Cyber intelligence and international security: breaking the legal and diplomatic silence?
In cyberspace intelligence agencies, rather than militaries, are the most prominent security actors. However, many cyber operations conducted by intelligence agencies are not ‘classic’ espionage activities, but may be best described as digital covert action (sabotage, subversion, information...
Urban Terror: The Case of Lone Wolf Peter Mangs
White racist serial killer Peter Mangs is the most politically conscious lone wolf terrorist Sweden has seen thus far. Adopting the tactics of Joseph Paul Franklin to the city of Malmö, Mangs committed at least three murders and twelve murder attempts between 2003 and 2010. Well-versed in white...
Automatic Gait Recognition and its Potential Role in Counterterrorism
Closed-circuit television footage can be used to assemble an often complex picture of an incident and aid in the identification of suspects after a crime or terrorist attack has occurred. For example, such footage allowed the police to not only identify the 7/7 London bombers but also to piece t...
Catastrophe risk, insurance and terrorism
This article empirically investigates how the terrorist activity of September 11, 2001, was addressed by the insurance industry and government in the United States. It shows that the insurance system worked reasonably well in compensating losses suffered, albeit with various tribulations. It als...
Confronting Apocalyptic Terrorism: Lessons from France and Japan
Terrorists who believe they have a role to play in bringing about the apocalypse pose a serious threat to countries around the world. In their quest to eradicate this especially pernicious form of terrorism, states, including liberal democratic ones, confront the understand able temptation to eli...
Showing 50 from 1505

