See latest Posts
from Global

Written on
May 2020

The Lack of a Security Apparatus or a Professional Adversary???

The ongoing terror attacks in Europe and active shooters incidents in the US prove that there is no efficient security apparatus in place. However, it is far more comfortable to blame the lack of prevention and response mechanisms on the perpetrators'capabilities!

Written on
May 2020

A new operational role

Observation and neutralization must come together so that we can have an important strategic surprise on the adversary. The connection of these 2 roles is imperative in order to act in real time and avoid unnecessary communication between the observers and the reactionary force.

Written on
May 2020

Security profiling for other venues- Not just airports

The history of airline and airport security clearly demonstrates that profiling was and is an effective tool for preventing, neutralizing and deterring terror attacks. Clearly, airports require specific security activities that are systematically adapted to large installations with extensive external and internal movement.

Written on
May 2020

Creating a security concept

The creation and implementation of a security concept is an operational objective that needs to be adopted. Failure to do so will facilitate the execution and success of more terror attacks.

Written on
May 2020

The Security Concept- No Other Alternative

Security is not an objective but rather a concept that needs to be implemented for protecting human lives and limiting physical damage to a facility. This conceptual reality must be based on a thorough understanding of who is our enemy, what are his methods of action, and what security measures are present for preventing or neutralizing these threats.

Written on
May 2020

A set of new security concepts (Basic Introductory Level Required for Operational Security)

The recent events make it imperative to develop a set of new security concepts to be integrated within an organization's security culture and apparatus

Written on
May 2020

Deterrence- A Risky False Positive Placebo

Deterrence is not a security objective and do not count on it when you build your security doctrine, plan, procedures for effective prevention and/or neutralization tactics for adversary threats.

Written on
May 2020

Relying on the Gut Feeling and Making it an Operational Component of the Security Work

The gut feeling can be a very effective tool in security, particularly when you lack critical data but need to make a rapid decision, or when you cannot explain a particular feeling you have.

Written on
May 2020

The need for an operational advantage of the adversary

In terror the adversary has numerous advantages which must be taken into account. The adversary chooses when, how, where to attack. These 3 pillars of action are fundamental to understand because....

Written on
May 2020

A Nuclear Plant = Sensitive installation = a Shopping Street

As terror continues to hit Europe, the security concept of what is a sensitive installation is rapidly changing.Throughout the years sensitive installations have been classified according to their level.....

Written on
May 2020

Modus Operandi = Modus Vivendi

Europe and the US need to develop a Modus Vivendi system to the Terror Modus Operandi in order to succeed in protecting its citizens. A modus vivendi to terror has a 2 spheres of action that need to be addressed

Written on
May 2020

Defining the Security Objectives

Defining a security objective is based upon carrying an operational vulnerability assessment of the adversary and their modus operandi. This operational assessment will define what are your current capabilities to deal with certain methods of attack.

Written on
May 2020

The safety of your security or the security of your safety???

In order to ensure that your security tactics, procedures and culture are safe it is imperative to make a thorough assessment. As a result, you must ask yourself if your current security practices are safe to your employees, guards or operatives.

Written on
May 2020

The Creation of a Self Security Profile

Did you ever consider profiling yourself or your organization? How are you classified by your potential adversaries? Do they see you as an easy target? Is it easy to collect information from your employees? How do they rank your security? Do you deter them?

Written on
May 2020

Responding to a threat that cannot be identified

A very unfortunate situation in security involves building response scenarios for threats that you are unable to identify in real time. It is very nice to have SOPS and protocols for scenarios but what about the identification process?

Written on
May 2020

The Sacrifice Paradigm

In any security system it is imperative to define a sacrifice area. A sacrifice area is an area in your installation where you are willing to fight a terror attack and possibly have damage to your premises. This area is selected after having thoroughly built a proper security system that is proactive and has interdependent visible and non visible security rings.

Written on
May 2020

The Difference between Responding versus Neutralizing a Terrorist Attack

As the number of terrorist attacks grow throughout Europe and the US we witness a lot of confusion regarding operational terminology pertinent to terror attacks. The common terms used are prevention and response.

Written on
May 2020

The Zero Sum Game

So many experts around the world try to offer suggestions in body language, suspicious sign recognition, reactionary tactics, and the list goes on and on. There seems to be an atmosphere of wanting to take advantage of the current situation to build new strategies and tactics, and clearly, take professional credit.

Written on
May 2020

When terror gets near you...

Terror attacks are nothing new, so why is everyone suddenly concerned about their security and safety? Israel has been at the forefront of the fight against terror and has warned the rest of the world to create security solutions for preventing and neutralizing terrorist activity. These warnings have been active since the 60's but no one seemed to care!

Written on
May 2020

Living with terror or living with security

Governments and nations have to make the choice between living with terror or living with security. Over the latest years and events, many academicians and experts have emerged out of nowhere to give recommendations that advise governments to learn to live with terror. This same advice has been given to citizens that see their freedom of life being violated by terror.

Written on
May 2020

What is Security????

