Circuit Magazine #23

Page 1

News

Circuit

Reviews

23 www.circuit-magazine.com

Opinion

Intel

Exclusives

Close Up on Surveillance The experts opinion

Contractors Workout FocusOn: Somalia Super Ninjas | Pre-Hospital Care| Over Qualified


Contents issue22

46 focusOn: Afghanistan A Time for Transition


66

FocusOn: Somalia

“Super Ninjas” & “GI Giants”

40

The Knockout Game – Don’t Let Your Client’s Become Surveillance A Victim Detection for Individuals

06 Hostile Surveillance Detection – Part II 14 You’re Over Qualified 19 An insight into operating in Somalia 22 G7 merger with BBA 26 Tragedy on your team

32

32 Super Ninjas 36 How to spot hostile Surveillance: 40 Surveillance Detection for Individuals 42 Assessment and Management of burns 47 How much do Security Companies make? 52 Countering the effects of Surveillance Part1 60 Intel World Report 66 FocusOn: Somalia 74 Working Girl 76 The new ABnormal 78 Performance & Development Reviews 83 Contractors Workout 87 How to become more employable 92 CPO Personal TSCM Kit 96 Team Leading & Delegation 100 Classifieds


04

Editorial Issue 23 Another quarter had passed and another issue of the Circuit is here where once again we have some fantastic content for you to read, absorb and learn from. The Easter period has just passed, it is a period that I’m always fond of due to the exorbitant amount of chocolate that is consumed, I have 2 children and I must admit that I am a little partial to “testing” their Easter eggs to make sure they are safe to eat and free from poison! :-)

Shaun West Editor

The Easter period also nicely leads into the UK biggest security related networking event “The Counter Terror Expo 2014” which will be held in London, Olympia on the 29-30th April. Once again the Circuit team will be exhibiting at the stand of the British Bodyguard Association so if you are in the area come on down and say hello, it’s our 4th year exhibiting at the event and it’s always great to meet Circuit readers and those whom work within the industry to see if we can make you into a Circuit convert. One of our sister organisations the British Bodyguard Association will be launching their new website and membership offerings at the event so good luck to the them I’m sure they will be great, being part of the team I have had some sneak peaks at what’s upcoming and I can confirm there will be some exciting times on the BBA front. Social media is now part of everyday life and recently I have been witnessing more and more posts from people working within the industry using social media platforms that does not and will not shine them in the best light possible. When using these platforms you should treat things just the same as when you send an email or fire out a CV, think about what you are going to post before you pull the trigger. The world is becoming a smaller place with the technological advancements of social media and what you post will be there for all to see and can adversely effect your reputation with potential employers and professionals alike. It is great to see people whom are willing to stand their ground and fight for their beliefs but it is inevitable that not everyone is going to agree wholly with what you say or believe, that is life, there will always be disagreements but it is important to keep your cool and maintain your professionalism just as you have been taught to react in a security related situation, cool calm and collective. I hope you enjoy reading another fantastic issue of The Circuit, we have had some great feedback recently please keep it coming in so we can continue to improve the reader experience. Stay Safe


Editorial Issue 23 Quick, think of your favorite Executive Protection magazine? If your answer was The Circuit, trust me I won’t hold it against you for being biased. Don’t get me wrong; there are several magazines currently in the marketplace that have useful information related to our industry. Some focus on the military/PSD aspects, others on firearms, some make their bread and butter discussing corporate security, or law enforcement, however, when talking about “Close Protection” I’d go to Vegas, and lay all my money down on The Circuit taking the title hands down. We are a content driven magazine, and the editorial staff works very hard to cull different perspectives from all over the globe and present those viewpoints in one place in a full-color, well written, easy–to–read format. With that said, I don’t want any new readers thinking that we are just a one trick pony -- we talk medical, we talk private investigation, heck, we even talk insurances and retirement plans, but all of those exist within an ecosystem of helping others. Think about our profession, it has to go back to almost the beginning of time one man (or woman) elected to for whatever reason place himself as an obstacle between two individuals to mitigate the risk to one. Mafioso’s notwithstanding, that’s got to cracked the top 10 of noblest callings. Fast-forward to 2014 and the industry is thriving. Sure there are naysayers and people who for whatever reason can just not break into the profession, but by and large if you have the commitment, training, and aptitude the you can make a living protecting others. One of the things I love about The Circuit is that almost all of the writers are active in the profession. That means readers are getting contemporary viewpoints, techniques and observations. Now you might not agree with all of them, but you have to respect the fact that these individuals are taking time out of their day to share with the larger community. Before you move forward into this next great issue, please allow me to make a request: if you like The Circuit, tell someone you know in the industry about it. Encourage them to read an issue and support a magazine that for over five years now has supported the profession of the brave men and women across the globe that stand arms length away working the craft.

Elijah Shaw International Editor


06

Feature Issue 23

Hostile Surveillance Detection – Part II

Part one of the Hostile Surveillance Detection (HSD) article in the previous edition of Circuit identified why HSD is a vital tool in countering the threat of kidnap.

W

e identified why hostiles may put you or your client under surveillance – to gather intelligence with the aim of identifying weaknesses and turning the weaknesses into opportunities.

The Pick-Up A surveillance team must ‘pick-up’ a target from somewhere, be it from a work or home address, a café, bar or train. Whichever the target, there always has to be a starting point, and the most likely ones will be either:

In this follow up section we will start to identify what an individual or security team can do to identify hostile surveillance. One of the key factors is first identifying how a surveillance team or individual operates. The following section is a short resumé of surveillance operations. An important caveat to mention is that to encompass surveillance in one short article is nigh impossible. Below is only a basic overview aimed at the security professional.

• A home/hotel • A place of work • An arrival destination e.g. airport • A vehicle

Composition of a surveillance operation

When surveillance operators plan a ‘pickup’ of a target they will firstly identify who the target is and where the target will be. Remember, you may not be the initial target. A certain organization may be the target. You may be unfortunate enough to be chosen as you walk out from a business, building or hotel that has been targeted.

There are three parts to surveillance operation. • The Pick-Up • The Follow • The Housing

These are the places that a surveillance team will be more confident of picking up a target to start intelligence gathering. Unless there is specific intelligence coming from a third party source, surveillance will often start from one of these locations.


Hostile Surveillance Detection – Part II

A surveillance team, once a target has been chosen, will look at a map, visit the area for pre-reconnaissance and make a plan of action to provide themselves with the best chance of identifying you or your client, and getting control of you in a covert manner. Let us initially use a very basic example:

use technical means such as a remote camera feed? • Can we do all of the above covertly, hiding our presence from you and third party? • Can we then react quick enough to get control of you away from the property – again covertly?

Utilizing the picture below (figure 2) of St You are protecting a client, your client’s home Albans Ave, we would be looking at trying address Is 24 St Albans Ave (figure 1) to park either a car or a van in the areas marked by the red arrows, on either side of Figure 1 your address (north or south), preferably in the mirrors and from the direction you were least likely to travel. This would allow us a long look towards your home, but still be far enough away that you did not see us when you came out of the house. Figure 2

You and your client have to exit your property by vehicle East onto the street and are forced either North or South. As a surveillance team, we (the hostiles) would therefore look at the map above and depending on how many surveillance team members and assets we had, would think If we could not park on the street and were about your (you and your client) options and unable to get a direct look on your house, ask the following questions? we would ‘box’ you in and control the areas that you have to travel through. For example • Can we get a direct look onto your address? looking at the map below (figure 3) if you • Can we do this by parking a car or a van came out of number 24, you could either that would allow us to see you walk out on walk or drive North or South, we would then foot – just in case or drive away in another think about putting someone at positions 1 vehicle? and 2 to keep ‘eyes down’ on those junctions • Do we have to do this in person or can we waiting for you to pass.


08

Feature Issue 23

Figure 3

This same protocol would apply for any property, be it a business address, hotel, café, restaurant or even a train station. A surveillance team will always do prereconnaissance of an area to identify how best to position themselves.

resources available) to get control of the target once the trigger has identified them as leaving from a property or vehicle.

Using the example below, this surveillance team has 6 assets, the trigger and 5 stakeout positions, A,B,C,D and E. The trigger from This position either ‘direct’ or ‘in-direct’ is the South has a long look onto the address often referred to as the ‘trigger’. The trigger and can control St Albans Avenue when the will aim to covertly get control of the target target leaves by vehicle. The other call signs leaving a premises and hand over to the team form a box around the address covering the who would be in stakeout positions. most likely options that the target can take, North, East, South and West. Stakeout positions are locations where a surveillance team member will be positioned Point to note: very often resources of a to give them the best chance (with the surveillance team will be limited and they


Hostile Surveillance Detection – Part II

may have to make informed decisions on where to position themselves (6 vehicles/ people would be a very well organized and resourced non-governmental surveillance team). For example, if we only had 3 people and if the target worked North of his address, then the target is most likely going to head North, thus with limited resources A,B and C are the locations to be focused on with the trigger positioning south. Hostile surveillance may also utilize technical triggers, including GPS/GSM/RF trackers or a covert imagery platform with remote feed. This allows the surveillance team to position themselves further away from the address or pick up point, or track your route and stops remotely.

a surveillance team can be stretched very easily. Once we, the hostile surveillance have triggered our target (you and your client) and handed over to the stakeout we have successfully picked you up, the pick-up now turns into the follow. The Follow The surveillance team will then attempt to follow you covertly to start gaining the intelligence. As previously mentioned, this will most likely involve people on foot and/ or people in vehicles and/or a mixture of the two.

When behind a target, a surveillance team will be focusing on 5 main things: How well and covertly a surveillance team carries out this whole process depends • Cover on their skills and resources. Often with • Distance rudimentary surveillance or that with limited • Timing resources, the trigger will immediately join • Anticipation the follow to keep control of the target, • Natural Behavior the stakeout may be very close in to give them confidence that they will not lose you. They will be trying to put people, objects, Knowing the capability of your potential vehicles and anything else between you and threat will help you determine the most them to cover their profile, description and likely modus operandi. presence. Just this one very basic example of ‘ plotting up’ on an address and initiating a trigger and a stakeout should identify the amount of considerations and limitations that a surveillance team has to account for. The amount of options and variables that come into play in this basic scenario are multiple and cannot be discussed in detail within this article. The main point to take from this is, with limited resources

They will be trying to keep a safe distance from you so that they can time their reactions to your actions without you seeing them. For example if you turn left, they want to see you do that turn and be far enough away that you still don’t see them but close enough to get to that corner quickly so they don’t lose you. To assist with the previous two areas of focus


10

Feature Issue 23

they will be trying to anticipate what you are going to do, this therefore allows them time to plan and react. With time to plan and react they will be able to better maintain cover and concentrate on their distance and timing. Whilst doing all of these they are focusing on one of the most important aspects of surveillance, keeping their behavior natural. Not acting suspiciously and avoiding arousing your attention or that of any third party. There are huge amounts of variable to think about and this is why the standard of surveillance teams and operators varies considerably. It is not an easy trade and this will work in your favor. Gathering Intelligence – The Housing Whenever there is a follow the surveillance team is taking note of everything you do. Whether it is what route you take, what time you do things, what schedules or pattern of life you have. The team want to gather as much intelligence on who you meet, what places you like the most, whether you leave at certain times, what are your vulnerabilities and much more.

they have to be able to ‘house’ you. This is surveillance terminology describing the act of placing a target into a place or situation that allows a team to obtain intelligence. For example, a team is following a target and he walks into a restaurant. They have now ‘housed’ you in that restaurant, they may choose to go in and see what you are doing, if you are meeting anyone etc. Or they may choose not to go in. Either way if they want to keep control of you they have to be in a position outside to check for alternate exits and wait for you to come out, or they cancel the follow and pick you up another day. This comes right back to the starting point of the ‘pick-up’. That team has to position themselves in a way so as to be able to effectively see you out of that property in a covert manner and continue following. They do not know how long you are going to be in the ‘housing’, or which way you are going to go, or what you are going to do after the housing.

The following example is a hotel in Mexico City, if you entered the main entrance from the south perhaps for a meeting or lunch, the surveillance detail would immediately have to plot up on that address. They would have to look for alternate exits, control those But most importantly, a hostile surveillance exits and/or send someone inside to act as a team will want to know where you live, trigger. A quick walk around would identify where you work, what you drive, do you have 3 main access/egress points but multiple set timings, do you have security and where fire exits. That would be 3 points to cover are you most vulnerable. This was discussed with long looks on other areas of the road, earlier but it is worth reiterating. Why? they would have to hold those positions for It identifies not only what you have to be an unknown amount of time and be able to careful of, but that a surveillance team has a react quickly enough to then gain control lot to think about and a lot to achieve. when the target left, and communicate it to the rest of the team. An interesting point A surveillance team has to be in a position to note – the hotel is next door to the U.S to see what you are doing, where you are embassy, how would this make a surveillance going and whom you are seeing. This means team feel? – no doubt very uncomfortable.


Hostile Surveillance Detection – Part II

Hopefully by now you are starting to identify the potential weaknesses of a surveillance team. So we know the basics of how a surveillance team operates, but how do we start seeing the wood from the tress, the wheat from the chaff, or any other cliché. The downfall of many targets I have worked on in the past that were self-proclaimed anti-surveillance experts was – they looked but they did not see.

peek or pay too much attention? Are they stationary in a certain place for too long? There are a range of behaviors that may seem unnatural, but to mention them all here would be counter productive. Each behavior must be taken in the context of the environment it is noted.

Observational Skills – Before we can move into the finer points of anti-surveillance procedure we must first identify what we are looking for, and then how to start remembering what we have seen.

A person staring at the shop window you are in while talking to themselves may just be a person taking a hands free phone call and staring at a reflection or piece of window dressing completely unrelated.

There are five main characteristics that may help identify a surveillance team is following you. The 5 sins 1. Multiple sightings The general rule is spotting the same person or vehicle three times in three different places. 2.Unnatural behavior Is anything suspicious? Does someone

A person seen peeking from behind a lamppost in your direction may be looking for a bus or a taxi. Are they looking in the right direction of the traffic for example?

These sound obvious, but I assure you once people start looking for surveillance everything at first seems suspicious. Put things into context and try to link other of the 5 characteristics. 3.Reaction to an action Does someone immediately react to something that you do? If you cross the road does someone else cross soon after? If you change lanes does someone else follow? If you stop does someone stop or suddenly


12

Feature Issue 23

duck into a shop? A surveillance team following you has to mirror your actions (to a certain extent) therefore it is essential that you are aware of people’s reactions to your actions.

a few minutes let alone hours. If you are driving this is best done on a Dictaphone. Remember!! Do it covertly. • The best way to remember a person is the A-H system.

4. Covert communications A surveillance team has to (for the majority) communicate with each other. This could be done via eye contact, hand signal, mobile phone or covert radios. Identifying these communications can help spot surveillance. Look for earpieces, look for hands in pockets, look for people with mobile phone earpieces or blue tooth headsets and try to identify any other possible team members with similar set-ups.

Age Build – skinny, fat, medium, heavy Clothing – color jacket, trouser, shorts, shoes, sandals, t-shirt etc. etc. Think color and style. Distinguishing Features – any scars, tattoos, big nose etc. Elevation – how tall? Facial – any beard? Gate – how do they walk, carry themselves etc. do they strut, stroll, march etc. Hair – color and style

5. Positioning of people and cars A surveillance team either by vehicle or on foot has to be in a position to see what you are doing and keep you under control. To do this requires certain positioning. This will predominantly involve being behind or to the side of you when you are moving and in front or to the side of you when you exit a property or building. If you start thinking where would surveillance be? Then this is a powerful tool in starting to ID and remember potential HS Descriptions When searching for surveillance it is vital that one retains information. We always advise to invest in a basic Dictaphone and carry a pen and paper. If you see something suspicious, either a car or person, covertly take some notes, unless you are blessed with an impressive memory, it is very difficult to retain enough information over just

• The best way to remember a vehicle is note the: Colour, make, model, and VRN e.g. blue Ford Mondeo WK56 CRT and any distinguishing features. Utilizing these systems will give you uniformity in thought and help you quickly log relevant information. In the next section of the HSD article we will identify basic anti and counter surveillance techniques to help identify hostile surveillance. These techniques will work hand in hand with the information contained here, the purpose of the techniques discussed next week will be to draw out surveillance covertly – all of these techniques helping to avoid the trap of looking but not seeing.

Explorer Travel Security (ETS) a travel risk-management company provide hostile surveillance detection training and counter and protective surveillance services throughout the globe. ETS utilize a small, specialist team of highly experienced ex UK government and UKSF operators with years of experience in counter terrorism espionage and criminal operations. www.exploresecure.com


We are specialists in Non Residency, Mariners Taxation etc. for Overseas & UK Security Operatives also Ex-Forces in the Oil & Gas Industry or Working in Hostile Environments. Whittaker & Co was started in 2006 by Anna Cooperwhite, who herself is ex forces. We specialise in providing accountancy services, tax returns, tax advice etc. and pride ourselves on understanding the needs of our clients which include Non UK Residents, Maritime Security, Sole Traders, Partnerships, Limited Companies and Personal Tax Payers. Within our team we have vast experience of dealing with the frustrations and concerns common to all businesses and individuals, we share a common enthusiasm to deliver a personal, high quality service to our clients and each individual working for Whittaker & Co has a niche area of specialism Our range of services and resources allow us to meet our clients’ needs quickly and efficiently, often exceeding expectations. If you wish to know more about our services or you would like to arrange a meeting to discuss how we can help you in more detail please contact on the available options below

The Associates is a group of professional companies that have collaborated to offer advice through their own respective companies to serving Armed Forces personnel in transition to civilian life and ex forces. They are the ex-forces specialists with the majority of the companies having an ex-forces individual running or working within the company. For more information visit: www.theassociatesuk.org

THE

ASSOCIATES

ADVICE FOR THE EX FORCES

Whittaker & Co, have supported and will continue to support and fundraise for the Pilgrim Bandits. For further details please visit: www.pilgrimbandits.org

Whittaker & Co (UK) Ltd, Bryn Isel, The Bank, Newtown, Powys. SY16 2AB Telephone: 01686 610662 Website: www.whittakerandco.com Email: info@whittakerandco.com Co Reg No: 8203062 England and Wales – Vat Reg: GB 143 2704 39

“I have been in the Maritime industry for 12 months following a successful 22 year career within the Royal Marines. I have been utilizing Whittaker’s for the whole period, colleagues advised me at the start to choose Whittaker’s and I have nothing but high complements towards them, they answer all my questions and reply to all my emails promptly, they also go out of their way to send a representative, to talk to maritime teams about the complexities of tax and how to achieve SED. I would not hesitate to recommend Whittaker’s to anyone.” Ian Nisbet-Mole - Maritime

“It was a simple decision to make choosing Whitaker & Co after hearing some really good feedback from other customers. I left the military in 2011 and decided to pursue a career in close protection. The switch from military to civilian life left me with a lot of questions and paperwork, forms etc. to fill out but with Whitaker & Co’s help this transition proved effortless. It also gives me great piece of mind knowing that I don’t have to worry about tax days etc. and allows me to concentrate on my job. I would recommend Whitaker & Co without question due to the fact that the staff are very friendly and approachable and highly astute.” Richard Daniels - Non Res

Members of BBA can enjoy a 10% reduction to our fees along with a FREE “Tax Health Check” You will also be invited to exclusive Tax briefs which we will hold 3 times a year for the exclusive benefit of the BBA


14

Feature Issue 23

You’re Over Qualified

In my capacity as a Close Protection Agency Owner, I regularly get calls from people who ask for my feedback following an unsuccessful job interview.

I

n their voices you often hear the frustration after being told they are “over qualified.” Conducting a job search in a depressed economy can test the patience and emotional and physical stamina of even the most skilled prospective employees.

