• Tidak ada hasil yang ditemukan

Understanding Personal Security and Risk

N/A
N/A
Nguyễn Gia Hào

Academic year: 2023

Membagikan "Understanding Personal Security and Risk"

Copied!
289
0
0

Teks penuh

I put a lot of emphasis on the front end of the security cycle - the element of detection and prevention. Products containing DEET (diethyltoluamide—the most common ingredient in insect repellents) include Off!, Cutter, Sawyer, and Ultrathon. Try to confirm whether you can buy a local phone in the country you're traveling to (if you're not sure, you can usually buy a cheap unlocked mobile phone at the airport if you're connecting internationally).

It should be thick with cash that looks a lot visually - the wad can be a relatively small amount like $50 - $100 but made to look a lot by converting $60 of the amount to $ 1s and $5s and this prop in brackets. Torso—The solar plexus is very delicate, but it can be easily overlooked if you don't know what you're doing. If you keep it off your back, it's easy for an opponent to grab the barrel and turn it away before you get a chance to pull the trigger - the gun is rendered useless.

If you don't tend to be one of the lucky few, but one of the unwashed majority forced by business or operations to travel into the third world at a moment's notice, then read on—the next guidelines are just for you. Also have a printed copy of your itinerary and the address of your hotel—in the language of the country where you have arrived—. He's looking for you - the tired business traveler with a shell-shocked glint in your eyes, a funny mouth, shuffling aimlessly out of the arrivals hall looking for something or someone who isn't there, looking for familiarity in a strange place .

In part this is understandable - the police themselves are poorly paid, poorly trained, poorly supported and led by local politicians who are themselves corrupt. They usually do not have an investigative function; state or federal police do this - municipal police simply secure the scene. Second, even if you are fluent in the language, use your best broken version of the language.

It is no coincidence that one of the first instructions they give the negotiating team is "do not contact the authorities." The motives for a political kidnapping are typically 180° the opposite in this phase. Commit to memory critical numbers (spouse, POC at home and local POC) in the event you are released. For example: “The risk assessment identified a very high probability that the principal could be abducted en route.

Wygand, J., The Secure Urbanite: Personal Security in the Asphalt and Concrete Jungle, British Columbia: CCB Publishing (2007), p. There is an old cliché that we hear so often - "he (or she) was caught in the wrong place, at the wrong time." The consequence of this discarded line is that violence is random and unpredictable. Cat - The cat is the traditional sign of a thief, often wearing a hat (from The Shoeless Cat).

Dot tattoos are one of the most common identifying symbols used between cultures or the international criminal underworld. a) A tattoo with five dots is known as a quincunx and was used as a symbol of recognition in Romani culture or for the time a criminal spent in prison (the four dots are the four walls of the prison, with the individual in the middle).

FIGURE 2.1  As you move through your environment, focus your obser- obser-vations and mental dialogue externally
FIGURE 2.1 As you move through your environment, focus your obser- obser-vations and mental dialogue externally

UAE 5. China

While America is one of the biggest victim countries in the world, Russia is considered the biggest threat actor in terms of identity theft. Eleven countries with the highest rates of identity theft in the world are a strange mix of wealth and poverty, but they have few things in common. The chances are, with ever-increasing frequency, that you will innocently place yourself or your family in the crosshairs of a terrorist attack.

Barely two months later, Wainwright's prediction tragically came true in the twin attacks on Brussels airport and the subway. In recent times, these armed attack tactics were used by the terrorist group Lashkar-e-Taiba in the attacks in Mumbai, India, on several hotel locations in 2008. The Brussels airport attack began at the departure desk in the morning, when it was certain busy with travelers checking in for their flight.

If you must escape, don't get sucked into escaping the way you came in just because that's the way you came in, or get sucked into the direction the crowd is moving. Stick to your prior assessment of the safest exit during the preparation phase unless a threat gets in the way. In the case of the suicide attack, he or she is trying to psychologically disconnect from what they are about to do, or may be under the influence of a controlled substance to numb his or her natural sensibilities.

They might (not always) praise their deity in a battle cry before activating their suicide vest or pushing a button in their car or truck. With little discipline or training, they reverted to fear in this situation and never fired their weapons in the confusion. Freezing in the face of threat is a normal and very human response to threat.

In this situation, it is imperative that you move away from the threat as quickly as possible, so it is vital that you forcefully drive this point home to other individuals who are with you. Establishing and maintaining contact with the police can be essential, especially if you are not out in the open and in a confined situation where your escape is determined by information you cannot know because they are outside of your shelter. In both the 2013 Westgate Mall terror attacks in Kenya and earlier in the 2008 Mumbai attacks, the attackers refused to negotiate or take hostages.

Gambar

FIGURE 2.1  As you move through your environment, focus your obser- obser-vations and mental dialogue externally
FIGURE 2.2  Example of some of the author’s own street toolkit items.
FIGURE 2.3  If you have the option to choose to have a knife, pictured  is the ideal type of weapon you should select
FIGURE 5.2  Dot tattoos are one of the most common recognition sym- sym-bols used among cultures or the criminal underworld internationally
+3

Referensi

Garis besar

Dokumen terkait

This qualitative research is supported by descriptive analysis method and library research technique that shows the main character as a person with Asperger's