All About the Eurofighter Typhoon Aircraft

The Eurofighter is a highly maneuverable multirole Defence fighter currently being developed by a four nation consortium consisting of Great Britain, Germany, Italy, and Spain. Within the late 1970s, a variety of European air forces have been confronted with the fact that their fighter fleets were starting to look outdated within the face of new American machines, such because the F-15 and F-16, and more to the purpose new Soviet fighter designs, such because the MiG-29 and Su-27.

These sizzling new machines would definitely be adopted by improved designs, and so the Europeans needed to hold pace. In March 2006, the Eurofighter finally entered service within the RAF, with the primary operational Hurricane squadron formed on March 31st. In the present day the RAF’s new Eurofighter Typhoon has the excellence of being the most controversial European combat aircraft because the stillborn TSR.2.

Lauded by its proponents and trashed by its opponents, the aircraft seems to have a rare capability to generate public argument. In comparing the Eurofighter Typhoon against the one other fighter in its weight class, the F/A-18A/C, the benefits of using later era know-how show very clearly. The Typhoon outperforms the F/A-18A/C in BVR weapon system functionality as well as aerodynamic performance. While this Military Aircraft is much better than the F/A-18A/C in working radius and agility, its optimum operating radius isn’t within the class of the F-15 and Su-27/30.

The notion that the plane is “almost nearly as good as an F-22” isn’t supportable, certainly upgrading the F-15 with engines and a radar/IRS&T/AAM bundle of the same technology as that of the Eurofighter Typhoonwould equalise nearly all benefits held by the Typhoon over older F-15C/E variants. By the identical token, no upgrades performed on the F/A-18A/C would equalise the efficiency benefits of the Hurricane over these aircraft.

The power of the Typhoon is its very fashionable and complete avionic bundle, especially that within the RAF variant, and its glorious agility when operated round its optimum fight radius of about 300 NMI (a determine to be present in older Eurofighter literature, which has since disappeared with the export drive to compete towards the bigger F-15 and F-22). The Hurricane’s weaknesses are its F/A-18C class weight and thrust and the implications of this in fight at prolonged operational radii, and the longer term sensitivity of its BVR weapons advantage to equal technological developments in opposing fighters. By way of where to position the Hurricane within the current menagerie of fighter plane, it may be finest described as an F/A-18C sized fighter with BVR programs and agility performance higher than older F-15 fashions, similar to development F-15 fashions with same generation methods and engines, but inferior to the F-15 in helpful working radius.

The Hurricane shouldn’t be a stealth aircraft, despite varied assertions to this impact, nor is it a real supercruiser like the F-22. Its design incorporates not one of the options seen in very low observable types, nor does the EJ200 incorporate the unique design features of the F119 and F120 powerplants. The Hurricane is certainly not a lemon, though the wisdom of mass producing a high efficiency typical fighter of its ilk in a interval where stealth is about to hit mass production within the F-22 and JSF programs might be seriously questioned.

It represents what’s likely to be the final main evolutionary step within the teen sequence design philosophy. To learn more, on this and additional topics please carry on and examine internet websites around the web such as Government Grants . There are infinite solutions avaliable on this and similiarissue.

Posted in Uncategorized

How Should We Sustain Global Security In The Present Dangerous World?

All of us are conscious of the Global Security challenge and it has change into crucial to adapt to newer safety measures. Whether or not it is traditional safety to protect your private home and enterprise, or extra superior safety equivalent to cyber-safety to protect financial and personal details, the safety and safety market is a progress trade that has seen numerous demand over the past decade.

Safety points cover a wide range of packages and disciplines. Some of the most essential are counterterrorism, defence, vitality, intelligence, and nonproliferation. For example Cyber Warfare measures include a whole lot from menace and threat assessments, to detection of risk materials, to understanding and mitigating the results of attacks, to forensic evaluation, to assist within the attribution of responsibility.

This may encompasses chemical, organic, radiological, nuclear, and excessive-explosive threats. Defence related issues cowl missile protection, using directed energy weapons, advanced conventional weapons armor/anti-armor materials and munitions, securing communications and distant sensing.

