www.1001TopWords.com |
Pepper Spray Considerations
Choosing the Right Pepper Spray There are so many types of pepper spray on the market today that it has become confusing for you to decide which one to get. There are three basic chemical compounds that compose these defensive sprays. CS (Orthochlorobenzalmalonitrile) CN (alphachloroacetaphenone) OC (Oleoresin Capsicum) The first two, CS and CN, irritate the membrane tissues and cause stinging and tearing. They can take from 5 to 30 seconds before they are effective and may not work if someone is drunk, on drugs, psychotic, or can't feel pain. The time delay and the fact that they may or may not be effective, is enough to turn people away from the self defense sprays. However, the remaining compound, OC, does not have these limitations. OC, or Pepper Spray, is an inflammatory agent; not an irritant. When someone is sprayed with OC pepper spray, the person's eyes slam shut. Even if someone does manage to get their eyes open, they won't be able to see because OC dilates the capillaries and causes temporary blindness. Additionally, instant inflammation of the breathing tissues restricts all but life suport breathing. They double over coughing uncontrollably. But I hear about people who aren't affected by pepper spray? What you have heard about are the man made chemical compounds commonly referred to as CS or CN. These are your tear gases. For example, military personnel are subjected to similar chemicals in the course of their training to simulate a chemical attack in a war time situation. After repeated exposure, a resistance is built up so the "gas chamber," as it is called, does not affect them as much. And it's true that some people are just not as affected as others are. Other law enforcement personnel, martial artists, and yes, even determined criminals can fight through the effects of CS or CN chemical sprays. Chemical Compounds that make up defensive sprays: CS (Orthochlorobenzalmalonitrile) CN (alphachloroacetaphenone) OC (Oleoresin Capsicum) Pepper Spray, on the other hand, has the effect of putting a brick wall in between the assailant and the sprayer. When someone gets a full blast of OC pepper spray, they stop what they are doing. They stop what they are thinking. Even people previously mentioned that could withstand the effects of tear gas, are very personally affected by OC pepper spray. This includes people that are drunk, on drugs, or psychotic. Ok, so how do I decide which one to buy? Once it became known that OC is superior to CN and CS, many brands became available with different concentrations, formulations, sizes, and spray patterns. Choosing the right spray is a critical decision if the spray ever has to be used in a self defense situation. Defensive Sprays Considerations Size and capacity: Sizes can range from a 1/2 ounce personal pepper spray up to 9 ounces for the bear pepper spray. Keychain sized defensive sprays or sizes easily carried on a belt or in a purse are ideal for most situations. Even the smallest units have enough in them to handle multiple attackers if done properly. The two main factors you want to look for are the range and the number of shots. A 6-8 foot range is plenty since that is where most personal assaults will take place. Most defensive sprays are also classified by number of one second bursts. A good 1-2 second burst will disable almost any assailant. Spray Pattern: There are two basic types of defensive spray patterns, stream and mist. Stream patterns give good range but require aiming directly at the face. Cone mists have shorter range but you don't have to aim as well. If there is a breeze, a stream is more controllable. Mists can be blown off target or even back to the sprayer. OC pepper spray works best when it hits the eyes and is inhaled. The mist is inhaled instantly while the stream might take longer for the person to breathe in the pepper spray. In all cases, it is critical to hit the attacker in the face! What else should I know about purchasing defensive pepper sprays? Aside from size and capacity, and spray pattern of pepper spray, the formulation can also be a consideration. Formulation: OC comes in concentrations of 5%, 10%, 15%, or even higher. Bear pepper spray is rated at 20%. Because of different marketing that has evolved around these defensive sprays, the percentage is not always a good indicator of effectiveness. TBO-TECH Self Defense Products only carries the highest quality pepper sprays, including Mace brand, that have been proven to be most effective. Other factors: Many pepper sprays come on keychains. This is a sound idea because since most people usually have their keys with them, they will also always have their pepper spray with them. But don't forget about the times you don't have your keys. The small investment in an extra pepper spray could actually save your life! The best pepper spray in the world or the most extensive training will amount to nothing if you don't do two things: Carry your pepper spray wherever you go and practice using it! Steve Thibeault is the owner of TBO-TECH Self Defense Products located at http://www.tbotech.com. Formed in April of 2000, TBO-TECH has become one of the largest online outlets for personal protection and self defense products in the US. Product offerings include stun guns, pepper sprays, tasers, home and personal alarms, spy and surveillance equipment, and many other products not usually found in stores.
