Inside The Shadow Economy

By David Lake It costs money to commit acts of terrorism and field armies to fight the battles of jihad. The cost to pay for fighters, food, equipment, lodging, training, deployment and medical services for the jihadist by the controlling organisation or group is not cheap. When operating beyond the borders of the sponsor of terror, the costs can be five times as much as it would cost to conduct a local operation. For … [Read more...]

Intelligent Public Safety – Brains Over Brawn

By Richard Kay The operational environment can be a dangerous place, with interpersonal conflict and violence being very real potential risks to officers as well as the public. Officers require practical solutions to resolve situations and confrontations, and that requires the ability to act from the basis of a planned approach involving strategic thinking. To teach officers how to act, it is important to teach them how … [Read more...]

The Immediate Future of Passenger Screening

By Steve Lawson In July 2015, I wrote an article ‘The Future Of Passenger Screening’ that reviewed the International Air Transport Association (IATA) and the Airports Council International (ACI) joint Smart Security project. The idea of the project, according to IATA, “envisions a continuous journey from curb to airside, where passengers proceed through security with minimal inconvenience, where security resources are … [Read more...]

Protecting The Security Industry Workforce

It is common place for employers and principal contractors to drive down employment costs by illegitimately disguising workers as independent contractors, particularly in sub-contracting out the works required. The security industry is vulnerable to ‘turning a blind eye’ to the compliance with the Fair Work in competing for security work. At this year’s Security Exhibition and Conference (26-28 July), Greg … [Read more...]

Confronting an ISIS Emir: ICSVE’s Breaking the ISIS Brand Counter-Narrative Videos​

Most experts agree that the most successful counter-messaging campaigns against ISIS are the ones that utilize the voices of insiders: the voices of ISIS victims and ISIS cadres themselves who have first-hand knowledge of the group’s brutality, corruption, religious manipulation, and deception. In this regard, we at the International Center for the Study of Violent Extremism (ICSVE) have spent the last two years … [Read more...]

A Strategic Approach To Physical Security

By Tony Haddad Physical security assets are often high-value assets of significance to an organisation, and are costly to procure and maintain. When seeking to secure budget approval of a new security system, the typical business case will focus on the cost of installation. The client will traditionally document the requirements, at times with the assistance of a specialised security consultant, and these requirements … [Read more...]

Ergonomically Designed Workstation Can Improve Productivity

By Morris Jacobs Security businesses are no different to any other business in that the people who work in them want to be treated well. If business owners wish to get the best out of their staff, they need to listen actively to staff concerns, express gratitude for a job well done and be willing to compromise when necessary. The positive momentum and enhanced morale engendered by kind and fair treatment lead directly … [Read more...]

Homegrown ISIS Inspired and Directed Terror Attacks—the New Normal?

As the Syrian and Iraqi battlefields come under heavy siege and ISIS continues to sustain substantial losses, it leaders are calling for and even directing, via encrypted social media apps, homegrown terrorism in the West. As a rest, we have seen airports attacked in Brussels and Istanbul; pedestrians mown-down in Nice; an attempted IED explosion in Canada; a massacre in Bangladesh - the list goes on. And it begs the … [Read more...]

Security In Emergencies

There is, or there should be, a strong bond between security and emergency management. Security is predominantly about prevention and emergency management about the response, but they overlap in that both need prior planning, training, procedures and interoperability and both should be concerned with the before and after aspects of an incident. Unfortunately, there is often a significant disconnect, particularly where … [Read more...]

Open Hand Versus Closed Fist – Practical Application For Public Safety

Many operational safety training programs still teach closed fist strategies to officers for resolution of violence and subject control. However, with the increased incidence of severe and sometimes lethal consequence of closed hand attacks, there is little logic in officers using closed hands for control when open hands are far safer and more versatile. With regard to the open hand versus closed hand striking debate, … [Read more...]

In-Flight Revenue Risks

In-flight purchases are an important revenue stream for airlines globally, with the function allowing passengers to purchase duty free items and on-board upgrades, as well as other services such as additional food, beverages, internet and telephone use. While such features are convenient for passengers, they can be susceptible to a number of risks, including staff pilferage, passenger theft of goods/services, counterfeit … [Read more...]

ISIS Defectors: Inside Stories of the Terrorist Caliphate

ICSVE is proud to announce their new book! The authors hadn’t intended to put themselves in danger but that’s what happened as they interviewed an unprecedented thirty-two battle-hardened defectors about the gritty details of life inside ISIS. With unparalleled breadth, depth and access, ISIS Defectors: Inside Stories of the Terrorist Caliphate offers a compelling view of ISIS from men, women and teens now in hiding, … [Read more...]

Help Recognize Australia’s Unsung Heroes

  Would you attempt to stop a man who had just set fire to both a petrol station and a liquor store while also attempting to burn the store attendant? Would you run towards a burning car in an effort to stop the LPG gas tank from exploding to save a complete stranger? Would you use your own body to shield someone you have never met from an enraged group of men, receiving serious injuries in the … [Read more...]

Conflict And Cameras: Facing The Reality Of Social Media

  Technology can benefit public safety operations in many ways. With advances in technology increasing at a staggering rate, there are many options available for public safety agencies to increase operational efficiency. However, point-of-view (POV) technology is now prevalent in people’s daily lives and, in the age of smartphones and CCTV, security personnel need to understand that they are always under scrutiny. … [Read more...]

The New Video Compression – HEVC / H.265

  Video compression has come a long way since the introduction of the first digital transmission, the Integrated Services Digital Network (ISDN), back in the 1980s. Utilising (now long forgotten) H.261, a video compression standard used mostly for video conferencing, it was introduced by the CCIR (Consultative Committee on International Radio) group, which later became known as ITU (International Telecommunication … [Read more...]

ISIS’s Revenues include Sales of Oil to the al-Assad Regime

For months now disaffected Syrian, ISIS defectors we have been interviewing in our ISIS Defectors Interview Project have been telling us that one of the many reasons that they became disenchanted with ISIS was that their leaders were directly negotiating and selling oil to their enemy, Bashar al-Assad—oil that was then used in barrel bombs that rained back down on the Sunnis uprising against the Assad regime.[1] This week … [Read more...]