Tuesday, June 14, 2011

Learning About The Eurofighter Typhoon Aircraft

The Eurofighter is a highly maneuverable multirole Military fighter at present being developed by a four nation consortium consisting of Great Britain, Germany, Italy, and Spain. Within the late Seventies, a lot of European air forces had been confronted with the fact that their fighter fleets had been starting to seem outdated in the face of new American machines, such because the F-15 and F-sixteen, and extra to the purpose new Soviet fighter designs, such because the MiG-29 and Su-27.

These hot new machines would certainly be followed by improved designs, and so the Europeans needed to hold pace. In March 2006, the Eurofighter lastly entered service within the RAF, with the primary operational Typhoon squadron shaped on March 31st. At present the RAF's new Eurofighter Typhoon has the excellence of being probably the most controversial European combat plane since the stillborn TSR.2. Lauded by its proponents and trashed by its opponents, the aircraft appears to have an extraordinary capacity to generate public argument. In comparing the Eurofighter Typhoon against the one other fighter in its weight class, the F/A-18A/C, the benefits of utilizing later era technology show very clearly. The Storm outperforms the F/A-18A/C in BVR weapon system functionality in addition to aerodynamic performance. Whereas this Military Aircraft is a lot better than the F/A-18A/C in operating radius and agility, its optimum operating radius shouldn't be within the class of the F-15 and Su-27/30.

The notion that the plane is “nearly as good as an F-22” just isn't supportable, indeed upgrading the F-15 with engines and a radar/IRS&T/AAM package of the identical generation as that of the Eurofighter Typhoonwould equalise almost all advantages held by the Storm over older F-15C/E variants. By the same token, no upgrades performed on the F/A-18A/C would equalise the efficiency benefits of the Storm over these aircraft. The energy of the Typhoon is its very fashionable and comprehensive avionic package deal, especially that in the RAF variant, and its wonderful agility when operated around its optimum combat radius of about 300 NMI (a figure to be present in older Eurofighter literature, which has since disappeared with the export drive to compete in opposition to the larger F-15 and F-22).

The Storm's weaknesses are its F/A-18C class weight and thrust and the implications of this in fight at extended operational radii, and the longer term sensitivity of its BVR weapons benefit to equal technological developments in opposing fighters. By way of the place to place the Storm within the present menagerie of fighter aircraft, it may be best described as an F/A-18C sized fighter with BVR systems and agility efficiency better than older F-15 fashions, just like development F-15 models with similar technology techniques and engines, however inferior to the F-15 in helpful working radius.

 The Typhoon is not a stealth plane, despite varied assertions to this effect, neither is it a genuine supercruiser like the F-22. Its design incorporates none of the options seen in very low observable types, nor does the EJ200 incorporate the unique design features of the F119 and F120 powerplants. The Hurricane is certainly not a lemon, though the knowledge of mass producing a high performance typical fighter of its ilk in a period where stealth is about to hit mass production in the F-22 and JSF programs may very well be seriously questioned. It represents what is more likely to be the last major evolutionary step within the teen sequence design philosophy. To learn more, on this subject and other topics make sure you carry on and investigate web pages around the web such as National College . There are unrestricted solutions avaliable on this and similiartopic.

Treating Global Security as the Priority for Many Nations Nowadays.

All of us are conscious of the National Security problem and it has become crucial to adapt to newer security measures. Whether or not it's traditional safety to guard your own home and business, or extra superior safety equivalent to cyber-safety to protect monetary and personal details, the security and protection market is a progress trade that has seen a variety of demand over the previous decade. Security issues cowl a variety of programs and disciplines. Among the most important are counterterrorism, defence, power, intelligence, and nonproliferation.

For instance Cyber Warfare measures cover every thing from threat and risk assessments, to detection of risk materials, to understanding and mitigating the consequences of attacks, to forensic evaluation, to assist within the attribution of responsibility. This could encompasses chemical, organic, radiological, nuclear, and excessive-explosive threats. Defence associated issues cover missile protection, using directed power weapons, advanced conventional weapons armor/anti-armor supplies and munitions, securing communications and remote sensing.

