Circuit Magazine #26

Page 1

News

Circuit

Reviews

26 www.circuit-magazine.com

Opinion

Intel

Exclusives

Tapping

Impenetrable? Think Again!

Colombia

A Chance for Peace? How disciplined is your mind? | Presentation skills | Patient Handover


Contents issue22 WAGTAIL

INTERNATIONAL SCHOOL OF EXCELLENCE

Explosive Detection Dog Courses - Drug Detection Dog Courses - Security/Patrol Dog Courses

National Framework, Fully Accredited Dog Training Courses For New, Developing And Experienced Dog Handlers.  Open to UK and Overseas based students Open to serving & ex-forces personnel eligible for Enhanced Learning Credits  Residential Accommodation provided on site

46 focusOn: Afghanistan 

All our instructors are highly experienced ex-military trainers who have experience in UK and overseas operations Apply now for more details and to secure a place on our courses HOME OFFICE SUPPLIER OF THE YEAR 2011

EXCLUSIVE PARTNERS AND SUPPLIERS OF DETECTION DOG SERVICES TO THE UK BORDER FORCE AND HM REVENUE AND CUSTOMS

A Time for Transition Wagtail UK Tel: +44(0)1745 561166 www.wagtailuk.com info@wagtailuk.com

Other Services: Full Project Management Handler Training And Assessment Kennel Design And Set Up Consultancy For Search Operations Handler Training Courses Specialists In Hostile Environments


14

How disciplined is your mind? Making a Difference through Effective Patient Handover

23 32

in colombia

04 Editorial 06 Hostile Environment Surveillance Ops 11 One Agents opinion 14 How Disciplined is Your Mind 18 The Critic 23 Medical 27 Tapping, but not my feet 32 In Colombia 36 Keeping Your Edge 38 Countering the Effects of Surveillance P4 45 Presentation Skills 49 Man, That Burns 52 Effective Networking P2 58 Front Right Seat 62 Working Girl 64 Classifieds


04

Editorial Issue 26 Everywhere I go I keep hearing the phrase ‘Continuing Professional Development’, or CPD. It seems like the message is finally getting across and as though the industry is waking up to the fact that CPD is essential and here to stay. This is the new world where, as individual operators, we have to take responsibility on our own shoulders if working on the circuit remains our objective.

Shaun West Editor

CPD does not have to cost a bucket load of cash, recently I took a couple of days out to attend some free workshops in my local area and was blown away with the content that had been put together for free. As a CPO, professional development isn’t just about adding to your existing medical or driving skills, modern operators who want to forge a career in a saturated market need to have much more about them. I recently had the privilege to hear Mike O’Neill (MD at Optimal Risk) deliver a fantastic talk on why operators need to think of themselves as businessmen/women and develop their skillset in the same manner. This resonated with me as I sat in those workshops listening to a variety of expert speakers who all contributed towards expanding my thinking on an array of business related topics. Furthermore, I was able to appreciate the relevance of this information to all sole traders, contractors and consultants working in the security industry. I’m now actively on the look out for more opportunities like this and it only goes to show that quality training is available even if you don’t have a huge budget at your disposal. Protection is a profession where you need real world knowledge in a variety of different areas to be successful whilst plying your trade. Clients who invest significant sums of money in protection expect their operatives to have common sense and the ability to go above and beyond the call of duty, when required. The best advice I can offer is to “assume nothing”. Individuals and organisations that require protection are often subject to a lot of external pressures themselves and live life at a fast pace. Their lives and schedules remain flexible, which means that you, as a protection specialist, need to be doubly flexible and have the capacity to be able to react when required. So, “don’t assume - remain flexible and plan and prepare”, happy clients become long-term clients and that should be your objective. A New Year is almost upon us, and as we head into 2015 now is the time to reflect over the previous 365 days and set an intention for 2015 to be the year that you achieve the things that you want. Commit to only thinking positive thoughts and strive to attain the goals you set yourself, step out of your comfort zone and make it happen! From the Circuit Magazine team we would like to wish you a Merry Christmas and a Happy New Year. Our thoughts go out to those who can’t spend the festive period with their loved ones, stay safe wherever you are. Best Regards


Editorial Issue 26 Question: What do you like least about the industry? Is it the oversaturation of the marketplace, which drives down wages? Is it the governmental regulations and red tape that make licensing counterintuitive and expensive? How about demanding clients with unrealistic expectations? All of those grips are valid, so my final question is, what are you going to do about it? The reality of the situation is the most effective way to bring about a positive change in the industry, is to have the educated members of that industry demand and institute it. You are that educated member, and I’m not ashamed to say that The Circuit Magazine plays a role in that education. Every issue I edit brings me articles from dozens of contributors from around the world. They are subject matter experts, men and women in the trenches of their career path and have a desire to both succeed and help others. Anyone would admit that’s a winning combination. Each time I crack open an issue I learn something new. I might read about a tactic that I don’t necessarily agree with, plus there are some opinionated articles between these pages, but I for sure get something out of it. I also get emails from people giving props to the stories they liked (and offering counterpoints to articles they took issue with). All of this is a positive because, to my original point, it plays a part in advancing the conversation, whatever that might be. Critical thinking and respectful dialogue are important factors to change, both can be found in the twoway relationship between The Circuit Magazine and it’s readers. For our part, we will continue to seek out solid contributors and articles, and produce a quality product that is informative and engaging. On your side of the table I’d request that one of the things you can do is tell someone else about the magazine and the good stuff we have going on over here. Keep giving us feedback and letting us know what you would like to see in future issues. We have some big plans for 2015 and we are glad you are along for the ride!

Elijah Shaw US Editor


06

Feature: Issue 26

A look at Hostile Environment Surveillance Operations

As a result of the privatization of Iraq in 2003 and the dramatic growth of private security operations in politically unstable and hostile environments, close protection professionals are finding themselves working in increasingly diverse environments that require highly specialized skills and training. One of those specializations is Hostile Environment Surveillance Operations (HESO). This article will discuss the primary types of hostile environment surveillance operations and their application to the layered security of the protection detail as well as the specialized training

needed by operatives wishing to conduct this type of work. Let’s start by identifying what a hostile environment is. For our purposes an environment may be considered hostile because of high crime rates like Mexico and


By: Jeff Burns South America or due to civil unrest like in the cases of Ukraine, Iraq, and Syria, Egypt and Libya during the Arab Spring or Nigeria. Additional hostile environments include areas that are dramatically underdeveloped and lack critical infrastructure such as east Africa or India. The primary goal of Hostile Environment Surveillance Operations (HESO) is to successfully detect and gather intelligence on hostile third party activities which pose a security threat, in aid of preventing an attack. There are four primary types of HESO’s: Protective surveillance (PS), surveillance detection (SD), counter surveillance (CS) and close target reconnaissance (CTR). Each of these involves the use of the fundamental principles of physical surveillance and plays a critical role to the support of the protection detail. Protective surveillance is the covert use of a team of highly trained and experienced operatives to form a protective ring around the principal. The protective surveillance team’s (PST) primary goals are is to occupy or control areas that could be used by a hostile surveillance team (HST) to plan or assist in an attack on the principal. The PST will identify hostile surveillance, gather protective intelligence and if necessary serve as a quick reaction force (QRF) to assist defending an attack on the principal. If hostile surveillance is detected, the PST will notify the close protection team of the threat so that the principal can be discreetly removed to a safe environment. As mentioned earlier, in worst case scenarios the PST will act as a quick reaction force (QRF) which is why it is essential that all members of the PST have advanced specialized training in close protection, close quarter battle, anti ambush and anti kidnapping.

The ability to prevent or defeat an attack by detecting hostile or suspicious activity early in the target selection and planning phase. History has taught us that terrorist attacks follow a distinct process known as the Terrorist Attack Cycle which includes target selection, planning, deployment, escape and exploitation. Regardless of the type of attack there will almost always be some type of preoperational hostile surveillance conducted. The hostile surveillance is intended to assess the value of the target, security measures and vulnerabilities and escape routes. Surveillance Detection (SD) has become critical to successful hostile environment operations because it gives us the ability to prevent or defeat an attack by detecting hostile or suspicious activity early in the target selection and planning phase. The surveillance detection team (SDT) will develop a surveillance detection plan that includes identifying suitable observation points that provide optimal views of critical locations that hostile surveillance would want to observe during the planning phase. The SDT will conduct surveillance


08

Feature: Issue 26

Surveillance Detection (SD) has become critical to successful hostile environment operations because it gives us the ability to prevent or defeat an attack. of these critical locations to identify people or vehicles that look out of place or have suspicious patterns and exhibit poor surveillance demeanor. In addition, the SDT will conduct pattern and route analysis to determine where the target is most predictable and vulnerable during travel. Surveillance detection works because it allows the HST to feel confident operating in the open because they have no idea anyone is watching them. If the intelligence collected by the SDT warrants further investigation, then an appropriate counter-surveillance (CS) operation can be designed to exploit or capture the hostile surveillance. It is critical that the SDT’s role does not cross over into CS as this risks compromising future CS operations by chasing the HST into hiding. Counter Surveillance (CS) is conducted by a third party or counter surveillance team (CST) to exploit and neutralize hostile surveillance. Essentially, counter surveillance is an operational measure taken once hostile surveillance has been identified. The CST then conducts surveillance of the HST to gather intelligence that can be used to manipulate, exploit or apprehend the hostile surveillance. Counter surveillance is normally conducted by intelligence agencies and the military but in today’s global environment more and more security

contractors are becoming involved in CS operations. It should be noted that some sophisticated attackers may use CS as a countermeasure against surveillance detection to increase their operational security. Close Target Reconnaissance (CTR) is the covert collection of detailed intelligence against a target location to assist in operation planning and success. Potential CTR targets include a variety of residential and commercial structures and CTR is designed to develop tactics, techniques and procedures that identify, assess and exploit each structure’s vulnerabilities. The skills here are different than the other HESO areas. CTR teams are versed in environmental and terrain analysis, tactical tracking operations, covert patrol methods, planning and risk assessment, facility vulnerability assessment, defeating active and passive security, external security threat / risk mitigation, covert entry, active and passive security sensor mitigation, human security vulnerability analysis, defeat and or exploitation. CTR is most often used in support of military, intelligence and hostage rescue operations. Regardless of what HESO area you may wish to specialize in there is some core specialized training that all HESO operatives should have. Each HESO operative should have


By: Jeff Burns completed advanced level training in covert physical surveillance and have extensive experience planning and conducting a wide range of covert surveillance operations against a variety of targets. In addition, to allow the HESO operative to operate relatively safely in the hostile environment they should have specialized training in night surveillance operations, advanced operational security and planning, threat assessment, analysis and target identification, terrorist / security threat groups operating in their region, terrorist and hostile surveillance tradecraft, firearms training to include pistol, rifle, shotgun and foreign weapons of the region, advanced hostile environment close protection operations (HECPO), advanced counter ambush and counter kidnapping, detecting car bombs, VBIED’s and IED’s, detecting suicide

bombers, tactical combat casualty care and defensive counter sniper operations. As you can see hostile environment surveillance operations play a critical role in successful hostile environment protection operations and it’s definitely not for the newbie. To be successful the operative needs extensive experience, comprehensive training and the ability to blend in to their environment. About the Author: Jeff Burns is the Director of Operations for Burns Group International, LLC and has over 20 years of investigations and close protection experience in both the public and private sectors. He can be contacted at Jburns@BurnsGroupIntl.com or (800) 659-4608.


We are specialists in Non Residency, Mariners Taxation etc. for Overseas & UK Security Operatives also Ex-Forces in the Oil & Gas Industry or Working in Hostile Environments. Whittaker & Co was started in 2006 by Anna Cooperwhite, who herself is ex forces. We specialise in providing accountancy services, tax returns, tax advice etc. and pride ourselves on understanding the needs of our clients which include Non UK Residents, Maritime Security, Sole Traders, Partnerships, Limited Companies and Personal Tax Payers. Within our team we have vast experience of dealing with the frustrations and concerns common to all businesses and individuals, we share a common enthusiasm to deliver a personal, high quality service to our clients and each individual working for Whittaker & Co has a niche area of specialism Our range of services and resources allow us to meet our clients’ needs quickly and efficiently, often exceeding expectations. If you wish to know more about our services or you would like to arrange a meeting to discuss how we can help you in more detail please contact on the available options below.

The Associates is a group of professional companies that have collaborated to offer advice through their own respective companies to serving Armed Forces personnel in transition to civilian life and ex forces. They are the ex-forces specialists with the majority of the companies having an ex-forces individual running or working within the company. For more information visit: www.theassociatesuk.org

THE

ASSOCIATES

ADVICE FOR THE EX FORCES

Whittaker & Co, have supported and will continue to support and fundraise for the Pilgrim Bandits. For further details please visit: www.pilgrimbandits.org

“I have been in the Maritime industry for 12 months following a successful 22 year career within the Royal Marines. I have been utilizing Whittaker’s for the whole period, colleagues advised me at the start to choose Whittaker’s and I have nothing but high complements towards them, they answer all my questions and reply to all my emails promptly, they also go out of their way to send a representative, to talk to maritime teams about the complexities of tax and how to achieve SED. I would not hesitate to recommend Whittaker’s to anyone.”

Ian Nisbet-Mole - Maritime

“It was a simple decision to make choosing Whitaker & Co after hearing some really good feedback from other customers. I left the military in 2011 and decided to pursue a career in close protection. The switch from military to civilian life left me with a lot of questions and paperwork, forms etc. to fill out but with Whitaker & Co’s help this transition proved effortless. It also gives me great piece of mind knowing that I don’t have to worry about tax days etc. and allows me to concentrate on my job. I would recommend Whitaker & Co without question due to the fact that the staff are very friendly and approachable and highly astute.”

