Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » TERRORISM » Counter Terrorism

About the lone wolf terrorist threat.

About the lone wolf terrorist threat.

President Donald Trump and his administration formulate their plans to combat terrorism, they will discover that dealing with the threat of lone wolf terrorism will prove to be the most…

Foreign Policy: U.S.’s Counterterrorism Allies: What Are They Good For?

Foreign Policy: U.S.’s Counterterrorism Allies: What Are They Good For?

Published by Lawfare, Nov.8th 2016.- The United States cannot fight terrorism without allies, but these alliances bring with them new problems and at times make counterterrorism far more complicated, to…

Drones: Detect, Identify, Respond.

Drones: Detect, Identify, Respond.

Drones (UAVs) have been around for many years, but with the wide adoption that is beginning to occur new conflicts have arisen that are causing heightened awareness of the potential…

Argentina actively working against terrorism.

Argentina actively working against terrorism.

Security Minister Patricia Bullrich announced late last week that the government is actively working against the threat of terrorism from abroad. The notice comes ahead of the Olympic Games in Rio de Janeiro,…

U.S. judges empowered to allow Feds to remote search on computers, anywhere.

U.S. judges empowered to allow Feds to remote search on computers, anywhere.

In April 2016, the U.S. Supreme Court approved the modified version of Rule 41 of the Federal Rules of Criminal Procedure. The amendments empower U.S. judges to issue search warrants…

The “Al-Qaedanization” of ISIL?

The “Al-Qaedanization” of ISIL?

Written by Victor R. Bjorgan.-    Last week, Pentagon officials  informed that American airstrikes have killed 25,000 ISIS fighters in Iraq and Syria and incinerated millions of dollars plundered by the…

Access Control, Incident Response & Protective Intelligence: the three circles of Preventive Security.

Access Control, Incident Response & Protective Intelligence: the three circles of Preventive Security.

Circles of Security,  constitute one of the most important ideas in preventive security. We have three layers/circles of security (by Amy Toben, Director of consulting, training and special operations at…

The Egmont Group targeting terrorist financing: “follow the money”.

The Egmont Group targeting terrorist financing: “follow the money”.

The Egmont Group — Financial Intelligence Units from 151 jurisdictions, with 19 other observer organizations — issued its latest Communiqué from its meeting in Monaco last week, targeting terrorist financing.…

Brothers and Sisters of Battle: Analyzing Family Ties and Terrorism Patterns.

Brothers and Sisters of Battle: Analyzing Family Ties and Terrorism Patterns.

Following the terrorist attacks in Paris, France, I wrote about the value of intelligence analysts seeking out and identifying brothers within a terror organization. Such familial bonds can provide counterterrorism…

Radicalization: How Terrorist Groups Attract Young Followers

Radicalization: How Terrorist Groups Attract Young Followers

Short News by Victor Björgan.- In this week’s episode of Hidden Brain (a publication of npr.org) , they look at the social and psychological drivers behind international terrorism, and why…

Page 1 of 10123Next ›Last »