However, make sure the challenges you face are environment related and not attitude related. You shouldn’t go to another person’s office and tell them how to run the business that


By: Mark “Six” James CPO, EPS, CAS

you are not in. Remember, if it was that easy, you possibly would be opening your own business as opposed to applying within. It is parallel to going to someone’s house and telling them their baby is not cute. Not a great strategy for developing a relationship. Make sure your approach does not come off as condescending to potential employers. That is not to say you should be any less confident, your potential competencies should have been reflected in your resume and confirmed or demonstrated during the interview.

prior compensation was $85,000? Will you feel fulfilled in your current duties if they are different than your previous responsibilities? As an employer am I willing to have an employee $5,000 over salary range to bring you on board? As a prospective employee despite your desperation for income can your household withstand a $15,000 reduction in annual income? Is your significant other prepared to work or can you trim your living expenses by $1,250 per month? If the answer to those questions is no, then why would I want to hire an employee who is not going to be able to dedicate 100% to the Being over qualified is often the professional position. Often times the lack of additional way of saying I am not going to bypass a responsibilities, visibility or perceived ability perfectly good, slightly less skilled employee manifests itself in insubordination, lack of to pay you to look for another job. What do commitment, focus and the new hire looking I mean by that? Let say I have a great Tier 2 for a job on the employer’s watch. Once opportunity which I am currently hiring for. they find a new job consistent with their And you feel you are a Tier 1 operator. For perceived skills and income requirements, simplicity below please find an illustration of they are going to leave. That creates a new the compensation and experience associated vacancy, and customer service transition. with the job: Had the employer hired the Tier 2 operator for the job they would have had a motivated Tier 1 Operator - $81,000 - $100,000 employee with tremendous upside potential annually with a minimum for growth and person fulfillment. of 8 years of experience. Tier 2 Operator - $65,000 to $80,000 The most important thing you can do in an annually with a minimum interview is show the potential employer of 4 years of experience. why you are a good fit for the organization Tier 3 Operator - $50,000 to $64,000 independent of the particular position annually with a you are currently interviewing for. That minimum of 2 years of is going to require a competency based experience. discussion and not a title or position based discussion. Most candidates and potential While I don’t doubt the Tier 1 candidate employers often want to talk titles because it may have the ability to do the job, will they is a much easier discussion. However, title be happy? Let’s say my target pay for the does not automatically equate to skills and current Tier 2 opening is $70,000. While you competencies. Titles don’t perform tasks, may need the job, as a Tier 1 skilled operator employees with skills do. Thus, before you will you be happy making $70,000 when your communicate anything about yourself, you


16

Feature Issue 23

Remember, if it was that easy, you possibly would be opening your own business as opposed to applying within. It is parallel to going to someone’s house and telling them their baby is not cute. need to understand the competencies that make up the position or the overall needs of the company and industry today and in the future. Then you can show them how you are the ideal candidate to help them accomplish their present and go-forward needs.

tasked with leading or supporting. This reduces potential service gaps from open positions. Remember, customers don’t care about transitioning people, customers care about declines in service levels. This is a way to help reduce potential declines in service levels.

Jim Collins in his best-selling book “From Good to Great,” talks about getting the right people on the bus and then worry about getting them in the right seat. If you don’t find a way to get picked up by the team, you can never create an opportunity to play your desired position.

In summary, learn to focus on competency based discussions with potential employers not just title based conversations.

High performing companies often have bench strength programs, where they hire employees in advance of anticipated openings based on an understanding of their historic turnover rate. This allows them the opportunity to transition the prospective employee into the company without the people or revenue responsibilities initially and allows the new employee to learn the organization and the resource support network so upon placement they are better able to impact the business unit they are

Communicate long-term sustainable value that meets their hiring needs today as well as the direction the company or industry is headed. So before you go on your next interview put your ego in check. No one wants a smart ass, know it all employee or negative energy giver. Focus on communicating your relevant competencies to the needs of the hiring organization to increase your opportunities of being hired. Sometimes you have to create a fit. Always remember when a potential client tells you no, they aren’t telling you no (N-O). They are telling you know (K-N-O-W,) they just don’t understand yet, why you are the best employee to address their needs.

Mark “Six” James is Founder and Executive Director of Panther Protection Services, LLC, a seasoned protection specialist, internationally published author and keynote speaker. . Panther Protection Services is a full service protection agency focusing on Risk and Crisis Mitigation, Protective Services, Self-Defense Training, and Firearm Instruction. For additional information contact us at info@pantherprotectionservices.com




By: Tom Richmond Managing Director of The Security Advisor

AN INSIGHT INTO OPERATING IN SOMALIA

Somalia, a lawless country located on the east coast of Africa, should be no stranger to anyone in the security industry. The hub of maritime piracy, an area that that has been at civil war for over thirty years and a country that many western governments have tried to tame, all to no avail. From the highly documented and ultimately cinema screened failed black hawk down mission of the Americans in Mogadishu to the frequent botched raids of European governments trying to combat piracy, it’s certainly not an area for the faint hearted. It’s always held a lot of mystery for me and somewhere I’ve wanted to operate for the mere fact that very few people have or will get to experience it. But at the same time conducting hostile environment close protection in a country with no friendly infrastructure or support assets is wildly different to operating in Iraq or Afghanistan where there is a huge international presence. The client wanted to set up a hub in Somalia on which to build and ultimately expand their operation. The question was very simple, “Is it possible to operate in Somalia” as the situation was so volatile and the

environment ultra high risk. As with any task anything is possible as long as you mitigate the risks accordingly. You can walk the Queen through the streets of Baghdad if you so wish, as long as you mitigate the risks to an acceptable level. After meeting with the client at their office in London there would be one main principal, supported by an advisor, wanting to conduct meetings with high level government, business and tribal leaders in the north of Somalia around Hargeisa, weapons were not an option. After conducting a full risk assessment and starting to put the operation order together, due to the situation it was deemed too dangerous to be on the ground for anymore than two nights at a time. If necessary numerous short trips would be better than one large trip so that if anyone did have hostile intent their planning time and ability to conduct a hit would be limited. Transport would be a two vehicle move, requiring me as the team leader (TL) / security consultant plus three team members. One of the


20

Feature: Issue 23

team would be trained to paramedic level and have a full med kit as appropriate for someone with that level of medical training. The team would have to be familiar to me as we had minimal time in which to prepare so operators with a solid background in close protection and trained to the same standard were handpicked for the task. The paramedic was unknown but came highly recommendation. So, no weapons, ultra high risk and very limited knowledge of the ground and operating environment. We were certainly going to need some support. The company employing us had an office in Addis Ababa, Ethiopia, where we would forward base from. Their security manager had been monitoring the situation in Somalia since the idea was first discussed and I used the analysts from the company I was working for to provide a detailed country brief. In addition, and even more essential, was speaking to some people who’d actually operated there, and thankfully some basic mapping was established. A fixer on the ground would be critical but due to the situation we wouldn’t be able to notify them until the day before we deployed on task to retain the level of confidentiality needed. Not having weapons in a country where even the children are carrying AK47’s was a concern. However everyone has their price, especially in a country like Somalia, so it was decided that we would buy some armed police to escort us when we got there, hopefully arranged through the fixer prior to our arrival.

(£350 per day, plus £30 daily allowance), but not too much that it would compromise the confidentially of the operation should they decide not to deploy. On arrival in Addis Ababa there appeared to be a problem with my luggage as we hadn’t requested permission from the government to bring sat phones into the country. Fortunately being such a corrupt place, twenty dollars later and we were on our way. Having not deployed to a third world country for a few years it’s amazing how the stench of burning rubbish and raw sewage can take you right back and in a way allows you to really start to focus on the task in hand. At the hotel in Ethiopia we had two days before deploying for acclimatisation, to meet with the client, principal and receive a full brief from the security manager.

After doing the niceties with the principal at their office which was almost oasis like in an area of the city which was otherwise very run down, we met with the security manager for a full brief. It’s important on a task like this that full orders for the team are established following a similar format to what some might have used in the Army. No one should be left in any doubt of what the task entails and their role within it. All comms were tested which included sat phones, mobile phones and two way radios. The reality soon sets in that in a place like Somalia if it all goes wrong then there is no one coming to get you. The client told us they should have support assets to us within 24 hours if needed but realistically we knew that wouldn’t happen. It would be for us to The team met at the airport and a full outline extract ourselves with vehicles and weapons of the task was given. The brief they had that we didn’t have on a route that we’d never received so far was just enough so they could driven. A recce would have been preferable make an informed decision on whether the but the team and client’s security manager risk warranted the pay they would receive felt it would have completely sign posted our


By: Tom Richmond Managing Director of The Security Advisor intent and removed the element of surprise. Plus there would be an extra £10,000 cost for the additional flights and in today’s economic climate this was an expense the client wasn’t willing to accept.

be best described as a small caravan with wings, we managed to cram in and set off on a journey that was turbulent to say the least!

On arrival in Hargeisa it was actually not so bad, there were a few aircraft on the ground, We set off to the airport in Ethiopia at 3am one delivering aid, and we were met by our to be in Somalia by first light where we fixer who took us to “VIP” passport control would meet our fixer and police escort who (a small un-airconditioned room with a had now been confirmed. The airport was partitioned toilet). Due to the high risk comical, when we turned up to security the environment the plane wouldn’t stay so that person on the x-ray machine was asleep was it, we were on our own until the pick up laid out in a full sleeping bag. Once we’d two days later. The Police Chief himself had woke him he didn’t even get out of his bag graced us with his presence and paraded his but opened one eye, lifted his head and men, a rag tag bunch of young to pensioner nodded us through. It always amazes me aged men with mixed uniforms and the that security is so poor in other countries worst kept weaponry I’d ever seen, although that would allow you get into the UK, yet the the presence of the PKM was appreciated. UK border force put so much emphasis on Each officer received a facilitation payment making it difficult for you to get out of the of $20, country. On arrival at the plane it can only


22

Feature: Issue 23

G7 MERGER WITH BBA

Readers of The Circuit and BBA members alike will, I hope, recognise the G6 brand and will know that it specialises in providing radio and satellite communications services to the Security and Military market-spaces. G6 was formed in 1999 and quickly established itself as a benchmark for highquality, good service and honest opinions within the industry. We took a conscious decision to focus our attentions on organisations and individuals working in the Security, Close Protection, Military and Surveillance sectors.

and have since advertised regularly and contributed articles to The Circuit.

One of the great things about the Security industry, and the world of Close Protection in particular, is that there is no shortage of people with opinions! As the use of the Internet has expanded exponentially, the ability for those individuals and Quite early on our journey we came across organisations to get their message heard has the BBA and instantly liked everything it also grown. But this can be a double-edged stood for. We became members immediately sword, because it means that not only the


By: Andy Clark

good things can be widely published; you also have to accept that anything negative that people have to say will have an equally wide audience. To some degree, G6 has always been an industry ‘outsider’. Whilst we work in close collaboration with our many clients, we are not ourselves CP operators and that puts us, in some degree, on the peripheral of the industry, which is as it should be. One advantage of this, however, is that you tend to be treated as a sounding board when people have issues to air. Individuals and organisations alike often view us as an external ‘honest broker’. Because we aren’t part of the industry we have no axe to grind one way or the other, and this has made for some very interesting conversations over the years!! Nowhere is this more prevalent than in the areas of standards and training, both of which are inextricably linked. Poor standards are generally the end result of mediocre or sub-standard training. Unfortunately this is a self-sustaining spiral of negativity with one feeding off of the other.

In recent years this has become one of the most often discussed topics both online and in private, and we at G6 have been party to the many opinions and dialogues that have been running through contact with our customers and our networks of industry professionals. It seemed clear to us that, whilst there are a lot of very good training organisations in existence in the UK and beyond, there are also a number who seem to provide the ‘near minimum’ required to achieve a particular qualification, offering little or no support to former students in their quest for work and for on-going professional development. In some measure this has also been exacerbated by the seeming ease with which many companies have been awarded the ELCAS accreditation, allowing access to training funds for service personnel both during their career and in their run down period prior to discharge from service. This has caused many companies to focus almost solely on this market sector to the detriment of other areas. The first course you undertake to gain entry to the industry is vitally important if you

One of the great things about the Security industry, and the world of Close Protection in particular, is that there is no shortage of people with opinions!


24

Feature: Issue 23

are looking for a sustainable career in Close Protection, Surveillance or any other aspect of Professional Security either in the UK or overseas. This course will set the benchmark not only for your own expectations, but also for those of your prospective employers, so it is vital that you choose the right one, and this can be difficult. The chances are high that you will only ever undertake one full CP course; why would you do more than one? The question is how do you decide which one is right for you? But whilst it is important to make the right choice when you are starting out, what happens further down the line? What happens when you have completed a year or more as an Operator and you now want to look at what might be available to you in terms of career progression? Honestly, when we looked at this there was very little available in this area, and that was when we decided to do something about it. So G7 Training was born, building on the brand identity of G6 and with the same professional ethos at our core. Working in collaboration with some highly skilled and deeply respected individuals, we have focused on training to allow the Continuous Professional Development of Operators within the industry.

We are making the courses as relevant as possible to the development of an Operator within the industry but we are always open to suggestions. At the same time recognising that it isn’t always possible or practical to take weeks out of a working schedule, we are making them short and sharp. So that prospective students can ‘dip in and out’ as and when they have both the time and the funds available. We were already excited by the direction G7 was taking and then things got a whole lot better! As I mentioned at the start, we’ve had a close association with the BBA for many years. The Management Team share our views and visions in many areas and we are often in contact to discuss various elements of the CP world and to use each other as sounding boards for ideas and enhancements. So it seemed entirely natural to take the next step and to form an official alliance between the two organisations. But what started out as an alliance has developed into so much more. So it is with the utmost pride and humility that I can announce the merger of G7 with the BBA to form the BBA Training Academy. An institution dedicated to providing the highest quality training

We were already excited by the direction G7 was taking and then things got a whole lot better!


By: Andy Clark

throughout the security industry and to helping to maintain the standards expected by all professional operators. The creation of the BBA Training Academy will allow us to reach out to individuals and organisations that, as G7, we simply would not have had the capability to approach. Every training course that is run by the Academy will include immediate enrolment into the BBA for all students not currently members. Every course completed will have the end of course reports, certificates and instructor assessments immediately uploaded into the BBA CPD system which,

as you will see elsewhere in The Journal, is an industry first. A free, on-line record of all of your work history and training, regardless of which company you completed the training with, enabling you to present a professional and unified format to current and future employers alike. I cannot emphasise what a fantastically exciting period this is for us here at the BBA Academy. In conjunction with many other initiatives that the BBA is also launching, I can’t think of a time when the support for Operators within the industry was at a better level.


26

Feature: Issue 23

Tragedy on your Team. What happens Afterwards?

There is no denying that our profession has more than its fair share of inherent risks.

T

his is absolutely evidenced every day by the dozens, if not hundreds of posts and websites by aspiring and established executive protection professionals throughout the world. This is carried over by individuals as well as agencies and is at the forefront of most advertising in use today. I touched on the subject at this year’s ICON Social Summit, as I stated there, I tend to believe that people in this business believe that the test of leadership comes during the attack on principle (AOP). While there is no denying that leadership is necessary in those key moments of an attack or any other catastrophic event. But as I stated at the Summit, the hardest part of this job is, the

after. After the broken bodies are picked up, after the massive losses have been tallied, the worst-case scenario has been addressed and now you are expected to get up and move forward. That to me is when the leadership and the intestinal fortitude demand is at its greatest. I have been absolutely surprised during the conversations that I have had in the last three months discussing, the after. The After, people often ask what do I mean by, “what do you do after the attack?�. The simple answers I often receive are; we evacuate, we rendezvous to the nearest safe haven, we returned to the residence or the business location. While none of these


By: Raffaelle Di Giorgio Tragedy on your Team. answers are incorrect. There is a whole depth to what goes on after an attack or catastrophic event that many people and agencies just do not plan for. Those that have kept up with my articles, consulting or my social media postings know that I am a huge advocate for standardization, having written standard operating procedures (SOP’s) and protocols. I fully understand that it is impossible to have an SOP or protocol for every circumstance that will arise, but I have full belief that if you do not have something as a benchmark to start from, then you are flying blind and leave yourself open to horrible failures and huge civil liabilities should the unforeseen or in some circumstances “the expected” happens. Let’s make no mistake we all live in the real world and we know that bad things happen no matter how precise the planning and the execution of our security details are. So the biggest surprise I’ve had is that very few people have been able to give me credible SOP’s in reference to what happens after an AOP or even something like a major motor vehicle accident (MVA). I find it peculiar that for a profession and professionals, that have no problem talking about the fact that our lives are in fact in danger the majority of the time that we are on assignment and that people will go through extraordinary lengths to brag about their prowess in driving, self-defense, advances, guns et. al. Very few, outside of government agencies, actually have a standardized and properly implemented system in place for Death and Life-Threatening Injury Notifications. I am genuinely disappointed at how many people I have spoken to over the past three

months, who have never even given it serious thought. You would be amazed how many answered, “Well I’ll deal with that if it happens.” For professionals in the line of work where our advanced planning and training is supposed to be the hallmark of us as individuals and agencies, I amazed at how many do not take the proper time to consider how they are going to handle this extremely delicate part of our jobs and our services. Let me be very transparent and upfront about this. I believe that any professional that doesn’t have a plan, a real written out plan, on exactly who is responsible and for what each person’s role is for making a death and/or life-threatening injury notification, is doing him or herself, their team, their client and their agency a huge disservice. Not to mention all the family members that could be touched by such a situation. It is not within the scope of this article to have a full training module on how to properly set up a notification system and protocol. But I will attempt to cover some of the highlights and hopefully pique your interest enough to get the proper training that is involved. Before anyone states it, I understand completely that quite a few come from law enforcement and military backgrounds and have had to make these next of kin notifications, but let me assure you there is quite a different protocol for civilian-based security operations. Those responsibilities also change depending on your role as a team member, an agency owner, the insurance carrier that you are covered by, and the state or country’s laws that you are working under. Add to this that in the modern workspace; it’s not just the news media that we have to outpace. Depending on our role we have to


28

Feature: Issue 23

reach the family before the bad news slips out by way of mobile phones, social media postings and the Internet. Is this really the time that you want to be trying to figure it out, instead of executing a pre-determined plan?

• The principles described here are simple: Notification should be done in person, in time, in pairs whenever possible, in plain language, and with compassion.

The principles of death notification: In person In time, In pairs, In plain language, and with compassion. The purpose of this information is to help those who must notify survivors of the death or life-threatening injury of a family member or co-worker while at work.

Always make death or life-threatening injury notification in person – not by telephone.

“IN PERSON”

It is very important to provide the survivor(s) with a human presence or “presence of compassion” during an extremely stressful time. The team members who are present can help if the survivor(s) has a dangerous shock reaction – which is not at all uncommon – and you can help the survivor(s) move through this most difficult moment.

• Death notification is acknowledged to be one of the most difficult tasks faced by professionals, because learning of the death of a loved one often is the most traumatic Arrange notification in person even if the event in a person’s life. survivor(s) lives far away. Contact a corresponding department • The moment of notification is one that representative in the survivor’s home area to most people remember very vividly for the deliver the notification in person. Other rest of their life – with pain and sometimes options for contact are the Division of Motor anger. Vehicles Enforcement Section, State Highway Patrol or the local law enforcement • Some survivors hear the news first through agency in the area. the media or a reporter calling, and then have flashbacks to that moment for years. “IN TIME” – AND WITH CERTAINTY Others tell how they were stunned to hear the person who was killed referred to as Provide notification as soon as possible – “the body” only minutes after the death. but be absolutely sure that there is positive identification of the victim. Notify next • This information suggests ways to notify of kin and others who live in the same survivors effectively and sensitively – household, including roommates and including tips on what not to do or say. unmarried partners. • Notification is an important duty. Besides being sensitive, you have to be prepared in case a survivor goes into shock and requires emergency medical treatment.

Too many survivors are devastated by learning of the death or life-threatening injury of a loved one from the media. Mistaken notifications also have caused enormous trauma.


By: Raffaelle Di Giorgio Tragedy on your Team.

Before the notification, move quickly to gather information. A. Confirm the identity of the deceased or injured employee, B. Gather details about the circumstances surrounding the death or injury, C. Determine any health considerations of the person(s) to be notified, D. Determine if assistance from the clergy, friends or neighbors is needed and make the necessary contacts, E. Determine which personnel will take part in the notification, and determine if there are personnel who should not take part in the notification, and F. Determine if other persons are likely to be present at the notification. “IN PAIRS” Always try to have two (2) people present to make the notification. Ideally, the representative making the notification will be an employee of the victim’s workplace or other individuals such as a family doctor, clergy or law enforcement official. A female/male team often is advantageous. Survivors may experience severe emotional or physical reactions. There may be

several survivors present. The team can also support each other before and after the notification. Take separate vehicles if possible. The team never knows what they will encounter at the location. One of the team members may need to take a survivor to a hospital while the other remains with the other family members. One team member may be able to stay longer to help contact other family or friends for support. Having two vehicles gives you maximum flexibility. Plan the notification procedure. Before making the notification, the team should decide who will speak, what will be said, and how much detail will be provided. “IN PLAIN LANGUAGE” You should clearly identify yourselves, present any credentials that you may have and ask to talk with the survivor(s) in private. Do not make the notification at the doorstep. Be sure you are speaking to the right person. Ask to move inside, and get the survivor(s) seated in the privacy of their home.


30

Feature: Issue 23

Use straight forward and direct language in explaining the reason for the visit.