Managing energy associated global security issues embrace addressing the creation of improvements to expand the usage of renewable vitality through revolutionary expertise, improved effectivity, new assets, techniques integration, and diminished prices, building techniques to deliver climate simulations at the regional scale to know the vital processes that drive local weather change, pursuing superior nuclear fuels and reactor techniques which are proliferation-resistant and provide for expanded protected, safe, carbon-free, cost-competitive nuclear power and developing the science and superior technology wanted to successfully store nuclear waste for lengthy occasions or eradicate the nuclear waste altogether. Military Intelligence centered international security packages deal with guaranteeing that there is a robust emphasis on the weapons-related activities of nuclear-capable states, unsafeguarded and clandestine packages and terrorist groups, cyber threats, and countermeasures, in addition to organic and chemical weapon development and deployment efforts.

Nonproliferation focused international safety packages including monitoring for signatures of proliferation exercise through floor-based mostly nuclear-explosion monitoring applications, addressing issues posed by legacy supplies and capabilities within the and explicit international locations by international cooperation and engagement and thru enhanced monitoring and detection technologies. Other specifics embrace advancing applied sciences to observe and detect the proliferation of weapons of mass destruction (WMD) worldwide, limiting or stopping the spread of materials, expertise, and experience referring to WMD and eliminating or securing inventories of surplus supplies and infrastructure usable for nuclear weapons An enormous a part of this is what is known as “multidimensional security”.

This idea runs via the current debate on worldwide relations, the role of presidency and never-state actors and the scope of the rights of individuals, each at inside-state and internationally. That is why there are totally different definitions of Safety: freedom from battle, frequent good, preserving the sovereignty and nationwide interests, safety of basic values, survivability of the group, resistance to aggression, improved quality of life, strengthening the rule, removal of threats, human emancipation, and so on.

Most specialists outline the safety of any neighborhood (group, ethnicity, state or worldwide organization) requires three parameters to define key points: the preservation of basic values, the absence of threats and the formulation of its policy targets, which In summary indicate that safety is the absence of army and nonmilitary threats that might problem the core values you want to promote or protect a person or community and involve a risk of the use of force. For more information, on this subject and several other topics please make sure to carry on and look into web sites around the web such as Defense Trade Export Controls & Licenses . There are unrestricted assets available on this and similiartheme.

Investigating the usage of IEDs in World War

IEDs are becoming a choice weapon alternative in some areas of Defence operations. It's paramount that the EPU develops tactics, methods and procedures on how one can cope with this threat. This means IED recognition and avoidance. Media exploitation is a huge part of this. Terrorists use the media to make sure their message (IED assaults) reaches the precise audiences for worldwide recognition. Media exploitation is an efficient and worthwhile instrument, which is sweet data to know, especially if your principal is a significant media figure. Be sure that you assess the potential IED threats inside your space of operation, and then decide risk capabilities and possible intentions.

Visual Recognition of IEDs. This part is designed to show EPS visual recognition of explosives (eyes only). The next will help EPS to determine potential IEDs and develop ways, techniques and procedures for avoiding the risk on assignment. IEDs mainly include some type of explosive, fuse, detonators and wires, shrapnel and pieces of metallic and a container wherein to pack the explosives and shrapnel. Terrorist teams have used IED in roadside ambushes which have included stationary explosive gadgets both buried or concealed. Events that cause mass casualties have included suicide bombers, vehicles, vests and satchel fees carried by people or animals.

 These units have been fabricated in an improvised method and incorporate highly harmful deadly and dangerous explosives or incendiary chemical substances, which are designed to kill or destroy the target. They damage both Armoured Vehicles and human beings. The supplies required for these devices are sometimes stolen from navy or industrial blasting provides or comprised of fertilizer and different available household ingredients. IED Ways, Techniques and Procedures. To cope with the IED menace, EPUs should determine the forms of threats in the area of operation.

