Left of Bang

Patrick Van Horne and Jason Riley wrote a magnificent book on how to survive using the U.S. Marine Corps’ Combat Hunter Program, titled Left of Bang. We call it Situational Awareness in the U.S. Air Force. This program will save your life if you understand the concepts.

Image result for Left of Bang

“If you were to picture a timeline, “bang” is time-zero and is in the middle of the line. Bang is whatever event you are trying to prevent from occurring.”
The Next Level of Tactical Awareness— Getting Left of Bang

Image result for left of bang

Situational Awareness: Let’s Stay to the “Left of Bang”

Getting Left of Bang: The next level of tactical awareness (Police One Article – for Law Enforcement) 

What is the Left of Bang? 

Left of Bang Webinar (FBI’s Citizen’s Academy Alumni Association – Boston Chapter)

Left of Bang and the OODA Loop –

For those that don’t pay attention…

Image result for left of bang

The F3EAD method

The F3EAD is used by military and government agencies to target individuals, organizations, and more. It can be useful for defending your family, business or self in a self-defense scenario.

The F3EAD (Find, Fix, Finish, Exploit, Analyze, and Disseminate – pronounced “F-three-e-a-d” or “feed,” is a version of the targeting methodology utilized by the special operations forces (SOF) responsible for some of the most widely-publicized missions in support of overseas contingency operations) method is interesting and it used by the military to find a target and eliminate it.


Use the F3EAD method in self defense can work like this:

Find – it is a start point to determine who who targeting you, your business or family.

Fix – identifying the threat or target in space and time (“Unblinking eye”) or known as surveillance.

Finish – neutralizing the threat using whatever means necessary (gun, knife, MMA, police, etc).

Exploit – finding evidence on the individual or group that is targeting your family, business or self, and if this information can be used in prosecution or in your defense in court.

Analyze – what went wrong or right during this self defense situation. Capture lessons learned.

Disseminate – share what you have learned with the self-defense community, so that it will help another person defend themselves in a similar situation.


F3EAD was used to capture Bin Laden –

Cryptocurrency Risks

Cryptocurrency – “a digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank” (Source:

What is Cryptocurrency: Everything You Need To Know [Ultimate Guide]

Cryptocurrency is the hot item right now with millennials and investors, but the buyer must be aware that it is not as safe as advertised. If you watch the news, you will see that many of these bitcoin exchanges have been hacked by sophisticated hackers. The latest one happened in Japan.

Bitcoin uses peer-to-peer technology to operate with no central authority or banks; managing transactions and the issuing of bitcoins is carried out collectively by the network. Bitcoin is open-source; its design is public, nobody owns or controls Bitcoin and everyone can take part. Through many of its unique properties, Bitcoin allows exciting uses that could not be covered by any previous payment system.these are some other interested crypto exchanges.

Besided Bitcoin, there are 6 more to look at.

1) Litecoin (LTC)

Litecoin, launched in the year 2011, was among the initial cryptocurrencies following bitcoin and was often referred to as ‘silver to Bitcoin’s gold.’ It was created by Charlie Lee, a MIT graduate and former Google engineer. Litecoin is based on an open source global payment network that is not controlled by any central authority and uses “scrypt” as a proof of work, which can be decoded with the help of CPUs of consumer grade. Although Litecoin is like Bitcoin in many ways, it has a faster block generation rate and hence offers a faster transaction confirmation. Other than developers, there are a growing number of merchants who accept Litecoin.

2) Ethereum (ETH)

Launched in 2015, Ethereum is a decentralized software platform that enables Smart Contracts and Distributed Applications (ĐApps) to be built and run without any downtime, fraud, control or interference from a third party. During 2014, Ethereum had launched a pre-sale for ether which had received an overwhelming response. The applications on Ethereum are run on its platform-specific cryptographic token, ether. Ether is like a vehicle for moving around on the Ethereum platform, and is sought by mostly developers looking to develop and run applications inside Ethereum. According to Ethereum, it can be used to “codify, decentralize, secure and trade just about anything.” Following the attack on the DAO in 2016, Ethereum was split into Ethereum (ETH) and Ethereum Classic (ETC). Ethereum (ETH) has a market capitalization of $41.4 billion, second after Bitcoin among all cryptocurrencies. (Related reading: The First-Ever Ethereum IRA is a Game-Changer)

3) Zcash (ZEC)

Zcash, a decentralized and open-source cryptocurrency launched in the latter part of 2016, looks promising. “If Bitcoin is like http for money, Zcash is https,” is how Zcash defines itself. Zcash offers privacy and selective transparency of transactions. Thus, like https, Zcash claims to provide extra security or privacy where all transactions are recorded and published on a blockchain, but details such as the sender, recipient, and amount remain private. Zcash offers its users the choice of ‘shielded’ transactions, which allow for content to be encrypted using advanced cryptographic technique or zero-knowledge proof construction called a zk-SNARK developed by its team. (Related reading, see: What Is Zcash?)