Managing power related global security considerations embody addressing the creation of innovations to increase the use of renewable vitality through modern know-how, improved effectivity, new sources, methods integration, and reduced prices, building methods to ship climate simulations at the regional scale to know the essential processes that drive climate change, pursuing advanced nuclear fuels and reactor systems which are proliferation-resistant and supply for expanded protected, secure, carbon-free, price-aggressive nuclear energy and creating the science and advanced know-how needed to effectively store nuclear waste for long occasions or get rid of the nuclear waste altogether.

Military Intelligence focused international security programs focus on ensuring that there is a robust emphasis on the weapons-related actions of nuclear-capable states, unsafeguarded and clandestine applications and terrorist groups, cyber threats, and countermeasures, in addition to organic and chemical weapon growth and deployment efforts.

Nonproliferation targeted global safety packages including monitoring for signatures of proliferation activity by ground-based nuclear-explosion monitoring programs, addressing issues posed by legacy materials and capabilities within the and specific countries by worldwide cooperation and engagement and through enhanced monitoring and detection technologies.

Different specifics embrace advancing technologies to watch and detect the proliferation of weapons of mass destruction (WMD) worldwide, limiting or preventing the unfold of materials, expertise, and experience referring to WMD and eliminating or securing inventories of surplus supplies and infrastructure usable for nuclear weapons An enormous part of this is what’s referred to as “multidimensional safety” This idea runs by way of the present debate on international relations, the position of presidency and not-state actors and the scope of the rights of individuals, each at inside-state and internationally.

That is why there are completely different definitions of Security: freedom from struggle, frequent good, preserving the sovereignty and nationwide pursuits, protection of basic values, survivability of the group, resistance to aggression, improved high quality of life, strengthening the rule, removing of threats, human emancipation, and so on.

Most experts outline the safety of any community (group, ethnicity, state or worldwide group) requires three parameters to outline key points: the preservation of elementary values, the absence of threats and the formulation of its coverage targets, which In abstract suggest that security is the absence of army and nonmilitary threats that could problem the core values you need to promote or protect a person or group and involve a threat of the use of force.

For additional information, on this subject and various other topics make sure you continue to explore internet pages around the web such as US Exports . There are limitless assets avaliable on this and similiarniche.

Posted in Uncategorized

Precisely what are Improvised Explosive Devices and What Harm Do they really Inflict?

IEDs have gotten to be a choice weapon selection in some areas of Defence operations. It is paramount that the EPU develops ways, methods and procedures on the best way to take care of this threat. This implies IED recognition and avoidance. Media exploitation is a big part of this.

Terrorists use the media to make sure their message (IED assaults) reaches the precise audiences for worldwide recognition. Media exploitation is an efficient and profitable device, which is sweet data to know, particularly if your principal is a serious media figure. Be certain that you assess the potential IED threats within your space of operation, after which decide risk capabilities and possible intentions.

Visible Recognition of IEDs. This part is designed to show EPS visible recognition of explosives (eyes only). The following will help EPS to identify potential IEDs and develop techniques, strategies and procedures for avoiding the menace on assignment. IEDs mainly embrace some sort of explosive, fuse, detonators and wires, shrapnel and pieces of metallic and a container by which to pack the explosives and shrapnel.

Terrorist groups have used IED in roadside ambushes that have included stationary explosive gadgets either buried or concealed. Occasions that trigger mass casualties have included suicide bombers, vehicles, vests and satchel expenses carried by humans or animals. These units have been fabricated in an improvised method and incorporate extremely destructive lethal and harmful explosives or incendiary chemical compounds, which are designed to kill or destroy the target.

They damage both Armoured Vehicles and human beings. The supplies required for these gadgets are sometimes stolen from navy or business blasting supplies or constituted of fertilizer and other readily available family ingredients. IED Techniques, Techniques and Procedures. To take care of the IED menace, EPUs should decide the types of threats within the space of operation. The pre-advance, advance and ongoing EP operation should monitor any IED threats in the space of operation and be sure that everybody in the EPU is conscious of them. Evaluating the Threat. The advance person ought to ask native EOD personnel in regards to the area of operation’s pattern analysis to find out IED menace trends.

