[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

America has been infiltrated and occupied Netanyahu 1980

Senior Trump Official Declares War On Far-Left NGOs Sowing Chaos Nationwide

White House Plans Security Boost On Civil Terrorism Fears

Visualizing The Number Of Farms In Each US State

Let her cry

The Secret Version of the Bible You’re Never Taught - Secret History

Rocker defames Charlie Kirk threatens free speech

Paramount Has a $1.5 Billion South Park Problem

European Warmongers Angry That Trump Did Not Buy Into the ‘Drone Attack in Poland’

Grassley Unveils Declassified Documents From FBI's Alleged 'Political Hit Job' On Trump

2 In 5 Young Adults Are Taking On Debt For Social Image, To Impress Peers, Study Finds

Visualizing Global Gold Production By Region

RFK Jr. About to DROP the Tylenol–Autism BOMBSHELL & Trump tweets cryptic vaccine message

Elon Musk Delivers Stunning Remarks At Historic UK March

Something BIG is happening (One Assassination Changed Everything)

The Truth About This Piece Of Sh*t

Breaking: 18,000 Epstein emails just dropped.

Memphis: FOUR CHILDREN shot inside a home (National Guard Inbound)

Elon Musk gives CHILLING WARNING after Charlie Kirk's DEATH...

ActBlue Lawyers Subpoenaed As House GOP Investigation Into Donor Fraud Intensifies

Cash Jordan: Gangs EMPTY Chicago Plaza... as Mayor's "LET THEM LOOT" Plan IMPLODES

Trump to send troops to Memphis

Who really commands China’s military? (Xi Jinping on his way out)

Ghee: Is It Better Than Butter?

What Is Butyric Acid? 6 Benefits (Dr Horse says eat butter, not margarine!)

Illegal Alien Released by Biden Admin Beheads Motel Manager In Dallas,

Israel Wants to Unite Itself by Breaking the World -

Leavitt Castigates Journalists To Their Faces Over Lack Of Iryna Zarutska Killing Coverage

Aussie Students Spend The Most Time In School, Polish Kids The Least

Tyler Robinson, 22, Named As Suspect In Charlie Kirk Assassination


War, War, War
See other War, War, War Articles

Title: Countering a Shapeless Threat
Source: [None]
URL Source: http://www.moneyandmarkets.com/coun ... &ccode=07142016MAM3556&sc=p446
Published: Jul 21, 2016
Author: Jeff Cantor
Post Date: 2016-07-21 08:00:11 by BTP Holdings
Keywords: None
Views: 48

Countering a Shapeless Threat

Jeff Cantor | Thursday, July 21, 2016 at 7:30 am

Today, I’m going to let you in on one of the best-kept secrets about the War on Terror.

U.S. intelligence agencies have an outstanding track record when it comes to stopping terrorist attacks in America. They have saved many lives thanks to their impressive array of counter-terrorism resources, which range from satellites and drones to computer experts and untold human sources around the world.

As terrorists have become more tech savvy, these agencies have added social media and cyber technology to their arsenal of weapons in this war’s cloak-and-dagger arena.

But most people don’t realize what a good job these agencies are doing because American newspapers are full of stories about attacks by “lone wolves” or small terrorist teams of twos or threes who have been inflamed by jihadist Web sites.

Tragically, the FBI, the CIA, the NSA, and Homeland Security cannot always root out these lone wolves or small teams – especially since they don’t always have real ties to large groups of radical fanatics. And they can’t even stop every threat from the large groups because our enemies are so relentless, resourceful and numerous. At the same time, you can’t count on your local police to prevent burglars, home invaders or robbers – let alone terrorists.

For example, a mobile active killer (MAK) is on campus. Or, a grassroots terrorist planted several pipe bombs around a shopping mall. In both cases, it was impossible for these attackers to succeed without leaving clues about their intentions – if only someone had noticed them.

Like it or not, we live in constant fear of unknown dangers, the shapeless threats that we can only imagine – until they strike. So today I want to teach you a time-tested concept for keeping you and your family safe from these shapeless nightmares.

A mall security guard is more likely to rescue you from a terrorist than a police officer

The concept – called “concentric rings of security” – has been used successfully by both the military and intelligence agencies. And I’ve updated the strategy for the 21st century by showing you how it works with mobile technology.

It is important that there are layers in your security plan so the weaknesses of one layer can be outweighed by the strengths of another layer.

The “concentric rings” concept requires that you draw imaginary circles around your property or your valued assets. This could be your home, your office, or your workplace, possibly at a university or business complex.

How many circles you draw will depend on the level of threats. Generally speaking, the more circles the better, but the number is normally restricted by things like money and manpower.

It is easy to add more circles as resources allow. But each circle must be clearly delineated. And each inner circle must be fully contained by the closest circle outside it – like an archery target. These concentric circles build in redundancy.

Let’s see how you apply this concept to a real-life scenario – like your home.

Click for Full Text!

Post Comment   Private Reply   Ignore Thread  



[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]