Circuit Magazine #24

Page 1

News

Circuit

Reviews

24 www.circuit-magazine.com

Opinion

Intel

Exclusives

IRAQ:

The Isis Crisis The Art of Blending In Invest Time in Yourself Elitism in Protection | Traumatic Stress | Assassinations


Contents issue22

46 focusOn: Afghanistan A Time for Transition


25

Assassinations: Learn from history!!

INVEST SOME TIME IN YOURSELF

90

21

The ART OF BLENDING IN

06 Hostile Surveillance Detection – Part III 12 Limited Company or Sole Trader 16 Female close protection officers operating in hostile environments 21 The Art of Blending In 25 Assassinations: learn from history!! 33 People like me don’t get traumatic stress! 36 Surveillance Detection & Global Business 38 When did elitism in protection, become a bad thing? 43 Casualty monitoring, packaging and handover 46 Keeping Your Edge 49 Taser C2 52 INTEL: World Report 62 FocusOn: IRAQ 71 Countering the effects of surveillance part2: 78 HELP! I’m starting my course 82 EMT-Training Dealing with Fractures; 86 Front Right Seat 90 Invest some time in yourself and make it happen 94 Book Review 96 Classifieds


04

Editorial Issue 24 Network, network, network it seems to be all everyone has been talking about and advising people to do for quite some time. Why is it such a hot topic and why is it the word on everyone’s lips? Because increasing your network increases the opportunities for employment and for further business, if you don’t have a good network then you will struggle within the CP industry unless you are lucky enough to find yourself on a full time gig.

Shaun West Editor

Having a good network cannot be underestimated and it is something that you should not pay lip service to, especially if you are new to the industry! Even old timers who feel secure in their work should look at maintaining a network of useful contacts. Do not be short sighted, as you never know when the current task that you are on may come to an end. I have seen on several occasions’ operators who haven’t networked outside of the team in which they were employed and thought “Why bother?” They got 6-7 years out of the task they were employed on and then all of a sudden it came to an end. Their CV’s were not on the books of the companies that now held all of the work and they have struggled to find further work, they have had to start once again from the bottom up doing day jobs here and there. Do not underestimate the power of a good network and always have in mind a game plan or exit strategy should the task you are on come to an end. What else can help you to stay in meaningful employment aside from having a good network? Reputation, reliability and professionalism. If you have built a good reputation and you are a reliable and professional operator with a good network then you will find you are better prepared for the dry periods and you will use your time between tasks wisely whether that be by keeping your network warm or keeping yourself and your qualifications current through your commitment to development. Even if you are operational you should still look to enroll yourself on further training courses, we all suffer from skill fade and need to be refreshed and there are new pieces of kit and methods of doing things which come out and evolve all of the time so we need to remain up-to-date with current trends. Stay Safe


Editorial Issue 24 A few weeks ago I was in my place of birth the “windy” city of Chicago, Illinois and carved out some rare downtime to visit it’s world famous Art Institute.

While there, I used the occasion to clear my mind and mentally get into a good space for a pretty strenuous assignment that was about to begin the following day. As I walked along the corridors that were literally crammed wall-to-wall with some of the most famous works of art in history, from Dali to Rembrandt, I had a flashback of me as a small child walking these same halls.

You see as an original native of this city, it was customary for field trips and group outings to take in some of Chicago’s many museums. As kids, I can remember we found some of the works interesting, but were much more concerned with socializing with friends, and trying to ditch our chaperones. Near the end of my journey I came across a bench I again recognized from memory and took a seat. Hanging in front of me was Picasso’s famous 1931 painting, the Red Armchair. I’ve seen the painting before when I was younger, and in magazines and reproductions over the years, but this time I noticed some of the things the artist was trying to communicate in his work -- the lines, perspectives and choice of colors, and I was really blown away. I know your asking, who talks art in a macho close protection magazine? That might be an argument to make, however the point I’m getting at, is never be afraid to look at things with a fresh set of eyes. In the Protection business, routine is dangerous, but the very nature of the industry means that we will see the same things over and over. From time to time, take a moment, pause, blink and look at the situation again. You might be surprised what you see.

Elijah Shaw US Editor


06

Feature Issue 24

Hostile Surveillance Detection – Part III

Welcome to the third and final part of our Hostile Surveillance Detection (HSD) article.

T

he purpose of this final section is to teach basic methods of identifying physical surveillance while on foot or in a car. If you missed Parts 1 and 2 of the article from previous Circuit issues, these identified why HSD is important in Close Protection, and how surveillance teams operate. Anti-Surveillance (AS) Techniques Article II of the HSD series identified that there are 3 parts to a surveillance operation, our AS techniques are also split into the three sections of a surveillance operation.

Whether it is a quiet residential street in the U.S where the principal has to drive out of a one-way street (figure 1), or a busy street in South Africa where the principal has to exit onto a busy street (figure 2), a surveillance team must position themselves to initially gain control. The arrows marked identify where surveillance teams may consider positioning themselves. A quiet street as seen in figure 1will force a team to distance themselves further away and perhaps use a van or car with someone hidden in the back remember they may use technical aides.

1. The Pick Up 2. The Follow 3. The Housing 1. The Pick Up When exiting a property think, and ask yourself… ‘where could a surveillance vehicle or person be positioned to obtain a view onto my door, driveway, gate or vehicle’? They have to have someway of picking you up.

Figure 1

A busy street as seen in figure 2 provides many more options. The points marked in red show possible positions that hostile


Hostile Surveillance Detection – Part III

surveillance may consider. They could be on • When you walk or drive away from the foot, in a car or inside a property. As you will property, even if you are taking a taxi, take have noticed the options open to a team in different routes. For example, do not a busy area can be multiple, and this picture always turn left and take the first right. A is purposefully chosen to identify that in hostile surveillance team may find comparison to figure 1 it would be very hard a pattern and will be able to prepare for someone to try and identify surveillance themselves accordingly to minimize their this way. own exposure. If you vary the route there

Figure 2

Remember is a much better chance you will drive past • If you are going to be at a home, hotel, one of their cars or people. business property or address for a period of time, start taking note of the vehicles • We are looking for multiple sightings, if that normally reside on the street. Where you see a suspicious car parked near your does each vehicle belong, what are their property when you leave and then you see details and what times are these vehicles it again a few streets away or even an hour usually parked. Then start taking notice or so later, then this is an alarm bell. The of new vehicles. If you have a static security same applies for people. team outside, make sure that they do this daily and make a log. • Utilize an advance team to drive/walk around the area covertly. • When you walk or drive away from your address pay close attention to who may 2. The Follow be in stationary vehicles, pay particular On Foot – attention to side streets. When walking down a street one can assume


08

Feature Issue 24

that the majority of time a surveillance team will be behind or to the side of us. They will be trying to use other pedestrians and street furniture for cover. They will be trying to stay at a safe distance so they can time you around corners and see you into buildings and shops. By using this knowledge we can carry out certain actions that can draw out surveillance and lead us to identify the 5 sins.

stops, or you notice them again throughout the day. Other actions can then be used to draw them in closer and make a positive ID.

Action #1 – Crossing the road One of the best ways to get a covert, natural look back is by crossing the road. Everyone has to look both ways when crossing a road (even people do this on one way roads – it is force of habit). The trick is to utilise these look backs to scan the areas where surveillance may be and time your crossing to draw surveillance onto that road and into the open. This is where knowledge and experience of surveillance assists.

By Vehicle When driving, the same principles applies as on foot, it is safe to assume the majority of the time a surveillance team will be behind or to the side of your vehicle. To the side could mean in a different lane or a different street.

Figure 3 shows the view of a person crossing the street. The red arrows marked on the photo show where you should be looking.

Figure 3

Remember – Choose your crossing times wisely, think about when any one following you would be visible on the street, choose a time to cross that may not be expected, and do not look for too long.

Once a team has ‘picked you up’ in a vehicle they have to contend with a number of factors, including traffic lights, junctions, road laws and other traffic. This means that most surveillance cars will not want to be too far away from you, maybe 1-4 cars behind you in busy traffic and even more on motorways. But!! Most commercial surveillance teams will want to see you nearly all of the time and they will feel uneasy if you get to far away. This therefore works to the advantage of the person conducting anti-surveillance. It is safe to assume that nearly all vehicle follows will have the surveillance cars close to you (specifically commercial). Also, where on foot it may be easy for a surveillance team to change what they are wearing, but it is very difficult for a vehicle to change its colour, model, make and registration plate (VRN).

By looking at these areas, even for just a second you can glimpse distinguishing features. E.g. blue coat on the left, dark jacket on the right, silver car at lights. You would Let us look at an action that can be then make a note of these features and see if carried out in a vehicle to identify hostile they stay with you for the next few turns or surveillance vehicles and their occupants.


Hostile Surveillance Detection – Part III Action # 1 – Busy to Quiet Just as in the previous scenario we want to try and draw in any potential surveillance vehicles, so we can get good quality descriptions and then start seeing if there are multiple sightings or unnatural behavior. One way of doing this is by driving in busy areas and then turning off into quiet areas. Imagine you are driving down this road (fig 4) in Thailand (you are vehicle A). It would be difficult to identify who may be

Figure 4

following you (in red arrows). But then you turn off from this road onto a much quieter road (fig 5). One or two surveillance vehicles will probably have to follow you, unless they accept the chance of a loss or are able to do an alternative. If they do follow you, then they are immediately forced into view. This is your opportunity to obtain VRN’s and descriptions. Remember – A good team may identify the risk of being compromised and accept a loss. If you carry out this action obviously then a team may identify anti-surveillance and step up their game. Choose your routes wisely, make them make sense, and try to identify

those that are not obvious busy to quiet routes. Do not assume all surveillance will be behind you; good surveillance will use parallel roads and try to box you in. The Housing Action # 1 – Shop until you drop Find a large shopping center or mall with multiple shops, exits and car parks. Walk in and go shopping. Window shop, go into

Figure 5

stores and look at clothing and take your time in the area. The surveillance team will most likely be forced in behind you as there are multiple exits and they will not be able to cover all of them. When you are walking in and out of different stores or areas look for the positions that surveillance will plot up and wait for you to exit. When you are in the stores see who is shadowing you, look for the 5 sins, pay attention to other shoppers. RememberBe careful if you use car parks, the large multi story car parks associated with shopping centers can leave you vulnerable on the walk to/from your car. Time spent planning is never wasted… The very best, effective anti-surveillance involves utilising multiple actions in vehicles


10

Feature Issue 24

and on foot. It is also advised to carry out these actions in different geographical areas. The simple reason being that a hostile surveillance team normally only has finite resources. They will probably only have a few personnel, a few vehicles and most likely basic training and experience. If you take a few hours to undertake a natural (but rehearsed) route, with a theme (for example shopping for mobile phones) then you are more likely to be covert and therefore successful. Article Caveats – The set of AS actions described will provide opportunities to spot surveillance – but remember all of the AS actions explained are best undertaken by pre-recceing routes. By this we mean - take a couple of hours to plan a route, identify the best situations to carry out AS and then walk/drive it until you are comfortable with when to pay the most attention. When carrying out Close Protection duties think about the principals of each technique and how you can adapt them to your principals routes, journey, daily schedule, shopping trips etc. There are no hard and fast rules and the HSD principals must be

adapted to each personal situation and client. Remember – The close protection team can only do so much, if a HSD requirement has been identified it may be more suitable to utilize a dedicated CS team. To quote RJ Aitch, from his article last issue: “If the operational characteristics dictate then the involvement of a designated Counter Surveillance Team will ensure that the CPT can focus their efforts to the actual provision of close protection without splitting the team and detrimentally affecting the level of the immediate security.” It is important to note, the above are basic methods of anti-surveillance. They are methods utilized to covertly identify physical surveillance, and are the methods the author believes are most easy to learn for a beginner. This article does not attempt to be an overarching guide to all HSD. The art of anti and counter surveillance is a complicated and broad subject with many facets and one that cannot be taught via a short article. It takes years to become proficient in HSD and time spent on the ground is invaluable – good luck and we hope that this series has been useful.

The simple reason being that a hostile surveillance team normally only has finite resources. Explorer Travel Security (ETS) a travel risk-management company provide hostile surveillance detection training and counter and protective surveillance services throughout the globe. ETS utilize a small, specialist team of highly experienced ex UK government and UKSF operators with years of experience in counter terrorism espionage and criminal operations. www.exploresecure.com


Personal Personal Personal Security Security Security Pocket Pocket Pocket Books Books Books Available Available Available from from from Ebay, Ebay, Ebay, Amazon Amazon Amazon orordirect direct or direct from from from our ourwebsite our website website Out andOut About and About

Out and About

To giveTo you give an you ideaan of idea just To of how give just distracting you how an distracting ideaphones of justphones how can distracting can phones can actuallyactually be, a recent be, a recent study actually concluded studybe, concluded a recent that a whopping study that a concluded whopping that a whopping 32% of32% roadofaccidents road accidents during 32% ofduring the road school the accidents school run induring the run UK inthe theschool UK run in the UK were 11-12 wereyear 11-12 olds year onolds were their on 11-12 mobile theiryear mobile phones. oldsphones. on In their the last Inmobile the last phones. In the last 10 years 10almost years almost 33,00033,000 kids 10 years have kids almost been havekilled 33,000 beenor killed kids seriously or have seriously been killed or seriously injuredinjured on ouron roads. our roads. injured on our roads.

Weapons Weapons

Weapons

If that’sIfnot that’s worked not worked andIfyou’re that’s and you’re 100% not worked that 100% he’s and that coming you’re he’s coming 100% that he’s coming for you,for then you,either then prepare either for prepare you, to run thento oreither run prepare orprepare prepare to fight. totorun fight. or prepare to fight. If you’re If you’re going to going run to then Ifrun you’re kick then off going kick any off to heels run anyyou’re then heelskick you’re off any heels you’re wearing, wearing, drop your dropcoat, your wearing, bag coat, or bag whatever drop oryour whatever else coat, you’re bag else or you’re whatever else you’re carrying carrying (unless(unless you canyou carrying usecan use (unless you can use it as a weapon, it as a weapon, like a rolled like it as a rolled a weapon, like a rolled up magazine, up magazine, umbrella umbrella up magazine, umbrella etc...) and etc...) go and for your go forlife. etc...) your life. and go for your life. Head for Head a safe forarea, a safelook area, Headlook for a safe area, look behind behind you as you oftenasasoften you behind as you you as often as you can, if he’s can,catching if he’s catching you can, you if he’s catching you then could thenweave could in weave andthen in and could weave in and out of parked out of parked cars. cars. out of parked cars. It sounds It sounds obviousobvious but just Itbut sounds just obvious but just do everything do everything you canyou todocan prevent everything to prevent him you from him can getting from to prevent getting you him you from getting you on the on ground, the ground, if there’s if on there’s obvious the ground, obvious dark alleys ifdark there’s then alleys obvious try then andtry dark and alleys then try and get as far getfrom as farthem fromasthem possible get as as far possible asfrom this them as is probably thisasispossible probably whereaswhere this is probably where he’ll tryhe’ll andtry drag andyou. drag he’ll you.try and drag you. 12-8

12-8

Vehicle Security Vehicle Security

12-8

Vehicle Security

13 ~ Vehicle 13 ~ Vehicle Security Security 13 ~ Vehicle Security

I I

I

f you only f you take only one take thing one f you away thing only from away take this from one chapter, this thingchapter, away or from or this chapter, or are going areto going skipto it entirely skip are it entirely then going“Get to then skip to “Get itknow entirely to your know then your “Get to know your vehicle”. vehicle”. Has it got Hasaitchild got vehicle”. alock child inHas lock the itrear, ingot thedo a rear, child the do seat lock theinseat the rear, do the seat belts/air belts/air bags work, bags could work, belts/air you could get bags you outget work, in aout hurry? could in a hurry? you get out in a hurry? Travelling Travelling to Colombia to Colombia ten Travelling years tenago, to years Colombia what ago,would what tenhave would years ago, have what would have

been your beenprimary your primary security been security concern? your primary concern? Most security likely Mostthe likely concern? the Most likely the fear of fear kidnap of kidnap and then andbeing fear then ofheld being kidnap forheld ransom, andfor then ransom, or being being held or being for ransom, or being caught caught up in a up cross in afire cross caught between fire up between the in a police cross the fire and police between oneand of one theofpolice and one of the drug thecartels drug cartels in Cali in or the Cali Medellin. drug or cartels Medellin. However in Cali However ten or years Medellin. ten years However ten years ago by ago far the by far biggest the biggest killer ago in by killer Colombia far the in Colombia biggest (by a killer factor (by ainof factor Colombia of (by a factor of 400%) 400%) was deaths was deaths in Road 400%) inTraffic Road wasTraffic Collisions deathsCollisions in or Road RTCs. Traffic or RTCs. Collisions or RTCs. RTCs inRTCs Nigeria in Nigeria are theare RTCs third theleading inthird Nigeria leading cause areof the cause death. third of death. leading cause of death. According According to the World to theAccording World Health Health Authority to the Authority World the country Health the country Authority the country has 1,042 hasdeaths 1,042 deaths for every has for100,000 every 1,042 deaths 100,000 vehicles. for vehicles. every The 100,000 The vehicles. The equivalent equivalent figures figures for the equivalent for UKthe andUK US figures and are US 7for and are the 15. 7 UK and Badand 15. US Badare 7 and 15. Bad roads bear roadssome bear some roads bear some of the blame of the but blame but of the blame but appalling appalling driving driving is isappalling driving is the main thereason, main reason, the main reason, in Aprilin2013 Aprila 2013 bus a bus in April 2013 a bus driver trying driver to trying beatto beat driver trying to beat the curfew the curfew at 6pmat 6pm the curfew at 6pm crashedcrashed killing 20. killing 20.crashed killing 20. RTCs are RTCs notare not RTCs are not newsworthy newsworthy or or newsworthy or widely widely reported, reported, they are widely they routine are reported, routine wear and wear they tear are and ofroutine tear life, of wear life, and tear of life, a boring a boring and runand of the run mill aofboring the way mill to and way die run that toofdie won’t thethat mill make won’t way to make die that won’t make 13-1

The Theabove The above above book bookbook isisavailable available is available asasa adigital as digital a digital version, version, version, download download download our ourFREE FREE our FREE Military Military Military Pocket Pocket Pocket Books Books Books App AppApp and andtry and tryout out tryour our outsampler sampler our sampler from fromfrom

13-1

13-1

Book Book Book + +App App +for App for for £12.50 £12.50 £12.50 direct direct direct milpkbk.co.uk/app_ milpkbk.co.uk/app_ milpkbk.co.uk/app_ and_book.html and_book.html and_book.html

Military Military Military Pocket Pocket Pocket Books Books Books Ltd Ltd Ltd BeBeInformed Informed Be Informed - -buy buy -abuy abook book a book ororebook ebook or ebook Our Ourour Our ourwebsite our website website - www.milpkbk.co.uk - www.milpkbk.co.uk - www.milpkbk.co.uk 01430 01430 01430 472087 472087 472087 - shop@milpkbk.co.uk - shop@milpkbk.co.uk - shop@milpkbk.co.uk


12

Advice Issue 24

Limited Company or Sole Trader

Just starting out in the security industry and don’t know where to start? Here is a quick guide to help you make an informed decision about whether to become a Sole Trader or a Limited Company. What is a sole trader? It simply means being self-employed. Being a sole trader business involves some personal financial risk. Sole traders must pay their debts if their business fails. If you’re thinking of starting up a low-cost business (i.e. one that is unlikely by its nature to build up big debts), you probably needn’t worry too much. However, if you’re likely to build up significant business debts, it might be more advisable to have the personal financial protection offered by forming a limited company (i.e.: ‘incorporation’). Advantages of becoming a sole trader Setting up and running a limited company requires slightly more administrative effort than being a sole trader, plus you (or a formation agent) must register your new ‘company at Companies. Setting up a sole trader is quick, easy and involves no cost, while preparing sole trader accounts can be

simpler. Sole traders can employ people and become a limited company (‘incorporate’) later on, should they wish. Although anyone can become a sole trader, you might need a licence or permit from your local authority for the type of business you plan to set up. Seek advice if you’re unsure. Becoming a sole trader You must register your sole trader/selfemployed business with HM Revenue & Customs (HMRC) as soon as possible – otherwise you could be fined up to 100 per cent of the tax due in addition to the amount of tax unpaid. The easiest way to register is to use the HMRC Online Service or to call the HMRC ‘Helpline for the Newly SelfEmployed’ on 0845 915 4515. You will need to have: your name; date of birth; address; telephone number; National Insurance number; start date; name and type of business; and whether you’re a sole trader or


By: Anna Cooperwhite E : anna@whittakerandco.com W : www.whittakerandco.com

working with a partner. The process is quick and easy if you have the information to hand. Alternatively, download and complete the HMRC form ‘Becoming self-employed and registering for National Insurance contributions and/or tax’. It will then need to be sent to the National Insurance Contributions Office. Sole trader tax and NI As a sole trader business, you pay income tax on any business profits. You (or your accountant) must fill in a self-assessment tax return each year, detailing your income and expenses. You’ll also have to make flat-rate Class 2 National Insurance contributions (NICs) throughout the year (£2.75 a week payable every six months). Setting up a direct debit can make payment more convenient. If your annual profits exceed £7,755, you’ll also have to pay Class 4 NICs (9 per cent on profits up to £41,450; 11 per cent on annual profits above this figure). You pay this with your income tax and the figure is calculated from your self-assessment tax return. You must keep detailed financial records for your business, as well as proof of any expenses (e.g. receipts, invoices, utility bills, etc.). Both will be invaluable when it’s time to fill in your tax returns each year. What is a Limited Company? Companies are governed by the companies Acts so the company must: • Keep accounting records • Produce audited accounts (if turnover > £5.6m) • File accounts and an Annual Return with the Registrar of Companies. This information is available to the public. • Keep Statutory Books.