This should include recognition of emplacement patterns, human activity, recognition from video and other sensing systems, human intelligence and social network evaluation of terrorist networks. IED Initiation Methods. Command-detonated units, onerous-wired (electrical wires between units and/or leading away from the bomb, distant-managed (battery powered doorbell gadgets, pagers, cell phones as sending and receiving items), tall buildings or line-of-sight remark factors will likely be nearby.

Many controllers require a direct line of sight to activate the receiver and detonate it. Inventive IEDs. IEDs may be disguised as something or hidden anywhere. This contains trash within the roadway, cigarette cartons, trash luggage, soda cans, milk cans, buckets, burlap luggage, cinder blocks or potholes.

They are often tied to telephone poles or hidden in guard rails and animal carcasses. Security Considerations. The advance individual should plan for explosive ordnance disposal (EOD) response with dedicated security property (skilled legislation enforcement or military explosive disposal experts) to quickly remove and destroy any IED devices. IED recognition, avoidance and detection are the keys to risk reduction. Neutralization, destruction and elimination is the job of professional bomb technicians.

To find out more, on this and many other topics make sure you carry on and explore net sites around the web such as Military Family Preparedness . There are endless assets avaliable on this and similiarissue.

Posted in Uncategorized

Drones – How Unmanned Instruments Help with Keeping the World Secure

The United States has outdone the world in Military know-how, and perhaps there isn’t any larger instance of this than the unmanned aerial programs that are now getting used in the modern battlespace. These net centric system drones are able to search and destroy, and so they give a vast quantity of intelligence to the military.

There is no better technique to collect information than having eyes within the sky; or on this case aerial spies within the sky. Thankfully the ever vigilant eyes of our UAV technology has been defending the lives of our service women and men abroad for years. They have flown the skies of Iraq, Afghanistan, North Korea, and Iran. They’ve supplied sensitive intelligence and increased communication potential in mountainous terrain.

They’ve engaged the enemy with excessive tech fire energy controlled by pilots grounded in distant places 1000’s of miles from their targets. These unmanned aerial vehicles (UAVs) and the small unmanned aircraft techniques (SUASs) had been designed to avoid wasting lives and to protect our freedoms and those of our allies. In fact, at any time when one aspect of a battle comes up with new expertise, eventually the other facet will provide you with the same Military Aircraft technology.

And as soon as they do, the primary facet now has to cope with defending itself against the very technology they created in the first place. However in the intervening time, I might wish to throw a philosophical query out there, one that has come to mind recently at an area think tank. What happens when the drones are used for evil instead of excellent?

Whether by tough nations or by our very personal authorities or by any of the quite a few rogue nation-states with questionable characters of their regimes? For instance, what occurs when NGOs bring in food supplies for starving civilians to these nations? Often rogue regimes steal the meals and hijack the shipments, solely to promote it back to the very individuals who had been imagined to get it to keep them from starving.

Then they take this food and feed themselves and their militaries or armies very effectively, and promote the rest of the meals to the poor individuals who were speculated to get it free of charge in the first place. In relation to oil there is much more cash concerned they usually use this cash to secure high-tech weapons to do the identical thing.

Now think about such a rogue nation, government, or group of guerrillas with aerial killer drones. Not a reasonably picture. I hope you’ll please think about this. For us right here at home the insomniac eyes make no distinction between criminal and law-abiding citizens. Their recordings threaten the privacy of each man, woman, and baby in America. Day by day actions will no longer be private.

In 1890 the future U.S. Supreme Court Justice Louis Brandeis argued that privacy was the most cherished of freedoms in a democracy. He supported “the person’s proper to be left alone.” He stated “the widespread regulation has at all times acknowledged a man’s house as his fortress, impregnable, often, even to his own officers engaged in the execution of its command.”

