Following fresh alerts over aviation security, Lina Kolesnikova examines the evolving explosive threat to airlines and argues enhanced behavioural detection should be used alongside explosive detection technology Aviation security is built upon layers of often negative or even deadly experience. Changes in aviation security have always being introduced in the aftermath of incidents…. Read more »
Posts By: Jacob Charles
Out of Afghanistan: Part 1
On the eve of the British withdrawal from Afghanistan, Anthony Tucker-Jones asks whether Task Force Helmand has achieved lasting security in the province The US-led Regional Command (South West) assumed control of combat operations in Helmand on 1 April 2014, marking the end of the British-led Task Force Helmand (TFH). The British military HQ… Read more »
The IED war
As Nato forces shift their focus from operational engagement to operational preparedness in 2014, Chris Hunter looks at the evolution of explosive ordnance disposal tactics and technology over the last 13 years in Afghanistan Rendering safe an improvised explosive device (IED) is often dirty, unpleasant and brutal work. One minute you’re dripping with sweat,… Read more »
Secured from within
Tamir Eshel outlines the evolution of the Israeli homeland security and counter terrorism industry, and explains why it has become a world-leader in the field Israel has always faced a mix of high and low-intensity threats, representing different challenges that required specific military and security responses. While regular military forces, operated by neighbouring or… Read more »
Syria’s siren song
Dean C Alexander examines why so many foreign fighters are drawn to the conflict in Syria, and calls on governments to implement policies which prevent their citizens from fighting overseas Syria is suffering a devastating civil war with cataclysmic effects in the region. There appears to be some recent momentum in favor of the… Read more »
Crowdsourcing counter terrorism
Professor Babak Akhgar tells Robert de la Poer how police and security services can use social media and other open source data to combat terrorism and organised crime RP: Some of our readers may not be familiar with the field of informatics. Could you begin by outlining what it involves and how it can… Read more »
Return of the letterbomb
2014 has already seen several deadly letterbomb attacks. Kirstine Wilson warns that the threat is only likely to increase and discusses how the latest screening technology can save lives and property Incidents involving “white powder” letters have received a great deal of media coverage since the anthrax attacks of 2001 with their headline-grabbing association… Read more »
Toughening soft targets
Lina Kolesnikova argues that soft targets are becoming more attractive to would-be terrorists, and calls for a greater guidance for the public on how to respond in the event of an attack The attacks of 11 September 2001 marked a change in terrorist attitudes, in that the aim is no longer merely to threaten… Read more »
Lost
Following the sudden disappearance of Malaysian Airlines Flight MH370, John Chisholm asks whether poor cabin security, baggage screening or passport control could be provide clues as to its whereabouts It probably was not aliens. It is worth getting that out of the way first when discussing the potential fate of Flight MH370, whose fate… Read more »
The future of X-ray?
Frederic Brouiller discusses the benefits and usage of real-time tomography technology for explosive detection in the aviation industry Throughout the years there have been a number of well-documented cases of severe threats or even acts of terrorism that have jeopardised the security of airports and airliners across the globe. These dangers have originated from… Read more »