Ep 28 | Ed Calderon of Ed’s Manifesto
Our second interview with Ed. John Valentine sits down with Drug War Veteran and non-permissive environment specialist Ed Calderon of Ed’s Manifesto. Ed is a non-permissive environment specialist and published…
In Depth Tactical Solutions
Our second interview with Ed. John Valentine sits down with Drug War Veteran and non-permissive environment specialist Ed Calderon of Ed’s Manifesto. Ed is a non-permissive environment specialist and published…
Recover Tactical products are designed by Israeli weapons engineer and industrial designer Tamir Porat. The P-IX Modular Platform was designed as a chassis for Glock pistols to give them some…
With the Kinisium motion-activated alert system – you can find out in real-time. Anywhere you have access to a 2.4GHz WiFi network, you can use the Kinisium Security System. The…
A man stands on a burned-out car as fires burn behind him in the Lake St area of Minneapolis, Minnesota during civil unrest following the death of George Floyd in…
Combatives and Retention Shooting Teaching Combatives and Retention Shooting has become the new gold rush. This is the main motivation for my previous article “2020 Combatives Training.” Combatives and Retention…
On October 2, 2024, the Department of Homeland Security (DHS) released its 2025 Homeland Threat Assessment (HTA), providing a comprehensive overview of the evolving threats to public safety and security…
It’s no longer an argument that part of your Every Day Carry (EDC), kit, or duty gear, should be a quality flashlight. Because sun doesn’t always wait for you to…
The Olight Seeker 4 Pro measures just 5 1/2″ long and 1 3/8″ wide at the bezel but packs a lot of illumination into that small package. The Seeker 4…
As I approach the transition from Law Enforcement to civilian or contractor work, I realized I was going to turn in my issued armor. Our issued plates have come a…
Image created by Image Creator from MIcrosoft® Bing®. Juice jacking is a cyberattack where hackers can access your personal data or install malware on your device when you use a…