Many survivors have reported later that statements like these were not helpful to them: “It was God’s will,” “She led a full Survivors are served best by telling them life,” and “I understand what you are going directly what happened. through” (unless you, indeed, had a similar The presence of the team already has alerted experience). them of a problem. Plan to take time to provide information, Inform the survivor(s) of the death, speaking support, and direction. Never simply slowly and carefully giving any details notify and leave. that are available. Then, calmly and Do not take a victim’s personal items with professionally, answer any questions the you at the time of notification. survivor(s) may have. Survivors often need time, even days, before Call the deceased or injured employee by accepting the victim’s belongings. Eventually, name – rather than “the body” or “he”. survivors will want the victim’s belongings but allow them to gauge the time. A victim’s Patiently answer any questions about the belongings should be neatly packaged for cause of death, the location of the deceased delivery before presented to the survivors. employee, etc. Offer to gather information Inform survivors how to recover items if about questions you could not answer and they are not in your custody. get back to the survivor(s) when more information is available, and be Offer support and assistance to the sure to follow through. survivor(s): Survivors bear the burden of inevitable There are few consoling words that survivors responsibilities. You can help them begin to find helpful – but it is always appropriate to move through the mourning and grieving say, “I am sorry this happened.” process by providing immediate assistance in dealing with the death. “WITH COMPASSION” Offer to call a friend or family member who Your presence and compassion are the most will come to support the survivor(s) -important resources you bring to a death and stay until the support person arrives. notification. Offer to help contact others who must be Accept the survivor’s emotions and your notified (until a support person arrives own. It is better to let a tear fall than to to help with this duty.) appear cold and unfeeling. Never try to “talk survivors out of their grief ” or offer false Survivors may have a hard time hope. Be careful not to impose your own remembering what is done and said, so write religious beliefs. down the names and phone numbers of all


By: Raffaelle Di Giorgio Tragedy on your Team.

who are contacted and the status.

need to carry out.

If applicable, inform the survivor(s) of any chance to view the deceased employee. Offer transportation to the survivors or representative for identification of the deceased employee, if necessary. Explain the condition of the deceased employee, especially if there is trauma, and any restrictions on contact that may apply if there are forensic concerns.

There are times that being a leader is not an enviable position in life, but that does not negate the fact that the responsibility is yours and it needs to be executed professionally and respectfully. It is my sincerest desire that this article helps those that may find themselves in this position, to be better prepared and seek the training that is needed to handle these life-changing moments. Like so many of our other skill sets, it is one that I hope you never have to use.

Viewing the deceased loved one should be the survivors choice. Providing accurate information in advance will help survivors make that decision. Some survivors will choose to see the body immediately, and this should be allowed if possible. (Denying access to see the body is not an act of kindness.) Follow-Up Always leave names and phone numbers with the survivor(s) so they can contact you for assistance. (Sample form attached – see Notification and Information “Agency Notification Representative”) Plan to make a follow-up contact in person with the survivor(s) the next day. If the death occurred in another country or state, leave the name and phone number of a contact person at that location.

Raffaele Di Giorgio is an experienced professional protector with over 25 years of personal security, military, law enforcement, protection and emergency medical services Most survivors are confused and some might experience. feel abandoned after the initial notification. Many will want clarification or may need Raffaele Di Giorgio is active within the more direction on necessary arrangements. circuit. He is the CEO of Global Options & Solutions and Tactical Combat Casualty The notification team should be sure they Care (TCCC)® . For more information visit are clear on any follow-up assignments they www.GOS911.com


32

Editorial Issue 23

“Super Ninjas” & “GI Giants”

Scene 1: Two unknown assailants rush towards the bodyguard wielding knives. Without a word, he shoves the Protectee into the car and assumes a fighting stance.

S

earching around he eyes a discarded newspaper on the ground, which he tightly rolls up into a makeshift weapon. The bodyguard then deflects attacker one, knocking him off balance as he sidesteps the outstretched blade of the second attacker who is already on him. Executing a forward flip and ending with a dive roll he has now created distance between him and the two combatants. After quickly regaining his footing, he unleashes a primal scream momentarily paralyzing the enemy with fear. Closing the gap, he then executes an open hand palm strike to the first attacker dropping him to his knees. Twisting into a reverse roundhouse kick, the knife goes flying out of

the hand of his partner in crime, clattering on the pavement along with a few broken teeth. With looks of surprise, the two men now realized they are hopelessly outmatched and begin to race away from the scene, making their way to the still running getaway vehicle 25 yards away. With a sharp click, the bodyguard calmly and coolly opens the trunk of the luxury vehicle he was using to transport the client on this assignment. Once inside, he expertly loads and makes ready his custom matte finish, bolt-action M24 sniper rifle. Using the trunk lid for support, he carefully takes aim and lets loose two 7.62 rounds,


By: Elijah Shaw “Super Ninjas” & “GI Giants” accurately hitting both men mid-stride in their thighs (but taking care to miss the femoral artery), effectively stopping them in their tracks long enough for law enforcement to arrive and arrest the hooligans. He then enters the front right seat of the vehicle, apologies to the Client for the momentary distraction, and signals the driver to pull off.

work should have. Additionally, accuracy with firearms should be paramount if as a protector you plan on carrying a firearm. So if that is indeed the case, Elijah, what problem do you have with “super ninjas” & “G.I. Giants?”

The problem I have is when the commentary borders on cartoonish and begins to defy Scene 1: Fade to Black rational though upon closer analysis. In the Sound like a pretty good movie, right? story above, if I see two men running toward I would be, however that’s how I feel me with knives and I am Arm’s Length Away sometimes when I listen to some individuals from both the Protectee and the vehicle, we in our industry tell me about their past are diving in and speeding off! Traditionally exploits. While they are quick to say there are two types committing this farce, publically (for appearances stake) that they the first is just the individual who just flat don’t talk about their clients, whenever the out makes it up. They usually are the ones opportunity allows for “shop talk” they who engage in these types of conversations regale you with stories about their past that around people who don’t know any better, sometimes read straight out of a Tom Clancy or are easily impressed with the “glitz & novel. These individuals I term industry glamour” of the profession. “Super Ninjas” & “GI Giants” for their superior mastery of the martial arts (how The other type is a little more nuanced, many degrees does that black belt go up to they are the ones that have an extremely anyway?) and/or their ace marksmanship high skill set in one of the two categories with every weapon invented in the modern mentioned above, traditionally coming from age of warfare (including muskets if they a background that focused almost exclusively could get their hands on one!). on that, and now in their attempt to integrate that skill with executive protection work, they take it to the extreme. Martial arts Now don’t get me wrong, I feel a working then becomes the only way to successfully knowledge of one or more styles in the conduct close protection operations. The martial arts, is an important skill to have ability to shoot blindfolded and hogtied for those in the close protection industry. while submerged in a swimming pool Additionally, a familiarity with firearms becomes the yardstick by which all other is something that everyone in our line of viable traits in the craft fall to the wayside.

How many degrees does that black belt go up to anyway?.


34

Editorial Issue 23

With that said, flights of fancy don’t bother me on a personal level. Instead, I become troubled when the super ninja uses his quasi-mystical powers to influence others to think that their path is the one true path to enlightenment. Earlier today I was on a conference call with representatives of a new client as we discussed their needs, one of the handlers chimed in that the client “likes to have people that carry guns.” I then used that as an opportunity to find out why the client though that and it turns out that most of it stemmed from the discussions the previous protector had to both the handlers, and the client that all seemed to center around firearms. The next question I put to them was to ask about the medical training that this protector had. Lo and behold, no one could ever recall him mentioning

that, and that the omission was now pretty glaring since he talked about everything else. In this example the “G.I. Giant” made things more difficult for the next Protector assuming the mantle because we’ve been faced with the task of having to reeducate the client. I guess my feelings in the matter is that, if all they say is true, then they are wasting their talent, you can make a whole lot more money and gain a whole lot more adoration filming a summer blockbuster with the skills that go into being a 12th degree Super Ninja G.I. Gunslinger. Cut. Roll Credits.

I was on a conference call with representatives of a new client as we discussed their needs, one of the handlers chimed in that the client “likes to have people that carry guns.”



36

Feature Issue 23

How to spot hostile surveillance:

Practical tips for international travelers hostile and expats Detecting surveillance is a specialist

W

skill that takes years to become an expert in.

hile we don’t pretend to be able to teach surveillance detection through a single article, we are convinced that international travelers and expats can come a long way with a few simple tips. So go ahead and try them out. They won’t interfere with your activities or comfort level, and you’ll sharpen your situational awareness as you train your perspective – some pretty handy travel skills in their own right.

another. The bad guys need to know if the target will meet their objectives (e.g., are you suitable for robbery?) and they need to ascertain their chances of success (e.g., can they both get your money and get away?). To do this, they collect information via surveillance. This surveillance process might take seconds or minutes; it might take a year or more for better-protected (i.e., more difficult) targets. But the bad guys inevitably tend to look before they leap. What they’re doing is illegal, and they want to be sure of improving their chances of success.

The first thing to know is that the vast majority of attacks – whether by pickpockets, muggers or even more sinister types – are Some of the questions they are looking to preceded by surveillance of one kind or answer include the following:


How to spot hostile surveillance • Do you have any security with you? • Are you aware of your surroundings, or are you too preoccupied with other things? • Do you appear to be confident? • Are you predictable, and do you travel the same routes at the same time? The second thing to know is that you are at greater risk when carrying out routine or scheduled activities than you are when your activities seem unplanned or unpredictable. The paradox is that you need to be especially vigilant when doing what is most mundane: you need to pay special attention when you are leaving or arriving predictable locations such as your home or office. Everything else being equal, your threat level is lower when you are somewhere you visit only rarely. Eyeball to eyeball There are lots of ways that criminals gather information and conduct surveillance. They can use publically available publications and the Internet. They can recruit someone who knows your movements (bellboys, taxi drivers, colleagues, etc.) to inform them, wittingly or unwittingly, about what you do. In any case, they will always need to corroborate and verify whatever they glean from other sources through field surveillance: keeping an eye on you and your movements. It is exactly this need for eyeball-on surveillance that forces the perpetrator to show his hand (to the alert eye) – thus enabling the rest of us to identify it for what it is – hostile surveillance – and act accordingly to ensure our safety. Stay aware, stay secure With all of this in mind, here are a few simple tools to help keep you and your family secure whether you’re on foot or in a car:

• When departing or arriving from home and work, always pay special attention to who is around. Are they paying particular attention to you? Have you seen them before (at the same or another place)? Do they react to you, even subtly, averting eye contact, making a phone call, changing position, any reaction at all? Do they seem restless? • Remember, any routine activity puts you at higher risk because it makes you more predictable. So look for the same indicators during other routine activities during your day or week. • Be aware of your surroundings. Instead of keeping your nose to the ground or your gaze on your phone, get into the habit of scanning around with your eyes to widen your perspective and increase your situational awareness. This isn’t about becoming paranoid and looking for trouble. This is about being aware of the world you live in. • Trust your instincts. For me, this is the huge one. If something doesn’t “feel” right, even if you don’t know why, listen to that little voice, the tug in your stomach, your sixth sense. If it doesn’t feel right, it probably isn’t right. So what do you do if you think something or someone is acting suspicious – and as if they might be keeping an eye on you and your movements? Act on it. Go ahead and indirectly let them know that they’ve been spotted planning a hostile act. Alert a security guard or even a bystander to put them in the spotlight. Call the police if needs be. They will usually be frightened off as you will appear to be a “difficult” target due to your high level of vigilance.


38

Feature Issue 23

As a layman, you should know that you will generally be safer around people – and don’t try to be a hero or directly confront the perpetrator. I’d like to end this article with a little anecdote that I heard about first hand. A diplomat I know was stationed in a country plagued by radical hostile elements, whose preferred method of terror was placing explosive devices in the wheel wells of targeted diplomats’ vehicles. This lead to a preventive joint intelligence operation between the host country and the diplomat’s country. The result of this operation was that a terrorist “safe house” was raided, a number of terrorists were arrested, and a “hit-list” was recovered. The “hit-list” contained the names of several diplomats, some of whom had already been attacked, as well as this particular diplomat, who had never been attacked. During questioning, the terrorists were asked why diplomats on the list, both above and below the diplomat I know, had been

attacked – but not the diplomat who told me this story. Their response is something we can all take a lesson from. Now, this particular country had a high rate of street crime. The diplomat drove a nice new SUV, and had had all of his hubcaps stolen. He replaced them with new, more expensive hubcaps but was concerned that they would be stolen as well. So every morning he would circle his vehicle and check to see if his new hubcaps were still in place. THIS was the key to him being alive to tell me the story. The terrorists thought he was checking for explosive devices every morning, and thus considered him to be too security-aware to attack successfully. This is why they did not attempt to harm him. Please note that this article is meant only to provide some general tips for spotting surveillance. If you feel threatened, then don’t hesitate to share your concern with local police as soon as you can.

I v o r Te r r e t , D i r e c t o r o f G l o b a l T r a i n i n g a n d C o n s u l t i n g D i v i s i o n , A S S o l u t i o n



40

Feature Issue 23

Surveillance Detection for Individuals

Individuals face a variety of threats in today’s global environment. By developing and applying a Surveillance Detection (SD) plan to the targets daily protection operations you can significantly reduce the likelihood of an attack on your target.

T

heBefore surveillance detection (SD) can be used to prevent or deter an attack, you must have a thorough understanding of the threat. Intelligence as to who is a potential threat to the target, how vulnerable the target is to the threat and what countermeasures can be taken to mitigate the vulnerabilities is essential in creating a plan that will provide the correct type and amount of protection for the target. The threat assessment will then serve as your guide for defining your SD operations. SD goals must be based on limitations and needs and each course of action must be evaluated to ensure the security countermeasure is justified. When applying SD to the protection of individuals, once a threat assessment has

been conducted and preventative courses of action determined, you will have identified several areas where SD can be used to significantly reduce identified threats. For example, by conducting SD at the potential targets residence, you can reduce the risk of an intrusion, attack or kidnapping taking place at the targets residence. Some simple SD tactics that can be employed for a target at their residence may include the discreet observation of the surroundings of the targets residence before the target departs or returns to the residence to detect hostile surveillance in direct line of sight. As the target departs their residence, any corresponding activity in the area such as a vehicle following the target or an individual observed taking photos of the target, making


By: Jeff Burns

a phone call or writing should be noted and detailed information about the potential hostile surveillance should be recorded. All potential SD locations should be identified and discreet observation methods for each location should be developed. It is essential that you have some type of recording method available such as pen and paper, audio recorder and ideally digital still and video cameras. Having a pair of binoculars will allow you to overcome distance and obtain difficult details such as license plate information or physical descriptions. When conducting SD for individuals you must conduct a route assessment for the target and their family members. The route assessment is designed to identify choke points, potential attack sites and hostile surveillance positions. It is a good idea to involve spouses and family members in this process so that basic surveillance detection instruction may be given regarding their

travel and routes. Route assessments should be conducted for places of employment, children’s schools and any other locations of routine travel. SD information should be collected and reviewed daily so that SD plans can be adjusted as needed. It is important that your SD plan addresses what countermeasures to take should hostile surveillance be detected or an attack is recognized. These countermeasures include: • Obtaining a restraining order • Communication regarding the threat with family members, employers, school administrators, etc. • Mobile surveillance responses. • Defensive response to attack. The protection of individuals is an arduous task. By exercising due diligence and incorporating a surveillance detection plan into the targets protection operations we can significantly reduce the targets exposure to threat.


42

Medical Issue 23

Assessment and management of burns

Each year in the UK alone, 250,000 people experience burns injuries. Those deployed on overseas work are often exposed to higher risk of burns injury than when they are at home.


By: Kate Owen Photos ©Prometheus Medical Ltd 2013

A

s well as the threat from IEDs, personnel may have to handle flammable fuels, live in accommodation with sub-optimal electrical wiring or in poorly serviced infrastructure, or buildings without the usual fire prevention and alarm systems that would normally be expected at home. All this makes the medic or first-aider more likely to come across burn injuries. Timely intervention can make a real difference to the outcome for the patient. Therefore, this article focusses on the assessment and management of burn injuries in the first few minutes following injury. It is important that the source of burn and the severity of the injury is identified rapidly and dealt with appropriately. Some accidental burn injuries can be associated with underlying trauma, so the <c>ABCDE principles must still apply when assessing your patient. After removal of the source e.g. putting out the fire (part of safety) and initiation of appropriate cooling, burns are assessed in the ‘Circulation’ phase of <c>ABCDE, following the assessment of pulses, capillary refill time and management of fractures.

Classification of Burns The main types of burn are thermal, chemical, and electrical. Thermal burns are by far the most common. They can be caused by a flame or flash from a lit source, scalds from hot liquids,

direct contact with hot objects or exposure to very low temperatures. It is important to note the contact time with the source of thermal burns, although short contact periods may still cause significant burns. These sorts of injury are commonly seen on overseas deployments where safety and fire prevention standards may not be the same as back home. Poorly serviced infrastructure and electrical wiring in residences are common causes of fire: prevention, as ever, is better than cure. Chemical burns can be caused by either alkalis or acids and can be industrial or domestic strength. These types of burns can be from direct contact with the chemical or through the vapour that they release. The burn itself may not appear immediately after contact. The pattern of burn appears from direct contact with the skin. Electrical burns can be either high or low voltage, with ‘high voltage’ used to describe sources of over 1000 volts. Domestic households run on low voltage with the wiring usually earthed or insulated. DIY mishaps or poor maintenance can result in a low voltage electrical burn. High voltage burns occur in the recreational or industrial setting with examples such as lightning strike and accidental contact with overhead power lines. The pattern of burn often has an entry and exit wound (particularly with high voltage) and may cause extensive internal damage to tissues and organs, and abnormal heart rhythms.


44

Medical Issue 23

Don’t be afraid to learn new skills or try out existing ones in new situations.

Assessment of Burns Assessment must be made to identify the Total Burn Surface Area (TBSA) and the type (severity) of burn. Total Burn Surface Area The TBSA is an estimation of the percentage of the total skin area of the body that has been burned can be measured in several different ways, although the most common are ‘Serial Halving’ and Wallace’s ‘Rule of Nines’. Serial halving is based on the consideration that if a patient is standing facing you then the front aspect is half or 50%. The assessment is then continued as to whether the area affected is half of that view which would be 25% and furthermore half again being 12.5%. This can form a rapid estimate, but is not entirely accurate. Rule of Nines (Fig 1) provides a more precise calculation, where certain areas of the body are calculated as 9% or multiples of 9%. For instance: an adult’s whole arm is approximately 9% and the torso is about 18%. This system relies on the rescuer remembering the relative areas or carrying a ‘crib sheet’ as a reminder. As an approximation, the palm of the patient’s own hand represents 1% of their TBSA. An important factor to note is that TBSA burn is calculated by adding up only the areas of partial and full-thickness burn

(see description below) and excluding areas of superficial burn. Severity of Burns The severity of the burn determines how far through the layers of the skin the burn has affected. There are three grades of severity: Superficial, Partial Thickness and Full Thickness. Superficial burns The skin appears pink/red, dry to touch, painful, and often swelling may occur. The skin recovers easily, usually without scarring. Partial thickness burns The skin appears red, brownish or mottled and blisters can appear. The sensation of touch is altered and the area will be swollen. The skin may heal – often with hospital treatment but some discoloration and scarring usually occurs. Full thickness burns The skin appears black/white/red, dry and leathery. No sensation will be felt and the patient may not feel pain in these areas. Skin grafting may be required. Scarring will be apparent after healing. These are the most serious type of burn. Complications All types of burns can have serious consequences. The biggest immediate concern is to the airway. Flash burns or explosions


By: Kate Owen Photos ŠPrometheus Medical Ltd 2013

4.5%

4.5%

18%

18%

9%

9%

9%

9%

1% 9%

9%

can cause thermal injury to the face and neck with rapid swelling to the airway as the heat passes along the airway as hot air is inhaled. A higher risk occurs when the victim is trapped where they cannot avoid breathing hot gases (e.g. in a burning

9%

9%

building). External signs include; cough, singed nasal hairs, difficulty breathing, soot stained sputum, hoarseness, and swelling in and around the mouth. Patients with airway burns need to be taken to an Emergency Department rapidly.


46

Medical Issue 23

Kate Owen is one of Prometheus’ Senior Instructors. She has over 15 years’ experience working with the UK ambulance service and currently works as a HEMS Paramedic.

Other complications to consider are: underlying trauma, loss of fluids from the injury causing hypovolaemic shock, and infection. Hypothermia from rapid cooling causing loss of body temperature, so great caution should be used if considering cooling a burn with TBSA >10%. Management of Burns • Safe approach • Remove source of burn • <c>ABCDE • Give oxygen if you suspect inhalation injury. • Identify the burn severity and TBSA • Initiate cooling of the burn (but not the patient) where TBSA is less than 10% cool for 10 minutes • Keep as sterile as possible using Clingfilm which is relatively sterile and is very effective (do not to wrap circumferentially – this can lead to tourniquet effect) • Pain relief if available and where indicated • Professional medical help should be sought as soon as possible to correct fluid loss– although simple measures such as raising the patients legs must be considered – and treatment of local or systemic infection. • Transport to the most appropriate hospital.

Burns can be incredibly painful for the patient, and unpleasant and challenging for the first-aider to deal with, but timely intervention, following the management plan above, can make a real difference to the outcome for the patient. References American Academy of Orthopaedic Surgeons. (AAOS). (2008). Paramedic Field Guide. Jones and Bartlett Publishers. Canada. Association of Ambulance Chief Executives. (AACE). (2013). Joint Royal Colleges Ambulance Liaison Committee. UK Ambulance Service Clinical Practice Guidelines. Class Professional Publishing Ltd. Bridgewater. British Burn Association. National Burn Care Review (U.D) available from www.britishburnassociation.org/downloads/ NBCR2001.pdf (Accessed 15/03/2014) Nutbeam, T., Boylan, M. (Editors). (2013). ABC of Pre-hospital Emergency Medicine. Wiley Blackwell. BMJ Books www.britishburnassociation.org/prehospital-care


How much do Security Companies make?

