Yitzhak Rabin’s murder – the reasons for the failure

Article author: Miky Weinberg – Owner of the Tarantula Technologies Ltd and Octagon Security Ltd Companies.

27 years have passed since that evening on November 4, 1995, an evening when the citizen Yigal Amir succeeded in assassinating the late Prime Minister Yitzhak Rabin with the help of a gun in his possession and two precise and deadly bullets fired from a distance of 30 cm from the Prime Minister’s back. For the past 8 years, I have been lecturing on the assassination of the late Prime Minister Yitzhak Rabin to many graduates and students. In between lectures I find myself understanding more and more what happened to us and can supply better and more correct explanations. This year I was selected to head a professional debate where I was asked to talk about the period before November 4, 1995, when I functioned as a close protection specialist and try to explain the reasons for the failure and whether they are related to the characteristics and conduct of the close protection unit in the years before the assassination.

The Israel Security Agency’s close protection unit was established in 1958 as a lesson from an incident in which an Israeli citizen threw a grenade inside the Knesset plenum while it was housed in Beit Frumin. From then until November 4, 1995, the unit developed in accordance with the need for personnel and the consolidation of the security concept based on the fact that in all those years it was not required to deal with a real threat to any of the security objects that were its responsibility, including the prime minister. As mentioned, the professional discourse presented me with an intellectual challenge in searching for the question of whether the reason or reasons for the failure to secure the Prime Minister originated in the years before the assassination:

About the unit before the assassination:

A close protection unit is an operational unit with over 30 years of routine operational experience consisting of a normative structure tree that includes a unit head, department managers, branch heads, commanders, and close protection specialists. There is a clear division between the unit’s headquarters and the employees in the field, with the layer of commanders functioning as a link between them. There is respect on the part of the close protection specialists towards the commanders and managers at the headquarters. Recruitment to the unit took place in accordance with a defined and orderly process where everyone who successfully completes it undergoes general and specialized professional training in the field of close protection. Anyone who successfully completes the training is accepted into the unit and undergoes a process of initiation and overlap by an older close protection specialist. A close protection specialist in the unit is sent on personal security missions where he is responsible for screening the crowd with the help of increasing female soldiers, performing an anti-sabotage scan, supervising, picking up the principal, and integrating into his actual security until departure. The operational work, with an emphasis on the work in the prime minister’s team, is carried out in a professional process that includes a preliminary briefing, command and control, and a summary for the purpose of learning lessons. All the close protection specialists perform the tasks very seriously and in accordance with what was learned in the professional training and defined in the concept of security and the various mission portfolios.


After about 37 years of operational work in which no real adversary appeared, it would be very logical to understand the sense of self-confidence that prevailed among the unit managers, commanders and close protection specialists. On the one hand, there is no doubt that it is important for a unit to conduct itself operationally with a sense of self-confidence that the actions carried out in the field are correct and respond to the relevant threats, and on the other hand, the feeling of self-confidence must not turn into arrogance and arrogance and even thinking that you are the best in the world.

I remember very well that among the close protection specialists there was professional self-confidence but neither bragging nor arrogance, therefore I am sure that the feeling of security is not the reason for the failure to prevent the assassination.

Working assumptions:

The central working assumption from the moment the unit was established until November 4, 1995, was that “an Israeli-born Jew will not harm a Jew”, will not harm a state personality, and certainly not the head of the government. A job assignment that made the management level truly believe that an Israeli-born Jew would not assassinate the Prime Minister and passed from them to the level of commanders and close protection specialists in the field. The strong belief was translated by the close protection specialists in the field into an almost immediate clearing of anyone who seemed to fit the job description. This does not mean that the close protection specialists do not look at all those who approach the Prime Minister, but it is possible that the work environment causes the look to be different and less operationally stressful.

Yigal Amir proved that the main work premise of the service and within it the close protection unit was fundamentally wrong and did not correspond to the fact that in the past Israeli-born Jews harmed other Israeli-born Jews and certainly does not correspond to everything that happened in Israel in the months before November 4, 1995.

There is no doubt that the mistaken assumption of work is one of the main reasons for the failure to prevent the assassination of the late Prime Minister Yitzhak Rabin mainly because it created a mistaken belief and influenced what was defined in the unit’s security concept.

The security concept:

The close protection unit worked on the basis of a professional and clear security concept that defined that as a general rule the prime minister would be secured by a commander and four close protection specialists, would travel in an unarmored vehicle, and would be able to meet almost any person on the street or at events without undergoing identification and a security check at such a level that it would be possible to know what his or her intentions are and whether he or she is carrying weapons. The security concept was based on the belief that every close protection specialist in the unit received all the professional knowledge and tools required in order to successfully overcome anyone who would act to harm the prime minister.

Here too, Yigal Amir proved that in general, the security concept of the close protection unit was fundamentally wrong, and in particular the thinking that the armed close protection specialist would always succeed in defeating the opponent.

I am sure that the mistaken perception of security was also a major reason for the failure to prevent the assassination of Prime Minister Yitzhak Rabin.

Supervision and Control:

The Shamgar Committee found that the head of the service was not sufficiently involved in the activities of the close protection unit and, as part of this, did not supervise or visit the extent desired in order to know if there were professional gaps in its activity. The supervision and control within the unit over the work of the close protection specialists in the field was also not sufficiently defined, orderly and professional and it seems that in general the various close protection specialists were sent to carry out the security tasks with full faith that they would always perform it to the best of their ability and without gaps, a “fire and forget” style of operation.

Since the failure to supervise and control the action in the field prevents the detection of professional gaps and does not allow the layer of close protection specialists to be heard, it is clear that this has a part in the reason for the failure to prevent the assassination of Prime Minister Yitzhak Rabin.

The attacker’s viewpoint and detecting exceptions:

Seeing from the attacker’s viewpoint was a professional field that did not exist in the security concept of the close protection unit and therefore was not studied in the professional training. The implication of this was that the close protection specialist in the field did not know how to think from the point of view of the attacker and did not know how to professionally detect exceptions in the threat sector.

This professional gap was one of the main reasons why Yigal Amir stood for about 40 minutes near close protection specialists who actually saw him but did not define him as an anomaly in the section and thus allowed him to safely arrive at the point of time and the meeting with the Prime Minister that suited the execution of a precise and deadly shot.

In conclusion:

The Shamgar Committee, which examined in depth the reasons for the failure to prevent the assassination of the late Prime Minister Yitzhak Rabin, found that it did not occur because of the close protection specialists who carried out the task of securing the Prime Minister on November 4, 1995. The committee came to the clear conclusion that the close protection specialists worked and performed the security exactly as defined in the unit’s security concept and as they were taught in the professional training, therefore in its decision the committee reinforces the insights I presented in the professional discourse.

Remember, that “security should be maintained” on the basis of work assumptions that correspond to reality and that define the concept of professional security!!!

Sicilian assassination

Article author: Miky Weinberg – Owner of the Tarantula Technologies Ltd and Octagon Security Ltd Companies.

On May 23, 1992, the Italian judge Giovanni Falcone and his wife, accompanied by close protection specialists, landed at the Punta Raisi airport in Sicily as part of the regular trip they made during their bi-weekly visit to their home in Sicily. Giovanni and his wife boarded the private car with a front security car and a rear security car. The convoy began with a drive on the highway from the airport to the couple’s home in Sicily. An assassination squad of the Sicilian mafia followed the movements of Giovanni Falcone, and when the convoy of vehicles passed over a bridge, one of the members of the squad activated a powerful bomb that exploded with perfect timing, killing Giovanni, his wife, and three out of five close protection specialists.

