Monthly Archives: May 2013

Atoms for Turkey: Ankara’s Struggle for Nuclear Energy

Posted on May 30, 2013 at 6:54 pm

The decision by Turkey and Japan to restart exclusive bilateral negotiations for a $20-billion tender for the development of a second nuclear power plant on the Sinop site was announced in early May, as a part of the government’s plans to lessen its dependence on imported energy. The agreement aims to strengthen Turkey’s already ambitious nuclear efforts, consisting of an agreement with a Russian consortium for the development of 4 VVER-1200 reactors near town of Mersin on Turkey’s Mediterranean coast. With the 1st of the four VVER reactors expected to be operational your time before 2023, this decision marks further progress along these lines, and while this has raised some concerns within the context of ongoing tension with Iran over its nuclear programme, Turkey’s current trajectory doesn’t suggest a rustic keen to procure a reactor with a view to gain a nuclear-weapons capability. Instead, Ankara’s actions seem like in keeping with it historical method of nuclear energy.

Turkey’s historic energy poverty has fuelled the country’s ambitions to set up nuclear power plants for with regards to five decades. Despite the hampering of its efforts over this era by political instability and unrealistic tender demands, Ankara has continued to advocate for the construction of nuclear energy, arguing that the procurement of reactors is significant to national economic growth.

Posted in Security Systems

The Woolwich Murder: Initial Assessments of Another Lone Actor Attack

Posted on May 29, 2013 at 4:57 pm

From film and eye-witness footage, it’s quite clear that the perpetrators of the Woolwich attack were motivated for terrorist ends. The craze is now quite apparent, as is their intended objective of sowing societal discord.

Woolwich Help for Heroes Tributes Yesterday afternoon two individuals done a brutal attack on an off-duty British soldier. They then calmly announced what that they had done to the encompassing crowd. This has sparked a reaction with the English Defence League (EDL), while separately people are supposed to have attacked mosques.  The assault  looks just like the culmination of trends which have become increasingly visible in violent Islamist terrorism of late.

This isn’t the first time that such attacks or targeting has taken place. In May 2010, Roshonara Choudhry took a knife she had bought at Tesco and stabbed Stephen Timms MP. When asked about her motivation, she pointed to the truth that he had voted for the Iraq War. By her own admission, she had devised the punishment having watched videos by Anwar al Awlaki online. Targeting off-duty soldiers may be not new: within a British context there’s the case of Parviz Khan who was plotting to kidnap and behead a British soldier in Birmingham .He was disrupted before he could successfully perform his attack, but Mohammed Merah a 23-year-old French-Algerian was more successful. Having identified individuals  through online activity at home in Toulouse and Montauban, he shot and killed three soldiers, before targeting a Jewish school and murdering three children and a teacher.

The key elements in all of those incidents is that subsequently little or no evidence emerged that these individuals have been tasked to hold out their incidents. There has been verification that Merah and Khan had made connections to extremist groups abroad, but none were tasked to do what they did. Choudhry nevertheless has up to now had no links identified and no apparent direction beyond her own. It sort of feels possible that the individuals in Woolwich may fall somewhere within this spectrum – possibly connected to radical groups either within the UK or abroad, but unlikely to have received much direction or tasking. When taking a look at orchestrated plots from abroad, the tendency have been for larger scale operations targeting higher profile institutions, individuals and frequently deploying bombs.

In parallel to this trend of lone actor (or small cell) terrorism and not using a clear command and control, there was a growing tendency towards the targeting of more local targets and domestic military sites. In a up to date case in Luton, a bunch of guys mentioned driving a handheld remote control car laden with explosives right into a local Territorial Army barracks. A separate group in Birmingham drove to Dewsbury planning on targeting an English Defence League (EDL) march at which they hoped find the organisations leader. Or even Roshonara Choudhry’s selection of a random MP (amongst many) to punish for Iraq, all appear to suggest a targeting that’s maybe seen as being a part of a grander picture to the person, but in expression seems random and really local.

A consequence of the attack is that it can incite hatred and anger between and among communities. The EDL have reacted to this recent incident vociferously and individuals have sought to attack mosques.

These trends was increasingly visible before few years. From a safety perspective, the dilemma is 2-fold. At the one hand, tips on how to identify lone actor terrorists who may feature in a bigger intelligence picture, but do little to differentiate themselves from the gang. And at the other, the best way to manage societal tensions when extremists on each side prove desirous to incite violent reactions in others.

Further Analysis: , , ,

Bookmark and Share

Posted in Security Systems

Transnational Organised Crime and Security

Posted on May 28, 2013 at 11:00 am

A dedicated introduction to the RUSI Journal series ‘Transnational Organised Crime and Security’, with Guest Editor Frank Madsen of the University of Cambridge. Jnl 1582 TOC Series Introduction Fade

Download this publication

Further Analysis: ,

Posted in Security Systems

Ground Surveillance Systems

Posted on May 24, 2013 at 2:28 pm

A far reaching run of secret transmitters are ready in both High Definition (Hd) and Standard Definition (Sd) empowering Ecs to furnish observation results for an extensive variety of situations.

Ground Cofdm computerized supplies incorporates uplinks and downlinks, altered base stations, folder case and handheld beneficiaries.

The Ecs computerized ground transmitters shift in size and control yield. Ground connections could be utilized within a multicast mode utilizing omni-directional recieving wires or in a focus to focus mode utilizing directional reception apparatuses.

The greater part of our secretive items are constructed to a towering ingression insurance (Ip) rating permitting the units to be form worn or sent into a strategic range of investment.

Established in 1988, Ecs set development and infrastructure at the cutting edge of its operations. The designing group joins a portion of the most encountered people in correspondence building.

Posted in Security Systems

Welcome to Security IT!

Posted on May 20, 2013 at 12:40 pm

Welcome to Security IT! Search for news and information for Aircraft Downlink and Digital Ground Transmitters, Digital Receivers, UAV Systems, Maritime Security, Force Protection, VVIP Protection, Mobile Phone Jamming and Vehicle Jammers.



Posted in Security Systems