Richard Daniels - Non Res

Whittaker & Co (UK) Ltd, Bryn Isel, The Bank, Newtown, Powys. SY16 2AB Telephone: 01686 610662 Website: www.whittakerandco.com Email: info@whittakerandco.com Co Reg No: 8203062 England and Wales – Vat Reg: GB 143 2704 39

Members of BBA can enjoy a 10% reduction to our fees along with a FREE “Tax Health Check” You will also be invited to exclusive Tax briefs which we will hold 3 times a year for the exclusive benefit of the BBA


One Agents Opinion By: Mark Roche EPS

One Agents Opinion: Bodyguard Or Executive Protection Specialist… What’s In A Name? When someone asks, “what do you do for a living”? Do you say, I’m a “Bodyguard” or do you tell them that you’re an Executive Protection Specialist?

W

hat’s in a name? Let’s break it down to their foundations and see the differences if any.

Let me first state for the record that in European countries a title of “bodyguard” like many words, has a different interpretation, so for the purposes of discussion, I am basing this article on the US usage. Bodyguard: (Merriam Webster, Inc.) noun Date: 1704 A usually armed attendant, or group of attendants whose duty is to protect a person. By definition, a “Bodyguard” is an armed attendant whose sole purpose is to protect. The word “attendant” seems kind of small or insufficient when


12

Editorial: Issue 26

talking about protection. While it’s true that we serve our clients, “attendant” seems like another position. To go a step further, “usually armed” with what? As we all know 90% of our work is unarmed as it pertains to a firearm use. The definition of “bodyguard” in this case invokes thoughts of protection by the gun and nothing else. So let’s go from definition to reality shall we? To the laymen, a “bodyguard” is stereotypically a large individual that escorts a celebrity where they want to go. They usually protect with intimidation both physically and verbally. They typically have little to no professional training and count on size as their deterrent to all things attack. They typically are part of the “crew” with no distinct line of friendship and protector, becoming in essence, “buddyguards”. They will dress any kind of way, lack in education of professional protection standards, lack in skills associated with weapons use for professional purposes, have criminal records in some cases, and protect only the physical being. They usually find themselves involved in matters of their clients not associated with their job description, and fail to have a plan of action other than what comes to them at the time of duress. This is not to say that they are mean or evil people, they just lack the professional tactics, knowledge, training, and skills associated with being a professional protector. I believe there are stark realities and differences between what a “bodyguard” is and does, and what an Executive Protection Specialist is and does. Most of us have seen a “bodyguard” and know what purpose they have when we see them. As I stated earlier, if

seen by the layperson they would probably consider them a professional. The arch of all things protective and professional is a small one in my view. Now let’s explore and disseminate the differences of an Executive Protection Specialist. Executive Protection (EP): (Wikipedia) Noun Date: 2014 Also known as close personal protection, refers to security measures taken to ensure the safety of VIP’s or other individuals who may be exposed to elevated personal risk because of their employment, celebrity status, wealth, associations or geographical location. Specialist: Noun Date: 2014 A person who concentrates primarily on a particular subject or activity; a person highly skilled in a specific and restricted field. By definition alone, you can clearly see a difference already. Now, “refers to security measures taken to ensure the safety of VIP’s or other individuals who may be exposed to elevated personal risk” verses, “ a usually armed attendant”. EPS’ are neither simply “bodyguards” nor, “attendants”; EPS’ are highly skilled individuals or teams with a purpose, and a plan of action. Creatures of adaptation, EPS’ mold themselves into a situation(s). We can come in any size, male or female it makes no difference. We operate with tact,


One Agents Opinion By: Mark Roche EPS

‘Our industry has suffered because of the bodyguard mentality, in some cases it’s associated with the “glorified thug”’ professionalism, and a sense of purpose. We try to be proactive so that we don’t have to be reactive. EPS’ is always dressed professionally, dressed up or down he/she still looks professional. EPS’ protect more than the “person” we protect the entirety of that client’s interest’s while assigned to that particular detail. Most of our “off “ time is consumed by our CRAFT keeping mentally and physically prepared for our client’s. We realize the enormity of our responsibilities and work hard to fulfill our contracts. EPS’ work on the premise of making the unknown known, to ensure to the best of our abilities, the successful completion of the detail and protective coverage of our client(s). A “bodyguard” acts when a situation arises as opposed to planning ahead. EPS’ constantly work on tactics and pay attention to the direction of our industry as it progresses, does a “bodyguard”?

outside of our profession, I wouldn’t be upset but, given the time, I would try to educate them on the differences between the two. In our industry I would probably take a little more stern approach because, I feel that the specialists as well as our industry need to move on from the “bodyguard” term. Our Industry has suffered because of the “bodyguard” mentality, in some cases is associated with the, “glorified thug”. The fact that professionals go out every day, do things correctly, are licensed, insured, trained, educated in their field, and skilled should correlate into PROFESSIONAL! As a friend, mentor, and agency owner said, “this is not a hobby” and everyone in this industry should feel the same. I believe our industry is changing and we must all, as an industry facilitate this.

To invoke this change, we must all What’s in a name?...Everything. For the encourage those that are “bodyguards” to time and effort EPS’ put into becoming become trained, licensed, and included. experienced professionals, we should look As I stated before, “bodyguards” outside to be defined as such. Someone recently of the U.S. deserve the respect and the said to me, “ it’s the same thing!” I ask you, nomenclature is different, but for those is it? I’m a person who believes that “ it’s not US based, the next time someone asks, what you’re called, it’s what you answer too”. “what do you do for a living?’…. What will If someone refers to me as a “bodyguard” you say?


14

Feature Issue 26

How disciplined is your mind?

Time for a quick mental boot camp! Our last article in the Circuit Magazine looked at mental resilience and 5 steps your personal mind trainer would recommend to improve this. This time we’re focusing on one simple but effective resilience building exercise that you can easily incorporate into your daily regime. Remember the analogy of the high powered vehicle, fitted with bullet-proof glass and armoured shields, but nobody has bothered to top up the engine oil for a while? Your body and brain are the equivalent of this vehicle. You can build up your physical armour and strength but if you aren’t topping up the mental engine oil then you’re heading

for the breaker’s yard. When you are in a threatening situation, the sympathetic branch of your nervous system provokes a state of high readiness for responding to danger. This is your “fight or flight” response. Your accelerator is flat out and the needle on your rev counter is in the red. You’re probably very familiar with the physical changes – the heart beats faster, muscles power up and breathing becomes quick and shallow.


By: Dr Liz Royle & Cath Kerr KR Trauma Support Ltd

When the threat is over, the parasympathetic branch of your nervous system restores your body’s balance bringing heart rate, digestion, blood pressure and breathing back to a relaxed and rested state. Without this “input of engine oil” we would quickly burn out physically and mentally. Importantly the parasympathetic branch restores our higher level thinking such as focus, memory, problem solving, perspective and reasoning. The bottom line is – we are more rational and logical when we are in a parasympathetic mode.

So just what is mindfulness? Mindfulness is simply the ability to remain in the “here and now” with a relaxed awareness of our thoughts and feelings and what’s going on in our bodies. We can be mindful when we are eating, walking, sitting still – just using our senses to the full and not thinking about the past or future. Sounds simple? You may be surprised just how much your attention wanders!

In your role you may be under chronic stress and the danger is that your nervous system gets stuck in a chronic state of sympathetic arousal. There is then a need to regularly use strategies that trigger a parasympathetic state. The more duress you put yourself in, the more frequently the engine oil needs topping up through activating this “rest and digest” state. Mindfulness is one of the best strategies for this.

Mindful breathing When you’re first practising mindful breathing, it’s best to take around 10 minutes in a place where you can be sure you won’t be interrupted. As you get more confident in the process, you can be mindful anywhere at any time.

When it comes to high stress environments, clinical research has consistently shown that mindfulness improved mental performance₁, focus₂ and the ability to sustain attention when multi-tasking₃. US Marines were found to have improved their working memory capacity (crucial for effective focus and reasoning under pressure) with an 8 week programme of mindful meditation₄. Just 4 days of training for 20 minutes a day yields improvement across a range of mental functions₅ and neuroscientists found structural changes around the part of the brain involved in monitoring our focus and self control after just 11 hours of meditation₆.

Many people find it easiest to start practicing this technique with mindful breathing – described in the box below:

Begin by sitting comfortably with your spine upright, feet squarely on the floor and hands on your lap. Take a few breaths using diaphragmatic breathing like this: • Place one hand on your chest • And place the other hand on your abdomen just below your navel • Notice which hand rises and falls the most – if it’s the hand on your chest then your breathing is tending more towards “fight and flight” than “rest and digest.” That’s fine, don’t worry about it, just notice it and see if it changes as you practice this method • Now shift your attention to the hand on your abdomen and try to imagine you are inflating a balloon under that hand. So every time you breathe in, the balloon inflates and your hand is pushed out;


16

Feature Issue 26

and every time you breathe out, the balloon deflates and your abdomen is pulled back in • Breathe in and the balloon inflates • Breathe out and it deflates • Sometimes it helps to actually push your abdomen out with the inhale and pull it back in with the exhale. Once you have got the hang of this, you can do it anywhere without placing your hands on your body. Practice it regularly and you’ll get better at it. Take a couple more breaths like this then let your breathing just return to natural rhythm. Begin to check in with your body, mentally scanning from the top of your head downwards noticing any areas of tension or relaxation. Don’t judge or try to change anything – simply notice the sensations and move on. It can help to close your eyes when you do this. Now check in with your physical senses – what can you hear? Are there any smells, tastes that you are aware of? Notice the physical sensation of where your body connects with the chair and the ground, the feel of your clothes. Check in with any emotions you may have. It doesn’t matter whether they feel negative (frustration, impatience, sadness, agitation) or positive (calm, happiness, optimism).

Your job is not to analyse or judge, simply to become aware. Now just bring your attention back to your breathing for a little while without trying to change it (some people find it helpful to count their in and out breaths, others to notice the sensation). If your mind wanders, as soon as you notice it, just bring your attention back to your breathing. When you’re ready to end your mindful practice, let the attention move away from the breath and back into your immediate surroundings, becoming aware of your body and the sounds around you. If you had closed your eyes, open them eyes slowly. Notice what you see in your surroundings – the lighting, colour, shapes and all the visual details of what’s around you. Sit for a moment longer before throwing yourself into the next activity. Notice how you feel physically and mentally, without judging or setting expectations about how you should feel. Aim to build this exercise into your daily routine. It generally works best first thing in the morning and start with short sessions – maybe 5 or 10 minutes. As you practice, you will find it easier to maintain awareness on the current moment in time.

With mindfulness, your job is to notice when your thoughts and attention have run away and calmly bring your attention back to where you want it.


By: Dr Liz Royle & Cath Kerr KR Trauma Support Ltd Your attention can be thought of as a bit like a chaotic and untrained puppy – it will get distracted by the slightest thing and run off to explore, often getting into all kinds of problems along the way. It’s impulsive with a short attention span and limited focus. If you compare this pup with its future role as a disciplined working dog, then the need to gently teach it how to come to heel and stay where you want it to becomes clear. With mindfulness, your job is to notice when your thoughts and attention have run away and calmly bring your attention back to where you want it. When you are practicing mindfulness, it’s okay and natural for your mind to drift on to other things such as • Analysing the experience – this isn’t working, I’m not doing it right. • Thinking about competing demands – I need to be doing x,y,z – and not fully focusing on the activity • Fidgeting or being distracted by physical sensations – it’s common to notice annoying itches Aim for a calm, non-judging awareness – letting thoughts come and go, just noticing them. By always bringing your attention back to the task in hand, for example focusing on the breath, you’ll gradually find you are able to maintain the focus more easily and call your attention back.

References: 1. Duckworth, A. & Seligman, M. (2005). Selfdiscipline outdoes IQ in predicting academic performance of adolescents. Psychological Science. 16, 12. 939-944. 2. Levy, D., Wobbrock, J., Kaszniak, A. & Ostergren, M. (2012). The Effects of Mindfulness Meditation Training on Multitasking in a High-Stress Information Environment. Proceedings of Graphics Interface. 45-52. 3. MacLean, K. A., Ferrer, E., Aichele, S. R., Bridwell, D. A., Zanesco, A. P., Jacobs, T. L., Saron, C. D. (2010). Intensive Meditation Training Improves Perceptual Discrimination and Sustained Attention. Psychological Science. 21, 6. 829-839. 4. Jha, A. P., Stanley, E. A., Kiyonaga, A., Wong, L., & Gelfand, L. (2010). Examining the protective effects of mindfulness training on working memory capacity and affective experience. Emotion. 10, 1. 54-64. 5. Zeidan, F., Johnson, S. K., Diamond, B. J., David, Z., & Goolkasian, P. (2010). Mindfulness meditation improves cognition: Evidence of brief mental training. Consciousness and Cognition. 19, 2. 597-605.

6. Tang, Y., Lu, Q., Geng, X., Stein, E. A., Yang, Y., & Posner, M. (2010). Short-term As you do this exercise you are activating your parasympathetic nervous system leaving meditation induces white matter changes in the anterior cingulate. Proceedings of the you more balanced, calmer and improving National Academy of Sciences. 107, 35. 15649your thinking abilities. 15652. During the day, observe how often your We are always happy to answer your questions thoughts are taking over and occasionally bring some mindfulness into other activities. about resilience, mental health and traumatic stress on our blog www.powertorecover.co.uk/ It can be surprising to notice how often we are “somewhere else.” The more you practice, blog You can get in touch via Facebook: KRTS Power the better able you are to discipline your to Recover, Twitter: @KRTraumaSupport mind when you most need it and the more Or email: office@krtraumasupport.co.uk resilient you will be.


18

Feature Issue 26

“It is not the critic who counts, not the man who points out how the strong man stumbled, or where the doer of deeds could have done better. The credit belongs to the man who is actually in the arena; whose face is marred by the dust and sweat and blood; who strives valiantly; who errs and comes short again and again; who knows the great enthusiasms, the great devotions and spends himself in a worthy course; who at the best, knows in the end the triumph of high achievement, and who, at worst, if he fails, at least fails while daring greatly; so that his place shall never be with those cold and timid souls who know neither victory or defeat.” THEODORE ROOSEVELT (Paris Sorbonne,1910)

The Critic

As most people that actually know me, will tell you, I have a quite firm point-of-view on most things. The more passionate I am about something the more committed to that point-ofview I am. Maybe some people are right and I really am turning into a grumpy old man, we’ll leave that discussion for a future article. Nevertheless, the great thing about having a point-of-view is that if done right, it is built upon a strong foundation of knowledge and experience and it is always being sharpened.