Judge Giovanni Falcone and his colleague Judge Paolo Borsellino were recorded in the history books of Italy as two judges who stood out for their motivation, determination, and unique and creative way in the war against the well-known Sicilian mafia.
The Sicilian mafia is a criminal organization originating and based in Sicily, Italy. The Sicilian mafia managed to create a state within a state and operated by collecting patronage fees, arbitrating disputes between criminals, and organizing illegal deals and agreements. When the Italian state was created in 1860, Sicily was a restless region. Hundreds of years of neglect have created an atmosphere of mistrust towards the authorities and a tradition of taking the law into one’s own hands. From the mid-1970s, the mafia was defined as an organization that protected wealthy estate owners for a fee and then blackmailed them for patronage and ransom. The war against the Sicilian mafia began during the years of Mussolini’s reign, continued for many years after him, and was characterized by the authorities changing generations of investigators and judges mainly because most of them met their deaths in assassinations and on the mafia’s side by standing long trials, at the end of which most of them were sent to long prison terms. Both sides understood that this was a long-term war in which everyone involved would one day find themselves in prison or the grave.
Giovanni Falcone and Paolo Borsellino also knew that the day would come when they would pay with their lives for deciding to take on a central role in the war against the Sicilian mafia. The authorities in Italy knew very well that the judges were in real danger of life, they placed a security system around them and thus turned them into secure protectees 24/7.
Over the years it was the Sicilian mafia that decided who would live and who would die – when and by what means of assassination. The mafia assassinated the lives of dozens of policemen, investigators, judges, and their families in various and diverse ways such as shooting and explosive devices. For the most part, those marked by the mafia as a target for assassination found their death in another successful assassination carried out by professional and skilled squads of the mafia. The fact that some of the targets for the assassination were secured neither deterred nor prevented the mafia from carrying out the assassination, and if we look at the success rates, it can be stated that the close protection could not really face the power of the Sicilian mafia, which more than once resembled the assassination abilities of a government and state organization, and at times it could be thought that it was even superior, the evidence of this is the close protection specialists who died in some of the assassinations.
Such assassinations prove that a criminal organization knows and can carry out a complex operation that requires high professional skills and part of its goals is to win the sympathy of the citizens and create future deterrence.
A photo of Giovanni Falcone with some of the close protection specialists stationed around him:

The assassination of Giovanni Falcone exposes the modus operandi of the Sicilian mafia in the use of remotely activated explosives.
The decision to assassinate Giovanni Falcone was made at the meetings of the Sicilian mafia committee between September and December 1991, following the existence of a trial against members of the mafia. The method of action chosen to kill Giovanni was a powerful explosive device. The selected assassination squad gathered intelligence on Giovanni’s movements and discovered that once every two weeks he and his wife come to their home in Sicily – this movement was defined by the squad as an activity that repeats itself with the same frequency and in the same way – arriving in Sicily by plane, landing at the Punta Raisi airport and traveling in three vehicles on the highway that leads from the airport to the city.
The members of the squad patrolled the highway and located a section of it that goes over a culvert built over a water crossing – this point was chosen as suitable for placing the explosive device. The members of the squad purchased 200 kilograms of explosives and began training in assembling an explosive device and how to activate it remotely while using the knowledge and experience of an explosives expert from the New York mafia the Gambino family. On May 8, 1992, the squad met to prepare the final explosive charge which included 13 barrels loaded with 400 kilograms of explosives. The squad placed the barrels in the water passage under the culvert.
On May 23, 1992, the day of the assassination, the assassination squad knew the fact that Giovanni and his wife were again flying to their home in Sicily and therefore set this day as the day of the assassination. The squad split up when one was stationed as the lookout at the airport and two as the lookout on a hill that allowed eye contact with the highway and especially with the culvert under which the explosive device was placed. After the observer at the airport recognized the arrival of the plane, the disembarkation of Giovanni Falcone and his wife, and their boarding of the personal vehicle located in the middle of the convoy, he relayed the information by telephone to the two observers on the hill. With the help of binoculars, the two followed the progress of the convoy on the highway and with perfect timing, when the three vehicles of the convoy got on the overpass, they remotely activated the powerful explosive device – the first escort car was hit by the full force of the explosion and flew several tens of meters from the road while the three close protection specialists inside were killed on the spot. The second car in which Giovanni Falcone and his wife were traveling crashed into a concrete wall and threw the two to their deaths through the front window.
Video showing the assassination:








The assassination squad of the Sicilian mafia was able to eliminate Giovanni Falcone and his wife mainly because it recognized in their conduct a repetitive activity. In close protection, an activity that repeats itself is defined as a characteristic behavior and is considered an activity in which the protectee is at the highest level of risk based on a working assumption that the adversary will discover it as part of the intelligence-gathering phase. The close protection unit has two ways to deal with recurring personal activity:
1. When it is an activity that cannot be changed, neither its time nor its route, resources must be invested to increase the level of security with an emphasis on the analysis of the area from the attacker’s viewpoint and preliminary actions to locate unusual people and objects. In the case of Giovanni Falcone, it was possible to change the flight time, change the position of the protectee’s vehicle in the convoy, and travel greater distances between the vehicles in the convoy.
2. When it comes to an activity where it is possible to deceive and break the routine, the times of the activity must be changed, the routes of travel must be changed at each arrival and departure, deception must be carried out in the convoy of vehicles, a dummy convoy must be operated, etc.

On July 19, 1992, two months after the assassination of his colleague Judge Giovanni Falcone, judge Paolo Borsellino was also killed by the Sicilian mafia. Also in the case of Paolo Borsellino, the assassination squad recognized in his conduct a recurring activity – a visit to his mother’s house which is in the city of Palermo. The assassination squad again chose to use explosives, only this time they placed them inside a vehicle and thus created a powerful explosive vehicle. The squad parked the vehicle ahead of time in front of the building where Judge Paolo Borsellino’s mother lived. On the day of the assassination, the members of the squad waited on the lookout for the arrival of Paolo Borsellino and when he arrived with his close protection specialists, they waited for him to get out of the vehicle and approach the main entrance door to the building. While he pressed the intercom and waited for the door to open, the squad member activated the explosive device that caused the death of Paolo Borsellino and the death of his five bodyguards.
Video describing the explosion:








In conclusion:
Close protection against the opponent is continuous and cannot stop even for a single moment. From the moment the adversary decides to assassinate a protectee, he or she will carry out an orderly and professional process that will usually begin with an intelligence-gathering phase to locate repetitive activity. The adversary can choose one of many courses of action available to him or her and usually, he or she will choose the course that he or she considers the best and safest for 100% success. Since the adversary is focused only on the assassination mission, he or she has the ability and patience to wait for the best time to execute which can be almost anywhere and anytime. A close protection unit that only places close protection specialists around the protectee and does not create and implement additional security circles will not succeed in preventing harm to the protectee.

Remember that security must be maintained with several defensive rings involving breaking routines and deception.


Forming a concept of deterrence in the security system

Article author: Miky Weinberg – Owner of the Tarantula Technologies Ltd and Octagon Security Ltd Companies.
Everybody creates deterrence to make someone else not dare to do what they think. The use of deterrence has become more and more common over the years and is found almost everywhere and in every field. If in the past only countries used deterrence against mainly enemy countries, today almost everyone creates some kind of deterrence towards someone else for various reasons – a store owner who deters against theft, government bodies who deter against failure to pay bills, lawyers who deter citizens with threatening letters, a neighbor in a residential building who creates a deterrent so that no one messes with him/her, the traffic police who creates a deterrent for drivers, etc. Everyone who produces and uses deterrence has the same goal – to make the other party not carry out his/her thoughts and/or do what he is told without resisting. Many security systems also use deterrence against potential adversaries, but do they produce it in the right way and in the right way so that you will really be able to influence the adversary? Throughout my years of work in the close protection unit, and especially after the failure to assassinate the late Prime Minister Yitzhak Rabin, I used and felt the power of deterrence against the surrounding environs and especially against the potential adversary, and today, after thirty years of accumulated professional experience, I believe more in the importance and power of deterrence and thinks that every security system must produce a cross-circuit deterrence based on a professional concept of deterrence and unique to the characteristics of the object of security. As someone who specializes in the field of seeing through the attacker’s viewpoint, I am sure that a security system that includes strong and effective deterrence succeeds in keeping many adversaries away, and in contrast, a security system that combines deterrence in an unprofessional manner or without deterrence In general, it signals to the adversary that it is possible to approach and even attack.

In order to begin formulating a concept of deterrence, it is necessary to answer the following questions: What is deterrence?
How is deterrence created?
How do we achieve efficiency and benefit against the adversary?
What is the likelihood that the adversary will refrain from carrying out his/her plan to strike as a result of the sword of deterrence?