Having a limited Company You will have to adhere to strict Company law legislation. The accounts must be prepared under the Companies act with financial statements and reports. This makes the accounting fees much higher. Taxation of a limited company has a big difference. You would pay tax and national insurance under the PAYE scheme on your salary as a Director. The company would then pay Corporation tax on the net profit made at the end of the financial year. For small companies the rate is now 20% and companies do not have to pay National Insurance. Shareholders get dividends at the end of the financial year depending on how profitable the company is. A limited company is a completely different entity as it has limited liability. • Having a limited company you will need to file a return annually which can be done online with a charge of £15. Also company accounts have to be filed with company’s house which have a deadline date of 10 months after the year end date and with the revenue which is 12 months after the year end date. • The penalties with companies house for late filing is high, starts at £500, you could also get fines from the HMRC for late filing. Companies may have greater borrowing potential as they can use current assets as security by creating a floating charge. • Shares in a company are generally transferable – therefore ownership may change but the business continues. • Incorporation does not guarantee reliability or respectability but gives the impression of a soundly based organization. Personally, there may be prestige attached


14

Advice Issue 24

to a directorship. • Tax is payable on director’s remuneration paid via PAYE on the 19th of the following month. If applicable, higher rate tax is paid by shareholders on dividends under the selfassessment rules. • Corporation tax is payable 9 months after the year-end. • Losses in a company can only be carried forward to set against future profits. • There is both employers and employees’ national insurance payable on director’s salaries and bonuses. The NI charge is greater than that paid by a sole trader/partner. Here are a few points to get you started. • It is vital that you keep full and accurate records from the start. • Keeping records is important because you can face penalties for failing to keep proper records. • Limited company is legally separate from its shareholders and directors. This means the company is liable for any debts. • The company must pay

Corporation tax on its taxable profits and needs to deliver a company tax return. • A company needs to be registered with Companies house. • When you form a limited company, then as a director, you will also be an employee, so you need to set up and register a PAYE scheme. • You must open a Company bank account and keep your personal finance separate. • You will be paid a Salary from the company and you will receive dividends at the end of the financial year. • Companies are governed by the companies Acts • Corporation tax is due for accounting periods which are normally 12 months long. • Corporation tax that business’s pay is calculated nine months and a day after the end of the company’s accounting period. • HMRC need to be informed that your company exists and that it is liable for tax by completing a form CT41G. • Fines can be heavy, but these can be avoided by filing returns by their due dates. • You must file accounts and annual return with the registrar of Companies. This information is made available to the public.

I hope this information has been helpful, if you require any more advice or information, please contact – Anna Cooperwhite T : +44 (0)1686 610662 E : anna@whittakerandco.com W : www.whittakerandco.com


We are specialists in Non Residency, Mariners Taxation etc. for Overseas & UK Security Operatives also Ex-Forces in the Oil & Gas Industry or Working in Hostile Environments. Whittaker & Co was started in 2006 by Anna Cooperwhite, who herself is ex forces. We specialise in providing accountancy services, tax returns, tax advice etc. and pride ourselves on understanding the needs of our clients which include Non UK Residents, Maritime Security, Sole Traders, Partnerships, Limited Companies and Personal Tax Payers. Within our team we have vast experience of dealing with the frustrations and concerns common to all businesses and individuals, we share a common enthusiasm to deliver a personal, high quality service to our clients and each individual working for Whittaker & Co has a niche area of specialism Our range of services and resources allow us to meet our clients’ needs quickly and efficiently, often exceeding expectations. If you wish to know more about our services or you would like to arrange a meeting to discuss how we can help you in more detail please contact on the available options below.

The Associates is a group of professional companies that have collaborated to offer advice through their own respective companies to serving Armed Forces personnel in transition to civilian life and ex forces. They are the ex-forces specialists with the majority of the companies having an ex-forces individual running or working within the company. For more information visit: www.theassociatesuk.org

THE

ASSOCIATES

ADVICE FOR THE EX FORCES

Whittaker & Co, have supported and will continue to support and fundraise for the Pilgrim Bandits. For further details please visit: www.pilgrimbandits.org

“I have been in the Maritime industry for 12 months following a successful 22 year career within the Royal Marines. I have been utilizing Whittaker’s for the whole period, colleagues advised me at the start to choose Whittaker’s and I have nothing but high complements towards them, they answer all my questions and reply to all my emails promptly, they also go out of their way to send a representative, to talk to maritime teams about the complexities of tax and how to achieve SED. I would not hesitate to recommend Whittaker’s to anyone.”

Ian Nisbet-Mole - Maritime

“It was a simple decision to make choosing Whitaker & Co after hearing some really good feedback from other customers. I left the military in 2011 and decided to pursue a career in close protection. The switch from military to civilian life left me with a lot of questions and paperwork, forms etc. to fill out but with Whitaker & Co’s help this transition proved effortless. It also gives me great piece of mind knowing that I don’t have to worry about tax days etc. and allows me to concentrate on my job. I would recommend Whitaker & Co without question due to the fact that the staff are very friendly and approachable and highly astute.”

Richard Daniels - Non Res

Whittaker & Co (UK) Ltd, Bryn Isel, The Bank, Newtown, Powys. SY16 2AB Telephone: 01686 610662 Website: www.whittakerandco.com Email: info@whittakerandco.com Co Reg No: 8203062 England and Wales – Vat Reg: GB 143 2704 39

Members of BBA can enjoy a 10% reduction to our fees along with a FREE “Tax Health Check” You will also be invited to exclusive Tax briefs which we will hold 3 times a year for the exclusive benefit of the BBA


16

Feature: Issue 24

Female Close Protection Officers operating in hostile environments

A beginner’s thoughts and experiences.

I

’ve come a long way from thinking a magazine was just something you read, fortunately day two of British Military basic training cleared that up for me. Where, when issued magazines I was slightly disappointed in not receiving a copy of my favourite glossy. Fast forward nine years and a lot of boring war stories later, I found myself quite dissatisfied with Army life for a variety of reasons. It was time to leave – But to do what? An Army career in communications would have probably seen me safely into a civilian communications job, but and with no disrespect to the people that work in that industry I just didn’t want to slip into the civilian equivalent of my previous job. I wanted something new, and to be perfectly honest I needed

some direction. Fortunately for me and I will always be grateful to him for doing so, my resettlement officer suggested Close Protection, something I’d never even thought of let alone considered for a new career path. Admittedly it sounded quite interesting, the more I looked into it the more I thought this is something I would enjoy, it involved adventure, travel, diversity and let’s be honest the prospect of a significant pay increase. The more research I did, the more sold I was on the idea – But I knew nothing of the security industry and how it operated, would I actually be employable? Again, luck would have it that I was put in touch with an individual in the industry who took the time to meet up with me and discuss everything with me. And by everything I mean


By: Miss El Mitropoulou

everything, the poor man must have felt he was being interviewed on Question Time after our lengthy informative conversation. My findings were that yes, there were jobs going, and even more so for females who it turns out were in short supply on the circuit.

was especially educating, during my time in the military I was generally only exposed to a few types of weapons, whilst training in Slovakia exposure to a multitude of firearms was very beneficial and of course extremely confidence building. Conflict management was also taught, being able to Wanting the ability to be able to be defuse a situation without having to resort potentially employed in executive close to the use of force is an attribute every good protection and hostile close protection I close protection officer should possess. elected to complete my close protection However some unarmed combat skills were course with a training provider that included taught and the importance of maintaining a firearms package as well as the other a good level of fitness was stressed to all modules required for completion of the students. Medical training to at least first Edexcel BTEC Level 3 Certificate in Close responder standard seems to be an industry Protection. I really enjoyed the training, as prerequisite in securing a job these days, with most courses I had completed whilst in and rightly so. Whether you find yourself the Armed Forces I found myself to being working in a European capital or the Middle the only woman on the course. A fact that East the ability to be able to provide first aid has never fazed me, in fact I believe that to the principal, yourself and if the situation being a minority in a group can make you allows your colleagues is invaluable. I chose strive to better succeed in all aspects of life. to do an Emergency Medical Technician It soon became apparent that close (Basic) course, along with a First Person on protection was not about running Scene (Intermediate) course in Guatemala, around guns blazing and pretending to mainly because of the ambulance attachment be Rambo- although aggression when during the last five days on the course and required is imperative to the job. Most of quite frankly because I quite fancied visiting the training concentrated on the ability to Central America. I won’t lie, all this training plan, organisational skills and building a cost a considerable amount of money but my sound professional rapport with the client/ goal was to make myself as employable as principal seemed to be the key to success. possible, it was a gamble that I hoped would The firearms training part of the course pay off.

It soon became apparent that close protection was not about running around guns blazing and pretending to be Rambo


18

Feature: Issue 24

The Olympic Games 2012 in London created a backlog of SIA licences awaiting approval and sadly my Frontline Close Protection Officer licence was also stuck somewhere in the system. It took considerably longer than I thought to obtain my licence. In the interim, I did what I was advised to do on my close protection course – I networked. I sent my CV out to every security company I could think of. A good tool for this was using the list of companies that had signed

the ICOC (International Code of Conduct) for Private Security Service Providers. I created an online professional networking profile and attempted to connect with as many individuals as possible in the industry. I obtained a second passport and kept up to date with current affairs, after all I was hoping to find work anywhere. It was a long and frustrating wait, without an SIA licence number most companies would not even look at my CV, there were times when I

I created an online professional networking profile and attempted to connect with as many individuals as possible in the industry.


By: Miss El Mitropoulou

thought I had perhaps made a major mistake in my new career selection. Finally my SIA licence did arrive; I could finally cross out: awaiting licencing from my CV and online profiles and replace it with a number. This did improve my chances of the company HR actually looking at my CV, but with no previous close protection experience it was still very difficult to get that “foot in the door” moment. My opportunity came unexpectedly one day when I received a message on a professional networking site asking me whether I’d be interested in working in Kabul on a diplomatic contract – safe to say I was interested! After a successful interview in London, numerous background and vetting checks a job offer was made, the sense of relief I felt was enormous, this was my break and my chance to prove I could do the job I’d been trained to do for real. Deploying as a contractor was a significantly different experience to my previous deployments in the military, where everything is pretty much organised for you and all you have to do is turn up. Again a lot of research was required, whilst waiting for a Visa and a deployment date my days were spent looking for as much information on the country, company and contract I was to be employed on. Contacting other female and male, soon to be colleagues was invaluable, all very helpful and happy to discuss things over with me. From what to take with me, where is when I learnt how you can easily become a “kit monster” in this industry, to what to expect on my induction week, fitness tests, weapon handling and ranges. Simple information like for instance that Dari and not Pashto is the predominately used language in Northern Afghanistan was learned. Kabul rather unlike the South of Afghanistan

actually experiences harsh and long winters - also very useful to know. I subscribed to every online newspaper, blog or weather site pertaining to Kabul and Afghanistan and followed all posts daily. Although I had deployed to Afghanistan twice previously during my military career I had never spent any time in Kabul – this was going to be an exciting and challenging time. Having now spent just under two years in Kabul as a contractor on both diplomatic and commercial contracts I can safely say I made it, I managed to get out there and work as a close protection officer in one of the most hostile environments in the World today. The experience I’ve gained so far has been an education. Remembering, nervously heading out on driver training out on the mean streets of Kabul; to confidently navigating around the city and infamous Kabul traffic without hesitation. Not to say I didn’t have the odd bump or two. From looking at a spot map of the city, thinking how on earth am I going to remember all these locations to conducting recces on new locations for clients to visit. From covert jobs wearing local dress and hijab to full scale overt sporting chest rig and molle belt, on occasion even having to wear the dreaded fashion faux pas but entirely practical fishing jacket. Jobs that take you all over the city: ministries, embassies and NGOs. Venues which include restaurants, private residences and public spaces providing a true challenge in terms of keeping clients safe. Provincial visits, to cities across Afghanistan: Mazare-Sharif and Herat, requiring advance party reconnaissance of locations and coming to terms with even more city idiosyncrasies. Cultural differences, interaction with the local population and law enforcement on a daily basis. And the inevitable, making


20

Feature: Issue 24

Having a woman on a close protection team has many advantages friends in a city living under the constant threat of terrorist violence, comes with the risk of losing some, may they rest in peace. Often I get asked, what’s it like being a woman operating out there? Generally its fine, of course there are differences between male and female close protection officers but the again there are also many differences between individual close protection officers. I can only speak for myself, and my experiences working out in Kabul have been on the whole good ones. Acceptance by male colleagues is very important, initially you do have to prove you bring something to the team but once that’s taken care of and so long as you don’t prance around like an airhead combat Barbie you start to earn their respect. Having a woman on a close protection team has many advantages, the ones I noticed whilst operating in Kabul were mainly: Being able to take a weapon into venues where perhaps male colleagues wouldn’t be allowed to bring one in. This is due to the reluctance and hesitation of Afghan men to interact with foreign women and the considerable lack of Afghan female searchers at venues. Again because of the predominately male Afghan society defusing potentially tricky situations or negotiating check points as a foreign woman is easy quite simply because the local men don’t really know to react to you and they are most time unsure of whom you are, the concept of women close protection officers is still simply quite alien to them. A larger number of women employed in the embassies,

consulates and NGOs has created a larger female client base which in turn has created a larger need for women CPOs in support of them. The whole time I was operating in Kabul I met no more than ten other women close protection officers operating out there, women of a variety of nationalities, most with previous military or police experience, some with none. Young and more mature women, I even met a grandmother. But what struck me was the distinct lack of number of us. In an industry where reputation is key to future employment, with such few numbers if you mess up or are unprofessional in any way this will follow you and stick with you for the rest of your career. Being professional, courteous and maintaining good relations with bosses and colleagues goes a long way. Also CPD (Continuing professional development) is something to keep on top of, to improve employment prospects in the future – there’s always something new to learn. By writing this article I have no other wish than to give a glimpse of the largely unknown and rarely spoken about world of female close protection officers in hostile environments. Offering some insight; to women who are thinking of making a career change. My time in Kabul has ended for the time being, next stop Baghdad, a new adventure which will hopefully bring as much of a wealth of experience and as much reward as Afghanistan did.


The Art of Blending In By: Mark “Six” James CPO, EPS, CAS

The Art of Blending In

So Who Are You Trying to Fool? The phrase “blending in” is a phrase that is often used in protective services, unfortunately, time and again, it is often expressed as if it is an absolute.

I

n my humble opinion I strongly believe it depends on what your objective is. I have always been of the belief that the situation should dictate the tactics. Just like walking around with that pig tail hanging out of your ear is often not required or appropriate. If you have a client who is not very recognizable “blending in”, whether in attire, posture, actions or positioning is often the most appropriate advice for lowering the profile and avoiding unwanted or unneeded attention to your client. This is a technique I employ quite often particularly when working overseas. Sometimes that process can be as simple as speaking the language, or carrying that country’s or city’s newspaper or contemporary magazine under my arm when traveling in public or enjoying a cup of coffee appearing as if I am

reading it when sitting in a café. After all few would expect a non-resident to be able to read the native language of the country you are visiting. Vladimir Vasiliev said it best “Remove yourself not just from the line of attack, but from the opponent’s attention.” That is sage advice and I think many would agree it is the true essence of protective services. However, the tactics involved in protecting an unrecognizable corporate executive or other unrecognizable high net worth individuals are often very different from protecting a high profile diplomat or highly recognizable celebrity. The Secret Service protects one of the most recognizable men in the world the President of the United States. However, the bulk of their agents don’t


22

Opinion Issue 24

practice blending in. They often rely on a proactive visible deterrent to help keep the POTUS safe. The majority of the details I have witnessed in the US are often more risks or threats against reputation, public embarrassment or pre-existing health conditions. Very rarely are the agents subjected to client issues involving confirmed threats to physical safety. When working with highly recognizable celebrities a proactive professional visible deterrent often will slow down the approach of an overzealous fan or other individuals who may become nuisances or may seek to cause embarrassment to your client. While some will say making yourself identifiable makes it easier for a potential aggressor to target you as the protective agent. That may be the case, but in some situations that may momentarily take the focus off the client which may afford one precious time to employ our own countermeasures. If we can’t reduce the aggressor’s motivation then our goal is to reduce exposure by shortening the widow for a potential attack.

we were back stage with the principal and a small group of our inner circle (record label executive, touring director, personal assistant, myself and another protection specialist) and a venue production assistant who was giving us the count down, prior to the principal going on stage. The production assistant then asks me if I was the principal’s attorney. I said why do you say that? She said “You dress very nice.” I smiled and said thank you. How many songs do we have ma’am before we go on stage. She said, “Two.” I replied thanks. Time passes we get the cue, I move the principal on stage. We perform things go uneventful as you would like them. We escort the principal to the vehicle, VIP vehicle departs nights over all good.

I then run into the production assistant a little later that evening. She said, “You are not his attorney.” I never said I was. She then replied, “The director of security told While a protective agent or team may not me you are the entertainer’s be able to totally remove the motivation for personal bodyguard.” I attack, or embarrassment to your client, your smiled. “Well you don’t goal is to make the potential aggressor say, dress and act like the other ”not today.” Remember most predators are bodyguards in here.” I said opportunist and prefer to follow the path of what do you mean? I am least resistance. not walking around with a mean look on my face and a If I am working a detail that is a very tee shirt two sizes too small. high risk, I may employ a combination of She laughed. I said there is overt and covert agents to help enhance no rule that says you can’t the protective strategy as we focus on a dress presentable and do combination of surveillance detection as well protective services. She said, as counter surveillance. “I guess you are right. I wish more security people thought Recently, while working a protective detail, that way.” Lesson learned


The Art of Blending In By: Mark “Six” James CPO, EPS, CAS you never know what catches someone’s attention, and that someone may be able to utilize your services in the future. One of my clients often wears contemporary hip hop attire during performances and I often am contrasting in attire with a suit during performances or other major public gatherings. When I meet with venue security or law enforcement officers I often get a different level of respect from law enforcement or venue security, the same with hotel personnel. At my age, dressing

like a hip hop wannabe would not allow me to be taken seriously. In my humble opinion your dress should never impede your ability to conduct your business. However, you should also never be afraid to establish your own standard. Respectfully, be careful of the outdated paradigms such as don’t out dress your client. Your dress should be appropriate for your objective. Although a positive attitude and a professional presence will usually trump attire alone.

For additional safety tips visit www.pantherprotectionservices. com. Mark “Six” James is Founder and Executive Director of Panther Protection Services, LLC. He is an internationally published author, keynote speaker, security consultant to educational institutions and frequent contributor to a number of print, broadcast and online media, and the author of a number of security, firearm and protection publications. Panther Protection Services is a full service protection agency focusing on Risk and Crisis Mitigation, Executive Protection, Self-Defense Training, and Firearm Instruction.



Assassinations: Learn from history!! By: Orlando Wilson

Assassinations: Learn from history!! As you read these incident reports, you will see similarities, even though they took place in different parts of the world and over the past 15 years.

I regularly monitor numerous credible media sources and keep a database of incidents that take place in areas where I have interests. By monitoring these incidents, I can build a profile of how the criminals and terrorists in those areas operate. As you look through the following incidents, think about what the victim could have done to avoid it and, if possible, counter it. You will see the criminals and terrorists do not give their victims much opportunity to defend themselves. Unlike the movies the

criminals and terrorists do not want to get into a shootout, they want to kill or kidnap their victims as quickly and easily as possible. Many people are usually shocked when they find out that criminals and terrorists don’t play fair!


26

Feature: Issue 24

NOVEMBER 1996, RUSSIA Paul Tatum was an American businessman involved in a dispute over the ownership of the Slavyanskaya hotel in Moscow. In the early evening on the day of his assassination Tatum received a phone call to attend an “emergency meeting” in the Moscow subway.

personnel to be targeted by the criminals to assist in the kidnappings or assaults or just look the other way.

OCTOBER 2002, RUSSIA The mayor of Taganrog was shot dead outside his home. The mayor had just got out of his car, outside of his home when an He left for the meeting with two bodyguards, assassin approached and shot him twice as they approached the nearby subway in the back. The mayor’s driver was also station they were followed by two wounded in the incident. unidentified men who had been waiting close by in a parked car. As Tatum went Considerations down the steps into the subway station a • The victim was killed outside of his home gunman armed with an assault rifle exited as he left his car. The shooter must have another parked car and ran to the top of been waiting near the victims home for the the stairs. The first five bullets of the twenty car to turn up. fired hit Tatum in the back of the neck. His • The victim was shot in the back. Criminals bodyguards did not draw their weapons want to get way with their crimes, forget and no witnesses ever came forward, even the Hollywood shootouts, we though the area was busy. are talking murder. Considerations • Early evening and busy times and places are favored by criminal as it is easier for them to blend in and escape. Also police reaction time at 5pm in most cities will be slower them 3am due to traffic congestion and the fact they will be busy attending to other tasks. • Always be wary of meetings as they can be set ups for kidnappings or assaults, the bad guys will know where you’ll be at a specific time. • Always be suspicious of people waiting in parked cars or vans, people don’t wait in parked cars for no reason. There is an old saying that there are only two reasons why two people will sit in a parked car, they are either doing surveillance or having sex. • The chances are his bodyguards did not have time to react to the shooting but I would also not be surprised if they received a phone call, did they want to make some cash or get shot! It’s common for security


Assassinations: Learn from history!! By: Orlando Wilson JUNE 2010, MEXICO Enrique Barrios Rodriguez, the Secretary of Roadways and Reynaldo Ramos Alvarado the Director of Transit, were kidnapped from their homes in Monterrey by gangs of armed men. Reports state, Barrios and Ramos were kidnapped in the early morning after the gunmen broke into their homes. Their family members who were in the houses were left unharmed. Considerations Again the victims were taken from their homes by multiple armed attackers. When planning the security for a residence you need to consider not only how to keep people out but also long you would need to hold out before help arrives. APRIL 2003, RUSSIA State Duma deputy, Sergei Yushenkov, was killed in

Moscow, apparently in a contract killing. He had just left his chauffeur-driven car and was walking towards his apartment block in the early evening. He was shot in the back 4 times by an assassin armed with a silenced Makarov pistol. Considerations This is virtually the same as we saw in a previous incident in this chapter. We have the home as the location, the car turns up and the victim killed with shots to the back. JANUARY 2005, IRAQ Gunmen killed six people during the abduction of a Turkish businessman, Abdulkadir Tanrikulu, outside the Baghdad hotel, where he was staying. About 10 gunmen opened fire on a minibus which, contained personnel who had come to pick up Mr. Tanrikulu. Considerations • The location for the kidnapping was at the targets hotel, his place of residence. • How did the kidnappers know when the target was leaving the hotel and he was worth kidnapping, did they have contacts working within the hotel? • I expect the six people killed in minibus were security personnel who had come to escort Mr. Tanrikulu, they should have been armed etc. This is a good example of how a bunch of guys with guns are a waste of time; they might look intimidating but... AUGUST 1997, RUSSIA Vice Governor or St. Petersburg, Mikhail Manevich, was killed by a sniper as his car turned slowly around a corner in central St. Petersburg. The sniper was in a position several stories above street level and fired eight rounds from an AK-47 through the car’s roof and front window, five bullets struck Mr. Manevich in the neck and chest.


