Security

Written on
May 14, 2020

The Establishment of a Security Doctrine

The creation and establishment of a security doctrine is undoubtedly the most crucial component of any security posture. The security doctrine centralizes all your objectives, modus operandi, tactics , solutions and principles of operational activity. Without these components, organizations run a security department that is asymmetric to the current threats and not structured to function according to functional pillars.

Written on
May 14, 2020

Protecting the Unprotected

The protection of unprotected areas in cities, organizations, installations and compounds is a crucial component of an efficient security system designed to prevent and neutralize threats. It is a mistake to build your security apparatus in order to create deterrence of the opponent. Deterrence is a term that is a human invention for living in a state of security denial where you attempt to read distorted data and turn this into a policy.

Written on
May 14, 2020

Installation Security

The events in the Tunisian museum and Copenhagen mall show that specific security prevention and response mechanisms were not present. What was present are access control mechanisms, CCTV and the regular security mechanisms for daily routine activities pertaining to criminal activity. The security reality for protecting such installations against terrorist activity requires a specific security posture designed for such opponent activity.

Written on
May 14, 2020

The Operational Formula of Training

Condor is strongly committed to offering state of the art training services. This objective is achieved through advanced technological solutions that include a multi functional training center that centralizes all modular scenarios according to the specifications of the course.

Written on
May 14, 2020

The Lack of a Security Apparatus or a Professional Adversary???

The ongoing terror attacks in Europe and active shooters incidents in the US prove that there is no efficient security apparatus in place. However, it is far more comfortable to blame the lack of prevention and response mechanisms on the perpetrators'capabilities!

Written on
May 14, 2020

Security profiling for other venues- Not just airports

The history of airline and airport security clearly demonstrates that profiling was and is an effective tool for preventing, neutralizing and deterring terror attacks. Clearly, airports require specific security activities that are systematically adapted to large installations with extensive external and internal movement.

Written on
May 14, 2020

Creating a security concept

The creation and implementation of a security concept is an operational objective that needs to be adopted. Failure to do so will facilitate the execution and success of more terror attacks.

Written on
May 14, 2020

The Security Concept- No Other Alternative

Security is not an objective but rather a concept that needs to be implemented for protecting human lives and limiting physical damage to a facility. This conceptual reality must be based on a thorough understanding of who is our enemy, what are his methods of action, and what security measures are present for preventing or neutralizing these threats.

Written on
May 14, 2020

A set of new security concepts (Basic Introductory Level Required for Operational Security)

The recent events make it imperative to develop a set of new security concepts to be integrated within an organization's security culture and apparatus

Written on
May 14, 2020

A Nuclear Plant = Sensitive installation = a Shopping Street

As terror continues to hit Europe, the security concept of what is a sensitive installation is rapidly changing.Throughout the years sensitive installations have been classified according to their level.....

Written on
May 14, 2020

Modus Operandi = Modus Vivendi

Europe and the US need to develop a Modus Vivendi system to the Terror Modus Operandi in order to succeed in protecting its citizens. A modus vivendi to terror has a 2 spheres of action that need to be addressed

Written on
May 14, 2020

Defining the Security Objectives

Defining a security objective is based upon carrying an operational vulnerability assessment of the adversary and their modus operandi. This operational assessment will define what are your current capabilities to deal with certain methods of attack.

Written on
May 14, 2020

The safety of your security or the security of your safety???

In order to ensure that your security tactics, procedures and culture are safe it is imperative to make a thorough assessment. As a result, you must ask yourself if your current security practices are safe to your employees, guards or operatives.

Written on
May 14, 2020

The Creation of a Self Security Profile

Did you ever consider profiling yourself or your organization? How are you classified by your potential adversaries? Do they see you as an easy target? Is it easy to collect information from your employees? How do they rank your security? Do you deter them?

Written on
May 14, 2020

When terror gets near you...

Terror attacks are nothing new, so why is everyone suddenly concerned about their security and safety? Israel has been at the forefront of the fight against terror and has warned the rest of the world to create security solutions for preventing and neutralizing terrorist activity. These warnings have been active since the 60's but no one seemed to care!