|
RELATED ARTICLES
Who Has Keys to Your Castle? One area of home security that is often overlooked, and one of the most visible, is the common key. Even if you are the owner of a new house, or the first tenant of your apartment, you cannot be sure that no one else has a key to your door. Home Security After An Earthquake After an Earthquake you need to do an immediate damage assessment. First go turn off the gas if you smell anything, a leaky gas line could explode and take out your entire home and your cats nine lives. Look for cracks in the slab or any areas where the house carpet is lifted up. Then walk around the exterior of the house, what do you see? Do you see downed fences, retaining walls, support structures holding up the garage at weird angles or any areas where your house was knocked off its foundation? Look also for water pipes which have been broken, if so shut off the main water line coming into the house. If there is extensive damage then that means the other neighbors have also and the entire area. Garage Door Openers--Buy the Best Gagage Door Opener only Buying the right garage door opener has not never been more simpler.Whether you want to buy one for residential use or the commercial use read the tips below and buy the garage door opener which ideally suits you . The Real Desire for the UK House Buyer Location location location, central heating, air conditioning, double glazing, good neighbours,good schools and a long lease these are just some of the factors that buyers consider when buying a property. So it was some surprise when we learnt that that new UK research (Jan 05) commissioned by the Homebuyer Show revealed something completely different. What is Your Security Awareness IQ? Are you aware of the need for security? Essentials For Hurricane Season According to the National Oceanic & Atmospheric Administration, the East Pacific expects 15 to 16 tropical storms. Nine of these end up becoming hurricanes with five becoming deadly major hurricanes. If you live in the southeastern part of the U.S. then you know that hurricane season started on June 1st. Are you prepared for Hurricane season? Did you know that Hurricane season lasts until the end of November? Have you gone out and bought all the supplies that you may need? This article is written to help you prepare for any kind of hurricane. It will also provide you with a list of items that are essential for any storm. Emergency Telephone Numbers Emergency is a situation that poses an instant threat to human life or possessions though this description may be different in some areas. Deliberate bogus reports of an emergency are usually prosecuted as an offense. One should call for help any time there is a danger for life or public order. The emergency telephone number is a special case in the country's telephone number sketch. Eavesdropping and Counter-Measures: Technology and Techniques You need to know how to protect yourself, since your security department or any consultant may not be truly aware of these threats and therefore not dependable. Since September 11th, a number of businesses entered the security field with little to no knowledge of the trade itself; only of its profit potential. Even outfits that have been around for some time and well-established have not been able to stay current with the latest innovations.Realistically, viewing your threat level has to be considered since everyone should expect some sort of impending privacy issue no matter how small. Thanks largely to the Internet you can arm yourself with much of the knowledge and equipment that the so-called experts use. If a respected agent of computer crimes for the Secret Service in NYC had his T-Mobile Sidekick hacked, who knows what else happens out there to others in any business.Realistically, viewing your threat level has to be considered since everyone should expect some sort of impending privacy issue no matter how small. Thanks largely to the Internet you can arm yourself with much of the knowledge and equipment that the so-called experts use. If a respected agent of computer crimes for the Secret Service in NYC had his T-Mobile Sidekick hacked, who knows what else happens out there to others in any business.We'll start acoustic ducting evaluation is the inspection of air ducts, baseboard heaters, coffee rooms, lounges, bathrooms or any way the architecture of a building can transfer sound. A simple example is to put your ear to a wall and listen. Basically anything that requires the use of the naked ear is called an acoustic bug. Softer surfaces can help muffle sounds but there are more efficient means out there. So be aware that the way an office site is designed can act as a conduit for conversations. Also, be aware of any changes can have adverse affects. Simply playing music can do wonders for masking conversations.Inspection of telephone equipment and wiring is called line analysis. This is trickier than it seems since sometimes a possible weakness has an actual purpose to the telecommunication system. Especially if it requires constant maintenance and software upgrades.All instruments should be opened and inspected. Ideally they should be compared with a known safe phone or device. If you're not sure, just remove that piece of loose components and wiring and see if the phone still works. The wiring can be modified in a switch within the handset that essentially turns it into a microphone. If you bypass this hook switch, you can listen in from anywhere on the landline. Technicalequipment won't be able to detect this. Time Domain Reflectometry is the sending of a pulse down a telephone line. If there is some sort of disruption; a wall outlet or wiretap; a portion of the pulse will besent back to the device called a Time Domain Reflectometer (TDR). Then the time difference between the reflection and the continuous run is measured. This helps in determining the distance to the anomaly.These devices can perform all sorts of diagnostics including mapping a wire network. That can be useful in locating a hidden phone. Hidden phones have