28

Feature: Issue 24

Mr Manevich had received threats from kidnapped as he neared is home by men Mafia groups but still traveled regular routes, dressed as police, he also turned up dead. at normal speeds, in an unarmored Volvo and without security escorts. Considerations • The boys and their driver were kidnapped Considerations while I expect they were driving a regular • The criminals had done their homework route, basic procedures always avoid and identified where along Manevich’s routine. route he would have to make a stop or take • The businessman was kidnapped near a slow turn. his residence, which is one of the • The shooter was several stories above street main locations for assassinations and level; Manevich would never have seen him kidnappings. and the shooter only needed to identify his • Both kidnappings were carried out by car. Think about how often you look up groups of men dressed as police. This is above street level, most people don’t and common and in many cases the police look behind them even less. are working with the criminals. This is a • The Volvo S-70 was unarmored but even a difficult issue; if you run from the police lot of armored cars have unarmored roofs, you can get shot or arrested and if they if you or are going to hire an armored car turn out to be kidnappers your kidnapped. check and made sure the roof is protected. • Even if a ransom is paid there is no guarantee that the victims will be released APRIL 2006, VENEZULEA alive. Three boys Jason, Kevin and John Faddoul - aged 12, 13 and 17 were found dead with JUNE 2005, MEXICO their driver just over a month after being The police chief of Nuevo Laredo, Alejandro kidnapped. They were kidnapped while Dominguez, was assassinated by gunmen been driven to school in Caracas by a gang just after recently taking the job. The dressed in police uniforms. The family assassins were in three vehicles and opened received a ransom demand for $4.5 million fire as Mr. Dominguez was getting in his car but was unable to pay. A few weeks before on a Wednesday evening. They cut him off this kidnapping an Italian businessman was so he could not escape and initially opened

Three boys Jason, Kevin and John Faddoul - aged 12, 13 and 17 were found dead with their driver just over a month after being kidnapped.


Assassinations: Learn from history!! By: Orlando Wilson fire from inside their vehicles, then got out and shot him at close quarters. At least 30 rounds were fired by the assassins, who then slowly drove away with their lights turned off.

FEBRUARY 2002, RUSSIA Vladimir Kanevsky, a top Russian advertising executive, was killed in what is believed to be business-related shooting in Moscow. He was shot in his car, which was stopped at traffic lights, when a gunman managed to open his car door and kill him before his four bodyguards, traveling in a car behind Mr. Kanevsky’s vehicle, could react.

Considerations • The location of the assassination was the place of business of Dominguez and he was shot as he got into his car in the evening. The assassins would have located his car Considerations and just waited for him to return. • Kanevsky was shot in his car at traffic • There were multiple assassins who blocked lights. The assassin could have been staking in his car so he could not escape, he did not out that traffic light for a month waiting for stand a chance. Best to try to avoid such the onetime Kanevsky’s car would stop. I situations! also suspect this was a route that was


30

Feature: Issue 24

regularly used by Kanevsky. • Having bodyguards does not guarantee protection, bodyguards need to be pro-active, if they just wait to react to problems the chances are that their clients, themselves or both will end up dead. AUGUST, 2005, MEXICO Leopoldo Ramos, who headed the Public Safety Commission of Nuevo Laredo, was ambushed and killed in broad daylight near the offices where he worked. Ramos was ambushed by at least three men who sprayed his car with automatic weapons fire and then escaped in another vehicle. Ramos died instantly along with his bodyguard. Considerations • The incident took place near Ramos’s place of business, which he went to every workday. If you cannot avoid routine in your daily life you need to identify the danger areas and be extra vigilant. The gunmen must have been staking out the route waiting for the car to approach. • There were three assassins armed with automatic weapons, that’s 90 rounds fired within a few seconds, at tactical street distances they could not have missed. • The bodyguard who I expect was also the driver did not have time to react, you do not want to be reactive! Bodyguards are bodyguards and drivers are driver’s one person cannot do both jobs at once. JANUARY 2000, RUSSIA Ilya Vaisman, the finance director of Baltika Breweries, was shot and killed in the evening, through the kitchen window of his apartment in central St Petersburg.

Shot and killed in the evening, through the kitchen window of his apartment in central St Petersburg. Considerations • Here we have another shooting taking place at the targets residence and at the assassins favored time of day. • The assassin shot Vaisman through his kitchen window, think about how many times you have the lights on in your residence with the blinds open, which means people can look in at you but you are limited to what you can see outside. As you have seen, we have highlighted some similarities in these incidents. You should noticed that the favored places for attacks to happen were at the victims’ homes, cars or businesses. Think about it: If the criminals or terrorists locate their target’s home or car, they just have stake it out and wait for the target to return. You should have also notice that many of the incidents were obviously well planned and involved multiple shooters armed with automatic weapons. Always be prepared to deal with the maximum threat that you are most likely to encounter and expect the criminals and terrorists to be well trained and organized.


BBA Protect Who’s protecting YOU...?


The security industry is constantly evolving and has developed into

these requirements help to show your prospective clients

a diverse and valuable commercial sector for the UK and business

and principals that you take a serious approach to your

abroad. Obtaining appropriate membership encapsulates and

responsibilities –not only from the physical aspects of protection

enforces all the professional attributes the BBA strives to achieve,

and surveillance, but by also demonstrating you understand the

adding essential components to any operators’ business function.

compliance requirements when providing consulting services. By

Included in your subscriptions are: Continued Professional

encompassing the aforementioned aspects, you can protect your

Development tools (CPD) and Professional Indemnity & Liability

personal reputation and financial standing if a claim is brought

insurances to name a few.

against you for negligence. The BBA provides these niche benefits by tackling the industry inefficiencies identified by its

Being an individual contractor can bring its own challenges, from

own members, and, by doing so, seeks to continually improve

certifying your own professional standing to winning appropriate

association benefit terms through constructive dialogue with its

working contracts. Satisfying

selected affiliate partners or providers.

CLOSE PROTECTION INSURANCE PROFESSIONAL INDEMNITY INSURANCE

PERSONAL ACCIDENT INSURANCE COVER

‘BBA Protect’ Association member benefits include legal liability

‘Protect’ Association members are covered when working

for damages and claimants costs arising as a result of a claim

duties commence being close protection advice and/or close

first made against you arising out of any negligent act, negligent

protection services including travelling directly between your

error or negligent omission when providing ‘close protection

residence and place of employment.

advice’.

Accidental Death:

GBP 1,000,000

Permanent Partial Disablement:

GBP 100,000 GBP 100,000

PUBLIC LIABILITY

TEMPORARY TOTAL DISABLEMENT

‘Protect’ BBA Association member benefits include legal liability

(excluding the first 14 days and up to a maximum of 52 weeks)

for damages and claimants costs from injury or damage in

Up to GBP 750 per week or 75% gross weekly wage

connection with the provision of ‘close protection services’.

whichever the lesser”

GBP 2,000,000 PRODUCT LIABILITY ‘Protect’ covers claims made against members for injury or damage occurring during the period of insurance in connection with any goods or products manufactured, constructed, altered, repaired, serviced, treated, sold, supplied, or distributed. GBP 2,000,000

This is just a summary of the main covers. For more information please call 0207 933 2666, or visit the BBA website

*Cover is provided to you as a ‘Protect’ member of the British Bodyguard Association, resident in the United Kingdom, and is subject to you meeting the associations terms and conditions. www.the-bba.org.uk Lockton Companies LLP is a limited liability partnership incorporated in England and Wales, registration number OC353198, registered office St Botolph Building, 138 Houndsditch, London EC3A 7AF. Authorised and regulated by the Financial Conduct Authority.


By: Dr Liz Royle and Cath Kerr, KR Trauma Support Ltd 2014

People like me don’t get traumatic stress!

I

Dave served in the Falklands and Northern Ireland and has “been there, got the t-shirt.” In his second career as a security operative abroad, he took part in countless high risk operations and loved the adrenaline and excitement of the job. He saw himself as experienced, capable and unflappable and something of a role model for his younger colleagues. When he was involved in an incident where a colleague was badly hurt, he never expected to react as he did afterwards.

used to think I was invincible – I’ve had the corners well and truly knocked off me. I thought trauma was something that was dreamed up by the pink and fluffy brigade but it happened to me. Now I know it’s real.” As a bodyguard, your background, training and experience means that generally you are more resilient and for you, what the man in the street would view as traumatic, is all in a day’s work. However, like Dave, this does not mean that you are invulnerable to post traumatic stress! Understanding traumatic stress as a normal physical and psychological reaction to an extreme event, and how to help yourself to a full recovery, is another piece of kit in your protective armour.

So why does one event create a strong reaction in someone who is a seasoned professional? The level of threat, the sudden or unexpected nature of the event and any perceived loss of control or influence over the outcome are some of the factors which will influence how the individual will react. People may be more susceptible to psychological trauma where they were already under additional strain due to • Problems outside work • Previous traumatic events at work / home • Poor relationships with colleagues / manager • Recent losses or bereavement, or unresolved ones in the past In these situations, many people will experience a reaction that can be unpleasant,


34

Feature: Issue 24 Sleep disturbances, nightmares, sweats, poor concentration, trembling, headaches, digestive complaints and skin rashes

disturbing and potentially overwhelming. Understanding this reaction and how we can help ourselves at such a difficult time means that we are more likely to recover quickly and fully. Over the coming months we will be providing a regular feature on preventing and managing traumatic stress reactions.

Common reactions can include Physical reactions: Sleep disturbances, nightmares, sweats, poor concentration, trembling, headaches, digestive complaints and skin rashes

How we think and feel: Feeling angry, shocked, guilty, overly vigilant In the majority of cases, the reaction will or on edge, depressed, helpless, emotional or subside over time as the individual gradually numb, having intrusive thoughts and images comes to terms with the experience and its effects. It is important to remember How we behave: that what affects one person may not affect Avoiding anything to do with the event another. We are all affected by different or conversely compulsively looking for things at different times of our lives. reminders, withdrawing from relationships, increasing the use of alcohol and cigarettes This psychological reaction to violent or any significant change in usual behaviour incidents is usually called Post Traumatic Stress – this is a normal reaction to an All of these reactions are normal and, abnormal event. short term, will not cause lasting harm.


By: Dr Liz Royle and Cath Kerr, KR Trauma Support Ltd 2014

This psychological reaction to violent incidents is usually called Post Traumatic Stress – this is a normal reaction to an abnormal event. There are many simple things that you can do to help yourself during this time such as: • Talking things through with someone who understands can help your brain process the information from the event • Taking exercise, reducing stimulants and eating well will help your body restabilise and burn off stress hormones. This also helps your brain to process the information • Calming your body and brain through progressive muscle relaxation, breathing and guided imagery (for a FREE MP3 that does just this go to http://powertorecover. co.uk/ shop/ and enter coupon code BBAMP3 before 31/08/14) It is important to give yourself time to recover and accept that you may not be as efficient and effective as normal. Traumatic events can cause a great deal of shock - then We created a 7 step system that takes people that have experienced a traumatic event from feeling overwhelmed and out of control to being empowered, informed and active in their recovery. The entire system is made up of 5 learning modules to deliver all these strategies and tools in bite-sized steps and is now available online to anyone who needs it. We are proud to offer members of the BBA

emotional disturbance that may take time to subside. Symptoms do normally reduce naturally and should have greatly improved by 4 weeks. However, sometimes we need a little more guidance and more in-depth strategies to achieve this. We understand that not everybody wants to, or is able to, see a mental health professional With that in mind we developed an online self-support programme - Power to Recover® As experienced trauma consultants, we decided to pull together all of the steps, details and instructions that had been helpful to the people we worked with, turn them into an easy to follow system and make it available to other people who were having the same experience.

15% off the usual retail price using the code BBA0714 at www.powertorecover. co.uk/power-to-recover We also are happy to answer your questions about traumatic stress on our blog. You can send them via Facebook: KRTS Power to Recover, Twitter: @KRTraumaSupport Email: office@krtraumasupport.co.uk


36

Feature Issue 24

Surveillance Detection & Global Business As we continue this series of articles discussing surveillance detection (SD), it is only natural that we explore the use of SD by global business to mitigate and prevent attacks on their businesses.

T

he National Institute for the Prevention of Terrorism reports that around 20% of international terrorist attacks are directed against business. In the aftermath of 9/11, approximately 200,000 jobs were eliminated or temporarily relocated outside of New York City and since 9/11; nearly 2,000 people have been killed in terrorist attacks on businesses. In today’s global economy businesses are operating in an increasingly dangerous world, facing risks from terrorism and political violence which has a major impact on both strategy and operations. Concerns about political violence are preventing companies from investing where they would like to

and forcing them to face a variety of threats based on their location, products or services and political affiliations. By employing SD, a company operating in today’s dangerous global economy can safeguard life and prevent disruption to operations by identifying threats to their security and disrupting terrorist attacks in the planning phase. Just as with any SD plan, a SD plan for a business begins with a threat assessment. Depending on business size a company may choose to employee a professional surveillance detection team or in the case of smaller businesses, they may rely on existing employees to conduct SD. For this reason it is extremely important that the employees


By: Jeff Burns conducting SD be thoroughly vetted. SD plans for small businesses are similar to SD plans for individuals since the threat is directed towards a small group of people and a specific facility. SD functions such as collecting and analyzing the information generated by SD operations should be assigned to a detail oriented individual and periodically reviewed by management. The SD plan should assess the same areas of vulnerability as an individual SD plan, however route reviews only need to be conducted if information is developed that individuals or vehicles associated with the business may be targeted.

will determine your SD limitations. Just as we’ve discussed, you must determine what personnel and assets you are trying to protect and conduct a threat assessment. A third party may be hired to conduct SD or existing personnel may be specially trained and utilized.

With large corporations, your SD plan must address issues such as how the SD team will communicate with management and how the SD team will interact with existing security personnel which includes addressing how the SD team will work with existing security when surveillance is detected or it is determined You should begin your SD plan by identifying that an attack is imminent. There should be a suitable observation points (OP’s) that provide designated liaison appointed to communicate optimal views of critical locations that hostile with local authorities regarding suspicious surveillance would want to watch such as the activity and recent local criminal activity that entrance to the business or facilities. Close could impact corporate security. The SD plan attention should be paid to vehicles and people should identify a clear chain of command and that look out of place or are people exhibiting define each SD operator’s responsibilities and poor surveillance demeanor. a task schedule can be implemented to ensure efficiency. When conducting SD operations it is essential that the general public, customers and Facing threats of terrorism and political contractors / vendors are carefully observed violence on a daily basis has become part of for any indicators of hostile surveillance, such doing business in today’s global economy as people wearing unsuitable clothing for the regardless of business size. By incorporating a weather or environment, people with unusual SD plan into business operations, companies bulges under their clothing, wires protruding are able to identify threats to their employees from their clothing, people who are sweating and assets in the planning phase and prevent profusely, mumbling to themselves or attacks and loss. fidgeting, people who appear to be attempting to avoid security personnel or law enforcement About the author: Jeff Burns has over 20 and people who appear out of place. years of investigation and close protection experience having worked in both the public SD plans for businesses must include a and private sectors. Mr. Burns currently works clearly defined response to any confirmed for a government agency where he is assigned surveillance which includes reporting any to a covert surveillance unit that conducts hostile surveillance to the proper authorities. surveillance and undercover operations against In addition, there should be a plan in place individuals suspected of or involved in criminal in the event of an attack against an employee, activity. In addition, Mr. Burns provides facility or assets. surveillance and counter surveillance training to government, law enforcement and select In the case of large corporations your budget civilian clients.


38

Feature Issue 24

When did elitism in protection, become a bad thing?

“Each honest calling, each walk of life, has its own elite, its own aristocracy based on excellence of performance.� James Bryant Conant


Elitism in Security By: Raffaele Di Giorgio

But that’s not really what elitism, when appropriately understood, is about. In our culture, “elitist” and “snobbish” have become largely synonymous.

W

hen did elitism in protection, become a bad thing?

Is everyone equal in this industry? If so, do they deserve a seat at the table? If seated at the table do they deserve an equal say? More importantly, who should not be seated at table and who should not have a say, in the industry? World English Dictionary elitism —n 1. a. the belief that society should be governed by a select group of gifted and highly educated individuals

b. such government 2. pride in or awareness of being one of an elite group It’s expected that, in our open and egalitarian culture, we would look with a quizzical eye on the notion that some people are better than other people. But that’s not really what elitism, when appropriately understood, is about. In our culture, “elitist” and “snobbish” have become largely synonymous. That’s an embarrassment, “Elite” derives from the Latin for “elect,” though not necessarily in the democratic “electoral” sense. It means those who, through efforts and talent , self-select themselves as qualified to lead, and teach,


40

Feature Issue 24

who I had provided consulting services to for seven years. During that time his business grew from a five figure income to several million dollars a year. In the early years in order for Elitism again, in the words of William Henry, means “some ideas are better than others, some him to establish himself and get a footing in the industry. I had guided him, as I have for values more enduring, some works of art more many others, to apply for the Small Business universal. Some cultures, though we dare not Administration’s(SBA), 8a set-aside program for say it, are more accomplished than others and minority and/or disadvanted owned businesses. therefore more worthy of study.” During the whole time. I have encouraged and advised him to continue to develop his We talk of elite athletes, elite scientists, or elite personal knowledge and to get accredited and soldiers, and everyone understands that these certified courses, degrees and certifications that people are simply better, more expert at what are respected in the industry. But as with most they do than the rest of us. It is only when we business tragedies, he felt that he was doing well get closer to those careers or subjects where enough and did not need additional training experts have decided to bend every fact and twist every standard — in an effort to not bruise or education. Some of you already know the ending to this story. But for the others, let me the delicate egos of those that are not as well please explain it out. qualified, that “elite” becomes derogatory in its meaning. He finally reached a stage where he was successful enough and large enough that he What if an elite soldier believed there was no did not qualify as a “disadvantaged” business need for weapons training, if an elite athlete anymore. This happened about a year ago, so argued that the couch was the best place for since then he has had to compete on his merits exercise, if an elite scientist argued that the world was flat, we would fire these people — we and his company’s merits alone and has suffered some harsh realities in competing on a fair and wouldn’t redefine what it means to be the best open market for contracts and clients. So “our” soldier, the best scientist, the best athlete. We last conversation almost exclusively revolves most certainly wouldn’t decide that we don’t around him wanting to get back into the need elite soldiers or elite scientists, anymore. “disadvantaged” status so that he could again What has brought me to writing this article was receive preferential treatment on being awarded contracts. Obviously, this did not go well a discussion that I had with a security client by example. Example, being related to past performance.

I refuse to put my reputation, my company’s reputation or my clients safety on the shoulders of someone that simply is not proven.


Elitism in Security By: Raffaele Di Giorgio between he and I and hence the reason he is no longer one of my clients. At what point do we degrade our services and the field in general, by allowing people that do not have the credentials, an alternate route to our clients and the general public?

since they now believe that there is no clear demarcation between a conceal carry firearms instructor, a uniformed security guard service, a armed uniformed guard service, a plainclothes security service, a policeman, and then an actual executive protection service.

I have heard it said many times, by people trying to get into the industry, that the “good old boys network” (insert any verbiage or term that may apply to your region), keeps them from getting into this career field or to the perceived “next” level. I have often countered this with, it is not the “good old boys network”, but in fact it is the “proven old boy network”, which by default I imagine lends itself to elitism, at some level. Which again I do not apologize for. I refuse to put my reputation, my company’s reputation or my clients safety on the shoulders of someone that simply is not proven. For example, I do not believe that the director of hospital security, should automatically assume that they now are a resident expert on executive protection. I also do not believe that a person that spends a one year contract in Iraq, automatically becomes a de facto expert on high threat protection(HTP), let alone opens a training company for HTP.

Surely what the profession and clients need is not a fusion of the aforementioned tracks but a sharper division between them coupled with a forceful program for diverting potential practitioners/recruits into a graduated and accepted apprenticeship that would clearly delineate the job descriptions and titles. If we have this much confusion amongst our own peers, how can we ever expect the clients to take us seriously or become educated in a scientific and evidence-based presentation of our skill sets and abilities? If clients are led to believe that all security is created equal, mostly because our own protection peers say it is, then how can we justify the differences in cost and experience levels that we bring to the table for various assignments and bespoke solutions?

What I am seeing by agency/company owners and individuals across the board is a reluctance to admit, that they are not qualified in one aspect or the other. Instead, we have all seen it in various forms, where the person who does executive protection as a sideline income, still claims to be elite in protection operations. You will see their brochures and their websites that clearly indicate Monday through Friday. They are teaching concealed carry weapons courses to housewives, but then on Saturday, they claim to be the elite executive protection, for whichever band or act is in town, then Sunday they are an expert on fugitive recovery. Then of course, this confuses many of the clients

During my audits of protection details both public and private, it is astounding to find the amount of convicted felons working for supposedly licensed security firms. It is amazing to me the amount of licensed security firms that will bend the rules in order to get somebody working in their programs that does not qualify, by simply changing their job title. Yet the same company owners request or rather demand that they have equal voice in the construction or formation of the standards for the industry. Yet they cannot follow the standards that are currently in place, even though, I believe we all agree that the current standards are pretty low in the majority of United States and Europe on what qualifies as an executive protection professional. No less frightening is the amount of people that apply every year demanding that they be treated as an


42

Feature Issue 24

equal on a detail, even though this may serve as their first time on a full time detail. The same pattern demonstrates itself by some of so-called instructors and experts in the field, who seem to believe that by working in the protection industry for more than a year they are automatically qualified instructors. It never seems to bother them that they have yet to learn the industry themselves, but will now sell their services to others, claiming to be qualified to teach and mentor the next-generation. I have a habit of telling people “everybody wants to be a SWAT cop, but nobody wants to go through the basic police Academy”.

such as team leader, shift leader, agent in charge et. al, will turn down a position for residents watch, security officer or driver, stating that they believe that those positions are below them. Thus exhibiting their reinforcement of the elitism that is needed in the industry, while verbally arguing that it should not exist.

In closing, it is my sincere hope that people and business entities will start to take self responsibility for their careers and their backgrounds, so that maybe instead of wasting so much time demanding that they be acknowledged as equals. They may take some of that energy, time, and fervor and actually It is mystifying and ironic that I will have people apply it to becoming the actual “elite” in the field of their choosing and thus not requiring criticize me for my belief in elitism amongst any special favoritism or coddling to win the practitioners of the craft. While these same open position, contract or client. people in their pursuit to secure a position

Raffaele Di Giorgio is an experienced professional protector with over 25 years of personal security, military, law enforcement, protection and emergency medical services experience and the CEO of Global Options & Solutions and Tactical Combat Casualty Care (TCCC)® . For more information visit www.GOS911.com


By: Kate Owen Photos ŠPrometheus Medical Ltd 2013

Casualty monitoring, packaging and handover Kate Owen continues the series of medical articles on the safe management and treatment of a patient in the event of a medical emergency.

