Jordan’s Uncertain Future
Public protests erupted throughout Jordan in February of this year. While security officials in Amman are well accustomed to demonstrations within the city limits, the February protests also reached...
View ArticleDangerous Minds – The Relationship between Beliefs, Behaviors, and Tactics
This research monograph – Dangerous Minds, examines the relationship between the individual beliefs, behaviours, and tactics of an attacker. It was developed out of work, following human factors...
View ArticleState Sponsored Cyber Threats – The Long View
Thinking about state-sponsored cyber threats over the long term doesn't come easy to Western strategists. This essay takes a look at at the strategic implications of thinking only in the short-term.
View ArticleBoko Haram: A Threat to Nigeria and Beyond
Al-Qaeda, Hamas, Al-Shabaab, Hezbollah, the Haqqani network, and the Taliban are all infamous names to the Western world. These organizations, however, are but a handful of the many dozens of...
View ArticleThe International Drug Trade and West Africa: An Enforcement Quandary
“In the past decade, there has been significant growth in the illicit trafficking of drugs, people, firearms, and natural resources. Trafficking in these and other commodities is generally...
View ArticleSlavery and Human Trafficking in 2013
Introduction Reports and statistics from the UN, national governments, and politically diverse NGO’s demonstrate that human trafficking and slavery are as common today as they were during the years...
View ArticlePrivacy in the Age of Big Data
Social media, Web 2.0, the Internet of Things, mobile computing, and the expansion of sensors is allowing more information to be gathered than ever before which, coupled with Big Data analytics, offers...
View ArticleThe Cyber Moscow Rules
Lessons learned from US agents who operate in enemy territory have been captured for years and transformed into a code of conduct popularly known as “Moscow Rules.” Those old rules existed for a...
View ArticleCriminal Netwarriors in Mexico’s Drug Wars
Mexico is imploding in a series of interlocking ‘criminal insurgencies’ culminating in a virtual civil war. Kidnappings, assassinations, beheadings, shoot-outs: Mexico is gripped by combat between...
View ArticleToward Operational Art for Policing
The military, facing a complex and intractable mixture of “wicked problems” on the battlefield, has responded with a doctrinal revolution in the production and practice of operational theory. But most...
View ArticleIntelligence-led Mitigation
This paper explores methods for capitalizing on existing law enforcement intelligence capabilities to provide intelligence support to decision makers for a full spectrum of public safety and emergency...
View ArticleAnders Behring Breivik: A Lethal Mind in an Unlikely Place
“I explained to God that unless he wanted the Marxist-Islamist alliance and the certain Islamic takeover of Europe to completely annihilate European Christendom within the next hundred years, he must...
View ArticleFrame Reflection:A Critical Review of US Military Approaches to Complex...
We are pleased to present this monograph on frame reflection. As the authors note: “Our hope is that the insights gained from institutional barriers in the modern military may provide insights for...
View ArticleFootball and the Illusive Stability of Coalition Governments in the MENA States
An Arab Spring political cycle is emerging. Single-party domination gives way to multi-party democracy which crumbles back into single-party domination. Football: An Introductory Anecdote Sitting with...
View ArticleDid Snowden Escalate the Cyberwar?
Edward Snowden is guilty of lot of things. But contrary to Kurt Eichenwald’s recent Newsweek analysis, he did not “escalate the cyberwar.” Eichenwald interviews a host of business, intelligence,...
View ArticleIdentifying “Insider” Threats in Information Security
Introduction The threat of “insiders” in positions of trust with access to critical aspects of an organization’s Information Technology (IT) infrastructure, whether government, military, or private...
View ArticleRadioactive Thefts and Dirty Bomb Threats
The recent theft of a truckload of highly radioactive material in Mexico unearthed a series of panicked questions about the homeland security threat of dirty bombs. “What are they?”, “what can they...
View ArticleMaking Sense of Mandiant’s Billion Dollar Valuation
The IT security market is popping Champaign corks today in celebration of the tremendous valuation placed on Mandiant. According to the New York Times, FireEye has agreed to pay $1 Billion in cash,...
View ArticleSochi 2014 Threat Overview
Fear Before the March of Flames Even as the flames of the Olympic torch approach their destination in Sochi, Russia, security officials race to respond to emerging threats by non-state actors. Multiple...
View ArticleSomalia Report
This week saw continuing violence throughout the country. The AMISOM and SNA offensive recaptured more keys towns, however, Al-Shabaab is far from defeated with continuing violence in Mogadishu and...
View Article
More Pages to Explore .....