Security

Russia, Pakistan, North Korea: Nuclear Powers at Play

Russian President Putin engaged in a bit of saber rattling when he announced that Russia would field more than 40 new intercontinental ballistic missiles...

The Reluctant Dragon: Chinese Intelligence and Global Priorities

While China has accepted human security as a new framework to study modern security challenges, it has been very busy trying to show how...

Geopolitical Research: To Quantify or Not to Quantify?

As I have explained before, geopolitics can have a wide array of meanings and concepts. However, what about when we seek to apply geopolitics...

The False Diplomacy of Torture

So the United States Senate released its report highlighting extreme and supposedly ‘abhorrent’ techniques used on terrorist targets after 9/11 to glean greater intelligence...

Islamic terrorism and organized crime threaten Balkans

The cooperation of Islamic terrorists and organized crime could develop in to a significant threat for the security of the region of South East...

Russian Spetsnaz – Ukraine’s Deniable ‘Little Green Men’

In February 2013 the influential Moscow based ‘Military Industrial Courier’, published an article by Russia’s Chief of the General Staff, army General Valery Gerasimov....

Jihadi Janes and Johns: The Seduction of the Islamic State for ‘Westerners’

Media outlets and government circles cringe when trying to understand why Westerners leave the West to go fight in Syria and Iraq with the...

The Metrics: Reload. How much from online activism to actual manifestation?

Social movements are usually understood as a positive aspect of democracy and international community takes kindly to the use of media – especially social...

A Ticking Time Bomb – Understanding Radicalization

For the past decade the issue of radicalization has been grabbing attention of the international media. Global terrorist attacks such as the Boston marathon...

“Top Secret” Turkey is No Secret

In 2013, Turkey hosted about a dozen conferences on cyber security and new technologies to counter cyber threats. In a speech at the end...

Latest