What this blog is about 

This site, called Criminal Threat Management is about how to use available resources to identify, guide, counter or neutralise those persons that have intent to harm others – Threat actors. Criminal Threat Management will look at how to identify and manage a person, organisation or country that is, or has, developed harmful intentions. This combination of factors is called Threat Management, which can be defined as the “coordinated use of resources to guide, counter or neutralize the behavioral process taken from the development of criminal intent up to the point of actuating a physical crime”.

Follow this link to a YouTube presentation on what the concept of Criminal Threat Management is about: https://youtu.be/clLSNch1s-o

 

Why use the services or read the posts from this site? Don’t traditional security and risk management measures counter the risk posed by threat actors?

Professional criminals, terrorists, insurgents and state-based threat actors take the time to gather intelligence that can bypass or defeat security or risk management measures that have been put in place by their intended target. For those persons who must develop measures to ensure the safety of their assets, the identification and management of threat actors can enhance and prevent attacks. Criminal Threat Management can provide valuable information and resources to assist in that identification and management.

 

What you will find on this Criminal Threat Management site.

With the site being about the management of threat actors, you will find posts and services that will show how to identify a person or group that is developing the intention to harm others. These persons could be radicalised individuals, criminals of varying types, terrorist groups or state-based governments. You will also find posts that provide information on ways to guide, counter or neutralise threat actors that have been identified prior to those actors making an attack. Finally, you will also find posts and services that can be useful in applying various strategies and tactics to defeat a threat actor once that actor has initiated their attack.

 

And who is the main author?

David Harding’s experience is gained from more than 30 years within the protective security field, including serving in the Australian Army’s Special Air Service (SASR) and the Australian Federal Police’s Air Security Officer (Air Marshal) program. David is currently the Managing Director of Anshin Consulting, a Threat Management and Security consultancy that focuses on Threat Management, security, specialised training, research and advisory services. In this capacity, David has protected several of the world’s richest and influential business persons, and conducted private investigations and security operations spanning four continents. David has advised leading business persons, diplomats and Ambassadors on non-state threat actors, insurgents and terrorists. David is an international lecturer and trainer, and his articles and novel not only entertain, but have within them deeper meanings for security and counter-terrorism development. David has a Masters of Policing, Intelligence and Counter Terrorism from Macquarie University in Sydney Australia. David is a research associate at the Australian Security Research Centre, and a Registered Security Professional (Aust.)

Follow this link to David Harding’s LinkedIn page where you will be able to make contact through: https://au.linkedin.com/in/david-harding-69177816

 

  • Licence Notes
  • The information on this blog site is licensed for your personal use only.
  • The information on this blog site may not be sold or given away to other people.
  • Thank you for respecting the hard work of this author.
  • The information on this blog site is for learning purposes only and any resemblance to persons, living or dead is purely coincidental.
  •  
  • Disclaimer
  • The findings, observations and conclusions expressed by the author on this blog site are not, and should not be considered an opinion concerning absolute values of rectification requirements. No warranty or guarantee whether expressed or implied, is made with respect to the data reported or the findings, observations and conclusions expressed in this presentation. Further, such data, findings, observations and conclusions are based solely upon conditions and information in existence at the time of writing. The author accepts no liability or responsibility for or in respect of any use or reliance upon this report by any third party.
  •  

 

There are no comments so far

Leave a Comment

Don't worry. We never use your email for spam.

Don't worry. We never use your email for spam.