Archive | Commentary and Analysis

Using the Islamic State’s Strengths and Malevolence Against Them

By Brett Daniel Shehadey
Special Contributor for In Homeland Security

The Islamic State, even more than other jihadist movements, is part of a larger international jihadist revolutionary process. Its sole success depends on using its weaknesses as strengths and  its enemy’s strengths as weaknesses. It then attempts to defeat its opponents through stratagem over time—mind and mobility over weaponry and columns—the classic guerrilla formula.

Continue Reading 0
Cyber Privacy

Cyber Privacy Forecast: Stormy Weather Ahead

By Margaret Rutter Foltz
Faculty Member, School of STEM at American Public University

What will we read in the news today? Which bank, government or private entity was recently breached?   How many individual identities were stolen? Were medical records compromised? How are we protected?

Digital infrastructure across all sectors (government, communications, education, health care, finance, transportation, etc.) gets adopted at a rapid pace, producing “big data” – a universal term expressing the exponential growth and availability of all kinds of data.

Continue Reading 0