This article will detail a number of ways in which houses of worship can better protect themselves from deadly attacks. It applies to any house of worship and any religion, from mosques, churches and synagogues to temples, shrines and any other type of religious gathering place. I don’t just want to give you some general,… Read More How To Protect Houses of Worship
As the magnitude of the worst anti-Semitic attack on a Jewish organization in US history is sinking in, many Jewish organizations are asking how they can better protect themselves. With this in mind, I wanted to inform and empower Jewish organizations on how they can do this. Beyond being born and raised in Israel and… Read More How To Protect Jewish Facilities
I have two important recommendations to make today. The first one is easy. If you haven’t done so yet, stop what you’re doing and go get Chasing Shadows by Fred Burton. Fred is the Chief Security Officer and Vice President of Intelligence for Stratfor. He was kind enough to send me a signed copy of… Read More Chasing Shadows
For a little while now, I’ve been looking for a good way to give a ringing endorsement to Left of Bang. For those of you who are unfamiliar with this book, it provides guidelines and instructions on how to look at individuals and environments in order to detect early warning signs and indicators of impending… Read More Left of Bang
(Featured image Shot by Noam Garmiza) A few months ago, I appeared on SOFREP Radio where, for perhaps the first time, I publically discussed my military service as a tank commander in the IDF. After the show, the host, Jason Delgado, criticized me a bit for not having written about my military service in more… Read More Memories From Lebanon
I had a great time on SOFREP Radio recently. For those of you who haven’t heard of SOFREP, check it out. These guys do lots of good and provide great content, insights and commentary. It was a true honor to be invited on.
This is the second article in a three part series about Circles of Security. If you want to read how Circles of Security apply to access control, please check out the first article in this series. But if you just want to read about incident response, feel free to jump right in, and read away.… Read More The Inner & Outer Circle Relationship – Part 2: Incident Response
After going over the hostile planning process and reviewing a number of case studies, our next goal is to figure out the vulnerabilities of this process and figure out who can tackle which vulnerability.
Once a general grasp of the terrorist hostile planning process is attained, the important role of case studies is to take this subject out of mere theoretics and show how the planning process was actually, physically, conducted in real life. The classic type of terrorist case study seminar or article has, for obvious reasons, become quite… Read More Terrorism Case Studies