I

t is important to consider how you are going to monitor physiological changes in patient condition, how to package the patient ready for transportation and how to efficiently handover your patient to medical professionals. Monitoring physiological changes As mentioned in the previous articles, the clinical observations we take are the patient’s respiratory rate, pulse rate, capillary refill time (CRT), conscious level (AVPU), pain score and pupil reactions. From these, we can look for improvement or deterioration

in the patient’s clinical condition. These observations should be regularly reassessed, and documented if possible, following the <c>ABCDE approach. It is advisable that when you have completed your first <c>ABCDE assessment, you reassess all of these components again if the environment is permissive and time allows. Specialist medical equipment is not essential to monitor the physiological signs and the trends in these observations, as outlined in Figure 1. It shows that you can observe whether catastrophic bleeding is controlled,


44

Medical Issue 24

the airway is clear open and maintained, breathing and pulse rates alter, conscious level improves or decreases and body temperature to touch is warm or cold. Monitoring without equipment is simple

and allows you to see improvement or deterioration in the patients’ condition. You do not need to carry heavy expensive equipment to see changes in patient condition in the initial phase of rescue.

Monitoring without equipment

Monitoring without equipment

<c>

<c>

Nil

A

Nil

B

Stethoscope, Sp02

Assess for uncontrollable bleeding

A

Visible checks

B

Count respiratory rate

C

Feel for pulse rate

C

Pulse rate, Blood pressure, ECG

D

Conscious level (AVPU)

D

Nil

E

Feel for body temperature

E

Thermometer

VS

Figure.1 – Equipment needed to obtain clinical observations Casualty packaging During the transportation phase, there is always an element of risk involved. Depending on type of injury, the journey may make the condition worse. It is important, therefore, to package your patient appropriately to minimize the risk of further complications.

package, resources available to assist you, distance to hospital or help, vehicle used for transporting the patient and the ability to reassess the patients’ condition. Patients that have a low body temperature are particulary susceptible to complications. Keeping an injured patient warm is essential as hypothermia leads to increased bleeding and can worsen oxygen carriage in a patient with clinical shock.

The packaging phase involves full preparation of the patient ready for transportation. It allows ease of movement, prevents further injury, secures equipment, In most Ambulance Services in the United regulates body temperature and positions the Kingdom, the standard operating procedure patient comfortably. is to remove the patients clothing to visibly check for injuries, then package onto a It is necessary to plan this phase. The scoop stretcher (Fig.2), and provide suitable considerations include time taken to blankets for warmth. The scoop stretcher


By: Kate Owen Photos ©Prometheus Medical Ltd 2013 affords excellent spinal protection and lessens the risk of pressure sores. Pre-planning in the event of an emergency is always nice to do, but in the remote or hostile environment this may not always be an option. Air and land ambulance support often is not available, so adaptation and improvisation will be needed. Be aware of what equipment you carry and how to improvise if necessary. Handover A well recognized system of patient handover is utilized everyday in the prehospital to hospital handover. The ATMIST handover (Fig.3) gives short, concise details of the incident, the patient condition and the interventions performed by the rescuer.

A Age of patient T Time of incident M Mechanism of injury I Injuries sustained or suspected S Signs <c>ABCDE T Treatment given Figure.3 – ATMIST handover pneumonic This handover should take no longer than 45 seconds. In summary, close attention to clinical observations and their trends, quality patient packaging in the pre-hospital environment and an accurate, succinct handover of the patient to medical professionals can have a positive impact on patient care.

Keeping an injured patient warm is essential as hypothermia leads to increased bleeding and can worsen oxygen carriage in a patient with clinical shock.

Kate Owen is one of Prometheus’ Senior Instructors. She has over 15 years’ experience working with the UK ambulance service and currently works as a HEMS Paramedic.


46

Editorial Issue 24

Keeping Your Edge

Can I get some work? Hands down, this has to be amongst the most confusing phrases in the Close Protection Lexicon.

B

ad sentence structure aside, the words themselves illustrate a disregard for the complexities that go into working the Executive Protection craft at a high level. As an active operator, business owner and training provider, at least 2-3 times a month I open up my in-box to a message that reads, “Can I get some work?” I found myself really stopping to think about what that person was really saying to me, particularly those that I have little to no previous association with.

be stupid to pass them over? But if they are so qualified, why is it that they think that decades of established business practices fly right out of the window when you are dealing with EP work? Quick, stop what you are doing and picture someone walking up to Bill Gates or Warren Buffet and saying, “Can I get some work???” How successful do you think they would be in scoring employment? So why is it ok in our industry?

But maybe I’m being too hasty, maybe the people that say, “can I get some work?” mean they are highly qualified so I would

I’m sure everyone has heard the expression, “you never get a second chance to make a first impression,” I’d advise all in the “can

One of the problems I think is the rise of social media. The World Wide Web is an To me it means that you think so little amazing place to connect people from all of what I do, that I would put someone around the world in a way unlike anything who I do not know personally, or even by that’s ever been accomplished in our planets trusted referral, to watch over my client history, however that connectivity can also just because they said what equates to a be a double-edged sword. Just because the magic word. I mean it has to be magic internet, and specifically social media, has right? The individual is saying it because the allowed us to eliminate some of the long expectation must be for the decision maker form methods of communication in favor to just roll over, discard all of his protocols of a short hand way of getting in front of a and procedures and just open up the decision maker, it doesn’t mean we can’t be floodgates because they asked nicely, right? professional when the time comes.


Keeping Your Edge By: Elijah Shaw

I get some work” camp (hereto referred as CIGSW) to pay strong attention to that advice. Depending on a variety of factors ranging from the method of communication i.e., the phone or text messages, to simply if the decision maker has had a tough day, CIGSW can come off as arrogant, unprofessional, shallow and even weak.

type I want to employ or recommend. That’s pretty straight forward, so imagine how I feel with someone try and hits me with the magic word, CIGSW? Is that supposed to be some form of post-hypnotic suggestion? Chances are it’s just coming from a place of “not thinking,” but the problem is I want THINKERS on my team.

Yes, I want assets on my team, but I’ll share with you a secret, I choose the assets way more than they choose me. If I notice a person that I think would make a great addition, I will approach them when the opportunity is right. Usually my vetting process involves me getting the recommendation from a trusted source that already knows the individual. Outside of the hard skills such as tactics, physical prowess, martial arts, etc., communication and etiquette are very high on the list of the

In all of my Keeping Your Edge columns in this magazine, I try and give Protectors something to noodle and reflect on. I try and do this from a place of, “here’s a path to developing (or maintaining) successful traits that bring longevity in this industry.” With the exception of a few Super Ninja’s, at some point or another everyone needs a jumpstart or a helping hand, let’s just make sure we do not poison the well with CIGSW before the conversation truly begins, and lets leave the magic words to the magicians.

Elijah Shaw is the CEO of Icon Services Corporation and The National Director of the North American Bodyguard Association



By: LEON S. ADAMS

When working in a proactive role as a protection specialist, our focus is to understand the threats and risks to your client and provide proactive measures to manage and mitigate those threats here are those times, however, that those proactive and risks. measures may be overcome and reactive measures have to

T

be implemented. The usual protocol for most is to cover and evacuate their client. For the solo operator, however, that can prove to be a challenge as merely covering and evacuating may not prevent the threat from giving chase and going hands on with the threat may leave your principal exposed. So what then, is a viable option when less than lethal force may be necessary without exposing innocent bystanders to harm? Enter the TASER C2 Conductive Electrical Weapon. Understanding that our personal protection game plan requires true take down power should you encounter a threat if your proactive planning and measures have failed, we also understand that we could find ourselves in legal jeopardy by using deadly force if it was used and not warranted or legally justified. Pepper Spray is a great tool but often can affect more than just the subject being sprayed...including YOU if the weather conditions are windy or you happen to be in an enclosed environment! There is usually collateral damage done as it affects everyone in the vicinity. Here’s why a TASER is your best less-lethal option in my opinion: Only TASER provides the stopping power to knock down a violent attacker for a full 30 seconds from up to 15 feet away. As a protection specialist needing to evacuate a client, that gives you plenty of time to


50

Review Issue 24 Leon S. Adams is a Certified Executive Protection and Security Specialist with more than 22 years of professional security, law enforcement and military experience in the industry. He is a Certified Instructor in several self-defense implements, and currently conducts training courses for professional security practitioners both stateside and in the Caribbean.

escape from a dangerous situation without having to resort to deadly force. TASER offers the exact same tool the police use to take down hostile criminals that’s available in a neat package for civilians and professional security specialist. How do TASERS work? TASER CEWs use replaceable cartridges containing inert, compressed nitrogen to fire two small probes that are attached to 15 foot (4.5 meter) insulated conductive wires. Energy is sent over the wires into the probes, which can penetrate up to two

cumulative inches of clothing giving you a personal defense product you can count on. The charge is transmitted between the two probes and is designed to jam the sensory and motor functions to inhibit muscular control. This Neuro-Muscular Incapacitation (NMI) effect continues in 30 second cycles each time you press the trigger button. The TASER C2 CEW can also be used in direct contact stun mode similar to a traditional stun gun in a tactic known as drive stunning. This adds yet another degree of protection in the hands of the professional security specialist working in SOLO capacity as


By: LEON S. ADAMS

Understanding that our personal protection game plan requires true take down power should you encounter a threat if your proactive planning and measures have failed it adds the capability to address multiple attackers with a highly effective less-lethal tool.

TASER CEWs are effective at a range of up to 15 feet, which keeps you out of harm’s way. It’s designed to be compact and easy to carry and to give a 30 second cycle of incapacitation that gives you plenty of time to get in control of a threatening situation and get your client to safety by simply placing the device on the ground while the threat is under the stun cycle and you can safely evacuate your client. Easy To Use The TASER C2 has been designed for easy use during high stress deployment situations. Combining a LASER sight and bright LED light with a quick flip of the safety switch, the C2 allows you to respond quickly and effectively to a threat.

Police Proven The TASER C2 is based on the same internal Here are a few more good to know facts design used by law enforcement agencies about the TASER C2 that make it a premium worldwide. choice as a defense force option for the professional security specialist to consider I mentioned earlier that a Protection adding to their tool kit: Specialist can safely evacuate their client to safety by placing their C2 on the ground and Effective leaving it there while a threatening subject is TASER CEWs are the only personal defense under the stun cycle. What happens if I have products that allow you to take control to use my C2 CEW to defend myself and it’s of your personal safety with the ability to lost as a result? incapacitate aggressive, dangerous people. Lifetime Replacement Guarantee Safe When a C2 CEW is used in self-defense, Safer and more effective than other personal the CEW may be deployed and left behind defense options, such as sprays or direct providing the Protection Specialist a contact stuns, which require potentially window of opportunity to get their client dangerous chemicals or close range to an and themselves to safety and call law attacker and often prove to be ineffective enforcement. TASER International will on individuals under the influence of drugs replace the C2 CEW free of charge, with the and/or alcohol. same product or a like product. Keeps You Safe at a Distance Unlike other personal defense products which require you to be close to the target,

For more information, or to order this product, contact Superior Security Concepts at www.superiorsecurityconcepts.com/


52

Intel: Issue 24

Intel: World Report I would like to take this opportunity to introduce our readers and subscribers to Carmdale, a renowned and respected Risk Management company. The Circuit magazine is proud to welcome Carmdale to our team of regular contributors as our dedicated Risk Management partner. Carmdale will now become the main supplier of all int appearing in this section of the magazine. In addition to writing exclusively for the Circuit each quarter, they will also be supplying our online readers with all the up-to-date int from across the globe via our website.

Africa KENYA April: Algeria made an agreement with Mali to work together to fight terrorism. The neighbouring countries vowed to stand united against terrorism, drug trafficking and organised crime, releasing a joint statement following work on a strategic joint committee. The countries announced there would be no effort spared in working towards the release of Algerian diplomats being held hostage in Goa since April 2012.

driver came to a curve and had to break suddenly leading to the accident.”

Egypt Ongoing: Initially a total of 683 Muslim Brotherhood supporters were tried, with 529 sentenced to death for the riot at a police station in Minya province on 14 August 2013, which left a policeman dead. This was also the day that police killed hundreds of Brotherhood protesters. A court later ruled that 183 of those originally sentenced will receive the death penalty, including Mohammed Cameroon Badie, leader of the banned group. This is a The many refugee camps for those fleeing continuing theme of justice since the militarythe wars of the Central African Republic are installed government came into power, becoming hotbeds of malnutrition and illness sentencing many opponents since President for the hundreds of people who have already Mohammed Morsi was replaced in July 2013. covered many miles in order to retreat to Of the initial numbers sentenced in March, 4 safety. Adults and children alike are starving, received 15-25 years imprisonment and the having made escape from the daily torment of remainder were acquitted. Human rights war and require the support of the UN World groups said that the sentences Food Programme (WFP) if they are to have a were politically motivated and that the reasonable chance of survival. A third of those government was ‘settling scores through at the camps are malnourished and are relying death sentences’. on the arrival of aid. Guinea Congo Ongoing: The Ebola virus affecting Guinea April: At least 63 people were killed and 80 and other parts of West Africa continues to seriously injured in the Democratic Republic spread, with almost 800 reported infections of Congo’s Katanga province when an and nearly 500 deaths. With a mortality rate overloaded train was travelling too fast around of 90% and no cure, the virus, first registered a bend and derailed. Twelve carriages came in Guinea in February, is considered to be out off the track causing at least 50 people to be of control in the region. In July, an American trapped inside the goods train in the accident man was placed into quarantine after travelling near Likasi. Katanga’s interior minister said through the region and is undergoing tests to “Evidently the train was going too fast, the confirm if he has the virus.


Intel: World Report Kenya May: An explosion at a bus station in Mombasa and another at a tourist hotel near the beach in Nyali left three dead and dozens injured in what was confirmed to be a terrorist attack. The bomb at the hotel was spotted hanging on a fence outside. Prior to its detonation, staff were able to clear a number of people away. June: Somali extremists with automatic weapons attacked the Kenyan coastal town of Mpeketoni, killing 48, after targeting two hotels, a police station and firing randomly at anyone in range. The terrorists also set two hotels on fire. The police confirmed that several dozen attackers took part, some 60 miles from the Somali border. Authorities blamed al-Shabab for the attack. Two days later, there were attacks on houses in the villages of Majembeni and Poromoko, also near Mpeketoni. There were 15 people killed and eyewitnesses said that the attackers were going from door to door and asking people to prove that they were Muslim. Five suspects were killed in a firefight with the security forces and the remainder escaped. What are seen as fairly regular attacks have had a devastating effect on tourism in the country, with tourism down 15% overall and in some key coastal areas, down as much as 70-80%.

of organisation in a country that has had numerous Prime Ministers already this year, with much still to do in terms of security, the economy and democracy. Following the attacks, Libya set a date for elections that are hoped to defuse the escalating violence. June: General Hifter continued his attacks against Islamist groups around the city of Benghazi, instigating clashes around the University that forced school exams to be cancelled. Using helicopters to attack pockets of Islamist militias, Hifter gained the support from Libya’s military and anti-Islamist politicians in an effort to “destroy” those he blames to Libya’s instability. The attack resulted in 18 deaths and resulted in a call for civilians to remain in their homes and away from the fighting. Mali May: Mali’s Prime Minister, Moussa Mara, announced that the country was at war with Tuareg separatists as a result of rebels attacking a town he was visiting, killing 8 soldiers and abducting at least 30 government workers. Shooting was underway before the Prime Minister’s arrival and he had to take shelter at an army base. Mali has been experiencing disorder since 2012 when the al-Qaeda linked Islamists took control of the north.

Nigeria April: 276 female students were kidnapped Libya from a secondary school in Chibok by the May: Libya’s government faced further Islamist Jihad terrorist group Boko Haram. rebellion when former general Khalifa Hiftar The group entered the school under the guise secured the support of a Tobruk air force base. of being guards and told the girls to follow Hiftar has links to the US having defected in them. The girls were taken away in trucks the 1980s and was part of the Nato-backed to fortified Boko Haram camps. Boko Haram missions against former president Gaddafi. leaders have expressed their opposition to the Tripoli denounced Hiftar as an outlaw, as he Westernisation of Nigeria and outlined an led a further attack on Islamist “Terrorists” intent to sell the girls, via a video release by in Benghazi, killing at least 79 people and their leader Abubakar Shekau. Some of the wounding another 141. Hiftar said he was girls have since managed to escape but 219 responding to a call from the people to defend remain missing. Several nations including a them against terrorists. There remains a lack number from the West have provided


54

Intel: Issue 24

resources to help continue to search for the girls. On the very same day of the kidnapping, two bombs exploded at a bus station in Abuja, killing 88 and injuring at least 200. Boko Haram also claimed responsibility for this.

children from acute malnutrition, transport goods by road and air, avail food assistance and seeds for the next harvest season.” June: Kenyan fighter jets have been bombing the al-Qaeda linked al-Shabab and its bases in Somalia, killing at least 80 al-Shabab fighters. The Kenyan government has been pressed into action following a sustained period of attacks in its country by the al-Shabad group.

May: Boko Haram were active once again, this time attacking Gamboru Ngala in Northern Nigeria where they stormed the town and randomly opened fire, killing at least 300 residents over a sustained 12-hour period. South Sudan The world’s newest country has been locked June: Another bomb attack, this time in in civil war for 6 months now and with the the Emab Plaza, a shopping district of the breaking of a recent ceasefire, with another Nigerian capital, Abuja, killed 21 people and 60,000 fleeing their homes to bring to injured at least 50 more. A further 4 villages total displaced to over a million since last were attacked by Boko Haram in June with December. The civil war began as a personal extensive loss of life as people fled to hide in rivalry between President Salva Kiir and rebel bushes. Eye-witnesses saw approx. 20 men leader Riek Machar. Many people are now arrive in pick-up trucks and motorbikes unable to farm and feed their families, cut off “shooting everyone in sight.” from a regular food supply, whilst disease and illness is growing as a threat, such that a third Somalia of the South Sudan population are considered April: A bomb attack in Mogadishu claimed to be at real risk. the life of a member of the Somali Parliament. Isaak Mohamed Rino was killed when an IED Sudan detonated in his vehicle. Another Member of April: Sudan is facing a hunger crisis with as Parliament and several others were injured in many as 3.3m people suffering from hunger the explosion. and this is expected to rise to 4m later this year. Abdi Adan Jama, chief of FAO Sudan May: United Nations expressed concern that said that Sudan is the forgotten crisis and is Somalia was on the brink of a humanitarian getting worse. The ongoing conflict between crisis due to a poor economic backdrop and rebel groups and government forces continues insufficient funds to sustain its people. A to cause suffering in the region. lack of food, raging disease and security issues are all contributing to the increasing Americas hardship of some two million Somalis. The Brazil country continues to be at the centre of May: Ahead of the FIFA World Cup, Brazilian human tragedy and is in the top five in the Sports Minister Aldo Rebelo conceded that world for child malnutrition in under 5s. A the country faced serious security issues million people living in Somalia have been but that Brazil was working to ensure the displaced from their homes in recent times safety and security of players and spectators and are struggling to find adequate food, alike. Riots and clashes with police were in water and shelter. Philippe Lazzarini, the UN abundance in the run-up to the tournament. humanitarian coordinator for Somalia said June: Brazil’s counter terrorism strategy for “We need a minimum of 60 million US dollars the World Cup was to focus on ‘lone wolf ’ now to avoid an emergency in the coming terrorists, though the view was that even weeks. These funds are needed to treat 50,000 such an act was very unlikely. The country


Intel: World Report acknowledged the likelihood of recurring protests but viewed the risk of a terrorist incident to be very low. July: After Brazil’s exit from the World Cup tournament, trouble was at a minimum across the nation, though fans did set alight one bus in Sao Paolo. Cuba May: The Cuban government announced that it stopped a terrorist attack against its country by arresting four suspects. This incident was recorded at the first plot against the country for more than a decade. The four arrested men came from Miami and were detained after admitting they intended to attack military establishments to promote violence.

malicious was given as the cause for the shooting. April: Twenty students were injured in what was described as a ‘mass stabbing’ at Franklin Region Senior High School near Pittsburgh. The suspect was ‘arrested’ by the Assistant Principal and a security guard, having been disarmed of his two knives. None of the victims were seriously injured. May: A Los Angeles oil pipe burst causing 10,000 gallons of crude oil to be dispersed throughout the city’s streets, reaching kneehigh levels in some places. The leak lasted for 45 minutes before being closed off but not before four workers were hospitalised with respiratory problems.

Haiti June: Following the deaths of 8,500 people in Haiti from the cholera epidemic that resulted from the 2010 earthquakes, Haiti has a new threat – the chikungunya virus. The virus has been spreading in the Caribbean throughout the poorest of countries. Carried by mosquitoes, the virus results in fever and severe joint pain. Measures being put in place are fumigation and the provision of medication.

June: New York’s top police officer, Bill Bratton, said that Syria has now replaced alQaeda as the most significant terrorist threat to the US. Braxton cited Syria’s role in its spread of terror, the net result of which was to create terrorists willing to travel the world with new skills that they did not originally have. “Americans are probably going to be more radicalised than they were when they went over in that the sense that they were meeting with all their contemporaries.”

Mexico May: The Mexican chief of intelligence for the north-eastern state of Tamaulipas was shot dead with his two bodyguards. Colonel Salvador Haro Munoz and his guards were ambushed by armed men in the state capital, Ciudad Victoria. He had only just taken on his role in one of the more dangerous Mexican states, which is known as a drug route into the

June: There was an active shooter situation at Reynolds High School, Troutdale, Oregon, where the lone shooter, 15yr old student Michael Padgett, shot and killed another student and injured a teacher. The shooter had an assault rifle, handgun and knife. The shooter turned the gun on himself and died.