 The pre-advance, advance and ongoing EP operation should monitor any IED threats within the area of operation and be sure that everyone within the EPU is conscious of them. Evaluating the Threat. The advance person ought to ask local EOD personnel about the area of operation's pattern evaluation to find out IED threat trends. This should embrace recognition of emplacement patterns, human activity, recognition from video and different sensing methods, human intelligence and social community evaluation of terrorist networks. IED Initiation Methods. Command-detonated devices, arduous-wired (electrical wires between devices and/or leading away from the bomb, remote-managed (battery powered doorbell units, pagers, cell phones as sending and receiving models), tall buildings or line-of-sight remark points will be nearby.

Many controllers require a direct line of sight to activate the receiver and detonate it. Ingenious IEDs. IEDs will be disguised as something or hidden anywhere. This contains trash within the roadway, cigarette cartons, trash bags, soda cans, milk cans, buckets, burlap bags, cinder blocks or potholes. They are often tied to telephone poles or hidden in guard rails and animal carcasses. Safety Considerations.

The advance individual should plan for explosive ordnance disposal (EOD) response with devoted safety assets (skilled legislation enforcement or army explosive disposal experts) to quickly remove and destroy any IED devices. IED recognition, avoidance and detection are the keys to danger reduction. Neutralization, destruction and removing is the job of professional bomb technicians. To acquire more information, on this subject and additional topics make sure you continue to investigate web sites around the web such as National University . There are unending sources avaliable on this and similiarniche.

Understanding Ariel Drones - The Great, the Bad and the Unpleasant

The United States has outdone the world in Defence technology, and maybe there is no higher example of this than the unmanned aerial programs that are now getting used in the fashionable battlespace. These net centric system drones are in a position to search and destroy, they usually give a vast quantity of intelligence to the military. There is no higher way to gather info than having eyes within the sky; or on this case aerial spies in the sky. Fortunately the ever vigilant eyes of our Drones technology has been defending the lives of our service men and women abroad for years.

They have flown the skies of Iraq, Afghanistan, North Korea, and Iran. They've provided delicate intelligence and increased communication potential in mountainous terrain. They have engaged the enemy with high tech fireplace energy controlled by pilots grounded in distant places hundreds of miles from their targets. These unmanned aerial automobiles (UAVs) and the small unmanned aircraft programs (SUASs) were designed to save lots of lives and to protect our freedoms and those of our allies. Of course, at any time when one aspect of a conflict comes up with new technology, eventually the other facet will give you the identical Military Aircraft technology. And once they do, the primary facet now has to take care of defending itself in opposition to the very expertise they created within the first place. But in the meanwhile, I would prefer to throw a philosophical query out there, one that has come to thoughts not too long ago at a local think tank.

What happens when the drones are used for evil as an alternative of good? Whether by tough nations or by our very own authorities or by any of the quite a few rogue nation-states with questionable characters of their regimes? For instance, what happens when NGOs bring in meals provides for starving civilians to those nations? Often rogue regimes steal the food and hijack the shipments, solely to promote it again to the very people who have been supposed to get it to maintain them from starving. Then they take this food and feed themselves and their militaries or armies very effectively, and promote the rest of the meals to the poor people who had been purported to get it without spending a dime in the first place.

With regards to oil there is a lot more cash concerned and so they use this money to secure excessive-tech weapons to do the same thing. Now think about such a rogue nation, authorities, or group of guerrillas with aerial killer drones. Not a pretty picture. I hope you'll please contemplate this. For us right here at house the insomniac eyes make no distinction between felony and legislation-abiding citizens.

Their recordings threaten the privacy of each man, girl, and youngster in America. Each day actions will now not be private. In 1890 the future U.S. Supreme Courtroom Justice Louis Brandeis argued that privateness was probably the most cherished of freedoms in a democracy. He supported "the individual's proper to be left alone." He mentioned "the frequent law has all the time recognized a person's house as his citadel, impregnable, typically, even to his personal officers engaged in the execution of its command." The ever-stretching wings and eyes of "Big Brother" should be grounded earlier than they destroy the liberty they have been designed to protect. For additional information, on this and many other topics you should continue to investigate online pages around the web such as USCIS. There are unending assets avaliable on this and similiartheme.

