This year for Veterans Day, I thought I’d share a few of my own military experiences. First, I have to tell you that I didn’t serve in the US military. As a born and raised Israeli, I served in the Israeli Defense Forces (IDF). But since Israel doesn’t have a Veteran’s Day (mostly because everyone… Read More A Very Different Veteran’s Tale
I had a great time on SOFREP Radio recently. For those of you who haven’t heard of SOFREP, check it out. These guys do lots of good and provide great content, insights and commentary. It was a true honor to be invited on.
This is the second article in a three part series about Circles of Security. If you want to read how Circles of Security apply to access control, please check out the first article in this series. But if you just want to read about incident response, feel free to jump right in, and read away.… Read More The Inner & Outer Circle Relationship – Part 2: Incident Response
After going over the hostile planning process and reviewing a number of case studies, our next goal is to figure out the vulnerabilities of this process and figure out who can tackle which vulnerability.
Once a general grasp of the terrorist hostile planning process is attained, the important role of case studies is to take this subject out of mere theoretics and show how the planning process was actually, physically, conducted in real life. The classic type of terrorist case study seminar or article has, for obvious reasons, become quite… Read More Terrorism Case Studies