Bücher online kostenlos Kostenlos Online Lesen
Paris is a Bitch

Paris is a Bitch

Titel: Paris is a Bitch
Autoren: Barry Eisler
Vom Netzwerk:
principal objectives are to get cash and property, and to get away (home invasion is a separate subject, but is addressed, like all self-protection, by reference to the same principles). You’d start by looking at lots of houses. Remember, you’re not trying to rob a certain address; you just want to rob a house. Which ones are dark? Which are set back from the road and neighbors? Are there any cars in the driveway? Lights and noise in the house? Signs of an alarm system? A barking dog?
    Thinking like a burglar, you are now ready to implement the outer layer of your home security. By some combination of installing motion-sensor lights, keeping bushes trimmed to avoid concealment opportunities, putting up signs advertising an alarm system, having a dog around, keeping a car or cars in the driveway, leaving on appropriate lights and the television, and making sure there are no newspapers in the driveway or mail left on the porch when you’re away, you help the burglar to decide immediately during his casing or surveillance phase that he should rob someone else’s house.
    If the burglar isn’t immediately dissuaded by the outer layer, he receives further discouragement at the next layer in. He takes a closer look, and sees that you have deadbolt locks on all the doors, and that your advertisement was not a bluff — the windows are in fact alarmed. If he takes a crack at the doorjamb, he discovers that it’s reinforced. If he tries breaking a window, he realizes the glass is shatter-resistant. Whoops — time to go somewhere else, somewhere easier.
    Okay, the guy is stupid. He keeps trying anyway. Now the second layer of security described above, which failed to
deter
him, works to
delay
him. It’s taking him a long time to get in. He’s making noise. At some point, the time and noise might combine to persuade him to abort (back to deterrence). But if he insists on plunging ahead, the noise has alerted you, and you have bought yourself time to implement further inner layers of security: accessing a firearm; calling the police; retreating to a safe room; most of all, preparing yourself mentally and emotionally for danger and possible violence.
    Now another example, relating to personal protection from an overseas kidnapping attempt. Like everything else, this form of protection starts with you thinking like the bad guy. Your objective is to kidnap a foreigner. Not a particular foreigner (high-value targets are a separate problem, although again subject to the same principles), just any old foreigner. So what do you need to do to carry out your plan?
    First, you need to pick a target. This part is easy — any foreigner will do. Next, you need to assess the foreigner’s vulnerability. Where will you be able to grab him, and when? To answer these questions, you need to follow the target around. If he’s punctual, a creature of habit, if he likes to travel the same routes to and from work at the same times every day, you will start to feel encouraged.
    But what if instead, during the assessment stage, you see the target go out to his car and carefully check it for improvised explosive devices. Your immediate thought will be:
Hard target. Security-conscious. Too difficult — kidnap someone else.
    If you’re the potential target, do you see how your display of security consciousness becomes the outermost layer of your security?
    But suppose the would-be kidnapper wants to assess a bit further. Now he learns that you never travel the same route to and from work. You never come and go at the same times. He can’t get a fix on your
where
and
when
. How is he going to plan a kidnapping now?
    Note that, by putting yourself in the opposition’s shoes, you have identified a behavior pattern in which he must engage before carrying out his crime: surveillance. Before you are kidnapped, you will be assessed. Assessment entails surveillance. Now you know what pre-incident behavior to look for. If you were trying to follow you, how would you go about it? That’s what to look for.
    Perhaps the would-be kidnapper will discover choke points — a certain bridge, for example — that you have to cross every day on your way to the office. This would be a good place for him to lay an ambush. But because you know this too, you will be unusually alert as you approach potential choke points. As he watches your choke point behavior, he realizes again that you are security-conscious, and thus a poor choice for a target. Again,
Vom Netzwerk:

Weitere Kostenlose Bücher