It’s known as the ‘Dunning-Kruger effect’, and I see it every day, especially in online discussions. It may be one of the reasons why misinformation is so prevalent and difficult to correct in our industry. But I will endeavor to get to the root of the problem. Or at least identify the origin.

So my question is, have you ever noticed, how those who seem to know the least about something tend to be the most confident in their knowledge, and the loudest? Yes this article is about to piss some people off, in the industry. Enjoy.

“the incompetent have too much confidence… the competent, not enough.” According to psychologists David Dunning and Justin Kruger(1,2), people who are incompetent (bad at something) tend not to


The Critic By: Raffaele Di Giorgio

realize they are incompetent. In fact, they often believe they’re better or smarter than they really are. It may be due to the fact that they don’t know enough detail to realize they are wrong, misinformed or simply uneducated. Reading a Wikipedia article, book, or even taking a course in something doesn’t make you an expert in it. Conversely, people with a high level of expertise tend to rate their competency lower. It might be because they assume others know as much as they do. Even those experts who are confident in their knowledge are very careful with their words, and always express a level of uncertainty. They are so aware of the grey area and gaps of knowledge in their area of expertise that they refuse to make black and white statements. Being wrong can ruin a protection agent’s reputation, or get a professional and/or agency sued.

mission(HOM) or national leaders protection detail. But, as is all too common nowadays, everyone has an opinion and in the frenzy to seem educated and well versed in a matter, decides to pontificate on the subject at hand. Never mind the fact that they have never even attempted to qualify for such a detail, let alone actually served on one.

Those that have followed my writings, been in my classes, or have worked alongside me know that I am adamant about verbiage and competency. So you can imagine my utter disgust when I hear people talk about a presidential or national leaders protection detail and misquote standing operating orders (SOP’s) as protocols. Those that have actually worked on diplomatic or presidential missions, know that protocols and SOP’s are not interchangeable. So you can imagine my utter disgust when reading the following statement. “Either you have protocols in place This is why you rarely see university for a reason or you do not! Why I disagree professors and Ph.D.’s selling fitness or weight that the president was no longer in danger loss products. The snake-oil salespeople of once the guy was in the house,he still posed the world are either unaware of their lack of a danger to those in the house or proximity knowledge, or completely aware and simply near him”. This same person then continues lying. to give his expanded views on how Secret Service is failing in their mission. Please do For the self proclaimed “experts” and critics, not take this as me not stating that, there this is one of those things you should be are problems that should be and will be aware of next time you decide to grace the addressed within the Secret Service. But I do world with your opinion, do you know what not believe, that people that have not worked the hell you are talking about? at this level, should not be the ones to a evaluate and address those issues. Especially Allow me to use my first example. Over someone who does not understand the the past few months, the misfortunes of difference between a protocol and a standard the Secret Service have been prominently operating procedure or post orders. plastered all over the news and social media sites. Of course, what follows is pro·to·col the accompanying criticism and the keen noun insight of so-called “experts” that have never the official procedure or system of rules governing served on a presidential, ambassador, head of affairs of state or diplomatic occasions.


20

Feature Issue 26

COMPUTING a set of rules governing the exchange or transmission of data between devices. plural noun: protocols As the humorist Josh Billings once put it, “It ain’t what you don’t know that gets you into trouble. It’s what you know for sure that just ain’t so.” Because it’s so easy to judge the idiocy of others, it may be sorely tempting to think this doesn’t apply to you. But the problem of unrecognized ignorance is one that visits us all. Acknowledging that it visits us all, is probably the number one reason that I painstakingly make sure that my columns, articles and yes social media posts are based on science and evidence-based facts. “One of the painful things about our time is that those who feel certainty are stupid, and those with any imagination and understanding are filled with doubt and indecision” – Bertrand Russell (1951) While it may seem harmless at face value for someone to opine their opinion, I assure you that it affects all of us. From the upand-coming protection agent who believe this to be true, to the more experienced and learned individuals who realize the person does not know what they’re talking about, to the potential clients who discredits the whole profession as not knowing what they are talking about. This type of ill-informed or uneducated public statement reflects on all of us and the profession as a whole. These type of statements directly correlate to why some clients do not feel that executive protection services are worthy of the pricing that is mandated by some of us. It serves no purpose but to hinder the forward progression of the profession as a whole

and for individuals who choose this as their career path. But as long as the media and especially social media give these charlatans a stage on which to perform, the industry will suffer as a whole. I have been accused of having a low tolerance for allowing people to voice their opinions in certain social media forums, in articles , as well as during speaking engagements and interviews. People often wonder why I am so adamant about stopping people from disseminating false information? It is simple, outside of the financial repercussions that I have already mentioned, people live and die by our knowledge and the ability to do the job correctly. It is just that simple. As always, I wish you the best in your endeavors and ask you to remember to take care of yourselves and more importantly, each other. Raffaele Di Giorgio is the CEO of Global Options & Solutions and Tactical Combat Casualty Care (TCCC)® . For more information visit www.GOS911.com 1. Kruger J, & Dunning D (1999). Unskilled and unaware of it: how difficulties in recognizing one’s own incompetence lead to inflated self-assessments. Journal of personality and social psychology, 77 (6), 1121-34 PMID: 10626367 2. Ehrlinger J, Johnson K, Banner M, Dunning D, & Kruger J (2008). Why the Unskilled Are Unaware: Further Explorations of (Absent) Self-Insight Among the Incompetent. Organizational behavior and human decision processes, 105 (1), 98-121 PMID: 19568317


BBA Protect Who’s protecting YOU...?


The security industry is constantly evolving and has developed into

these requirements help to show your prospective clients

a diverse and valuable commercial sector for the UK and business

and principals that you take a serious approach to your

abroad. Obtaining appropriate membership encapsulates and

responsibilities –not only from the physical aspects of protection

enforces all the professional attributes the BBA strives to achieve,

and surveillance, but by also demonstrating you understand the

adding essential components to any operators’ business function.

compliance requirements when providing consulting services. By

Included in your subscriptions are: Continued Professional

encompassing the aforementioned aspects, you can protect your

Development tools (CPD) and Professional Indemnity & Liability

personal reputation and financial standing if a claim is brought

insurances to name a few.

against you for negligence. The BBA provides these niche benefits by tackling the industry inefficiencies identified by its

Being an individual contractor can bring its own challenges, from

own members, and, by doing so, seeks to continually improve

certifying your own professional standing to winning appropriate

association benefit terms through constructive dialogue with its

working contracts. Satisfying

selected affiliate partners or providers.

CLOSE PROTECTION INSURANCE PROFESSIONAL INDEMNITY INSURANCE

PERSONAL ACCIDENT INSURANCE COVER

‘BBA Protect’ Association member benefits include legal liability

‘Protect’ Association members are covered when working

for damages and claimants costs arising as a result of a claim

duties commence being close protection advice and/or close

first made against you arising out of any negligent act, negligent

protection services including travelling directly between your

error or negligent omission when providing ‘close protection

residence and place of employment.

advice’.

Accidental Death:

GBP 1,000,000

Permanent Partial Disablement:

GBP 100,000 GBP 100,000

PUBLIC LIABILITY

TEMPORARY TOTAL DISABLEMENT

‘Protect’ BBA Association member benefits include legal liability

(excluding the first 14 days and up to a maximum of 52 weeks)

for damages and claimants costs from injury or damage in

Up to GBP 750 per week or 75% gross weekly wage

connection with the provision of ‘close protection services’.

whichever the lesser”

GBP 2,000,000 PRODUCT LIABILITY ‘Protect’ covers claims made against members for injury or damage occurring during the period of insurance in connection with any goods or products manufactured, constructed, altered, repaired, serviced, treated, sold, supplied, or distributed. GBP 2,000,000

This is just a summary of the main covers. For more information please call 0207 933 2666, or visit the BBA website

*Cover is provided to you as a ‘Protect’ member of the British Bodyguard Association, resident in the United Kingdom, and is subject to you meeting the associations terms and conditions. www.the-bba.org.uk Lockton Companies LLP is a limited liability partnership incorporated in England and Wales, registration number OC353198, registered office St Botolph Building, 138 Houndsditch, London EC3A 7AF. Authorised and regulated by the Financial Conduct Authority.


By: Jeremy Loseby PG Cert MSc Prometheus Medical Ltd

Images – © Prometheus Medical Limited 2014

Making a Difference through Effective Patient Handover

In previous articles we have looked in detail at how to treat a patient who is critically unwell.

W

hilst effective treatment is essential, the correct handover and documentation is also an extremely important element of patient care. You may be the only person with an accurate account of pre-hospital events and this information

must be effectively communicated to the hospital team to ensure patient care is not compromised. Often, the importance of handing of the patient’s treatment and care to the receiving clinician, is forgotten but failing to hand


An example of an AT MIST handover:

24

Medical: Issue 26

over elements of immediate care such as Tourniquet application time, presence or the absence of a radial pulse, can have a detrimental effect and undo the ‘Gold standard care’ that has been provided.

extensively used by the military (Berry, Nicholson Roberts, 2012). The benefit of the AT MIST format, is that it offers an easy to remember method of handover if a written template is not available.

Methods of handover There are various ways that the patient’s treatment can be handed over. This can be achieved through a verbal handover or a written handover. By far the best and most effective method is to use both of these. The emphasis is on keeping it short and snappy and including treatments given, signs and symptoms and the patient’s initial condition. All of this information should ideally be completed in around 40 seconds and shouldn’t exceed 60 seconds.

Delivering the handover The actual handover of the patient may be exemplary but if the receiving team or individual isn’t ready then the structured handover will fail. Before starting the handover it is beneficial to ensure that the receiving team/individual is ready. Where possible, try to ensure that the handover is written down. There may be time pressures, such as a hostile environment and the only form of documentation for the patient is the handover that has been written down and given to the receiving clinician.

Effective handover By far, the most effective way to handover the patient is using a template or an acronym. The AT MIST template is an effective template, it’s both easy to remember and can be easily applied by the clinician.

When delivering the verbal handover use the headings of AT MIST.

AT MIST refers to Age, Time, Mechanism, Injuries, Sign and Treatment. This has been

As you announce the title of each of the elements to the handover, it will become

For example: A. “Age - 34 year old male” T. “At – 10:30”

Age: 30 year old male Time: At 10:30 Mechanism: Fall down long flight of stairs (20 steps) Injury: Open fracture to left femur - Minor lacerations to head Signs/symptoms: On initial assessment, Airway open & maintained, Current RR 16, radial pulse of PR 110, Massive external haemorrhage from left thigh wound, fractured left femur, D – AVPU, PERLA Treatment: Tourniquet (applied 10: 42 hrs) Oxygen, MILS, cervical collar, wound dressing, Prometheus traction splint (applied 10:49 hrs)


By: Jeremy Loseby PG Cert MSc Prometheus Medical Ltd Practical recommendations to improve the quality of a handover Prior to handover • Consider using a written template • Practice your handover prior to hospital/medical team arrival • Transfer the patient to hospital trolley prior to handover to minimise distraction Delivery of the handover

• Speak loudly and clearly using the template headings; pauses will allow important points to be understood and assimilated • Use headings to structure your handover • Be concise - Try to limit the handover to <40 seconds

Post handover

• Adjuncts to handover such as pictures from the scene can be extremely useful. If you have taken them show them to the receiving medic or hospital. Patient confidentiality can not be compromised,
it is essential that any pictures do not contain patient identifiable information (including pictures of vehicle number plates)

immediately obvious that there is structure. As previously mentioned, be concise. Try to limit the handover to <40 seconds. This is extremely important if there are time pressures or if there are multiple patients at a single incident. If the patient is handed over to a team within a medical facility ensure that you have the attention of the whole team. It can be potentially chaotic, so ensuring that you have the whole team’s attention will reduce the possible need to repeat the handover. Post-handover Once the handover has been delivered, adjuncts to handover such as pictures from the scene can be extremely useful. If you have taken them, show them to the clinical team leader. Patient confidentiality cannot be compromised; it is essential that any

pictures do not contain patient identifiable information (including pictures of vehicle number plates). The handover is an extremely important element of the patient’s chain of care and should always be practiced! Get it right, and all of the information regarding treatment and the patient’s condition will be handed over in a concise, effective manner and will ensure that the appropriate immediate hospital interventions are performed in a timely fashion. By using some of the suggestions that have been discussed in this article, achieving the ‘Gold standard’ handover is possible. References

Berry RD, Nicholson Roberts TC (2012) Pre-hospital trauma care and aero-medical transfer: a military


26

Medical: Issue 26

perspective. Contin Educ Anaesth Crit Care Pain 12(4): 186–9 Brown R, Warwick J (2001) Blue calls—time for a change?. Emerg Med J 18(4): 289–92 Budd HR, Almond LM, Porter K (2007) A survey of trauma alert criteria and handover practice in England and Wales. Emerg Med J 24(4):302–4 Journal of Paramedic Practice • Vol 5 No 10 Evans SM, Murray A, Patrick I, Fitzgeralg M, Smith S, Cameron P (2010) Clinical handover in the trauma setting: a qualitative study of paramedics and trauma team members. Qual Saf Health Care 19(6): e57 Hales BM, Pronovost PJ (2006) The checklist—a tool for error management and performance improvement. J Crit Care 21(3): 231–5 Henckens MJ, Hermans EJ, Pu Z, Joëls M, Fernández G (2009) Stressed memories: how acute stress affects memory formation in humans. J Neurosci 29(32): 10111–9 NHS Institute for Innovation and Improvement (2008) SBAR: Situation-Background-AssessmentRecommendation. http:// tinyurl.com/3a9g59d (accessed 30 September 2013) Owen C, Hemmings L, Brown T (2009) Lost in translation: maximizing handover effectiveness between paramedics and receiving staff in the emergency department. Emerg Med Australas 21(2): 102–7 Stannard A, Tai NR, Bowley DM, Midwinter M, Hodgetts TJ (2008) Key performance indicators in British military trauma. World J Surg 32(8): 1870–3

Sutcliffe KM, Lewton E, Rosenthal MM (2004) Communication failures: an insidious contributor to medical mishaps. Acad Med 79(2): 186–94 Thakore S, Morrison W (2001) A survey of the perceived quality of patient handover by ambulance staff in the resus room. Emerg Med J 18(4): 293–6 Wacogne I, Diwakar V (2010) Handover and notekeeping: the SBAR approach. Clin Risk 16(5): 173–5 Wong MC, Yee KC, Turner P (2008) Clinical Handover Literature Review. eHealth Services Research Group. University of
Tasmania, Australia. www.Thoracic.org. au/documents/papers/ clinicalhandoverliteraturereview. pdf (accessed 30 September 2013) World Health Organization (2013) Action on Patient Safety— High 5s. www.who.int/patientsafety/ implementation/ solutions/high5s/en/index.html (accessed 30 September 2013) Ye K, Taylor D, Knott J, Dent A, MacBean E (2007) Handover in the emergency department: deficiencies and adverse events. Emerg Med Australas 19(5): 433–41 Yong G, Dent AW, Weiland TJ (2008) Handover from paramedics: Observations and emergency department clinician perceptions. Emerg Med Australas 20(2): 149–

Jeremy Loseby is one of Prometheus’ Senior Instructors and has been a Critical Care Paramedic since 2008. For the past 4 years he has also worked as a crew member with Kent Air Ambulance.


iPad3

9:45 AM

By: Alex Bomberg

Tapping, but not my feet… In this short article Alex Bomberg, CEO of UK based International Intelligence Limited looks at the rise in the use of Mobile Telephone monitoring software (spyware), its effectiveness as an espionage tool and its cost vs potential rewards.