“Deterrence” (Dictionary definition): A strategy designed to prevent an adversary from performing a certain action, by signaling that the reaction to the action will bring the adversary more harm than good. Deterrence is based on the means that are or are not available to the threatening party and its willingness to use them. A central element of the deterrence strategy is that the threat should be perceived as a credible threat in the eyes of the threatened party. Since the goal of deterrence is to influence the adversary’s decision-making processes, the threatener must know the adversary’s characteristics (seeing from the attacker’s viewpoint). One of the significant difficulties in the concept of deterrence is the existence of a difference between the perception of reality and the world of values of the threatening side and those of the adversary. As a general rule, if there is a difference between the world view of the parties, the more difficult it will be for the threatener to place an effective deterrent against the adversary.

How do you create a concept of deterrence in a security system?
Step 1: The understanding and recognition of the effectiveness of deterrence against the adversary and the need to allocate a budget and resources to create it in a professional and correct manner.

Step 2: Determining working assumptions that are based on and refer to the characteristics of the criminal and terroristic adversaries. For example, does the threat of punishment really deter the criminal adversary? Does the threat of capture and imprisonment really affect the terroristic adversary? Is the mere threat stronger than the punishment itself?

Step 3: The indication of the criminal and terror threat towards the security object is taken from the risk survey carried out for the facility and based on a professional analysis in view of the attacker.

Step 4: Determining what deterrence will include at the level of principles.

How are the rings of deterrence made?
Step 1: Deterrence on the website of the object of security – if the object of security has a website, it is possible to incorporate content indicating that there is a professional and invested security system that knows how to deal with various threats, including publishing photos of security guards, security vehicles, measures and more.

Step 2: Deterrence in the outer space – analyzing the outer space defined as a threat zone to the security object in order to mark places that the adversary can use to organize and axes that can be used by him/her to approach and enter the facility, and all this to decide where to place deterrent signage, cameras, lighting, obstacles and more.

Step 3: Deterrence along the line of walls, which includes the main entrance complex and emergency exit doors – creating a clear security screening process in the main entrance complex, which includes an entry and exit route, directing signage, deterrent signage, and more. Use of an access control system at secondary doors and emergency doors, placement of signage deterring unauthorized entry, placement of cameras, lighting, and more.

Step 4: Deterrence inside the facility – division into areas to which only authorized persons can enter, use of an access control system for these areas, deterrent signage, cameras, an alarm system, and more.

Step 5: Physical security force – placing security guards and security screeners at all the deterrence circles – external, the entrance complex and inside the facility, and all this in combination with an observing and dispatch center to create a quick response force in response to any unusual event.

Step 6: Active security: All those in positions in the security system should learn to be active during the shift – act to locate the adversary in all sectors, conduct questioning for anomalies, conduct external and internal patrols, and more.

Crossing stage – Visibility: The subject of visibility crosses all the deterrence circles in the object of security, starting with the visibility of the security force which begins with the clothing, the manner of standing, and the style of speech and continues with the visibility of the entrance complex, the technological systems, the signage and more.

How do you achieve efficiency and benefit against the adversary?
There are two ways to examine the effectiveness and usefulness of deterrence against the adversary. One way is learning from real events – conducting an investigation and drawing conclusions and lessons for application after each event. A second way is to use an external force that simulates the adversary to carry out drills based on the sight of the attacker. In the end, an investigation will be carried out and conclusions and lessons to be applied will be drawn.

What is the likelihood that the adversary will avoid carrying out his/her plan to strike as a result of the sword of deterrence? The answer to this is clear and unequivocal – the sword of deterrence affects the adversary and provided it was created professionally and correctly and is not based on coincidences and local and unfounded initiatives. For example – will buying and placing a dummy crow on the balcony succeed in deterring pigeons from coming and standing?


Whoever performs the analysis of the attacker’s vision will learn that the adversary sees almost the entire security system and is able to distinguish dummy measures immediately or alternatively carry out actions to test the reliability of the measures, therefore, when it comes to dummy measures, one should use those that really look and are close to reality.


Experience determines that deterrence is effective against the adversary provided that it is formulated and done in a professional and correct manner, therefore every security system must formulate a professional deterrence concept and implement it into a practical implementation plan. Those who know how to create a deterrent with a threat that will be perceived by the adversary already – realized at the highest level, will succeed in keeping him/her away from the security object. There is an obligation to periodically examine the deterrence effect on the adversary in all circles and improve it according to the results. One must invest in creating deterrence in each circle, recognizing that each circle should make the adversary regret his/her desire to attack the security object.


Remember, that “security should be maintained” in combination with a professional deterrence concept!!!

The adversary with the yellow vest

Article author: Miky Weinberg – Owner of the Tarantula Technologies Ltd and Octagon Security Ltd Companies.

A pair of YouTuber friends from the United States decided to document whether they manage to enter paid and/or secure sites, such as a movie theater and a museum while wearing a yellow vest and equipped with a walkie-talkie without being required to be screened and pay. The two wanted to prove that wearing a yellow vest allows free entry into almost any public site from a critical point of view and not as an adversary, even though in practice they look and behave according to his/her thinking and action characteristics.
Here is the video documenting the two entering public sites without difficulty just because they are wearing a yellow vest:

Why would an usher or security guard think that two guys wearing a yellow vest are not required to perform a security screening at the entrance to the facility and why would an employee inside the facility who meets them believe their appearance and story and allow them to continue doing their “job” without inspection and supervision?
Why does a person who wears a yellow vest or dressed as a service provider or a security official manage to easily enter public facilities such as a cinema or a museum and have difficulty reproducing the success in facilities that are considered more secure such as a train station, a government office, etc.?
The answers are found in the level of awareness of the security array regarding the subject of seeing things from the attacker’s viewpoint and the operative actions that we carry out as part of the list of what to do when dealing with the adversary:

The attacker’s viewpoint- what is the way of thinking and characteristics of the adversary’s behavior?

1. The adversary invests a lot of time in learning about the behavior of people who stay in the public space, and work in different and diverse
civilian and governmental workplaces, and work in security positions at different levels.

2. The adversary collects information and learns about people’s reactions in different routine situations and under stressful conditions and
even initiates the creation of situations to experiment and test whether the theory works in reality.

3. The adversary knows how to quickly identify who is standing in front of him/her and what story and manipulation will fit and work on
him/her with a high percentage of success.

4. The adversary is aware that most people like to identify with a story and help others, connect to emotion and act according to it, and in
addition act according to familiar patterns and images.

5. The adversary has high self-confidence, acting ability, the ability to impersonate, the ability to identify and exploit opportunities, and the
ability to motivate people.

6. When dealing with security personnel, the adversary will work to create a familiar and non-threatening story and appearance to create a
feeling that he/she is on the side of the good guys.

Why do the officials manning the entrance to the facility believe the adversary and allow him/her to enter?

1. The usher, security screener, and/or security guard manning the entrance to the facility are first of all human beings with a personal
character that includes experiences, images, and familiar patterns kept in memory, a level of self-confidence and emotion that will be
expressed in any situation where they have to face another person and make a decision whether to believe or not believe him/her.

2. In general, most people tend to believe what they see, therefore if someone arrives dressed in a yellow vest and holding a walkie-talkie
or a ladder and says that he/she has come to provide service and fix something in the facility, then there is a high probability that he/she
will be allowed to enter without a security screening process.

3. As a general rule, a person with low self-confidence will find it difficult to stand in front of someone whom he/she considers important,
authoritative, determined, and with high self-confidence and therefore also in this/her case, with a high probability that he/she or she will
be allowed to enter without a security check process.

4. Most people come from a place of wanting to help and especially those who will ask for help and not be seen as threatening, so when the
adversary asks to “just” enter the bathroom or says that he/she really doesn’t feel well and asks if it is possible to “just” wash his/her face
and leave, it is likely that the person in charge at the entrance to the facility will believe him/her and allow him/her to enter.

5. As a general rule, a person in charge of entering a facility who has not undergone appropriate professional training and/or who does not
work based on a security concept, security portfolio, and procedures will have a very difficult time facing a skilled adversary mainly due to
the lack of knowledge and awareness of the dangers.

6. Lack of knowledge of the potential adversary, his/her way of thinking, and his/her ways of acting with an emphasis on trying to enter the
facility will cause the person in charge at the entrance not to think for a moment that the person standing in front of him/her is a person
impersonating someone else.

 Why does the employee inside the facility believe the adversary with the yellow vest and allow him/her to continue
his/her actions?

1. As a general rule, the employee assumes that anyone who has passed the security system at the entrance to the facility is fine and has
permission to move around inside the facility.

2. An employee without training and/or awareness of the capabilities of the potential adversary, will have a low chance of understanding that
the person standing in front of him/her is not innocent.

