Posts By: Jacob Charles

Regional Threat Watch – Asia & the Middle East Part 1

Major Terrorist Groups Matthew Henman examines the terrorist groups presenting the largest regional security threat   The Taliban The Taliban is a militant Islamist group dedicated to the implementation and enforcement of a strict Deobandi form of sharia (Islamic law) throughout Afghanistan. The group originated in the Pashtun belt of southern and eastern Afghanistan in… Read more »

Regional Threat Watch – Asia & the Middle East Part 2

Security Hotspots IHS Country Risk assesses the most volatile security hotspots in the region   South China Sea: rising tensions China has laid claims on most of the islets in the South China Sea (SCS), most of which are actively disputed by the other states in the region, including Vietnam and the Philippines. Although several… Read more »

Tough ride

As armoured vehicles continue to evolve, Timothy Compston finds that appropriate operator training can be as important as ballistic protection in hostile environments   The technologies used in armouring and up-armouring vehicles have moved on rapidly in recent years, and are now widely deployed by police, NGOs, VIPs and border patrol personnel across the world’s… Read more »

Moscow’s missile standoff

Anthony Tucker-Jones reports on Nato’s highly controversial missile shield that is fuelling fears of escalating confrontation with Russia   There is an old saying that history has a nasty habit of repeating itself. In the early 1960s, the US stationed missiles in Turkey; in retaliation, the Soviet Union deployed them into the Caribbean sparking the… Read more »

Containing the threat

Patrik Anderson explores the unique challenges of securing ports and cargo, and argues that IP-based surveillance systems offer multi-layered protection from terrorist threats   Shipping ports are a vital lifeline for supplying the world’s population with the necessities of living. Between land, rail and sea, ports are the hubs of far-reaching networks that connect suppliers… Read more »

TSCM Training – Who Needs It?

Dean La-Vey outlines the various types of counter-surveillance training available, and argues that every TSCM operator should engage in constant re-training to stay ahead of the threats   Technical surveillance countermeasure (TSCM) training can broadly be divided into two distinct areas – training specifically on the operation of TSCM equipment, and training on the procedural… Read more »

Ungoverned spaces

Anthony Tucker-Jones reports on Saudi Arabia’s unprecedented counter-insurgency effort in Yemen   Saudi jets, supported by those of nine other moderate Sunni Arab states, launched a series of co-ordinated air strikes against Shia Houthi rebels in war torn Yemen on 26 March as part of Operation Decisive Storm. Their first move was suppression of enemy… Read more »

Open source

Nigel Somerville discusses the importance of open source intelligence gathering in countering the growing terrorist threat to critical infrastructure   Terrorist groups today are relying more and more on modern technology to facilitate their objectives. Global and decentralised in nature, extremist groups are now exploiting the Internet, mobile phones, social media and widely available software… Read more »

Disruptive technology

David Brooker discusses the evolving IED threat and calls for greater partnership between governments and industry to ensure disruptor technology can meet the challenge Improvised explosive devices (IEDs) continue to be the weapon of choice for the modern day terrorist; this is evident in the Middle East – and in particular Iraq and Afghanistan – but… Read more »

Inside inspection

Kirstine Wilson asks whether handheld backscatter or dual X-ray imaging technologies can better enhance onsite inspection of suspect bags and packages   Following the Charlie Hebdo attacks earlier in the year, the number of suspect bags reported has proliferated due to an escalation in security levels and heightened alertness from the general public. Although incidents… Read more »