The ever-stretching wings and eyes of “Massive Brother” have to be grounded before they destroy the freedom they have been designed to protect. To read more, on this subject and several other topics please continue to explore internet websites around the web such as Columbia College of Military Learning . There are endless sources avaliable on this and similiartopic.

Posted in Uncategorized

The Relevance of ISAF Afghanistan At This Time

ISAF Afghanistan, in any other case often called the Worldwide Security Assistance Drive (ISAF) – Afghanistan assists the Afghan Authorities in exercising and increasing its Military authority and influence across the nation, paving the best way for reconstruction and efficient governance. It does this predominately by way of its UN-mandated Worldwide Security Assistance Power (ISAF).

ISAF has been deployed since 2001 under the authority of the UN Security Council (UNSC) which authorized the establishment of the pressure to help the Afghan authorities “in the upkeep of security in Kabul and its surrounding areas, so that the Afghan Interim Authority in addition to the personnel of the United Nations can operate in a safe environment. ISAF was created in accordance with the Bonn Convention in December 2001.

The idea of a UN-mandated worldwide security team similary to the RAF to help the newly established Afghan Transitional Authority was launched at this occasion to create a secure atmosphere in and around Kabul and help the reconstruction of Afghanistan. These agreements paved the way for the creation of a 3-way partnership between the Afghan Transitional Authority, the United Nations Assistance Mission in Afghanistan (UNAMA) and ISAF. NATO took command of ISAF in Aug 2003 on the request of the UN and the Government of the Islamic Republic of Afghanistan.

Quickly after, the UN gave ISAF a mandate to broaden exterior of Kabul. ISAF expanded its command in four phases, initially in the north in Dec 2003, to the west in Feb 2005, to the south in Dec 2005, then finally increasing into the east in Oct. 2006. In June 2010, NATO break up the South Regional Command in half in a bid to improve security by specializing in smaller geographical areas and making certain larger partnering with Afghan forces.

On the Lisbon Summit in November 2010, NATO reaffirms its lengthy-term dedication to Afghanistan (Enduring Partnership) and proclaims the launch of Transition to Afghan lead in security which will begin in 2011, with the ambition expressed by President Karzai, to see the Afghan Nationwide Safety Forces take the lead in conducting National Security operations across Afghanistan by the top of 2014. ISAF’s missions embrace safety, specifically – conducting security and stability operations, supporting the Afghan National Military, supporting the Afghan Nationwide Police, disarming illegally armed teams (DIAG), facilitating ammunition depots administration, offering publish-operation help, reconstruction and growth (providing safety to permit reconstruction) and humanitarian help (governance, counter narcotics).

The NATO ISAF Afghanistan Medal is a global navy ornament which is awarded to varied militaries of the world under the authority of the North Atlantic Treaty Organization. This Non-Article 5 Medal is permitted to replace the NATO medals issued for NATO Operations Joint Pressure and Joint Guardian. U.S Forces: Eligibility for the Non-Article 5 Medal for service with the ISAF are those who are members of items or staffs as set out within the Joint Operations Area participating in operations in Afghanistan.

The area of eligibility is delineated by the political boundaries of the Worldwide Security and Assistance Force. The service have to be 30 days both continuous or accumulated, from 31 July 2006 to a date to be determined. To acquire more information, about this and several other topics you should continue to look into online resources around the web such as USCIS. There are unrestricted resources avaliable on this and similiarniche.

Posted in Uncategorized

Command And Control: Applying C41 For Good Results

Command and management is about resolution making, the exercise of direction by a properly designated commander over assigned and connected forces in the accomplishment of a mission, and is supported by information expertise (the computers and communications part of C4I). Defence News items shoow that The United States is aggressively exploiting these applied sciences as a way to achieve info superiority, with the target of reaching higher and sooner choices, and continually projecting, albeit with uncertainties, future desired states and directing actions to bring about those future states.