Written on
May 14, 2020

Living with terror or living with security

Governments and nations have to make the choice between living with terror or living with security. Over the latest years and events, many academicians and experts have emerged out of nowhere to give recommendations that advise governments to learn to live with terror. This same advice has been given to citizens that see their freedom of life being violated by terror.

Written on
May 14, 2020

What is Security????

We constantly hear that security professionals refer to certain areas in their installations as being critical or of utmost importance. What does this mean? Usually, this means that if something was to happen in this area....

Written on
May 14, 2020

What Components of Terror Should We be Fighting

One of the most important tasks is defining what components of terror you want to fight. Governments need to make this choice....

Written on
May 14, 2020

Terror- The Ultimate Denial- Not even treating the symptoms

The level of denial that is seen within the US and Europe is growing more than ever in the aftermath of the recent terror attacks.

Written on
May 14, 2020

The misconceptions of security

Security is a term used so frequently, yet so misunderstood by most governments, organizations and leaders. Security is not the result of what you do and hope to achieve! Instead, it is the combination of multidisciplinary actions that you take based on the adversaries you have.

Written on
May 14, 2020

Most nations have a security department- but not a Security Apparatus for each type of threat

The concept of security apparatus builds on distinct yet functional elements with dynamic and structural value. This entry examines security as the state of being—or at least feeling—secure and considers, in particular...

Written on
May 14, 2020

Defining Security Objectives

Before designing security objectives, organizations need to evaluate their security system and analyze its functional capabilities. By functional capabilities, organizations will understand if their security plan is in harmony with its security objectives. For example, if my security system is defensive and integrates the use of CCTV cameras with static security guards and periodic patrols, what is the real functional capability???? Can this prevent or be a response to a terror attack??? The answer..

Written on
May 14, 2020

Why Social Engineering is a Security Threat to the Organization

Companies place a lot of emphasis and importance in securing their networks and protecting their data with the use of extensive IT solutions in an effort to minimize the theft of data by competitors and different opponents.

Written on
May 14, 2020

Asymmetric Conflicts Require Asymmetric Security Solutions

The current security threats are asymmetric and pose a complex challenge to nations and organizations which are not prepared for preventing and neutralizing these methods of attack.

Written on
May 14, 2020

Life and Terror- A Forever Status Quo

Can life continue with ongoing terror? Can citizens live with terror? The answer is yes and we need to accept the fact that our lives will always be surrounded by terror. Is this status quo difficult to accept?

Written on
May 14, 2020

The New Terror Rules

Europe and the US seem to begin understanding that the terror arena has independent rules of activity which are not logical to western democracies. The west is now confronted with accepting that the current preventative and neutralization tactics of terror attacks are not valid and require a metamorphosis!

Written on
May 14, 2020

Do not look for an explanation to terrorist attacks

Across Europe and the US, the law enforcement community, professionals and civilians are constantly seeking to understand the motives behind terror attacks. This naive and unprofessional approach is strenuously seeking to understand and, probably, justify, why such attacks take place??

Written on
May 14, 2020

The Security Dimension in the Screening Process

When screening for new employees, institutions often rely on human resources to carry most of the screening procedures for recruiting new employees. These procedures are composed of different types of screening methods including personality and technical tests, interviews, simulations and additional parameters specific to each function. In addition, organizations require that you submit proof of no criminal record.

Written on
May 14, 2020

Reactive offensive security

Offensive security tactics are known for its strategic surprise of the enemy, rapid neutralization and specific surgical solutions.

Written on
May 14, 2020

The Irrelevancy of most procedures

Most organisations have certain procedures that were written but never tested. In fact, they became part of the security apparatus because they either seem logical or were never tested under real circumstances.

Written on
May 14, 2020

The myth behind the concept of Disarming

Disarming is a term very often used within the context of combat, self defense and terror. In fact, the emphasis seems to be on disarming the terrorist from the weapon used rather than Neutralizing the Terrorist.