How much do Security Companies make? A Look into the Money behind Security companies.

As a security company ourselves we as many do believe transparency is key.

T

his article looks specifically at the Door Work and Event security side of the market, factoring in low level security guarding contracts as well.

I tell many people I come across how smoke and mirrors other people can be, but actually it’s pretty straight forward. The industry to date is riddled with rogue traders and half thought out attempts at puzzling together their own firm. Let me lay it out for you to be the judge based on my experience having run 3 companies (one of my own and


48

Feature Issue 23 area manager of two others). I have also worked privately for several organisations as a front line operative. The best thing about my experience and those I closely socialise with is we will openly admit we’ve got it wrong sometimes. That we have admittedly found ourselves on both sides of the fence unintentionally. From working for rogue operators, to pricing and competing for jobs wrongly, to experience just what happens when you make these mistakes. One thing is certain, we collectively now avoid the quote wars. How low can you go! There is always margins for negotiation upon bulk bookings or big orders. You can earn less but overall make more with big orders, you can negotiate say £1.00 per hour less with security in exchange for giving them the benefit of a better guarantee of hours, Event and casual work specifically (I do fully appreciate how other companies can with no back bone crumble on these promises) but it can create jobs and create a win-win all round if done properly. Never get beaten so low you’ll not make much money yourself I’ve learned. Honest clients and those that need a certain level of safety at their events and establishments know that as a company, you need to make a profit. Or what point is there picking up the phone to them. Without profit, trust me, you cannot provide a good service.

“I am Sam from Bluemilk enterprise. I need one of your event security for 5 hours”

Let’s look at the numbers. “I am Sam from Bluemilk enterprise. I need one of your event security for 5 hours” Price quoted £14.00 per hour. Unless your doing the job yourself, the company should earn no more than £20.00 or £25.00 if like me, you pay a good going rate to your team. I worked out one Christmas a few years back that every job I got, no matter the size or length of booking, on average each booking created for me 12 emails back and forth with the client. These would be spread before and after the event. Some less, some more. With an average of three phone calls. From discussing the event itself, to chasing invoices if needed. E-mails take me about 2-3minutes each, the same for a phone call. But these are not all done at once, far from it. This is stretched over a month or even longer. People


By: James Johns Savysec Security Services normally book two weeks before an event, and I allow 14 days to a first time customer for payment. It’s all about trust. Though big companies accounts departments tend to get in the way of this. All that for £20.00! Alone it is not worth it. Especially if you are charging less! A mistake I made many times at the start. Let me show you a reason why it is worth it. Here’s another example. “I am Callum, I run BrickDisco. I can pay £13.50 per hour for each security. I need 2 security on Thursday and Sunday for 6 hours each and I need 3 security on Friday and Saturdays again for six hours each. I need this every week” This new client has just created 10 bookings for you a week! 10 x 6 = 60 hours x 3.5 = £210.00 per week (average security factored at £10.00ph). For some one this could be a full time job organising these guys, and even better if they themselves worked the at the brickdisco, however I would not advise them working their own job – more about that later! You might look at this and think “YES, I’VE MADE IT, MONEY IN THE BANK EACH WEEK” here’s why, much like before, this surprisingly isn’t a good deal just on its own. The biggest benefit of this job is not the money, but the regular bookings. Let me explain why. Let’s say you do two shifts yourself at Brickdisco and earn £330.00 from this job per week. If you count on solely on this job as income, I can guarantee you, maybe not this month, maybe not this year but any experienced security owner will tell you at some point or another you are likely to lose most your jobs. To keep your jobs for longevity is a talent, customer service, remaining on hand at all time, but not in their face. Personally this is one of many reasons I do not make a habit of working my own jobs, it is a short-term solution, and if your good at what you do, you’ll rarely have time because you’ll be so busy with organising bookings.

You might look at this and think “YES, I’VE MADE IT, MONEY IN THE BANK EACH WEEK” here’s why, much like before, this surprisingly isn’t a good deal just on its own.


50

Feature Issue 23

So you’ve got your £330.00 a week. Let’s stick with this and imagine you have a few double pay bank holidays, and few extra bookings from the venue on top but as well, you yourself want a few weeks off work. So £330.00 x 52 weeks in the year = £17,160 per year before deductions. Let’s now talk about deductions. There are many. Not to mention the biggest, tax. As my accountant once told me “you cannot make money without paying tax”. Don’t ever do cash jobs in this industry, again a subject I’d like to go more into detail in another article. Any profit you earn is taxed after your personal allowance. The consequences are never worth the money of not paying the tax. You can easily factor in £1,200.00 a year for insurance, I doubt this is something Brickdisco will cover themselves, or consider using you without. You will also undoubtedly have irregularity in some shape or form in the term of staff. In this scenario you can offer just one other person four days work a week, they themselves will need time off at some stage. Your two weekend staff, may not want just weekend work and go elsewhere for better offers, so you need to consider when starting up the cost of recruitment. Advertising for staff is a cost that should be taken seriously and spent correctly. If you want to become accredited you can deduct many more man hours than money, though the paperwork adds up, as well as the SIA’s subscription cost. This is all if you just want to stay still with one job. All in all even the good “contracts” are only worth a crust if you have either a few or a lot of them. Two massive benefits are that when I started, if I didn’t get a booking, I didn’t spend any money. I advertised by emailing companies, I only got insurance after landing my first client to reduce the cost at the start. Paper work was created in my spare time and done by myself. Some minor stationary costs incurred only. The other and main benefit point of “How much do security companies make”, Is they do well if they consistently have jobs on. I also keep overheads very low which helps. I make


By: James Johns Savysec Security Services

sure all the bases are covered and insurance is up to scratch, but I avoid using any admin staff by doing it myself and I use supervising staff only if I have more than 7 people working at one time. Luckily it hasn’t got that low in a while otherwise this can be done myself. Security companies should not look at any one job and go “this is a big earner” they would be better off seeing it as “this helps”. Having a good week is great, having a good month is better, but to survive we need a good year. Like many small and medium sized companies you can suffer from fewer bookings in January and February, the quiet month as well as an October low. I only look at what they call the bottom line. All my good weeks vs all of my bad weeks. The Year to date figure on my accounting is the main figure. I put my basic salary in which is far from exciting though it gives me a job which I’m thankful for and see if I am minus or plus. To put it in basic, security companies make about 30% to 40% total of what the guard will, however only about 7 to 15% is what they actually take home after the deductions. (Based on small to medium business studies and research in the event security staffing industry).


52

Feature Issue 23

COUNTERING THE EFFECTS OF SURVEILLANCE PART1:

Counter Surveillance is defined as the conduct of specific actions by a third-party individual or team to confirm and/ or identify the presence of surveillance including electronic surveillance, on a briefed individual (The Principal and CP Team).


By: Rich Aitch

T

he effect of hostile surveillance on CP operations and the extent as to its success largely depends on the number of following factors:

■ The amount and manner in which travel is conducted by the Boss by foot, vehicle, aircraft and private yacht ■ The presence and level of all residence, office and vehicle security ■ The security awareness and integrity of all household, administrative and associated staff • Operational procedure by the CPT due to the extent of surveillance detection conducted: • By all CPT members • By the presence of a dedicated SD or Counter team • Anti surveillance measures undertaken as an SOP • Via equipment and methods • Via actions & manoeuvres during foot or mobile moves

point. Vehicles must be swept by a properly trained and equipped Technical Surveillance Counter Measures, (TSCM), team on a continual ad-hoc basis and after servicing, valeting etc. In addition to the sweep, all vehicles should have GPS blockers fitted in addition to anti-magnetic coating applied to the underside of the vehicle. When not in use, the vehicles should be parked in a secure garage and guarded by the residence security and electronic systems of alert. The drivers of all CPT vehicles must remain observant to their surroundings. When parked or when static at junctions, anyone who comes close to the vehicle must be monitored. If anyone does purposefully or inadvertently come into contact with the vehicle then that area of contact must be searched as soon as practicable. It is also beneficial to have the parking sensors activated continuously when parked. Anything that provides an early warning of approach to your vehicle provides those extra ‘eyes’ especially for the lone driver when he can then focus on providing further surveillance detection outside the venue.

Vehicle Information • The assets, logistics and capability of hostile Many CP ops whereby those employed action are directly employed and not contracted through a security service provider may 1. The amount and manner in which travel encompass the setting up of a company is conducted by the Boss by vehicle, aircraft for the purposes of ease of finance and and yacht administration. Long-term CP operations, specifically those in terms of years, may Vehicle involve purchasing vehicles specifically for Prior to any counter surveillance operation the job. This is not uncommon and whether it is important to create that sterile start bought outright or leased, makes economic


54

Feature Issue 23

sense. These vehicles however, hold information just by their very presence.

to amaze me that a quick phone call to the handlers flight operations providing the tail numbers and stating you work for The registered owners address details the passengers such as the driver waiting can provide a starting block for further, to pick up or drop off for instance, then more in-depth scrutiny. It is therefore the subsequent passing of information of paramount importance that anything pertaining to the aircraft, the flights slotted associated with the operation, specifically and passenger list can be easily obtained. those legal requirements and obligations This applies to both arrival and departure are dealt with in the most secure manner airports. If it remains easy for you it will possible. This includes company details remain easy for anyone else. In addition, if given to Companies House, such as names of surveillance is conducted whilst luggage is Directors, addresses and so on. If the threat being moved from the house to the vehicle is high enough to warrant consideration then this may be the first time that confirms to the personal security of those named on the travel intentions of the Boss. The knocklegal documents then special dispensation on effect to this information benefits the should be applied to Companies House planning for hostile surveillance/ action in via the police to allow those named to the form of pre-empting movements and withhold their address details and to plotting up in advance of, and along the allow the company to be registered at a routes of heliports, if used, and the departing mail forwarding address to counter any and arrival airports. hostile contacts with the Driver and Vehicle Licensing Agency and insurance companies. Private Yacht If the vehicles were bought from new then Information concerning ships movements the vehicle registration number plates must specifically those of luxury yachts are be changed to remove the showroom sellers often surprisingly voluntarily given via contact details. In addition the following social networking sites, (with photo’s), produce increased security through by its crewmembers. Ensuring that all confusing and disrupting any possible crewmembers have the essential security surveillance: awareness of the yacht will naturally enhance the level of security for the Boss. Security • Frequent vehicle change for these floating palaces must be treated • Use of decoys on par as ‘floating residences’ with specific • Alternative embus and debus points additional concern. No association between the name of the owner and the yacht, or the Private Aircraft yachts movements must be readily available. If travel by the Boss were short notice, As with the security for residences, offices ad-hoc, the details of which changed and vehicles, the area must be made sterile. frequently and with limited dissemination of TSCM sweeps must be conducted of all information to the fact then this would cause areas including all computers and phone increased problems for any surveillance lines, especially after any refurbishment team. However, much ado with travel, or maintenance works. Countering specifically with private aircraft and the surveillance must also be heightened prior security of information is reliant on the to the boarding of the Boss. His presence aircraft handlers themselves. It never ceases on the yacht must naturally be confirmed


By: Rich Aitch

by the threat if any directed hostile action is to be conducted against him during his stay on board and during times he goes ashore. His journey to the yacht itself is vitally important in this confirmation and counter surveillance measures must be taken place during this period. As a result of this move and the location of the yacht, it will naturally encompass the same considerations to those of private aircraft and helicopters, as these are the main forms of travel that will be conducted .

distance from target. Counter surveillance/ SD undertaken by CPT or RST members on a regular but infrequent basis will help to identify and/ or hinder any hostile surveillance team but must remain an ongoing process and become integral to the SOP’s of the operation. Assessments made as to possible surveillance locations with mobile and foot patrols throughout the grounds and surrounding roads and land in the immediate locale to be conducted together with the recording of VRN’s, unknowns and situations of interest. In 2. The presence and level of all residence, addition, the residence security systems must office and vehicle security be used in a proactive manner as opposed to those of only monitoring and reaction. The Proper government surveillance, (MI5/ CPT drivers must be responsible for their SRR/ Police), especially when conducted own vehicles. The vehicles must be garaged during a static role will rarely be identified or guarded with a preference for both. The by (untrained) target(s). Each walk past keys to both the garages and vehicles must is a different operator. Each drive past is a only be held by the driver(s) and designated different vehicle. Static OP’s will be carefully person such as the CPTL. As with vehicle selected for the purposes of insertion, drop security, a professional TSCM team must offs and pickups, observation point(s), also electronically sweep the residence(s) cover from view from all of the above and and office(s).


56

Feature Issue 23

3. The security awareness and integri- detrimentally affecting the level of the ty of all household, administrative and immediate security. If no CST is being used then designated members of the CPT associated staff

can conduct a protective surveillance role; dressing down to ‘scruff order’ blending Residence and office locations that cause access problems for hostile surveillance due in and positioning to identify any hostile actions. Mobile surveillance, as with to the level of security systems and staff presence should not be deemed as secure as the manner in which all surveillance is conducted, has a duty to blend in to the what is first perceived. The weakest point operational environment. As such, the in any security operation is the manpower. manner in which surveillance vehicles are Whether that manpower is directly driven must be in accordance with other employed in the full scope of security or road users. No harsh accelerating, braking whether that employee is a cleaner, a chef, or sudden lane changing but as a smooth, gardener, or nanny. Operational security, natural follow. A CST positioning to cause (OPSEC), including all information difficulty during a follow in driving slower pertaining to any aspect concerning the behind the VIP Group providing increased Boss, his family, residences, business and distance between them and other road so on can easily be disseminated through users, (unknowns) provides a good example inadvertently, flippantly, or immodestly of ‘disassociation’ with the VIP Group. If mentioning specific details to friends and the nature of the operation is such that third parties and through leaving sensitive surveillance is a real threat from either documentation insecure or incorrectly disposed. Staff, regardless of their position, government (including foreign) and/ or commercial teams then anti surveillance can be bribed or blackmailed to provide measures must be conducted by the team such information. They can also be bribed members themselves. The operation does or blackmailed to plant listening devices. not begin the moment you take over on Likewise, staff connected to the wider operational scene are also susceptible to the your shift or when the Boss lands in country. same. As mentioned previously, information The operation is a continual one involving increased levels of personal security during concerning flight schedules; tail numbers, pax lists, destinations, departure and arrival down time encompassing the security of your family during on-going ‘routine life’ times can all be easily obtained. with raising your personal and operational awareness further during periods on task.

4. Operational procedure by the CPT

The operational procedures and actions by the CPT are ultimately what will define the effects and level of success of any hostile surveillance. If the operational characteristics dictate then the involvement of a designated Counter Surveillance Team will ensure that the CPT can focus their efforts to the actual provision of close protection without splitting the team and

192.com and 123people.com are just two of several web-based companies that provide lists of full names, addresses, age guides, property prices, aerial photos, phone numbers, company & director reports and family records based on information stored on the Electoral Register. They contain almost 700 million records many of which are free including directory enquiry and


By: Rich Aitch local business searches as well as interactive mapping, aerial photography and property reports. Premium level access to the sites also provide a search of current and historical electoral rolls; births, deaths and marriages registers, census data from 1861 onwards. It becomes an obvious stance then to remove your (family) details off the electoral roll as well as details of any directorships held.

The Electoral Register

The Electoral Register is a list of everyone who is registered to vote and as a result includes the names and addresses of the majority of UK citizens over the age of eighteen. The Electoral Roll detail is listed in a table format that shows:

■ The names of the residents ■ The match level (Applicant, Associate, Family or Other) ■ A Junior/ Senior indicator - for people with the same fore and surname ■ The date of birth 
 ■ The dates the individual has been registered on the Annual Register - The month of moving in or out of the property according to the Rolling Register Entering details on the Electoral Register is legally enforced: “If you receive a request for your registration information from your local electoral registration office then you are legally

Information concerning ships movements specifically those of luxury yachts are often surprisingly voluntarily given via social networking sites, (with photo’s), by its crewmembers.


58

Feature Issue 23

The Electoral Roll is really the only comprehensive, nationwide register of names and addresses available. obliged to respond. If you do not respond, or if you provide false information, then you could receive a £1,000 fine – it may also affect your credit rating” (2010) Up and down the UK this personal information can be bought from local councils, (as well as 192.com/ 123people. com etc.). The Electoral Roll is really the only comprehensive, nationwide register of names and addresses available. There is also another legal requirement, which means that councils have to pass on the details held if asked for them. The Electoral Roll is available to anyone and any organisation, and it can be used for any purpose whatsoever without the council having to check the reason why anyone would want to buy a copy. However, it is possible to ‘bypass’ your details being held by way of applying for ‘Anonymous Entry’ in the Electoral Register. The application will have to be conducted in a similar manner as the special dispensation to withhold company Directors personal details being entered on Companies House.

To qualify, you must provide evidence to satisfy the Registration Officer that the safety of yourself or of any person in the same household would be at risk if the Register contained your name and/ or qualifying address. There are two versions of the register – the full version and the edited version. Elector’s details – name, address, electoral number – ordinarily will appear on the full version of the register, with a choice of whether or not their details appear on the edited register. However, if granted anonymous entry in the Register, only your electoral number will appear on the Full Register. The Full Register is the one used for elections and referendums, preventing and detecting crime and checking applications for credit. It then becomes highlighted that if your details are not accessible that implications may arise for any future financial dealings with third parties or credit applications made. No entry at all will appear on the Edited Register which is available for general sale and which can be used for commercial activities such as marketing…. or targeted hostile action. “This article is an extract taken from Rich Aitch’s book “Close Protection” the second part of the article “Anti / Counter Surveillance” will follow in the next edition of The Circuit.



60

Intel: Issue 23

Intel:

World Report Africa KENYA Car bomb kills four in Nairobi’s Pangani quarter: A car bomb exploded outside a police station in the Kenyan capital, Nairobi, killing four people. Police were taking the occupants of the car in for questioning in the Pangani neighborhood when it exploded, the interior ministry said. Two of those killed were police. It is unclear who was behind the blast, but Nairobi has been targeted in the past in attacks attributed to Somali al-Shabaab militants, who oppose Kenya’s military involvement in Somalia. A grenade also found at the scene was detonated by police, the ministry said.

Abdoul Salam, a spokesman for the MUJAO Islamist militant group, AFP said. He gave no details on the date or circumstances and when asked for evidence, he said “in the name of Allah, he is dead” before hanging up.

