Jeanne McKinney lifts the lid on Military Public Affairs and reveals how it has grown to become a critical force multiplier When you want to find out what is going on with our forces from peacetime to global crises and war, Military Public Affairs (PA) is a communications hub, driving information in multiple directions by… Read more »
Posts By: Jacob Charles
New-generation warfare
Will Ashford-Brown reveals why hybrid warfare is no longer peripheral but central to Moscow’s military doctrine and the threat it poses to Europe As much of the strategic debate in recent years has centred on the long-term challenge posed by China, Russia now represents the most immediate and proximal threat to UK and European security…. Read more »
The end for NATO?
Barry Scott Zellen, PhD, explores the future of NATO in the event that America takes Greenland With Stalin’s large standing army smothering half of Europe and his fledgling nuclear arsenal extending Moscow’s ambitions overseas, America had to scramble. And scramble it did. First, in 1949, it formed NATO with the 4 April, 1949 signing of… Read more »
The AI effect
Richard Woolfrey outlines ways to bridge the cyber skills gap in the age of AI The UK is facing an unprecedented escalation in cyber threats. Research from the National Cyber Security Centre (NCSC) shows that “four nationally significant” cyber attacks take place each week – an indication of how threat activity is embedded into daily… Read more »
Trouble ahead?
Lawrence Baker navigates aerospace cyber turbulence amid compliance burdens The aerospace sector has long been synonymous with engineering excellence and uncompromising safety standards. But as the industry starts to become ever more digital and interconnected, it now faces a new normal in which cyber security must command equal attention.Aerospace has long been conscious of cyber… Read more »
Tapping towards danger
Krishna Vishnubhotla examines the rising threat of Near-field communication hackers As an old saying in cyber security goes: attackers will always find the path of least resistance. We shouldn’t be surprised to see that cyber criminals have found a new way in which to reap profits from unsuspecting victims by exploiting a vector that –… Read more »
Turning the tide
David Janson examines how AI-powered open-source intelligence can be a key tool in border security Every minute, thousands of posts promoting illegal immigration flood social media, fuelling dangerous journeys and organised crime. With 80 percent of Channel crossings linked to online activity, the challenge is clear: manual monitoring can’t keep pace. The fight against illegal… Read more »
Vehicle sweeps: The VSS Approach
PD Turner examines the changing dynamics of TSCM vehicle inspections The role of the Vehicle Search Specialist (VSS) and the complexities of modern vehicle inspections have become a serious topic of discussion among professional technical operators and TSCM instructional technologists. Concern has been raised by organised government and private executive protection teams during the past… Read more »
Trump vs Greenland
Barry Scott Zellen discovers if NATO will survive this latest crisis as it has its many prior challenges since 1949 Just a few months ago, when the White House’s 2025 National Security Strategy was released in late November, many Northerners were puzzled by the omission of the Arctic from the document. There was no Arctic… Read more »
Physical security trends for 2026
Nicholas Smith explains why organisations will focus on flexibility, responsible AI and unified connected systems to strengthen security and operational performance In 2026, the conversation around cloud adoption will continue to mature. Organisations will prioritise solutions that offer deployment flexibility and scalability. Rather than committing to a single deployment model, enterprises will evaluate each workload… Read more »