Following the trial of three Royal Marines accused of murder, Anthony Tucker-Jones reports on the emergent terror threat to members of the British armed forces living – and serving time – in the UK What is the threat to Sergeant Alexander Blackman after his conviction for murdering a Taliban fighter and having is anonymity… Read more »
Posts By: Jacob Charles
Lockdown: Sochi
As the Winter Olympics begin in Sochi, John Chisholm examines the terrorist groups whose plots threaten to overshadow the Games, and warns of potential security gaps elsewhere in Russia When considering counter terrorism issues and Russia two things immediately spring to mind: the Caucasus and incidents that leave large numbers of people dead. No… Read more »
The heat of the night
Procuring a suitable and cost-effective day/night perimeter surveillance system can prove challenging. David Montague explores the available technologies and addresses some of the myths surrounding thermal imaging systems Thermal imaging technology is now generally considered a tried-and-tested technology, and is used in numerous professional surveillance and perimeter security installations around the world. The potential… Read more »
The future of access control
As the public and businesses continue to embrace new security technologies, John Davies and Mike Sussman predict 2014 will be a year of rapid integration and evolution in the access control market 2013 saw a big rise in integrated systems in the security sector, and 2014 looks set to follow this pattern with a… Read more »
The bug-free guarantee
Dean La-Vey ask whether it’s possible for TSCM sweep teams to guarantee clients they have found every surveillance device, and examines some of the factors that affect their results Every technical surveillance countermeasure (TSCM) practitioner likes to think they are good at their job. The more experienced they are, the more confident they are… Read more »
Islands of the sun
With tensions continuing to mount in the South and East China Seas over the disputed Senkaku and Spratly islands, John Chisholm analyses the domestic and foreign policy factors fuelling the rhetoric As 2013 drew to a close, the tensions between Japan and China showed no signs of abating, and this appears unlikely to change… Read more »
What lies beneath
Colin Smith and Phil Andrew explain how advances in multimode multibeam sonar technology can be harnessed to neutralise underwater explosive threats more quickly and safely Underwater improvised explosive devices (UIEDs) pose an array of challenges for military and homeland security forces tasked with search and deactivation. Just as IEDs up the ante from conventional… Read more »
Border warning
Rupert Swinhoe-Standen considers the use of 360-degree pulse radar in advanced surveillance, security and detection systems for border security and critical infrastructure protection Area or line surveillance has typically been achieved using a range of techniques and sensors which may promise a great deal but which all have limitations in one way or another…. Read more »
Terror in the family
Dean C Alexander highlights the threat of radicalisation within families, and calls for greater surveillance to detect would-be terrorists and protect those at risk The participation of brothers Tamerlan and Dzhokhar Tsarnaev in the April 2013 Boston Marathon bombings is a recent example of the phenomenon of family-affiliated extremist and terrorist activities globally. This… Read more »
PSIM city
As demand for PSIM-based security solutions gathers pace, Darren Chalmers-Stevens examines what is driving the growth in CNI projects and asks what makes a gold standard for assuring resilience and interoperability There are a variety of electronic security vendors – from video management and access control to perimeter fencing systems that today leverage the… Read more »