several obvious uses such as making long distance phone calls to being placed in an office across the street to receive betting requests by bookies; a practice called back strapping. If you open up the modular jacks where you connect your phone, you'll usually see four wires. In most cases only two wires are connected; commonly known as ring and tip. If you see all four connected, be aware that is not usually consistent for most wiring situations, especially in homes. The other two wires could be used for a bugging device.For instance, the microphone you use in a voice recorder can be cut in half. Connect the mike head to one set of unused wires anywhere on the phone wire. Then, so long as there are no breaks in the wire, connect the other end to the jack that connects to your recorder. Now place your recorder to be VOX (voice) activated and now you have an extremely reliable bug. By the way, this should be manually inspected for since using a specialized bug detector may see nothing wrong or inconsistent. A bug such as this that connects to a wire is called a direct tap. The other general type is called an inductive tap. This is when an instrument is outside a wire but can still distinguish what's transacting over a wire. They are harder to detect since they don't draw power from the line such a standard telephone would. These are referred to as snuffle bugs. A simple probe used in hunting wire signals has a speaker, which can display sounds. Byaccident one day I was working on an apartment intercom system while using a probe. I could hear conversations throughout the building quite clearly just through the intercom boxes mounted on walls from the master unit in the basement.If you're using wireless headsets or cordless phones, the radio signals can be intercepted. A cordless phone acts like a radio, but depending on the frequency and a few other factors, can make interception extremely difficult. With some manufacturers, you can buy the same model as your neighbors or the office and have it join their phone system. Double check Caller ID boxes to see if they also record numbers dialed besides obviously those being received. If you're using VOIP (Voice Over IP), remember that calls can be recorded in a fashion identical to intercepting data between two computers. These packets of data can reassemble an audio file. Obviously electronic devices possess semiconductor components such as diodes, resistors and such. The method to hunt for these components is called Non-Linear Junction Detection (NLJD). The NLJD unit emits a radio signal while listening for the return signal from an electronic device. This becomes very useful when a bug is embedded in a picture frame or wall. The eavesdropping device doesn't have to be active for it to be discovered. If a device is active and transmitting wirelessly (or even on a wire), you can detect it with a Radio Frequency Spectrum Analyzer. Depending on the detection device used, you can determine whether voice, data or video is being sent, and possibly listen to the data. Try to use different size antennas or buy one that collapses. Different frequencies can be detected more efficiently by using various sizes. The use of filters with antennas can also help pinpoint devices on specific frequencies. Electronics such as computers, FAX machines and especially CRT monitors can radiate electromagnetic signals or pulses that can be received by other equipment. This is known TEMPEST. One way to complicate the surveillance of this is to use certain fonts and line walls or equipment with different gauges of copper mesh wire. You can further enhance this posture by using special paints, which block radio transmissions. Radio waves will look for a leak or break, so be careful of defensive applications. One-way window tints can help in blocking signals. Since an electronic device could generate some heat they can be detected in another way. The use of a thermal imagery device can detect and actually see minute amounts of heat radiated for your viewing. You can hide the heat signatures by using creams or neoprene. Technology exists to collect information from blinking LEDs of modems, routers, print servers and similar devices. You can only see some general blinking but with the use of properly tuned optics, filters, oscilloscopes and good timing you can discern much more. One of the LEDs on your keyboard can be altered to blink while you are typing in a fashion similar to Morse Code. You can also use a tap in the keyboard that sends out radio waves again similar to Morse Code and no anti-virus software will ever be able to find it. Even when a CRT computer monitor is facing a wall the light can be in a sense read by its flickering emanations from some distance. A good defensive measure is to buy new LCD flat panel types.Another approach to attacking FAX machines is to simply record the noises it makes and play it back to another machine. I used to do this for a client so they could keep a record of all the faxes they made and received. There are creative and potentially illegal defenses against wiretappers and Peeping Toms. One is to transmit an extremely high pitch down the wire, thereby rupturing the listener's eardrums. I knew someone who once sent a powerful electrical spike down his phone wire thereby destroying his divorced wife's recorder. By the way, this leads to another topic-expect the device to be discovered someday. Don't leave your fingerprints on it. He found it and had it dusted, thereby producing some prints. My friend used this as leverage against the Private Investigator that planted it. Advice to Private Investigators, a word to the wise: if you do this part-time, hire someone who does this full-time. This P.I. lost his license and almost went to jail. The lawyer who recommended him got into a lot of trouble as well. He received some unwanted attention from the Feds because of his telephone dealings went across state lines and also happened to involve the Post Office. There is another budding field related to this topic called Protective