SOUTH SUDAN President Salva Kiir sacks army chief: South Sudan’s President Salva Kiir has sacked the head of the army following recent rebel advances. The decree announcing the immediate removal of Gen. James Hoth Mai did not give any reason. The country has been in turmoil since December. Rebels seized the oil hub of Bentiu in Mid-April. Meanwhile the UN has accused the government of providing MALI “erroneous information” regarding a massacre Militants say French hostage Gilberto of hundreds of civilians in the town. South Rodrigues Leal is dead: Islamist militants in Sudan’s Minister of Information Michael Lueth Mali say a French hostage who has been held was wrong to tell reporters that residents captive since 2012 is dead. The group, linked seeking protection had been barred from to al-Qaeda, told the French AFP news agency entering a UN base, the UN mission said in a that Gilberto Rodrigues Leal “is dead, because statement. After rebel forces captured Bentiu France is our enemy.” So far there has been on April 15 and 16, they targeted hundreds of no official confirmation of the 62-year-old’s people who had taken refuge inside a mosque, death. French troops in Mali freed five aid a church and a hospital, and killed them workers kidnapped in the north of the country because of their ethnicity, the UN Mission in in February. The report of Mr. Rodrigues Leal’s South Sudan (UNMISS) said. death came in a brief phone call from Yoro


Intel: World Report Americas BRAZIL Fresh clashes in Rio over dancer’s death: police clash with residents of a Rio de Janeiro shantytown that was hit by deadly protests. Police used tear gas and rubber bullets to disperse dozens of angry protesters from the Pavao-Pavaozinho favela. The protesters were returning from the burial of a man whose death - allegedly at the hands of police triggered the earlier clashes. Authorities say they will investigate the death of TV dancer Douglas Pereira. Rio’s public safety director, Jose Maria Beltrame, said they would proceed “with the utmost rigor and transparency.” COLUMBIA President Santos reinstates ousted Bogota mayor Petro: Colombian President Juan Manuel Santos has reinstated the ousted Bogota mayor, Gustavo Petro, to his former office. The decision by the president came just a day after a court ordered him to reappoint Mr. Petro within 48 hours. The mayor was sacked by Colombia’s inspector general in December over the alleged mismanagement of the capital’s rubbish collection service. Mr. Petro, a former left-wing rebel, had argued all along that his removal had been politically motivated. The tribunal ruled that President Santos had acted wrongly when he had confirmed the removal from office of the left-wing mayor. The court said the president should have heeded a March 18 ruling by the Inter-American Commission on Human Rights that said that Mr. Petro’s rights had been violated. Guatemala Mexico and Guatemala free victims of human trafficking: Mexico and Guatemala officials say they have rescued at least 104 people from captivity and arrested 14 of their alleged human traffickers. Police in Guatemala said they raided two houses near the Mexican border and found at least 60 people who wanted to travel to the United States illegally. They arrested eight alleged traffickers. In

Mexico, the authorities said they found 44 Guatemalan migrants in a house near the Guatemalan border and arrested six alleged human traffickers. Migrants from Central America often pay smugglers to enter the U.S. illegally, but are frequently abused by their traffickers. They can hold migrants in captivity to extort more money from the victims’ relatives. Police in Guatemala said they carried out the raids in Huehuetenango province in the west of the country. They said those rescued were mostly Guatemalans, but did not give the nationalities of those arrested. In Mexico, the National Immigration Institute said the 44 Guatemalans, including seven women and two boys, were found in a house in the southern Mexican state of Chiapas. It added that the alleged human traffickers, who are thought to be from Guatemala, were wanted by the authorities in the United States. Asia and Pacific AFGHANISTAN Three Americans killed in Kabul hospital attack: Three Americans have been shot dead by a policeman at a hospital in the Afghan capital, Kabul, US officials say. A spokesman for Afghanistan’s interior ministry described those killed as “medical staff.” The hospital, which specializes in children’s and maternal health, is run by Cure, a small US Christian charity. Two others were reported wounded. The attacker, who reportedly shot himself, is in police custody. His motive remains unclear, officials say. INDIA Nine killed in poll violence: A total of nine police and poll officials were killed in India in two attacks, one in a region hit by a Maoist insurgency and the other in Kashmir, the mainly Muslim region where many voters are boycotting a general election. Eight police and election officials were killed when assailants, that police suspect were left-wing rebels, blew up a bus they were traveling on in Dumka, in the eastern state of Jharkhand, police spokesman Anurag Gupta said. Five


62

Intel: Issue 23

of the dead were police. Five others were wounded. In the second incident, one election official was killed and five people wounded in a gun attack in Indian-ruled Kashmir, where many people stayed away from voting in a constituency that was hit by pre-poll violence. MALAYSIA Pirates raid oil tanker in Malacca Straits: Armed pirates raided an oil tanker sailing in the Malacca Straits and abducted three crew members, officials in Malaysia say. The pirates also pilfered a large amount of diesel from the tanker, which reports say was traveling from Singapore to Myanmar. Three Indonesian crew members were seized, officials said. The Malacca Straits, which run between Malaysia and Indonesia, are a key shipping route in the region. Reports say that armed men boarded the ship and tied up crew members, including nationals from Thailand, India, Indonesia and Myanmar. A Malaysian marine police commander, Abdul Rahim Abdullah, told the Associated Press that after the pirates boarded, two other tankers appeared and close to a million gallons of diesel, out of the 1.5 million cargo of diesel, were transferred to them over several hours, he said. NORTH KOREA Korea reportedly seals nuclear test tunnel: North Korea has apparently sealed a tunnel at its nuclear test site, a government official said ahead of U.S. President Barack Obama’s arrival in Seoul for a two-day visit. South Korea’s defense ministry warned that the North could be preparing to carry out a fourth nuclear test, citing increased activity at the Punggyeri site. He said the information was based on unspecified intelligence reports. Experts are divided over whether a test is imminent and the defense ministry warning came with the caveat that Pyongyang might be pretending to prepare a detonation to raise tensions during Obama’s visit. The government official said he could not say precisely when the tunnel had been sealed. North Korea has conducted three

nuclear tests -- in 2006, 2009 and 2013 -- all at the Punggye-ri site. Pakistan Fighter jets target militant hideouts: At least 16 suspected militants have been killed in air strikes in north-western Pakistan, officials say. Warplanes targeted “terrorist hideouts” in the Khyber agency, which borders Afghanistan, a military statement said. It was a response to a number of recent attacks on police and civilians in the capital, Islamabad, and the nearby city of Peshawar, the statement added. A ceasefire between the Pakistani Taliban (TTP) and the government formally ended in late April. THAILAND Grenades fired at Thai newspaper: Grenades were fired at a newspaper headquarters and a court in Thailand’s capital, as political tensions heat up ahead of a court ruling over the fate of the prime minister. No one was hurt in the attacks. The first grenade left a small crater outside a building in the Daily News compound in northern Bangkok’s Lak Si district, police Col. Kamthorn Auicharoen said. Another grenade landed inside the gate of the Administrative Court in the city’s northern outskirts, near an anti-government protest site, he said. It was not immediately clear whether the grenade was aimed at the court or the protesters. Europe and FSU RUSSIA Russia orders exercises after Ukraine moves on separatists: Russia has ordered new military exercises on its border with Ukraine in response to an operation by Kiev against pro-Russian separatists. Russian Defense Minister Sergei Shoigu said Moscow had been “forced to react” after Ukrainian commandos moved on the separatist stronghold of Sloviansk. President Vladimir Putin had earlier warned Ukraine of “consequences.” Pro-Russian separatists are occupying key


Intel: World Report buildings in a dozen eastern towns, defying the central government. Mr Shoigu was quoted by the Interfax news agency as saying: “If this military machine is not stopped, it will lead to greater numbers of dead and wounded. We are forced to react to such a development of the situation.” Ukraine Helicopter hit by Rocket Propelled Grenade: A Ukrainian military helicopter exploded at a base near the eastern town of Kramatorsk after being hit by a Rocket Propelled Grenade, officials in Kiev said. The helicopter was hit in the fuel tank and exploded. “An army Mi-8 helicopter has exploded at the Kramatorsk aerodrome,” the defense ministry in Kiev said in a statement. The chopper was on the ground when it was targeted and the pilot managed to escape but sustained injuries. Kerry accuses Russia of destabilization: U.S. Secretary of State John Kerry has accused Russia of “distraction, deception and destabilization” in eastern Ukraine. In a strongly worded statement, he called on Moscow to help defuse the crisis there or face further sanctions. Earlier, Russia called on the U.S. to make Kiev stop raids on pro-Moscow separatists in the east. Russia ordered new military exercises on its border following the raids, drawing condemnation from Ukraine. Moscow has tens of thousands of troops along its side of the border and the acting Ukrainian Defense Minister Mikhail Koval told the Interfax-Ukraine agency that they had come within a kilometer of the border. The news comes amid an increasing war of words between the U.S. and Russia over events in eastern Ukraine. Pro-Russian separatists are occupying key buildings in a dozen eastern Ukrainian towns, defying the central government. Middle East and North Africa EGYPT Cairo bombing kills senior Egyptian

policeman: A senior Egyptian police officer was killed by a bomb blast in the capital, Cairo, security officials say. Brig. Gen. Ahmed Zaki died when an explosive device placed under his vehicle was detonated in the western suburb of 6 October City. He was the fifth police general to be killed since the start of the year. Jihadist militants have stepped up attacks on security personnel and killed hundreds since the army ousted President Mohammed Morsi last July. A security source told the media that an officer was also killed while chasing “terrorists” in the northern city of Alexandria. Syria Air strike on market kills more than 20: A Syrian government air strike targeting a market in a rebel-held town killed more than 20 people, activist groups said. The air raid on Atareb, north of the city of Aleppo, also injured dozens of people, activists said. The air strikes hit the busy vegetable market early in the morning, the UK-based Syrian Observatory for Human Rights said. The Observatory, which is close to the rebels, put the death toll at 27. Syria is engulfed in a three-year civil war, which has killed about 150,000 people. Government forces have made gains recently, but rebels still control large territories. IRAQ Suicide attack kills at least 11 people: A suicide bomber rammed his explosives-laden car into a police checkpoint south of Baghdad, killing at least 11 people, officials said, the latest episode in an upturn in violence in the runup to the parliamentary elections. The attack struck during the morning rush hour, when the checkpoint at one of the entrances to the city of Hillah, about 95 kilometers (60 miles) south of Baghdad, was crowded with commuters. Among the 11 killed were seven civilians and four policemen while 27 people were wounded in the bombing, a police officer said. The blast also damaged about 15 cars nearby.


64

Intel: Issue 23

Uganda a Ugandan

military court began a trial for two military officers charged with giving firearms training to al-Shabaab militants in Mogadishu while they were serving with AMISOM.

Middle Shabelle

al-Shabaab ambushed and killed two soldiers near Mahaday and stole their weapons. Security forces arrested ten people in connection to the murders.

Kenya following a string of attacks, including the bombing of a Nairobi neighborhood and a church shooting, Kenyan authorities detained thousands of ethnic Somalis.

Lower Jubba

Kenyan AMISOM force reportedly freed two aid workers held captive since 2011. Al-Shabaab, however, claims they were released voluntarily.

Gedo al-Shabaab forces ambushed an AMISOM convoy near Garbaharey. The coalition forces were traveling toward Beledhawo when they were attacked.

Hiraan police arrested 22 suspected al-Shabaab operatives near Beledweyne as they attempted to travel past the town. Security forces are having a difficult time securing towns liberated by AMISOM offensives.

Lower Shabelle

al-Shabaab executed three men for spying for Somali intelligence. A trial held in Barawe found the men guilty and sentenced them to death by firing squad.


Mogadishu

a roadside bomb exploded near an AMISOM convoy in Heliwa district. No soldiers were killed.

Mogadishu

gunmen killed two security officers working for national intelligence in Karan district. No group has claimed responsibility, though al-Shabaab is suspected. Two suspects were detained.

Mogadishu

police arrested 17 people in Dharkenley, Hodan, and Karan districts for possessing police uniforms unlawfully.

Galgudud three al-Shabaab militants were killed and one injured when a bomb they were constructing detonated prematurely. The explosion took place in Gal Hareeri, near El Bur, which AMISOM had recently assaulted. Lower Shabelle

al-Shabaab ambushed an AMISOM convoy near Shalanbood as it travelled from Marka to the recently liberated Qoryoley. Casualty figures were unknown.

Regional Overview: Somalia

INCIDENT MAP: SOMALIA Significant Events • April 16: al-Shabaab fighters ambushed government soldiers near Baidoa, Bay, leading to fierce clashes and casualties. • April 15: Somaliland forces seized Taleh, Sool, in the disputed border region with Puntland. Puntland President Abdiweli Mohammad Ali Gaas promised a strong response. • April 10: al-Shabaab fired mortars on the Turkish Embassy in Mogadishu, wounding three construction workers. • April 7: a gunman killed two UN employees, UK and French citizens, in Galkayo, Mudug. • March 31: Puntland and Galmudug police chiefs announced the creation of a unified security force to protect the regions from al- Shabaab fighters pushed north from the AMISOM offensives. • March 26: Ethiopian AMISOM and Somali Federal Government (SFG) troops seized El Bur, Galgudud, after al-Shabaab abandon the town. • March 24: eight Lower Shabelle elders were executed near Burhakaba, Bay, as they travelled back from attending a federalist conference. • March 23: a demonstration in Baidoa, Bay, against former MP Sharif Hassan Sheikh Adan turned violent, resulting in two deaths. • March 22: AMISOM and SFG troops seized Qoryoley, Lower Shabelle, after hours of fierce fighting.


66

Intel: Issue 23

FocusOn: Somalia

Current Assessment Conflict AMISOM and the Somali National Army (SNA) renewed their offensive after a brief stall. There were substantial operations in Lower Shabelle, around Marka, and in Hiraan and Galgudud. Meanwhile, operations continued in larger towns in an effort to restore security in areas seized from al-Shabaab.

violence resulted in at least two deaths, including the shooting of a 16-year-old boy by one of Sharif Hassan’s guards. The following day, gunmen killed eight elders in Burhakabo district in Bay. The elders, all supporters of SW6, were traveling from Baidoa to Lower Shabelle following the unification talks when they were seized and executed. PM Abdiweli Sheikh Ahmed blamed the attack on al-Shabaab, though it is more likely that the perpetrators were SW3 Bay and Bakool supporters. The PM’s statement was likely an A rally in Baidoa during federalist talks attempt to defuse the situation and prevent turned violent. Demonstrators were SW6 from gaining momentum, especially as protesting at the Baidoa airport against the SFG does not support their movement. former MP Sharif Hassan Sheikh Adan, who Al-Shabaab continued to push back against is the top candidate to lead the aspirant SW3 the recent offensive in Bay and Bakool, state, to consist of Bay, Bakool, and Lower though in smaller, lighter attacks on bases Shabelle. An altercation lead to an exchange or convoys in order to inflict casualties, not of gunfire between the SW3 and SW6 camps, seize territory. This has largely been their the latter of which desires a state comprised strategy and is supplemented by the sabotage of Jubbaland and the SW3 regions. The of critical infrastructure, making it more


FocusOn: Somalia difficult for the AMISOM and SNA troops to hold and live in the areas. In Bakool, Ethiopian AMISOM troops with help from the SNA engaged al-Shabaab in multiple locations. Al-Shabaab ambushed a convoy near Tayeglow, to the east of Hudur, Bakool. The subsequent firefight lasted several hours and injured at least six al-Shabaab fighters. On April 4, AMISOM and SNA attacked an al-Shabaab base in Wajid district, leading to fierce fighting that caused losses and casualties on both sides. On April 13, al-Shabaab ambushed supply trucks in Wajid district, near Bur Dhuhunle village. AMISOM and SNA troops retaliated, sparking prolonged clashes. There were casualties on both sides and the government claimed they killed 15 militants and dismantled several roadblocks. Hiraan and Galgudud Ethiopian AMISOM and SNA troops moved on El Bur, Galgudud, engaging with al-Shabaab fighters. After fighting in the surrounding areas, which included an ambush on a convoy in El Qohle that killed at least ten people, AMISOM and the SNA then made another push for El Bur. They seized the town with no contest. AlShabaab had previously destroyed water distribution and filtration facilities in the town in anticipation of the offensive. On April 6, coalition forces seized Wabho after several days of intense fighting. At least 30 alShabaab militants were killed and 20 others wounded. In Hiraan, AMISOM and SNA forces seized Mahas, near the border with Galgudud, from al-Shabaab, continuing their push into rural areas away from Beledweyne. Mahas is the ninth town to be taken in the recent offensive and the first since the attack at

Bulobarde killed key AMISOM and Somali leaders. A few days later, AMISOM and SNA clashed with al-Shabaab fighters in Yasooman, near Bulobarde. Bulobarde and its surrounding areas have witnessed heavy fighting since March 13, when AMISOM and SNA launched their offensive in the region. Coalition forces seized Moqakori, a town south of Mahas, with no resistance from alShabaab. AMISOM and the SNA seem to be resuming their offensive in the central regions, though more cautiously than before the March 18 Bulobarde attack. They have successfully pushed al-Shabaab north out of several towns, however many of these were given up without resistance. Al-Shabaab is voluntarily vacating positions in towns while keeping control of the countryside and able to launch mortar and small attacks on AMISOM bases. Despite efforts by the Somali government to enhance security in the liberated towns, al-Shabaab retains an ability to conduct operations and another incident similar to the Bulobarde attack is a possibility. While implementing order in these new areas will be a difficult task, the seizures are a positive development for the Somali government. Middle and Lower Shabelle Fighting along the coastal areas near Mogadishu mostly centered around the town of Qoryoley and other towns around Marka. Qoryoley was seized by AMISOM and SNA forces following several hours of intense fighting that left at least ten people dead. Al-Shabaab responded the following day by initiating a mortar barrage on the town. Around this time, al-Shabaab also attacked an AMISOM and SNA base near Janale, a small town on the Marka-Afgoi road a few miles from Qoryoley, and a convoy near


68

Intel: Issue 23

In Middle Shabelle, the largest security incident for the SNA was an internal dispute. On April 5, rival factions of the SNA exchanged gunfire at a checkpoint in El Ade. The incident occurred after one group ordered the other to dismantle an illegal roadblock they had constructed. The ensuing shootout killed five soldiers, including a commander, and wounded nine others. Another similar incident occurred four days later in Jowhar.

indiscriminately, killing one civilian and wounding several others. Convoy attacks are quite common throughout Somalia, but particularly around Kismayo and on the Mogadishu-Afgoi road.

Terrorism Al-Shabaab conducted several operations in Kismayo, demonstrating their continued ability to target JIA officials in the city. Gunmen killed a prominent elder and the leader of Awramale clan, Mohammad Jubba and Gedo Hussain Hafow. The following day, a UN The southern-most areas of Somalia were delegation arrived at Kismayo airport, which not subjected to the AMISOM offensives and was immediately attacked by mortars fired direct engagements with al-Shabaab as were by al-Shabaab. JIA security forces responded, other regions. Al-Shabaab holds much less resulting in several hours of firefights. On territory in this area, with the exception of April 15, assailants killed another JIA official Gedo, but is able to operate throughout the in Kismayo. They stormed his home, killing countryside and into Kismayo. him and several of his guards. The following day, two other JIA officials were killed. Al-Shabaab attacked AMISOM and Jubbaland Interim Administration (JIA) in Terrorist activities also continued in Badhadhe district, Lower Jubba, and SNA Mogadishu. A roadside IED detonated forces near Burdhabo, in northern Gedo. At near an AMISOM convoy in Heliwa least three soldiers were killed in the latter district, prompting soldiers to respond with attack. Al-Shabaab would later launch several indiscriminate fire. On April 8, a Quranic mortars at SNA forces in the same Gedo teacher was shot and killed in Wardhigley location. The next day, an AMISOM convoy district and a National Intelligence and was targeted by a roadside IED. The troops Security Agency (NISA) official was attacked were unharmed in the blast but opened fire in neighboring Hawl Wadag district, though

On April 15, assailants killed another JIA official in Kismayo. They stormed his home, killing him and several of his guards.


FocusOn: Somalia

he escaped with his life. The following day, a Vehicle-Borne IED (VBIED) in Wadajir district killed Mohamud Abu Haji, a district politician. There were no claims of responsibility, though al-Shabaab was suspected in the attack. On April 10, assailants fired mortars on the Turkish embassy, which is currently being built in Mogadishu, injuring three construction workers. This came a month after al-Shabaab released a statement threatening Turkish officials and aid workers. The Turkish government has been very supportive of the SFG to the ire of alShabaab. In Somalia’s central regions, al-Shabaab asserted its authority in the countryside near towns recently seized by AMISOM. On April 3 and 11, al-Shabaab gunmen attacked qat traffickers, killing two people, wounding another, and taking two traffickers hostage. Qat is a popular drug throughout the Horn of Africa, though al-Shabaab has attempted to control the flow of the plant. It is believed that al- Shabaab gets revenue through taxes levied on the transport and sale of the drug and is violently asserting this authority. These attacks also occurred outside Bulobarde, indicating that the insurgent groups still has some control over the countryside. To the north, a gunman killed two foreign UN employees at the Galkayo airport in Mudug. The victims were supposed to meet with Puntland President Abdiweli Mohammad Ali Gaas as delegates from the UN Office of Drugs and Crime (UNODC). The motive is unclear, though it is believed this was an isolated incident as the murderer has a history of violence.


