
Critical information is information which could be of some use in our security objectives pertaining to a nation;s homeland security or counter terrorism doctrine.
Read More
States, organizations, security departments, security operatives, guards and many more like to use the word prevention when describing their daily routine and emergency activities.
Read More
Unfortunately, this is wishful thinking and based on mere probability and a false understanding of a motivated and capable adversary.
Read More
I want to start this post by stating that all so-called practitioners of proactive security clearly misunderstand what the art of profiling includes.
Read More
The gut feeling can be a very effective tool in security, particularly when you lack critical data but need to make a rapid decision, or when you cannot explain a particular feeling you have.
Read More
Deterrence is not a security objective and do not count on it when you build your security doctrine, plan, procedures for effective prevention and/or neutralization tactics for adversary threats.
Read More
The steps are: 1- Define exactly what you want to check and be precise in your formulation: An example would be: What is the response time of the security department for identifying the presence of a suspicious object?
Read More
Theaters of operation must be carefully analyzed, studied and meticulously read in order to prepare first responders for the reality of scenarios they may face.
Read More
The answer is simple but unpleasant! Theoretically speaking, western democracies put human lives at the top of their moral and operational pyramids!
Read More
So many experts around the world try to offer suggestions in body language, suspicious sign recognition, reactionary tactics, and the list goes on and on.
Read More
But what do they mean? Prevention is usually associated with defensive measures of security designed to stop the attack from taking place or dissuade the perpetrators from selecting you as a target.
Read More
A very unfortunate situation in security involves building response scenarios for threats that you are unable to identify in real time.
Read MoreWhether you have questions about SLPR0, pricing or partnership, we’re ready to help you.