Counter-Ambush Tactics for Security Professionals – Part 2