Urban Movement & Exploitation
- Regular price
- $1,000.00
- Sale price
- $1,000.00
- Regular price
-
- Unit price
- / per
Course Overview
The world's most unpredictable environments aren't always overseas; they're often the streets we walk every day. Urban Movement & Exploitation, designed by renowned unconventional security specialist Ed Calderon, is a deep dive into the mindset and methods of staying one step ahead wherever you are. Blending street-level criminology with field-proven tradecraft, this course reveals how to see the world through the eyes of a threat actor, whether it's a pickpocket, scammer, or violent criminal, and use that perspective to sharpen your own situational awareness.
This is not a course about theory; it's about experience. By training your perception, sharpening your decision-making, and practicing deception from both sides, you will learn to see the world differently. You'll walk away with a heightened awareness, unconventional problem-solving skills, and the ability to adapt in dynamic, unpredictable environments. More than a class, this is a mindset: a way of seeing the invisible patterns in the urban landscape.
Whether you're a civilian traveler, a law enforcement professional, or a military operator, Urban Movement & Exploitation equips you with an adaptable framework for navigating uncertain environments.
What You'll Learn
Environmental Exploitation
- Reading Urban Environments for Threats and Opportunities
- Identifying Patterns and Anomalies in Public Spaces
- Leveraging Environmental Features to Your Advantage
Criminology
- Understanding Criminal Mindset and Target Selection
- How Threat Actors Assess Victims and Opportunities
- Street-Level Crime Patterns and Methodologies
Technology and Tactics
- Tools and Techniques Used by Modern Threat Actors
- Practical Applications for Personal Security
- Adapting Tactics to Dynamic Situations
Digital Exploitation of Urban Environments
- How Technology Intersects with Physical Security
- Digital Footprints and Urban Movement
- Leveraging and Protecting Against Digital Vulnerabilities
Surveillance and Counter-Surveillance
- Recognizing When You Are Being Watched
- Techniques for Detecting and Evading Surveillance
- Applying Surveillance Principles to Personal Security
What to Bring
There are no required supplies for this course. We recommend bringing a notebook and something to write with, snacks, water, and a change of clothes. Feel free to bring any existing tools or technology you'd like to test during the class.
Prerequisites
None. This course is open to all experience levels, from civilian travelers to law enforcement professionals and military operators.
Hosted Course Notice
As a hosted class, this training course is separate from the official RTA curriculum and is not conducted by RTA staff. This class is developed and delivered by Ed Calderon, an industry expert known to Red Team Alliance but with no direct affiliation or relationship to RTA beyond the scope of this contracted hosted training.