4) Dash

Dash (originally known as Darkcoin) is a more secretive version of Bitcoin. Dash offers more anonymity as it works on a decentralized mastercode network that makes transactions almost untraceably. Launched in January 2014, Dash experienced an increasing fan following in a short span of time. This cryptocurrency was created and developed by Evan Duffield and can be mined using a CPU or GPU. In March 2015, ‘Darkcoin’ was rebranded to Dash, which stands for Digital Cash and operates under the ticker – DASH. The rebranding didn’t change any of its technological features such as Darksend, InstantX. (Related reading, see: Top Alternative Investments for Retirement)

5) Ripple (XRP)

Ripple is a real-time global settlement network that offers instant, certain and low-cost international payments. Ripple “enables banks to settle cross-border payments in real time, with end-to-end transparency, and at lower costs.” Released in 2012, Ripple currency has a market capitalization of $1.26 billion. Ripple’s consensus ledger — its method of conformation — doesn’t need mining, a feature that deviates from bitcoin and altcoins. Since Ripple’s structure doesn’t require mining, it reduces the usage of computing power, and minimizes network latency. Ripple believes that ‘distributing value is a powerful way to incentivize certain behaviors’ and thus currently plans to distribute XRP primarily “through business development deals, incentives to liquidity providers who offer tighter spreads for payments, and selling XRP to institutional buyers interested in investing in XRP.”

6) Monero (XMR)

Monero is a secure, private and untraceable currency. This open source cryptocurrency was launched in April 2014 and soon spiked great interest among the cryptography community and enthusiasts. The development of this cryptocurrency is completely donation-based and community-driven. Monero has been launched with a strong focus on decentralization and scalability, and enables complete privacy by using a special technique called ‘ring signatures.’ With this technique, there appears a group of cryptographic signatures including at least one real participant – but since they all appear valid, the real one cannot be isolated.

Read more: The 6 Most Important Cryptocurrencies Other Than Bitcoin? | Investopedia


Homeland Security Snapshot – December

The Homeland Security Committee just released this visual product and I am cheering all the way bank. They get the threat of terrorism.



WASHINGTON, D.C. – The December Terror Threat Snapshot was released today by House Homeland Security Committee Chairman Michael McCaul. The “snapshot” is a monthly assessment of the Committee’s continuing efforts to highlight the growing threat America, the West, and the world face from ISIS and other Islamist terrorists.

Earlier this week, Chairman McCaul delivered his inaugural State of Homeland Security Address at the National Defense University, Ft. McNair in Washington, D.C. McCaul discussed the rise of radicalism, terror threats to the United States, and America’s role in winning the war against Islamist terror during his address. See video of his remarks, here.

Chairman McCaul: “The state of our homeland is increasingly not secure and I believe 2015 will be seen as a watershed year in this long war. ISIS sympathizers in San Bernardino executed the deadliest Islamist terror attack on American soil since 9/11 last week. European ISIS fighters returning from the battlefields of Syria conducted a massacre on the streets of Paris in the worst attack in France since World War II. President Obama’s failure to lead in confronting this threat has left us vulnerable and our enemies emboldened. What we need in this moment is a global strategy to win the war against Islamist terror – not more lectures and half measures.”

Key takeaways in this month’s Terror Threat Snapshot include:

  • ISIS and its supporters are engineering a global terror campaign against the West, including here in the United States where they executed the deadliest Islamist terror attack on American soil since 9/11. ISIS has now directed or inspired 66 plots to attack Western targets, including 19 inside America. ISIS sympathizers conducted the recent attack in San Bernardino less than three weeks after ISIS operatives struck in Paris.
  • The failure to destroy ISIS resulted in an unprecedented Islamist terror threat level here at home this year. Authorities have arrested more than one ISIS-linked individual every week, on average, in 2015. ISIS-related cases have been opened in all 50 states and account for the majority of the nearly 1,000 active homegrown extremist investigations.
  • ISIS and al Qaeda’s global expansion is spawning jihadist incubators from Yemen to Libya. ISIS has established a Libyan affiliate that is steadily consolidating its stranglehold on territory and drawing foreign recruits. In Yemen, al Qaeda in the Arabian Peninsula (AQAP) has capitalized on the ongoing war there to seize territory and bolster the ranks of its supporters.
  • Foreign fighters operating on jihadist battlefields are a surging threat to Americans and our allies, as demonstrated in the November 13 Paris attack. The ISIS attack plot in France was executed by mostly French and Belgian militants, some of whom had traveled to Syria and infiltrated Europe using the cover of refugee and migrant flows.
  • Islamist terrorists have attempted to infiltrate the United States through the refugee resettlement program since 2011. The National Counterterrorism Center has identified “…individuals with ties to terrorist groups in Syria attempting to gain entry to the U.S. through the U.S. refugee program.”
  • The transfers of Guantanamo terror detainees overseas and, potentially, to the homeland threaten Americans and broader U.S. national security interests. Nearly one in three detainees released from the facility are known – or are suspected – to have rejoined Islamist terror groups, including a former detainee who now recruits for ISIS in Pakistan. County sheriffs in Colorado warned President Obama in November that moving Guantanamo detainees onto U.S. soil, which is prohibited but which the President has threatened to force through executive action, would endanger American communities.
  • Iran is posed to receive economic sanctions relief from the West despite plotting terror attacks against Western interests, employing cyber weapons to target American government personnel, conducting illicit ballistic missile tests, stonewalling UN inspectors, and stockpiling missiles threatening Israel. The Obama Administration is preparing to ease sanctions on Iran, the world’s leading state sponsor of terrorism whose sectarian policies are a key enabler for ISIS and al Qaeda’s recruitment.

