Skip to content
IACSP Journal

IACSP Journal

Journal of Counterterrorism & Homeland Security International

  • CURRENT ISSUES
  • BACK ISSUE PDFS
  • CT NEWS
  • ABOUT
  • MEMBERSHIP
  • CONTACT
  • Log In

CYBER-SECURITY

ISTOCK
CYBER-SECURITY 

Why Password Services Are Still Relevant, Even Though They’re Getting Hacked

October 7, 2022October 7, 2022 admin 119 Views

By David Gewirtz Passwords suck. They do. The idea that we’re hiding critical and confidential information behind two code words

Read more
Osama bin Laden being interviewed by Hamid Mir, circa March 1997 – May 1998. Hamid Mir - http://www.canadafreepress.com/ CC BY-SA 3.0
CYBER-SECURITY TERROR GROUPS 

Get Ready for the Terrorist Avatars

June 27, 2022June 27, 2022 admin 279 Views

By George Michael After the 9/11 attacks, the U.S. government has shown no compunction about eliminating key terrorists. For example,

Read more
SHUTTERSTOCK
CYBER-SECURITY 

Why East/West Russian Relations Are Unlikely To Ever Return To “Normal”

June 27, 2022October 7, 2022 admin 337 Views

By David Gewirtz Here’s the problem with writing about unfolding events for a quarterly magazine: delay time. By the time

Read more
PIXABAY/Shutterstock
CYBER-SECURITY 

The Iranian Cyber Threat: Iranians Indicted for Cyber Operations to Influence the 2020 Presidential Election

February 17, 2022February 17, 2022 admin 463 Views

By Paul Davis While most of the attention has been on Russian interference in the 2020 election, a federal indictment

Read more
CYBER-SECURITY 

Vulnerability Alert: To Date, Log4j May Be the Most Prevalent Vulnerability in History

February 17, 2022February 17, 2022 admin 328 Views

By David Gewirtz As of the time of this writing, a cybersecurity flaw known as Log4j is among the worst

Read more
Shutterstock
CYBER-SECURITY 

Killer Robot Cars: Not A Bad Movie, But The Future Of Terrorism

October 26, 2021October 26, 2021 admin 530 Views 0 Comments

By David Gewirtz So here’s the situation. You’ve worked hard and made enough money to buy yourself a shiny new

Read more
PIXABAY
CYBER-SECURITY 

A New Era of Cyber Vulnerability: A Discussion with Leading Cyber Security Expert Chuck Brooks

August 4, 2021August 4, 2021 admin 1317 Views

By Victoria O’Neill The United States has made a concerted effort to advance its technological prowess in order to gain

Read more
Shutterstock
CYBER-SECURITY 

Ransomware update: Q1 and Q2 2021

August 4, 2021August 4, 2021 admin 473 Views

By David Gewirtz Ransomware attacks seem to have picked up incredible steam in 2021. Whether to pay the ransom is

Read more
PIXABAY
CYBER-SECURITY 

SolarWinds Hack Was the Largest and Most Sophisticated Attack Ever

April 14, 2021April 14, 2021 admin 821 Views

By Paul Davis Back in November of 2019, Microsoft’s President Brad Smith was questioned on 60 Minutes about the SolarWinds

Read more
PIXABAY
CYBER-SECURITY 

Five Ways Internet Activity Has Changed Since The Pandemic

December 21, 2020December 21, 2020 admin 862 Views

By David Gewirtz In our last issue, we discussed the substantial rise in COVID-related scams occurring online. Now, as we

Read more
PIXABAY/SHUTTERSTOCK
CYBER-SECURITY 

When it Comes to COVID-19, Beware of Digital Infections, Too!

September 10, 2020September 10, 2020 admin 970 Views

By David Gerwitz As we approach our seventh month of the COVID-19 crisis, we’re beginning to settle into a bit

Read more
PIXABAY
CYBER-SECURITY 

A Career in Cybersecurity: What is required?

May 25, 2020May 25, 2020 admin 985 Views 0 Comments

By David Gewirtz By 2021, the worldwide need for cybersecurity professionals is expected to reach six million jobs. The gotcha

Read more
shutterstock
CYBER-SECURITY 

Wawa: Anatomy of a Huge Retail Security Breach

February 27, 2020February 28, 2020 admin 893 Views

By David Gewirtz Oddly enough, if it weren’t for Irma, a Category 5 hurricane, our credit card information would right

Read more
pixabay
CYBER-SECURITY 

Self-Driving Cars and Why They Should Scare You

December 11, 2019February 27, 2020 admin 822 Views

By David Gewirtz The problem with self-driving cars, not to overstate the obvious, is that they’re self-driving. There’s an AI

Read more
CYBER-SECURITY 

What Does Facebook’s New Cryptocurrency Mean For Law Enforcement?

October 18, 2019October 21, 2019 admin 824 Views

In May, Facebook officially announced what the rumor mills had been buzzing about for months: its very own cryptocurrency. To find what all that means, and specifically what it means to law enforcement and counterterrorism operations, read on.

Read more
CYBER-SECURITY 

The Case Against WikiLeaks Founder Julian Assange

October 15, 2019October 21, 2019 admin 877 Views

Many journalists have decried the 18-count indictment against 47-year-old Julian P. Assange, claiming the WikiLeaks founder and operator is a journalist and therefore exempt from prosecution for publishing classified information provided to him from a government whistleblower.

Read more

Categories

  • BOOKSHELF
  • CYBER-SECURITY
  • EXPO REVIEWS
  • GLOBAL
  • INTERVIEWS
  • LAW ENFORCEMENT
  • NARCO
  • RADIOLOGICAL
  • REGIONAL AFRICA
  • REGIONAL ASIA
  • REGIONAL CENTRAL AND SOUTH AMERICA
  • REGIONAL EUROPE
  • REGIONAL MIDDLE EAST
  • REGIONAL USA
  • SECURITY
  • SECURITY DRIVER
  • SITREP
  • SNIPER
  • SPECIAL EDITIONS
  • TERROR GROUPS
  • TRAINING
  • Uncategorized

Recent Posts

  • Special Edition Irregular Warfare
  • An IACSP Q&A With Brad Thor
  • Security Driver: Could Poor Sleep Habits Make You A Statistic?
  • Ambush Attacks Of Police In Patrol Vehicles
  • Assessing Sayfullo Saipov’s Vehicular Terrorist Attack, New York City, October 31, 2017
  • The Globalization Of Extreme Right Terrorism
  • Moldova: Influence In Russian Irregular Warfare
  • The Investigative Project Black Market Repatriation Of ISIS Families Fosters New Threats
  • What if China Conducted A CARVER Assessment Of Taiwan?
  • Putin’s Implacable Enemy: Senator John McCain Looked Into Vladimir Putin’s Eyes And Saw Three Letter: a K, a G, and a B
  • Imposter Syndrome Causes A Decline In Leadership
  • Why Password Services Are Still Relevant, Even Though They’re Getting Hacked
  • IACSP Homeland Security Bookshelf
  • SITREP 2nd Qtr 2022
  • IACSP Homeland Security Bookshelf
  • IACSP Q&A With Former CIA Counterterrorism Official Ric Prado
  • Think Like a Spy: Utilizing the CIA’s CARVER Methodology to Assess Strangers
  • Success: Delaware Tactical Unit, a Unified SWAT-Force
  • Russia’s Gray Zone Threat to Bulgaria
  • Russian Information Warfare Against Ukraine
  • CONTACT
  • ABOUT
Copyright © 2023 International Association for Counterterrorism & Security Professionals. All rights reserved.