The ongoing terror attacks in Europe and active shooters incidents in the US prove that there is no efficient security apparatus in place. However, it is far more comfortable to blame the lack of prevention and response mechanisms on the perpetrators'capabilities!
Observation and neutralization must come together so that we can have an important strategic surprise on the adversary. The connection of these 2 roles is imperative in order to act in real time and avoid unnecessary communication between the observers and the reactionary force.
The history of airline and airport security clearly demonstrates that profiling was and is an effective tool for preventing, neutralizing and deterring terror attacks. Clearly, airports require specific security activities that are systematically adapted to large installations with extensive external and internal movement.
The creation and implementation of a security concept is an operational objective that needs to be adopted. Failure to do so will facilitate the execution and success of more terror attacks.
Security is not an objective but rather a concept that needs to be implemented for protecting human lives and limiting physical damage to a facility. This conceptual reality must be based on a thorough understanding of who is our enemy, what are his methods of action, and what security measures are present for preventing or neutralizing these threats.
The recent events make it imperative to develop a set of new security concepts to be integrated within an organization's security culture and apparatus
Deterrence is not a security objective and do not count on it when you build your security doctrine, plan, procedures for effective prevention and/or neutralization tactics for adversary threats.
The gut feeling can be a very effective tool in security, particularly when you lack critical data but need to make a rapid decision, or when you cannot explain a particular feeling you have.
In terror the adversary has numerous advantages which must be taken into account. The adversary chooses when, how, where to attack. These 3 pillars of action are fundamental to understand because....
As terror continues to hit Europe, the security concept of what is a sensitive installation is rapidly changing.Throughout the years sensitive installations have been classified according to their level.....
Europe and the US need to develop a Modus Vivendi system to the Terror Modus Operandi in order to succeed in protecting its citizens. A modus vivendi to terror has a 2 spheres of action that need to be addressed
Defining a security objective is based upon carrying an operational vulnerability assessment of the adversary and their modus operandi. This operational assessment will define what are your current capabilities to deal with certain methods of attack.
In order to ensure that your security tactics, procedures and culture are safe it is imperative to make a thorough assessment. As a result, you must ask yourself if your current security practices are safe to your employees, guards or operatives.
Did you ever consider profiling yourself or your organization? How are you classified by your potential adversaries? Do they see you as an easy target? Is it easy to collect information from your employees? How do they rank your security? Do you deter them?
A very unfortunate situation in security involves building response scenarios for threats that you are unable to identify in real time. It is very nice to have SOPS and protocols for scenarios but what about the identification process?
In any security system it is imperative to define a sacrifice area. A sacrifice area is an area in your installation where you are willing to fight a terror attack and possibly have damage to your premises. This area is selected after having thoroughly built a proper security system that is proactive and has interdependent visible and non visible security rings.
As the number of terrorist attacks grow throughout Europe and the US we witness a lot of confusion regarding operational terminology pertinent to terror attacks. The common terms used are prevention and response.
So many experts around the world try to offer suggestions in body language, suspicious sign recognition, reactionary tactics, and the list goes on and on. There seems to be an atmosphere of wanting to take advantage of the current situation to build new strategies and tactics, and clearly, take professional credit.
Terror attacks are nothing new, so why is everyone suddenly concerned about their security and safety? Israel has been at the forefront of the fight against terror and has warned the rest of the world to create security solutions for preventing and neutralizing terrorist activity. These warnings have been active since the 60's but no one seemed to care!
Governments and nations have to make the choice between living with terror or living with security. Over the latest years and events, many academicians and experts have emerged out of nowhere to give recommendations that advise governments to learn to live with terror. This same advice has been given to citizens that see their freedom of life being violated by terror.
We constantly hear that security professionals refer to certain areas in their installations as being critical or of utmost importance. What does this mean? Usually, this means that if something was to happen in this area....
One of the most important tasks is defining what components of terror you want to fight. Governments need to make this choice....
