Key Skills for Personal Security & Self Defense

Most of the personal security and self-defense market in US seems to cater to traditional hard skills reactive training, in particular shooting and physical self defense techniques.  These are important skills to have but there seems to be a dearth of training in other more soft, preventative skills. Even with in the hard skills arena…

Guile & Deception as Kidnapping Tools

Most people when they think of a kidnapping think of a violent, dramatic event. The victim is ambushed, dragged from his car, threatened with weapons and restrained before being moved to a location where he is isolated. Many kidnappings do follow this model or something very similar. Speed, violence, “shock and awe” are effective tools…

3 Neglected Skillsets for Security

Today we are going to venture a little bit into the realm of corporate security.  I realize that many readers may not be as interested in this area and are focused more on individual protection.  No need to worry as two of the skillsets we are going to discuss are also very applicable to personal…

When 419 Fraud Gets Dangerous

Advanced fee fraud – commonly known as 419 fraud has been going on for years.  Most commonly manifested in the emails – and in the past faxes and letters – that the potential victims receive offering them an opportunity to get a large sum of money to facilitate the transfer of funds or provide some…

The Criminal Interview

While we are discussing unsolicited approaches it’s a good time to mention the criminal “interview” that is often the precursor to a robbery or assault.  The interview occurs when the criminal engages the potential victim in conversation prior to initiating a crime.  This usually serves two purposes: (1) it gives the criminal or criminals and…

Loose Lips: Recognizing and Avoiding Elicitation

In discussing social engineering and threats to your personal security we mentioned elicitation.  Elicitation is a technique that is used by an adversary to get a person to unintentionally divulge more information about a particular subject than they normally would.  Its used to gather confidential or proprietary information and in the realm of personal security…

Social Engineering: Personal Security Implications

Social engineering – the calculated manipulation and exploitation of people has historically been associated with cyber security issues.  Computer hackers found they could best get access to secure networks by targeting the weakest link – the human factor. The same techniques used to get an employee to give up their password or provide other information…

Social Networks & the Threat to Personal Security

Recent open source reporting indicates that the Colombian National Police just arrested a group of criminals that were using Facebook to identify, profile and target victims for kidnapping.  Initial reports the gang were using false Facebook profiles with pictures of beautiful women to target wealthy men as victims.  They would use information in the victim’s…