70

Intel: Issue 23

On April 8, a VBIED exploded in Guriel district, southwest of Dhusamareeb, the capital of Galgudud. Aside from the death of the driver, a number of civilians were killed as well. Ahl Sunna wa al-Juma’a (ASWJ) militia, conducted security operations in the area, arresting several people. On April 14, gunmen ambushed a bus in Af Barwaaqo, Mudug, near Galkayo. At least two people were killed and several more were injured. Counter-terrorism Somali Special Forces (SF) conducted an operation in Qoryoley, capturing two suspected senior al-Shabaab commanders. One of the suspects is thought to have coordinated the 2009 suicide bombing of an AMISOM base in Mogadishu. The other is believed to be a trainer for al-Shabaab’s elite Amniyat Brigade. The same day, in Puntland, Security Minister Hassan Osman Alore stated that security forces had arrested at least 20 al-Shabaab suspects throughout the semi-autonomous state, in Bosaso, Galkayo, and Garowe. The following day, Puntland and Galmudug police announced the creation of a joint security force based in Galkayo. Puntland Police Commissioner Abdullahi Shire stated the new unit was intended to serve as a bulwark against al-Shabaab fighters forced north from the offensives in Hiraan and Galgudud. In the regions of the AMISOM offensive, security forces conducted operations in the newly liberated territory. In El Bur, Galgudud, explosive materials and ammunition were confiscated. Outside the town, roadside IEDs were found and cleared, though these operations faced some resistance from al-Shabaab militants in the countryside. In neighboring Hiraan,

security sweeps were mostly concentrated on Beledweyne as well as Buloburde and its surrounding areas. Explosives and suspects were also seized in Mahas. Geo-political Kenya faced a number of attacks in late March and responded with mass detentions and forced deportations. Assailants attacked a church in Likoni, just south of Mombasa, killing six people and wounding around 20 more. The following day, several empty boxes of ammunition were found in a Nairobi supermarket. Three IEDs exploded in Eastleigh, targeting churches in the predominately Somali neighborhood. At least six people were killed and 25 wounded. Two other incidents occurred on April 3 and 7 in the northern areas, near the Somali borders. No casualties were reported, however. Kenyan security forces responded with mass arrests, detaining thousands of people in the course of a few days. On April 1, unknown gunmen killed a prominent and controversial cleric, Abubakr Sharif, in Mombasa. Sharif had ties to al-Shabaab and allegedly ran fundraising and recruiting networks along the coast. His death sparked outrage and dozens gathered to demand the release of his body. Police claim they were not involved in the murder, though that notion will be difficult to dispel from the minds of many in the coastal Muslim community. Flashpoints to Monitor Mogadishu Security Plan Al-Shabaab has shown a continued ability to attack high-profile targets within Mogadishu. This has been exemplified by complex attacks and bombings on the UN compound, the Supreme Court, the airport, various restaurants and hotels, and Villa Somalia. The assault on Villa Somalia struck at the


FocusOn: Somalia

Given the wide scope of the arrests, the crackdown will have an adverse effect on alShabaab’s operation in Kenya

physical and symbolic heart of the SFG and was a wake-up call for the politicians. The assault involved an initial VBIED to breach the main security wall and several gunmen dressed in military fatigues who stormed the compound, killing several cabinet members, though missing President Hassan, who was out at the time. A new security plan was unveiled a few days later. Somali leaders have taken steps lately to improve security in the capital, particularly with the appointment of a new mayor and the February 21 complex attack on Villa Somalia. The main objective of the new mayor and governor of Banadir, Hassan Mohamad Hussain Mungab, is to improve security in the city. He has already conducted a large number of security operations in Mogadishu’s outer districts and implemented security reforms to consolidate the various offices and bring them under his control. Part of this involved the physical consolidation of various intelligence chiefs and national and international military and police commanders into a single building. Much of the new security strategy in the city, which was created to counter the

deterioration of safety since AMISOM forces vacated the capital to pursue offensives in the countryside, is to develop groundlevel intelligence. Locals are cautious about assisting security forces, however. Intelligence gathered from civilians is used to conduct massive sweeps and detain hundreds of people. Often, however, those arrested simply bribe the police officers and walk free a few hours later, sometimes seeking retribution against those who exposed them, creating a disincentive for civilians to cooperate with police. Puntland-Somaliland Conflict Heavily-armed Somaliland forces seized the district of Taleh, in Sool region in the disputed border area between Somaliland and Puntland. The forces held the town and surrounding areas for around 36 hours before voluntarily vacating. Somaliland Army spokesman Colonel Osman Abdullahi Said said that the military was erecting bases and conducting security operations to clear the militias from the area. Puntland responded by condemning the action as provocative and promised to respond. One of the campaign promises of President Gaas was to retake Lasanod, the capital of Sool region,


72

Intel: Issue 23

from Somaliland troops. This recent crisis gives him a chance to establish a firm position with his neighbours and shore up his domestic political support.

Federal Government (TFG). He is wellconnected with the political elite in the SFG in Mogadishu, allegedly acting as a whip to help President Hassan get votes to remove former PM Abdi Farah Shirdon. However, Other actors have pleaded for talks in an most local leaders oppose him, seeing Sharif effort to avoid violence. UN Assistance Hassan and the SW3 being forced upon them Mission in Somalia (UNSOM) head Nicholas by the SFG, JIA, AMISOM, and UNSOM Kay announced his support for dialogue and by an international deal that excludes warned both parties to prevent violence. stakeholders, as happened with Jubbaland Neither UNSOM nor the SFG has much and the Addis Ababa Agreement. This fear influence in the north and it is up to the two was strengthened when, after the clashes of quasi- states to calm tensions, something March 26, Sharif Hassan was sheltered at Taleh residents do not believe as they flee an AMISOM base outside Baidoa. Given their homes. the intense opposition that arose simply by his attempted presence in Baidoa, it will Outlook be difficult for him to legitimately rule the Short-Medium Term SW3 state, casting some doubt as to the Federalism In Southwest certainty of his presidency. Regardless, this Federalist violence erupted sooner than issue will be the centre of Somalia’s federalist expected at the Baidoa convention in late future in the coming months and add March. Much of this conflict revolves another dimension to conflict in this area around the battle between the SW3 and SW6 of Somalia, just as AMISOM continues its factions. The former group is attempting to campaign. create a state from Bay, Bakool, and Lower Shabelle, while their opponents would also Medium-Long Term like to include the regions under the JIA: Al-Shabaab and Kenya Gedo and Lower and Middle Jubba. The Life for ethnic Somalis living in Kenya SW6 has more momentum than its rivals, became extremely difficult this reporting especially in among the Digil and Mirifle period. A series of attacks prompted security clans and in Baidoa, which would be the forces to begin rounding up Somalis as centre of the proposed state and gain more terrorism suspects and hundreds have from an expanded territory. The political already been deported to Mogadishu. In the power that would be enjoyed by the leaders span of a few days, thousands of Somalis of a six-region state would allow them to were detained, despite possessing valid reassert themselves in the south, where identification and documents, and held at those clans were pushed off lands they Kasarani stadium in Nairobi. historically held. The SW6 has already adopted a constitution and elected a The Kenyan fear behind these operations constituent assembly and Madobe Nunow is validated, though the intensity of the as president. response may have been extreme. Kenya has been quite tense since the Westgate attacks Some of the contention comes from Sharif in September 2013. More recently, a VBIED Hassan Sheikh Adan, the former Speaker was discovered in Mombasa, and churches of the Parliament under the Transitional were attacked in Mombasa and Nairobi, and


FocusOn: Somalia

Eastleigh was targeted with IED attacks. Al-Shabaab attacks or those conducted by sympathizers have become more deadly in the past two years, though there are fewer of them. As a result, deaths-per-month has stayed fairly constant. This could be a result of security measures that have restricted the ability of al-Shabaab to carry out attacks with the same frequency, while hinting at the continued and increasing capacity for cells of al-Shabaab operatives or sympathizers to conduct larger operations. Given the wide scope of the arrests, the crackdown will have an adverse effect on al- Shabaab’s operation in Kenya, though at a high cost. Relations

between ethnic Somalis and the government is not likely to get over these events and religious tensions, particularly on the coast where the populations are largely equivalent, are fraying quickly. Due to increased attacks and raids on mosques and church, interfaith relations in Mombasa that were quite amicable and calm a few years ago now are a cause of discomfort and the situation will only worsen. Intelligence source: GardaWorld Xplored portal. For more information on registering for an account go to: http://xplored.garda-world.com


74

Regulars Issue 23

Working Girl January Feb and March are notoriously quiet times of the year for us in the CP and Surveillance industry so it is a good time to catch up with paperwork, admin and to look to learn a new skill. I’m currently studying Spanish as I have been booked for a CP task in the summer where Spanish may be required, I speak a few European languages already so I have been hoping that Spanish won’t be too much of a challenge. Every night as I get in the bath I put the CD language player on and off we go. I now know some very useful phrases such as “the lift is behind the green plant pot, or your car is in the garage.” However these language courses never have such useful phrases as back off dirt bag before I


By: Jacquie Davis www.optimalrisk.com

crush your nuts or something of the like, so if anyone knows the Spanish for the above I would be grateful to receive it.

Every night as I get in the bath I put the CD language player on and off we go. I now know some very useful phrases such as “the lift is behind the green plant pot, or your car is in the garage.”

Joking apart, learning foreign languages is always a good skill for CPO’s, on several occasions I have been asked by clients to pull together a team of German or French speakers for a job abroad. Even if learning the whole language is not possible due to time and job restraints, learning key phrases can be really helpful when traveling as a little effort with the lingo can go a long way no matter how bad you sound.

I have just completed and passed my level three investigators exam in preparation to be ready for the next round of SIA licensing for Surveillance and investigations which shall be coming in some time this year. Although the SIA have not confirmed this exam will be the only thing we will have to do for licensing they definitely said it would go towards it, so I’m now ready to pay out for yet another license to do my job! I regularly get asked as to what my thoughts are with regards to Professional Associations for Close Protection

Operators? I don’t actually belong to any of them but If you want to join one firstly check out who runs the Association, their background and what do they know about our profession, you would be surprised at the organizations that have Walter Mittys or computer geek’s heading them up. I am aware that the Circuit Magazine is affiliated with the British Bodyguard Association which as we all know is reputable and run by chaps that do the job and work on the circuit, so all I can offer as advice is do your homework see what the organization is offering and ask yourself is it worth the cost? Good luck in the coming months I hope you have a great and prosperous spring.


76

Regulars Issue 23

The new ABnormal

As a continuation to my last edition’s article, “Has the Advance become the At-Glance” I want to touch on the responsibilities of the leaders and experts in the industry to re-set the boundaries to the CRAFT.

I

recently had a conversation with a very close friend and colleague regarding why I continue to contribute through the BPI Security blog, Facebook and other social media outlets within the strict boundaries of what is the RIGHT and what is WRONG way of operating in this industry. His concern and fear was that, in doing so my message may be lost to a large segment who will continue to operate at a subpar and frightening level. I explained to him that there has to be a standard that is set in how executive protection is performed. We have to refute those other voices that teach, encourage and applaud middle of the road and lackluster performance. That behavior is a product of laziness and it is infectious. Last month’s article is a perfect example of how the new normal in conducting an advance is not even proactive any longer. It is more like window shopping for a client visit. You are not investing anything into the visit but walk away with a glimpse of what the real thing looks like, only if you had invested into the product [Advance]. The new abnormal is finding way too much comfort in the “Gray”. The majority of the

industry stays away from the black and white or right and wrong. The irony is that the gray is the new normal and it is a frightening thought when you really sit down and think about it. For the experts who have operated for years, experience allows them to delve in the gray via a work-a-round or shortcut without sacrificing THE STANDARD. However as I see more and more junior specialists using short-cuts as a standard procedure without any knowledge of the RIGHT or WRONG way to do things, they leave themselves on an island when it is time to recover BACK into the RIGHT. WHY? Because they do not know what it looks like. Their compass will always lead them back to the dark side of wrong. For instance, when you took your first driving lesson as a new driver, you instructor told you that upon approaching a STOP sign you are to come to a complete stop. Look both ways and proceed with caution while taking a quick glance again as you proceed through the intersection. That is the correct way. What if the instructor advised their students, “As you get more comfortable with driving you can start reducing your speed upon the approach to the stop sign and look for oncoming vehicles. If you don’t see any


By: Eric Konohia Front Right Seat

vehicles approaching you can do a slow roll through the sign.” The latter becomes the STANDARD and the new normal because it’s a shortcut. That latter instruction, although improper, comes from years of experience in driving. That’s where we are now – a crash course headed into a head on collision. It is only through years of experience that a specialist can occasionally move within that “gray” area as a work-around or short-cut. Even at that point he/she has accounted for every possibility in the event they have to move back into boundaries of standard operating procedures. But the problem remains that if this same specialists accumulates years of BAD experience, the “gray”, the work-around and short-cut is now a cheat that will expose the principal to vulnerability and the worst part is that the protection specialist and the team has no idea. The thought that YOU have no idea that what you are doing or not doing is putting the Principal in more dangerous is basis of this article. The fact that in your finite wisdom you are thinking you are doing the right thing yet at the same time you are making it easier for: intentional harm, unintentional harm and embarrassment. THAT IS DANGEROUS!!!! One by one I have been selecting individuals who meet a certain criteria of influence. These individuals are not remotely considered leaders nor are they considered experts, yet they have a measurable amount of influence among their peers, a baseline understanding of the CRAFT and more importantly exhibit a desire to ADVANCE.

In the future I will be hosting an invite only Front Right Seat Detail LeaderSHIP [not detail leader] Symposium. The focus is to tie and fit all of their loose ends together while multi-tasking active scenarios within a faced paced, Master’s level and above learning environment. Those that successfully complete the aggressive high paced week will be able to bring leadership skills to any detail they are on. This is not to build detail leaders as so much as it is to flood the industry with detail leadership skills and mindset that will be able to offer corrective solutions as they travel and matriculate within the CRAFT. The end result should be a viral desire to operate at a higher level within the Black and White….the RIGHT and WRONG. It takes years of working hard within a baseline standard and understanding of this CRAFT before even the most experienced specialist can comfortably use a work-around. To that point even the most experienced specialist knows that every work-around cannot be successfully implemented as the solution for the exact procedure every time. That’s where experience comes into play. The danger is when inexperience uses that same workaround as the baseline standard. The microwave is one of the great inventions of our time as a short-cut from the oven and/or stove. Companies cater entire frozen meals to people that exclusively use this short-cut method. But if you have never learned how to cook a meal and your microwave fails you are going to be eating out, which is another short-cut.


78

Feature Issue 23

Performance & development reviews - turn dread into desire I’ve just received an email scheduling a meeting for my annual PDR – Performance and Development Review (you may know this as the Personal Development Plan (PDP) or something similar).

P

reparation for this meeting seems enormous, not least because it involves drafting a document outlining (1) what the objectives of my job are (2) a self-assessment of whether I am meeting these objectives (3) presenting evidence that I am meeting other core criteria expected from all staff such as customer focus and team-work, (4) setting SMART objectives (more on this later) for the next 12 months, and, last but not least, (5) writing my learning/development plan. My first thought? Oh no, yet another thing I have to fit into my busy schedule. It is tempting to allow my natural laziness to conquer and do the bear minimum but this would be wrong. Not just wrong, but stupid. My employer is absolutely right – I need to review where I am and set myself targets otherwise how can I possibly progress? With this in mind, I thought it might be useful to outline how I plan to approach my

PDR in the hope that this might be useful to others who are working towards their own. Tackling the dreaded pre-meeting document The easiest way to approach writing your PDR is to split it into sections and concentrate on one at a time: (1) Identifying objectives Dig out your job description and look at what the original aims and objectives of your role were. It may be that your job role has evolved over time in which case I would recommend asking for this to be reviewed in the meeting to ensure you are able to set appropriate goals going forward. (2) Self-assessing performance Look for specific examples of how you have successfully achieved your objectives. If these were set properly they should be very targeted and relatively easy to measure. For example, “I will complete X


Dr Amy Burrell, Associate Trainer, Perpetuity Training course!). However, I recommend putting a positive spin on things by outlining how you plan to improve going forward. Set yourself another target, perhaps with an outcome that is easier to measure or has a more realistic timeframe for delivery to help you achieve your goal next time.

number of contracts in Y capacity in the next 12 months”. You could then just tot up the number of relevant contracts you have complete where you were working in the specified capacity. List these with the dates and “hey, presto!” you have evidence you have met the objective. Unfortunately measuring performance is not always this simple. In such cases, try your best to present practical examples of how you have met the objective. For example, if your objective is to deliver good customer service, don’t say “I deliver good customer service”, instead be specific: “My VIP and his wife were attending an event and he forgot his speech. I remained with him to maintain his personal safety but dispatched one of my team to collect his speech”. This demonstrates that you fulfilled your core role but also met the client’s very specific requirements and went ‘above and beyond’ to ensure his needs were met. Be honest – a reasonable employer would not expect you to meet all of your objectives perfectly so it is okay to admit to shortcomings (depending on the objective of

(3) Evidence for meeting overarching company aims Firstly, do you know what they are? My review document helpfully lists these for me providing me with a template that I need to complete with evidence that I am meeting each of the objectives. But what do they mean by evidence? Well, in my experience, the most practical way to demonstrate I have met an objective is to provide an example. So, in response to the question about teamworking I might outline a workshop event I organised whereby I liaised with delegates from seven different countries, the manager at the event venue, the travel agent, the administration office in my department, and the company finance team, to ensure the event ran effectively. Similarly, I might outline how I have contributed to the data collection for a research project as an example of results delivery. It is useful when providing examples to give as much information as possible and tie these directly to the objective being considered. Remember you can use the same example to demonstrate multiple skills, although I would aim to have more than one scenario overall to ensure the breath of your skills is illustrated. (4) Setting SMART objectives Many organisations will encourage you to develop “SMART” objectives. This provides a useful framework for setting objectives, specifying that they need to be: • Specific – to keep you focused • Measureable – you will need to self-assess


80

Feature Issue 23

against this objective next year to make sure you know how to measure performance • Achievable – how will the goal be achieved? Who will deliver against it? • Realistic – what is possible given the current resources? Are you in the right position to deliver on this? • Time-bound – setting deadlines gives you something to aim for I wanted to provide you with a really inspiring example here but I’m afraid my knowledge of the bodyguarding industry is somewhat lacking so apologies if this seems silly or unrealistic but I hope it demonstrates my point. I thought perhaps I could use a fitness example? In this case a SMART objective might be to reach a certain level of fitness, measured through a particular test (e.g. levels on a bleep test) before a particular date. I will not strive to include any more as I suspect I have (a) not provided a particularly relevant example, and (b) you’ll have got my point anyway!

complete your coursework, or help with the fees) if they can clearly see how doing the course would directly help you meet your objectives. Finally, if you are asked to submit the document in advance of the meeting, make sure you do so. Making sure that your employer/line manager has this in plenty of time will hopefully mean they read it thoroughly in advance of the meeting. Don’t forget to re-read it yourself before going in to ensure you are prepared, particularly if you are making a business case for funding for a specific piece of training.

Top tips for the meeting Now that you have done all the preparation you’ll want to ensure the meeting itself goes well. You might like to try using the following as a checklist: • Make sure you know when and where the meeting is being held so you are not late. • Make a note of who will be attending as this might give you an indication of how (5) Writing the personal development plan formal/informal the meeting will be. Also, This can be tough but it is worth giving this there may be decision-makers who hold some careful thought. Perhaps the easiest budgets there who could consider/authorise place to start is with mandatory training. spend for training courses. Are there courses you need to attend every • Take a copy of your review document and/ year/every few years? Are your licences up to or personal development plan with you. date? Do you need to refresh anything, e.g. • If you want to use the meeting to request weapons training? Then you can move onto training be prepared to present a business courses you personally want to complete. case for each course (particularly if these It is useful to outline these carefully, and are not run in-house and you need again be specific – if you want to complete funding). Remember to include how this a degree course, for example, which one do course would directly support your role. you want to do, when does it start, how much Also, consider the time off you would need does it cost, how do you propose to pay for to attend the course/complete coursework it etc. Also, remember to tie this into your as the company will need to consider how objectives, as you are more likely to succeed to cover your workload in your absence. in persuading your employer to support • Make notes of what has been agreed. you (e.g. with time off to attend training or • If there is critique of your performance


Dr Amy Burrell, Associate Trainer, Perpetuity Training

(none of us are perfect!), try to keep things in perspective and consider the critique as a core part of learning. Listen carefully to the feedback and make notes on how you might improve on this in future. • If you feel the critique of your performance is unfair, approach human resources for advice. Conclusion No matter how busy you are, you must invest time in your PDR. Your annual review meeting is a key opportunity to demonstrate to your employer that you are a valuable member of the team, and to outline how you want your personal development to progress. It is important to lay out targets clearly and link proposed training to clear outcomes that will benefit your employer, especially if you

At Perpetuity Training, we aim to help you build your career by offering a wide range of courses in Security, Investigation and Risk Management.

want to approach them to help fund your studies. About Dr Amy Burrell Amy holds a BSc in Applied Psychology, an MSc in Forensic Behavioural Science, and a PhD in Psychology. Amy is an Associate Trainer at Perpetuity Training; a company specialising in security and risk management training. To find out more about Perpetuity Training see www.perpetuitytraining.com or email training@perpetuitytraining.com Amy also works as the Network Facilitator for the Crime Linkage International NetworK (C-LINK) project based at the University of Birmingham. To find out more about C-LINK email Amy on a.burrell@bham.ac.uk

Specialists in Security, Investigation and Risk Management Training BTEC Level 4 Classroom Training Security Management Managing Security Surveys Risk, Crisis & Disaster Management

Workplace Interviews & Investigations

Distance Learning Courses SYI BTEC Level 3 Certificate in Security Management SYI BTEC Level 5 Diploma in Security Management

Other Training Through our sister company Arc Training International, we can also offer the following courses: First Response Kidnap & Ransom classroom training Business Travel Security Management One Day Workshop Kidnap Risk Reduction & Response One Day Workshop And many more...

www.perpetuitytraining.com ● 0116 277 3313 ● training@perpetuitytraining.com

Part of The Linx International Group


Exceeding the standard in medical education at every level.

www.nerams.co.uk


By: Orlando Wilson Contractors Workout

Contractors Workout As a security contractor you need to keep a decent degree of fitness at all times.

T

his can be difficult on operations as you may not have the time or facilities to workout. When on operations and training contracts you can be working 16 plus hour’s a-day and when you get down time you need to eat, sleep and prepare for the next day’s work. A lot of times on operations in 3rd world countries we do not have the space or facilities that you have in gyms in Europe and the U.S. We also spend a lot of time waiting around in crappy apartments and hotel rooms for contracts to commence and on down time. For personal security reasons we cannot go for runs etc. as most times we don’t want too many people to know we are actually there. The locals in most places can spot foreigners a mile away and word would soon get around there are Gringos training

in such and such a park etc. Word gets out your there and you can blow the operation or be targeted for kidnapping or just shot up! Endurance is one of the main qualities you need; also you need to be able to move. If you have too much bulk and muscle it can make you slow and limit your flexibility. You need to be able to cross obstacles, crawl for long distances, access weapons in tight spaces and fight. It’s ok being able to run 5 miles at a decent pace but you also have to be able to fight when you get to your objective and run back again! Leg strength is very important, you need to be able to walk and run for long distances to be able to get to an objective and if things go bad you need to get out of there as quickly as possible. An important consideration is the climate and environment you’re going to be working in, you have to be acclimatized. Heat,


84

Feature: Issue 23

humidity and altitude can have big impacts on someone’s performance. I have even seen this when training with clients in Miami, the clients are gym fit but it another story in the Everglades walking through water in 100 degree heat and humidity, the mosquitoes just add to the fun! So, the emphasis needs to be on high rep’s and exercises that use as multiple muscles in each exercise. All exercises should replicate movements we would be using on operations in the real-world. If you do not have time to dedicate to a fixed training session complete sets of reps throughout the day, a set of 20 press ups takes a minute, you should be able to fit in 5 sets a day. Also walk where possible and use stairs not elevators; you’re easily ambushed in an elevator as there is no escape!