TerrorThreatSnapshot_December_Social Media

The complete December Terror Threat Snapshot is available, here.

View the Committee’s interactive Terror Threat Snapshot map, here.

Real Estate Self Defense and How You Can Avoid Being the Next Victim

Calgary_Real_Estate_ListingThere seems to be an uptick in attacks on Real Estate agents in America. It is time for the Real Estate community to teach their agents how to defend themselves or help them avoid being the next victim. The Real Estate community is made of both men and women, but most of these attacks occur against women.

Ashley Okland was shot and killed in West Des Moine in 2011 and this case is still unsolved. Beverly Carter was killed recently in Little Rock, Arkansas.

ashley-oklandRemembering Beverly








According to the Washington Post

Selling real estate is a solitary profession that involves escorting virtual strangers into sometimes vacant properties at a moment’s notice. Advertising — usually accompanied by an agent’s photograph and phone number — is virtually a requirement for the majority of agents who work for commission.

According to the National Association of Realtors, 57 percent of agents are women, and a 2011 report on violent crimes against real estate agents found that women are disproportionately victimized. says that…

About 42 percent of female real estate professionals and 18 percent of male agents say they have “occasionally” felt unsafe in the course of their real estate job, according to an online survey of 450 real estate professionals conducted by Moby, a safety mobile app company.


Robert Siciliano, a personal security and identity theft expert offers great advice on realty safety and security.

He offers these tips:

  • Be suspect of everyone
  • ID and pre-qualify at your first meeting
  • Stay in communication with the office
  • Have a plan for safe open houses
  • Use predetermined code words to alert your office of distress
  • Conduct personal safe marketing
  • Implement a buddy system
  • Dress for safety and success
  • Don’t take predators for a ride
  • Pay attention to your intuition
  • Know how to defend yourself.

Read the whole article here. has some great tips for Real Estate Agents –

There are several things agents can do to protect themselves:

  • Have a prospective buyer meet you in your office, NOT AT THE PROPERTY, preferably with co-workers present and NOT near closing time. Obtain identification from the buyer in the form of a drivers license and their vehicle license number. Leave this information with a responsible person in your office and advise them where you are going.
  • If possible, have someone go with you to the showing and have them wait in the car with a cell phone. The best scenario is to go to the showing in two different cars, but if this is not possible, try to be the driver. This will give you somewhat of an advantage.
  • Always have the person enter the residence or rooms in front of you. Never put your back to the person or allow yourself to be cornered.
  • Have area police phone number on speed dial on your cell phone.
  • DO NOT be lulled into a false sense of security by a female “buyer”. There are more and more cases of women being used to set up robberies and even rape.
  • Always follow your gut feelings. If something doesn’t feel right, pass on it.
  • When alone in your office at night be sure the doors are locked, preferably with deadbolts, have the blinds drawn and DO NOT open the door to anyone you do not know well enough to trust.
  • One very important thing is to have your mind conditioned and ready to react in case of emergency. Think about all the vulnerable positions you may find yourself in and think about what you would do if someone tried to attack you. Play the scenario over and over in your mind so that if it were to ever occur you would react automatically and quickly and not freeze or panic.
  • Carry a self defense product with you, have it ready, and know how to use it without hesitation.

We believe that agents should carry if authorized or learn how defend themselves in a hand-to-hand combat situation. Learning Brazilian Jiu-jitsu or any type of striking art (Krav Maga, MMA) will at least give you chance at surviving a violent encounter. Another option is to carry mace, a knife, or something to jab your attacker with.

An article titled “Safety Lessons that Saved My Life” by Melissa Tracey offers good advice.

Additionally, reading up on how to defend yourself is helpful as well. Author Joe Rosner has a great book titled “The Real Estate Safety Book: Personal Safety and Self Defense for Real Estate Professionals.”

Real Estate Self Defense

If you are looking for a school near St Louis or the Metroeast – one that offers stellar self-defense classes to Real Estate agents — look up Mike Rethmeyer. Mike can be reached at 314-780-4222,  or visit his website at

If you are looking for a Real Estate agent in the Metroeast – please call Frank Yunkarnold. He is a veteran that will meet all your real estate needs. Visit his Zillow and Facebook page.