 What should be done to successfully face the adversary with the reflective vest?

1. Formulate a security concept that will form the basis for the formation of a security portfolio and security procedures for the facility that
will be defined as a uniform rule for implementing all security functions in the facility.

2. Make sure that the security procedures at the entrance to the facility define a security check process based on unique identification for
every person who wants to enter the facility – as a general rule, it is recommended not to allow the person in charge at the entrance to the
facility discretion to avoid a situation where the adversary manages to create a false representation and deceive.

3. To incorporate in the professional training of the various positions in the security system content that deals with the attacker’s mindset –
thinking, characteristics, and methods of action.

4. Hold with the officials at the entrance to the facility simulations simulating the actions of the potential adversary who will try to enter the
facility without inspection – you can use YouTube videos to learn about the adversary and for illustration purposes.

5. To raise the awareness of the employees in the facility about the presence of anomalous people in their work environment with the help of
professional training sessions, an awareness campaign, and more.

6. Carry out exercises for the security array and employees to check the level of knowledge and the level of quality of execution
Two Israeli YouTubers also decided to record themselves trying to enter public and security facilities – although on their part this is
considered a prank, a lot can be learned from the results:

In conclusion:
The potential adversary will use all his/her abilities to try and enter the facility without a security screening process being performed on him/her while identifying and exploiting the weaknesses among the various officials stationed at the entrance to the facility. Most of the failures of those in leadership roles when dealing with the impersonating adversary stem from a lack of professional knowledge that causes disbelief that the adversary can arrive dressed in a yellow vest or as a military officer or as a police officer or as a service provider of one kind or another. The way to teach the security array to deal with an impersonating adversary can be done and is relatively easy, so all that remains is to be aware of the threat and give it an appropriate response.

Remember, that security should be maintained also in combination with understanding the attacker’s mindset!

The assassination of Shinzo Abe in Japan – incident analysis

Article author: Miky Weinberg – Owner of the Tarantula Technologies Ltd and Octagon Security Ltd Companies.

On Friday, July 8, 2022, reports began to arrive from Japan of an assassination attempt on former Japanese Prime Minister Mr. Shinzo Abe during a speech he/she delivered at an open election rally in the western city of Nara, near the Yamoto Saidaiji train station. Shortly afterward, videos begin to show up on the Internet that managed to document the moments of the assassination – one assassin, a 41-year-old Japanese citizen who served in the Japanese navy, with one improvised weapon, fired two bullets at a distance of about 5 meters at the back of former Prime Minister Shinzo Abe. The second bullet struck and wounded Shinzo Abe at a fatal level. A short time after he/she was taken to hospital, former Japanese Prime Minister Mr. Shinzo Abe died of his wounds.
Assessment regarding the motive of the assassin Tsuya Yamagami was that Yamagami believed that the former prime minister had a connection to the Unification Church, which is located in South Korea and is also active in Japan.
Close protection in general and the Japanese close protection unit in particular once again experienced failure in dealing with one adversary with one gun emerging behind the principal and succeeding in firing accurately before any of the close protection specialists in their sectors managed to prevent the attack, even though he/she was a former prime minister who continued to have close protection at events.

There is no doubt that the characteristics of the assassination of the former Prime Minister of Japan are reminiscent of the characteristics of the assassination of the Israeli Prime Minister Yitzhak Rabin 26 years ago.

Picture of the assassin with the improvised weapon (it appears to be an improvised weapon with ammunition of a shotgun, which is easy to obtain in Japan, or a muzzleloader, with gunpowder, standard or improvised and a suitable bullet):

Once again the obvious question is: how can a professional and skilled close protection unit fail to prevent injury to the principal?

The uniqueness of close protection:
History shows that most of the assassination attempts on personalities around the world were carried out by one or more adversaries, with a personal or political motive, who had the ability, daring, and courage who simply decided to try and succeed despite the presence of close protection specialists around the principal. In addition, factually, most of the adversaries succeeded in the assassination mission in incidents in which the close protection unit allowed the public to stand close to the principal without undergoing a security screening (such as in the attempted assassination of US President Ronald Reagan, the assassination attempt on Israeli Prime Minister Yitzhak Rabin and more).
The object of security in close protection is a flesh and blood person who can be injured at various levels and even reach a state of death from which there is no way back therefore the price of error in close protection is several times higher than the price of error in other security fields.
The adversary in close protection acts out of a strong motive, learns about the level of security around the principal, decides on the course of action for the assassination, the date and place, and how far he/she is willing to go to succeed in harming and even killing the target – the principal.

The uniqueness in the field of close protection is the fact that the security of the principal is dynamic and that the close protection specialist can never know whether all the security operations they perform daily do indeed keep potential rivals away from the principal, and despite this, he/she must continue to maintain security daily anew looking after the next adversary. Every close protection unit in the world must believe that at some point a new adversary may arise who dares to confront the close protection specialists in an attempt to harm the principal in the way and means he/she or she decides while exploiting mistakes in the perception and security methodology and/or level and quality of security in the field that is presented by the security array.
In close protection, if the security array allows the adversary to reach the state of carrying out the attack, whether, by firearms or other means of attack, the chance of succeeding in preventing actual personal injury becomes low, and it does not depend on the array and any active action against the adversary will start with failure.
Picture of the moment of shooting at the principal:

The Japanese Personnel Security Unit has failed in its mission to secure its security object, former Prime Minister Mr. Shinzo Abe, during its participation in an open election event – I sincerely hope that this unit will overcome the severe sense of failure and move towards a better future.

The belief among the security forces that an adversary can actually arrive who will try to assassinate a person with a means of killing, including a firearm:

It is possible that the strict law in Japan on the right to bear a firearm with a license influenced the working assumptions in the security concept of the local close protection unit to the point that the chance of an assassin coming with a firearm is very small to impossible. If such a working assumption exists, it undoubtedly affects the security method applied by the security array that performs the various tasks under the responsibility of the unit – the close protection specialist in the field is focused more on dealing with an adversary with any non-firearm, including a pistol.
In the same way, the crime situation in Japan, which is considered one of the lowest in the world, can also affect the working assumptions that will determine that the chance of an attempted assassination attempt in Japan tends to be zero.
Note: Japan is considered an unparalleled safe country, one where citizens and tourists can roam around without fear for their lives or property. One reason for this is the tough policy on firearms possession. Japanese law prohibits, almost universally, the possession of firearms. Under Japanese law, the possession of a firearm is generally allowed only by formal agencies, such as the police and defense forces. Another group that is allowed to possess weapons is the hunters, whose law allows them to issue a rifle license only.
Such a law could cause the potential adversary to find other ways to obtain weapons, including making improvised weapons as the assassin did in the assassination of Shinzo Abe.
Picture of the improvised weapon used by the assassin:

The data on the level of principal security at the event can be extracted from the photographed documentation:

The Japanese close protection unit secured the principal based on the security plan in an open-air event with an audience.
The program included a decision on the location of the principal at the event and the location of the audience.
The road does not appear to be closed to vehicular traffic during the incident – vehicles are seen traveling during the principal’s speech.
The security array included several rings – close protection specialists, close protection specialists in the perimeter area for the location of the principal and police officers.
The audience at the event is located at several points and a distance of several meters from the location of the principal.
Some of the close protection specialists appear to be armed with a pistol.
It seems that at least 2 close protection specialists have in their hands a mobile device to protect the principal against a bullet hit.
It is not clear whether a security check process was conducted for the audience at the incident.
It seems that the principal did not wear a protective vest.
The backspace for the principal seems to be closed to visits by crowds.
The assassinating adversary was photographed standing with a side bag in the crowd group placed at the back right for the location of the principal.
The adversary was recorded going down the road, advancing towards the principal as he/she took out the improvised weapon, straightened his arms, and fired two bullets from a distance of about 5 meters.
The assassin’s adversary appears to have fired the first bullet and then a second.
According to the principal’s reaction, it seems that the first bullet did not hit him/her and the second bullet did hit and knocked him/her to the ground injured.
Just before the shooting, it appears that the close protection specialist who was in the back area to the location of the principal noticed the assassinating adversary but did not take any effective counter-measures that managed to prevent him/her from firing at the principal.
It seems that the close protection specialists next to the principal did not take any active action to bring the principal to the ground after hearing the first bullet fire.
It seems that the close protection specialist who was holding the mobile device against bullets did not have time to use it fully and effectively.
After firing the two bullets, one of the close protection specialists is seen jumping on the assassinating adversary who at this point drops the improvised weapon to the floor.
No close protection specialist was seen pulling out a gun at any point when the shooting began.
Aerial photo of the location of the incident and the security plan:

The assassinated adversary as documented stands in the audience:

Documentation of the assassinating adversary shooting:


How to deal with an assassinating adversary during a security event in an open field event:

Secure the principal based on a dedicated security plan for the event that includes an analysis of the attacker’s viewpoint, a list of relevant threats, and a list of responses to the threats.
Demarcation of the event area and its closure for vehicle entry.
Determining the location of the principal at the event.
Determining the location of the audience at the event and demarcating it with a fence – at a distance that will allow the audience to see and hear the principal and will make it difficult for the audience to approach him/her without the security force noticing.
Carrying out a security inspection process for the public to locate weapons on the body and/or baggage.
Deployment of close protection specialists in security rings: close ring, peripheral ring, and close protection specialists in positions in front of the audience.
Deployment of auxiliary forces, and police, mainly in the crowd complexes and roadblocks.
Performing actions to locate the adversary in the prevention phase – while he/she is in the crowd.
Use of protective equipment against shooting damage, such as a protective vest for the principal, placement of a reinforced glass wall in the scope of the principal’s location in accordance with professional analysis, or placement of at least 2 close protection specialists to close the principal back and use a mobile device to absorb bullets.
Active protection action of the close protection specialist placed in the back area for the principal from the moment the adversary is identified pulls out the gun and straightens the hands into firing position.
Proper work of the circle close to the principal from the moment the first shooting noise is heard by putting the principal on the ground quickly.

In conclusion:
It is no coincidence that we see close protection units that have experienced a failure in a close protection mission, such as the American close protection unit and the Israeli close protection unit, which have since invested a lot of resources and effort in learning about their potential adversary and preventive plan. Looking at it from the side, the level of security performed by the above units may seem excessive and unreasonable but for those in charge of the principal security task this is the level required not to be caught again unprepared to face the assassinate quarrel, this is all in order not to experience it again.
My heart goes out to the Japanese close protection unit that yesterday experienced the biggest failure that can be experienced in the field of close protection and in the hope that they will learn from the lessons of failure to get better and become a better unit.

Remember, “security must be maintained” by constantly thinking about the adversary !!!


school’s security

Article author: Miky Weinberg – Owner of the Tarantula Technologies Ltd and Octagon Security Ltd Companies.

I am sure that the massacre carried out in an elementary school in the town of ּUvalde in Texas in which 19 students and two teachers were killed in cold blood, deprives sleep in those in charge of security in the Israeli Ministry of Education who have no doubt already sat down to check whether or not what needs to be done to do so. There is no doubt that this is an extreme threat with an increasing probability of realization and has the highest level of damage severity when it comes to risk management.

The shocking massacres that occur again and again in the United States can help in a better understanding of the threat and its occurrence characteristics from the attacker’s perspective.

The 18-year-old killer who committed the massacre at the school moved into his grandmother’s home in the town of Uvalde last March. The killer had previously attended this elementary school and returned to it with the rifle he legally bought the day after his classmates graduated. Residents who knew him said he was teased because of his attire and because of his family’s difficult financial situation, and he was considered a failing and obscure student who eventually dropped out of school. The massacre began on Tuesday morning when the killer shot his grandmother in the face and seriously injured her, took her van, and drove to school, at 11:28 he left the van after getting off it while armed with a rifle and about 1000 rounds. He started moving on foot towards the school while shooting at civilians who were on his way (some wanted to help him because they thought he had been in a car accident), at 11:40 he entered the school without interruption, broke into one of the classrooms where innocent teachers and students were at the time, and simply started shooting them mercilessly and emotionlessly. The local police announced that the killer murdered the students and teachers very shortly after he broke into the classroom.

Around 1 p.m., a police team managed to shoot the killer and neutralize him. During the time between 11:40 and 13:00, some of the students managed to hide from the killer’s eyes, some were injured by the shooting and did everything to make the killer think they were dead and some lay down on their wounded friends to try and save them from death. Children aged 8-10 found themselves at the scene of a brutal murder while seeing their friends killed and injured.

Texas police reported that the school has a security plan that some of its principles were not implemented at the time the killer committed the massacre – a back door remained open and a security guard was not on duty.

What is the agency that guides the Israeli Ministry of Education regarding the security of educational institutions in Israel?

The Security Division of the Israel Police is the agency that guides the Israeli Ministry of Education on how to maintain security in educational institutions in Israel (kindergartens, schools, high schools, and so on). The guidelines include the physical and technological means, the physical security, the security method, and the method of supervision and control required to check that the application in the field complies with the guidelines.

Can such a massacre take place in a school in Israel? (Combination of Ami Popper and the Merkaz HaRav massacre?)

The working assumption of the Ministry of Education should be that a massacre of this kind can be carried out in a school in Israel (it is possible that this working assumption already exists). The massacre in the United States, and especially the massacre in Texas, must serve as a very powerful warning alarm, one that cannot and must not be ignored. It must not be mistaken to think that such a massacre in Israel cannot take place here. In Israel, as in the United States, and regardless of the policy of selling weapons to civilians, a former and disgruntled student may decide to return to school to take revenge for the murder of teachers and students. It must not be assumed that an Israeli person will not reach such an extreme situation.

Where is the threat of massacre on the list of relevant threats to schools?

Risk management includes two parameters for measuring the level of frustration – the likelihood of the threat being realized and the level of damage if it occurred.

The level of damage in the massacre of young and innocent young children is clear and unequivocal – it is a disaster at a national level that will undoubtedly cause great shock and immediate and many changes.

The likelihood of realization is given to different interpretations – although it is a threat that is defined as extreme and such that many will think and say that “where we are at such a massacre will not happen”, its likelihood of implementation exceeds any other massacre in the United States. The position of the threat in the list of relevant threats affects the level of response that will be given to deal with it.

What is the damage in a school massacre?

Our children are the most precious thing that exists for us in this world and cannot be compared to anything else precious that we have already achieved or that we strive to achieve. When children, especially young children, are injured or, G-d forbid, murdered in cold blood in a massacre perpetrated by a cruel killer (such as a former student), time will be stopped first for the benefit of the families but later for a deep account of everything related to school security in Israel. There will no doubt be a shock at the governmental level, one that will come directly from all citizens of the State of Israel and especially from those who have children in the many schools spread from the Dan area to Eilat.

Financial businesses invest very high sums to secure the money with the help of advanced technological means and skilled personnel – children are much more “expensive” than money !!

Companies invest millions to secure the information they have – children are much more “expensive” than the information !!

Museums invest capital to secure works of art – children are much more “expensive” than works of art !!

What actions must be taken in the immediate term?

Note: Everything I write on the subject is solely in my opinion that of course you can agree or disagree and in addition some may already have been implemented in practice.

  1. Classification of schools: A school should be defined as a secure facility – a unique asset to be protected. Since there are many schools of different types, it is important to perform a professional analysis that will ultimately determine what the classification of each school is. The classification is defined based on several fixed parameters whose level varies according to the data and characteristics of each school individually.
  2. Security package for each classification: Pre-determine a security package according to the level of classification determined for each school. A basic security package should be established for all schools and an extended security package for those that will be highly classified. In a situation where there is a danger of harm to students, I think that an elementary school is more sensitive than a high school, mainly because of the level of ability to react against a single attacker.
  3. Basic package for each school: Formulation of a security plan, demarcation of the school compound with a strong iron fence in shape and height that will make it difficult for a person to pass, placing security signs on the perimeter fence, entrance complex with a gate that can be closed and manned by an armed security guard, at each of the school’s buildings the main entrance and standard emergency doors must be defined, a security trustee will be defined who will undergo professional training to fulfill the role, guidance and practice of the teaching staff and students in the various threat scenarios.
  4. Extended security package: the basic package + placement of a minimum of 2 security guards, the proactive armament of teachers, placement of security doors at the entrance to each classroom, placement of cameras including warning cameras, distress buttons, doors connecting classrooms to allow passage in case of emergency.
  5. Central dispatching center: Establishing a security center that will have the ability to view cameras and the ability to control, monitor, provide oversight and respond in an emergency.
  6. Cooperation with rescue forces: Defining security cooperation with the various rescue forces and performing joint periodic exercises to practice and improve the level of response in the event of an emergency.