We constantly hear that security professionals refer to certain areas in their installations as being critical or of utmost importance. What does this mean? Usually, this means that if something was to happen in this area....

Written on
May 2020

What Components of Terror Should We be Fighting

One of the most important tasks is defining what components of terror you want to fight. Governments need to make this choice....

Written on
May 2020

Most nations have a security department- but not a Security Apparatus for each type of threat

The concept of security apparatus builds on distinct yet functional elements with dynamic and structural value. This entry examines security as the state of being—or at least feeling—secure and considers, in particular...

Written on
May 2020

The misconceptions of security

Security is a term used so frequently, yet so misunderstood by most governments, organizations and leaders. Security is not the result of what you do and hope to achieve! Instead, it is the combination of multidisciplinary actions that you take based on the adversaries you have.

Written on
May 2020

Terror- The Ultimate Denial- Not even treating the symptoms

The level of denial that is seen within the US and Europe is growing more than ever in the aftermath of the recent terror attacks.

Written on
May 2020

The Ignorance Behind Profiling

I want to start this post by stating that all so called practitioners of proactive security clearly misunderstand what the art of profiling includes. As a result, it is very comfortable to use a common pretext that says: Profiling is racially based! or it does not work!

Written on
May 2020

Is the willingness to die in an attack greater than the willingness to protect???

Well, no one can argue with the determination that terrorists show in conducting different attacks. But an interesting question arises?? Are western democracies as motivated to protect their sensitive installations and citizens as well?? Are citizens willing to live as much as are terrorist willing to die???

Written on
May 2020

Do not look for an explanation to terrorist attacks

Across Europe and the US, the law enforcement community, professionals and civilians are constantly seeking to understand the motives behind terror attacks. This naive and unprofessional approach is strenuously seeking to understand and, probably, justify, why such attacks take place??

Written on
May 2020

The New Terror Rules

Europe and the US seem to begin understanding that the terror arena has independent rules of activity which are not logical to western democracies. The west is now confronted with accepting that the current preventative and neutralization tactics of terror attacks are not valid and require a metamorphosis!

Written on
May 2020

The Range of Distortion

One of the most counter productive components of security involves the :"Distortion of Data". Security operations require intelligence which is concrete and has no component of misinterpretation or distortion of the true scenario.

Written on
May 2020

Asymmetric Conflicts Require Asymmetric Security Solutions

The current security threats are asymmetric and pose a complex challenge to nations and organizations which are not prepared for preventing and neutralizing these methods of attack.

Written on
May 2020

Life and Terror- A Forever Status Quo

Can life continue with ongoing terror? Can citizens live with terror? The answer is yes and we need to accept the fact that our lives will always be surrounded by terror. Is this status quo difficult to accept?

Written on
May 2020

Definition of Terrorism vs the Building of a Unified Global Doctrine

For many years up to now coming to an agreed definition of terrorism has been the center of attention and disagreement among strategists, politicians, policy makers and academicians. The debate has been very technical over the specific use of words, their meaning and connotations.

Written on
May 2020

Finding the Balance Between Prevention and selection of Response

In any security context, organizations attempt to prevent hostile activities and attempt to implement security procedures for early warning and effective prevention.

Written on
May 2020

Understanding Theaters of Operation

Theaters of operation in security scenarios reflect critical information regarding the opponent, our capabilities, the efficiency of our tactics, what works and what doesn't, our ability to overcome obstacles, the reliability of our procedures, the efficiency of our strategy, operational flexibility and much more.

Written on
May 2020

Why Social Engineering is a Security Threat to the Organization

Companies place a lot of emphasis and importance in securing their networks and protecting their data with the use of extensive IT solutions in an effort to minimize the theft of data by competitors and different opponents.

Written on
May 2020

Limitations of Non Verbal Communication and Body Language in Security

There are many schools of thought regarding the effectiveness of body language in understanding irregular behavior and detecting unusual activity. However, all these schools of thought derive their techniques from the underlying factor that human beings communicate far more non verbally rather than verbally. In fact, only 20% of our message gets communicated verbally! while 80 % is communicated non verbally.

Written on
May 2020

Defining Security Objectives

Before designing security objectives, organizations need to evaluate their security system and analyze its functional capabilities. By functional capabilities, organizations will understand if their security plan is in harmony with its security objectives. For example, if my security system is defensive and integrates the use of CCTV cameras with static security guards and periodic patrols, what is the real functional capability???? Can this prevent or be a response to a terror attack??? The answer..

Written on
May 2020

The Security Dimension in the Screening Process

When screening for new employees, institutions often rely on human resources to carry most of the screening procedures for recruiting new employees. These procedures are composed of different types of screening methods including personality and technical tests, interviews, simulations and additional parameters specific to each function. In addition, organizations require that you submit proof of no criminal record.

Written on
May 2020

Checking the Security of Your Organization

It is imperative to know if your current security system can efficiently deal with a crisis as manifested through different threats. This knowledge is crucial for understanding where we stand in relation to where we should be and there are a number of steps required to implement in order to make sure the process is done correctly.