The concept of security apparatus builds on distinct yet functional elements with dynamic and structural value. This entry examines security as the state of being—or at least feeling—secure and considers, in particular...
Security is a term used so frequently, yet so misunderstood by most governments, organizations and leaders. Security is not the result of what you do and hope to achieve! Instead, it is the combination of multidisciplinary actions that you take based on the adversaries you have.
The level of denial that is seen within the US and Europe is growing more than ever in the aftermath of the recent terror attacks.
I want to start this post by stating that all so called practitioners of proactive security clearly misunderstand what the art of profiling includes. As a result, it is very comfortable to use a common pretext that says: Profiling is racially based! or it does not work!
Well, no one can argue with the determination that terrorists show in conducting different attacks. But an interesting question arises?? Are western democracies as motivated to protect their sensitive installations and citizens as well?? Are citizens willing to live as much as are terrorist willing to die???
Across Europe and the US, the law enforcement community, professionals and civilians are constantly seeking to understand the motives behind terror attacks. This naive and unprofessional approach is strenuously seeking to understand and, probably, justify, why such attacks take place??
Europe and the US seem to begin understanding that the terror arena has independent rules of activity which are not logical to western democracies. The west is now confronted with accepting that the current preventative and neutralization tactics of terror attacks are not valid and require a metamorphosis!
One of the most counter productive components of security involves the :"Distortion of Data". Security operations require intelligence which is concrete and has no component of misinterpretation or distortion of the true scenario.
The current security threats are asymmetric and pose a complex challenge to nations and organizations which are not prepared for preventing and neutralizing these methods of attack.
Can life continue with ongoing terror? Can citizens live with terror? The answer is yes and we need to accept the fact that our lives will always be surrounded by terror. Is this status quo difficult to accept?
For many years up to now coming to an agreed definition of terrorism has been the center of attention and disagreement among strategists, politicians, policy makers and academicians. The debate has been very technical over the specific use of words, their meaning and connotations.
In any security context, organizations attempt to prevent hostile activities and attempt to implement security procedures for early warning and effective prevention.
Theaters of operation in security scenarios reflect critical information regarding the opponent, our capabilities, the efficiency of our tactics, what works and what doesn't, our ability to overcome obstacles, the reliability of our procedures, the efficiency of our strategy, operational flexibility and much more.
Companies place a lot of emphasis and importance in securing their networks and protecting their data with the use of extensive IT solutions in an effort to minimize the theft of data by competitors and different opponents.
There are many schools of thought regarding the effectiveness of body language in understanding irregular behavior and detecting unusual activity. However, all these schools of thought derive their techniques from the underlying factor that human beings communicate far more non verbally rather than verbally. In fact, only 20% of our message gets communicated verbally! while 80 % is communicated non verbally.
Before designing security objectives, organizations need to evaluate their security system and analyze its functional capabilities. By functional capabilities, organizations will understand if their security plan is in harmony with its security objectives. For example, if my security system is defensive and integrates the use of CCTV cameras with static security guards and periodic patrols, what is the real functional capability???? Can this prevent or be a response to a terror attack??? The answer..
When screening for new employees, institutions often rely on human resources to carry most of the screening procedures for recruiting new employees. These procedures are composed of different types of screening methods including personality and technical tests, interviews, simulations and additional parameters specific to each function. In addition, organizations require that you submit proof of no criminal record.
It is imperative to know if your current security system can efficiently deal with a crisis as manifested through different threats. This knowledge is crucial for understanding where we stand in relation to where we should be and there are a number of steps required to implement in order to make sure the process is done correctly.
In security scenarios that require a rapid response, our stress response is often controlled by our natural instincts. However, these instincts are often in opposition to what should be done in order to solve the situation.
Deterrence is often an described as a pillar of security or a priority objective of security activity. As a result, many security systems are designed according to this objective and hopefully security professionals can cause an opponent to select another target.
