Posts Categorized: February 2015

La Haine

In the wake of the Charlie Hebdo killings, Anthony Tucker-Jones assesses the trend in Islamist attacks sparked by the media’s depiction of Islam     France’s latest terror attack ended in a blaze of gunfire and the deaths of Cherif and Said Kouachi at a print works in the small town of Dammartin-en-Goele. Prior to… Read more »

Integrating the perimeter

The integration of human, physical and electronic security measures across the CNI is gathering pace, argues Chris Plimley, driven by the rapid evolution of the terror threat, technology and user demands   I watched my wife doing our weekly food shop on her phone from the comfort of a coffee shop the other day and… Read more »

Proxy war

With clashes between eastern Ukrainian rebels and Ukrainian forces escalating in January, John Chisholm concedes the conflict is now a civil war, with the antagonists backed respectively by Russia and the West   The violence East Ukraine shows no signs of abating. Despite efforts at a negotiated ceasefire, agreements on the ground have proven impossible… Read more »

Freedom of speech

John Maher warns secure radio communication technology could offer a tactical edge to both responders and terrorists alike and calls for greater inter-agency interoperability   The Paris attacks on the Charlie Hebdo publication office in January 2015 is evidence of a new profile of terrorism, furthering the reality that, despite ongoing, aggressive intelligence gathering, terrorist… Read more »

You’ve got ­–deadly– mail

As security officials struggle to protect their facilities from mail-borne terrorist threats, Jason Wakefield discusses the screening options available and argues now is the time to upgrade your antiquated X-ray system   Before purchasing equipment that can detect suspect devices entering a building through the postal system, there are many variables that need to be… Read more »

Up close with explosives

Although checkpoint explosive trace detection is urgently needed, hand-held systems have proved disappointing. But Andrew Goldsmith argues recent technological advances put detection power back into the screeners’ hands   In today’s security climate, security screening officials are always seeking new methods and technologies which can help enhance the screening process, make it more efficient in… Read more »

TSCM in 2014: Watch & learn

Bernie Connor examines the covert surveillance threats faced by officials and business leaders travelling abroad in the age of wearable consumer electronics, and argues that new technologies and methodologies can now combat this covert information capture   A new class of wearable consumer electronic high technology devices has begun to enter the market. The “smart… Read more »