Category: References

What does a lot of knowledge look like? How about two, two-inch-thick books?

A while back Joe and I decide to put all our articles, posts, white papers, and research not yet published, together in one document.

The goal of collecting the information was to determine if we had enough material for a book. When the information was collected, the results were two, two -inch-thick books. So I guess the answer is yes. The attached is a picture of one of the books, the table of contents is three pages long for each book.

Read More
Blink of an Eye Metric Version

Security Driving is a decision-making process that requires the driver to manage time and distance, and anything that slows that process down can and often does become an emergency. Whether driving the boss to work, in a low-risk environment or driving an armored vehicle in a high-risk environment, understanding the basic principles of managing time and distance is life-saving knowledge.

Our frame of reference for measuring time and distance is the speedometer which supplies information in units of kilometers and hours – KPH. The driver does not have an hour or a kilometer to make life-saving decisions; in a vehicle emergency, Kilometer Per Hour is an irrelevant unit of measurement.

Read More
alqaeda

These pictures are taken from the Al Qaeda magazine Inspire, Issue 16. This issue of the magazine offers lessons on building a pressure cooker bomb and where, when and how to detonate the bomb for maximum effectiveness. The picture outlines the four steps in building a successful pressure cooker bomb.

Read More

Inside the Bubble is a new book authored by ISDA Member Mark James. Mark came to the Protective Services Profession via the corporate community. He is a former corporate executive and performance consultant to Fortune 500 companies and now executive director of a full service protection agency, Panther Protection.

Although Mark is emphatic that his book is not about “Protective Services”, and we agree, it is a book that should be read by all security practitioners.

Read More
Skip to toolbar