Understanding a person when your time is limited is not always as simple as it seems and often we rely on our perceptions which are distorted and not representative of the real picture. Our brains can be trained to perform basic activities that limit our distortion of reality and put us in a right path for understanding what we see and minimize our mistakes. I suggest you try this and see how you improve your judgement.
Condor is strongly committed to offering state of the art training services. This objective is achieved through advanced technological solutions that include a multi functional training center that centralizes all modular scenarios according to the specifications of the course.
A threat is something we do not control and is directly related to the adversary. We do not control his motivations and intentions but can we control his capabilities? Capabilities can only be controlled if you are in constant conflict with an adversary and your actions affect his capabilities of inflicting a threat on your organization.
The creation and establishment of a security doctrine is undoubtedly the most crucial component of any security posture. The security doctrine centralizes all your objectives, modus operandi, tactics , solutions and principles of operational activity. Without these components, organizations run a security department that is asymmetric to the current threats and not structured to function according to functional pillars.
The protection of unprotected areas in cities, organizations, installations and compounds is a crucial component of an efficient security system designed to prevent and neutralize threats. It is a mistake to build your security apparatus in order to create deterrence of the opponent. Deterrence is a term that is a human invention for living in a state of security denial where you attempt to read distorted data and turn this into a policy.
The events in the Tunisian museum and Copenhagen mall show that specific security prevention and response mechanisms were not present. What was present are access control mechanisms, CCTV and the regular security mechanisms for daily routine activities pertaining to criminal activity. The security reality for protecting such installations against terrorist activity requires a specific security posture designed for such opponent activity.
Condor Security Enterprises proudly announces the launching of i-see 22 an operational system for identifying suspicious people and behavior. i-see 22 is a unique software and platform for identifying suspicious behavior inherent to terror, radicalization, inner threat and suspicious people. In addition, the system is designed to identify safety and security vulnerabilities in an objective manner and rapid decision making process. Our system transforms surgical information into real time intelligence and supports the human factor in becoming an operational sensor for early detection.
The radicalization process which we have seen is usually a platform where many indicators are present but often connecting these dots becomes difficult.
The radicalization process which we have seen is usually a platform where many indicators are present but often connecting these dots becomes difficult.
Airport security remains undoubtedly one of the most challenging areas of activity. Many countries' reluctance to use #profiling techniques lies in the ignorance and false identity of this word. It is not true that profiling is race or ethnic based.
Our technology is a life saving platform for natural disasters such as earthquakes, fires, Tsunamis and other scenarios due to the fact that it can alert in real time all people in the area of impact and give them suitable guidelines to follow.
Identifying suspicious threats remains one of the most challenging facets of security. Early warning allows a surgical treatment of the threat without entering a reactionary and response mode.
Offensive security tactics are known for its strategic surprise of the enemy, rapid neutralization and specific surgical solutions.
These 2 activities are treated as separate activities and this creates a number of serious problems.
Most organisations have certain procedures that were written but never tested. In fact, they became part of the security apparatus because they either seem logical or were never tested under real circumstances.
Disarming is a term very often used within the context of combat, self defense and terror. In fact, the emphasis seems to be on disarming the terrorist from the weapon used rather than Neutralizing the Terrorist.
When looking for suspicious signs there must be a harmony between the verbal and non verbal channels.
Condor is at the forefront of delivering a unique set of solutions that harmonize the Real time Prevention with Real Time Emergency Management. Contact us for more information.
States, organisations, security departments, security operatives, guards and many more like to use the word prevention when describing their daily routine and emergency activities.
Condor Security Enterprises proudly announces the launching of i-see 22 an operational system.
Get an inside view of how our warehouses operate and see why our clients trust us unconditionally.
When dealing with smaller cargo, there are some rules you need to follow to keep the items safe in transit
When analyzing your opponents make sure you study their motivations and capabilities. Motivations usually depict the agenda of the adversary, its objectives and ideological platform.