The Importance of ISAF Afghanistan These Days

ISAF Afghanistan, otherwise often known as the Worldwide Security Help Drive (ISAF) - Afghanistan assists the Afghan Government in exercising and increasing its Defence authority and affect across the country, paving the way for reconstruction and efficient governance. It does this predominately by its UN-mandated Worldwide Security Help Drive (ISAF). ISAF has been deployed since 2001 beneath the authority of the UN Security Council (UNSC) which licensed the institution of the drive to help the Afghan government "within the maintenance of safety in Kabul and its surrounding areas, in order that the Afghan Interim Authority as well as the personnel of the United Nations can function in a secure environment. ISAF was created in accordance with the Bonn Convention in December 2001.

 The concept of a UN-mandated worldwide security team similary to the RAF to help the newly established Afghan Transitional Authority was launched at this event to create a safe surroundings in and around Kabul and assist the reconstruction of Afghanistan. These agreements paved the way in which for the creation of a three-method partnership between the Afghan Transitional Authority, the United Nations Assistance Mission in Afghanistan (UNAMA) and ISAF. NATO took command of ISAF in Aug 2003 at the request of the UN and the Government of the Islamic Republic of Afghanistan. Soon after, the UN gave ISAF a mandate to broaden outside of Kabul.

ISAF expanded its command in 4 phases, initially within the north in Dec 2003, to the west in Feb 2005, to the south in Dec 2005, then finally increasing into the east in Oct. 2006. In June 2010, NATO break up the South Regional Command in half in a bid to enhance safety by focusing on smaller geographical areas and making certain better partnering with Afghan forces. At the Lisbon Summit in November 2010, NATO reaffirms its long-term commitment to Afghanistan (Enduring Partnership) and proclaims the launch of Transition to Afghan lead in security which is able to begin in 2011, with the ambition expressed by President Karzai, to see the Afghan National Security Forces take the lead in conducting National Security operations across Afghanistan by the tip of 2014. ISAF's missions embrace safety, specifically - conducting security and stability operations, supporting the Afghan National Army, supporting the Afghan National Police, disarming illegally armed teams (DIAG), facilitating ammunition depots administration, providing put up-operation assistance, reconstruction and growth (offering security to permit reconstruction) and humanitarian help (governance, counter narcotics) The NATO ISAF Afghanistan Medal is an international army decoration which is awarded to numerous militaries of the world under the authority of the North Atlantic Treaty Organization.

This Non-Article 5 Medal is allowed to exchange the NATO medals issued for NATO Operations Joint Drive and Joint Guardian. U.S Forces: Eligibility for the Non-Article 5 Medal for service with the ISAF are those who are members of items or staffs as set out within the Joint Operations Area taking part in operations in Afghanistan. The realm of eligibility is delineated by the political boundaries of the International Security and Help Force. The service must be 30 days either steady or gathered, from 31 July 2006 to a date to be determined. To learn more, on this subject and several other topics you should carry on and look into internet pages around the web such as National University . There are infinite assets avaliable on this and similiarcontent.

Wednesday, April 27, 2011

How Applying Command And Control Leadership Enhances Victory

Command and control is about decision making, the exercise of path by a properly designated commander over assigned and attached forces within the accomplishment of a mission, and is supported by info know-how (the computers and communications part of C4I). The United States is aggressively exploiting these applied sciences with a view to obtain information superiority, with the objective of reaching better and quicker selections, and frequently projecting, albeit with Defence uncertainties, future desired states and directing actions to bring about these future states.

