If there’s one technique in the tactical community that divides shooters into camps it’s the post-engagement search and assess. Yes, I’m talking about the, “look left, look right, look rear” after you’ve taken your shots, but before you tac reload/holster/move/whatever. Some very knowledgeable shooters I know and trainers I’ve trained under recommend this practice. Some equally knowledgeable guys that I know, train with, or read call it “tactical theater.” Let’s talk about it.
The 1911 is not a platform that suffers long periods of inattention gracefully. It has to be cleaned and lubricated at least somewhat regularly in order to keep running efficiently. This is in contrast to a lot of guns that will keep running notwithstanding a dearth of maintenance. Let’s look at cleaning and maintenance of the defensive 1911.
In my last post on the defensive AR-15 I talked about sighting options for the defensive AR. Today I am going to talk about the only other accessories you truly need on a defensive AR. This is just my opinion and reflects my experience with the platform and my personal preferences and biases, so they may differ from yours. Also, I know this ground has been covered, but I haven’t had my say yet, so here it is.
The AR-15 is about as common a rifle as you’ll find in this country. If you don’t own an AR-15 you might want to think about it. Few other firearms give you the same defensive capability. The AR platform is extremely easy to operate, infinitely customizable, reliable, and easy for most people to use. Whether you plan to purchase one in the future or already own one, you may want to know about defensive AR-15 setup.
I have written about a lot of security tools over the years. I generally prefer to focus on techniques and behaviors rather than tools. Security-minded behavior is generally more effective than security tools. It is easier and vastly more certain, for instance, to conceal a thought that was never committed to text than it is to erase it afterward. Tools can also create a false sense of security and cause a disregard for the importance of security behaviors.
In some instances tools are indispensable, however. Tools can provide capabilities that behavior alone cannot. This post will serve as a repository of my current recommended tools and services. It will host links to my articles/reviews about these products, as well as links to their host sites, and I will update it frequently.
A few weeks ago I wrote an article discussing the nomenclature of a key. Today I am going to discuss some basic lock nomenclature, and look at various lock form-factors. In future posts discussing protection measures for your locks (and possibly some defeats) it is important to have a reference for various nomenclatures used.
Last year I had the opportunity to spend some time in Belfast, Dublin, and Cork. Unfortunately, most of my time was spent in Dublin – my least favorite of the three. Recently I was reviewing my photos from that trip and realized how many noteworthy locks I actually found there. This will probably only be of interest to the lock nerds. If you aren’t you can still get something out of this: most American locks are junk compared to the locks used by the rest of the world.
Outside of a very few specialized fields high-security locks are almost totally unknown. Even in the field of locksmithing where high-security locks are known, they are often misunderstood. Today I am going to offer you a primer on the fascinating world of high-security mechanical locks, the security benefits they offer, and what they can’t do for you.
In my last post on physical security I talked about improving the security of your locking knobset. This time I am going to talk about the real workhorse of personnel door security: the deadbolt. I will talk about what to look for if you are looking for new deadbolt, as well enhancing deadbolt security on locks you already own/have installed .
In the last three parts of my Digital Security Primer I discussed the importance of digital security, making your device a hard target for malware, and protecting your cloud-stored data. This time I am going to get into the cool, sexy stuff: encryption for your data-in-motion. But first, I’m going to make some of you angry.