Posts By: Jacob Charles

Incubators of Jihad – Part 2

Following the trial of three Royal Marines accused of murder, Anthony Tucker-Jones reports on the emergent terror threat to members of the British armed forces living – and serving time – in the UK   What is the threat to Sergeant Alexander Blackman after his conviction for murdering a Taliban fighter and having is anonymity… Read more »

Lockdown: Sochi

As the Winter Olympics begin in Sochi, John Chisholm examines the terrorist groups whose plots threaten to overshadow the Games, and warns of potential security gaps elsewhere in Russia   When considering counter terrorism issues and Russia two things immediately spring to mind: the Caucasus and incidents that leave large numbers of people dead. No… Read more »

The heat of the night

Procuring a suitable and cost-effective day/night perimeter surveillance system can prove challenging. David Montague explores the available technologies and addresses some of the myths surrounding thermal imaging systems   Thermal imaging technology is now generally considered a tried-and-tested technology, and is used in numerous professional surveillance and perimeter security installations around the world. The potential… Read more »

The future of access control

As the public and businesses continue to embrace new security technologies, John Davies and Mike Sussman predict 2014 will be a year of rapid integration and evolution in the access control market   2013 saw a big rise in integrated systems in the security sector, and 2014 looks set to follow this pattern with a… Read more »

The bug-free guarantee

Dean La-Vey ask whether it’s possible for TSCM sweep teams to guarantee clients they have found every surveillance device, and examines some of the factors that affect their results   Every technical surveillance countermeasure (TSCM) practitioner likes to think they are good at their job. The more experienced they are, the more confident they are… Read more »

Islands of the sun

With tensions continuing to mount in the South and East China Seas over the disputed Senkaku and Spratly islands, John Chisholm analyses the domestic and foreign policy factors fuelling the rhetoric   As 2013 drew to a close, the tensions between Japan and China showed no signs of abating, and this appears unlikely to change… Read more »

What lies beneath

Colin Smith and Phil Andrew explain how advances in multimode multibeam sonar technology can be harnessed to neutralise underwater explosive threats more quickly and safely   Underwater improvised explosive devices (UIEDs) pose an array of challenges for military and homeland security forces tasked with search and deactivation. Just as IEDs up the ante from conventional… Read more »

Border warning

Rupert Swinhoe-Standen considers the use of 360-degree pulse radar in advanced surveillance, security and detection systems for border security and critical infrastructure protection   Area or line surveillance has typically been achieved using a range of techniques and sensors which may promise a great deal but which all have limitations in one way or another…. Read more »

Terror in the family

Dean C Alexander highlights the threat of radicalisation within families, and calls for greater surveillance to detect would-be terrorists and protect those at risk   The participation of brothers Tamerlan and Dzhokhar Tsarnaev in the April 2013 Boston Marathon bombings is a recent example of the phenomenon of family-affiliated extremist and terrorist activities globally. This… Read more »

PSIM city

As demand for PSIM-based security solutions gathers pace, Darren Chalmers-Stevens examines what is driving the growth in CNI projects and asks what makes a gold standard for assuring resilience and interoperability   There are a variety of electronic security vendors – from video management and access control to perimeter fencing systems that today leverage the… Read more »