TrapWire MENU

TrapWire Articles

Who Defines a Hard Target?

Understanding the motivation and rationale for a criminal event – be it a school shooting, an armed robbery, or a terrorist attack – is as much art as it is science. It is easy to dismiss every school shooting as a violent cry for help by a mentally unstable individual, every robbery as an act of greed, and every Middle East terror event as being “jihadist” inspired. There are, of course, numerous examples to fit these paradigms; however, this simplistic rationalization risks missing the forest for the trees. … [READ MORE]

Cyber Attacks and Social Engineering: Hackers Target People, Not Just Systems

At its core, espionage is social engineering. Despite the Hollywood film and spy thriller depictions, being a good spy relies much more on understanding and manipulating people than on sophisticated technological gadgets. … [READ MORE]

TRAPWIRE Launches New Threat Detection System

Our clients are collecting and managing hundreds of threat reports covering criminal activity, terrorist planning and insider threats. Since each of these reports could represent a potential disaster for their organization, they needed a capability to detect threats within this data quickly and efficiently. The release of TrapWire 7.0 will dramatically improve their ability to detect and preempt threats to their personnel and facilities. … [READ MORE]

Berlin Attack Fits Recent Terror Pattern

The attack against a Christmas market in Berlin follows an all too familiar pattern. … [READ MORE]

A New Approach to Public Safety

Business Executives for National Security (BENS) released an Issue Paper yesterday advocating for a new, networked approach to public safety. This approach focuses on the development of public/private partnerships to improve America’s ability to address an increasingly complex threat environment. … [READ MORE]

Potential Security Threats Posed by Social Media and Other Apps

TRAPWIRE bulletin regarding the Pokemon Go app. … [READ MORE]

Public-Private Information Sharing: Early Threat Detection Extends Beyond Terrorism

As we have seen since our first deployment in 2009, tips and leads from citizens often lead to robust investigations, whether related to terrorism or not. … [READ MORE]

The Pre-Attack Sequence

Understanding the goals (and limitations) of hostile reconnaissance operations should be part of every law enforcement and private security training program. While their intelligence collection practices are critical to their success, they also represent a major vulnerability. Knowing how to exploit that vulnerability is key to establishing an effective defense against terrorism. The first step in that process is understanding the Terrorist Pre-Attack Sequence. … [READ MORE]

12