“People are three times more likely to open a message attachment on a mobile device than they are on a desk top computer, because they think it’s safe” Part of our remit to all of our clients is to educate them and keep them abreast to any new trend or threat, from a rise in theft due to economic turndown to the more targeted corporate crimes such as acts of espionage. Many companies spend hundreds of thousands of pounds each year on security and IT security to ensure that secrets stay exactly that, secret. If you were to leak one average days’ worth of emails or text

messages to your largest competitor, just how much damage might that cause? Intelligence at what cost? The use of mobile/cell phone devices and their impact on our lives, communication habit and behaviour is exactly what will define this short period history. According to the Pew Research Internet Project, as of January 2014 90% of Americans (adults) have a cell phone and 58% own a smartphone (Pew Research, 2014) and this is exactly how the majority of people access business data, communications and emails.


28

Feature Issue 26

It’s not just a phone anymore, it’s a computer, more powerful than the home computers of the late 1990’s, the Samsung Galaxy S5 for example has 2GB of Ram and a 2.5GHz Quad-Core processor. “Smart phones” have totally changed human behaviour. According to one 2012 academic paper by James Roberts, Ph.D., professor of Marketing at Baylor’s Hankamer School of Business, people (on average) check there mobile/cell phone every six minutes during the working day. This is not a new threat and is being more widely used as an espionage tool due to the huge amount of intelligence that can be gathered with just one well-placed phone. Mobile telephone or Cell phone monitoring software is now very, very widely available and has been a growth sector since the mid 2000’s.

“Some software can block actions such as calls to certain numbers or website access or even wipe the phone remotely. Most people would be totally buggered at this point!” What is it possible to monitor? Some phone monitoring software does allow users to record and monitor calls. Generally most software packages include the following as standard: • SMS activity • Ingoing-outgoing call log • Location/GPS • Internet browsing activity (URL’s) • Pictures & Videos • Emails • Sim-Card Changes

Some monitoring software offer the user (the person monitoring) the option to command the device to take photos, video, audio (background audio and calls), to view the A Google search for “monitoring software for target devices screen or as covered above, mobile phones” gives hundreds and hundreds to wipe the device. So, this software that is of results, it’s only when you start to do available for under £100 can be used to turn some basic research into this software that it your mobile/cell phone or device in to a GSM becomes very scary. Less than £100 is what eavesdropping device, that you are carrying you can pay for software to monitor a mobile/ everywhere and regularly charging. cell phone. And, this software can monitor ALL user activity on that device, covertly. How? Much of this software is marketed as Worried yet? Well they cannot only see all of “parental control software” or “cheating that information, they can activate the GPS spouse” etc. and is legally sold and marketed and see your exact location, that plus see and as such. have access to any files on your device this of course includes files in the form of email Monitoring software is installed directly on to attachments. your telephone or device normally by having direct access to said phone or device. That There have also been cases of people stealing said some companies make claims of offering photographs off mobile devices for blackmail “remote install” spy/monitoring software. purposes (Sextortion) or for example At this present time I do not think that this the theft and release of photos of Scarlett is technically possible on some models of Johansson. phone but it may well be on others.


By: Alex Bomberg Installation of software is very, very quick and can be done from start to finish within 5-15mins depending on the software and the device.

be gifting someone with a “new” phone. Installation and testing on a target phone might prove problematic if the phone could only be obtained for a short period, unless of course it went missing then was found an After signing up, purchasing the software and hour or day later – as often happens. installing it, monitoring is normally done by logging on to a server. It really is that simple A £100 espionage tool that would enable and is sold mainly as a subscription service. monitoring or your email, telephone calls and texts, plus any mobile internet access; and Is this a viable espionage tool? people worry about Government monitoring! 100% yes, absolutely mobile phone BYOD – Bring your own device monitoring software if installed correctly is a great, cheap and easy tool for espionage. One very obvious threat to companies is The most practical way of deployment would individuals taking their own devices in to


30

Feature Issue 26

the place of work; known as “Bring your own device” (BYOD). BYOD is a huge risk to companies, from employees brining in and using USB memory sticks to employee owned devices being used and sanctioned to receive work emails. When it comes to phones infected with monitoring software being introduced into this “controlled” environment, then risks increase especially when we consider file sharing. “Users are less likely to report a lost device to IT when it’s their own for fear of losing their personal data, along with any company information, when the device is wiped.*” *(Deloitte CIO Journal, 2014). Many businesses are well versed in Mobile Device Management (MDM) and there are

many programmes and tools that aid in managing the use of BYOD’s across corporate networks. But with many companies and organisations now moving more and more towards “Cloud computing” the mobile device remains a weak link. It is imperative that IT Managers have an understanding of phone monitoring software and bear this in mind when it comes to managing a BYOD policy. The risks that monitored phones pose should not be underestimated, once they have access to corporate network or access corporate data. Many savvy IT Managers in managing the BYOD issue are setting up “Shadow IT” systems, yet this is no defence to the damage caused by phone monitoring software, in that


By: Alex Bomberg

Users are less likely to report a lost device to IT when it’s their own for fear of losing their personal data. documents that are shared by the infected device or via sync’d email are going to be accessed and viewable by any “attacker”, i.e. the person or persons that have infected said mobile phone. Just the simple loss of a phone/device can be catastrophic. US technology giant Symantec Corporation in 2012 conducted a social experiment with 50 “lost” smartphones spread over five North American cities. Prior to the strategic placing of these 50 smartphones they were all loaded with what Symantec calls “a collection of simulated corporate and personal data”. The smartphones were loaded with tracking and monitoring software to enable monitoring once the devices were found. The findings were shocking: • 83% had attempts to access business apps • 89% had attempts to access personal apps • 96% had attempts to access at least some type of data • 50% of finders contacted the owner and offered to help return the phone The most popular apps accessed were: • Contacts • Private Pictures • Social Networking • Webmail • Passwords The full report titled “The Symantec Smartphone Honey Stick Project” is available on-line.

Simple advice 1. Never accept a mobile telephone as a gift. Not ever. 2. Never leave your telephone unattended. 3. Never communicate ultra-sensitive information via unencrypted electronic means. 4. Ask your IT department what steps they are taking regarding this issue. 5. If you lose a phone/device that you use for work – report it to IT immediately. Tell-tale signs of tampering 1. Drain in power. Does the device lose/use more power than normal? 2. Strange activity. Is the device functioning as is should? 3. Rebooting or powering down. Does your device reboot itself? 4. Odd text messages. Coded/scripted text messages? 5. Phone errors? Often spyware will cause errors to the phones operating system. Is phone/device monitoring software invisible? The simple answer to this is yes, most software it is hidden and invisible from “normal user” activity, in that a normal user would not even know where to start looking for software logs and programmes. Want to know more’ If you would like to know more about this threat in more detail then please contact us via info@international-intelligence.co.uk or info@international-intelligence.fr


32

Feature Issue 26

In Colombia, Peace Could Bring New Challenges For – The world’s Business BOGOTÁ longest-running armed

P

conflict could soon be coming to an end.

eace negotiations between the Colombian government and the Revolutionary Armed Forces of Colombia (FARC) have gone on for months in Havana, Cuba, but they have gathered steam following the re-election of Colombia’s President Juan Manuel Santos in July. This is the fourth attempt to bring an end to the 50-year-old conflict – one that has claimed hundreds

of thousands of lives and still displaces thousands of Colombians each year – and a deal is looking increasingly likely. Agreement on three of the five main areas of negotiation has now been reached, giving Colombians the best chance in a generation of a lasting peace. The new-found stability could prove an economic boon. An end to hostilities would


By: Ben Hockman

An end to hostilities would enable Colombia’s government to divert as much as $13 billion away from defence and into infrastructure, healthcare and education. enable Colombia’s government to divert as much as $13 billion away from defence and into infrastructure, healthcare and education. It could also help bring muchneeded further foreign investment into a country that despite economic progress in the past decade still suffers from gross economic inequalities. The path from here will not be easy. Each step closer to the finish line raises the stakes, making the next one even harder. In the short-term, FARC attacks have gone up – mainly low intensity assaults on infrastructure and security force personnel, rather than companies. These attacks could be a deliberate negotiating-table tactic to demonstrate that the FARC’s operational capability has not evaporated despite the government’s recent tactical success in targeting FARC assets around the country. An alternative interpretation is that cracks are beginning to open between the FARC’s political and military wings. While senior political leaders start to look towards reintegration into the system, the military wing’s future is less secure. In the event of a peace deal, only 50-75 percent of FARC fighters are likely to demobilize, and some who do may return to conflict should they struggle adapting to civilian life. Literacy rates among the guerrillas are not high, and jobs are still tough enough to come by for people who

can read and write. The last paramilitary demobilization program in Colombia occurred in 2003-2006. It was poorly managed and incomplete, and there’s little to suggest anything different will occur this time around. Some former mid-level fighters will drift away from the FARC and into criminal gangs, using combat skills honed by years in the bush as a revenue generator. This could increase risks for some business, given that their employees would make more lucrative targets for extortion kidnap and ransom. A host of difficult political questions remain about implementation of any potential agreement. Among them, the legal status of high-ranking FARC fighters. Colombia is a signatory to 2002 Rome Statute of the International Criminal Court, whose prosecutor has said that negotiators in Havana cannot guarantee amnesty for the most heinous of crimes. This further decreases incentives for some of the most ruthless actors to lay down their arms. The long-term effect of the FARC on Colombia’s the political landscape could have an adverse effect on businesses. If, as widely expected, the group is absorbed into one of the main leftist parties, this could prompt a hardening of the political landscape towards foreign investment in future, particularly in sensitive areas such as resource extraction, environmental licencing regulation, human rights and indigenous rights.


34

Feature Issue 26

Ultimately, companies need to think beyond the FARC and align with a broader strategy of engagement with rural Colombia. An original motive for the organization taking up arms was to avenge a profound sense of disenfranchisement and disempowerment among the country’s rural poor. As the armed conflict winds down, social and community unrest and activism will emerge as key challenges to foreign investment. Violent protests, when they happen, will threaten the security and restrict the movement of organizations’ assets and personnel. Mitigating these risks requires improved community engagement and stakeholder

relations. Such efforts can help foreign investors avoid becoming seen as part of the problem; particularly in extractive industries. Colombia has enacted business-friendly reforms in the last decade, but without proper regulation and guidance in all areas of corporate risk management, businesses will face reputational pressure to show that they are making a difference on the ground. For those companies that are responsible and serious about the long-term, this is an opportunity to show how they are delivering jobs, technology transfer, social benefit and tax revenues to local populations.

Ben Hockman is a senior security risk consultant at Control Risks, the global risk consultancy.



36

Editorial Issue 26

Keeping Your Edge

Dress for (Operational) Success

This business can be an unforgiving one and everyone has heard the old adage, “you never get a second chance to make a first impression”.

A

ppearance is important in the Personal Protection business and while we spend hundreds (and even thousands) on the latest firearm or Tacti-COOL kit, we sometime neglect how our appearance is perceived by others when working in a professional environment. Choose the Right Suit for the Job Quality matters, but you don’t have to go and drop several thousand on a new wardrobe. Building a complete wardrobe happens over time, acquiring a few pieces here and there that you can mix and match. Think dark blue as an excellent launch pad when it comes to colors. Neat is what you should be going for, but not too tight. Remember, if we there is a problem, we are suppose to be able to move in those things. The fit is important; the suit’s shoulders should not protrude beyond your own shoulders. Stand sideways against a wall and the shoulder pad touches the wall before your actual arm does, the suit is too big.

