Take just one example the conspiracy theories around 5G were quickly re-tailored to incorporate Bill Gates and George Soros as targets, and were effective enough that there were arson attacks against 5G infrastructure. In other words, a few memes and videos, along with the use of these techniques (whether deliberate, or accidental, but there is strong evidence of deliberate action) were enough to cause homegrown domestic terrorism attacks on UK soil.
One of the biggest reasons that gun discussions often don’t gain traction is the two sides are often comparing apples and rocks. Those who are for gun control are often discussing death and emotion, while those who are pro-gun may speak of technical aspects (semi-automatic vs. automatic) and entitlement (the 2nd Amendment).
Turkish President Recep Tayyip Erdogan announced on Sunday that the leader of the Islamic State (IS) group, Abu Hussein al-Qurayshi, was killed by Turkish forces during an operation in Syria.
The US Supreme Court on Monday rejected an appeal to dismiss lawsuits against two of Turkish president Recep Tayyip Erdoğan’s security staff who allegedly assaulted protesters outside the Turkish ambassador’s residence in Washington DC in 2017.
Just because someone has a security or private investigators license it does not mean they are competent or not working with the criminals. What a lot of people forget when hiring security personnel is that you get what you pay for.
Whether you are a protector, an attender, or a protector of an attender, knowing the baseline behavior (typical behavior or protocols for a certain group of people) of the church you are in will help to understand when something is not right.
Religious extremist whether Al Qaeda or ISIS have long called for the use of Vehicles as Weapons even going back to 2010, when we saw an article in Inspire Magazine titled, “The Ultimate Mowing Machine.”
It irks me when I hear security specialists giving overly simplistic advice like ‘be more aware of your surroundings,’ when it comes to guarding against vehicle attacks on pedestrians. In this article, I share 12 practical methods for mitigating this increasing terrorist threat.
Especially while many people are still remote, technology has become more and more central to people’s lives, and we are talking about ways that things will or will not return to normal. As we hear about more and more cyber security incidents, each supposedly carried out by ‘sophisticated threat actors with unprecedented capabilities’, it’s time to talk about the mystique of cyber security and the problem it has with public perception.
These days if you travel internationally or work in emerging markets, you are running the risk of being arrested for some reason. Criminals are not the only ones who can end up in handcuffs! It may come as a shock to some people, but many police forces are corrupt. And this is not just in the emerging markets.
Smart home technology is a rapidly growing consumer and business product. Here are some figures that show projections for the growth of these devices, as well as current numbers
Each issue our global geopolitical partner, Stratfor, provides an in-depth analysis of global incidents via in-house experts, cutting edge technology, and through a comprehensive globally sourced network. Here is your summary for the last 30 days. West Africa: Al Qaeda Is Expanding Operations in Benin and Ivory Coast Feb 2, 2021 France’s intelligence chief, Bernard […]
In the past, I viewed Executive Protection (EP) as persons who provided corporate level protection. This was the guy who only walked with the CEO, politician, or other important corporate executives and dignitaries. With my limited understanding, I didn’t think of those who drive these same individuals as being considered Executive Protection agents as well. As an EP specialist, I now understand and have experienced some of the vast role’s EP work will encompass.
We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.
According to Paine, if twenty persons, all strangers to each other, found themselves in a previously uninhabited country, each individual’s will was his natural right. He had the freedom and liberty to do as he pleased, even invading the sovereignty of his neighbors. It would then occur to each sovereign individual that if he united with his neighbor for mutual protection he would increase his personal security. But to do that he would have to sacrifice certain degrees of his natural rights. The compromising of individual rights resulted in rights of “compact” or as our legislative laws were defined as “civil rights”.
Well, there really isn’t anything fundamentally wrong with this approach, after all, as the saying goes, “if it ain’t broke, don’t fix it.” The trouble is if we continue to do the same thing in the same way we’re in danger of missing opportunities to improve, and surely that’s what we all want to do, become better, more efficient and smarter at what we do.
That’s undoubtedly the maxim I’ve always tried to apply to communications. We embraced digital radio enthusiastically when it first came on the scene 15+ years ago, even though doing so was detrimental to us in the short term, it paid off in the long-run. Many saw it as ‘revolution’ rather than ‘evolution,’ but eventually, it eclipsed its analogue forbear, and those naysayers had no choice but to evolve.
On the morning of April 30th, 2019 Venezuela’s opposition leader Juan Guaidó seemed to attempt a coup d’état against the communist government of Nicolás Maduro.
I use the word ‘seemed’ as what occurred can be best described as a publicity stunt more than an actual coup d’état. For the remainder of the day, even those that thought they knew what was going on in Venezuela, really, had no idea what was going on. While social media and the news channels were touting a revolution in Caracas, life went on as normal on the military bases and for the rest of Venezuela. Guaidó’s attempted overthrow was mostly just another demonstration that is all too common in Caracas.
Many of you will have seen the photo of the Dallas shooter outside of the Federal Building. Now ask yourself if this was your Office, School, or House of Worship how prepared would your company or institution be to recognize the signs of trouble as those Federal Officers did and deny access and ultimately defeat the shooter?
In this article, I’ll take a look at artificial intelligence, particularly the machine learning area, a basic overview of how it works, and the dangers of over-reliance on an algorithmic approach to analysis.