Jeanne McKinney outlines the challenges of crippling the cash flow to terrorism Cash to chaos is the dangerous game terrorists are playing, banking on the fact that no one is following their money. There are efforts, yet the financial networks to fund global militant operations are vast. Tracking financial transactions and transfers is not easy…. Read more »
Monthly Archives: February 2025
Fighting back
PD Turner highlights the challenges for the world of TSCM when it comes to Wireless Power Transmission The wireless transmission of power is an emerging, yet century-old technology that poses a significant concern for technical operators worldwide. A well-concealed low probability of detection (LPOD) surveillance or tracking device can stay ‘power-active’ without batteries or the… Read more »
Time for a reset?
Robert Hall opens Pandora’s Box as he considers recalibrating strategic security The acronym VUCA, first deployed nearly four decades ago, amply describes today’s state of socio-political affairs – volatile, uncertain, complex and ambiguous. This is because of a dynamic risk environment where multiplying threats expose growing vulnerabilities. The new risk complex demands we adapt our… Read more »
The 51st State
Barry Scott Zellen builds a case for making the Arctic great again It was just over five years ago, in the summer of 2019, that the strategic prescience and unorthodox diplomatic brilliance of America’s re-elected Commander-in-Chief, Donald Trump, was on full display for all the world to see, from North-East Asia to the Arctic.This nostalgic… Read more »
Under attack!
Dan Jones explains how new cyber resilience legislation aims to combat rising ransomware threats The UK government is planning to introduce new legislation next year to beef up the nation’s cyber resilience. Details of the Cyber Security and Resilience Bill were revealed in the King’s Speech during last summer and are designed to improve UK… Read more »
Spotting the pattern
Dr Brenton Cooper reveals why OSINT technology is a primary weapon against resurgent extremism online It could hardly be starker. The boss of MI5 said the UK faces the most complex threat environment ever. The country is subject to the malign activities of the Russian state, murder plots from Iran, a resurgence of lethal threats… Read more »
Under the influence
Jorge Marinho and Júlio Ventura lift the lid on foreign influence and academic espionage to give Portugal’s University of Lisbon perspective The possibility of one state seeking to directly or indirectly influence or even interfere in the decisions of another should not be ignored, especially by those responsible for defending national interests, most notably rulers…. Read more »
Into the grey
Dave Dixon explains why all-source fusion is critical to combating hybrid and grey-zone threats to security All-source fusion software has always been a helpful tool in creating clarity from complexity. Hybrid warfare means that these tools are now critical as the complexity and dynamic nature of the conflict exponentially increases the threat.The existence of hybrid… Read more »