Protecting Our Churches In 2025
Back in 2014, a retired Jewish corrections captain, whose beat had been the Tombs (the commonly used name for the
Read moreBack in 2014, a retired Jewish corrections captain, whose beat had been the Tombs (the commonly used name for the
Read moreIn a crisis, people don’t rise to the occasion—they default to the level of their preparation. In today’s complex and
Read moreOn February 27, 2025, the U.S. Justice Department announced that a former U.S Navy sailor had pleaded guilty in federal
Read moreGlobal Overview 2025 CrisisWatch sees a resolution opportunity for the Democratic Republic of Congo and Rwanda, as the two countries
Read moreMuch in the news is the present U.S. approach to the Venezuelan transnational gang, Tren de Aragua or TdA (also
Read moreThe risk of insider risks by disgruntled, politically extremist, and foreign agent current or former employees, whether in government, the
Read moreReviewed by Dr. Joshua Sinai The column capsule reviews 20 books. They are arranged topically by terrorism – general, radicalization
Read moreDavid McClosky, the author of three fine CIA spy thrillers, “The Seventh Floor,” “Moscow X,” and “Damascus Station,” is a
Read moreGlobal Overview 2025 Crisis Watch’s conflict tracker highlights one resolution opportunity and seven conflict risks in 2025. Marking a major breakthrough, Israel and Hamas struck a ceasefire
Read moreCounterterrorism & Homeland Security Bookshelf Reviewed by Dr. Joshua Sinai This column capsule reviews 13 books on counterterrorism, military warfare,
Read moreOn December 4, 2024, Luigi Nicholas Mangione, 26, of Towson, Maryland, allegedly intentionally killed UnitedHealthcare executive Brian Thompson, in Midtown
Read moreThe first six months of a new presidential administration represent a critical period of transition and action. During this time,
Read moreOn January 1, 2025, the FBI released a statement on the terrorist attack in New Orleans: “Today, at approximately 3:15
Read moreIrregular Warfare continues to struggle with the proper balance between traditional concerns, as embodied in the five core activities –
Read moreArrested in 2003 for a number of earlier murders, Charles Sobhraj served 19 years before being extradited to France in
Read moreIn the world of espionage and corporate security, the extraction of sensitive information often begins with a simple conversation. What
Read more“Stress is essential to leadership. Living with stress, knowing how to handle pressure, isnecessary for survival.”– James Stockdale Leadership in
Read moreThis article profiles the Irish Republican Army (IRA), which existed from 1969 to 1997, when it was dissolved following a
Read moreOperation Trapiche revealed the shadow of Iran behind the failed Hezbollah plot in Brazil. According to Brazilian Federal Police documents
Read moreIn contemporary politics, the phrase “if you throw enough mud, sooner or later it will stick” is often invoked to
Read moreAn IACSP Q&A With Craig Whitlock, the Author of “Fat Leonard: How One Man Bribed, Bilked and Seduced the U.S.
Read moreArtificial intelligence (AI) is rapidly transforming modern warfare, offering both incredible advantages and significant threats. While militaries around the world
Read moreCounterterrorism & Homeland Security Bookshelf Reviewed by Dr. Joshua Sinai The column capsule reviews eight books. Richard J. Chasdi,
Read moreFinding a true expert to provide an objective opinion on the future of Artificial Intelligence (AI) can be challenging. It’s
Read moreBy Salem Bahfi Recent Huthi escalation in the Red Sea and active involvement in the Gaza conflict has led to
Read moreReview by George Michael Soon after Russian Vladimir Putin launched a full-scale inva sion in February 2022, a broad coalition
Read moreBy David Gewirtz In today’s interconnected world, social media platforms have become central to how individuals communicate, share information, and
Read moreBy Dr. Joshua Sina Effectively managing disorderly protesting crowds is especially crucial in the period following Hamas’s hundreds of fighters
Read moreBy David Gewirtz The rapid digitalization of government services, coupled with the global proliferation of interconnected technologies like IoT and
Read moreBy Dr. Joshua Sinai The exploitation of buildings’ security systems by employees who embark on violent attacks against their colleagues
Read more