US. USA April: The death of an American Marine on guard duty, shot by a colleague at a Camp Lejeune, North Carolina, has been put down to an accident. The result of a negligent discharge as opposed to have been anything

June: Former US Vice President Dick Cheney accused President Obama of underestimating the terrorist threat and that he was not doing enough to counter it. “We’re in for big trouble in the years ahead because of his refusal to recognize reality and because of his continual emphasis upon getting the U.S. basically to withdraw from that part of the world,” Cheney said in relation to Obama’s


56

Intel: Issue 24

policies on Afghanistan and the Middle East. He went on to say that he believes the United States will suffer a terrorist attack worse than 9/11 before this decade ends. June: Nine people were injured in a shooting in Bourbon Street, New Orleans. A man who appeared to be angry at another man shot him and then emptied his magazine of ammunition into the nearby crowd. There were no fatalities but one person was described as critical. This was the third major shooting incident in this street in the past three years. July: An increase in the threat from a new wave of terrorist bombs that could be smuggled onto aircraft has seen security stepped up at US airports. The threat is identified as coming from war-torn Syria and is linked to al Qaeda terrorists and those travelling to and from Syria to join the terror groups. Asia and the Pacific Bangladesh May: More than 200 people died when a ferry capsized near the Bangladeshi capital, Dhaka. 50 bodies were recovered at the time and divers were involved in a search of the remainder. There was stormy weather at the time as the ferry travelled from Dhaka to Shariatpur. China April: At least two bombs went off as a large group of men, armed with knives, set about attacking people at a railway station in the city of Urumqi. Two of the attackers and another person were killed, with 79 injured, in what was described as a coordinated terrorist attack. In a separate attack in the same city later in the month, terrorists drove two vehicles into crowds at a market, killing 39 people and injuring 90. The same group is believed to have been involved in both incidents as one man was held following the attack, with four

other suspects being killed in the explosions. June: Following the April attacks and others earlier in the year, the government launched a crackdown on terrorism and 13 people who were indicted on terrorism charges were executed, with another 55 being sentenced. Hong Kong May: A Chinese cargo ship crashed into a container vessel in Hong Kong harbour, killing 11 of its crew. A major rescue operation saw one of the twenty rescue boats pull one survivor from the ship before it eventually sank. India May: A passenger train crashed into a stationary goods vehicle killing at least 40 people and injuring 150. People were trapped inside the coaches as they ended up on top of the good’s train near the station of Churaib. Prime Minister Nerenda Modi assured the country that the poor state of the rail network in India will be a top priority. Earlier in the month, a further 19 people were killed and 130 injured when a train derailed in the Western India. North Korea April: In the latest war of words between the two countries, North Korea gave a warning to South Korea that is would be reduced to ashes if there was a war between the two countries. South Korean President, Park Geun-hye, said that this new form of provocation would only continue to alienate the North from the international community. Malaysia June: A group of pirates stole millions of litres of oil after hi-jacking a Malaysian tanker off its eastern coast. The pirates were equipped with machetes and boarded the ship, taking control for approx. 10 hours whilst they siphoned the diesel into their own vessel. The Malaysian authorities said they are hunting down the pirates in what was the latest in a


Intel: World Report long line of such attacks in recent months. Pakistan May: A 50Kg bomb was defused at a police training centre, avoiding a major terrorist attack. The bomb, discovered by the VIP entrance gate of the Baldia Town police training centre was concealed in a concrete drum and was found to have a ‘death wire’ to make defusing it difficult – the sign of professional bomb makers. It is believed the plan was to detonate it during a VIP transportation. May: The Pakistani military killed at least 60 militants across 30 aerial attacks on known terrorist hideouts across northern Waziristan near the Afghan border. Locals said the deaths included women and children. The attacks were in retaliation to the work of the Taliban and came the day after a meeting between Prime Minister Sharif and the chief of the army. June: An attack of Karachi International airport by heavily-armed gunmen resulted in a day of terrorist engagements and a death toll of 30. The Pakistan Taliban admitted responsibility for the attacks. All 10 attackers were reported to have been killed by security services. June: Pakistan and Afghanistan agreed to enhance their cooperation against terrorism following efforts to clear terrorist hide-outs in North Waziristan. The countries said they would work together and take action against all terrorists without making any distinction among them and their respective locations in either country, at their shared border. Thailand April: Four bombs, including one in a vehicle, exploded in Thailand’s Muslim south, killing one and injuring 28. The bombings, in Yala, were part of ongoing insurgency efforts that have been an issue since conflict restarted

in 2004. Violence has been increasing in recent months as the rebels show their frustration at Thai authorities and their political decisions. South Korea April: The South Korean ferry, MV Sewol, capsized and sank with the loss of 293 of its 476 passengers, most of whom were secondary school students. 172 survivors were rescued mostly by fishing boats and commercial vessels. Criticism of the captain, crew, the operator and the government led to the resignation of South Korean Prime Minister and the charging of the captain and three crew members with murder. The outcome of a preliminary investigation has put the cause of the disaster down to an unreasonably sudden turn and a subsequent shifting of cargo. Europe and the FSU Bosnia May: Bosnia and other parts of the Balkans were left underwater affecting hundreds of thousands of people who were displaced from their homes. Three months’ of rain fell in only three days, creating unprecedented problems not seen since the 1990s civil war. Finland June: Finland’s security intelligence services announced that the country is facing an increased threat from links to radical Islam and terrorism groups. The report comes after analysis of the ongoing issues in Syria, though it goes on to say that Finland is not seen as being a primary target for terrorist organisations. France May: A report by Europol, rounding up terrorist activities in Europe, stated that France was the terrorism capital of Europe, being the country most affected by terrorism with 3 deaths, 63 attacks and 225 terrorismrelated arrests during 2013.


58

Intel: Issue 24

Germany May: Chancellor Angela Merkel ruled out military intervention in the Russia/Ukraine crisis citing important lessons to be learned from the previous World Wars and suggesting that diplomacy was the way to resolve the conflict. “I’ll continue working towards a good partnership with Russia,” Merkel said. Russia April: A Russian fighter jet made several close-range passes to an American warship for almost two hours, resulting in increased tension between the nations over the Ukraine crisis. Passing the USS Donald Cook by only 1000 yards, the aircraft, which was believed to be unarmed, made the provocative gesture in the Black Sea. May: Russian President Dmitry Medvedev took a swipe at US President Obama and his administration for bringing the “world to the brink of a second Cold War that nobody needs.” He accused the Americans of lacking in tact and diplomacy for enacting sanctions at the Russians. Medvedev said the sanctions would only harm businesses globally and not achieve anything productive. July: Russian hackers launched a set of sophisticated cyber-attacks on Western oil and gas companies. Nicknamed Energetic Bear, the attacks suggest that the Cold War has evolved with the times rather than died as many had hoped in the 1990s. Symantec outlined how the hackers deployed malware into computers at power plants, pipelines, energy grids and industrial equipment manufacturers, mainly in the United States, Spain and across Europe. The intention was to steal valuable documents, usernames and passwords, providing access to the most sensitive of information. Turkey April: Four people were arrested prior to carrying out a terrorist attack, being detained in Istanbul. Armed with a number of firearms

and some explosive equipment with a remote control, they were suspected of having connections with the al-Shabab terrorist group that has links with Al-Qaeda. May: An explosion at a coal mine in Soma caused an underground fire and the deaths of 301 miners. The mine became the scene of numerous protests after the rescue operation and a number of officials connected to the management of the mine were arrested and detained for investigation. UK May & June: Protesters blocked access to one of the UK’s nuclear weapons facilities at AWE Burghfield, on two occasions chaining themselves together across entrance roads. The peaceful blockade was in an effort to halt construction work at the facility which is undergoing a multi-million pound upgrade. July: Security has been increased at UK airports following the enhanced threat from terrorist links to Syria and the risk of people coming back to the UK with bombs that may evade security scanners. Passengers on some routes in and out of the UK are likely to be asked to prove that electronic devices are in full working order. Ukraine April: Ukrainian Parliament declared that that the Southern Crimean peninsula was a territory occupied by the Russian Federation and placed travel restrictions on Ukrainians visiting Crimea. May: Over a hundred thousand people gathered for a victory day parade in the Crimean capital, Sevastopol, waving Russian flags and shouting pro-Russian slogans. June: A Ukraine military helicopter was shot down with the loss of nine lives as the UN estimates a total of 420 deaths in Eastern Ukraine between mid-April to mid-June. The United States imposed sanctions against a number of pro-Russian leaders in Ukraine.


Intel: World Report Middle East and North Africa Afghanistan April: The Defence Secretary announced that the final deployment of British troops to Afghanistan was to take place in June. The drawdown of troops for Operation Herrick was to be completed by the end of the year. April: 13 civilians were killed by a roadside bomb whilst travelling in a pick-up truck in southern Afghanistan. It was the first major incident since the elections two days previously and it followed the Taliban’s declaration to target voters and candidates. May: A mudslide in the north of the country at the village of Aab Barik, killed at least 2000 with hundreds more missing. Some 300 houses became buried, affecting almost 15,000 people, as the mud and rocks wiped out everything in their path. May: The Taliban carried out a number of attacks across the country, killing 21 people, to mark the usual escalation of fighting that occurs in the spring following the winter months. As the snow melts, new passes in the mountains are opened to allow easy travel for the militant forces. June: A number of counter terrorism operations carried out by the security forces, including the army, police and Intelligence services, resulted in the deaths of 34 Taliban militants, injuring 16 more and with 11 being detained. June: A friendly-fire incident saw five American troops killed during a security operation in southern Afghanistan. The airstrike that resulted in the mistaken deaths was meant to be targeted at a group of the Taliban that had ambushed the US soldiers. July: Eight people were killed in a suicide attack on a bus of Afghan armed forces in the capital city of Kabul, which also left dozens injured. The Taliban claimed responsibility.

Iran July: Tehran said that in relation to the ongoing issues in Iraq, if it received a request from Baghdad to supply it with weapons, it would be ready to do so. Iran stated it is opposed to the militant attacks across Iraq and would be in a position assist if required. Jordan April: New articles were added to the anti-terrorism law in order to prevent local jihadists from heading into Syria to further the country’s civil war. Anyone “joining or attempting to join armed or terrorist groups, or recruiting or attempting to recruit people to join these groups” will be guilty of committing an act of terrorism. Saudi Arabia May: A terrorist organisation plotting attacks against government installations and foreign interests was dismantled, the Ministry of Interior announced. A total of 62 people were arrested for being suspected members of a terrorist group, with three foreigners amongst them. 35 of those arrested had been previously detained on security-related matters. June: King Abdullah has ordered the country to take all necessary measures to protect Saudi Arabia and its interests from potential terrorist threats. Troops have been moved to the Iraqi border as tensions within Iraq are seen to be a threat to the world’s top oil exporter. July: Middle East Respiratory Syndrome (MERS) continues to be an issue as over 700 cases have seen reported now, mostly in Saudi Arabia. The death rate stands are around 30%. Scientists have linked the disease to people working with camels and advise people coming into contact with camels to use gloves and take other protective measures. Syria April: The World Food Programme announced that Syrians were facing a


60

Intel: Issue 24

severe drought and food shortage as wheat production was at a record low. 4.2m Syrians rely on the United Nations for emergency food rations and millions more are expected to face hunger if additional food isn’t supplied to the region.

were killed in a terrorist attack at a military checkpoint in the south eastern province of Hadramout. Suspected Al-Qaeda gunmen used firearms and rockets at the checkpoint and managed to kidnap additional members of the Yemeni army. Later than month, combined US and Yemeni forces stages a April: The Netherlands announced that more large-scale attack against suspected Al-Qaeda than 100 of its citizens have left the country forces in Yemen. for Syria to become Jihadists and 10 of them May: A Colonel in the Yemeni army was have already died for their cause, including killed in a drive-by shooting by gunmen in the one as a suicide bomber. southern province of Lahj. The intelligence officer’s shooting was carried out by suspected May: The United States increased its military Al-Qaeda terrorists near a public hospital, supplies to the Syrian rebels with the provision where a medic found him to be shot several of addition TOW Anti-Tank missiles. times in the head. June: An airstrike in northern Syria killed 20 people including children, in the city of June: Another intelligence Colonel was killed Aleppo, bringing the estimated total killed by in a drive-by shooting in front of his house Syrian airstrikes to more than 2,000 this year. and was said to be involved in investigating June: The UK government announced that the abduction and killing of foreigners in the more British citizens signed up to fight with country. Al-Qaeda is again being considered jihadist militants in Syria than had joined the as the key suspects and are believed to have UK army reserves last year. Whilst several carried out a number of assassinations in hundred have gone to Syria to join the the country in retaliation for the Yemeni fighting, the army reservists recruited only 170 governments attack on AQ hideouts. additional people. June: President Assad warned that terrorism will strike back at the West and other countries that supported attacks in Syria and elsewhere in the Middle East. “The West and countries that support extremism and terrorism in Syria and the region ... must realize that this growing threat will strike the whole world, especially the countries that support terrorism and that allowed it to grow.” Yemen April: Five Yemeni soldiers


Safeguarding business, developing people. Carmdale consultants provide security advice and training to equip your business with the knowledge and skills required to protect your most important assets: your people and your property. Harming staff or damaging property is a threat to the long term survival of your business and mitigating this risk through the right training, planning and preparation is crucial. Our range of bespoke services, delivered by very experienced security, leadership and training consultants, can give you the edge when it comes to achieving your goals.

     

Crisis and Risk Management Counter Terrorism Threat and Vulnerability Reviews Facilitation of field and table-top exercises Counter Fraud and Loss Active Shooter Training and Awareness

     

Conflict Management Firearms and Tactics Skills Resourcing Media Awareness Coaching and Mentoring Leadership & Management Training

0844 995 9900 www.carmdale.co.uk enquiries@carmdale.co.uk

Carmdaily Free Crisis and Risk Management Bulletin. Sign up for our free Crisis and Risk Management daily/weekly bulletin, CARMdaily, and keep up with the events and issues across the globe. CARMdaily is a free subscription service information tool, providing you with a daily report of timely global crisis and risk management news, including terrorism related incidents.

Call us to advertise on 0844

995 9900

www.carmdaily.co.uk info@carmdaily.co.uk


62

Intel: Issue 24

FocusOn: Iraq

Source: STRATFOR

Population breakdown and religious affiliations Almost 75% of Iraq’s population (last estimated to be around 33 million in 2012) are living within the flat alluvial plains in the South East from Tikrit to the Persian Gulf. The ethnic mix is provided (see below) and the religion is dominated by a 97% coverage of Islam (estimated to be 60%-65% Shia and 32%-37% Sunni) with non-Muslims accounting for just 3% of the population. Historically the minority Sunnis have complained about the policies and decisions

of what has been a Shia led government since the fall of Saddam Hussein and it is these issues which we will be reporting on in this review. Northern Region (Nineveh, Dohuk, Arbil, Kirkuk) In the Northern region, the militant group: Islamic State of Iraq and the Levant (ISIL), have formed some formidable forces with the intention of marching into Baghdad and overthrowing the current governing regime. The Government Forces had fled the more Northern cities but press reports have stated


FocusOn: Iraq

that they have since regrouped and had started the fight-back against the growing armed militias. By 10 June, ISIL militants had taken control of Mosul and Tikrit and were marching towards their key strategic goal of taking control of the capital. The fighting to date has meant that lots of people have fled their homes with little prospect of returning any time soon. The country’s Prime Minister, Nouri alMalaki, stated that Iraq’s security forces would confront the ISIL terrorists and he called the latest seizures of the Northern towns and cities a ‘conspiracy’.

by a large contingent of his followers. The ensuing gun battles resulted in 5 police officers and 40 of Sarkhi’s followers being killed. Sarkhi managed to escape whilst the arrest teams were battling outside his house. Eastern Region (Al- Sulaimaniyah, Diyala, Wasit) April – The Iraqi Army struck a convoy of 8 tanker trucks in Wadi Suwab which was in inside the Syrian border as they were about to enter the Iraqi territory in support of the militant Islamic State of Iraq and the Levant’s attempts to take control of the North of the country. Southern Region (Al-Muthanna, Thi Qar, Misan, Al-Basrah) The Southern (Shia dominated) part of the country was relatively quiet in comparison to those activities reported elsewhere in the country.

June - Maliki had very limited hope that his troops would re-capture the towns and cities lost to the Islamic State of Iraq and al-Sham (ISIS) militants and his military troops had finally left the key town of Tal Afar after 7 Central (Baghdad, Babil, Al days of heavy fighting. Tal Afar was identified Qadisiyah, Salah al-Din) as being of great strategic importance in the April – Baghdad - The Iraqi government fight against ISIS and other Sunni-led militia soldiers killed more than 40 militants as the groups that have control of that region. anti-government fighters (mainly ISIL forces) started their assault on the capital just weeks Western Region (Al Anbar, Karbala, Al-Najaf) before the national parliamentary elections. The province of Anbar has over the last There were some real fears amongst many 6 months been the scene of many clashes that this latest assault was targeting the between the Government security forces destabilization of the election polls. and the various al-Qaeda affiliated militants. The security forces have had to deal with the June – The United States and the Iraqi break-up of a suspected training camp which governments reached an agreement on ‘legal the government have stated was used by the protections’ for US military forces to deploy militants to launch their numerous attacks. into Iraq to advise Iraqi forces against the current onslaught of ISIS militant forces. It July - Up to 45 people were killed in Karbala has been agreed that this will only be a short following a government forces security term mission where the US military forces operation to arrest a Shi-ite cleric Mahmoud (up to 300 agreed) will come under the US al-Sarkhi. The Government forces had tried Code of Military Justice and will not be to enter al-Sarkhi’s house but were thwarted subjected to any of Iraq’s judicial processes.


64

Intel: Issue 24

July – Babil Province – In a dawn raid, the Iraqi security forces launched a large scale attack against ISIL militant gangs in the Sindeeq district, killing a significant number of terrorists including Mohammed Jendal alJanabi, the military leader of ISIL. July – Baghdad – Gunmen entered two buildings in Zayouna neighbourhood in the capital and killed at least 29 people, 20 of whom were women. Although the motive for the shootings is not clear it is suspected that the two buildings were thought to be local brothels. Prostitution is prohibited under Islam which is the 97% dominant religion in Iraq. BACKGROUND ON ISIS: (Islamic State of Iraq and al-Sham (Syria) Is a Sunni militant group which has publicized its ambitions to create an Islamic

caliphate state from east of Syria across the whole of the North of Iraq. The ISIS leader, Abu Bakr al-Baghdadi, has split away from al-Qaeda because his goal (the creation of an Islamic caliphate state) is different to that of the reclusive al-Qaeda leader, Ayman alZawahiri. Due to this difference in ‘vision’ from the two respective leaders the ISIS group has ultimately taken a different route to alQaeda and although it has made some large territorial gains very quickly in the east of Syria and the North of Iraq, it remains to be seen how far it can go before coming to a halt. The gains made so far have been relatively easy as these have been in areas where large Sunni communities are on the whole, fully supportive of the ISIS vision. What isn’t so clear is who is supporting the ISIS bandwagon in terms of supply of weapons, ordnance, vehicles and training.


FocusOn: Iraq

“What has happened in Iraq recently is clearly a result of foreign meddling, a plan by the United States. The Americans want to create a second Ukraine in Iraq,” The focus of attention is being centred on the Saudis (allegedly supporting indirectly through wealthy businessmen), the US, Iran and Qatar (alleged ambitions to oust the Maliki government and impose a more fully inclusive government which will be representative of the interests of the Sunnis and the Kurds). GEOPOLITICAL: There are many countries within the Middle and further east that clearly have key interests in what is happening in Iraq at the moment and the speed of the ISIS insurgency across the North has taken many by surprise. There have been many reports of the radical Islamist militants carrying out kidnapping, torturing and killing of civilians (see above) and this has been reported by UN Human Rights investigators in the last month. Iran has offered military support in the form of arms and ammunition to the Maliki government but at the time of writing, this is as far as it has gone regards Iran’s involvement. Iraq has not requested any assistance from Iran but Iran’s deputy foreign minister, Hossein Amir-Adlollahian, has stated in a media interview that Tehran had no plans to send troops to back Iraq’s government forces who were fighting the Sunni ‘terrorists’. The minister stated in an

open press conference that, “Iraq has came [sic] up with no request to get arms from us. But if it does, then, within the framework of international law and rules as well as bilateral agreements, the arms that Iraq needs to conduct an effective fight against terrorism will be provided”. Interestingly, during the press conference Abdollahian went on to accuse Washington of being behind the recent developments. He said, “What has happened in Iraq recently is clearly a result of foreign meddling, a plan by the United States. The Americans want to create a second Ukraine in Iraq,” he said, referring to the conflict between government forces and pro-Russian separatists in east Ukraine. It has also been reported that ISIS view Jordan’s Western-backed King Abdullah as an enemy and amongst their ‘You Tube’ propaganda they have posted a video where they state their intention to ‘slaughter’ King Adbullah. Of interest was the fact that some of those on that video were Jordanian citizens who were seen to tear up their passports in full view of the camera. US President Barack Obama had already warned of the seriousness of the situation and stated that the jihadist’s militant offensive would undoubtedly start spreading to other countries.


66

Intel: Issue 24

It was also reported in late June that dozens of supporters of ISIS rallied in Maan, in southern Jordan, making this the first public appearance of this jihadist group in Jordan. Jordanian supporters were also heard to chant that “The caliphate is coming to Jordan.” An international human rights expert and one of the team members on the Independent International Commission of Inquiry on the Syria Arab Republic, Vitit Muntarbhorn, commented “We predicted a long time ago the dangers of spillover both ways, which is now becoming a regional spillover,” and he went on to say “We are possibly on the cusp of a regional war that is something we’re very concerned about.”

Council and its security chiefs. ISIS has evolved and grown at a very quick pace and is not something that the Western military machine can stop by waging a battle. Some of the answers remain at the foot of Prime Minister Nouri al-Maliki’s door as he is in control of re-forming the new government for Iraq. However, he is unable to resolve the deep issue of obtaining agreement between the Shi’ite, Sunni and Kurdish politicians on key government posts including Prime Minister, President and the Parliamentary Speaker. The Parliamentary impasse is not helping the current situation although the urgency of the need for change and stability has not gone unnoticed amongst many in the Parliament. NATO’s POSITION The NATO Secretary General, Anders Fogh Rasmussen, was recently asked for his assessment of the threat being posed from the Sunni insurgent groups that have captured parts of Iraq and Syria and in particular, what NATO could do about it. He responded by saying, “Again, NATO is focused on defence and protection of our allies. That’s why we’ve deployed the Patriot missiles to Turkey to protect Turkey against possible missile attacks from Syria. But, of course, in general, the situation in the region is a matter of grave concern. It is publicly known that the Iraqi government has requested assistance from other NATO allies.”

The UK Defence Secretary, Philip Hammond MP, in a recent interview on the Iraqi crisis stated that, “there has to be a better way than supporting extremist groups to make their voices heard.” He went on to discuss that there were two things that had to be done. Firstly, to reach out to the Sunni community leaders with some positive messaging and secondly, that there must be a very clear message to the government of Iraq that it has to change its current direction and become, “genuinely inclusive to all the communities in Iraq – that includes the Sunni and Kurdish communities.” Worryingly, Hammond then went on to say that in his opinion, “perhaps this is the last chance to save Iraq as a unified state, to reach out to the other communities, to make a clear commitment to inclusive OUTLOOK: government.” As it currently stands the future is looking very bleak for Iraq and as has been POLITICAL SITUATION IN IRAQ mentioned in several parts of this report, There is no doubt that the emergence of ISIS the main solution rests with the current has probably changed the focus and brings government. It needs to recognise and take about a shift for the UK’s National Security positive action to form a fully inclusive


FocusOn: Iraq

government which needs to include the Kurds and the Sunnis.

and undoubtedly there will be many more to follow.