Command and management refers to the exercise of authority and route by a correctly designated commander over assigned and connected forces within the accomplishment of the mission. Command and control functions are carried out through an association of personnel, tools, communications, services, and procedures employed by a commander in planning, directing, coordinating, and controlling forces and operations in the accomplishment of the mission.

Command refers back to the authority that a commander within the Armed Forces lawfully workouts over subordinates by virtue of rank or assignment. Command contains the authority and accountability for effectively utilizing accessible

resources and for planning the employment of, organizing, directing, coordinating, and controlling navy forces for the accomplishment of assigned missions.

Computing and communications are two pervasive enabling applied sciences that assist C2 and intelligence, surveillance, and reconnaissance. Computer systems and communications process and transport information.

Management is authority which can be less than full command exercised by a commander in a Defence Forum over a part of the actions of subordinate or other organizations. Bodily or psychological pressures exerted with the intent to assure that an agent or group will reply as directed.

Intelligence is the product ensuing from the gathering, processing, integration, evaluation, analysis, and interpretation of available data regarding overseas nations or areas. Data and knowledge about an adversary obtained by means of observation, investigation, evaluation, or understanding.

One necessary capability that C4I methods provide commanders is situational awareness--details about the placement and standing of enemy and pleasant forces. A mandatory component of attaining superiority in decision making, it doesn't alone assure superior determination making. Commanders should take related information and combine it with their judgment--including tough-to-quantify points of human behavior (such as fatigue, experience degree, and stress), the uncertainty of information, and the believable future states resulting from actions by each their very own force and the enemy--to make choices about future actions and easy methods to convey these selections in methods to facilitate their proper execution. In doing so, commanders are supported by instruments to allow and speed up the planning and determination-making course of, to attain the decision-making superiority envisioned by DOD.

And, of course, to be efficient, command decisions should be applied, a process to which C4I applied sciences are also relevant (e.g., in rushing up the link by way of which concentrating on data is passed to weapons, the so-referred to as sensor-to-shooter hyperlink). The development and use of the best instruments allow the commander to focus better on these issues associated with the essence of command--the artwork versus the science. As more and higher-automated tools are developed and persons are trained to make use of them, it should turn into much more vital to acknowledge the art of command as distinguished from the mechanics of the instruments used to provide information. More information at the Air Force Portal
on this subject.

Leadership was once about hard skills such as planning, finance and business analysis. When command and control ruled the corporate world, the leaders were heroic rationalists who moved people around like pawns and fought like stags. When they spoke, the company employees jumped. Now, if the gurus and experts are right, leadership is increasingly concerned with soft skills - teamwork, communication and motivation.

Some suggest that we expect too much of leaders. Indeed, "renaissance" men and women are rare. Leadership in a modern organisation is highly complex and it is increasingly difficult - sometimes impossible - to find all the necessary traits in a single person. Among the most crucial skills is the ability to capture your audience - you will be competing with lots of other people for their attention. Leaders of the future will also have to be emotionally efficient. They will promote variation rather than promoting people in their own likeness. They will encourage experimentation and enable people to learn from failure. They will build and develop people.

Is it too much to expect of one person? I think it probably is: In the future, we will see leadership groups rather than individual leaders. This change in emphasis from individuals towards groups was charted by the leadership guru Warren Bennis in his work "Organizing Genius" He concentrates on famous ground-breaking groups rather than individual leaders and focuses, for example, on the achievements of Xerox's Palo Alto Research Centre, the group behind the 1992 Clinton campaign, and the Manhattan Project which delivered the atomic bomb. "None of us is as smart as all of us", says Professor Bennis.

If they are adept at hard skills, they surround themselves with people who are proficient with soft skills. They strike a balance. The two most lauded corporate chiefs of the past decade, Percy Barnevik, of Asea Brown Boveri, and Jack Welch, of General Electric, dismantled bureaucratic structures using both soft and hard skills. They coach and cajole as well as command and control. The "leader as coach" is yet another phrase more often seen in business books than in the real world. Acting as a coach to a colleague is not something that comes easily to many executives. It is increasingly common for executives to need mentoring. They need to talk through decisions and to think through the impact of their behaviour on others in the organisation.

