Skip to content
IACSP Journal

IACSP Journal

Journal of Counterterrorism & Homeland Security International

  • SPECIAL REPORTS
  • JOURNAL ARCHIVES
  • CT NEWS ARCHIVES
  • THREATCON ARCHIVES
  • IACSP NORDIC CHAPTER NEWS
  • MEMBERSHIP
  • ABOUT
  • CONTACT
  • Log In

CYBER-SECURITY

CYBER-SECURITY GLOBAL REGIONAL USA SECURITY 

It’s The First Six Months Of A New Administration: What Does That Mean For America’s Cyber Defenses?

February 16, 2025February 16, 2025 admin 579 Views 0 Comments

The first six months of a new presidential administration represent a critical period of transition and action. During this time,

Read more
CYBER-SECURITY 

How Adversaries Can Weaponize AI And What Commanders Must Do To Counter It

October 31, 2024February 16, 2025 admin 759 Views

Artificial intelligence (AI) is rapidly transforming modern warfare, offering both incredible advantages and significant threats. While militaries around the world

Read more
PIXABAY
CYBER-SECURITY INTERVIEWS SECURITY 

Challenges and Advancements of AI Applications in National Security: An Interview with Chuck Brooks by Thalia Rodriguez

July 12, 2024July 12, 2024 admin 813 Views

Finding a true expert to provide an objective opinion on the future of Artificial Intelligence (AI) can be challenging. It’s

Read more
CYBER-SECURITY 

The Role of Social Media Platforms in Countering Online Radicalization and Recruitment

July 11, 2024July 11, 2024 admin 717 Views

By David Gewirtz In today’s interconnected world, social media platforms have become central to how individuals communicate, share information, and

Read more
CYBER-SECURITY 

Top Cyberwarfare Challenges Facing Governments in 2024

March 6, 2024March 6, 2024 admin 787 Views

By David Gewirtz The rapid digitalization of government services, coupled with the global proliferation of interconnected technologies like IoT and

Read more
Shutterstock
CYBER-SECURITY 

AI On Both Sides: How AI Is Being Used In Cyberattack Situations By Both Attackers And Defenders

November 8, 2023March 6, 2024 admin 879 Views

By David Gewirtz When it comes to cybersecurity, AI presents a paradox: while it fortifies cyber defenses, it also empowers

Read more
chatgpt_iacsp
CYBER-SECURITY 

The Security Implications Of ChatGPT:
A US Government Agency Perspective

July 7, 2023November 8, 2023 admin 1510 Views

By David Gewirtz The advancement of artificial intelligence (AI) has given rise to chatbots like ChatGPT, which can converse with

Read more
iStockphoto
CYBER-SECURITY REGIONAL ASIA 

North Korea: Crypto’s Biggest Loser

February 7, 2023 admin 1057 Views

By Luke Bencie and Elissa Johnson With the two trillion-dollar crash of cryptocurrency in 2022, most casual observers would be

Read more
AMAZON TRAINING
CYBER-SECURITY 

Two Quick, Free And Fun Cybersecurity Refresher Courses

February 7, 2023February 7, 2023 admin 851 Views

by David Gewirtz Amazon, in partnership with nonprofit National Cybersecurity Alliance, is now offering a couple of free cybersecurity awareness

Read more
ISTOCK
CYBER-SECURITY 

Why Password Services Are Still Relevant, Even Though They’re Getting Hacked

October 7, 2022October 7, 2022 admin 913 Views

By David Gewirtz Passwords suck. They do. The idea that we’re hiding critical and confidential information behind two code words

Read more
Osama bin Laden being interviewed by Hamid Mir, circa March 1997 – May 1998. Hamid Mir - http://www.canadafreepress.com/ CC BY-SA 3.0
CYBER-SECURITY TERROR GROUPS 

Get Ready for the Terrorist Avatars

June 27, 2022June 27, 2022 admin 1316 Views

By George Michael After the 9/11 attacks, the U.S. government has shown no compunction about eliminating key terrorists. For example,

Read more
SHUTTERSTOCK
CYBER-SECURITY 

Why East/West Russian Relations Are Unlikely To Ever Return To “Normal”

June 27, 2022October 7, 2022 admin 1091 Views

By David Gewirtz Here’s the problem with writing about unfolding events for a quarterly magazine: delay time. By the time

Read more
PIXABAY/Shutterstock
CYBER-SECURITY 

The Iranian Cyber Threat: Iranians Indicted for Cyber Operations to Influence the 2020 Presidential Election

February 17, 2022February 17, 2022 admin 1460 Views

By Paul Davis While most of the attention has been on Russian interference in the 2020 election, a federal indictment

Read more
CYBER-SECURITY 

Vulnerability Alert: To Date, Log4j May Be the Most Prevalent Vulnerability in History

February 17, 2022February 17, 2022 admin 1107 Views

By David Gewirtz As of the time of this writing, a cybersecurity flaw known as Log4j is among the worst

Read more
Shutterstock
CYBER-SECURITY 

Killer Robot Cars: Not A Bad Movie, But The Future Of Terrorism

October 26, 2021October 26, 2021 admin 1260 Views 0 Comments

By David Gewirtz So here’s the situation. You’ve worked hard and made enough money to buy yourself a shiny new

Read more
PIXABAY
CYBER-SECURITY 

A New Era of Cyber Vulnerability: A Discussion with Leading Cyber Security Expert Chuck Brooks