Likewise, be mindful of the pants length, too short and you look like a hipster, too long and it screams unprofessional. Choose a two button or three button, but avoid the fancy 5, 6 and even 8 button suits that you will find some places. It might look good in the night club, but in the eyes of other professionals, it’s just tacky. This isn’t the 70’s and the “Zoot” Suit needs to stay in the past. Empty Suit Jacket Pockets Those two flaps on the side of the suit jacket? They are not for “stuff,” they are for show. Put something in it and the bulges are very apparent (and sloppy looking). Instead use your inside pocket, “GO bag” or belt. It’s the nature of the beast that we are going to carry gear, but we want to visually (and operationally) be as streamlined as possible. Get your suit tailored around your “tools” If you are carrying a firearm, handcuffs, flashlight, etc. those bulges will show. Instead when you go to get your suit tailored (and every suit should be tailored) do it with


Keeping Your Edge By: Elijah Shaw your gear on. (Note: make sure you let them know what you do professionally in advance so you don’t scare anyone). Many think of a tailor as an additional expense to the suit purchase process, but keep in mind he has an important job as well. Don’t get sloppy with the knot A properly tied tie can make or break an outfit. Learn the difference between a Windsor, a Half Windsor and a Four in Hand. And while clip on ties might sound straight out of Junior Prom, there is a great case to be made that Protector’s should not wear anything that could be used as a strangulation-aid in the event of a hands-on altercation. There are also many instances where a suit or sport coat can be worn without a tie, immediately making the look less formal, and lowering the Protector’s profile. Female Protectors- Dress to equalize the odds High heels are nice and fashionable but for an assignment extremely impractical. Stick to flats, same with skirts and dresses. look at

the secret service model - suit jacket, slacks and a “don’t even think about it” attitude. Women should think about when and when not to carry a purse. For practical reasons, it’s one of the most discreet “GO Bags” around because no one ever thinks twice about it, allowing Female Protectors to hide their tools in plain sight. Protect your feet One of the biggest assets to someone doing this line of work for any length of time is something so obvious it really gets overlooked - shoes. A good, COMFORTABLE, pair of shoes will make a world of difference for the Close Protection Operator. Just ask any agent who’s worked a detail where he has to stand for 12 hours plus, or walked 2 miles on an overseas sight-seeing trip with a VIP (on unpaved roads!) Speaking from experience, I’ll tell you; wear the wrong shoes and the unpleasantness factor goes up dramatically. There are many quality shoe brands, so do your research, just keep in mind that expensive does not mean practical.

Those two flaps on the side of the suit jacket? They are not for “stuff,” they are for show. Elijah Shaw is the CEO of Icon Services Corporation and The National Director of the North American Bodyguard Association


38

Feature Issue 26

COUNTERING THE EFFECTS OF SURVEILLANCE PART4:

Hostile Activity Detection & Response

P

arallel to the conduct of operational and personal security issues and the electronic gadgetry in countering threats so too must the physical workings surrounding the operation be conducted. Pro-action is of paramount importance in CP operations. Intelligence gathering through open source and ‘contacts’ provides a heightened plateau in which to pre-empt, respond and to react. Without such aims of foresight will create an inflexible and constrained working methodology for the operation. The protection operation will remain only as a reactive one at that moment of necessity and hence, will provide an increased opportunity of success for any attack. To increase our chances of success in detecting, responding and defeating any hostile activity requires a designated operation within the protection operation itself. Government agencies naturally have the full luxury of all their resources at their disposal. This of course, is in addition to

their capability of road closures, blocking and halting traffic. Commercially however, it often remains the responsibility of one or two team members to collate, sift and assess as well as conducting or tasking, (through the CPTL), a counter surveillance team. Often, there is very little that can be collated in relation to any business or social interest and so efforts must be focused on the counter and detection roles. The actual skill sets required for such roles are based and developed through in-depth surveillance training itself. One cannot counter certain actions effectively if knowledge of those actions is not known – ‘A fisherman always sees another fisherman from afar’ Russian Proverb This also applies to Protective Surveillance, which should involve an overlapping of responsibility concerning the counter role. Many commercial training providers,


By: Rich Aitch

Backup vehicle with rear-view HD video recording. Surveillance detection should remain a constant work in progress. Viewing several hours of footage after a move or job should remain an on-going procedure. Identifying surveillance is a difficult task during a protection operation without involving any designated counter team. Any country’s main taxi fleet models provide an excellent example of being able to conduct a follow without drawing attention and for the most part will only be properly identified through viewing video footage in such circumstances.

and indeed, government protection units will train students in identifying hostile surveillance resulting in only one incident during their final training exercise at best, but then the training peters off to nothing. The action(s) conducted after positively identifying is just as important as the actions conducted to identify and yet lip service is paid. If the CPT or CST has positively identified hostile surveillance through either vehicle footage or otherwise then the following options are to be considered and planned for:

the hostile surveillance – a term loosely given as ‘watching the watchers’. Situations such as these are not so uncommon in government circles and many times have hostile surveillance teams been detected through the counter role having positioned in areas that are identified as being most likely areas to be in use by the hostile team members themselves. As a result of such action being identified within a protection environment the CPT must increase its aggressiveness in tone throughout its TTP’s. A full SAP, introducing a joint CAT/CST or both if assessed. The involvement of the Police also 1. The CPT to immediately evade contact remains an option however, this is usually at 2. Confront/ capture/ ‘interrogate’ those the very end of the CPT’s own ‘investigation’ identified hostiles/ unknowns or unless a more serious threat has been 3. Allow the surveillance to be aware as to the identified. CPT’s knowledge of their presence 4. Inform the Police of ‘suspiciously parked Travelling back to the UK from Paris on the vehicles’ or ‘harassment’ Eurostar in 2004 I overheard a conversation. 5. Allow the surveillance to continue, Four suited men, all British, were sat around deploying a full CST and also CAT if a table diagonally opposite to me the other required side of the corridor walkway. The nearest with his back to me had his laptop open that In such situations as the last point, the CST displayed graphs and text that I could read must conduct or task direct surveillance on with ease. The conversation was concerning


40

Feature Issue 26

battlefield communications, command and control involving joint military operations between the British and French armed forces developing into contingencies in the context of a Joint Defence Force. I approached, who were obvious to me from the content of their conversation, the government officials as we disembarked. I highlighted their lapse in both PERSEC and OPSEC and the fact that I could easily have followed them to their homes and/ or have stolen their laptop . In 2011, I was in Israel. I entered a bar at the end of a night and caught a conversation between a Brit and a local. I propped myself up at the bar alongside and got chatting to the Brit. Within 2 minutes I had ascertained he was in the British Forces and worked as an instructor in the use of Unmanned Aerial Vehicles, (UAV’s), training soldiers in their use over the Gaza Strip. Having information acquired by hostile surveillance is one thing. Voluntarily handing it on a plate is another. In a realistic commercial world, a CST will not be present unless an increase in security

measures is required for a specific reason on the schedule, or a possible detection has already arisen to give concern.

For example, this can be conducted through overtly approaching the parked vehicles of the hostile team for a closer look, eyeballing them, taking phots of them… To do so may compromise the op insofar as

furthering dissemination of knowledge of the op. The option has a use but only under specific circumstances. It must therefore be recognized in all contexts that informing the Police dictates a preference of doing so anonymously. The CPT is not to make it known to the threat that they are have been pinged but are to appear to continue conducting the operation in exactly as previous. All further assets deployed as a result of this escalation are to remain covert until such a time that pre-emptive or reactive action is required Some 8 years later in 2012, we witness cooperation between both countries in the form of joint exercises in Northumberland. The traditional model of terrorist cells specifically has designated responsibilities; cells for logistics, operations and cells for intelligence in conducting reconnaissance & surveillance. Knowledge of other cells and individuals involved is, for the main, strictly confined to that organisation’s leaders and generally not known by each cell or individual.

For the most part, the entire CPT will be conducting their usual observations in surveillance detection and whenever such an incident or possible detection arises then a member(s) of the CPT will conduct a counter role. This of course is dependent on the circumstances surrounding the sighting and if operational conditions allow. Several times I had tasked team members to conduct a follow after arrival at a location. An individual was pinged on a phone looking in our direction and then immediately walking off on our approach to the DOP. No SAP was used due to armed members of the Diplomatic Protection Group being permanently positioned at that location. The tactic of specific team members dressed ‘down’ in casual appearance affords the increase in flexibility of their use. Both in a SAP and counter role and if the situation


By: Rich Aitch dictates as above, a surveillance one. The appearance of a full CPT typically suited and booted walking with the Boss increases his image stamp causing attention that may not have been otherwise present. The response to identified surveillance is dictated by: • The current activity • Team strength • Threat Of course, the actions undertaken during a mobile move are severely limited to that whilst on foot. It is important therefore that the tasking of certain elements of the CPT do not drastically infringe on the level of security during that period. It remains a balance of what is appropriate in the given circumstances with a constant focus on areas of greatest threat. After all, a follow is only a follow. There remains no cause for any knee-jerk reaction in responding but that observations need to continue and become part of operational procedure at that moment in time in increasing any security presence at the next venue or along the route. The commercialalities of both SV and CP operations, as dictated by money and party politics, must encompass workaround solutions or best practise in identifying areas of weakest links and concentrating efforts and available resources where and when practicable. This flexibility in dynamic risk assessment must continue throughout every step of the operation. There are no hard and fast rules but the CPTL, (or IBG), must address the concern to the Boss if the very efforts conducted intrude, or have the potential to intrude, on normal operational working practise. It does, however, remain a very difficult concept to identify proper

surveillance whilst operating in a CP role. However, if SAP team members especially, can position along a route covertly, (including parallel routes), recording all vehicles that follow and repeating this several times during that day then any common sightings will more than likely be a SV vehicle. This applies at location arrivals and departures being positioned in areas that provide good observations of vehicles passing and conducting behaviour of interest. Having established that a surveillance team will require stake out(s), the SAP, prior to the Principals departure, can drive around the local area looking for possible surveillance vehicles that are laid up waiting to impose surveillance. The collating of these details over a period of time will show any common occurrence or pattern. In addition to surveillance being imposed for: • Confirmation of suspicions • Evidence gathering • Industrial/ corporate espionage • To gain intelligence on adversaries/ opponents/ possible future targets • Pre-attack intelligence …and as a direct result, it may also be conducted to: • Identify the CP Team • Manpower strength • Weapons • Vehicles • Methods of operation • Capabilities • Alertness The manner in which information, and subsequently intelligence, is used is by a process of: • Collecting • Sifting


42

Feature Issue 26

• Assessing • Briefing • Planning • Acting

is termed as ‘The Planning Cycle’ and is commonly outlined as:

This hostile process could be conducted not only during an operation but also at any time. During downtime, travelling to work and recces. Passive anti-surveillance must continue as an on-going working procedure. If surveillance has been pinged at any time during these non-operational periods then this information must be disseminated to all other CPT members just as it is during the operation itself.

Of course, this ‘planning cycle’ is not set in stone, there is no universal model, but it frameworks the brief format of the planning process geared towards specific hostile action. It must be noted that surveillance could be conducted throughout this process and not solely at certain points. It is therefore important to understand that if surveillance has been positively identified during a CP operation, that this event could be in process during any of the stages of the planning cycle including ‘Actions on Objective’.

Hostile Surveillance Planning Cycle These days, terrorist organisations are professionally run. They have to be to be able to conduct attacks without attracting the eyes and ears of government agencies. From their formation of cells when used, to operational planning to the conduct of the operation itself. However, planning any hostile action has the requirement for a certain level of surveillance, whether that action is targeting areas, buildings or people. This action

Proactive Actions of Anti & Counter Surveillance The use of a dedicated anti and/ or counter surveillance programme should not fall as a result of any incident arising or any particular increase in threat. An on-going, dedicated AS/ CS programme, specifically the element of surveillance detection must be undertaken as an SOP. Whether that be a separate dedicated team for the purpose, the SAP or members of the PES. The

Planning Cycle

Needs of an Attacker

• Broad Target Selection

• Information

• Intelligence & Surveillance

• Hardware

• Specific Target Selection

• Weapons

• Pre-attack Surveillance & Planning

• Ability

• Attack Rehearsal

• Conviction

• Actions on Objective

• Access • Escape


By: Rich Aitch

Personal and operational security regarding awareness to hostile surveillance must remain an on-going procedure regardless of where you’re going and what you’re doing. Awareness must increase, specifically, concerning those long-term operations whereby the Principal may be of interest to government and business competitors alike.

limitations of commercial ops in terms of budgets and party politics for manpower and vehicles should not remain an excuse – one man can undertake CS/ SD for the team. There remains much advice in the industry concerning methods to detect, confirm and evade surveillance whilst driving and walking.

Principal could remain of interest to various governments, business opponents, fringe criminal elements and the media. It then also becomes important for the CP operators to consider the threat on a personal level as well as an operational one. If it is decided that the chosen response to identified surveillance is to drill and ‘watch the watchers’ then the importance of not conducting typical antiHowever, for the most part, they fail to surveillance measures cannot be understated. outline the effect of the current activity The entire operation must be considered undertaken by the target and the effect of within the context that all members are conducting such obvious counter surveillance under surveillance. Each member conducts practises at the time. Such surveillance their own anti-surveillance whilst at home detection methods will only show to the not working, during their journeys to and threat that they have been identified and from locations of work and ‘down time’ as a result, will either force them to lift off during operations as well as during the or to increase their game. Double backing operation itself. It stands to reason then on yourself, travelling 3 sides of a block, that restaurants, hotels, and car parks moving to quiet areas, etc. all for no apparent frequented and other areas used must be map reason will only show to the surveillance that appreciated and recced for the most likely they have been pinged. They know antisurveillance positions that would be used. surveillance drills and will have their own ‘actions-on drills’ in the event they believe This series of the target has identified them – usually a articles is an extract complete lift off and a reassessment of the from the book next course of action. ‘Close Protection’ by Rich Aitch. For It does of course ultimately remain, that more info go to: the reason for any possible surveillance www.CPBook.co.uk imposed in the first place is the underlying reason for the cause of any initial and increase in surveillance awareness by the target and the actions of any surveillance detection conducted. For those involved in CP operations this would more than likely be as a direct result of the Principal. The



By: Dr Amy Burrell Presentation skills

At first glance it might not seem that presentation skills are relevant in a close protection environment.