There is also the question of sustainability of the current Prime Minister, Nouri al-Maliki, with some commentators stating that he should be step down and allow a fresh leader to take charge and to put Kurds and Sunnis into key positions within the current and any future government setup.

The police are also waiting to question Reyaad Khan and Nasser Muthana, both 20 and good friends, as they have featured in what is described as a ‘recruitment video’ for ISIS. The families of these two men (again from Cardiff) are both shocked and saddened to think that their sons have got themselves embroiled in this war against fellow muslims.

It has also been suggested that perhaps there is a role to play by some of the BRIC countries, specifically China and Russia who each have strategic interests both in and around the region. On the battlefront there have been some interesting alliances being formed with government forces against the Sunni led ISIS forces with some battle entrenched militiamen now standing beside Iraqi government forces and fighting under a common cause to ensure that Baghdad and all cities south remain intact and not under the control of the fast moving ISIS militants. It has already been reported that the US have sent in support to the Iraqi government in the form of specialist and elite troops who will be there in an advisory capacity. IMPACT ON UK’S INTERESTS The biggest threat to the UK and other Western countries, is that of the militant Islamists who have travelled and are now trained and fighting in Iraq and Syria. This includes those born in the UK but taken in by the large scale propaganda messaging on ‘You Tube’ and other social media which is attracting a new wave of international volunteers. The arrest of the 18 year old youth early in July in Cardiff, on suspicion of terrorism offences, is but one example

The UK’s security services have stated that they will now place a top priority on tracking these men as and when they return to the UK from Syria or beyond. The question now being raised in some quarters is that of what the security services were treating as their priority before this information came to light. What isn’t known is what capability and capacity MI5 and other security agencies in the UK have at present. It is highly likely that they’ve been caught on the hop by this new strategy being led by Abu Bakr al-Baghdadi and his growing band of ISIS followers. There is still the dichotomy of an old fashioned response being used to deal with a new and contemporary threat which is both internal and external to the UK’s borders. At a recent House of Commons Defence Committee hearing a former British Chief of the Defence Staff provided evidence when asked what he thought the greatest threats were to Britain’s security. Lord Richards, who retired as the Chief of Defence last year, didn’t hold back in his reply and said, “What I’ve been saying for years – militant jihadi and non-state actors.” He further said that this was a “massive problem” and one which


68

Intel: Issue 24

needed a “global response”.

The key threat now being posed is what action those returning radicalized jihadist The fact that the social media hype has militants will then undertake within the UK created a ‘buzz’ that is attracting lots of ‘want and how the security services and policing to be’ militants from Western countries, can assist in mitigating against those including the UK, is a very difficult situation threats. Richard Barratt, a former head of for counter-terrorism officials around the counter-terrorism at MI6, has estimated that world. It is the shear pace of change for ISIS “possibly up to 300 people have come back and the fact that this movement is getting its to the UK” already. He has warned that in worldwide publicity through news and other his view the security services were up against media reporting that is attracting Western an “impossible” task in trying to track those Muslims in such numbers. persons down. The current estimates are that there are around 12,000 foreign fighters already joined up with the current ISIS movement and at least 3,000 are from Western countries with around 100 being from the US. As previously mentioned in this article, it is the ISIS propaganda videos which are doing the ‘marketing’ and to date the Western countries have not been able to counter this global phenomenon. In June, Cressida Dick, the Metropolitan’s Police’s assistant commissioner and head of specialist operations stated in an interview with BBC Radio 4’S The World This Weekend: “I’m afraid I believe that we will be living with the consequences of Syria – from a terrorist point of view, let alone the world, geopolitical consequences – for many, many, many years to come.” In the last 18 months the UK police have made at least 65 Syria-related arrests and these included 40 arrests in the first quarter of this year alone. Those figures will undoubtedly have gone up by the time this article is published online. What isn’t clear at this moment in time is exactly how many Britons are travelling to Syria and Iraq although estimates put the figure at 400 – 500 in the last 18 months.

CONCLUSION Many political and security commentators are in agreement that Iraq has got to its current position due to the failure of its government and the leadership of the Prime Minister Nuri al-Maliki who hasn’t taken a fully inclusive approach to forming his government to date. Within government and within governmental departments including the military, he has openly disregarded the needs of the Kurds (approximately 17% of the population) and the Sunnis (approximately 30% of the population) and has never brought either of them into the fold. The fact that the Sunnis had be cast aside gave them more incentive and momentum to do something about it and the opportunity came about through the war in Syria next door. The fact that the ISIS leader, Abu Bakr al-Baghdadi, saw a golden opportunity to declare an Islamic caliphate state bordering two or more countries was an alternative route they couldn’t refuse. So within a matter of weeks the whole of the North of Iraq (Sunni dominated) was taken over by the ISIS movement. This was aided by the fact that Maliki had already dispensed with the services of most if not all Kurd and Sunni officers within his military machine.


FocusOn: Iraq Meanwhile, the central issues for forming a government in Baghdad have still not been resolved! The former British Prime Minister, Tony Blair, when interviewed by Al Jazeera in mid-June stated that in his view, the West will be pulled into the Iraq crisis ‘whether it liked it or not’ and urged that the West should be targeting the Islamist extremists (ISIS) in Iraq and Syria as long as this is with the agreement of the other Arab states in the region. At this stage this will not get the support of the Saudis who have openly said the US and the UK should stay out of this business. Blair went on to say, “I’m not suggesting we put ground troops in and we do a full scale invasion as we did in Iraq or Afghanistan, but I am saying we are going to have to take an active role in trying to shape events in Syria and Iraq and indeed across the region.” His view was that in the case of Iraq, action had to be immediate, and he specifically added that the “selective use of air power was one option.” The rebuilding of Iraq still has a long way to go and many political commentators and statesmen are of the belief that the survival of this country is now on a knife edge. It is a failing state rapidly moving towards ‘failed’ state unless something is done very quickly to turn the ebbing tides of misfortune. It is clear that a Western solution will not be acceptable to many and it has also been suggested that perhaps China and Russia could step into the fold and form a tripartite

relationship with the Iraqi government in order to find and take forward those as yet unidentified win-win solutions. Created in 2011, Carmdale is a Security and Training consultancy run by two former senior police officers, Mark Corder and Rob Hoblin, who specialised in Counter-Terrorism, Security (including nuclear security) and Training. Carmdale provides its services to organisations and individuals in the UK and overseas including recent projects in Saudi Arabia, Abu Dhabi and Libya. From security advice to training design and delivery, Mark and Rob insist that the key to success is working closely with a client to understand what they need and to ensure those needs are met. “The personal touch counts for a great deal.” Carmdale enlisted a former UK Government Analyst to create a bespoke system that identifies key issues around the world that are collated into the bulletin then named ‘CARMdaily’. With an ever-growing subscriber base, CARMdaily now drops into the inboxes of individuals across the globe to keep them informed about what is going on around them. Sign up to the CARMdaily by going to: www.carmdale.co.uk


Exceeding the standard in medical education at every level.

www.nerams.co.uk


By: Rich Aitch

COUNTERING THE EFFECTS OF SURVEILLANCE PART2: ANTI/ COUNTER SURVEILLANCE

C

ountering vehicle tracking devices Vehicle trackers are frequently used during surveillance operations. They afford the ability to follow at distance without risk of compromise or loss. They provide a backup system in the event of possible compromise or loss. They afford the capability to follow in situations when otherwise it wouldn’t have been possible and they could provide as a trigger in certain difficult pickup circumstances. Important to note that as far as the threat is concerned that is directed towards a Boss who employs a CPT there is no over importance as to any specific vehicle the tracker is to be placed . The surveillance team is aware that wherever the VIP veh

goes the B/U veh goes also. Naturally, if their aim is to fix a tracker then they will conduct surveillance to identify the best vehicle, the best place and the best time to fix one. The majority of ideal times will be those when the vehicle is being serviced, valeted, refuelled or static in traffic, (giving consideration to the SOP’s of garaging and guarding when not in use of course). It also becomes a somewhat natural mind-set on the part of the CPT that more attention is paid to the VIP veh in terms of security and protection than that of the B/U. This should not promote increased concern to the VIP vehicle but both vehicles to remain of equal importance with regards to guarding and counter-tracking procedures.


72

Feature Issue 24

Tracker Jammers - For every tracker there is a corresponding jammer: Method

Frequency Range

Corresponding Jammers

GSM Tracker

North American: 850MHz and 1900MHz European: 900MHz and 1800HMz GPS L1: 1500~1600MHz GPS L2: 1200~1300MHz GPS L5: 1100~1200MHz

Mobile Phone Jammer – JMM, JMP, JMX, JMPV, JMF

GPS Tracker

VHF/ UHF/ Tracker Stolen 167~173MHz Vehicle Products/ Lojack2

GPS Jammer – GMC07, GMC08, GMT09, GMT10, GMT11, GMT12 GMT13, GMT14, GMT16 Lojack Jammer – RMX02 UHF VHF Jammer – UV30/ UVJ01

Points to note concerning long term SV ops: It remains possible for a tracking device to be connected to the vehicle’s power supply from beneath the vehicle. It is also possible to record audio from the inside of the vehicle without gaining access to the inside of the vehicle itself – all that is required is a 1mm space.

1

Most vehicle tracking devices have three main components:

• GPS Module – to enable location finding • GSM Module – to communicate the location(s) • Processor

The GPS locates the vehicle through GPS Satellites and the GSM network communicates the information between the vehicle and the operator. GPS jammers are designed to prevent a GPS logger, GPS tracker, and GPS navigation from receiving or transmitting signals to GPS satellite. A dual band GPS/GSM jammer is used to disable both GPS device and GSM module at the same time. GPS Tracker Jammer Unlike FM radio, which is broadcast at about 100,000 watts on the earth’s surface, GPS satellites operate on 25-50 watts. Hence, the reason why buildings and tree canopy’s affect the reception of GPS, in particular a frequency known as GPS L1. There is, however, more than one frequency or “station” GPS satellites transmit on but only


By: Rich Aitch one has ever been available for civilian use and it is called L1, sometimes called L1C for “L1 Civilian”. This frequency, operating on 1575.42 MHz, has now been accompanied by L2 (1227.6 MHz), and more recently, L5, (1176.45 MHz) which was launched 2010. All three frequencies are for use in civilian environments. Each subsequent frequency has improved signal structure, higher transmission power and wider bandwidth. Operationally, this allows for two improvements. The first is increased reception in troublesome areas such as near tall buildings, tree canopy’s, etc. It also allows devices to reduce the amount of power they need to expend to receive a GPS signal. This will make putting accurate GPS receivers into mobile phones, watches… or trackers even easier. Most GPS trackers use GPS L1 and GSM communication. However, with advances in technology, there are some special trackers that also use GPS L2 or GPS L5 and transmit data in 2.4G frequencies.

LoJack is a US patented Stolen Vehicle Recovery System using a small radio-frequency transceiver hidden in the vehicle. Each LoJack Stolen Vehicle Recovery System has a unique code that is tied into the Vehicle Identification Number (VIN). The system is available throughout the world under different product names.

2

Common low-cost vehicle GPS jammers (red arrow) block all (external) GPS signals between a 5 and 10-meter radius. Theoretically, GPS Jammers cannot block

original factory fitted navigation system in vehicles such as Mercedes or BMW due to ‘unblockable’ gyroscope and speed pulse systems, (such systems are also used in aircraft and missile navigation). The jammer’s blocking range can vary widely based on factors such as proximity to towers, antenna settings, presence of buildings and landscape. Temperature & humidity can also play a role. However, through experience the blocker is so effective that at times it can still affect it to the extent of showing your position way off – just don’t ask me why. It must be remembered that some blockers only work when (12v) mains power is supplied to the device. As soon as this power is switched off then the GPS trackers will then become effective again. As such, these jammers are only effective when the ignition is on. When the vehicle is not in use – the tracker will be. This does not necessarily pose any problem if the location of the parked vehicle is not a concern. Be that as it may, it must be remembered that many GPS trackers are also loggers. Hence, if only a GSM blocker is used it is therefore possible for details of the journey to be sent, albeit after the event when the vehicle ignition is switched off. For the most part, such a technical draw back would not necessarily pose any security problem in some CP operations as the vehicle’s engine would be constantly running even with the Boss inside a venue, (not considering the lack of mobile phone usage of course). However, if it is likely to present a concern then built-in battery backup blockers are also available being charged by the same 12v socket – battery in use when ignition off – 12v supply when vehicle in use whilst simultaneously charging the battery. Of course, 5 – 10 meters only just serves the purpose in terms of jamming vehicle borne tracking devices and although the ‘plug and


74

Feature Issue 24

play’ device is very user friendly in terms of portability and use, the device does only block GPS L1 but underlines the importance of preference for a GPS blocker over one that is solely GSM. With advances and changes in technology becoming ever-increasing threats then so must the same occur in our methods of deployment in defeating them. The full bands GPS signal jammer GMT14 blocks all civil GPS frequencies: GPS L1 system, GPS L2 system and the GPS L5 system. It has a 3-hour battery back up and with a built-in fan can release heat fast and effectively thus, able to operate continuously 24/7. Combined with a range of up to 35 meters this system provides a far better anti-tracker system than any other widely available (non-government) system.

An inertial navigation system (INS) is a navigation aid that uses a computer, motion sensors (accelerometers) and rotation sensors (gyroscopes) to continuously calculate via dead reckoning the position, orientation, and velocity (direction and speed of movement) of a moving object without the need for external references. It is used on vehicles such as ships, aircraft, submarines, guided missiles, and spacecraft. The INS requires no external references in order to determine its position, orientation, or velocity once it has been initialised and so therefore it can only be countered through being physically found and removed through basic search procedure. Trackers based on INS have yet to be made available on the commercial market.

VHF (LoJack) Tracker Jammer VHF Tracker websites will state, for the purpose of the prevention of vehicle theft, how their trackers far surpass those that are GPS/ GSM based; “Jamming is a technique used by thieves across Europe to block the satellite signal to the GPS receiver, or prevent GSM-based communication with the tracking device, making it impossible to trace a stolen vehicle. Jammers are readily available to purchase via the Internet with devices costing as little as £30 able to defeat any solution reliant on GPS/GSM technologies”. However, (and fortunately), there is also a VHF tracker jammer that will block VHF LoJack, XM Radio and 4G mobile phone frequencies. Used in combination with the full bands GPS signal jammer no tracking device fitted to the vehicle will be operable to afford any real time effectiveness.

3

Full bands GPS Signal Jammer and VHF Tracker Jammer next to radio comms set. 4

In addition to both jamming devices jamming signals they were intended for, they also unfortunately have a tendency to jam mobile phone signals and even the vehicle central remote locking signal. At times, too much technology can cause


By: Rich Aitch

additional problems, (challenges), but the making and/ or providing the device methods causing the problems must remain • The opportunity to gain access to target balanced in accurately mitigating the risks vehicles to threats and workaround solutions must • The opportunity to gain access to target be developed to ensure that both operational areas effectiveness and the countering of threats • The knowledge that the target will be in are not hampered. the target vehicle/ in the target area/ at or during, the target time (frame) Bomb Jammers Bomb Jamming devices, that being RCIED, The action also requires that the enemy is (Remote Controlled Improvised Explosive present in the area. Not in order to detonate Devices), and mobile phone jamming but they need to confirm that their target is devices mainly encompass the sphere of present in the area of the bomb during the detonation itself. It is naturally of preference 5 User caution – Jamming equipment is illegal to the threat therefore, that if a bomb is the to use in the UK due to violation of the Wireless preferred chosen method of attack then a Telegraphy Act 2006. Also illegal in the rest of the victim operated device, (VOIED), typically EU and the US placed under vehicle, (UVIED), to be used negating the required presence of the government protection operations within enemy during detonation. However, this is normal operating environments and require dependent on the window of opportunity for a much extended range. Vehicles fitted setting and placing the device itself. Even for electronic counter measures, (ECM), though I do not believe there to have been equipment are not often used in a corporate one single incident in history that involves protection environment within Europe this type of attack in the corporate sector specifically, simply for the fact that the threat in Western Europe, this is not to say that of bomb by remote detonation is so minimal corporate protection operations would not that to exercise the huge cost in employing experience any kind of bomb threat but that counter measures equipment would be the threat would be increased according to unbalanced in mitigating such a minimal the travel movements of the Boss and the risk to threat – not considering the manner subsequent country of operation. in which the operation is conducted. It must be remembered that access to the In addition to the operational specifics intended vehicle for the target of attack is concerning the Boss, the use of a RCIED not always required. The positioning of the being used as a direct threat to a Boss is RCIED device, as a road placed bomb, often affected by the following: horrifically highlighted in the Middle East, is a devastatingly effective method that is • The country of operation best countered by lack of routine; change • The technical knowledge and expertise of of routes and times, and if possible, change the threat of methods of travel. Although not directly • The logistics and contacts required in associated with surveillance, RCIED’s,


76

Feature Issue 24

both the placing in either areas or in or under vehicles, the detonation itself will require a certain element of it, as does any form of attack. The use of bomb jamming equipment will provide the additional but important cover ensuring the overlapping of security methods and procedure. However, it must be said, that if a corporate CP op experienced a direct threat in the form of IED’s then information of such must be given to the local law enforcement authorities, (dependent on country). Of

course, generally, and as with other threats that may be associated with the assessment, their response will be dependent on whether that threat was proven to the point of beyond reasonable doubt or not. It very much remains the case therefore, that for the most part, the commercial CPT is left to its own devices (no pun intended of course). UHF/VHF Radio & Mobile Phone Jammers Jamming equipment, although usually for

the use by those involved in defence and protection can also be used by the very hostile action they were designed to counter. Communication is vital. No time more so than in an emergency (RTA). The strong jamming power provides the ability to jam and block all UHF VHF walkie-talkie, two way radio, audio bugs and remote controls within 10 seconds. The high-speed cooler fans and aluminium filter makes UHF VHF jammer work 24 hours 7 days continuously. With a power inverter it can be used in a vehicle with an effective range of up to 60-meter radius. It must be remembered that whatever resources are available to the CPT; they are also available to the threat. Reactions and procedure are increased in effectiveness with


By: Rich Aitch

It is naturally of preference to the threat therefore, that if a bomb is the preferred chosen method of attack then a victim operated device, (VOIED), typically placed under vehicle, good communications. If comms are down then any subsequent reactions by the CPT to identified surveillance, incidents or an attack will naturally be affected to great benefit of the threat. Car Remote Jammers Some of the previous mentioned jammers as stated, will block car remotes by default, such as the LoJack jammer. However, there are 3 main designated jammers solely made for the purpose: Frequency RCM315 -- 315MHz + - 2MHz Frequency RCM433 -- 433MHz + - 2MHz Frequency RCM868 -- 868MHz + - 2MHz Working distance of RCM315/433: 10~20 Meters Working distance of RCM868: 5~10 Meters Each device blocks only one-frequency point, applicable for disabling vehicle remote locking and garage door remote controls. The three different frequencies are designed for those car manufacturers from Asia, Europe and the US. However, some vehicles such as BMW have different frequencies that cannot be blocked by any of the three designated jammers but will still be blocked by the LoJack jammer. Hence, if a requirement exists for a specific targeted vehicle then as per the preparation in surveillance operations, tests need to

be conducted on a similar vehicle prior to the op itself. It does remain a question of the particular circumstances or application surrounding such a use but suffice to say that some security and surveillance operations have, at times, some unorthodox and taboo requirements to fulfil their aims. It may also remain a fortunate verity that anything that operates on a frequency also has its opposite jammer… • Wireless camera jammer • WiFi jammer • WLAN blocker • Wireless signal disabler • Bluetooth disabler • XM satellite radio jammer • White noise audio recorder jammer …the list is endless “This article is an extract taken from Rich Aitch’s book “Close Protection” the third part of the article “Anti / Counter Surveillance” will follow in the next edition of The Circuit.


78

Advice Issue 24

The importance of personal development, and how academic and vocational courses feed into this, has been a common theme in this column.

N

ow it’s time to look at the next steps once you have actually signed up for a course or training programme. After the initial excitement of registering there is often a lapse of a few months, especially for University degrees, so you are quite calm and everything feels like it’s a long way away. Then, all of a sudden you are a week away from starting a course and you feel like a child confronted with the first day of secondary school. So, with the new academic year rapidly approaching it is the opportune time to start preparing for your course to start.

Where do I start? First things first, do you remember why you signed up for the course? What do you want to achieve? Write this down and stick it on your fridge/mirror/diary/course workbook as a reminder. This will not only help to keep you focused but hopefully motivated too. Now that you have identified why you are doing the course, the next steps are to think about how it will fit into your life and how to get the most out of it. Hopefully these tips will help you.


Dr Amy Burrell, Associate Trainer, Perpetuity Training Top tips Lectures If you attend lectures focus on listening to what is being said rather than writing it all down. You might be able to revise written notes later but these will be of limited use if you don’t know the context because you weren’t listening properly when you made the notes. Lecturers will provide you with copies of their slides and should provide recommended reading for each lecture.