Written on
May 2020

Finding the Proactive Harmony Between Instincts and Impulses

In security scenarios that require a rapid response, our stress response is often controlled by our natural instincts. However, these instincts are often in opposition to what should be done in order to solve the situation.

Written on
Jun 2020

Is Deterrence an Objective or the Result of Proactive Activity?

Deterrence is often an described as a pillar of security or a priority objective of security activity. As a result, many security systems are designed according to this objective and hopefully security professionals can cause an opponent to select another target.

Written on
May 2020

The Art of Understanding- Tools You Can Trust

Understanding a person when your time is limited is not always as simple as it seems and often we rely on our perceptions which are distorted and not representative of the real picture. Our brains can be trained to perform basic activities that limit our distortion of reality and put us in a right path for understanding what we see and minimize our mistakes. I suggest you try this and see how you improve your judgement.

Written on
Jun 2020

The Operational Formula of Training

Condor is strongly committed to offering state of the art training services. This objective is achieved through advanced technological solutions that include a multi functional training center that centralizes all modular scenarios according to the specifications of the course.

Written on
May 2020

The Threat Acceptance Pillar

A threat is something we do not control and is directly related to the adversary. We do not control his motivations and intentions but can we control his capabilities? Capabilities can only be controlled if you are in constant conflict with an adversary and your actions affect his capabilities of inflicting a threat on your organization.

Written on
Jun 2020

The Establishment of a Security Doctrine

The creation and establishment of a security doctrine is undoubtedly the most crucial component of any security posture. The security doctrine centralizes all your objectives, modus operandi, tactics , solutions and principles of operational activity. Without these components, organizations run a security department that is asymmetric to the current threats and not structured to function according to functional pillars.

Written on
Jun 2020

Protecting the Unprotected

The protection of unprotected areas in cities, organizations, installations and compounds is a crucial component of an efficient security system designed to prevent and neutralize threats. It is a mistake to build your security apparatus in order to create deterrence of the opponent. Deterrence is a term that is a human invention for living in a state of security denial where you attempt to read distorted data and turn this into a policy.

Written on
Jun 2020

Installation Security

The events in the Tunisian museum and Copenhagen mall show that specific security prevention and response mechanisms were not present. What was present are access control mechanisms, CCTV and the regular security mechanisms for daily routine activities pertaining to criminal activity. The security reality for protecting such installations against terrorist activity requires a specific security posture designed for such opponent activity.

Written on
Jun 2020

Condor Security Enterprises proudly announces the launching of i-see 22

Condor Security Enterprises proudly announces the launching of i-see 22 an operational system for identifying suspicious people and behavior. i-see 22 is a unique software and platform for identifying suspicious behavior inherent to terror, radicalization, inner threat and suspicious people. In addition, the system is designed to identify safety and security vulnerabilities in an objective manner and rapid decision making process. Our system transforms surgical information into real time intelligence and supports the human factor in becoming an operational sensor for early detection.

Written on
Jun 2020

Condor Security Enterprises proudly announces the launching of i-sec 22

The radicalization process which we have seen is usually a platform where many indicators are present but often connecting these dots becomes difficult.

Written on
May 2020

The essence of Early

Identifying suspicious threats remains one of the most challenging facets of security. Early warning allows a surgical treatment of the threat without entering a reactionary and response mode.

Written on
May 2020

Reactive offensive security

Offensive security tactics are known for its strategic surprise of the enemy, rapid neutralization and specific surgical solutions.

Written on
May 2020

Observation and Identification- A unique Platform

These 2 activities are treated as separate activities and this creates a number of serious problems.

Written on
May 2020

The Irrelevancy of most procedures

Most organisations have certain procedures that were written but never tested. In fact, they became part of the security apparatus because they either seem logical or were never tested under real circumstances.

Written on
May 2020

The myth behind the concept of Disarming

Disarming is a term very often used within the context of combat, self defense and terror. In fact, the emphasis seems to be on disarming the terrorist from the weapon used rather than Neutralizing the Terrorist.

Written on
May 2020

Observation VS Interview- or Both?

When looking for suspicious signs there must be a harmony between the verbal and non verbal channels.

Written on
May 2020

Early Warning in Symbiosis with Real Time Emergency Response Management

Condor is at the forefront of delivering a unique set of solutions that harmonize the Real time Prevention with Real Time Emergency Management. Contact us for more information.

Written on
Mar 2020

The False Myth Behind Prevention

States, organisations, security departments, security operatives, guards and many more like to use the word prevention when describing their daily routine and emergency activities.

Written on
Mar 2020

The success of an operation is measured by the human factor

When dealing with smaller cargo, there are some rules you need to follow to keep the items safe in transit

Written on
Mar 2020

Understanding opponent motivations and capabilities

When analyzing your opponents make sure you study their motivations and capabilities. Motivations usually depict the agenda of the adversary, its objectives and ideological platform.

Written on
Mar 2020

Critical information VS Operational Intelligence

Critical information is information which could be of some use in our security objectives pertaining to a nations homeland security or counter terrorism doctrine.