Diet When home in Miami or other 1st world location where I have a choice of what to eat I tend to lay off the carbohydrates and stick to meat, vegetables and no junk food. Contractors drink alcohol, but always try to stay off beer; wine and spirits are better for you in moderation. Caffeine is a must for most contractors; there have been jobs where I have lived on Coke-Cola, just for the caffeine and sugar! On contracts a lot times you don’t have a choice of what you’re eating. At the time of writing this I am in West Africa and the diet here is heavy on carb’s; a lot of rice, yams, pasta etc. with very small serving’s of meat and fish compared with U.S. and Europe. So, you need to be able to perform on whatever food is available, food is just calories. On operations you need to be able to go without food for at least 24 hours and still function, being able to eat every few hours is not an option; I try to eat once in the morning and then again in the evening. If you are in a sniper hide or observation post you need to keep your movement and noise to a minimum, food is not your main concern, you can always add on a few pounds if you get back to a safe area! Exercises 1. Running The basics, you have to be able to run. At a minimum you need to be able to keep a steady pace for 40 minutes. Make maximum use of hills or if you are cooped up in a hotel find some stairs to run up and down. 2. Risks Inc. Sit-up This exercise uses the legs and core muscles


By: Orlando Wilson Contractors Workout

On operations you need to be able to go without food for at least 24 hours and still function, being able to eat every few hours is not an option; and goes through four of the main shooting positions. Stand in a boxing/shooting stance, left leg forward. Keep your hands up in front your face (hold light weights to simulate a weapon) and drop to a kneeling position. Then drop to the seated position, hand remain up. Drop back into the lying position, hands and head up. Now get back up without using your hands. Get back into the seated, kneeling then standing positions. Repeat with the left leg forward. Do 50 reps per day. 3. Squatted walk & bunny hops This exercises is excellent for condition the legs. Tactical there are times when stalking a target you have to use the squatted walk to stay low and behind cover. Best to get use to it before you need to use it. Get down in a squat position and bring your hands up in front of your face, hold light weights if you wish. Now walk in a squatted position for 10 meters and turn around. Remain in the squat and bunny hop back to your start point. Repeat until you’ve had enough.

4. Front kicks These are good for flexibility and a basic and highly effective unarmed combat technique. Stand in a boxing stance with you left leg forward; bring your right leg forward until the thigh is parallel the ground the snap out your foot, keeping the toes angled up. Complete 50 reps and repeat with the left leg. For extra resistance you can use leg weights. 10 sets of 50 reps should keep you in condition. 5. Press ups The press up is a simple and very effective exercise. We need upper body strength for crawling on the ground through low grass and low cover; the whole of the upper body is used in conjunction with the legs to push and pull the body along. 6. Knife kata’s Knives are highly effective weapons if use properly at close quarters, these kata’s with weighted bars help to increase strength and flexibility, which is also a necessity when using pistols and rifles. This exercise also strengthens the forearms and your grip; having a good grip is one of the essential requirements when using firearms.


Feature: Issue 23

Use metal bars (for safety do not use real knives) that add some resistance but still allow you to perform the movements smoothly. Wrap your wrists for more support if required. Start with the bar in your right hand and by your right side, the first cut will be low across the body at waist level to the left hip. Then angle the bar and cut up across the body until at the right side

of the neck. Angle the bar again for a cut across the neck, and then back down across the body to the right hp. Finish up with a stab to centre of mass. Repeat with the left hand and stating with the first cut to the neck and work in reverse. Do this for about 15 minutes and then finish with 15 minutes of combinations of 10 cuts from all angles, changing hands after each combination.


By: Adam Barrett

How to become more employable by specialising in pre hospital care

Many close protection operators (CPO’s) are now identifying the value of becoming specialised in other aspects that surround the role.

O

ne of these specialist areas is Pre Hospital Care (PHC), and with this in mind I would like to share my thoughts and tips with you.

Having a specialism in medicine will allow you to move into new roles, by becoming a greater asset to any potential employer.

The following thoughts and tips should help you answer those and maybe give you some further development ideas for your future. What qualifications do you need? If you know PHC is the route you want to take and have done a bit of research, you may, at this be point, be thinking FPOS-I, then MIRA then some other impressive sounding course with an acronym, is the way forward.

If you are a CPO who is keen to develop your PHC skills, you may have questions like; what For the most part, as a newly emerging medic, qualifications do I need? Who can help me get these? How do I manage my development? How these qualifications will give you a good level of industry-required skills. However most of these do I stand out from the crowd?


88

Feature Issue 23

Professional Registrations are run by regulatory bodies, deciding which one to use can be confusing and you will often hear many mixed messages. courses are designed as specific competency areas, and as stand alone courses do not give you any professional registrations. Before spending lots of money on defining your skills with a collection of courses, the question you should first ask yourself is ‘how can I be identified as a competent and employable medic’? The simple answer is; you require a professional registration and you need to document continual professional development. Professional Registration Not having a professional registration means that you if you use some of the more advanced skills, it could have legal consequences.

on from FPOS-I is to undertake a medical education program that gives you a professional registration such as HCPC, AREMT or NAEMT, then move into your area of specialism. How do you decide which registry body to use? Professional Registrations are run by regulatory bodies, deciding which one to use can be confusing and you will often hear many mixed messages.

To cut through these mixed messages, the best piece of advice is to look at where you aim to work. Many overseas employers recognise HCPC, AREMT and NAEMT, however if you aim to work in UK you will need HCPC Having a professional registration will benefit standard training. You will need HCPC training you because it ensures you have a foundation because the NHS only employ HCPC registered of learning. It gives you greater understanding Paramedics and other staff with UK accredited into the human body, how it works and how ambulance qualifications. The HCPC may it responds to treatment. By having this base level of knowledge you will be in a much better recognize and register AREMT and NAEMT qualifications but this is done on a case by case position to develop your skills further, and develop a specific competency area, such as ALS basis where you will need to demonstrate you meet their criteria. and MIRA. The right way to develop yourself is to start from the bottom and work your way up. Don’t be rushed into thinking you can by pass some of these stages, they are essential in making you the best medic you have always wanted to be. So, my advice for your next step following

By registering with a professional body you become part of a regulated organisation, which gives you the authority to undertake work at different qualification levels. All these registrations help with making you become a competent and employable medic,


By: Adam Barrett

and in addition you should be planning your continual professional development to ensure you remain competent while expanding your skills.

Changing your approach and mindset is the key to not becoming the first type of person described here

An employer wants to hire people who are professional and competent in role (and are committed to staying that way). You can be that person if you commit to developing yourself with a structural approach to CPD.

Look at what your scope of practice is and break it down into key areas such as: • Common areas of practice • Infrequent areas of practice • Rare areas of practice

The most important part of you new approach is that development is an ongoing cycle. By Continual Professional Development Once you have a registration with a professional making it an ongoing cycle it means you will always continue to improve your skills. If you body you can now begin your commitment to do not maintain your skills they will degrade Continual Professional Development (CPD). Yes you have probably heard of these three little rapidly. letters but have you ever thought what the lack So how do you manage CPD? of CPD means to an employer? In a word….. You need a system, not just a portfolio! LIABILTY.

Put yourself in the shoes of a potential employer Once you have identified these you can attribute risk levels to them and identify where you will and ask yourself this question; who would you need to focus your development. hire out of these two types of applicants? • An operator with a huge list of certificates from numerous five day courses they have attended, but cannot legally use most of the skills learned. OR • A registered health care professional who conforms to an internationally recognised code of practice and undertakes regular development training relevant to their scope of practice. The choice is obvious? But you would be surprised at how many people focus on being the first and not the second.

For example: Problematic airway management may be an infrequent or even rare occurrence in your role as a CPO medic in Afghanistan. The outcome of getting it wrong is life threatening. The probability of getting it wrong is high due to the fact that is a rarely practiced skill. This puts in a high risk category. If on the other hand you are a rapid response Paramedic in UK and deal with problematic airways several times a month, then the likelihood of getting it wrong is reduced. Therefore you might choose to put this in a low risk category.


90

Feature Issue 23

Airway management

Outcome if done incorrectly Life threatening

Airway management

Life threatening

Area of skill

Nature of dealing with this problem Done several times a month Rare occurrence as located in Afghanistan

Category of risk Low High

employer can verify what you state. • It should demonstrate a methodical approach to development and competency over time. • It should reflect your whole scope of practice and future ambitions. • It should be obtained from a diverse array of development sources. A prioritised list of training needs and a plan to execute that, ensures you remain competent and • It MUST be factual and auditable. safe to carry out your role. So my suggestion is that your next email to a potential employer should contain a cover Just because a certificate is valid for three years letter, a CV and your CPD portfolio, along doesn’t mean you don’t need to undertake with an explanation of how you prioritise your further development. Many certifications are development. on a three year renewal scheme, and although the certificate demonstrates you reached These four things will be what potential the standard at the point of certification, employers take notice of. If you present yourself remaining competent at that standard is your in a professional manner and with information responsibility. that covers all their tick boxes, you will be a step ahead of the others. You already do CPD but may not realise it Every article you read, documentary you watch In summary and even every conversation you have can It is a competitive market out there so hold hidden learning outcomes. To use these specialising in medicine can be a way to events as CPD, all you need to do is document distinguish yourself and become more what you learned from the experience and employable. Being more employable means link it to how this lesson can influence the way taking steps to get the foundations right and you practice for the better. This could even be structuring your CPD so that you stand out something as simple as recognising an error made by another medic, and documenting what from the others. Registering with the right system you have in place that prevents you from governing body that matches your ambitions is key, and if you combine all this with a great CV making the same mistake. and CPD portfolio you will go far. So how can all this help you stand out in the If you have any questions or are keen to know crowd? more about this area, you can get in touch with • You should present your CPD portfolio in a easy to read and simplistic format to potential Adam Barrett, Director of North East Rescue and Medical Services on info@nerams.co.uk employers. and 07841 337152 • CPD should contain auditable references to the evidence you have documented so that an So understanding what risks you face and the likelihood of those risks becoming realised, will lead you to decide what development training you need to undertake, and how frequent that training needs to be repeated.


BBA Protect Who’s protecting YOU...?


92

Feature Issue 23

Technology is a big part of our lives today, 5 and 6 year olds can often be seen holding IPods and IPads, 70 and 80 year olds are now playing Candy Crush and chatting on Facebook, you can go anywhere in the world and to the most downtrodden places, you will still get internet access somewhere.

P

eople across the world are becoming more proficient with technology, and because more and more people are becoming proficient, the risk of being spied on is much greater as basically anyone can operate amateur spying devices. It has become so easy to spy on people, and it is being done every day across the globe in numerous places without you even knowing about it. These days, you can find bugs/spy gear literally anywhere, from Amazon to EBay, European websites to Chinese websites, from professional stores to dodgy shops in Chinese areas of all major European cities. You don’t need a lot of money to purchase this type of equipment and you certainly don’t need to be a techy geek in order to operate them. If you want the best equipment, then yes you will need means to spy on someone, but you will notice that even some top European sellers are actually selling Chinese gear!!

If you go to the Champs Elysées in Paris for instance, there is a spy shop claiming to be the best thing since sliced bread, they are selling Chinese equipment over 20 times its Chinese price! How easy has it become to listen to someone in a room? It costs under 30$ to purchase a Chinese listening device. Simply insert a sim card which can’t be traced back to you, make sure you charge it up using the USB cable you got with it, and that’s all. Now place the listening device where you want it. You can choose to be called with voice activation or call it yourself when you want to hear what is going on. That is all there is to it. Government Surveillance I won’t touch upon government surveillance or state of the art bugs placed by government teams. It has to be made clear that to defend against the professionals you will need to bring in TSCM specialists that have the latest kit and equipment.


By: Yoni.C CPO PERSONAL TSCM KIT As CPO’s, nobody expects us to be TSCM specialists or to walk around carrying an Oscor blue!!

The most important of all is the performance of the equipment and quality; this is why I asked a friend in the TSCM industry for information on the equipment before purchasing it.

What we are up against The chances are that we will be up against cheap, TSCM Kit details, description, and composition amateur devices. PELICASE – TO KEEP ALL EQUIPMENT There are thousands of possibilities and reasons SAFE AND DRY as to why you or your principal may be spied on. RD-10- NEW GENERATION 
PORTABLE It could be directed at you or your principal RF DETECTOR 
AND HIDDEN CAMERA with knowledge on your identities or you could DETECTOR be a random target. Hotels, vehicles, offices etc. … the locations and possible scenarios are endless. Without thinking of complicated examples, lets take 1 scenario. - Your principal likes a bit of fun on the side and is marries. It will take 2 seconds of footage or one sound recording to break his life, career and marriage. It became evident that some basic kit is needed It became evident to me that some very basic TSCM kit is needed on CP operations. It is our job to defend against various risks and threats therefore this is something and an issue that should not be overlooked. About the personal TSCM Kit for CPO’s It needed to be small and light, not too expensive, whilst including all the necessary kit to detect amateur devices, in a Pelicase to offer maximum protection to the equipment.

Four Detectors In One - Hidden Camera Detector - Finds Hidden Cameras On/Off-Wired/ Wireless - Blink Camera Scanner View Finder On/Off - Fast RF Big Scanner Detector- 20 MHz to 6 GHz

 - Sensitivity Adjustments
 - RF Signal Strength Meter Ten Colored Light Array
 - Covert Pocket Silent Vibration Alert Mode
 - Hidden Camera Finder Blink On/Off
 - Light Weight And Small
 - Telescoping Antenna transcends to a flush mount on unit
 - Antenna can bend when fully extended for pinpointing alerts


94

Feature Issue 23

- Instantly Toggles from RF Bug Detection To Hidden Camera Detection
 - Size: A mere 3 inches X 1.75 inches X .5 inches thick! Detects The Presence Of Cell Phone Transmissions 
 Detects The Presence Of GPS Transmissions Detects And Alerts You To Digital And Wi-Fi Transmissions MD-40 MOBILE PHONE DETECTOR The MD-40 detects the presence of regular and/ or concealed GSM mobile phone units. This pocket-sized unit silently vibrates when it detects a mobile phone that is in use. The MD40 identifies the frequency in use by phones around it. (Calls, SMS, MMS) The Graphs and frequencies show up on the MD-40 screen.

When it comes to affordable quality kit, it doesn’t come much better than the WCH 350X. I love this device and it will track down and find all wireless hidden cameras, you can put automatic scan on it or do it manually. When you find the camera and lock on to it you can take screenshots or tape what the camera is recording, this little beauty is also a DVR. It also has an external camera input connection. See below the great little things you can put in your TSCM kit to make the most of the WCH 350X and its DVR capabilities BUTTON CAMERA

WIRELESS CAMERA HUNTER WCH 350X

With this button camera included in the Pelicase with the rest of the kit you will be able to use the WCH 350X as a DVR and record whatever you like. You can plug the button camera in the WCH 350X, then put everything in a suit left hanging in your hotel room. This way you will be able to record what went on when you were not in your hotel room. - Scanning Range 0.9~3GHz, 5~6GHz
 - Ideal counter surveillance device to trace and position wireless camera. - Fully automatic scanning and recording video and snapshot
 - External camera input connection to act as portable DVR
 - Adjustable frequency bands, up to 16 band; preset and mask
 - Buzzer and vibration alert, metallic design, LED indicator
 - Operates as wireless receiver to allow up to 6GHz frequency band
 - Supports memory card up to 32GB

You can also use the button camera on Recces. It will save drawing attention whilst you are taking pictures. Simply wear the button camera on your suit or any jacket with buttons on, or even in a bag and just walk around the hotel and do your recce normally. It is all being filmed covertly and brings piece of mind and makes it all look a bit more natural…lets face it, how many tourists take photographs of toilets and fire exits! Technology is right here amongst us so lets make the most of it.



96

Editorial Issue 23

Team Leading & Delegation

Managing a Security Team can be a stressful business and by managing the art of delegation it will help you to manage your time more effectively which will give you more time to concentrate on the tasks that require your most attention.

D

elegation is not to be confused with just passing out of tasks to others, some thought should be given into how the Team Leader delegates. By breaking the team down and giving key team members certain areas of responsibility to add to their duties is a great way of ensuring things are done. Use your teams strengths to your advantage as that is what a team is for, if John was a mechanic in his past employment then make him in charge of the vehicle fleet, if Steve has an interest and holds several medical qualifications then put him in charge of all things medical. By giving these responsibilities to others you can ensure that there is a responsible person in charge of that area whom can report to you any problems and can provide you with any info you require upon request. Delegation like this can half your workload and make you much more effective as a leader, whilst delegation is not always the easiest option as inevitably there will always

be areas that you feel you can do better than if you gave it to a team member, if this is the case then take some time and show / instruct the team member how you would like this area taken care of, this will take a little time and effort however the long term benefits will make it worth while. Knowing When to Delegate The biggest issue most new Team Leaders face is knowing when to delegate and they try to take on too much which minimizes their effectiveness in their role, times to delegate – • When the workload becomes too much and you have not enough time to complete all of your tasks effectively. • When the time you need to spend on your most important tasks is being cut short. • When it becomes clear that certain team members may need to develop in certain areas. There are many other benefits to delegating apart from the obvious one of giving yourself


By: Shaun West www.shaunwest.co.uk more time to deal with the areas immediately requiring your attention such as the development of team members. If members of the team are to develop they will need new challenges and by delegating certain tasks you can gauge and evaluate their ability in certain areas and spot areas in that person that may require developing or improving upon. It is all too easy to hold onto all of the tasks and try to do yourself when you may have valuable experienced operators within the team who’s morale will suffer if they spend all of their time doing low value meaningless work. Knowing What to Delegate Look at your job and what you are employed to do, if there are routine tasks that you may have always done but which impede and become an inappropriate use of your time then it is time to delegate that function or task out. Delegate a project, which it makes sense for one person to handle as this will be a good test to see how the team member manages and co-ordinates their work by giving them something worthwhile to sink their teeth into can be a great motivator for some but become a chore for others so you may well learn a lot about you team members. As mentioned previously in the article if a team member has a special aptitude such as being highly qualified in medical skills, or was once a mechanic then it makes perfect sense to make best use of the teams skills.

Knowing Whom to Delegate to It is very important to have a good understanding of your team and of the people whom you are going to delegate your tasks to. The person must first of all have the skills and ability or at the very least the potential to carry out the task and take on the responsibility, you must also be able to trust this person. Some tasks can be delegated amongst 2 or 3 people which will help ease the burden and allow the team to work together towards a common goal, if an important function of the team is delegated to one individual you must ensure that the task does not over burden them and keep an eye on the other duties they have as some of these duties may now need to be distributed between team members. Once you have delegated a task you must give the authority to the team member to be able to finish it. There is nothing worse than a micro manager sitting on your shoulder watching your every move and it will only hinder the team member in the task an could stop them using their own initiative. Delegate with a Plan Being new to Team Leading can be daunting especially when you are in a team with vast experience, however you will have to get over this because as team leader you have the right and obligation to delegate. It most definitely won’t happen perfectly first time and your ability to delegate will improve with

Once you have delegated a task you must give the authority to the team member to be able to finish it


98

Editorial Issue 23

experience. There are many people whom are not cut out to be a team leader but they are a fantastic operator and people whom make fantastic team leaders whom maybe wouldn’t reach the same levels as others as an operator. Man management is an important skill set for team leaders and all decisions should be made decisively to avoid prevarication, for this to happen you need to learn to be assertive, all delegation should also be done in a positive and assertive manner so the person you are delegating too knows that you have confidence in their ability to carry out the task. Plan ahead, if you expect the operator to be efficient in the task you have given them then you will have to ensure that you yourself are well organized. By having no plan for things that are going on it will be hard to assess the work which you have asked others to do, you must take the time to assess the person and how they are performing with the task given. Discuss the task and function in depth with the operator that you are delegating to explaining clearly what is expected of them. Ask the operator if they have any questions so you are happy they fully understand what is required of them. If the task is of a time critical nature it will be necessary to set deadlines and targets and you will need to be more specific of what is required and explain that you are always at hand should they need any support in completing the task. Support in Delegation Ensure team members whom have been delegated tasks know they have your support. If you are delegating to a new team member it may in the early stages be necessary to share the tasks until you get the

opportunity to gauge their ability. The monitoring of progress is important and it is all to easy to forget about things until it is too late and the deadline looms, adaptability is key and deadlines and objectives may need to be changed as objectives change however there are some deadlines which will be set in stone and cannot be changed such as our principal attending major events that have been planned months/years in advance. When tasks have been complete it is important to give praise and review how it went, if the person failed to deliver this will also need to be discussed. Always focus on results rather than methods, if the operator does not carry out the task as maybe you would do it is important not to come down hard on them as some people have different methods of operating, what works best for you may not be best for someone else and if you look on you may just learn something. Fears of Delegation When you are new to team leading it is natural to have a fear or to feel uncomfortable in the delegation of certain tasks. There are many reasons for this, you may doubt the operator’s ability to carry out the task and fear that they might actually create more problems than they solve. This is where the trust must come in, even if they make a mistake they will learn from the mistake and it will only benefit both the operator and the team in the long run. You may well think that delegating certain tasks may waste time as it may seem quicker to do the task yourself, this may well be true but moving forward as your career progresses you will no doubt need to delegate more so the earlier you start the better.


