Category: Private Security


Firearm Simulation Training

Firearm Simulation Training

The MILO Range Classic is an interactive training simulator with full digital video branching scenarios and graphics based firearms drills and exercises. The compact, all-inclusive design of the Classic is easy to transport and sets up in less than 20 minutes in almost any size training room. Perfect system for temporary or permanent training environments that require a fully interactive simulator with easy portability.

The MILO Range Classic includes over 425 interactive video scenarios covering everything from active shooter and domestics patrol and homeland security. Instructor controlled branching options enable the trainer to determine different outcomes with the same scenario.

In addition to standard and high definition branching video scenarios, all MILO Use-of-Force products support interactive, graphic-based firearms exercises and drills. There is basic target tracking exercises to a complete user-defined Course of Fire and Marksmanship drills. All applications have settings to accommodate the skill level of the shooter using a real firearm with a laser attachment. Picore does not use Live Fire modes with this simulator.

This simulator is utilized to train Picore’s armed guard force (both concealed weapon and exposed weapon officers). Picore also trains California guards and police officers to obtain there exposed weapons’ permit with the state. This division is licensed under PBI from the Bureau of Security and Investigations (BSIS). License 1352

Upon successful completion of the training, the student will be able to demonstrate techniques to safely accomplish the following tactical techniques:
  •   Properly utilize cover and/or concealment during a given scenario and know the difference between the two.
  •   Respond to a variety of situations that may arise during your shift or post. The officer will learn how to utilize the correct level of force to control a situation.
  •   Demonstrate the knowledge of how to handle a weapon safely.
  •   Facilitator(s) and the student will discuss and critique the scenario.
Private Security
  • READ POST

    Background Searches and Pre-Employment Screening

    Background Searches and Pre-Employment Screening

    Services available:

    Sophistication in Security. Distinction in Defense.
    • Academic - Search of academia records
    • Civil Records - Search of civil records in the appropriate civil court
    • Credit - From one or more major credit bureaus, a summarized report is provided based on Credit Act
    • County Criminal - Searched at the highest court in the county. (Lower court searches are also available.) All felony convictions, misdemeanor convictions, and related activity on record are reported; generally limited to seven years, but older convictions will be reported if requested and/or available.
    • Statewide Criminal - Searched at the highest court in the county. (Lower court searches are also available.) All felony convictions, misdemeanor convictions, and related activity on record are reported. Reported activity is generally limited to seven years, but older convictions will be reported if requested and/or available.
    • Employment Background Check - Current and/or previous employers are contacted to verify employment.
    • Motor Vehicle and DMV Reports - Includes validation of license, status, and expiration date. Accident and violations on record are also provided; completed through state of license issuance and usually includes three to five years of history depending on state.
    • Professional Licenses - Issuing State authority is contacted to verify license status.
    • Professional Background References - Interview with a reference provided by the applicant is conducted.
    • SSN Trace - Reviews the historical and logical connection between applicant and SSN based on history of use, logic tables, and death indices. Generally includes year and state of issuance. This check may reveal use of multiple SSN and/or aliases (AKA’s).
    Private Security
  • Services: 

    READ POST

    Cyber Investigations

    Cyber Investigations

    We specialize in the investigations of computer forensics, network intrusion, and we offer a wide range of cyber-security consulting and forensic services. These specialized services include legal computer evidence recovery, network architecture vulnerabilities, counter-data surveillance, e-mail tracing, internet crimes, network penetration testing, and all other legal investigations involving computer evidence.

    Note: It is illegal to tape-record someone's voice without his/her consent.

    Maximum Security with Minimum Disruption.
    Private Security
  • READ POST