August 4, 2021August 4, 2021 admin 2000 Views

By Victoria O’Neill The United States has made a concerted effort to advance its technological prowess in order to gain

Read more
Shutterstock
CYBER-SECURITY 

Ransomware update: Q1 and Q2 2021

August 4, 2021August 4, 2021 admin 1031 Views

By David Gewirtz Ransomware attacks seem to have picked up incredible steam in 2021. Whether to pay the ransom is

Read more
PIXABAY
CYBER-SECURITY 

SolarWinds Hack Was the Largest and Most Sophisticated Attack Ever

April 14, 2021April 14, 2021 admin 1490 Views

By Paul Davis Back in November of 2019, Microsoft’s President Brad Smith was questioned on 60 Minutes about the SolarWinds

Read more
PIXABAY
CYBER-SECURITY 

Five Ways Internet Activity Has Changed Since The Pandemic

December 21, 2020December 21, 2020 admin 1496 Views

By David Gewirtz In our last issue, we discussed the substantial rise in COVID-related scams occurring online. Now, as we

Read more
PIXABAY/SHUTTERSTOCK
CYBER-SECURITY 

When it Comes to COVID-19, Beware of Digital Infections, Too!

September 10, 2020September 10, 2020 admin 1695 Views

By David Gerwitz As we approach our seventh month of the COVID-19 crisis, we’re beginning to settle into a bit

Read more
PIXABAY
CYBER-SECURITY 

A Career in Cybersecurity: What is required?

May 25, 2020May 25, 2020 admin 1736 Views 0 Comments

By David Gewirtz By 2021, the worldwide need for cybersecurity professionals is expected to reach six million jobs. The gotcha

Read more
shutterstock
CYBER-SECURITY 

Wawa: Anatomy of a Huge Retail Security Breach

February 27, 2020February 28, 2020 admin 1563 Views

By David Gewirtz Oddly enough, if it weren’t for Irma, a Category 5 hurricane, our credit card information would right

Read more
pixabay
CYBER-SECURITY 

Self-Driving Cars and Why They Should Scare You

December 11, 2019February 27, 2020 admin 1499 Views

By David Gewirtz The problem with self-driving cars, not to overstate the obvious, is that they’re self-driving. There’s an AI

Read more
CYBER-SECURITY 

What Does Facebook’s New Cryptocurrency Mean For Law Enforcement?

October 18, 2019October 21, 2019 admin 1426 Views

In May, Facebook officially announced what the rumor mills had been buzzing about for months: its very own cryptocurrency. To find what all that means, and specifically what it means to law enforcement and counterterrorism operations, read on.

Read more
CYBER-SECURITY 

The Case Against WikiLeaks Founder Julian Assange

October 15, 2019October 21, 2019 admin 1605 Views

Many journalists have decried the 18-count indictment against 47-year-old Julian P. Assange, claiming the WikiLeaks founder and operator is a journalist and therefore exempt from prosecution for publishing classified information provided to him from a government whistleblower.

Read more

Categories

  • CT BOOKSHELF
  • CYBER-SECURITY
  • EXPO REVIEWS
  • GLOBAL
  • INTERVIEWS
  • LAW ENFORCEMENT
  • NARCO
  • RADIOLOGICAL
  • REGIONAL AFRICA
  • REGIONAL ASIA
  • REGIONAL CENTRAL AND SOUTH AMERICA
  • REGIONAL EUROPE
  • REGIONAL MIDDLE EAST
  • REGIONAL USA
  • SECURITY
  • SECURITY DRIVER
  • SITREP
  • SNIPER
  • SPECIAL EDITIONS
  • TERROR GROUPS
  • TRAINING
  • Uncategorized
Safeloc

Recent Posts

  • Competence: The Hidden Variable In High-Stakes Leadership
  • Raven Pleads Guilty: Former U.S. Navy Sailor Planned Attack On Naval Station Great Lakes 
  • SITREP 2nd Qtr 2025
  • Tren de Aragua (TdA) Of Venezuela: The Emergence Of An Analytical Challenge
  • Assessing And Profiling Non-Violent Insider Risk Actors In National Security
  • Counterterrorism & Homeland Security Bookshelf
  • An IACSP Q&A With David McCloskey, Former CIA Analyst And Author Of The CIA Thriller “The Seventh Floor.”
  • Protecting Our Churches In 2025
  • SITREP 1st Qtr 2025
  • IACSP Homeland Security Bookshelf V29N3 2025
  • Assessing Workplace Violence Against Lone Workers In The HealthCare Sector
  • It’s The First Six Months Of A New Administration: What Does That Mean For America’s Cyber Defenses?
  • The FBI Is Investigating The Terrorist Attack In New Orleans As The FBI’s Counterterrorism Division Turns 25
  • Dragon’s Gambit: China’s Gray Zone Strategy In The South China Sea
  • Illicit Gain: Gold Smuggling Political-Criminal Nexus in Nepal
  • The Art Of Elicitation: Leveraging The CARVER Methodology In Espionage And Security
  • Leadership Under Pressure: Lessons From The Stockdale Paradox
  • Profiling the Irish Republican Army (IRA) (1969-1997)
  • Tehran’s Shadow Over Failed Hezbollah Attacks In Latin America
  • What Do The European Elections Results Tell Us?

  • CONTACT
  • ABOUT
Copyright © 2025 International Association for Counterterrorism & Security Professionals. All rights reserved.