Command and control refers back to the train of authority and course by a correctly designated commander over assigned and hooked up forces in the accomplishment of the mission. Command and management features are carried out by way of an arrangement of personnel, equipment, communications, facilities, and procedures employed by a commander in planning, directing, coordinating, and controlling forces and operations in the accomplishment of the mission.

Command refers back to the authority that a commander in the Armed Forces lawfully exercises over subordinates by virtue of rank or assignment. Command consists of the authority and duty for effectively utilizing obtainable assets and for planning the employment of, organizing, directing, coordinating, and controlling military forces for the accomplishment of assigned missions. Computing and communications are two pervasive enabling technologies that support C2 and intelligence, surveillance, and reconnaissance. Computers and communications process and transport information.

Control is authority which may be less than full command exercised by a commander over a part of the actions of subordinate or different organizations. This is sometimes used in Close Air Support. Physical or psychological pressures exerted with the intent to assure that an agent or group will respond as directed. Intelligence is the product ensuing from the collection, processing, integration, analysis, evaluation, and interpretation of available info concerning foreign nations or areas. Data and information about an adversary obtained via remark, investigation, analysis, or understanding.

One vital functionality that C4I programs present commanders is situational consciousness–information about the situation and status of enemy and pleasant forces. A vital element of achieving superiority in determination making, it does not alone guarantee superior resolution making. Commanders should take related data and mix it with their judgment–including tough-to-quantify facets of human habits (comparable to fatigue, expertise stage, and stress), the uncertainty of knowledge, and the plausible future states resulting from actions by both their own pressure and the enemy–to make decisions about future actions and find out how to convey those decisions in ways to facilitate their proper execution. In doing so, commanders are supported by tools to allow and speed up the planning and decision-making course of, to attain the choice-making superiority envisioned by DOD.

And, in fact, to be effective, command selections have to be applied, a process to which C4I technologies are additionally relevant (e.g., in rushing up the hyperlink through which focusing on info is passed to weapons, the so-known as sensor-to-shooter hyperlink). The event and use of the correct tools allow the commander to focus better on those points related to the essence of command–the art versus the science. As more and better-automated instruments are developed and individuals are trained to make use of them, it will become much more necessary to acknowledge the art of command as distinguished from the mechanics of the instruments used to offer information.

Military Intelligence has taught us that Leadership was once about hard skills such as planning, finance and business analysis. When command and control ruled the corporate world, the leaders were heroic rationalists who moved people around like pawns and fought like stags. When they spoke, the company employees jumped.

Now, if the gurus and experts are right, leadership is increasingly concerned with soft skills – teamwork, communication and motivation.

Some suggest that we expect too much of leaders. Indeed, “renaissance” men and women are rare. Leadership in a modern organisation is highly complex and it is increasingly difficult – sometimes impossible – to find all the necessary traits in a single person. Among the most crucial skills is the ability to capture your audience – you will be competing with lots of other people for their attention. Leaders of the future will also have to be emotionally efficient. They will promote variation rather than promoting people in their own likeness. They will encourage experimentation and enable people to learn from failure. They will build and develop people.

Is it too much to expect of one person? I think it probably is: In the future, we will see leadership groups rather than individual leaders. This change in emphasis from individuals towards groups was charted by the leadership guru Warren Bennis in his work “Organizing Genius” He concentrates on famous ground-breaking groups rather than individual leaders and focuses, for example, on the achievements of Xerox’s Palo Alto Research Centre, the group behind the 1992 Clinton campaign, and the Manhattan Project which delivered the atomic bomb. “None of us is as smart as all of us”, says Professor Bennis Umuc. While flexibility is important in this new leadership model, it should not be interpreted as weakness.

The two most lauded corporate chiefs of the past decade, Percy Barnevik, of Asea Brown Boveri, and Jack Welch, of General Electric, dismantled bureaucratic structures using both soft and hard skills. They coach and cajole as well as command and control. The “leader as coach” is yet another phrase more often seen in business books than in the real world. Acting as a coach to a colleague is not something that comes easily to many executives. It is increasingly common for executives to need mentoring. They need to talk through decisions and to think through the impact of their behaviour on others in the organisation.

