Wed. Oct 23rd, 2019

Spotter Up

In Depth Tactical Solutions

CQB Education Part 2 by Project Gecko- Breach Denied

3 min read

In this Video, we are going to talk over the breaching, and some of the actions which hinder the security of the team and their initial performance. It is important to remember – our response is triggered by Survival based decision, it is crucial to understand the problem, and work via the OODA Loops for better performance & safe working space.

The phrase OODA loop refers to the decision cycle of observe, orient, decide, and act, developed by military strategist and United States Air Force Colonel John Boyd. Boyd applied the concept to the combat operations process, often at the strategic level in military operations. It is now also often applied to understand commercial operations and learning processes. The approach favors agility over raw power in dealing with human opponents in any endeavor.


  • Breacher fails to create a working space.
  • Breacher fails to breach the door.
  • Over exposure.
  • Point man lose control on the 0% – 100%
  • Point man is distracted by an immediate danger (door ahead) and forgets his corner. (survival based decision).
  • Door blocks decisions.

The video represents mistakes, and other actions that may compromise and put the team in risk and are definitely not the ideal. It is important to remark, that the personal in this video are participants which are still ‘new’ to this method. So think twice before being a keyboard hero.

The video below represents the structure settings of this drill. Remember, Cameras & Eyes don’t always have the same angles of view.

What is a Breach ?

Breaching is a positive method of breaching & must be determined during planning.

The Breacher, some fundamentals:

Improper breaching results in a denied access into the objective and may cause injury to the team members, innocent bystanders, or the threat. Improper breaching may result in mission failure. Breachers must be capable of:

-Provide positive, safe entry for the team.
-Potential entry points.
-Potential danger areas. Analyze.
-Determine which potential entry points would make the best primary and alternate breach points.
-Determine the best primary breaching method technique to use for the primary, alternate, and unknown breach points.
-Remaining prepared to effect more breaching.

It is important to remember that all entry team members must be capable of performing all breaching techniques.

Learn more about our friend Eli and Project Gecko:

Project Gecko is a company which specializes in the field of Tactical Training & consultant services. Their capabilities ranges from setting up Tactical courses & projects to consultant services. During their courses Gecko instructors give their participants the mental and physical tools for their personal success.

They offer a wide spectrum of programs that take place in one day classes, three-days-seminars, and events up to one week. All those programs are based and created on their knowledge which they unpack and repack in a way that will suit every participant. For Gecko the gear is just a tool and the will is the key. Gecko believes that every person who has the will, will find his place in their seminars and workshops.

The instructors behind Project Gecko are all former military personal with extended training’s and combat experience. Eliran founder of Project Gecko  was born in Israel. Before he moved to Germany he served in the IDF in one of the SF units.

Find out more about Project Gecko 

*The views and opinions expressed on this website are solely those of the original authors and contributors. These views and opinions do not necessarily represent those of Spotter Up Magazine, the administrative staff, and/or any/all contributors to this site.


Brought to you by the dudes at Spotter Up



Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.