There are a number of common mistakes people make when completing an assignment. Here are some top tips to help you avoid these pitfalls: • Read the question/task carefully and answer the question/task you are asked rather than the one you want to answer. I was once sent an assignment for marking that was supposed to be on how you might measure the prevalence of domestic violence. The assignment I received was entitled “The Many lecturers will use case studies and/ causes and effects of domestic violence in or group exercises to demonstrate how new India” – as you can imagine I didn’t even ideas can be applied in the workplace and need to read it to fail the assignment. I’m give you some practice on implementing new sure it would have been a very interesting skills. It is important to participate in this read but they didn’t actually answer the group work. Not only will it provide a safe question and so it was an automatic fail. environment to test out new skills and try • Buy a few core textbooks – look at the new ideas but it may also work as a useful reading list provided for the course and networking opportunity. select some from this list. Also read book reviews and speak to existing students to Don’t be afraid to challenge ideas in lectures – find out which books are worth having a discussions and debates are an excellent way copy of. I would not recommend buying law to learn about new topics (and if your lecturer books as these become dated very quickly is anything like me they will deliberately be so suggest using online resources for the controversial to stimulate debate!). However, most up to date information on this topic. be wary of being provocative in assignments • Give yourself enough time to research the if you cannot back up your perspective with question properly and draw on a wide range independent and reliable evidence. of evidence when writing assignments. • Bodyguarding is predominantly an Assignments experience led profession and you may Assignments are a core component of find you want to draw on your personal any accredited course. Many Universities knowledge and expertise to answer will strive to make assignment questions questions. Whilst many University as applicable as possible to your working lecturers will be happy for you to use your environment. However, this is not always experience to form your arguments, I would possible so you may find yourself focusing recommend backing up your views with on theory rather than application at times. independent evidence from textbooks and My advice, try to embrace theory as much as journal papers etc. wherever possible. you can and make the connections between • Consider the weight of the evidence you are theory and practice for yourself. presenting – remember information from


80

Advice Issue 24

a paper in an academic journal is likely to provide more solid evidence than an article in a newspaper (especially tabloids). Whilst Wikipedia is a useful starting point to find out about a new topic, personally I would not recommend citing it directly in an academic assignment. • Consult your study guide as this probably includes an assignment writing guide. • Stick to the word count – there is often scope to go 10% above or below the word count but too much lower or higher and you may find the assignment is not marked. This is may not be an issue on some courses where the word count is recommended rather than set but some Universities can be strict on this point so it’s worth asking what the scope is. • Use the correct format. Remember if you are doing a dissertation, you will probably need to hand in a bound hard copy of it and so pay close attention to the wider margins you will need on the left hand side to allow space for the binding. Correct formatting also extends to font. Many courses will not specify a font you should use but will normally make a recommendation. Often this will be Arial or Times New Roman. Do not use Comic Sans unless your assignment is to design a poster or similar - I am a marker and dodgy font choice in an essay can easily put me in a bad mood when marking. • Ask to see the marking criteria – assignments are often marked on more than content. Structure, formatting, and referencing might also contribute to the final grade. • Use the recommended referencing system. Referencing is awkward sometimes as it can be quite strict in terms of formatting. However, it is an important part of academia as it demonstrates where you

have accessed evidence from and so I would recommend making the effort. If you are unsure on how to format references, consult your study guide or ask for advice. • Look at the feedback you received from previous assignments and try to address the criticisms in your current work. • Don’t be afraid to ask for an extension if you need it but don’t use it as an excuse to procrastinate. Make the most of what’s available • Get your library card – you’d be surprised what it gives you access to. • Make time to study – build dedicated time into your schedule. This might be a few hours in week or a block of week etc. depending on your preferences. • Find out who your personal tutor is and how you can contact them. This is especially important if you are enrolled on a distance learning course. Your tutor is there to help you so don’t be afraid to ask them questions. • Go to conferences and workshops to keep up to date with new developments. • If you are enrolled on a degree course, make the most of any free training/events available through the University. You will find that there are lots of events running for free that you can attend if you are on site. Get signed up to internal newsletters and go along to events that sound interesting, not just in your subject area but more general topics. For example, many Universities run CV clinics and/or training on transferable skills such as leadership and communication. You should also be able to access training in computer software, social media, website building and alike if this is of interest. Conclusion Embarking on a new course can be


Dr Amy Burrell, Associate Trainer, Perpetuity Training

daunting but don’t worry. There should be plenty of help and support available from your lecturers and your personal tutor. Stay focused on what you aim to achieve and make sure you attend all face-to-face elements of the course. Build time in to work on your assignments and make sure you answer the questions you have been asked. Also, make sure you keep a record of your achievements, e.g. courses attended and qualifications gained, as this will help you evidence base your knowledge and experience at job interview. Update this regularly to ensure you don’t forget anything. The British Bodyguard Association are introducing the CPD Profile which aims to give professionals a secure, specific place to record their career progression which might

At Perpetuity Training, we aim to help you build your career by offering a wide range of courses in Security, Investigation and Risk Management.

be a good option for you. See www.bba.org. uk for more information. Last but not least, good luck! About Dr Amy Burrell Amy holds a BSc in Applied Psychology, an MSc in Forensic Behavioural Science, and a PhD in Psychology. Amy is an Associate Trainer at Perpetuity Training; a company specialising in security and risk management training. To find out more about Perpetuity Training see www.perpetuitytraining.com or email training@perpetuitytraining.com Amy also works as the Network Facilitator for the Crime Linkage International NetworK (C-LINK) project based at the University of Birmingham. To find out more about C-LINK email Amy on a.burrell@bham.ac.uk

Specialists in Security, Investigation and Risk Management Training BTEC Level 4 Classroom Training Security Management Managing Security Surveys Risk, Crisis & Disaster Management

Workplace Interviews & Investigations

Distance Learning Courses SYI BTEC Level 3 Certificate in Security Management SYI BTEC Level 5 Diploma in Security Management

Other Training Through our sister company Arc Training International, we can also offer the following courses: First Response Kidnap & Ransom classroom training Business Travel Security Management One Day Workshop Kidnap Risk Reduction & Response One Day Workshop And many more...

www.perpetuitytraining.com ● 0116 277 3313 ● training@perpetuitytraining.com

Part of The Linx International Group


82

Medical Issue 24

EMT-Training Dealing with Fractures;

Fractures are common injuries faced by EMT’s on a regular basis, but when you think back to your EMT-training did it cover why we do, what we do?

T

here is more to fractures than splinting, and more to splinting than immobilisation- let me explain.

P is for PAIN; Treat using our four P’s principle; The Propper Place to start is from the Patients Perspective This will keep you focused on the reason you are here- to help someone who is injured and in pain. This may seem common sense, but many people forget basic EMT-training when faced with decision-making scenarios. So here are a few tips to consider; • Introduce yourself calmly and ask your patient their name- if they are sitting down

then you need to kneel down to their level, this will help you build rapport and trust with you patient. • Tell them you are here to help and you are going to do something about their pain as soon as possible. • Find out the mechanism of injury- how the injury happened, what forces were involved and has the fracture been moved or manipulated since then? • Have the patient look away from the injury or have something obscure the view while you fully expose the injury site. • Remember to explain you are just looking at the moment and you are not going to move it yet. • Establish if the fracture is open or closed- if it is open take appropriate action to control


EMT-Training Dealing with Fractures; By: Adam Barrett

bleeding (explain what you are going to do, before you do it) • Check for a palpable pulse below the site of the fracture and note its quality (if this is not possible check capillary refill time) A is for Act on your findings; You informed you patient that you were going to reduce their pain, now is the time to deliver on your promise. We use Entonox at EMT level for pain relief, however you will need to follow your own organisational protocols. In our EMT-training we teach the O,P,Q,R,S,T pain assessment. (© Christopher J. Le Baudour) The letters OPQRST comprise a mnemonic (memory device) designed to help the EMT remember specific words which in turn are supposed to trigger questions pertaining to the assessment of the patient’s chief complaint, typically pain or some type of discomfort. While the OPQRST tool has been modified and expanded by some to include additional words and questions, the following serves as an excellent primer on its basic use.

O = Onset – The word “onset” should trigger questions regarding what the patient was doing just prior to and during the onset of the specific symptom(s) or chief complaint. • What were you doing when the symptoms started? • Was the onset sudden or gradual? It may be helpful to know if the patient was at rest when the symptoms began or if they were involved in some form of activity. This is especially true with patients presenting with suspected cardiac signs & symptoms. P = Provoke – The word “provoke” should trigger questions regarding what makes the symptoms better or worse. • Does anything you do make the symptoms better or relieve them in any way? • Does anything you do make the symptoms worse in any way? This is sometimes helpful in ruling in or out a possible musculoskeletal cause. A patient with a broken rib or pulled muscle will most likely have pain that is easily provoked by


84

Medical Issue 24

palpation and/or movement. This is often in contrast to the patient having chest pain of a cardiac origin whose pain is not made any better or worse with movement or palpation. Q = Quality – The word “quality” should trigger questions regarding the character of the symptoms and how they feel to the patient. • Can you describe the symptom (pain/discomfort) that you are having right now? • What does if feel like? • Is it sharp or dull? • Is it steady or does it come and go? • Has it changed since it began? This if often the most difficult question for the patient to understand and to articulate. The key here is to allow the patient to use their own words and not try to feed the patient with suggestions that they may choose simply because you have made it easy. It is sometime helpful to offer the patient choices and allow them to decide which is most appropriate for their situation. For instance, “is your pain sharp or is it dull” or “is your pain steady or does it come and go”? R = Region/Radiate – The words “region and radiate” should trigger questions regarding the exact location of the symptoms. • Can you point with one finger where it hurts the most? • Does the pain radiate or move anywhere else? Although it is not always easy for a patient to identify the exact point of pain, especially with pediatric patients, it is important to ask. Asking if they can point with one finger to where it hurts the most is a good start.

From there you will want to know if the pain “moves” or “radiates” anywhere from the point of origin. The patient may need you to offer some suggestions such as, “does the pain radiate anywhere else such as your back, neck, jaw or shoulders”? Always give them two or three choices and allow them to select from the options that you give. S = Severity – The word “severity” should trigger questions relating to the severity of the symptoms. • On a scale of 1 to 10, how would you rate your level of discomfort right now? • Using the same scale, how would you rate your discomfort when it first began? It’s not always just about how bad the pain or discomfort is when you arrive, this is a common mistake made by many new EMTs. Once you have established the level of discomfort that the patient is experiencing at that moment, you must follow this up with how severe the discomfort was at onset. This will help you establish whether the discomfort is getting better, worse or staying the same over time. You will want to follow these two checkpoints up with an additional check once the patient has received some of your care and reassurance. Often times with a little oxygen and reassurance the symptoms may subside. Ask the patient a few minutes later how the discomfort is and if it has changed at all since your arrival.
 T = Time – The word “time” should trigger questions relating to the when the symptoms began. • When did the symptoms first begin? • Have you ever experienced these symptoms before? If so, when? Establishing an accurate duration of the symptoms will be very helpful to the hospital staff that will


EMT-Training Dealing with Fractures; By:Adam Barrett

pain measurement scale

be caring for the patient. This question has special importance when caring for patients presenting with suspected cardiac signs and symptoms. What to do with the information you gather…It is important to remain as objective as possible during your assessment and use the patient’s own words whenever possible, no matter how silly it may sound to you. Although it may appear like it sometimes, you are NOT trying to find a diagnosis for your patient. You are simply there to gather as many pertinent facts as possible and provide care based on the patient’s signs and symptoms. It is always appropriate to take notes as you gather your patient history. This will minimize the chances of forgetting an important detail during your handoff or while completing the appropriate documentation.

N.B. Should the injury have an un-palpable pulse or poor capillary refill below the fracture site, reduction of the fracture should be considered within your own organisational protocols prior to applying the splint. Another reason we favor these is, if the splint is applied effectively the patients pain is significantly reduced. Like we mentioned at the start of the article, there is more to fractures than splinting, and more to splinting than immobilisation. Patients like EMT’s who reduce their painFACT

N is for normality; Now the Patient’s pain is controlled and the main actions have been considered, you need to ensure that the following below site I is for Immobilise; characteristics are normal; Your basic EMT-training should have given • Pulse- is there still a palpable pulse? how you options for immobilisation such as back- does the quality compare to the baseline slabs and box splints, we favor the new kid prior to splinting? on the block- the vacuum splint. • Pallor- is the skin pallor consistent to the rest of the body, E.G. how does one arm The reason we favor these devices are compare to the other? because they conform to the fracture and require minimal manipulation of the Temperature- is the skin temperature injury. consistent with above the injury?


86

Opinion Issue 24

Putting it all together Will the REAL Front Right Seat – Please Stand UP

M

any months ago I coined the phrase “Front Right Seat” as another branding opportunity for a specific standard in the industry that specialists should strive to obtain. In the beginning I defined the Front Right Seat as the leadership positions of the detail. As time went on I noticed that specialists, particularly those in the United States started using the term loosely as a badge of honor or rise of their status.

I knew some of these specialists personally and was absolutely sure that they did not have the training for the full responsibility or standard of that specific position. I also knew that it was no fault of their own when they don’t know, what they don’t know. As I sat back and took an honest look at the industry I realized that the reason they don’t understand the concept behind the title is because they haven’t been taught it and more importantly, they don’t have the practical experience and application.


By: Eric Konohia Front Right Seat

“This is where you could see the light bulb come on in everyone’s head. It’s not until you understand the duties of each position”

Let’s take an honest look at the first allegation. The industry has taken a weird approach on stressing the singular approach to protection. There are and have been courses solely focused on the single or “solo” specialist. The facts cannot be disputed that most of the executive protection work nowadays is done with two [2] or less specialists per detail. From my perspective schools have taken advantage of this in the WRONG direction. This is a poor attempt to form a niche market from within the industry while taking advantage of facts and systematically dismissing the principles of protection. You cannot appreciate this mistake until you place one of these specialist trained in solo operations, within a team dynamic. They are lost and it becomes apparent very quickly and I know why.

About four [4] months ago I put together list of bullet points that I felt, if shared in a group setting, would tie together the loose ends of the specialists in the industry that fall in this lost generation of trickery. The Front Right Seat transformed from a branding idea to a SOLUTION. I challenged and forced myself to stay clear of forming yet another executive protection course. I do not and never aspire to run a training course. I’ve always felt that my appointment was to give direction and guidance towards the standard. The result was five [5] full days of a symposium called the FRONT RIGHT SEAT LEADERSHIP ELEVATION PROTOCOL aka Front Right Seat, directed towards INVITE ONLY specialists that met a certain, non-negotiable criteria. I made it a point that I would NOT advertise the FRS to elicit candidates, but rather, be very selective using the 4P platform. The underlying premise of the entire week is to equip each and every candidate with the tools to be able to operate efficiently, effectively and at a much higher level on any detail regardless of size, composition nor their position on the detail. I would make it a point to every candidate that there would be no review of the basic principles of executive protection and that the symposium would move at a very fast pace. The pace would force a team effort that is often lost in a 5 day course. If a protection principle was lacking by any individual the rest of the candidates would be forced to fill the void because this is a PASS/FAIL week. “This is where you could see the light bulb come on in everyone’s head. It’s not until you understand the duties of each position in a FULL detail and start to remove people from it that you get a sense of the complete


88

Opinion Issue 24

weight of responsibilities that the individual specialist truly has”……. From a student’s review I put a lot of thought in the Front Right Seat symposium so that every component of each day was a building block for the next day and a solution for the end of the week. It all had to make sense to me and not a haphazard list of modules to attract candidates. Without revealing the recipe for this platform it suffices to say that at the end of the first group every candidate stated that they had never experienced it before in their respective executive protection courses and more importantly that what they had learned previously made sense. The Front Right Seat is and never is intended to attack any executive protection course nor do I waste my time comparing what one course does over the other. I can ONLY speak from authority over two [2] courses in this industry however from a Front Right Seat candidate I listened to their concerns regarding what they learned or did NOT learn from the other courses they attended. “I was never taught that, seemed to be the theme of the week.” I never took that as an attack on any training provider, but more of an affirmation that I was correct on my analysis of the modern day specialist. One of the other features I incorporated at the end of the session was an exit interview with each individual candidate to go over observations made during the week. I wanted to make certain that each of them knew where they had excelled and what areas I felt they needed to continue honing as they transitioned back into the CRAFT. The week’s following the symposium resulted in two [2] students doing a blog and a video review of the course. One student in his video stated that, “Once you attend the front right seat you don’t want to go back

to doing protection the same way.” The other candidate wrote, “He allowed us to see behind the veil to take a glimpse into his EP mind and his philosophy of EP acquired from a life of experience. I now understand how he thinks from an EP standpoint and why his standard, and now mine, is so high when it comes to this craft.” As I tracked the candidate’s progress when they returned to their respective homes I clearly saw a measurable difference in their output, their skills and how others saw a significant difference in each of them. There is a noticeable “assuredness” and less timidity or doubt in their ability to convey the right way to perform. More importantly all but one has seen a rise in working details. The


By: Eric Konohia Front Right Seat one exception has nothing to do with his skills but everything to do with the fact that he has surpassed everyone’s expectations and now owns his own company. Sending work his way could easily be viewed as feeding the competition. To that I say – JOB WELL DONE!!!!

that is delivered. There are no mix messages, mixed philosophies, short-cuts or ways to circumvent the principles of protection. Each candidate signs a Non-disclosure agreement and at the conclusion is given a manual that rivals ALL the material they’ve ever received in this industry.

The Front Right Seat is not and will never be intended to replace anyone’s 5, 10 or even 30 day executive protection course. It is not a course that has a calendar with set dates. It is a mechanism that is driven by the pulse and the state of the industry. Each candidate understands the exclusiveness of the course because ONLY paid candidates are allowed in the room. No one is allowed to sit-in, watch or chime in with mixed information

So if you run into any of them and you use the term SOLO specialist, SOLO operator or SOLO anything, be warned that your definition is not the same as theirs. To them SOLO stands for: Same Outcome Less Operators They are thoroughly immersed and can scale up or down and appreciate the difference either way.


90

Advice Issue 24

INVEST SOME TIME IN YOURSELF AND MAKE IT HAPPEN How many people reading this article can honestly say that they put the amount of effort into finding employment that is required to find work in the security industry or to progress their career.

T

he answer is very few, if you sit in front of the computer trawling the same sites, sending the same un-tailored CV off then there is a reason you are finding it difficult to find work. This is without doubt a difficult industry to get into, and no one is going to offer it to you on a plate. It’s not going to get any easier either, but with hard work and mastering the application process you can give yourself a real advantage over those who are putting minimal effort into finding a job. Social media provides an easy way for employers to advertise jobs, especially those that need filling in a short timescale, but competition for jobs found


Invest some time in yourself By: Tom Richmond this way is high so you need to make sure you stand out from this crowded job market. The recruiter will be very busy which is why they have chosen to use social media so don’t make their job any harder and ask them to PM you details. Instead get straight in there, don’t just say you’re available though, take the time to PM the person posting the role with a very short summary of your career and mention that you would like to send your CV to them. A short punchy profile from your CV is ideal for this but leave off personal attributes and stick to the facts like the roles you have conducted, who for and time employed. There’s no need for them to read anyone else’s CV as you’ve saved them the time trawling by providing an easy to read summary about yourself therefore making their already busy job much easier than those that are actually causing them an additional admin burden asking unnecessary questions or requesting more details. You hear the term standing out from the crowd a lot but to really stand out from the crowd play the long game. If you’re just starting out in the industry then you need to look further than your next pay cheque. To really stand out from the crowd and give yourself the potential for more, and better paid, work then a language is the way to go. Less than 1% of operators have a decent language competency on their CV, therefore you can be in high demand if you take the time to educate yourself in a language. It makes a team look very professional if they can converse with their principal in their native language. Plus you can build a better relationship with the principal than those operators that can’t converse with them and it takes a level of education to learn a language so you appeal to companies as someone they can develop. Most operators have their CP BTEC Level

3, FPOS-I / MIRA, Basic Mobile & Foot Surveillance qualifications etc. Very few have a professional training competency above a level three though so again this is a way to start to stand out from your peers who have very similar backgrounds, qualifications and experience. In addition do a little planning and work out what the next industry qualifications are going to be and get them before the masses do. Five years ago the only medical qualification needed was FAAW, then it was FPOS-I, then MIRA, ATOM and REMIT................. so what next? If you wait until the next industry qualification is announced then even if you get it you’ll be out of date within a few years. It’s quite incredible how much people talk about networking being the key to the industry......... but how few actually do it? If the industry is all about who you know then get to know the right people. Keep contacting those who have influence in the industry or within operational companies until they take your call. A thirty minute meeting for an informal coffee is all that is needed to establish a relationship where you become one of their chosen operators who consistently receive calls with employment opportunities. I can write from experience working with one of the big companies, we would meet those that had contacted us every Friday (so they could buy us coffee ) and the reason we were able to meet all that contacted us was because so very few people did it. Step away from the computer and lift up the phone, this really works as you’re unlikely to be put on task with a reputable company unless they have met you. If most operators are honest with themselves they’re probably drifting in their career from job to job with an idea of where they would like to go but nothing in place to help them


92

Advice Issue 24

Work hard to master the application process. Find jobs that are suitable for your level of experience in the industry so you don’t waste time applying for jobs that aren’t realistically achievable. really achieve it. By establishing yourself a one, three and five year career plan it will make you focus on achieving your aims and goals rather than just letting your career develop without any real direction. Very few people do this but those that do this effectively will see much quicker progression in the industry than those that don’t. It can help you plan financially so you can afford the courses you want, work out what roles you need to do and when in order to achieve that dream security industry role and provides focus to those duller times in the industry as they are all part of the wider plan to help you achieve your potential. It might be controversial to some, but have your CV professionally written. It’s no good having fantastic experience and qualifications if no one ever reads your CV, only 10% of CVs are ever read. If your lights don’t work at home you get an electrician. If your car breaks down then you see a mechanic. So when it comes to finding employment why does everyone all of a sudden become a professional employment consultant. Let someone who knows what they are doing guide you through the process or spend some time researching security industry specific employment advice. Work hard to master the application process. Find jobs that are suitable for your level of

experience in the industry so you don’t waste time applying for jobs that aren’t realistically achievable. Tailor your CV to the job description every single time you apply for a job. Check and re-check your punctuation, spelling and grammar before pressing the send button on your e-mail. Always follow up an application with a phone call as less than 1% of people do this. Prepare fully for your interview, don’t leave anything to chance. Smashing the interview can give you an edge over someone who doesn’t interview as well but that has better experience and qualifications than you. Become a student of the industry, educate yourself on where commercial security really started, the journey to where we are now and more importantly work out where it is going so you can preempt possible employment opportunities. Keep up to date by reading blogs, articles, journals, social media posts and stay abreast of current affairs that effect the industry. In addition try to play an active role in the industry, write a blog for others to learn a bit about you, offer an opinion on some of the hot topics effecting the industry, offer admin support for a networking event, help a training provider out with scenarios on one of their courses. The industry is a lot


Invest some time in yourself By: Tom Richmond

smaller than it seems and a good reputation goes a long way. There’s no need to do it alone, work on finding employment with someone who is at a similar stage in the industry as you are. Share the job hunting process, check each other’s CV before sending them off, bounce ideas to gain employment off each other, attend different seminars or networking events but share the information you gain, if you find a job not quite suitable for you, it might work for your employment buddy and vice versa. This is a very effective way of finding employment but very few people do it, the more people in your group the easier it is.

In a crowded market place make sure it’s your CV that is getting read. Stand out from the crowd because you’ve planned ahead and gone above and beyond what everyone else is doing to develop yourself. Get out there and meet the right people, build your profile in the industry by getting involved and establish yourself a reputation as a true professional. There’s a lot of information out there for you to research but take some guidance from someone who specialises in this area of the industry. Most importantly though, If you really want to gain employment in the security industry then invest some time in yourself and make it happen.