As mentioned, the massacre in Texas must serve as a powerful and noisy warning alarm that cannot be ignored and we can’t go on as usual. Decision-makers in the field of school security in Israel must hurry and make decisions that will examine the working assumptions related to the list of threats and that will succeed in giving a quick and reliable picture of the level of security in the various schools in Israel. Everything must be done so that children and teachers will not be massacred in an Israeli school.


Remember, security must also be maintained in schools in Israel and it is nice to have it in advance !!!


Close protection during wartime

Article author: Miky Weinberg – Owner of the Tarantula Technologies Ltd and Octagon Security Ltd Companies.

The war between Russia and Ukraine reminded the whole world how large the circle of consequences and influence is and goes beyond the borders of the countries and regions involved in the war. Two countries are in a state of direct fighting that affects the routine of life in large parts of the world and forces heads of states such as the United States, China, and Europe to intervene by choosing sides and making decisions, including taking unusual actions such as imposing sanctions, transferring weapons and receiving refugees.
War puts many protected leaders at the forefront and in a new situation that can make them a target for assassination by elements who disagree with the decisions they have made and in the case of Russia and Ukraine, the president of the attacked country suddenly becomes a target for assassination by the attacking state. The local and global political change directly affects all the close protection units that secure the heads of state involved in the war. There is no doubt that the conduct of the war affects the agenda of a head of state, president, or prime minister, who is required to be focused on the conduct of the war, the strategy he or she chooses, and the consequences, so it is likely that most of the activities he or she would have done regularly are replaced with a long stay at a permanent facility and/or at a facility that is a hiding place.
War produces new potential assassins, individuals or an organization or state, who will act to assassinate a secure head of state out of a motive that stems from and is related to war. In terms of possible threats against a secure head of state, war expands the circle of potential assassins because it adds officials who work in the professional staff of the secured head of state and stay within his or her immediate vicinity for a long time and are even defined in terms of security as preferred (those who should not be screened).
Can a period of war cause such a functionary to decide to try and assassinate the secure head of state while taking advantage of being preferred? Does this complex question also apply to a close protection specialist working in a close protection unit and belonging to the security team of the secured head of state?
In 2016, a Turkish policeman from the close protection unit of the local police in Ankara set out on a mission to secure the Russian ambassador to Turkey and following Russia’s policy in Syria decided to assassinate the ambassador during the inauguration of an art gallery.
The assassination was recorded on cameras:
There have been times in history when assassination attempts by a functionary working in his or her immediate area were considered common – during World War II it was reported that Adolf Hitler survived dozens of assassination attempts some of which were almost successful, yet the crossing of lines by a close protection specialist in 2016 is defined as a constitutive event in the world of close protection and there is no doubt that close protection units to re-examine their work assumptions related to the internal threat and the threat from home and especially in sensitive periods like wartime.

And now history repeats itself and in the Russian-Ukrainian war, the latter report that since the beginning of the war, President Zelensky has fully survived no less than 12 assassination attempts that were likely carried out in various ways by elements related to Russia. I hope that in the not too distant future details will be revealed about the attempts to assassinate Zelensky and the world media reports on a phenomenon that people who are close to the Russian president, such as ministers and oligarchs, are resigning and daring to speak out against the president’s decisions before the war.
These two cases of Hitler in World War II and of Zelensky in the war with Russia in 2022, reinforce the assumption that during the war the threat to heads of the state increases significantly and requires close protection units to take unique actions and changes to successfully provide a professional and effective response against it.
Based on media reports, the realization of the threat against a secure head of state, such as Ukrainian President Zelensky, is carried out by special units and/or skilled mercenaries sent and hired by the Russian attacking state that aims to capture and even harm the president thus challenging the Ukrainian close protection unit that needs to know how to respond and deal with special forces and skilled fighters.
Today, every close protection unit must be ready for war and must therefore perform the following actions:

1. Add to the working assumptions that in sensitive periods, such as a time of war, a functionary from the immediate vicinity of the secure head of state can become a potential assassin.

2. Be involved with the relevant governmental agencies in all matters of preparation and maintenance of emergency facilities – adapting the facilities to the security of the head of state during his or her stay in the facility in terms of infrastructure, technological means, creating security rings, security posts, etc.

3. Immediate reduction of the staff working and staying in the immediate vicinity of the secure head of state and operating compartmentalization in everything related to the schedules, movements, and location of the head of state.

4. Adjust and change the circle of persons who are screened with an emphasis on canceling the list of preferred persons and checking all the officials who must be in the vicinity of the secure head of state.

5. Make the close protection specialists infantry in every way, in appearance and the ability to carry and use long firearms – a unit like the Israeli close protection unit has an advantage in this matter because the professional training it provides to security guards includes combat capabilities in military characteristics.

6. Have the ability to secure the head of state in wartime activities, which also include constant movement and urgent and immediate location changes, and a professional deception plan.

7. Technological means including encrypted portable communications devices that are appropriate for arduous work and can be operated without any other factors.

8. Know how to cooperate with military units that with their help, an external combative security circle can be formed.

Remember that security must be maintained even in wartime conditions!

Dealing with an extreme event

Article author: Miky Weinberg – Owner of the Tarantula Technologies Ltd and Octagon Security Ltd Companies.

Every day of remembrance for those who perished in an extreme event, such as those who perished in the attack on the Twin Towers in New York, and every contemporary event such as the cyber-attack on Hillel Yaffe Hospital, should remind every organization’s manager how dangerous a routine is and reinvigorate with him their duty to engage in risk management including supervision and control over their level of readiness and that of everyone under them. And yet, anyone with their head in place and their feet on the ground knows that no event can be predicted and that even an organization prepared for extreme events can encounter a “black swan.”

What is an extreme event?

It is an unusual event whose chances of occurrence are estimated to be very low, but once it has occurred, its impact on the organization/system is far-reaching – a small chance of occurrence and a large impact. This is not another event. The consequences of an extreme event are usually in a negative context and are defined as a “disruptive” event – undermining the existing order. The trigger for an extreme event can be external (political, economic, natural forces) and can be internal (employee). In the light of the attacker’s viewpoint, the organization must be prepared for the wrath of the business opponent, the wrath of nature, the wrath of the political opponent, and the wrath of the opponent from within.

What is a “black swan”?

An event that is happening for the first time, on a global level, highlights the uncertainty and our inability as humans, to assess in advance the likelihood of its occurrence and the extent of its impact. The attack on the Twin Towers was defined as a “black swan” even though the FBI’s report had early information on some of the threats that did not become a real threat.

Working assumptions:

While it is not possible to guarantee a solution to every risk, it is possible to prepare an organization better for changing situations and extreme emergencies.

An extreme event occurs for certain reasons and therefore strict adherence to a permanent risk management process will increase the chance of predicting and reducing the damage.

Risk Management:

A professional field that every manager must engage in to examine in depth all the risks relevant to the organization as part of a long-term managerial concept and to enable the organization to meet goals and objectives without interruption. Managers can decide to carry out the risk management by themselves or entrust the task to a professional official inside or outside the organization. Risk management produces a snapshot based on factual data, past events, and an assessment whose outcome determines the likelihood of the risk being realized and the extent of its damage to the organization.


What is defined as a routine event and what is defined as an extreme event / “black swan”?

In 2001, no one seemed to know or could not believe that a terrorist organization would use civilian planes in ramming attacks as with the Twin Towers in the New York United States, so at the time it was a “black swan” – since it can no longer be defined as such, so now it must be discussed as a risk that could occur again.

In 2021, a cyber-attack, as it occurred at Hillel Yaffe Hospital this week, is defined and is already considered a routine event that can take place in any organization that works with and depends on computer systems. Factually and without knowing how the hackers managed to break into the hospital’s computer systems, it is clear that in the defensive rings used there was an identifiable weakness through which the hackers attacked – in providing explanations, it could not be argued that this was an extreme incident or a “black swan”.

In 2021, an injury to a public official as occurred yesterday, Friday 15 October, against a British MP during his participation in an event at the church, is not considered an extreme event and certainly not a “black swan” and is therefore defined as a routine event taken into account as part of the state’s risk management. They will re-analyze the risk to determine whether the extent of the damage to the country requires a change in the close protection policy.