H

owever, when you think about it, what I’m really talking about is communicating knowledge and that is vital in close protection. Security means that ensuring people understand what you mean quickly and effectively is essential, and one way to help develop communication skills is by learning how to present effectively. This article aims to provide you with some practical tips for tackling presentations if you ever find yourself in the position of needing to give a talk. First things first, if you are asked to deliver a presentation then you will probably need some visual aids. Most people use Powerpoint to write a slide show – this helps structure the talk and provides prompts for the speaker throughout. However, writing effective slides can be a difficult so here are some tips for getting it right (mainly based on what not to do!):

Top tips for Powerpoint slides • Use simple titles and keep bullet points short and relevant – presentations are supposed to be a summary so make sure it is. • Ensure the contrast between text and the background colour is appropriate – the audience needs to be able to read the text. • The minimum font size is 16 – if you can’t fit your text on the slide using font 16 or above, do not reduce the font, reduce the number of words (or add another slide). • Choose a sensible font - Calibri or Arial are good as they are easy to read. There is nothing worse than a flowery or comic font when you are trying to make a serious point – my personal pet peeve is Comic Sans but I’ve also seen Lucinda Console and Lucinda Handwriting used. Whilst these fonts might be nice for a while, they get very tiresome by end of the presentation. • Limit the number of bullet-points per slide – between 4 and 6 is a good rule of thumb.


46

Editorial: Issue 26

• Don’t be led astray by the “animations” menu – Powerpoint has some fantastic animation options but over-use of animations can lead to death by Powerpoint. One presentation I saw used animation to “fly” or “spin” each bullet-point in. It also used some kind of animation to move between slides (I hate the checkerboard pattern now). This kind of over-use leads to headaches so please resist the urge to animate unless it is a pivotal part of the presentation (e.g. posing a question, having a discussion with the audience, then putting the answer up). • Don’t rely on swell chequer…you don’t want to find yourself talking about pubic disorder instead of public disorder. • Don’t include technical detail unless you have to – it is tempting to try and demonstrate how much you have done and how complex it is but the presentation is a summary of what you have done. That is what people want to listen to so don’t overcomplicate things.

• Make it as visual as possible – a picture really is worth a thousand words in presentations. Maps, graphs, diagrams, and images are all useful to make a presentation more visually appealing – so long as they are relevant to what you are talking about of course. • Continuity is important – don’t change the font or style between slides as this will irritate the audience. There are some great templates available in Powerpoint which standardise font sizes etc. so I recommend using one of these if you don’t have a corporate template you need to use. Of course, good Powerpoint slides are only part of the presentation - it is also important to get the oral presentation right. It is surprising how many people contradict themselves, and/or confuse the audience in their presentations because they have focused so much on the slides, they have forgotten to think about what they are actually going to say. Public speaking can be very daunting but it can be learned. I was a very shy teenager and if you had told me I would be delivering lectures for a living when I was 15 I would have laughed at you. But here I am, teaching students every week and with experience of delivering talks to hundreds of delegates at conferences all over the world. I am living proof that public speaking can be learned, and here are my tips for delivering a presentation:


By: Dr Amy Burrell Presentation skills

Top tips for public speaking • Put yourself in the audience – when writing a presentation try to imagine being in the audience. What would you want to hear? • Practice – make sure you practice your talk before you deliver it. This will help you ensure the presentation is the right length and flows in a logical way. You are less likely to stumble over your words or over-run. • When you practice, make sure this is out loud. There is a difference between reading through slides and familiarising yourself with the content, and actually talking through what you will say. You can even set yourself up with a fake audience to look at (think a row of coke cans, ornaments or teddy bears!) • Be prepared – make sure you turn up early to set up your Powerpoint presentation. You don’t want all your hard work to be undermined by technical problems and arriving early gives you the chance to set up and problem solve if needed. • Be passionate about what you are talking about – the audience will not be enthused by the content if you’re not. • Start strong – the first 2-3 minutes have

the most impact so practice this section of the presentation in particular. The audience wants to like you and will really look to engage with the presentation so the first few minutes are crucial to capture their attention. • Speak out towards the audience – don’t talk to the screen, the computer monitor, or your own feet (however tempting it may be!). • Pace yourself – most people speak more quickly when they nervous. Make a conscious effort to speak slower and this will, not only be easier for the audience to understand, but should also calm your nerves. • Remember to maintain eye contact with your audience – this gets easier with practice and is a good way of judging whether people understand what you are saying. It can be intimidating and nervewrecking but is worth persevering with. If this scares you, practice by picking a friend in the audience and looking at them. When you are more confident, focus on making eye contact with individuals rather than just scanning the room. • Keep to time – there is nothing more

Put yourself in the audience – when writing a presentation try to imagine being in the audience. What would you want to hear?


48

Editorial: Issue 26

Be courteous and professional when answering questions frustrating than someone running over their designated timeslot. • A practical one but think about using a remote control. This gives you the flexibility to move around and flick between slides without being reliant on the computer keyboard. • Remember the “B” key – if you press the “B” key on the keyboard when your Powerpoint presentation is in slideshow, the screen will go blank. This allows you to expand on a point/engage with the audience/take a break without leaving a slide up. When you want to return to the slides, simply press “B” again. Remote controls often have this option too (sometimes shown as a button with a mini computer screen icon on it). • Be careful about turning lights off – whilst this might make the screen look a bit brighter, it will encourage the audience to have a nap. Keeping it bright means the audience can engage more with you as a speaker too – they should be looking at you more than the screen. • Be courteous and professional when answering questions – when audience members ask questions or give comments, thank them for their input. Even if someone is being difficult, you must maintain the higher ground so stay cool. Remember that

if an audience member is unreasonable and rude, the other members of the audience will recognise that and judge them for their behaviour. If you respond courteously and professionally, then they will view you in a positive light. • Have fun! You are most likely talking about something that interests you, so try to enjoy yourself. Your enthusiasm will be infectious. Conclusion It is common for people to think about presentations as being the remit of lecturers teaching classes or delegates at a conference but when you boil it down, what it is really about is communicating knowledge. As a close protection operative, you might find yourself presenting to people, even if it is a relatively small group in a team briefing environment. Or, you may find yourself presenting in a more traditional format, e.g. if you are studying for a qualification at the moment, it is possible you will be asked to do a presentation as a form of assessment at some stage. I would argue, therefore, that with all of these possibilities, practicing presentations can only ever be a good thing. So, if you are invited to give a talk, hopefully this article will provide you with some useful tips to help you on your way.

Amy holds a BSc in Applied Psychology, an MSc in Forensic Behavioural Science, and a PhD in Psychology. Amy is a Lecturer in Forensic Psychology at Birmingham City University and can be contacted on amy.burrell@bcu.ac.uk. Amy previously worked for Perpetuity Training who specialise in security training (see www.perpetuitytraining.com) and is also involved in the Crime Linkage International NetworK (C-LINK) (seewww.crimelinkage.org).


By: Leon S. Adams

A brief look at MACE Pepper Gel for Protection Specialists.

A

s a protection specialist, it is not uncommon to be found working with a principal unarmed. Often times, the locations that your Principal may have restrictions on firearms. However even in those situations in which you may be permitted to carry lethal force tools, you may want to consider “less-lethal” force options for confrontations that may not warrant a lethal force response. A common tool afforded to security specialists industry wide as a less lethal force option is Oleoresin Capsicum, more commonly known as Pepper Spray. Oleoresin capsicum, “OC” or Pepper Spray is a naturally occurring substance derived from hot peppers. OC works by causing an intense burning sensation to the skin, eyes and throat on contact. It is known as a lachrymatory agent (a chemical compound that irritates the eyes to cause tears, pain, and temporary blindness) and is commonly used in policing, riot control, crowd control, and personal self-defense. Its inflammatory effects on the mucous membrane cause the eyes to close, taking away vision. This temporary blindness can allow a protection specialist using pepper spray for self-defense an opportunity to escape to safety with their principal.

MACE Take Down series Pepper Gel Pepper Spray is known to be an effective personal protection tool. It isn’t without its drawbacks and limitations, however. For example, Streaming type pepper sprays, one of the more popular formats in use, can contaminate the surrounding area when used indoors due to the extremely small particulates that make the OC chemical (called capsaicin), often affecting innocent parties that may not be involved with the confrontation at hand. Decontamination of the affected area can also take quite a while to dissipate. This can present a challenge for those protection specialists whose common operating area may put them in crowded locations or indoors where innocent parties could be affected. TAKE DOWN EXTREME® PEPPER GEL® is one of the strongest pepper spray formulations offered by MACE brand, a 1.4% capsaicinoids concentration, suspended in a sticky gel, making it ideal for use indoors or in windy conditions. Their patent pending formula has several advantages over traditional pepper sprays such as streamers, foggers and cone type sprays. Mace Pepper Gel Distance Defense Sprays


50

Feature Issue 26

combine the Maximum Strength Formula of OC Pepper and invisible UV marking dye with the added sticking power of Mace Gel Stream Technology. This Ultimate Pepper Gel Formula outperforms conventional pepper sprays by delivering extreme stopping power that blindfolds an attacker with reduced blow back from wind. Mace Pepper Gel is offered in three sizes for delivering a targeted stream of Ultimate Pepper Gel Formula from 18-25 ft depending on the model and the product. You can safely defend yourself and your Principal in a threatening situation with the effective power of this product as it affords you the opportunity to counter the attacker from distance, seriously affecting his vision and breathing, giving you precious time to escape the area with your principal. This particular product also contains an invisible UV marking dye that can help police identify your assailant once you’ve gotten your principal to a safe area. Determining OC strength Determining the strength of different manufactures of pepper sprays can be a confusing task. The best and possibly the only reliable method is using what’s referred to as the CRC of the product which stands for the Capsaicin and Related Capsaicinoids. CRC does not measure the amount of Oleoresin Capsicum (OC) within the formulation. Instead, CRC is the heat bearing and pain producing components of the OC. Some manufacturers may show a very high percentage of OC (Oleoresin Capsicum) and, although OC is the active ingredient within the formulation, it does not indicate pepper spray strength. The federal government of the United States makes no mention of SHU (Scoville heat units – a popular rating shown on most Pepper Spray containers) or OC in their requirements, only CRC. The SHU is measured at the base resin and not by what comes out of the aerosol. Here are a few more facts about the advantages of using Pepper Gel that makes it ideal for

protection specialists who may be working in an indoor environment or where the chance to affect innocent bystanders is increased: What is the proper way to store pepper spray? Store your Pepper Spray in cool dry area away from heat, flame or strong light. Do not store it in an environment where the temperature may exceed 120 degrees F (50 degrees C) such as an enclosed vehicle. The Pepper Spray cartridge may leak from over pressurization and fail to function properly. Do not store unit in a cold environment under 32 degrees F (0 degrees C). This may cause depressurization and the loss of effective range. Can I use the pepper spray after it’s expired? Mace Defense Sprays have a shelf life of four years from the date of manufacture and each Mace unit is labeled with an expiration date. An expired unit is not likely to have the amount of pressurization needed to spray properly. Expired units should be disposed of in accordance with all local, state and federal regulations. Can I travel on an airplane with a Mace Pepper Spray? Under current FAA regulation pepper spray is permitted in checked baggage only. One 118 ml or 4 fl. oz. container of mace or pepper spray is permitted in checked baggage provided it is equipped with a safety mechanism to prevent accidental discharge. For additional information, please visit http://www.tsa.gov Is it legal to carry a Pepper Spray? Though it is legal to carry defense sprays in all 50 States, there are a number of cities and states with specific regulations pertaining to the purchase, possession and use of aerosol defense sprays—it is your responsibility to check with your local police department. What are the effects of pepper sprays and how long do they last? Upon direct contact with eyes, respiratory system and mucous membranes, the active ingredients in the pepper spray will cause an


By: Leon S. Adams

attackers eyes to involuntarily slam shut, will

prolonging the burning sensation, and, in order to not spread the compound to other parts of the body, victims should try to avoid touching affected areas. Capsaicin is not water soluble and even large volumes of water tend to not wash it off quickly. In general, victims are encouraged to blink vigorously in order to encourage tears, which will help flush the irritant from the eyes as well as using copious amounts of fresh clean water to help flush the eyes. Many departments and agencies suggest using baby shampoo to help remove the oily base of the resin, however, there is usually no significant difference in pain relief provided by its use. Time after exposure appears to be the best predictor for decrease in pain.

cause coughing when inhaled, and an intense burning sensation to the skin. Effects typically last approximately 45 minutes then begin to lessen. That is a huge amount of time to escape an assault with a principal. Unlike other defensive measures, Pepper Gel has a long lasting residual effect. There are few less lethal self-defense tools that have such a long lasting effect on a violent attacker like Pepper Spray does. The caveat is that attackers respond to the effects of Pepper Spray differently. This is where Pepper Gel has an advantage in that the Gel formula gives the Protection Specialist the ability to interrupt the vision of the attacker, even without the burning sensation caused by the Capsaicinoids. The gel is sticky and thick enough to obstruct the vision of an attacker but not so thick as to allow the attacker to easily remove the product and (like some foam products) use it against the protection specialist. Treatment of affected areas To avoid rubbing the spray into the skin,

There are also wipes manufactured for the express purpose of serving to decontaminate someone having received a dose of pepper spray, usually to assist with removing the oily resin containing the capsaicin. Some of the OC will remain in the respiratory system, but a recovery of vision and the coordination of the eyes can be expected within 7 to 15 minutes of decontamination and the use of copious amounts of fresh water.