Intelligence. Currently there are only a few experts who do this kind of work.A laser or an infrared beam can be used at a considerable distance from a target building. Conversational sounds can vibrate unto solid objects such as windows. The beam's reflection varies in relation to the movement to the window, which is received and converted back into something audible. To mask the sounds, you could attach a vibrating device (basically an altered electric razor) to the window.Of course if the window is open, then a laser can target another object instead of the window. A beam of light or laser can be directed to go through a window onto a solid object thereby nullifying such defensive measures again. Generally you really can't detect such attacks unless the laser, infrared or light beam is being used that moment. Certain materials can be used to detect IR emissions, as well as the use of passive night vision gear. Certain fabrics or even a curtain may actually show the spot where a beam of light or laser is being focused. Unless the room is dusty or you have an artificial can smoke, you can follow the beam up to a point and guesstimate it's location. One type of optical bug is an infrared transmitter. When placed in the area of interest for transmission of the conversation to an infrared receiver which will then translate the conversation into an audible format.Many of these same procedures used can be applied to locating hidden cameras. A relatively new device uses a series of lasers to seek out optics. This wasoriginally intended to locate snipers by bodyguards.I have listed the techniques, counter-measures and then the counter to the counter-measures to prevent any false sense of security. Usually constant vigilance is your best weapon besides knowing what to look for. Even if you find a "bug sweeper" with good credentials, certifications and experience, ask them detailed questions. Not just to test them but also for your own peace-of-mind. This makes our job easier and we appreciate greatly when dealing with knowledgeable customers. Alarm System Keypads The keypad is the device you and your loved ones will interface with daily. It is typically placed at one or more of the following locations: How to Buy a Safe for Your Home The first step is to determine who or where you will buy your safe from. There are many places to buy a safe today, you can buy from a "big box store", an office supply store, a furniture store, a hardware store, online, or even from a professional safe retailer or locksmith. Pepper Spray Considerations Choosing the Right Pepper Spray Neighborhood Mobile Watch Patrol Have you found yourself disgusted with the crime lately. You know much of it is gang and drug related yet cannot understand how it has infiltrated your quiet town or how it has become such a menus in your city? Have you recently been a victim of a crime, vandalism or petty theft. Have you just about had enough of this? There is something you can do and it won't cost you a dime to do it. Start a Neighborhood Mobile Watch Patrol in your area today. Numbers That Can Save Your Life It's one of those things we don't give a second thought about. Many of us move into a house and never even change the number that's on the house. Why should you, it's the right number and that's all that matters. Well it may be the right number but can you see it at night or from the road? If there is an emergency and you have to call an ambulance, you certainly don't want them wasting valuable seconds looking for your home. Having a visible house number both day and night is critical. Alarm System: Wireless Remotes WIRELESS ALARM SYSTEM REMOTES Alarm Systems & Automobile Tires? What do alarm systems and automobile tires have in common? This may sound like a strange question to the untrained ear, but lend me yours and I will make sense of it. Life Insurance - Wise Investment to Protect Your Home or Excessive Caution? Life insurance is typically taken out to offer valuable financial protection for your family in the event of your death, upon which a payment is made to your financial beneficiaries, heirs or family members. The extent of this payment will depend on your insured sum and earnings. Life insurance and life assurance may be interlinked in advertisements, though bear in mind the two policies are different. Life assurance is a form of financial protection which is also an investment, as you should always get a pay-out at the end of the term of the policy. Life insurance on the other hand is simply financial protection for your family, avoiding the issue of debt in the event of your death. Surveillance Camera Positioning It is a known fact that advertising is made to attract our eyes. Marketers work very hard to plant visual memories in your mind. They use anomaly phrases, rhetorical questions, sexy images and ironic text. There are many reasons why this is done but the biggest reason is that it works. Our eyes are often caught and our brains captured for a moment while we digest the advertisement. Since the advertising world has done such a good job in making us look and think there is a slight hesitation in our gaze and direction of sight. This of course is the world's best time to snap a shot or grab an image of a human on a surveillance camera. Stand Alone Keyless Access - How Does It Work? Security and convenience are usually delicately balanced. If something is secure it isn't convenient and vice versa. It's convenient to leave your keys in the ignition, but it isn't secure. Keyless access products offer both aspects in an attractive package. Handling Weather Emergencies: Part 2; Home Security, Evacuation, and Emergency Kits Introduction Emergency Disaster Planning: Building a Bug-Out Kit Report after report comes in about how many people couldn't or didn't escape the wrath of Hurricane Katrina. More reports come in about the disorganized relief effort, the communications problems they're having and the difficulty in getting survivors to safety even when they are reachable by rescue personnel. |
© Athifea Distribution LLC - 2013 |