Is the use of drones against ships in 2021 considered an extreme event / “black swan”?
The answer lies in World War II where the Japanese sent pilots who exploded on enemy ships (kamikazes) – in the eyes of the attacker, this is not a surprise and therefore this risk must be discussed in the risk management process.

Why should organizational managers be concerned in protect themselves from risks?

Every organization manager must carry out a professional and orderly risk management process with the help of which he or she will make decisions for implementation – based on cooperation with security organizations, examination of past events in Israel and around the world, and more. As part of the process, the manager will determine the organization’s protective objectives, and goals such as critical infrastructure, assets, information, etc., the violation of which will interrupt the continuity of the organization’s functioning and/or threaten its continued existence.

This is done through the following:
Establishment of control and monitoring mechanisms for the implementation of decisions – drawing lessons and implementing them as part of the organizational culture.

Establishment of a professional mechanism that will regularly examine whether there are recognizable indicators that indicate that an extreme event is approaching.

Appointment of managers who are known for not being able to immediately agree to any decision or action and are brave enough to express an opinion that is contrary to the majority opinion and certainly to the opinion of the organization’s manager.

Activating a factor is defined as an “external eye” for the organization that will perform objective control, including activating a professional “red team” that will examine the organization’s readiness for all relevant risks.

The role of the security manager in the risk management process:

The security manager in the organization is a partner in formulating the security concept, which also includes a risk management process, and is responsible for implementing the security plan. A smart manager will integrate the organization’s UAV into the full risk management process in the organization and use his or her professional knowledge, experience, and ability – which requires the security manager to take care of meeting the professional expectations from him or her in the field of risk management.

In conclusion:

Factually, most of the events that can pose a risk to an organization can be predicted and effective actions can be taken to prevent them or minimize the damage that results from them. Risk management requires consistency and perseverance over time in constructing scenarios. The organization must appoint an entity that will challenge patterns and assumptions and work to define circumstances that will cause significant systemic failure.


Remember, managing an organization requires performing a professional risk management process!!!

A peek at the Red Team – the elite unit for preventing the hostile takeover of IDF bases

They are only eight reservists, with a rich background in security, with one goal in mind: to train the IDF’s bases in Israel to defend against attempts to infiltrate them • Lieutenant Colonel (Res.) Miky Weinberg, the team commander and one of its founders: “Our goal is to train the soldiers, from the gate guard to the base commander for an extreme event.

The operators raided at dawn, quietly approaching the military base quietly, silently, they quickly set up a ladder and within a moment they were inside. Now almost nothing can stop them from harming soldiers, gathering critical intelligence, or stealing sophisticated weapons. Luckily, this time it was the Red Team’s operators, a special unit whose entire purpose is to examine whether it is possible to infiltrate an IDF military base. Next time, the infiltrators may be enemy forces.

A few weeks ago, the Red Team operators carried out a large-scale exercise at an IDF base in the north. Although this is an exercise that is carried out throughout the State of Israel, the context cannot be ignored – in a future conflict, Hezbollah plans to occupy settlements so that taking over a military base can be a great achievement for it. In addition, attempts have been made in the past to infiltrate bases in the past in this region.


The Red Team is unique and special in the IDF. There are only about eight reservists, veterans of special forces, and combat units with a background in security. including those who held senior positions in the Close Protection Unit and the Operations Unit in the Israel Security Agency. The goal is one – to teach and train the various bases in Israel to protect themselves in the best way possible. In recent years, the team has been responsible for the security of the soldiers and a variety of bases in the IDF, which are dispersed throughout the State of Israel.

To infiltrate the bases, the Red Team uses methods of forgery, fraudulent manipulation, physical intrusion, and tactical combat – all in full coordination with the bases’ commanders. This is especially critical these days, against the background of the burglary of a Bedouin car thief into a base in southern Israel at the beginning of the year, along with attempts to steal ammunition from many bases. The IDF understands the problem and therefore sets up the base defense system, to dramatically improve the bases through infrastructure and advanced means, protection of bunkers and weapons, extensive investment in technologies, and hundreds of audits of the bases.

“Boutique Ability”

The idea to set up the company was fleshed out about a decade ago by three people including Lt. Col. (Res.) Miky Weinberg, who serves as the company commander. The three veteran security and professionals realized that they could, as reservists, contribute to the IDF in the field of base defense, as they do in civilian life. Weinberg served for about 20 years as a close protection specialist for several prime ministers (Shamir, Rabin, Peres, and Netanyahu) and currently, he owns a private security company. As a result, he has vast experience in this field.

“In the past, we would come, do an exercise, leave lessons learned and move on,” Weinberg explains.

‘’In the past two years, we work under the IDF’s operational department, which allows us to provide a package of products to the base. We know how to take a base, identify the gaps and build a real plan that can be spread over half a year. We examine the entire field of combat, from the attacker’s viewpoint, accompanying the base from the base commander, through the defense officer to the last of the soldiers. At the end also comes the assault exercise, which is the icing on the cake. Our goal is to improve every base we visit.

“Our ability is a boutique ability. We do not audit a base, but come to it and bring it to a much better place. We do not come to audit but to improve, to build a response for each unit. The understanding in the IDF is that an event could happen again, in some way or another, and our goal is to train the soldiers – from the gate guard to the base commander – for an extreme event”.

“It’s not showmanship’’

The head of the security division in the operations division explains that the ability provided by the Red Team is critical and that its goal is to complete the range of operations the IDF has carried out at bases in recent years. “We are conducting a very significant campaign to improve the security of the IDF bases, and the team is providing the units with tools in preparation for the defense of the base,” he says.

“They come to the unit, accompany it for weeks and prepare it for an exercise to raise the level of security. Afterward, they perform the exercise which involves the use of various means – including dummy weapons, smoke grenades, and more – to show soldiers how such a scenario would be carried out. Sometimes we use editorial effects to reflect the nature of the exercise, in the video we provide them. They must understand the threat. It is not a matter of showmanship but of giving them the tools in the most authentic way possible.

“The team reaches all units in the IDF, including classified units. All IDF entities are trained by us, with of course more strategic and meaningful bases receiving visits more frequently. I have been in the security field since 2005, and I do not remember an investment like there has been in recent times in securing bases. We are in a much safer place than we were.

“We are constantly on the pulse, to make sure there is no need to align one line or another. Our job is to be vigilant all the time, with the hand on the pulse, and to see that we do not fall asleep on guard – literally. We understand the threats, deal with them and examine them. “All the time. Our job is to make sure that people are prepared for such an incident”.

“A man of closing circles”

One of the operators in the unit is Sergeant Major Yair Oanunu, who serves as a team mentor in addition to his expertise in the field of the opposing forces’ mindset and as a security consultant. He came to the security world through tragic circumstances. As an ultra-Orthodox youth who grew up in Jerusalem during the years of the second intifada, he experienced firsthand two serious suicide bombings that led him to the understanding that he must prevent such incidents.

At the end of his military service, he began working as a security guard on buses in Jerusalem, during a particularly threatening period in which they were a target for suicide bombers. After that, he worked in the world of security engineering, at Ben Gurion Airport’s covert security array, close protection, and so on.

“The idea of ​​the Red Team is to bring the attacker’s viewpoint and how to defend against it. I educate the base’s personnel on how to act against an attacker. I am a person of closing circles, perhaps because of past traumas, and I want to make the necessary corrections. We discovered that the IDF has points that need to be improved in the field of base defense, and now we have the opportunity to correct them. That is our job”.

The murder of Rabbi Meir Kahane 1990 – Chronicle of an assassin

Article author: Miky Weinberg – Owner of the Tarantula Technologies Ltd and Octagon Security Ltd Companies.

On November 5, 1990, Rabbi Meir Kahane addressed Orthodox Jews at the Marriott hotel in New York in an attempt to persuade them to make aliyah (immigrate) to Israel. After the speech, shortly after 9:00 PM, as the crowd gathered around Kahane, the assassin El Sayyid Nosair, dressed as an ultra-Orthodox Jew, emerged and shot one bullet into Kahane’s neck, killing him. During his escape from the courtroom, El Sayyid Nosair was wounded by a police officer. El Sayyid Nosair survived the injury, survived the charges for the murder of Rabbi Meir Kahane, and was eventually charged with possession of a weapon and shooting at civilians and a police officer.

Was El Sayyid Nosair born a murderer?