Leon S. Adams is a Certified Executive Protection and Security Specialist serving the Atlanta, Georgia and surrounding areas. Mr. Adams has more than 22 years of professional security, law enforcement and military experience in the industry. He is a Certified Instructor in several self-defense implements, and currently conducts training courses for professional security practitioners both stateside and in the Caribbean. To order the recommend products visit: www. superiorsecurityconcepts.com/pepper-spraycourse.php


52

Feature Issue 26

Effective Networking For The Close Protection Specialist - Part Two Continuing on from last issue of the Circuit Magazine here are some other important factors in networking: Take any and every opportunity to speak in public. If you specialise in a specific sector of security and protection, offer to speak free of charge at any and all networking events, conferences and seminars. The more people see you, the better it is! Write articles whenever you can and get them published. Join societies, associations, organisations and focus groups to maximize your potential contacts and even consider leading such societies to develop your skill set. Keep your details up-to-date, alter your CV every time you take on a new position or add to your training portfolio. Make sure you broadcast changes in your status to others as well. Being smart and situationally aware enables achievement, as it puts you in the right frame of mind for action. This is the most optimistic and positive result you can achieve via networking. You must get to know the rules, customs and unwritten norms within different situations and within organizations. It’s about understanding

and being able to negotiate how things work in terms of networking, as well as finding your own genuine way of networking. For example, if it is a norm to get things done through developing relationships and it is not enough to purely put your head down and do a good job, it is critical to network. However, there may be times when networking doesn’t come naturally; you don’t feel authentic, you’re forcing a smile or you’re insecure about how to act and react. If this is the case you have to work at things to make you feel good by using your own skills, strengths and talents appropriately; you value self-development and progress; you are honest and inventive; you are creative and imaginative. You’ll work it out! The most successful networkers use their personal ‘brand’ when networking. Everyone is unique and has a ‘brand’ and your brand is your strengths, knowledge, skills, education, training and experience. These things bring credibility and gravitas when networking and it is what creates great first impressions. Good networkers usually stand out by differentiating themselves from the masses and you will find that others are always attracted to them; they are in demand. Be bold, be open, be approachable, be


By: Robin Barratt

knowledgeable and have something to say as well as concentrate on listening to others. Key points when networking: • Be Punctual. You don’t want to have to give excuses for why you are late, no matter how valid. Plus, being late causes stress and you don’t want that to ruin your positive mood. Plan to arrive at a networking event at least a few minutes before it starts to gather your thoughts and freshen up. • Be at Ease. If you get nervous before events - and many people do - consider relaxation or visualization, or you may prefer to play your favourite music track in the car on the way to get you in good spirits. If you are calm and positive and natural, others around you will feel the same. This gives you a solid foundation for making your first impression a good one. There’s also an element of a ‘just get on with it’ approach that can also alleviate nerves. • Present Yourself Appropriately. This is common sense but it is said that a picture is worth a thousand words, and so the ‘picture’ you first present says much about you to the person you are meeting. You may not be a model but you can still create a strong and positive first impression by looking after your clothes and having a clean and tidy appearance is appropriate for most business and social occasions, combined with a good haircut or shave, clean shoes and tidy yet comfortable clothes. You’ll be surprised how many people in the security industry don’t follow these simple rules! • Demonstrate Your Individuality. As we have said earlier, it is vitally important to separate yourself from the thousands of other licensed CPOs! Tell people about your USPs; what makes you stand out in a crowd. • Be Confident. Be aware of your body language; you want to come across as confident and self-assured. Stand tall, smile,

make eye contact, and use a firm handshake. One note of warning here, in some cultures and religions it is not appropriate to shake hands with someone of the opposite sex (eg some religious sects in the Middle East). On such occasions, waiting until the other person puts their hand out can be more advisable. Be aware of your nervous habits; control your nervous jitters or giddy laugh or mannerisms being in control will develop your confidence and put others at ease. • Be Positive. Your attitude shows through in everything you do. Project a positive attitude, even in the face of criticism or in the case of nervousness. Strive to learn from your meetings and to contribute appropriately, maintaining an upbeat manner and a smile. • Be Polite and Conscientious. A polite, attentive, inquisitive and courteous manner will help make a good first impression. So remember to be on your best behaviour! Also, don’t forget to turn off your mobile phone or at least put it on silent. It’s very distracting when another person’s phone rings, but it’s embarrassing when it’s your own! In a networking situation you need to give the person you are talking to your undivided attention. • Be Aware and Alert. To impress, you need to be aware and alert when mingling socially and professionally. You sell yourself as much by how you listen and react as by what you say and do. So watch, listen - not just to words but body language and facial expression - and try to empathize with the person in front of you. Sometimes you can make a terrific impression just by listening, keeping eye contact, nodding and saying just a few very incisive words. • Content v body language. So you’re on time, at ease, dressed appropriately,_ confident, positive and conscientious. You know how to get to the point, but you still can’t hit the bull’s eye when networking! Well, next, you need to look more closely at your


54

Feature Issue 26

Remember the old saying; “it’s not what you do, it’s the way that you do it” _that’s truly what gets results! But results don’t always happen overnight so persevere. presentation and interpersonal skills because it’s not always what you say but more likely how you say it that you’re missing. Prof. Albert Mehrabian (l97l) developed, from his research, a 7%—38%—55% rule for face— to—face conversations. Basically, what you say only matters 7% whilst 38% concerns your tone and 55% relates to your body language. Understanding non—verbal communication is, therefore, so important. And some people believe that it’s now actually only 5% of what you say or content that matters and the rest is delivery. So the tone and pitch of your voice, your eye contact, body language, facial expressions need to be examined. The easiest way? Video yourself speaking and really see how you look and sound, and ask others for feedback as well. Remember, before we even speak, we are already being judged on our appearance, body language, clothing and grooming and research shows that you have only a few seconds to make a good first impression, so it’s well worth rehearsing the whole thing from entering the doorto saying goodbye. If it’s been practised,you are more able to give it

your best shot.What you need to do is actually common sense but the thing is, through proper preparation, you can actually tailor your personal style for different occasions and make every first impression amazing! Next, you need to consider some powerful introductions that really explain what you do. Remember, first impressions can influence the future actions or inaction of others, so make sure you work hard at deciding how you are going to impress them. Once you have introduced yourself, what next? Pleasant conversation is nice, there’s nothing wrong with talking about the weather or your next vacation, but is this how you wanted to spend you precious networking time at this particular event? Probably not! You need to be skilled at channelling the conversation towards your goals, shifting the focus to mutually beneficial areas and shepherding the subject matter Here are some phrases that might make this happen, say... ‘I just heard you mention you were recruiting for...’ ‘Have you thought of...’


By: Robin Barratt

‘Can you tell me more about your current contract...’ ‘I was wondering when you are next recruiting...’ ‘I’d like to hear about the tender process...’ ‘I’m also working on a presentation about...’ Ask leading questions that prompt information based answers. Of course you want results and you have to be brave, sometimes even bold to ensure this happens, but ma|<e sure that you ask for things, don’t demand. For example by saying; ’Tell me who to call’... you are demanding! Instead perhaps say; ‘Do you know where I can get the telephone number for that organization?’ Much better! You may be talking to someone who is always being asked for information, referrals and connections so go cautiously. Also, remember that people can be picky about who they help for selfish or other reasons. So sometimes, people may not want to network with you. Therefore, consider phrases like; ‘I bet you get asked this a lot, can you forward me his email address...’ Or’ l hope you don’t mind me asking...’ Or’ i’m sure people contact you a lot in your position, but...’ maybe you’d like to meet them again to discuss things further. Think about saying:’ Do you have time to meet this week to discuss this further? Perhaps I could come to your office?’ Or‘ Do you think we could meet this week for a coffee?’ Or ‘Have you got time for a chat after the presentation?’ Then, don’t forget so say thanks without sounding patronizing. Try saying; ‘Thanks for the chat. It was really useful.’ Or ‘You’ve been really helpful.’ Or ‘l really appreciate all your input.’ It may be that you are asking for information they don’t have at hand. In that case you may want to say; ‘Would you mind if l call you this week to get that lead?’ Or ‘Could you text me the number later? Here’s my card.’ Or ‘lf you think of any suggestions, could you email me?’

On occasions, you may not be sure if what you are asking is inappropriate. For example, there’s a fine line between asking for information and pestering a very busy person. It’s also important to consider what you are asking for. In this case, honesty really is the best policy. Think about saying:‘ls it appropriate for me to ask for his mobile number?’ Or‘ I don’t want to do anything unethical but if you could arrange for me to meet him/her, that would be great.’ Or ‘ls it appropriate for you to forward me the report?’ It’s about experimenting; having a go is the key thing. We all see ourselves differently and we quite often misjudge how others see us. When you are new to networking, it’s hard to be yourself, to be clear about what you want from your network and to give in return all at once. However, just like driving a car, where you initially find it overwhelming to handle the gears, mirror and steering wheel all at the same time, it comes together in time! Determine which of your unique selling points will gain you more status and make sure you include that in your conversations. For example: ‘l speak fluent Arabic’, or ‘l studied at so-andso CP school’, or ‘l worked on a large project in Iraq with (name drop, people, company. . .)’ etc. The skill here is developing the virtue of subtlety - weaving these points into a conversation. One tip is to use cues and take notice of people’s body language. Stop if they are not interested. So, make sure that your unique selling points are not only interesting to the other person but that you sell them succinctly. No-one likes waffle; it’s boring and time wasting. A good ‘sell’ will entice the other person to ask you more. You may want to list a few of your talents in a row. Three points are usually enough though!


56

Feature Issue 26

Next you need to finish with fireworks. Leave your best point until last. People remember things that are outrageous, funny, sensual (related to smell, taste, touch, sound, and sight), and those connected to emotional experiences. In this respect, as people clamour for attention, you will be the one that’s remembered. Here are some examples; I won employer of the year for three consecutive years, or I managed the largest CP team in the country, or I made Team Leader at the age of just 23 etc. It’s all about gaining credibility, but be careful not to brag and don’t lie!

- Make it memorable and sincere. - Sell your personality. - Practice, write and rewrite your introduction. - Including a compelling ‘hook’ to engage the listener and prompt them to ask questions. - Be prepared to finish before the end of your mini-speech, if you see the listener’s eyes closing of scanning the room too much. - Practice your speech. - Know your introduction inside out. - End with an action request, such as asking for a business card or committing to sending an email.

Points To Remember: - Maintain appropriate eye contact. - Make your introduction sound effortless and natural. - Be passionate and enthusiastic. - Smile to show friendliness and enthusiasm. - Provide a strong, firm voice to express confidence.

Remember the old saying; “it’s not what you do, it’s the way that you do it” _that’s truly what gets results! But results don’t always happen overnight so persevere. Most importantly… “Never, never, never give up.” Sir Winston Churchill, British Prime Minister and Nobel Prize Winner.

This article was extracted from “Finding work as a Close Protection Specialist” written by Robin Barratt. Web: www.RobinBarrattPublishing.com



58

Opinion Issue 25

Top 10 client relationship-building tips Eric Konohia is the President of BPI Security. For more information visit www.BPISecurity.com

Clients are the lifeline of the Protective Services Industry. Without them there is no work.

H

ow you relate to them and how they feel about you and the services you provide will determine how much and how often the work will continue. Your relationship will determine if a client feels that you and your company are a necessity. Without a solid relationship they will see you from an “as needed� perspective. Whenever you feel ill you call your family doctor. Why, because of the relationship that has been built. Executive Protection can and should be viewed the same way by your clients. There is a formula that is used by Internet Marketers: T+C=$. That translates to Traffic + Conversion=Money. After understanding this formula, I realized that I personally have been using a version of this formula for years. Time + Conversion = $UCCE$$ Time: Those vital moments that you have in the private space with a client or potential

client. You have to make the best and optimize that TIME because it may not ever produce itself again. When you work a detail with or for that client you have to make sure that you and your team put their best foot forward. You want them to see the value and worth that they are investing in. You want them to translate what it is that you do as a viable entity in their future safety and success. The same goes when you meet with them for the first time to establish that ongoing relationship. You have only ONE time to make a FIRST impression and that time is critical. Conversion: The moment that you convince the client that they need you as an integral part of their continued success and safety. Conversion normally happens when you least expect it. Many clients reach conversion when they see you operate and not a word has been spoken. Professionalism is a conversion key. Professionalism comes in many ways,


By: Eric Konohia Front Right Seat far too many to list here but some examples are: being on time, appearance, work ethics, knowledge of and the ability to communicate the C.R.A.F.T. $UCCESS: The serpent wrapped around the staff is the symbol for money but it should also symbolize $UCCE$$. When you have used TIME wisely that results in CONVERSION, the $UCCE$$ will follow 1. Fully understand the industry: More importantly you should be able to articulate every sector of the craft and how a client can benefit from your expertise and your services. Be ready to defend the craft and differentiate the difference between your services and what they perceive from the media. Many times you will feel like you are on your heels deflecting shots in order to turn the tables around. That’s fine so long as you know that it could happen and you can intelligently deflect the misconceptions of a professional protection specialist.

01

2. Show your worth: In order to show your worth you have to prove that your services are desired. For the most part clients really do not understand what Executive Protection is and what it is NOT. You have to articulate to them that the vast array of services you provide can assist their company. If they think that you are just another security company you have not done your job nor will you convince them that your services are any different or needed.

02 03

3. Show your value: The services you provide have to be a fair exchange for what you want to be compensated. The days of the bottomless pit of cash ended with the economy tanking. How you price your services is a direct reflection of whether a client will engage in a service agreement with you and even more so how long that

agreement will last. Make sure you have an hourly and daily rate-pricing matrix. Whenever possible try to give the client the better option and explain to them that you are giving them a lower price point or lower option. If a customer [client] believes you have given them a reduced option it adds worth and value to your relationship. For instance if you offer your executive protection services at $65 per hour and you also have a $700 daily rate and the client wants to engage in a long-term 24 hour coverage, this is where you show value. You explain to them that if you billed them at $65 per hour each twelve [12] hour shift would total $780 resulting in $1,560 per day billable to them. Then you tell them that you choose to save them money by billing at the daily rate of $700 per shift which totals $1,400 per day resulting in a saving of $160 per day. That may not seem much, however that is a $57,600 savings for a year of 24/7 coverage.

Be ready to defend the craft and differentiate the difference between your services and what they perceive from the media.

04

4. Understand the market value of the services you provide: Daily and hourly rates in non- permissive environments are NOT interchangeable in the United States. Let me say it another way, a rate based upon what you read or heard is paid in a non-


60

Opinion Issue 25

permissive environment is NOT applicable to any detail in the United States. Working in any high crime city in CONUS does not equate to a non-permissive environment by definition therefore the rates do not apply. It could be a level of risk in this environment in its own way, but it is not the same as working in Afghanistan where the threat is targeted against everyone on the detail. Moreover, a verified threat to a principal does NOT mean that your daily or hourly rate should be higher.

