Survivalist Pro
Photo by cottonbro studio Pexels Logo Photo: cottonbro studio

Should you look a lion in the eyes?

If you encounter an aggressive lion, stare him down. But not a leopard; avoid his gaze at all costs. In both cases, back away slowly; don't run.

Can solar panels be damaged by hail?
Can solar panels be damaged by hail?

According to a National Renewable Energy Laboratory (NREL) study, the chances of hail damaging solar panels is less than five percent. The chances...

Read More »
What is the smallest bullet?
What is the smallest bullet?

2mm Kolibri 2.7mm Kolibri Case type Rimless, straight Bullet diameter 2.7mm Neck diameter 3.5mm Base diameter 3.6mm 18 more rows

Read More »

If you encounter an aggressive lion, stare him down. But not a leopard; avoid his gaze at all costs. In both cases, back away slowly; don't run. If you stumble on a pack of hyenas, run and climb a tree; hyenas can't climb trees. But don't do that if you're being chased by an elephant; he'll just knock the tree down. Stand still until he forgets about you. I spent the last few days on safari in a South African game park, and this was just some of the security advice we were all given. What's interesting about this advice is how well-defined it is. The defenses might not be terribly effective -- you still might get eaten, gored or trampled -- but they're your best hope. Doing something else isn't advised, because animals do the same things over and over again. These are security countermeasures against specific tactics. Lions and leopards learn tactics that work for them, and I was taught tactics to defend myself. Humans are intelligent, and that means we are more adaptable than animals. But we're also, generally speaking, lazy and stupid; and, like a lion or hyena, we will repeat tactics that work. Pickpockets use the same tricks over and over again. So do phishers, and school shooters (.pdf). If improvised explosive devices didn't work often enough, Iraqi insurgents would do something else.

So security against people generally focuses on tactics as well.

A friend of mine recently asked me where she should hide her jewelry in her apartment, so that burglars wouldn't find it. Burglars tend to look in the same places all the time -- dresser tops, night tables, dresser drawers, bathroom counters -- so hiding valuables somewhere else is more likely to be effective, especially against a burglar who is pressed for time. Leave decoy cash and jewelry in an obvious place so a burglar will think he's found your stash and then leave. Again, there's no guarantee of success, but it's your best hope. The key to these countermeasures is to find the pattern: the common attack tactic that is worth defending against. That takes data. A single instance of an attack that didn't work -- liquid bombs, shoe bombs -- or one instance that did -- 9/11 -- is not a pattern. Implementing defensive tactics against them is the same as my safari guide saying: "We've only ever heard of one tourist encountering a lion. He stared it down and survived. Another tourist tried the same thing with a leopard, and he got eaten. So when you see a lion...." The advice I was given was based on thousands of years of collective wisdom from people encountering African animals again and again. Compare this with the Transportation Security Administration's approach. With every unique threat, TSA implements a countermeasure with no basis to say that it helps, or that the threat will ever recur. Furthermore, human attackers can adapt more quickly than lions. A lion won't learn that he should ignore people who stare him down, and eat them anyway. But people will learn. Burglars now know the common "secret" places people hide their valuables -- the toilet, cereal boxes, the refrigerator and freezer, the medicine cabinet, under the bed -- and look there. I told my friend to find a different secret place, and to put decoy valuables in a more obvious place.

How many solar panels does it take to run a house?
How many solar panels does it take to run a house?

An average home needs between 17 and 21 solar panels to fully offset utility bills with solar. The number of solar panels you need depends on a few...

Read More »
Was bf5 a failure?
Was bf5 a failure?

One title that failed to hit targets was the World War II shooter Battlefield 5. The game sold a massive 7.3 million units in the time between...

Read More »

What to do if a tiger approaches you?

Georgia zoo flooding: what to do if you encounter a tiger Do not run. Like all cats, tigers enjoy a chase. ... Do not approach the tiger. ... Get yourself somewhere high up. ... Stand up tall. ... Do not antagonise the tiger. ... Do not urinate in a tiger's territory. ... Stay away from injured or old tigers.

A white tiger that escaped from a zoo in Tbilisi after heavy flooding mauled a man to death on Wednesday, and on Thursday authorities in the Georgian capital said they were still looking for another tiger and a hyena.

Heavily armed government officers were on constant patrol on Thursday morning, as jumpy residents called in at the slightest noise or strange movement outside. But what should they do if they find themselves confronted with a tiger?

Based on the experiences of forest rangers in India’s national parks, Vicky Flynn, the campaign manager of TigerTime and a veteran of travels through tiger territory, has this advice:

What is the most secretive military unit?
What is the most secretive military unit?

If they are compromised during a mission, the US government may deny all knowledge. SOG is considered the most secretive special operations force...

Read More »
Who is most likely to shoplift?
Who is most likely to shoplift?

men It is commonly touted that men are more likely to shoplift than women – however, this is based on data from 1980 and may be outdated....

Read More »
Can ghost gun bullets be traced?
Can ghost gun bullets be traced?

Although ghost guns lack serial numbers, making them difficult to track, using this technique allows Strong to take both the casings and the...

Read More »
Why is spam legal?
Why is spam legal?

In fact, SPAM IS LEGAL in the United States. That is, whether your email is solicited or unsolicited, and whether it is highly targeted or not,...

Read More »