Our new Hostile Activity Prevention E-learning course is now live. This unique, three-hour course teaches actionable, time-tested methods of prevention, detection and disruption of hostile activity. Based on Israeli methodologies of terrorist activity prevention, adapted to fit most environments and risk levels, the training isn’t merely theoretical. It covers the actual methods we’ve been successfully… Read More Hostile Activity Prevention
“intuition is always right in at least two important ways;It is always in response to something.it always has your best interest at heart”-Gavin De Becker. Quite a few years ago, I was working at a very prominent Jewish facility in the San Francisco Bay Area when I spotted a suspicious-looking man on the opposite side… Read More False-Positive
This article will detail a number of ways in which houses of worship can better protect themselves from deadly attacks. It applies to any house of worship and any religion, from mosques, churches and synagogues to temples, shrines and any other type of religious gathering place. I don’t just want to give you some general,… Read More How To Protect Houses of Worship
I had a great time on SOFREP Radio recently. For those of you who haven’t heard of SOFREP, check it out. These guys do lots of good and provide great content, insights and commentary. It was a true honor to be invited on.
A version of this article has also been published in Security Solutions Magazine. On the evening of the 19th of December, 2016, the world was shocked as news came out about the assassination of the Russian ambassador to Turkey, Andrei Karlov. Karlov was shot from behind as he was delivering a speech at the Cagdas… Read More A lesson In Diplomatic Protection
Since the term Visual Control can mean different things to different people, let’s start by defining what I mean by it here. I define visual control as the ability of an operator to visually keep track of an area of interest – usually an Outer Circle to a property of interest. It’s not that you’re… Read More Visual Control
This is the second article in a three part series about Circles of Security. If you want to read how Circles of Security apply to access control, please check out the first article in this series. But if you just want to read about incident response, feel free to jump right in, and read away.… Read More The Inner & Outer Circle Relationship – Part 2: Incident Response
After going over the hostile planning process and reviewing a number of case studies, our next goal is to figure out the vulnerabilities of this process and figure out who can tackle which vulnerability.
Once a general grasp of the terrorist hostile planning process is attained, the important role of case studies is to take this subject out of mere theoretics and show how the planning process was actually, physically, conducted in real life. The classic type of terrorist case study seminar or article has, for obvious reasons, become quite… Read More Terrorism Case Studies