Freedom4um

Status: Not Logged In; Sign In

War, War, War
See other War, War, War Articles

Title: Countering a Shapeless Threat
Source: [None]
URL Source: http://www.moneyandmarkets.com/coun ... &ccode=07142016MAM3556&sc=p446
Published: Jul 21, 2016
Author: Jeff Cantor
Post Date: 2016-07-21 08:00:11 by BTP Holdings
Keywords: None
Views: 29

Countering a Shapeless Threat

Jeff Cantor | Thursday, July 21, 2016 at 7:30 am

Today, I’m going to let you in on one of the best-kept secrets about the War on Terror.

U.S. intelligence agencies have an outstanding track record when it comes to stopping terrorist attacks in America. They have saved many lives thanks to their impressive array of counter-terrorism resources, which range from satellites and drones to computer experts and untold human sources around the world.

As terrorists have become more tech savvy, these agencies have added social media and cyber technology to their arsenal of weapons in this war’s cloak-and-dagger arena.

But most people don’t realize what a good job these agencies are doing because American newspapers are full of stories about attacks by “lone wolves” or small terrorist teams of twos or threes who have been inflamed by jihadist Web sites.

Tragically, the FBI, the CIA, the NSA, and Homeland Security cannot always root out these lone wolves or small teams – especially since they don’t always have real ties to large groups of radical fanatics. And they can’t even stop every threat from the large groups because our enemies are so relentless, resourceful and numerous. At the same time, you can’t count on your local police to prevent burglars, home invaders or robbers – let alone terrorists.

For example, a mobile active killer (MAK) is on campus. Or, a grassroots terrorist planted several pipe bombs around a shopping mall. In both cases, it was impossible for these attackers to succeed without leaving clues about their intentions – if only someone had noticed them.

Like it or not, we live in constant fear of unknown dangers, the shapeless threats that we can only imagine – until they strike. So today I want to teach you a time-tested concept for keeping you and your family safe from these shapeless nightmares.

A mall security guard is more likely to rescue you from a terrorist than a police officer

The concept – called “concentric rings of security” – has been used successfully by both the military and intelligence agencies. And I’ve updated the strategy for the 21st century by showing you how it works with mobile technology.

It is important that there are layers in your security plan so the weaknesses of one layer can be outweighed by the strengths of another layer.

The “concentric rings” concept requires that you draw imaginary circles around your property or your valued assets. This could be your home, your office, or your workplace, possibly at a university or business complex.

How many circles you draw will depend on the level of threats. Generally speaking, the more circles the better, but the number is normally restricted by things like money and manpower.

It is easy to add more circles as resources allow. But each circle must be clearly delineated. And each inner circle must be fully contained by the closest circle outside it – like an archery target. These concentric circles build in redundancy.

Let’s see how you apply this concept to a real-life scenario – like your home.

Click for Full Text!

Post Comment   Private Reply   Ignore Thread