Nigel Somerville discusses the importance of open source intelligence gathering in countering the growing terrorist threat to critical infrastructure Terrorist groups today are relying more and more on modern technology to facilitate their objectives. Global and decentralised in nature, extremist groups are now exploiting the Internet, mobile phones, social media and widely available software… Read more »
Posts By: Jacob Charles
Disruptive technology
David Brooker discusses the evolving IED threat and calls for greater partnership between governments and industry to ensure disruptor technology can meet the challenge Improvised explosive devices (IEDs) continue to be the weapon of choice for the modern day terrorist; this is evident in the Middle East – and in particular Iraq and Afghanistan – but… Read more »
Inside inspection
Kirstine Wilson asks whether handheld backscatter or dual X-ray imaging technologies can better enhance onsite inspection of suspect bags and packages Following the Charlie Hebdo attacks earlier in the year, the number of suspect bags reported has proliferated due to an escalation in security levels and heightened alertness from the general public. Although incidents… Read more »
Proliferation Games
Timothy Compston assesses the fallout from the negotiations over Iran’s nuclear programme and asks whether current efforts to curb nuclear proliferation are working With a resolution to the issue of Iran’s nuclear programme apparently more likely thanks to the recently announced framework agreement, this is a good time to reflect the current state of international… Read more »
The power of delusion
As the number of fighters heading to Syria to join ISIS continues to grow, John Chisholm explores the group’s allure and asks whether their success is a sign that liberal democracy is failing What is it that makes people in liberal democracies want to move to become part of ISIS? What is so wrong… Read more »
Sole sourcing security
Alastair Henman argues that government and commercial buyers of critical national infrastructure protection equipment increasingly want to single-source their procurement to improve integration, drive up standards and reduce costs The trend towards sole sourcing was established long ago, built on a drive for lower costs, quicker lead times and accelerated innovation. It began more than… Read more »
Fighting on the new frontier
Dr David Abrutat asks why Chinese counter-insurgency efforts are failing to subdue Uighur Separatism in Xinjiang province In the early morning hue of bustling vegetable market stalls, a scene of horror unfurled as two vehicles ploughed through the crowds. The attack on a shopping street in central Urumqi on 22 May 2014 was another… Read more »
Curing PREVENT
Anthony Tucker-Jones reports on Britain’s counter-radicalisation strategy and asks whether it still working In 2014 the UK’s highly controversial Prevent counter-radicalisation strategy was rocked by allegations that militant Islam had set up shop in Birmingham’s state schools. The so-called “Trojan Horse” plot highlighted the ongoing failure to safeguard the country’s young Muslims from an… Read more »
The heat of the night
David Lee assesses the value of thermal imaging technology for border security and critical infrastructure protection, and offers advice on selecting the right system for each application Border security and coastal surveillance are 24/7 operations that can’t afford downtime or periods of reduced readiness. Guarding against illegal immigration, smuggling, and terrorism demands reliable long-range… Read more »
Resurgence of the right
Amid reports of a rise in attacks linked to right-wing extremism on both sides of the Atlantic, John Chisholm examines the motivations of those driven to kill for their views In Europe and the United States, a new generation of right-wing political groups has arisen. Anti-Islam, anti-globalisation, anti-progressive, these movements have often resorted to… Read more »