border security and critical infrastructure protection, and offers advice on selecting the right system for each application   Border security and coastal surveillance are 24/7 operations that can’t afford downtime or periods of reduced readiness. Guarding against illegal immigration, smuggling, and terrorism demands reliable long-range… Read more »

Resurgence of the right

Amid reports of a rise in attacks linked to right-wing extremism on both sides of the Atlantic, John Chisholm examines the motivations of those driven to kill for their views   In Europe and the United States, a new generation of right-wing political groups has arisen. Anti-Islam, anti-globalisation, anti-progressive, these movements have often resorted to… Read more »