By: Shaun West www.shaunwest.co.uk Some people may well actually fear that by delegating that the person they are delegating to is more qualified than them and will do a better job so will have a fear that they will take the spotlight and be seen as more worthy in the role than the actual team leader themselves. You must remember that it is you that is team leader and it is you that has been selected for the position because of your ability to do the job so if you have an operator whom is a fantastic asset on your team then use them and do not become afraid of them.

and development of your team whilst improving overall productivity. If schedules are getting tight then you must delegate, if you are under pressure passing tasks on to the right person will save time in the end. Remember to delegate assertively and with confidence, so the team member knows exactly what they are to do and what is expected of them.

You as the team leader are ultimately responsible for the work that you delegate Summary out so remember to delegate with a plan Mastering the art of delegation will mean that everyone within your team will benefit. utilizing team members strengths so you can It will help yourself as a team leader to better operate at heightened effectiveness in the manage your time and it will help interaction areas that you are needed most.


100

To place a classified lineage or box advertisement telephone our sales team on: +44 (0) 191 6450 865

Classifieds United Kingdom

3D Security Ltd Taunton, Somerset, TA1 1TG Based in Taunton 3D Security provides security services for a wide range of clients. Whether you need a security guard in Somerset, event security in Leeds or Close Protection in London we will provide a solution for your needs. T: +44 (0)1823 253 001 W - www.3dsecurity.org E - enquiries@3dsecurity.org.uk A.B.I. Solutions A.B.I Solutions is a dynamic, forward thinking company, specialising in surveillance, security and investigations with local, national and internationalexperience. A.B.I provides a wide range of services to the corporate sector and individuals alike. W - www.abisolutions.co.uk Amanda Campbell A highly motivated and experienced female operative both CP and Surveillence training T – 07596542249 W - www.amandacampbell.org.uk E - ac@amandacampbell.org.uk Ambassador Security Management ASM MK Lions Arena, Grafton Court, Snowden Drive, Winterhill, Milton Keynes, MK6 1AJ, GBR. After successfully gaining ACS (Door Supervision and Manned Guarding) along with ISO 9000, we here at ASM have a dedicated management team with hundreds of years combined experience in the security industry. W: www.asmsecurity.co.uk E: scott@asmsecurity.com T: 08458335750 Ark Personal and Asset Protection Ark, 2b Crow Lane, Rochester, Kent, ME11RF, GBR A small, efficient, highly descrete company employing ex special forces and detectives for all civil and corporate covert needs. E: Office@arkprotect.com T: +0044 01634 845526 Argus Europe County Durham Argus Europe has been providing specialist training for high-net worth clients and their families for close to 20 years, worldwide. Argus Europe now offer accredited training for CPO’s, Surveillance Operators and Private detectives. Argus Europe is an operational company working globally with an extensive variety of contracts. W: www.arguseurope.co.uk T: +44 (0) 8456 123 843 Atlantian Business Solutions Group Rutland, LE15 6SD, GBR Atlantian Business Solutions has been designed to help both individuals and New Companies build for the future as well as support others with training needs. T: 07725970954 W: www.atlantianbsgroup.com E: info@atlantianbsgroup.com

Briareus Security Our aim is to give a complete, discreet and professional service to all of our clients, be they large corporations, small businesses, local authorities or private individuals, all tailored to meet their individual needs. W: www.briareussecurity.com E: info@briareussecurity.com Alastair Christie Advice on site security, perimeter fencing, lighting, CCTV and manning requirements. Monitor and advise on guard force setting up site procedures and guard SOP’s. T : +44 (0)7736 328112 E : ally.c9496@yahoo.co.uk Control Risk Management Solutions - CRMS Ireland Executive Close Protection Operations & Training (B Tec Level 3 Diploma Edexcel) Threat & Risk Assessments, Consultancy Services. W: www.crmsinternational.com E: martin@crmsinternational.com Crest Security & Surveillance Ltd 51 The Crest, West Heath, Birmingham, West Mids, B31 3QA, GBR Highly experienced Security Consultant with a proven record of accomplishment in the field of protective security. Skilled in all phases of risk assessment, operational planning, logistical organisation, implementation of security measures, security team leadership, project coordination, and delivery of security advice to a high profile clientele. E: info@stephencahill.co.uk T: 447977071427 CSI Protection Ltd International, GBR A well established security consultant and personal protection operative providing high or low Key protection to high risk and prestigious clientele. Specialising in the maritime industry as a consultant for private vessel protection on super yachts world wide. W: www.csi-protection.co.uk E: gary@csi-protection.co.uk Custodia Custodia is an independent client focused Specialist Security & Risk Management Company, specialising in Risk consultancy and Security project management. Providing a comprehensive portfolio of Risk mitigation solutions to assist Businesses and individuals to plan for, manage and mitigate risk. T: 01432 277693 W: www.custodia.co.uk DF Risk Management Solutions DF Risk Management Solutions N.I. is a modern, professional risk management company, with a diverse range of global strategic experiences and a team of executives who possess dynamic but complementary backgrounds. T: +44 (0)7837642686 +44 (0)7758743918 W: www.dfriskmanagementsolutionsni.com Executive Protection Officer Worldwide CP services W: www.executiveprotectionofficer.com

First Class Executive Security Nottingham, UK, Nottingham based, full-service company specializing in Bodyguards and Security Consulting services. Extensive experience in VIP security, also caters for public and private sectors. W: www.firstclasssecurity.co.uk T: 0115 9266466 G6 Global G6 are specialists in all types of radio, telephony and satellite communications for both voice and data with particular emphasis on covert communications installations in both vehicles and fixed locations. In addition, our range of personal covert radios and bespoke accessories is extensive. W: info@g6-global.com T: +44 (0)1454 610050 Gordon Russell Highly trained frontline Close Protection Operatives available for UK and International contracts. Our experienced CPO’s can offer bespoke packages to meet all clients needs, including a variety of language skills. All SIA licenced, BBA member E: Bodyguard-cpo@Email.cz T: +44 (0)7917 281 004 James Izett All close protection task undertaken, including training tasks. Medic (Registered with the HPCSA, Registered FAAW instructor and Assessor E : J.Izett@gmail.com T : +971 (0)505 574 350 Janice Gurney Proficient and diligent Security Professional gaining extensive knowledge and experience within the security sector. Proactive individual who has a logical, flexible and conscientious approach to all challenges undertaken, ability to work as a member of a team or as an individual willing to work anywhere. T : +44 (0)7885 793061 E : janice382006@gmail.com International Centre of Special Training International Centre of Special Training is an international training and security company based in the United Kingdom. Its priority objective is to provide services to the highest level. W: www.icost-team.com T: +44 796 736 55 65 IPSS Security Northfield, Aberdeen, AB16 7EX Security and protection services - UK and overseas. BBA Member. T: + 44 (0) 1224 69455 W: www.ippssecurity.co.uk ISS Training Ltd Riverside Cottages, Nidd Walk, Pateley Bridge, Harrogate, HG3 5NA ISS Training Limited are providers of specialist covert surveillance training courses and publications to the security and investigative industries, enforcement agencies and specialist military units. Formed in 1990, we are the longest established surveillance training company in the United Kingdom. Our credibility and reputation


is widespread and we offer nationally recognised qualifications. BBA Member. T: + 44 (0) 1423 712265 W: www.intelsecurity.co.uk Jason Morris Security Hertfordshire, UK Providing a wide range of Door supervision/ security for V.I.P and prestige venues, Concerts, Functions, Corporate and Personal Security, Weddings, Private Parties, Gala Dinners, Business Awards & School Proms, Close Protection and Body Guarding Static Guarding and Stewards. T: 01462 478900 W: www.jasonmorrissecurity.co.uk E: agosselin@jasonmorrissecurity.co.uk John Featherstone Security professional with operational experience gained in a variety of theatres. Main specialities close protection and surveillance. T: 24hrs : +44 (0)7702 740722 E: john@johnfeatherstone.co.uk W: www.johnfeatherstone.co.uk K9 Support Services Ltd K9 Support Services UK Ltd is a supplier of specialist drugs and explosives dog/ handler detection service (which includes arms & ammunition) to individuals, businesses, and the public sector. T: 0845 643 6393 E: info@k9support.org.uk Logas International Tyne & Wear, SR1, GBR Front line SIA, International CPO. Private Investigation and Surveillance operator. E: wscarr@logasinternational.com MLK Security and Protection Services Swindon, UK Close Protection Officer and Door Supervisor E: mattleekane@hotmail.com T: 07917654978 LJE Security Services North Yorkshire, HG1, GBR Close Protection, Residential Security, Asset Protection, VIP red carpet Security and Private Investigation. E: leanneedmondson@yahoo.co.uk One Events Grantham One Events offers you a stress free solution in the organisation, putting together and running of an event. Thisis accomplished by having a group of specialised companies from different industries working together for a more complete service for you. TEL: 0870 974 6779 W: www.oneevents.info Plymouth Close Protection Highly versatile, physically fit and accomplished security professional with cumulative experience in the areas of security management, close protection, crisis management, risk assessment, emergency management, asset protection and security training. E : chris@plymouthcp.co.uk W : www.plymouthcp.co.uk T : +44 (0)1752 500807 PPSS Group Body armour and stab vests provide a functional solution to individuals who require extra protection in their chosen vocation. All PPSS (formerly ASEO) body armour and stab vests are certified by the UK’s Home Office (HOSDB) and offer unrivalled protection from blunt trauma caused by a punch, blow or kick. Based on our professional frontline experience and extensive research we can confirm that an impact based assault is a more likely event than an attack

involving an edged weapon or firearm. T: +44 (0) 845 5193 953 F: +44 (0) 1765 603 512 E: info@ppss-group.com W: www.ppss-group.com Presence Security Presence Security (“ PS ”) is a bespoke security company providing protection for private individuals and VIPs, as well as security services for businesses and organizations. T: 0800 002 9734 E: info@presencesecurity.co.uk Prestige Risks LTD 27 Old Gloucester Street, London, WC1N, 3AX, GBR. Close Protection Secure Chauffeurs Surveillance Residential Security Executive Protection Security Guards Asset Protection T : +44 (0)207 5588182 E : info@prestigerisks.com W : www.prestigerisks.com Prometheus Medical Ltd Prometheus deliver unrivalled bespoke emergency medical support in the form of specialist equipment, training, strategic advice and deployed clinical care. T: (+44) 1568 613942 W: www.prometheusmedical.co.uk Prosec Consultancy Ltd 10 Oakfield business park Westbury, BA13 4WF. Prosec Consultancy Limited are dedicated in providing a professional service, which covers a whole range of security services throughout the security industry. T: 01373 228055 W: www.prosec-ltd.co E: info@prosec-ltd.com ProTouch Security ProTouch Security is one of the UK’s key providers of event safety, event security, crowd management, door supervisors, stewards, event management and health and safety. T: 01724 279 522 W: www.protouchsecurity.co.uk Python Security and Protection Ltd Providing Close Protection Officers and Door Supervisors for Events and Venue Security. E : mattleekane@hotmail.com RSM Security UK Ltd London, UK RSM Security UK Ltd offers the experience and expertise necessary to provide security personnel of the highest calibre when you need them. T: 07850091979 or 07792948523 W: www.rsmsecurity.co.uk E: info@rsmsecurity.co.uk RWSSI Rob W is a professional security consultant with world wide experience and capabilities in Security, Surveillance and Investigation; I can support you to overcome any problems and enable you to achieve your goals E: rob@rwssi.co.uk T: +44 (0)7818 220985 SDS Solutions SDS solutions provide our clients with protective solutions that are second to none, our consultants will discuss every aspect of the problems that you are facing that dictate the need for a protective solution, we promise our clients a tailor made service to meet individual requirements. Whether based in the UK or abroad our protective service T: 01453 887815 E: info@sds-solutions.org Shadow Close Protection A leading company specializing in Executive

Protection as a professional sector, with participation in high and low risk missions, providing global security solutions and consultancy to individuals, corporations and national agencies worldwide. W: www.shadowcp.gr E: info@shadowcp.gr T: + 30 6948539664 Shaun West United Kingdom SIA licensed, Highly Experienced Frontline CPO. Ronin SA trained. Providing security for both corporate and hostile environments. E: sw@shaunwest.co.uk T: +44 (0)7830 109 601 W: www.shaunwest.co.uk Spotllght Protection Services Essex based business which provides a broad and growing range of security services to businesses and organisations large and small. T: 07870560208 E: info@spotlightprotectionservices.co.uk W: www.spotlightprotectionservices.co.uk VIPA Tactical Training A specialist training academy dealing with four specific areas of combat: VIPA Civilian Self Protection Program, VIPA Close Protection Combat System, VIPA Police Defence Tactics and VIPA Military Close Quarter Combat. BBA Member. W: www.VIPAtacticaltraining.com Europe & Africa International Security Academy P.O.Box 5833, Herzeliya, 46000, ISRAEL. Our graduates are more recognized, respected and sought after by Distinguish Protection service “consumers” and by most of the “Providers” of Protection services worldwide. Organisers of the 2008 International Summit of Protection Officers. BBA Member. T: + 972 9 950 0969 W: www.SecurityAcademy.org.il Javier Galan Spain Security specialist available for operations around the world. E: oejju@hotmail.com T: 34.637080771 Military Grade Encryption Phones PO Box 52310, Limassol, CYPRUS Built-in encryption software which converts your voice to encrypted data using a constantly changing mathematical formula. It uses a dual layered RSA/ AES combination and a changing session key which modifies the encryption algorithm every second. € 1,398.00 + VAT. All prices include new Nokia N73 phone. BBA Member. T: + 357 7777 7276 W: www.protechcy.com/new Security Concierge Group SCG Special Projects Ltd, Avenida, Bartolome Vicente Ramon No 10, B16, Ibiza, 07800, ESP Security Concierge Group is a privately owned and fully independent provider of exceptional security services to an interesting and varied range of clients. T: 00 34 600 665 275 W: www.securityconciergegroup.com E: joe.buckle@securityconciergegroup.com Americas Bodyguard Careers Bodyguard Careers is an informational site with the purpose of providing bodyguards with all the information and tools necessary to succeed in the Close Protection Industry Info@BodyguardCareers.com www.BodyguardCareers.com


102

To place a classified lineage or box advertisement telephone our sales team on: +44 (0) 191 6450 865

Canadian Use of Force Systems 7975 Yonge St. # 7124, Innisfil, ON, L9S 1L0, CANADA A professional Use of Force and Defensive. Tactics organization teaching a full range of controlled response options for Self-Protection and Use of Force considerations in public and professional environments. BBA Associate Member. T: + 1 705 456 4333 W: www.canadianuseofforce.com

protection agency offering such services as threat assessment, executive protection, self-defense training, firearms instruction, and high risk tactical protection. Our executive protection specialists have over 75 years of experience. Panther can handle your protection needs whether around the corner or around the world. Member: BBA and NABA T: (404) 349-9117 W: www.pantherprotectionservices.com

Contact Front Photography Contact Front Photography is the world’s 1st photography studio dedicated to the Close Protection Professional. Stop putting generic or pirated photos on your website; instead commission custom shots to best represent you or your agency. T: +1 (612) 369-6134 E: Info@ContractFrontPhotography.com W: www.ContactFrontPhotography.com

SILVER STAR PROTECTION Executive protection, site and event security with global experience. Serving southern Minnesota with integrity and professionalism. Former USSS, ICON Alumni. available for domestic and international travel. Robert E. Jones Manager/CEO W: www.silver-star-protection.com E: rejones@silver-star-protection.com

Decisiones Estratégicas Buenos Aires – Argentina Executive protection specialists we have experienced in all Latin America, for multinationals companies, also providing support in project throughout Latin America to consulting first the US. and UK. We have a team of specialists and psychologists in assistance and crisis negotiation. T: +54(911) 6415 1941 E: jbenitez@d–estrategicas.com W: www.d–estrategicas.com Detective Lacerda P.O.BOX 25996, São Paulo, 05513-970, BRAZIL Providing the full range of security and investigation services throughout Latin America. BBA Member. T: + 55 (11) 3452 4388 W: www.detectivelacerda.cjb.net Global Bear Protection PO Box 11488, Jackson, Wyoming, 83002, USA Provision of British and US Ex Special forces security/medical specialists. T: 307 413 3619 W: www.globalbearprotection.com E: bear@globalbearprotection.com Icon Services Corporation 1043 Grand Ave. #312, St. Paul, MN 55105, USA A full service security and investigative agency specializing in providing high-level security and bodyguards to international celebrities, public figures and corporations. Licensed, bonded and insured, our diverse roster of clients reads as a virtual who’s who in the corporate, motion picture, fashion and recording industry. Entering into our 10th year, Icon has been the hand picked choice to provide Executive Protection to everyone from Superintendents to Supermodels. BBA Member. T: + 1 651 695 8778 W: www.Industry-Icon.com Imperial Protective Service, LLC 15849 N. 71st Street, Suite 100, Scottsdale , Arizona, 85254, USA Imperial Protective Service’ (IPS) is a security consulting and services firm founded in 1978. IPS provides both national and international corporate, executive and celebrity protective services. BBA Member. T: + 1 480 281 1588 W: www.executiveprotect.com Panther Protection Services 3695F Cascade Road, Suite 2207, Atlanta, GA 30331 Panther Protection Services is a full service

TSICS (T6) Miami, Florida, USA TSICS (T6) provides the following services in Central America: Executive Protection, Individual Bodyguard, Close Protection Training, Corporate Invest. W: www.security-professionals.org/members/ saldrix E: tsics.t6@gmail.com T: +502 6645 6822 Tony Scotti’s Vehicle Dynamics Institute 1162 St. Georges Ave, Suite 277 , Avenel, NJ 07001, USA The first name in advanced driver training, offering our highly acclaimed Protective/Evasive Driving Programs. Designed specifically for today’s executive chauffeurs, executive protection professionals and others who are responsible for providing safe and secure transportation services. BBA Member. T: + 1 732 738 5221 W: www.vehicledynamics.net Vindex Personal Protection & Investigation Inc. 497 Hooksett Rd #365 Manchester NH 03104 603.289.3161 / Full service Private Investigations & Executive Protection. 10 years combined Law Enforcement, Private security, close protection work, & security contracting. NY Mayors, U.S. President’s, NFL owners, and VIP’s are some of the protection work I’ve gained experience with. ICON alumni, NABA member. T: + 1 732 738 5221 E: vindexinc@aol.com W: www.vindexinc.com

News

Circuit

Reviews

23 www.circuit-magazine.com

Opinion

Intel

Exclusives

Contractors Workout FocusOn: Somalia

Close Up on Surveillance The experts opinion

Super Ninjas | Pre-Hospital Care| Over Qualified

The Team: Editor Managing Editor International Editor Art Direction

Shaun West Jon Moss Elijah Shaw Peter Falkous

Contributors: Mark “Six” James Tom Richmond Andy Clark Raffaelle Di Giorgio Ivor Terret Jeff Burns Kate Owen Orlando Wilson Yoni.C

Shaun West Jon Moss Elijah Shaw James Johns Rich Aitch Jacquie Davis Eric Konohia Dr Amy Burrell Adam Barrett

Our Sincere Thanks to all those that continue to contribute their wisdom and experience for the enjoyment of others The Circuit is compiled, edited and published in the UK and US quarterly. W: www.circuit-magazine.com E: info@circuit-magazine.com T: +44 845 519 2538

Asia Pacific Asia Protective Group Ltd Asia Protective Group (APG) is a Hong Kong based risk management company, specializing in executive protection, overseas travel security and security consultancy services. APG has an extensive network of security specialists operating throughout the Asia Pacific region. W: www.asia-pg.com E: jim@asia-pg.com E: yvonne@asia-pg.com

To place a classified lineage or box advertisement telephone our sales team on: +44 (0) 191 6450 865

DISCLAIMER While every care has been taken to ensure that the information contained in this magazine is both accurate and up-to-date, The Circuit accepts no liability in any part for loss or damage incurred by reliance on information contained in this magazine through omissions, errors, howsoever caused. ©COPYRIGHT Copyright remains with the authors and contributors at all times. No part of this publication can be copied or reproduced in any way whatsoever without permission from the publisher AND the author / contributor.


Circuit



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.