In the macho era, support was for failures, but now there is a growing realisation that leaders are human after all, and that leadership is as much a human art as a rational science. Today's leaders don't follow rigid role models but prefer to nurture their own leadership style. They do not do people's jobs for them or put their faith in developing a personality cult. They regard Berkley
leadership as drawing people and disparate parts of the organisation together in ways that makes individuals and the organisation more effective.

What Types Of Body Armour Can We Use To Protect Our Military Today?

Body Armour refers to protective gear corresponding to ballistic armour, armoured vests, body armour, ballistic helmets, demining armour, IED suits, ceramic, polythene and steel armour plates, face shields and anti-riot armour for the army and police around the world as well as in Military Defence.

Today, modern forms of body armor are called bulletproof or bullet-resistant clothing. Modern protective vests have been created to minimize the injury from projectiles from handguns, shotguns and rifles. With that, it is commonly worn by police forces, military and private security and civilians. The legality of the issuance of body armors such as bulletproof vests is dictated the jurisdiction of the state law and other government law-enforcement agencies. With the recent rise of urban conflicts, protective bulletproof clothing has offered a wearable and affordable kind of confidence and security.

In a world, dominated by a growing lack of respect, appropriate solutions are required. A Military Forum
to discuss it is simply not enough. A lack of inadequate personal safety measures can put a lone worker or frontline operative at unnecessary risk, and cause unacceptable injury or harm. Body armour and stab vests have therefore regrettably become a necessity within a number of domestic frontline professions.

These protective products are used by the police, military and private security corporations in over 35 countries together with the South African Military, South African Navy, Irish Military, Indonesian Military, Armed Forces of Malta, Chilean Armed Forces, Dutch Special Forces, Thailand Navy and US Military; and a number of police forces within the UK and US in addition to the South African Police Services, Turkish Nationwide Police, Saudi Arabia Police, Oman Police, German Police, Belgian Police and Bermuda Police.

Navy physique armour is obtainable in a mess of configurations: ballistic, stab resistant, dual goal fragmentation resistant and flotation. They are constructed from quite a lot of ballistic supplies, together with: woven and unidirectional (protect) aramid and high efficiency polyethylene. Something similar is used in the Avionics industry. The outcome is of great relevance to the question: 'Body Armour - Why?' The main risks areas highlighted by the HSL are as follows:

- Visiting people in their house or office to enforce legal guidelines, police the system or having to give bad news.
- Certain geographical areas or trouble spots are high risk, such as poor or run down council estates.
- Dealing with certain high risk individuals, such as potentially violent or aggressive members of the public, drug users or dealers, or mentally ill individuals.
- Dealing with frustrated and disappointed customers (e.g. customers unhappy with the service your organisation has provided)
- Working late at night.
- Evicting people from their home.
- Visiting clients in unfamiliar industrial and domestic premises.
- Visiting unoccupied buildings

Several more reasons can be highlighted, deciding not to issue potentially life saving body armour or stab vests even more controversial. Corporate manslaughter and corporate homicide laws as well as health & safety regulations have been rewritten in countries around the world, in order to protect those who serve and risk their lives for others. The high cost of facing potential legal action after a fatal or non-fatal incident and the cost of injured employees taking time off would outweigh the one-off cost of body armour. Assaults on personnel who are not wearing protective clothing also create bad publicity for the Authority concerned, not to mention the welfare of the person involved and operational problems resulting from the injured staff being unable to work.

In 2003 the UK's Health and Safety Laboratory developed 18 case studies and approached over 400 organisations of various sizes and across a range of different occupations. Very detailed questionnaires were sent and interviews were conducted by the HSL with the selected organisations and the information which they provided formed the basis of these widely respected case studies.