94

Review Issue 24

Book Review: Personal Security Pocket Book By: Rupert Godesen

A

UTHOR: The Personal Security Pocket Book is written by Rupert Godesen. Rupert has been a soldier in the Reserves for over 23 years, he has served on operations in Bosnia, Iraq and Afghanistan and travelled all over the world on exercises to teach and for pleasure. He has worked with the firm that trained the BBC to assist with their hostile environment training. For six years, he conducted courses in the United Kingdom, as well as for the World Service in Islamabad, Delhi, Nairobi and New York in this capacity before starting his own training company called HASP Training. The Personal Security Pocket Book is an informative guide that is illustrated throughout with images and infographics by Rupert himself and is a distillation of all of the author’s experiences and knowledge gleaned throughout his career. WHO IT IS WRITTEN FOR: As a general primer, this pocketbook contains information for anyone who is planning travel overseas. The guide contains a lot of useful and common sense information that will serve beneficial to a broad spectrum of people. The guidebook follows a narrative from the first page and explores looking at ways travellers of all kinds -be they corporate lawyers, oil executives or gap year students- and ways they can mitigate potential risks to themselves while overseas. TOPICS COVERED: General Travel Tips; Risk Management; Common Threats/Trends; Personal Security; Pre-Trip Planning; Living & Working in Unfamiliar Environments; Using an Interpreter Effectively; In Your Hotel; Out & About; Vehicle Security & Checkpoints; Weapons; Mines; Kidnap & Ransom; and miscellaneous Resources as such Medical kits; Grab bags, etc. Overview: The small pocket guide contains some very useful information and can come in quite handy anytime one plans a trip overseas. A lot of the topics covered are based in common sense.

However, common sense is not always common practice. For example, the author offers some very practical advice on how to hail a taxi in a foreign airport that one may not think of when actually faced with the situation. Suggesting tips like not following the driver into a dark parking lot and into the unknown and instead getting the driver to bring the cab around to the front of the terminal; agreeing to the price of the fare before you get in; and ensuring that the driver knows where he’s going so if he gets lost you have a strong argument for not getting ripped off for more money. That said, there is also information that may not be commonly known or might not have been considered before. For instance, some countries, i.e. Russia, require an HIV/AIDS clearance certificates before entry. The guidebook can also be an entertaining read at times, especially when the author sprinkles in funny and informative anecdotes from his own travels and experiences. For instance, a good takeaway for any foreign visitor to the US is to have the name, address, and phone number of the US citizen who will be hosting you to avoid a third degree interrogation from immigration authorities upon entry, as the author did. Summary: Overall, this book is perfect for those who are not regulars to foreign travel and for the non-security minded. As an experienced security professional, this book should not prove to be too enlightening a read, but where it does have a place is a practical guidebook, which you can refer your clients to as essential reading before deploying to a hostile or unknown work environment. This book can be purchased direct from Book Sellers via ISBN number: 978-1-874528-21-0, or Amazon & Ebay. It is also available as a free app download via the Military Pocket Books APP on the Apple App Store and Google Play, Amazon App Store for Android



96

To place a classified lineage or box advertisement telephone our sales team on: +44 (0) 191 6450 865

Classifieds United Kingdom 3D Security Ltd Taunton, Somerset, TA1 1TG Based in Taunton 3D Security provides security services for a wide range of clients. Whether you need a security guard in Somerset, event security in Leeds or Close Protection in London we will provide a solution for your needs. T: +44 (0)1823 253 001 W - www.3dsecurity.org E - enquiries@3dsecurity.org.uk A.B.I. Solutions A.B.I Solutions is a dynamic, forward thinking company, specialising in surveillance, security and investigations with local, national and internationalexperience. A.B.I provides a wide range of services to the corporate sector and individuals alike. W - www.abisolutions.co.uk Amanda Campbell A highly motivated and experienced female operative both CP and Surveillence training T – 07596542249 W - www.amandacampbell.org.uk E - ac@amandacampbell.org.uk Ambassador Security Management ASM MK Lions Arena, Grafton Court, Snowden Drive, Winterhill, Milton Keynes, MK6 1AJ, GBR. After successfully gaining ACS (Door Supervision and Manned Guarding) along with ISO 9000, we here at ASM have a dedicated management team with hundreds of years combined experience in the security industry. W: www.asmsecurity.co.uk E: scott@asmsecurity.com T: 08458335750 Ark Personal and Asset Protection Ark, 2b Crow Lane, Rochester, Kent, ME11RF, GBR A small, efficient, highly descrete company employing ex special forces and detectives for all civil and corporate covert needs. E: Office@arkprotect.com T: +0044 01634 845526 Argus Europe County Durham Argus Europe has been providing specialist training for high-net worth clients and their families for close to 20 years, worldwide. Argus Europe now offer accredited training for CPO’s, Surveillance Operators and Private detectives. Argus Europe is an operational company working globally with an extensive variety of contracts. W: www.arguseurope.co.uk T: +44 (0) 8456 123 843 Atlantian Business Solutions Group Rutland, LE15 6SD, GBR Atlantian Business Solutions has been designed to help both individuals and New Companies build for the future as well as support others with training needs. T: 07725970954 W: www.atlantianbsgroup.com E: info@atlantianbsgroup.com Briareus Security

Our aim is to give a complete, discreet and professional service to all of our clients, be they large corporations, small businesses, local authorities or private individuals, all tailored to meet their individual needs. W: www.briareussecurity.com E: info@briareussecurity.com Mark Corder - Chief Executive of Carmdale Ltd Suite 3 219 Bow Road London E3 2SJ Mark is a former Senior Police Officer specialising in counter-terrorism; firearms; public order; training and also physical, Critical National Infrastructure and nuclear security, having had responsibility for the security of the UK’s nuclear deterrent. A former Head of Operations, Operational Support and Training, Mark has been involved in a number large-scale incidents (including 7/7) and has also worked at the Office for Security and Counter Terrorism (OSCT) at the Home Office as part of a review into Critical National Infrastructure security. Mark has an MBA via the OU. E: mark.corder@carmdale.co.uk T: +44 (0)844 995 9900 W: www.carmdale.co.uk Alastair Christie Advice on site security, perimeter fencing, lighting, CCTV and manning requirements. Monitor and advise on guard force setting up site procedures and guard SOP’s. T : +44 (0)7736 328112 E : ally.c9496@yahoo.co.uk Control Risk Management Solutions - CRMS Ireland Executive Close Protection Operations & Training (B Tec Level 3 Diploma Edexcel) Threat & Risk Assessments, Consultancy Services. W: www.crmsinternational.com E: martin@crmsinternational.com Crest Security & Surveillance Ltd 51 The Crest, West Heath, Birmingham, West Mids, B31 3QA, GBR Highly experienced Security Consultant with a proven record of accomplishment in the field of protective security. Skilled in all phases of risk assessment, operational planning, logistical organisation, implementation of security measures, security team leadership, project coordination, and delivery of security advice to a high profile clientele. E: info@stephencahill.co.uk T: 447977071427 CSI Protection Ltd International, GBR A well established security consultant and personal protection operative providing high or low Key protection to high risk and prestigious clientele. Specialising in the maritime industry as a consultant for private vessel protection on super yachts world wide. W: www.csi-protection.co.uk E: gary@csi-protection.co.uk Custodia Custodia is an independent client focused Specialist Security & Risk Management Company, specialising

in Risk consultancy and Security project management. Providing a comprehensive portfolio of Risk mitigation solutions to assist Businesses and individuals to plan for, manage and mitigate risk. T: 01432 277693 W: www.custodia.co.uk DF Risk Management Solutions DF Risk Management Solutions N.I. is a modern, professional risk management company, with a diverse range of global strategic experiences and a team of executives who possess dynamic but complementary backgrounds. T: +44 (0)7837642686 +44 (0)7758743918 W: www.dfriskmanagementsolutionsni.com Executive Protection Officer Worldwide CP services W: www.executiveprotectionofficer.com First Class Executive Security Nottingham, UK, Nottingham based, full-service company specializing in Bodyguards and Security Consulting services. Extensive experience in VIP security, also caters for public and private sectors. W: www.firstclasssecurity.co.uk T: 0115 9266466 G6 Global G6 are specialists in all types of radio, telephony and satellite communications for both voice and data with particular emphasis on covert communications installations in both vehicles and fixed locations. In addition, our range of personal covert radios and bespoke accessories is extensive. W: info@g6-global.com T: +44 (0)1454 610050 Gordon Russell Highly trained frontline Close Protection Operatives available for UK and International contracts. Our experienced CPO’s can offer bespoke packages to meet all clients needs, including a variety of language skills. All SIA licenced, BBA member E: Bodyguard-cpo@Email.cz T: +44 (0)7917 281 004 James Izett All close protection task undertaken, including training tasks. Medic (Registered with the HPCSA, Registered FAAW instructor and Assessor E : J.Izett@gmail.com T : +971 (0)505 574 350 Janice Gurney Proficient and diligent Security Professional gaining extensive knowledge and experience within the security sector. Proactive individual who has a logical, flexible and conscientious approach to all challenges undertaken, ability to work as a member of a team or as an individual willing to work anywhere. T : +44 (0)7885 793061 E : janice382006@gmail.com International Centre of Special Training International Centre of Special Training is an international training and security company based in the United Kingdom. Its priority objective is to


provide services to the highest level. W: www.icost-team.com T: +44 796 736 55 65 IPSS Security Northfield, Aberdeen, AB16 7EX Security and protection services - UK and overseas. BBA Member. T: + 44 (0) 1224 69455 W: www.ippssecurity.co.uk ISS Training Ltd Riverside Cottages, Nidd Walk, Pateley Bridge, Harrogate, HG3 5NA ISS Training Limited are providers of specialist covert surveillance training courses and publications to the security and investigative industries, enforcement agencies and specialist military units. Formed in 1990, we are the longest established surveillance training company in the United Kingdom. Our credibility and reputation is widespread and we offer nationally recognised qualifications. BBA Member. T: + 44 (0) 1423 712265 W: www.intelsecurity.co.uk Jason Morris Security Hertfordshire, UK Providing a wide range of Door supervision/security for V.I.P and prestige venues, Concerts, Functions, Corporate and Personal Security, Weddings, Private Parties, Gala Dinners, Business Awards & School Proms, Close Protection and Body Guarding Static Guarding and Stewards. T: 01462 478900 W: www.jasonmorrissecurity.co.uk E: agosselin@jasonmorrissecurity.co.uk John Featherstone Security professional with operational experience gained in a variety of theatres. Main specialities close protection and surveillance. T: 24hrs : +44 (0)7702 740722 E: john@johnfeatherstone.co.uk W: www.johnfeatherstone.co.uk K9 Support Services Ltd K9 Support Services UK Ltd is a supplier of specialist drugs and explosives dog/ handler detection service (which includes arms & ammunition) to individuals, businesses, and the public sector. T: 0845 643 6393 E: info@k9support.org.uk Logas International Tyne & Wear, SR1, GBR Front line SIA, International CPO. Private Investigation and Surveillance operator. E: wscarr@logasinternational.com MLK Security and Protection Services Swindon, UK Close Protection Officer and Door Supervisor E: mattleekane@hotmail.com T: 07917654978 LJE Security Services North Yorkshire, HG1, GBR Close Protection, Residential Security, Asset Protection, VIP red carpet Security and Private Investigation. E: leanneedmondson@yahoo.co.uk One Events Grantham One Events offers you a stress free solution in the organisation, putting together and running of an event. Thisis accomplished by having a group of specialised companies from different industries working together for a more complete service for you. TEL: 0870 974 6779 W: www.oneevents.info

Plymouth Close Protection Highly versatile, physically fit and accomplished security professional with cumulative experience in the areas of security management, close protection, crisis management, risk assessment, emergency management, asset protection and security training. E : chris@plymouthcp.co.uk W : www.plymouthcp.co.uk T : +44 (0)1752 500807 PPSS Group Body armour and stab vests provide a functional solution to individuals who require extra protection in their chosen vocation. All PPSS (formerly ASEO) body armour and stab vests are certified by the UK’s Home Office (HOSDB) and offer unrivalled protection from blunt trauma caused by a punch, blow or kick. Based on our professional frontline experience and extensive research we can confirm that an impact based assault is a more likely event than an attack involving an edged weapon or firearm. T: +44 (0) 845 5193 953 F: +44 (0) 1765 603 512 E: info@ppss-group.com W: www.ppss-group.com Presence Security Presence Security (“ PS ”) is a bespoke security company providing protection for private individuals and VIPs, as well as security services for businesses and organizations. T: 0800 002 9734 E: info@presencesecurity.co.uk Prestige Risks LTD 27 Old Gloucester Street, London, WC1N, 3AX, GBR. Close Protection Secure Chauffeurs Surveillance Residential Security Executive Protection Security Guards Asset Protection T : +44 (0)207 5588182 E : info@prestigerisks.com W : www.prestigerisks.com Prometheus Medical Ltd Prometheus deliver unrivalled bespoke emergency medical support in the form of specialist equipment, training, strategic advice and deployed clinical care. T: (+44) 1568 613942 W: www.prometheusmedical.co.uk

interested in a challenging position, which would fully utilize competences gained and provides opportunities for professional and personal development. With 15 + years of international experience in the sector at all levels and a military background (National Service) as well as a practical Close Protection experience in an executive environment, corporate intelligence and investigations. As a Security professional, I never consider my training and development as a complete, therefore I always look to update further my skills and knowledge. In personal plan I am very loyal, discreet , independent and willing to embrace challenges. E: r.savkov@gmail.com T: +44 (0)7886591525 RSM Security UK Ltd London, UK RSM Security UK Ltd offers the experience and expertise necessary to provide security personnel of the highest calibre when you need them. T: 07850091979 or 07792948523 W: www.rsmsecurity.co.uk E: info@rsmsecurity.co.uk RWSSI Rob W is a professional security consultant with world wide experience and capabilities in Security, Surveillance and Investigation; I can support you to overcome any problems and enable you to achieve your goals E: rob@rwssi.co.uk T: +44 (0)7818 220985 SDS Solutions SDS solutions provide our clients with protective solutions that are second to none, our consultants will discuss every aspect of the problems that you are facing that dictate the need for a protective solution, we promise our clients a tailor made service to meet individual requirements. Whether based in the UK or abroad our protective service T: 01453 887815 E: info@sds-solutions.org Shadow Close Protection A leading company specializing in Executive Protection as a professional sector, with participation in high and low risk missions, providing global security solutions and consultancy to individuals, corporations and national agencies worldwide. W: www.shadowcp.gr E: info@shadowcp.gr T: + 30 6948539664

Prosec Consultancy Ltd 10 Oakfield business park Westbury, BA13 4WF. Prosec Consultancy Limited are dedicated in providing a professional service, which covers a whole range of security services throughout the security industry. T: 01373 228055 W: www.prosec-ltd.co E: info@prosec-ltd.com

Shaun West United Kingdom SIA licensed, Highly Experienced Frontline CPO. Ronin SA trained. Providing security for both corporate and hostile environments. E: sw@shaunwest.co.uk T: +44 (0)7830 109 601 W: www.shaunwest.co.uk

ProTouch Security ProTouch Security is one of the UK’s key providers of event safety, event security, crowd management, door supervisors, stewards, event management and health and safety. T: 01724 279 522 W: www.protouchsecurity.co.uk

Spotllght Protection Services Essex based business which provides a broad and growing range of security services to businesses and organisations large and small. T: 07870560208 E: info@spotlightprotectionservices.co.uk W: www.spotlightprotectionservices.co.uk

Python Security and Protection Ltd Providing Close Protection Officers and Door Supervisors for Events and Venue Security. E : mattleekane@hotmail.com Radoslav Savkov - CPO / Security Consultant Oxford - United Kingdom Bio:
I would introduce myself as a high calibre Security professional with strong customer oriented skills and managerial experience in the Security Industry,

VIPA Tactical Training A specialist training academy dealing with four specific areas of combat: VIPA Civilian Self Protection Program, VIPA Close Protection Combat System, VIPA Police Defence Tactics and VIPA Military Close Quarter Combat. BBA Member. W: www.VIPAtacticaltraining.com Europe & Africa International Security Academy P.O.Box 5833, Herzeliya, 46000, ISRAEL. Our


98

To place a classified lineage or box advertisement telephone our sales team on: +44 (0) 191 6450 865

Canadian Use of Force Systems 7975 Yonge St. # 7124, Innisfil, ON, L9S 1L0, CANADA A professional Use of Force and Defensive. Tactics organization teaching a full range of controlled response options for Self-Protection and Use of Force considerations in public and professional environments. BBA Associate Member. T: + 1 705 456 4333 W: www.canadianuseofforce.com Contact Front Photography Contact Front Photography is the world’s 1st photography studio dedicated to the Close Protection Professional. Stop putting generic or pirated photos on your website; instead commission custom shots to best represent you or your agency. T: +1 (612) 369-6134 E: Info@ContractFrontPhotography.com W: www.ContactFrontPhotography.com Decisiones Estratégicas Buenos Aires – Argentina Executive protection specialists we have experienced in all Latin America, for multinationals companies, also providing support in project throughout Latin America to consulting first the US. and UK. We have a team of specialists and psychologists in assistance and crisis negotiation. T: +54(911) 6415 1941 E: jbenitez@d–estrategicas.com W: www.d–estrategicas.com Detective Lacerda P.O.BOX 25996, São Paulo, 05513-970, BRAZIL Providing the full range of security and investigation services throughout Latin America. BBA Member. T: + 55 (11) 3452 4388 W: www.detectivelacerda.cjb.net Giovanni Rossi South Africa Doctorates in Criminology, Vessel Security Officer, ASP Instructor, ISSPC Member, BBA Member, IAPPA Member, American Bodyguard and Protection Instructors Association - Lifetime Member E: rossi1@mweb.co.za T: +2783 415 9205 Global Bear Protection PO Box 11488, Jackson, Wyoming, 83002, USA Provision of British and US Ex Special forces security/ medical specialists. T: 307 413 3619 W: www.globalbearprotection.com E: bear@globalbearprotection.com Icon Services Corporation 1043 Grand Ave. #312, St. Paul, MN 55105, USA A full service security and investigative agency specializing in providing high-level security and bodyguards to international celebrities, public figures and corporations. Licensed, bonded and insured, our diverse roster of clients reads as a virtual who’s who in the corporate, motion picture, fashion and recording industry. Entering into our 10th year, Icon has been the hand picked choice to provide Executive Protection to everyone from Superintendents to Supermodels. BBA Member. T: + 1 651 695 8778 W: www.Industry-Icon.com Imperial Protective Service, LLC 15849 N. 71st Street, Suite 100, Scottsdale , Arizona, 85254, USA Imperial Protective Service’ (IPS) is a security consulting and services firm founded in 1978. IPS provides both national and international corporate, executive and celebrity protective services. BBA Member. T: + 1 480 281 1588 W: www.executiveprotect.com Panther Protection Services 3695F Cascade Road, Suite 2207, Atlanta, GA 30331

Panther Protection Services is a full service protection agency offering such services as threat assessment, executive protection, self-defense training, firearms instruction, and high risk tactical protection. Our executive protection specialists have over 75 years of experience. Panther can handle your protection needs whether around the corner or around the world. Member: BBA and NABA T: (404) 349-9117 W: www.pantherprotectionservices.com Rouven Rohler - Security Consultant / HSE liaison Romania I am a very fit and mentally robust Security Specialist with quality experience gained in the security (Military, Maritime and Commercial Operational Security (Oil& Gas). I have improved the effectiveness of protection teams and significantly enhanced clients’ awareness. My career commenced in the Australian Army, which included hostile environment deployments to Iraq and the Solomon Islands and I have since been operating on various contracts throughout Afghanistan and Iraq. I am now looking to make a continued significant contribution within similar High Risk contracts. E: rouven@y7mail.com T: +40 (0)746 642 739 SILVER STAR PROTECTION Executive protection, site and event security with global experience. Serving southern Minnesota with integrity and professionalism. Former USSS, ICON Alumni. available for domestic and international travel. Robert E. Jones Manager/CEO W: www.silver-star-protection.com E: rejones@silver-star-protection.com TSICS (T6) Miami, Florida, USA TSICS (T6) provides the following services in Central America: Executive Protection, Individual Bodyguard, Close Protection Training, Corporate Invest. W: www.security-professionals.org/members/saldrix E: tsics.t6@gmail.com T: +502 6645 6822 Tony Scotti’s Vehicle Dynamics Institute 1162 St. Georges Ave, Suite 277 , Avenel, NJ 07001, USA The first name in advanced driver training, offering our highly acclaimed Protective/Evasive Driving Programs. Designed specifically for today’s executive chauffeurs, executive protection professionals and others who are responsible for providing safe and secure transportation services. BBA Member. T: + 1 732 738 5221 W: www.vehicledynamics.net Vindex Personal Protection & Investigation Inc. 497 Hooksett Rd #365 Manchester NH 03104 603.289.3161 / Full service Private Investigations & Executive Protection. 10 years combined Law Enforcement, Private security, close protection work, & security contracting. NY Mayors, U.S. President’s, NFL owners, and VIP’s are some of the protection work I’ve gained experience with. ICON alumni, NABA member. T: + 1 732 738 5221 E: vindexinc@aol.com W: www.vindexinc.com Asia Pacific Asia Protective Group Ltd Asia Protective Group (APG) is a Hong Kong based risk management company, specializing in executive protection, overseas travel security and security consultancy services. APG has an extensive network of security specialists operating throughout the Asia Pacific region. W: www.asia-pg.com E: jim@asia-pg.com E: yvonne@asia-pg.com

The Team: Editor Managing Editor International Editor Art Direction

Shaun West Jon Moss Elijah Shaw Peter Falkous

Contributors: Mark “Six” James Tom Richmond Andy Clark Raffaelle Di Giorgio Ivor Terret Jeff Burns Kate Owen Orlando Wilson Yoni.C

Shaun West Jon Moss Elijah Shaw James Johns Rich Aitch Jacquie Davis Eric Konohia Dr Amy Burrell Adam Barrett

Our Sincere Thanks to all those that continue to contribute their wisdom and experience for the enjoyment of others The Circuit is compiled, edited and published in the UK and US quarterly. W: www.circuit-magazine.com E: info@circuit-magazine.com T: +44 845 519 2538

DISCLAIMER While every care has been taken to ensure that the information contained in this magazine is both accurate and up-to-date, The Circuit accepts no liability in any part for loss or damage incurred by reliance on information contained in this magazine through omissions, errors, howsoever caused. ©COPYRIGHT Copyright remains with the authors and contributors at all times. No part of this publication can be copied or reproduced in any way whatsoever without permission from the publisher AND the author / contributor.


Circuit



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.