Browsing Category
Categories
Radicalisation of the young in prison – How can we reform this breeding ground of radicalisation?
When aiming to address radicalisation processes, it is crucial to take a close look at the prison environment, where complex social processes are in place. They need to be taken into account in order to combat threatening downward spirals of criminality. Radicalisation in prisons is not a new phenomenon but it is a well-known breeding
Trojan horse software
Trojan horses are a vital tool to ensure direct surveillance over a targeted user or networks. They are sophisticated enough to penetrate common security and encryption measures and therefore able to monitor everything of importance. Trojan horses are defined as malicious computer programs, which hide from the users they infect or mislead them regarding their
Prevention of violent extremism and radicalisation that lead to terrorism
In the last decade practically no country has been unaffected by some kind of violent extremism. Suspicion has spread between religions and among ethnic groups, fear was caused by terrorists. States are still looking for a proper approach regarding this issue. However, there is no easy solution to the problem. Defining the Problem: Terrorism, violent
Perimeter Security Solutions
Protecting critical assets like government buildings, airports, penal institutions, power plants or industrial properties with high security requirements is a matter of great concern. Perimeter protection is the first line of defence in providing physical security and minimizing damage. The perimeter of a building is the area around the construction and the property. Perimeter protection
Drone surveillance
Surveillance drones can be used for monitoring of individuals and groups as well as for reconnaissance. Drones can be classified by their size and, depending on the purpose, be equipped with different sensors. This article provides an overview of the latest technologies in the field of drones. In recent years, a strong trend can be
Access Control
Access control describes the selective control of entry or restriction to a certain area or resource and can therefore also encompass digital information and physical security. Individuals are being validated and authorized if they can confirm their true identity. Mechanisms that limit access and perform various forms of authorization verification, accountability and approval are generally
Main challenges towards the European Security Union
In 2015 the idea of a European Security Union was officially announced. Therein, the ambitious plan to tackle organised crime, terrorism, money laundering, radicalisation and illegal weapon trade but also border security and disaster resilience was introduced. At the same time, strengthening the resilience and building a stronger defence against those threats is a vital
Perimeter Security
Perimeter security can either be achieved with constructional measures or via aerial surveillance, depending on the area or building that needs to be protected. Perimeter protection is the first line of defence and it is primarily used for surveillance to prevent intrusion attempts into this outermost protection zone and to maximize intervention time. Perimeter security
Overview of the European Agenda on Security
Modern threats have many faces. Among those are organised crime, cybercrime and terrorism, border security and foreign fighters, international smuggling, trafficking, propaganda, and radicalization. The European Agenda on Security was established to replace the previous internal security strategy to unite Member States in their quest for peace. Guidelines, key principles, tools and agencies will set
Policing the Dark Web
Understanding and keeping up with developments of the World Wide Web is one thing, but tracing dynamics of the Dark Web becomes even more complex. Technological expertise and cooperation on the international level are indispensable prerequisites for establishing a robust approach in prosecuting and inhibiting cybercrime of the Dark Web. The surface web which is