The so-called “Islamic State” (IS) that has swept into power in parts of Syria and Iraq presents an imminent danger to the global community, with its capacity as an effective, ideologically motivated and bloodthirsty fighting force, coupled with its expanding territorial reach, on the ground and online.
Three U.S. naturalized citizens of Somali descent undertook suicide bombings in Somali on behalf of the Somali terror group al Shabaab. The concern is that U.S.-based individuals would fight in Syria, return to the United States, and participate in a terror attack on U.S. soil.
Hospital Incident Command Systems (HICS) are a component of security and emergency management that is often overlooked in many of the disaster plans in the United States.
Counterterrorist operatives perform drills on securing and neutralizing threats at major target areas. Although this is an extremely important concept to master, often ignored is one of the most important components in community disaster preparedness: the local area hospital.
Male terrorists tend to get most of the press, but terrorist cells are recruiting more women, often due to security forces considering them less suspicious.
The May 2013 edition of the FBI’s Most Wanted Terrorist Listincluded its first woman – Joanne Chesimard, wanted for the 1973 killing of a New Jersey State Trooper.
In the wake of the Boston marathon bombings much attention has focused on domestic and foreign intelligence gathering, analysis, and sharing as well as law enforcement responses to terrorism.
An emerging methodology with technological roots – flash mobs – enables individuals using social networking sites (e.g., Facebook.com, Twitter.com, or Meetup.com), instant messaging and email to gather at a particular location, date and time and carry out legal or criminal activities (e.g., sabotage, robberies, and beatings).
As we approach the tenth anniversary of 9/11, the pervasiveness of terrorism globally, including the United States, continues to threaten government, industry, and society worldwide. Often overlooked is the non-ideological fuel feeding this threat; namely, terror financing. Unlike terror incidents, the characteristics of terror financing are often silent or subdued. Purposefully, terror financiers do not try to attract attention to their activities.
In several recent articles in this magazine, we proposed the need to establish a federally run, full-time, resident, self-contained national academy—the U.S. Homeland Security Intelligence Academy (HSIA)—where students will be
Students gain role models as they view security executives in the classroom. Guest speakers can break negative stereotypes relative to the background, training and activities of security professionals. University
The unabated sectarian violence in Iraq has rekindled suggestions that the country should be partitioned into autonomous regions along its principal religious (Sunni/Shiite) and ethnic (Kurd/Arab) factions. In areas where