Pick Your Predator

Published on September 12, 2018
Duration: 7:40

This video explores hypothetical 'predators' one might least want hunting them, ranging from a master martial artist to a kingpin. It emphasizes that context is crucial in determining vulnerability, highlighting how different skill sets (combat, espionage, technical) pose unique threats depending on the environment. The core takeaway is the importance of understanding diverse threats to identify personal vulnerabilities and adapt training accordingly.

Quick Summary

Context is paramount when assessing threats. While a master martial artist is deadly up close, a spy or hacker can neutralize targets anonymously from a distance. Understanding these diverse skill sets helps identify personal vulnerabilities and adapt training for effective self-defense preparation.

Chapters

  1. 00:07Introduction: Nerdy Video Idea
  2. 01:05The Big Question: Who's Hunting You?
  3. 01:09Predator 1: Master Martial Artist
  4. 01:15Predator 2: Special Operations Guy
  5. 01:23Predator 3: Super Spy (James Bond)
  6. 01:27Predator 4: Computer Hacker
  7. 01:29Predator 5: Competitive Shooter
  8. 01:35Predator 6: The Kingpin
  9. 01:42Context is Everything
  10. 02:37Analyzing the Master Martial Artist
  11. 03:22Analyzing the Special Operations Guy
  12. 04:28Analyzing the Spy
  13. 05:09Analyzing the Computer Hacker
  14. 05:42Analyzing the Competitive Shooter
  15. 06:29Analyzing the Kingpin
  16. 06:57Conclusion: Personal Takeaways
  17. 07:14Call to Action: Like & Subscribe

Frequently Asked Questions

What are the key vulnerabilities when facing a master martial artist?

The primary vulnerability when facing a master martial artist is if they can close the distance and get within your reactionary gap. At this close range, your ability to defend yourself, even with a weapon, is greatly diminished, making survival unlikely if they reach you.

How does context influence the threat posed by a Special Operations guy?

A Special Operations guy is most dangerous in a warfighting environment with support and intelligence. In a civilian context, especially if they are operating solo and their target is unknown or laying low, they might be less effective or more like a 'fish out of water'.

What makes a spy a particularly spooky threat?

Spies are spooky because they can operate in clandestine warfare, hide in plain sight, and gather their own intelligence. The threat is that you may never see them coming, and they can neutralize you through subtle means, like poisoning, without you ever having a chance to react.

How can a computer hacker pose a lethal threat?

A computer hacker can cause lethal threats by orchestrating accidents, causing explosions, or destroying critical infrastructure from afar. They can also ruin reputations, get targets arrested, or devise other creative, anonymous methods to cause harm or death.

More Tactical & Gear Videos You Might Like

More from Warrior Poet Society

View all →