Blog

James Feldkamp | Three Common Methods of Modern-Day Terrorism

James Feldkamp | Three Common Methods of Modern-Day Terrorism

The growing recognition of the threat made the authorities focus more on combating international terrorism, developing strategies and executing plans to eradicate the issue. However, since their ideas and cause – and in the long run, their very existence – is on the verge of […]

James Feldkamp | Terrorism and Media as Partners?

James Feldkamp | Terrorism and Media as Partners?

The media plays a vital role in how people communicate today. The speed of how information reaches out to communities is one of the many advantages of media. However, since all manner of groups and communities use it as a tool, negative overtones can’t be […]

James Feldkamp Provides What If Scenario for Belgium Shooting

James Feldkamp Provides What If Scenario for Belgium Shooting

Jim Feldkamp on Surviving Hostile Encounters Like Recent Shooting in Belgium

A gunman in Belgium killed two police officers and a high school student while injuring four others in the heart of Belgium. As we remember the victims and their families, Jim Feldkamp gives quick tips on what ordinary citizens could do in a similar scenario to improve their chances of survival.

Prosecutors said the man followed and attacked the officers from behind with a knife before taking a gun from them and opening fire. The student was shot and killed while sitting in the passenger seat of a parked car as the shooter made his way towards a high school. The shooter also took a hostage at the school before police arrived and shot him.

When faced with the possibility of a seemingly random act of violence in a public place, the FBI’s first piece of advice is to remain aware of your surroundings. When entering buildings and enclosed facilities like stadiums or zoos, always know where the exits are, and the fastest way to get to the nearest one. Likewise, when seated at a restaurant, especially if you’re the only adult at the table, sit facing the front of the establishment so you can keep an eye on the entrance.

Second, be ready to move. If you’re carrying bulky things like a laptop or several documents, a backpack is recommended over an over-the-shoulder messenger bag or purse for better mobility. But if the danger is immediate, be ready to leave heavy items behind and get yourself to safety first. Important items can be recovered afterwards, but your life may not.

Finally, report suspicious activity. In many cases, improvised explosive devices are hidden within everyday objects like cellular phones, laptops, and bags. If you see one being left behind on a train or park bench, refrain from attempting to return the item yourself. Jim Feldkamp advises to call the authorities immediately.

 

James Feldkamp | Terrorism is a Global Problem

James Feldkamp | Terrorism is a Global Problem

In this day and age, although there is still unrest between nations, it has been scaled back into “simple” conflicts and diplomatic rows, instead of full-scale war. However, there is a persistent problem that nations struggle with day-to-day, as it continues to grow – the […]

James Feldkamp | Declassified Information

James Feldkamp | Declassified Information

Jim Feldkamp Sharing of Declassified Information In reaction to the 2017 attacks in the UK, Home Secretary Sajid Javid has recently revealed plans for the MI5 to share declassified intelligence to what he refers to as “multi-agency centers.” James Feldkamp comments on the proposed pilot […]

Jim Feldkamp on June GIFCT Update

Jim Feldkamp on June GIFCT Update

A consortium of tech companies and governments is taking major steps towards blocking terrorist propaganda online. On the surface, the campaign sounds simple and familiar. James Feldkamp weighs in on recent updates announced at the Global Internet Forum to Counterterrorism (GIFCT) hosted by Google last month.

Apart from Google-owned companies like YouTube, the GIFCT’s members include Facebook, Microsoft, Twitter, among many smaller firms. The founding members say they have, “a valuable role to play in supporting other tech companies” who may not have the same resources to address the spread of harmful material on their platform.

The consortium seems to be taking a two-pronged approach to preventing the spread of harmful propaganda material. The first is the use of a simple database of web addresses that Twitter has already developed and blocked on its own platform. A similar approach was taken in the late 1990’s to remove explicit content from search engine results. The second is more targeted to specific content and will make use of ‘hashes’ (a digital fingerprint) to remove of block specific content. These will be shared to all companies in the consortium.

As with explicit content, detractors are concerned of the possibility of creating false positives. For example, parody websites like TheOnion.com sometimes produce content about terrorism that may seem polemic (to put it mildly) on the surface.

With the problem of explicit content in search results, Google eventually changed its algorithm to prevent offending content from appearing in search results without more explicit search queues.

James Feldkamp poses the question, should the same thing be done with radical content? Should users be given the freedom to receive unadulterated terrorism-oriented content if they ask for it explicitly? In the UK, there is already a “Three Strikes” bill that will penalize anyone caught watching “gruesome or inflammatory propaganda.”

 

James Feldkamp Provides Tips on Surviving a Terrorist Attack

James Feldkamp Provides Tips on Surviving a Terrorist Attack

Countering Terrorism and Surviving a Terrorist Attack Counterterrorism is defined as the military tactics, techniques, and strategies that government, military, law enforcement, business, and intelligence agencies use to combat or prevent terrorism and the financing of terrorist attacks. Because terrorism is one of the most […]