Hybrid Warfare – Merging Old & New Age Threats

Since the end of the Second World War, nations around the globe have seen the evolution of computers and the internet. The subsequent informational “melting pot” known as the World Wide Web has created a fertile environment for sharing both critical intelligence and fictitious narratives. When state actors leverage their existing conventional military tactics and combine them with ever-evolving cyber technology, this new hybrid warfare tactic introduces numerous new and increasingly challenging political, psychological, and economic threats.

Uncharted Waters: Volunteers & Active Shooters

Universities often use volunteers to provide assistance in helping keep campuses safe and prepared. Most facilities on campus rely on volunteer crisis managers, crisis coordinators, fire wardens, or similarly named individuals to help with various emergency preparedness and response efforts – especially with evacuations. Some larger, or specialized facilities, have full-time building managers or engineers, who have emergency preparedness and limited response responsibilities. Additional volunteers can also fill such gaps with expanding roles and responsibilities.
Hacker standing in the tunnel

Core Principles of Threat Management Units

Homeland security is a complex and ever-evolving challenge whose mitigation necessitates the actions and collaboration of personnel across all branches of government and the private sector. This enhanced complexity presents law enforcement, homeland safety, and security professionals with a myriad of challenges due to an environment overflowing with existential and hybrid threats, technological innovation, interconnectivity, and limited resources.transition done in the perceived safety of a child’s home under the supervision of his/her parent was and remains fraught with inherent danger.
Translate »