In the macho era, support was for failures, but now there is a growing realisation that leaders are human after all, and that leadership is as much a human art as a rational science. Today’s leaders don’t follow rigid role models but prefer to nurture their own leadership style. They do not do people’s jobs for them or put their faith in developing a personality cult. They regard leadership as drawing people and disparate parts of the organisation together in ways that makes individuals and the organisation more effective.

Posted in Uncategorized | Leave a comment

What Kinds Of Body Armour Can We Use To Protect Our Military Today?

Body Armour is protecting gear reminiscent of ballistic armour, armoured vests, body armour, ballistic helmets, demining armour, IED suits, ceramic, polythene and steel armour plates, face shields and anti-riot armour for the army and police across the world.

According to Defence News experts, today, modern forms of body armor are called bulletproof or bullet-resistant clothing. Modern protective vests have been created to minimize the injury from projectiles from handguns, shotguns and rifles. With that, it is commonly worn by police forces, military and private security and civilians. The legality of the issuance of body armors such as bulletproof vests is dictated the jurisdiction of the state law and other government law-enforcement agencies. With the recent rise of urban conflicts, protective bulletproof clothing has offered a wearable and affordable kind of confidence and security.

In a world, dominated by a growing lack of respect, appropriate solutions are required. A lack of inadequate personal safety measures can put a lone worker or frontline operative at unnecessary risk, and cause unacceptable injury or harm. Body armour and stab vests have therefore regrettably become a necessity within a number of domestic frontline professions.

These protecting products are used by the police, military and personal safety corporations in over 35 countries including the South African Military, South African Navy, Irish Army, Indonesian Army, Armed Forces of Malta, Chilean Armed Forces, Dutch Particular Forces, Thailand Navy and US Military; and multiple police forces within the UK and US in addition to the South African Police Services, Turkish National Police, Saudi Arabia Police, Oman Police, German Police, Belgian Police and Bermuda Police.

Navy physique armour is out there in a large number of configurations: ballistic, stab resistant, twin function fragmentation resistant and flotation. They’re constituted of a wide range of ballistic materials, including: woven and unidirectional (defend) aramid and excessive performance polyethylene.

The outcome is of great relevance to the question: ‘Body Armour – Why?’ The main risks areas highlighted by the HSL are as follows:

– Visiting people in their home or office to enforce legislation, police the system or having to give bad news.
– Certain geographical areas or trouble spots are high risk, such as poor or run down council estates.
– Dealing with certain high risk individuals, such as potentially violent or aggressive members of the public, drug users or dealers, or mentally ill individuals.
– Dealing with frustrated and disappointed customers (e.g. customers unhappy with the service your organisation has provided)
– Working late at night.
– Evicting people from their home.
– Visiting clients in unfamiliar industrial and domestic premises.
– Visiting unoccupied buildings

Several more reasons can be highlighted, making a choice not to issue potentially life saving body armour or stab vests even more controversial. Sure they won’t help you if your Military Aircraft is at risk, but they are good for on-the-groud situations where you find yourself at risk. Corporate manslaughter and corporate homicide laws as well as health & safety regulations have been rewritten in countries around the world, in order to protect those who serve and risk their lives for others. The cost of facing potential legal action after a fatal or non-fatal incident and the cost of injured employees taking time off would outweigh the one-off cost of body armour. Assaults on personnel who are not wearing protective clothing also create bad publicity for the Authority concerned, not to mention the welfare of the person involved and operational problems resulting from the injured staff being incapable to work.

In 2003 the UK’s Health and Safety Laboratory developed 18 case studies and approached over 400 organisations of various sizes and across a range of different occupations. Very detailed questionnaires were sent and interviews were conducted by the HSL with the selected organisations and the information which they provided formed the basis of these widely respected case studies.

Yes, ‘perception’ is one of the most important Military Technology issues within personal safety, and I greatly agree with the fact that overt body armour can often be perceived as very confrontational, especially when dealing with intoxicated members of the public or those who seriously dislike authority, your organisation or presence to begin with. For me, lone workers dealing with the public should be doing their utmost to express themselves as peaceful ambassadors within their line of work. Only covert body armour allow them to do exactly that, whilst still being protected.