Yes, 'perception' is one of the most essential issues within personal safety, and I very much agree with the fact that overt body armour can often be perceived as very confrontational, especially when dealing with intoxicated members of the public or those who seriously dislike authority, your organisation or presence to begin with. For me, lone workers dealing with the public should be doing their utmost to express themselves as peaceful ambassadors within their line of work. Only covert body armour allow them to do exactly that, whilst still being protected.

Body armour is usually developed in quite a few designs and configurations. Some of the most superior armour options have been developed and can be found for each the male and female kinds and embody formed choices for max safety and comfort. This article explores the varied varieties of body armour accessible today. Proceed studying below to study extra about how they're used.

Basic function protective vests are designed as a fundamental armour vests for the Police and private safety companies. They supply entrance, back and side ballistic protection. Concealable Vests have been designed to comply with the contours of the physique and provide front, again and side ballistic protection. Excessive visual operations clothes have been designed for use by personnel who need to be simply identified equivalent to traffic police.

Police Assault Vests are designed for over-the-uniform wear, offering full entrance, again, side, neck and shoulder ballistic protection. They're typically utilized by Police, Military and Special Forces. Military Assault vests are designed to be excessive-mobility front opening vests and are to be worn over a soldier’s uniform. They normally have entrance, back, facet and shoulder ballistic safety; with ballistic collar and throat protector, and detachable groin protector.

Demining Vests have been especially designed for deminers and specialists within the Army and Police who search for mines and explosives. These vests are designed to offer the utmost attainable safety towards fragments and explosions from detonating mines. They provide front, again and aspect fragmentation protection; with removable groin protectors.

Demining Aprons are also particularly designed for deminers and specialists in the Army and Police who seek for mines and explosives. These fits are designed to supply the utmost potential protection against fragments and explosions from detonating anti-personnel mines.

IED search suits are particularly designed for specialists in the Army and Police who seek for Improvised Explosive Gadgets (IEDs). These fits are designed to supply full body protection against fragments and explosions.

Armour plates are normally made from excessive-performance metal, ceramic and light-weight polyethylene armour plates, designed to suit all these vests and provide safety against high-velocity weapons, masking NIJ Degree III and IV (armour piercing).

The fact is that there is always an 'unknown' level of risk due to unforeseen circumstances. Ordinary risk assessments might often conclude in the verdict of 'low risk', however these often very basic risk assessments are based on technical facts or 'on-hand information' only, and while I appreciate them, they often do not go beyond these facts. A risk assessment dealing with the activity of a lone worker having to enter someone else's property or deal with customers or clients on a one-to-one basis can in my opinion, never ever result in low risk. Whenever a lone worker walks through someone's door or deals with often unfamiliar members of the public at another location, one can simply not know who else will be in the house, who else might enter the house at a later point, what activities occured prior to your colleagues visit or who else might be going to interfere or engage in their conversation or argument at a later point.

If you were driving a vehicle and your petrol light comes on, indicating you only have a bit of petrol left. What would you do? Would you start thinking: Will I make it home or not? Some people would be willing to take the risk in this situation. In the workplace though, in my view, it is the duty of the employer to not allow their employees to take unknown risks of their own accord without the provision of gear and training to protect them should they make a mistake in their own judgement. 'Better safe than sorry' and 'Prevention is better than cure' are two great sayings, making more sense within corporate health & safety than anywhere else. I hope you would stop and get some fuel, simply because you want to be on the safe side. You might have made it, but you didn't want to take that risk. The bottom line is you cannot afford Devry. The fact that a lone workers activity involves a rather 'unknown risk' must urge key decision makers to remain at least open minded when it comes to body armour or additional lone worker safety training that can be made available.

Suggesting body armour does not mean we suggest you are in danger, we simply say that you will have a greater chance of remaining unharmed in the unlikely, but possible, case of something going wrong. Wearing personal protective equipment can be compared to wearing a seat belt when driving a car. We do not put the seat belt on because we believe we are going to have an accident today. We are simply acknowledging the fact that there is an exceptionally small chance that we might crash. Yet, if this chance becomes reality, you have increased the chance of survival by wearing a seat belt.