El Sayyid Nosair was born in Port Said, Egypt, where he became an engineer and worked in this field. In 1981 he emigrated to the United States, and in 1989 became an American citizen, married, and had three children (one of them is Zak Ebrahim). Nosair lived in New Jersey and worked various jobs in New Jersey and New York. Among other things, Nosair was employed by New York City to repair air conditioners in the city’s criminal court. It seems that El Sayyid Nosair managed to fit well into the wheel of life in the United States and together with his family created a good and comfortable routine.

Ebrahim remembers his father as a loving father with an excellent sense of humor, who did not quarrel with his wife and was only interested in raising his children to be good people. In his adulthood, Ebrahim was asked what had changed in his father and when did this happen? This was his response: “When I was 6, something started to happen to my father. He became depressed, stayed at home a lot, and would read the Koran quietly. My father started going to the mosque regularly. One of the preachers in the mosque especially captured my father’s heart: Abdullah Yusuf Azzam (one of the founders and thinkers of the ideology of Sunni international Islamic terrorism in the twentieth century, and a senior member of the al-Qaeda terrorist organization.) My father met Abdullah Azzam at the mosque and returned enthusiastically. He and his friends from the mosque went out to the camps to practice survival skills and hand-to-hand combat. They also practiced shooting. He also started taking me to the mosque to listen to the inciting sermons of the “blind sheikh” – Omar Abdul-Rahman, the spiritual father of many terror organizations and close to bin Laden. The religious preaching of the blind sheikh did not exactly focus on honoring parents or the importance of prayer. My father took me with him to hear the blind sheikh many times. I did not understand enough Arabic to grasp more than a few words, but the cruelty that emerged from his person made me shiver. My father got closer to the blind sheikh and became his driver and bodyguard. The breaking point came when my father told my mother that he no longer wanted to support jihad from afar. He aspires to go to Afghanistan and take up arms. My mother was horrified. In the end, my father did not go. In 1989, someone tried to eliminate Azzam with an explosive device. The charge did not explode. In November of that year, Azzam was traveling with his two sons in a jeep on his way to Friday prayers when the killer remotely detonated an explosive device planted on the way. All three were killed. My mother described the news of Azzam’s death as the moment she lost my father once and for all. As a fundamentalist who believed that he was a living instrument for expressing the wrath of Allah, my father was looking for potential targets, and such were not lacking. Soon, my father discovered what his real call was: to murder Rabbi Meir Kahane.

Ebrahim’s description explains in an extraordinary way how a person born into a normative home becomes an extremist and a murderer in adulthood:

El Sayyid Nosair’s decision to leave his nation-state, Egypt, and emigrate to the United States to create a better life for himself, undoubtedly became the first reason he became extremist mainly because of the many differences between Egypt and the United States – Nosair expressed disgust with American culture.

There is a great chance that a person who lives in a place that does not match the education, culture, and religion he received at his parents’ home and in his nation-state, will look for a place that will remind him of this – this place is the mosque that El Sayyid Nosair started going to. In addition, he will look for another person, a leader, who will be able to follow him, who will show him the light, who will give him new hope – extremist religious preachers, like the blind sheikh and Azzam, are these same leaders, leaders who work and know-how to locate in the mosque “weak” people who are looking for themselves, who are looking for the right way for them in order to make them “disciplined” soldiers who will work for them – El Sayyid Nosair is from exactly the right group of people.

Why did El Sayyid Nosair choose to harm an Israeli personality?

The slogan of the preacher in the mosque, Azzam, was in the context of Afghanistan: “Jihad and the rifle alone – no negotiations, no documents, and no dialogues.”

The blind sheikh, on the other hand, came to America to form loyalists to global jihad, who not only demanded Afghanistan but sought to put an end, by all necessary means, to Israeli control of Palestine, funded and supported by the United States – Israel is the enemy of Islam.

The new leaders of El Sayyid Nosair have marked for him and for the rest of the believers the enemies to be fought, including Israel. In order to become an active and efficient soldier who would increase his value in the eyes of the leaders, El Sayyid decided to take action and try and harm Ariel Sharon but soon abandoned his plan probably because he realized he was a secure personality. In search of another goal, El Sayyid found Rabbi Meir Kahane.

How does a political personality become a target for the opponent?

Any person who chooses a political path and, in this context, makes himself an extremist due to his opinions and/or actions, increases the chance that he will accumulate enemies inside and outside the house. There is no doubt that the late Rabbi Meir Kahane fit the definition of an extremist politician in his views and actions over the years until the day of his assassination.

“A Jewish state means Jewish thinking and connections, means Jewish culture and a Jewish spirit in the Jewish public. But above all, it means Jewish sovereignty and Jewish control over its vocation. This can only be implemented within a permanent Jewish majority and its Arab minority. Robbers who robbed them of their land. The Arabs do not feel a binding connection or emotion towards a state

“A Jewish state means Jewish thinking and connections, means Jewish culture and a Jewish spirit in the Jewish public. But above all, it means Jewish sovereignty and Jewish control over its vocation. This can only be implemented within a permanent Jewish majority and its Arab minority. By the Arabs are sure that the Jews are robbers who robbed them of their land. The Arabs do not feel a binding connection or emotion towards a state whose soul is Jewish. And the Arabs are multiplying, in quantity and quality. They will demand a greater share of power; they will demand “autonomy” for different parts of the country. Soon they will threaten the existence of the Jewish majority with the Arab birthrate. The result: a bloody clash. If indeed we want to prevent such a development, there is only one way open before us: immediate transfer of the Arabs from the land of Israel to their lands. Since for Israel’s Arabs and Jews, there is only one solution. Separation. The Jews in their land, and the Arabs in their lands. Separation. Only separation.

There is no doubt that there was a conflict between the views of Rabbi Meir Kahane and the views of El Sayyid Nosair.

What was El Sayyid Nosair ‘s mindset?

As stated, El Sayyid Nosair chose Rabbi Meir Kahane as the appropriate target for the realization of his new mission as a global jihad fighter. In a letter he sent from prison in which he confessed to the assassination of Rabbi Meir Kahane, El Sayyid described: “In 1989 I began following Meir Kahane during his visits to the New York area. I attended two of his lectures in two synagogues, one in Long Island and one in Brooklyn. With Rabbi Kahane alone, in private, at least twice. I also spoke to him in public during the Q&A after the lecture. On November 5, 1990, I attended another of his lectures at a Manhattan hotel. At the end of the lecture, I shot Kahane and fled the hotel.”

Why did El Sayyid Nosair choose to assassinate Rabbi Meir Kahane during an event?

El Sayyid Nosair’s choice proves that the opponent chooses to carry out the assassination itself precisely during a public and political activity of the personality and instead of with an audience to increase the added value of his action by witnesses and photography and publicity in the various media. It is clear that during the surveillance he carried out, El Sayyid Nosair could have located Rabbi Kahane in a quieter and more convenient place to carry out the assassination, a place that would also have allowed him to shoot and disappear from the area. The assassin’s opponent is willing to risk his life or a long prison sentence just to show his religious leaders and other believers his action for jihad.

Would any person who finds himself in a negative and extreme environment choose to go that route?

Ebrahim, the son of El Sayyid Nosair, could have been exactly where his father found himself and yet chose a different path, the opposite and good one. In addition, he and his family chose to completely break away from the father of the family and even changed their name. Ebrahim spends part of his time delivering a lecture describing his past with his father and family.

In the act of assassination, El Sayyid Nosair revealed the way he turned from a normative person into an extremist assassin and his way of thinking and acting that included gathering intelligence and tracking the target, being able to assimilate in the target’s environment, being able to portray a different character and in the end to choose with the final act, shooting at close range in order to succeed in achieving the goal with high percentages – the murder of the late Rabbi Meir Kahane.

Can a personality, like the late Rabbi Meir Kahane, prevent and thwart an assassination attempt on him even though he is not a secure personality?

A personality with opinions and actions that are considered extreme must know that he or she is setting up rivals inside and outside the home. An unsecured personality who travels abroad can and should invest in security for him or herself, this can be security performed by professional personal security guards or unprofessional security but is visible by an assistant or the staff accompanying the personality – an assistant who has been trained to perform unarmed security operations In an environment close to the personality, emphasizing visibility that produces outward deterrence, can cause the opponent to choose not to carry out the assassination act.


Remember, “security needs to be maintained” in every way.