Body armour is usually developed in numerous designs and configurations. A number of the most advanced armour options have been developed and are available for each the female and male kinds and embrace formed options for max safety and comfort. This article explores the varied sorts of body armour out there today. Continue reading below to be taught extra about how they are used. Normal objective protecting vests are designed as a primary armour vests for the Police and private security companies. They provide entrance, back and aspect ballistic protection.

Concealable Vests have been designed to observe the contours of the physique and supply entrance, again and aspect ballistic protection. High visual operations garments have been designed for use by personnel who must be simply recognized such as visitors police. Police Assault Vests are designed for over-the-uniform put on, providing full entrance, again, facet, neck and shoulder ballistic protection. They’re usually used by Police, Military and Special Forces. Army Assault vests are designed to be excessive-mobility entrance opening vests and are to be worn over a soldier’s uniform. They usually have front, back, facet and shoulder ballistic safety; with ballistic collar and throat protector, and removable groin protector.

Demining Vests have been particularly designed for deminers and specialists in the Military and Police who seek for mines and explosives. These vests are designed to provide the maximum potential safety towards fragments and explosions from detonating mines. They provide entrance, again and facet fragmentation protection; with detachable groin protectors.

Demining Aprons are additionally especially designed for deminers and specialists within the Military and Police who search for mines and explosives. These suits are designed to offer the utmost attainable protection towards fragments and explosions from detonating anti-personnel mines. IED search suits are particularly designed for specialists in the Army and Police who search for Improvised Explosive Devices (IEDs). These suits are designed to supply full physique protection towards fragments and explosions. Armour plates are often constructed from high-performance steel, ceramic and lightweight polyethylene armour plates, designed to fit all these vests and supply safety against excessive-velocity weapons, masking NIJ Stage III and IV (armour piercing).

The fact of the matter is that there is generally an ‘unknown’ level of risk due to unforeseen circumstances. Ordinary risk assessments might often conclude in the verdict of ‘low risk’, however these often very basic risk assessments are based on technical facts or ‘on-hand information’ only, and as much as I appreciate them, they often do not go beyond these facts. A risk assessment dealing with the activity of a lone worker having to enter someone else’s property or deal with customers or clients on a one-to-one basis can in my opinion, never ever result in low risk. As soon as a lone worker walks through someone’s door or deals with often unfamiliar members of the public at another location, one can simply not know who else will be in the house, who else might enter the house at a later point, what activities have taken place prior to your colleagues visit or who else might be going to interfere or engage in their conversation or argument at a later point.

If you were driving a car and your petrol light comes on, indicating you only have a small amount of petrol left. What would you do? Would you start thinking: Will I make it home or not? Some people would be willing to take the risk in this situation. In the workplace though, in my view, it is the duty of the employer to not allow their employees to take unknown risks of their own accord with out the provision of gear and training to protect them should they make a mistake in their own judgement. ‘Better safe than sorry’ and ‘Prevention is better than cure’ are two great sayings, making more sense within corporate health & safety than any place else. I hope you would stop and get some fuel, because you want to be on the safe side. You might have made it, but you didn’t want to take that risk. The bottom line is you cannot afford to break down. The fact that a lone workers activity involves a rather ‘unknown risk’ must urge key decision makers to remain at least open minded when it comes to body armour or additional lone worker safety training that can be made available.

Recommending body armour does not mean we suggest you are in danger, we Scholarship say that you will have a higher chance of remaining unharmed in the unlikely, but possible, case of something going wrong. Wearing personal protective equipment can be compared to wearing a seat belt when driving a car. We do not put the seat belt on because we believe we are going to have an accident today. We are simply acknowledging the fact that there is an exceptionally small chance that we might crash. Yet, if this chance becomes reality, you have increased the chance of survival by wearing a seat belt.

Posted in Uncategorized | Leave a comment