05

5. Establish a good point of contact: The person you protect may not be the person you interact with on a regular basis nor may he/she want to be. If you don’t establish a relationship with someone within the entity who has the ear of the principal you can risk losing the client as a whole. Someone within his or her company has to be the mouth piece or your cheerleader for a continued and sustained relationship.

[Principal] from “X” hours to “Y” hours and the detail ends when you take the principal back to his hotel. When you drop him off at the hotel at the end of the night he asks for you to provide more services on the next day. You need to contact the client point of contact immediately to rectify the request. The principal [no contractual relationship] makes a request that the client [contractual agreement] must authorize or deny. If you misplace the principal’s position in your agreement and perform the services, you could wind up not being paid because the client had not preapproved the extra request.

7. Understand the client and principal psychology and culture: Clients have a psychology of their own. First rule is that most of them have not gotten where they are if they were not smart. Understand that and respect it. Once you grasp that you can understand how they think and predetermine your approach in the relationship. For instance: Most corporate clients do NOT 6. Know the difference between a client and like security personnel around them. In fact, a principal: In short, the entity that contracts the majority of them have security forced your services and pays the bill is the client. upon them due to their key corporate clause The principal is the person that receives the in their insurance policy. Knowing this actual protection services from you and/or ahead of time allows you to inform your team your team. Many times a client will hire you that spacing is critical whenever possible. to provide services for a person that is not Client culture is another critical aspect that affiliated directly with their company. An is often overlooked. This is not limited to the event planner may contract your services to culture of their origin but also understanding provide protection for a VIP that is attending the culture of the client base. Corporate their event. You will then need to fully clients and clients from the entertainment obtain the [client] expectations of the service industry often have different needs and to be performed. Ascertain if the client has expectations. If you have primarily worked communicated their expectations of you with the corporate and dignitary clients and the principal whom you are protecting. This transition to the entertainment side of the is extremely important because a principal industry you will find that the culture may be may ask you to perform or do something un-expectantly different. outside the scope of work you have agreed upon with the client. Example: You have 8. Assign the right specialists for the agreed with a XYZ Event planner [client] job: Now that you [the service provider] to provide protection services for Mr. Jones understand the client psychology and client

06

07


By: Eric Konohia Front Right Seat

Most corporate clients do NOT like security personnel around them. In fact, the majority of them have security forced upon them due to their key corporate clause in their insurance policy. culture you have to make sure you assign the correct people for the detail. Every highly trained specialist does not equate to being equipped for every client or detail. Some of the best trained operators and specialists do not understand the sensitivities of varying client cultures and psychologies. Placing the wrong people in front of a client or principal can ruin your relationship quickly. This often occurs after you have personally worked for the client and have been with the principal. A natural comfort level is established after regular interaction. There may come a time when you or another detail member cannot personally work the principal and have to find a suitable replacement. You must consider everything that you have developed over time and educate your replacement of the client’s expectations. Failure to do so could be detrimental to your relationship. Remember, your principal/client has been trained and accustomed to a particular way of service that you have delivered and they expect that service each and every time.

08

are concerned about your relationship with the client FIRST. They already know that the invoice is coming, but a follow-up showing that you want to make sure they are satisfied goes a very long way. 10. Relevancy is the KEY: You always want to make sure that you have your client’s best interest constantly in mind. You should never wait to hear from them if any current event occurs that could affect them or their business. This is a proactive way of sustaining your relationship as well as affirming your worth and value to them. If your client calls you about a trend before you call them, YOU HAVE FAILED THEM. When politicianswere getting glitter bombed and flour bombed it was not limited to just candidates running for office. Shortly after it surfaced on the campaign, Kim Kardashian was attacked in the same way. Trends are not limited to one client sector. Attackers often pick up ideas from other attacks.

10

These are the ten [10] philosophical 9. Follow-up your service detail with an approaches that I have used for many years. email or phone call: I highly recommend They are a summation of years of logical that you follow-up each detail with an conclusions based on concrete principles I email or telephone call before you submit believed in when engaging a client. When an invoice for payment. The follow-up is adhered to and strictly implemented you will to see if they were satisfied with the service find that a client relationship is far greater provided and if there were any comments or than jumping from client to the next and criticisms from the principal. This shows you waiting on the phone call in between each.

09


62

Regular Issue 25

Working Girl Now that winter is here I am hoping that you have all had a good prosperous summer. Having had a few newbies on various CP and Surveillance teams that we have put out I have come to realise that some peope are just not aware of NDA’s (non disclosure agreements) and T&Cs (terms and conditions of employment). Whenever I employ someone on a self employed basis they have to sign both of the above. The NDA states you will not disclose any details of the job you are on to anyone and that includes other operators not on the job and especially not the newspapers or media of any form.

Jacquie Davis Optimal Risk

Terms and conditions state that you will not attempt to steal the client or “card them” which is the usual term. Carding clients is one of the biggest No-No’s in this or any industry. The moment you attempt to steal a client your name will go round like wildfire as someone who is not to be trusted, no matter how good an operator you are. I recently had a client inform me that one of the operators on the CP job which was running had offered him his business card, the client replied you work for Jacquie so why


By: Jacquie Davis www.optimalrisk.com

would I want your details? That is a good and faithful client who I have worked with for years. On returning to the UK from this job I wiped the operators name from the database, never to be used or trusted again. I know a couple of security agency’s that are legally going after people who have stolen clients and so they should. I think operators need to remember that before you are placed on a job that a lot of hard work has gone into obtaining that client.

“I will take the client and then pay the guys on the team more”.

As history tells us this does not always Some operators have the attitude of - “I will happen, look up the Harrods bombing take the client and then pay the guys on and the Oxford Street bomb to name just a the team more”, what they don’t take into couple to see what our enemies have carried consideration is the overheads of running an out in the past and what they are more than office the insurance and other costs that are capable of doing in the future. involved. For those of you that work in stores and When you get the call to come on a tasking town centers try not to be complacent by and if you are available and have accepted thinking “it won’t happen to us.” It can the given terms of the job it is you who has happen anywhere at any given time, aside made that decision to do the job and no one from the events just mentioned Christmas has twisted your arm or begged you. You brings with it the heightened risks of should honor the terms and conditions that pickpockets and store robberies to contend have been laid out and agreed, if you are not with. If you see a CP team turn up at your happy you can raise your concerns but trying mall or store please offer your assistance and to steal the client is in no way acceptable! not hindrance, it really is much appreciated. It is amazing how small the CP circuit is and most of us oldies have known each other for many years, way before licensing came in and when people worked on word of mouth and recommendations.

For those of you out on Surveillance teams my deepest thoughts go out as you sit in cold cars or crop in snow covered fields, warm clothing layer upon layer is always the best way to stay warm. Thermos flask, dodgy ham sandwiches and the all important pee bottle or ice cream carton are standard in my vehicle along with a sleeping bag and blankets. Who ever said our job was glamorous clearly has never done it.

With heightened security alerts at the moment I hope everyone is working hard to keep your clients and the country safe. Christmas is a vulnerable time for the thousands of shoppers that throng through the malls and town centers blissfully Until next time unaware, all expecting to return home safely. Stay safe


64

To place a classified lineage or box advertisement telephone our sales team on: +44 (0) 191 6450 865

Classifieds United Kingdom 3D Security Ltd Taunton, Somerset, TA1 1TG Based in Taunton 3D Security provides security services for a wide range of clients. Whether you need a security guard in Somerset, event security in Leeds or Close Protection in London we will provide a solution for your needs. T: +44 (0)1823 253 001 W - www.3dsecurity.org E - enquiries@3dsecurity.org.uk A.B.I. Solutions A.B.I Solutions is a dynamic, forward thinking company, specialising in surveillance, security and investigations with local, national and internationalexperience. A.B.I provides a wide range of services to the corporate sector and individuals alike. W - www.abisolutions.co.uk Amanda Campbell A highly motivated and experienced female operative both CP and Surveillence training T – 07596542249 W - www.amandacampbell.org.uk E - ac@amandacampbell.org.uk Ambassador Security Management ASM MK Lions Arena, Grafton Court, Snowden Drive, Winterhill, Milton Keynes, MK6 1AJ, GBR. After successfully gaining ACS (Door Supervision and Manned Guarding) along with ISO 9000, we here at ASM have a dedicated management team with hundreds of years combined experience in the security industry. W: www.asmsecurity.co.uk E: scott@asmsecurity.com T: 08458335750 Ark Personal and Asset Protection Ark, 2b Crow Lane, Rochester, Kent, ME11RF, GBR A small, efficient, highly descrete company employing ex special forces and detectives for all civil and corporate covert needs. E: Office@arkprotect.com T: +0044 01634 845526 Argus Europe County Durham Argus Europe has been providing specialist training for high-net worth clients and their families for close to 20 years, worldwide. Argus Europe now offer accredited training for CPO’s, Surveillance Operators and Private detectives. Argus Europe is an operational company working globally with an extensive variety of contracts. W: www.arguseurope.co.uk T: +44 (0) 8456 123 843 Atlantian Business Solutions Group Rutland, LE15 6SD, GBR Atlantian Business Solutions has been designed to help both individuals and New Companies build for the future as well as support others with training needs. T: 07725970954 W: www.atlantianbsgroup.com E: info@atlantianbsgroup.com Briareus Security Our aim is to give a complete, discreet and professional service to all of our clients, be they large corporations, small businesses, local authorities or private individuals, all tailored to meet their individual needs. W: www.briareussecurity.com E: info@briareussecurity.com Mark Corder - Chief Executive of Carmdale Ltd Suite 3 219 Bow Road London E3 2SJ Mark is a former Senior Police Officer specialising in counter-terrorism; firearms; public order; training and also physical, Critical National Infrastructure and nuclear security, having had responsibility for the security of the UK’s nuclear deterrent. A former Head of Operations, Operational Support and Training, Mark has been involved in a number large-scale incidents (including 7/7) and has also worked at the Office for Security and Counter Terrorism (OSCT) at the Home Office as part of a review

into Critical National Infrastructure security. Mark has an MBA via the OU. E: mark.corder@carmdale.co.uk T: +44 (0)844 995 9900 W: www.carmdale.co.uk Alastair Christie Advice on site security, perimeter fencing, lighting, CCTV and manning requirements. Monitor and advise on guard force setting up site procedures and guard SOP’s. T : +44 (0)7736 328112 E : ally.c9496@yahoo.co.uk Control Risk Management Solutions - CRMS - Ireland Executive Close Protection Operations & Training (B Tec Level 3 Diploma Edexcel) Threat & Risk Assessments, Consultancy Services. W: www.crmsinternational.com E: martin@crmsinternational.com Crest Security & Surveillance Ltd 51 The Crest, West Heath, Birmingham, West Mids, B31 3QA, GBR Highly experienced Security Consultant with a proven record of accomplishment in the field of protective security. Skilled in all phases of risk assessment, operational planning, logistical organisation, implementation of security measures, security team leadership, project coordination, and delivery of security advice to a high profile clientele. E: info@stephencahill.co.uk T: 447977071427 CSI Protection Ltd International, GBR A well established security consultant and personal protection operative providing high or low Key protection to high risk and prestigious clientele. Specialising in the maritime industry as a consultant for private vessel protection on super yachts world wide. W: www.csi-protection.co.uk E: gary@csi-protection.co.uk Custodia Custodia is an independent client focused Specialist Security & Risk Management Company, specialising in Risk consultancy and Security project management. Providing a comprehensive portfolio of Risk mitigation solutions to assist Businesses and individuals to plan for, manage and mitigate risk. T: 01432 277693 W: www.custodia.co.uk DF Risk Management Solutions DF Risk Management Solutions N.I. is a modern, professional risk management company, with a diverse range of global strategic experiences and a team of executives who possess dynamic but complementary backgrounds. T: +44 (0)7837642686 +44 (0)7758743918 W: www.dfriskmanagementsolutionsni.com Executive Protection Officer Worldwide CP services W: www.executiveprotectionofficer.com First Class Executive Security Nottingham, UK, Nottingham based, full-service company specializing in Bodyguards and Security Consulting services. Extensive experience in VIP security, also caters for public and private sectors. W: www.firstclasssecurity.co.uk T: 0115 9266466 G6 Global G6 are specialists in all types of radio, telephony and satellite communications for both voice and data with particular emphasis on covert communications installations in both vehicles and fixed locations. In addition, our range of personal covert radios and bespoke accessories is extensive. W: info@g6-global.com T: +44 (0)1454 610050 Gordon Russell Highly trained frontline Close Protection Operatives

available for UK and International contracts. Our experienced CPO’s can offer bespoke packages to meet all clients needs, including a variety of language skills. All SIA licenced, BBA member E: Bodyguard-cpo@Email.cz T: +44 (0)7917 281 004 Gareth Evans - CPO, MSO Reliable dedicated hard-working security professional, with outstanding communication skills. Strategic approach to problem solving combined with exceptional interpersonal skills, quick to grasp new concepts and information. Highly motivated, results-driven and thrives under pressure. Strong leadership and management skills with proven experience committed to continuous personal and professional development. E : evansgareth1979@yahoo.co.uk T : +44 (0)7900058603 James Izett All close protection task undertaken, including training tasks. Medic (Registered with the HPCSA, Registered FAAW instructor and Assessor E : J.Izett@gmail.com T : +971 (0)505 574 350 Janice Gurney Proficient and diligent Security Professional gaining extensive knowledge and experience within the security sector. Proactive individual who has a logical, flexible and conscientious approach to all challenges undertaken, ability to work as a member of a team or as an individual willing to work anywhere. T : +44 (0)7885 793061 E : janice382006@gmail.com International Centre of Special Training International Centre of Special Training is an international training and security company based in the United Kingdom. Its priority objective is to provide services to the highest level. W: www.icost-team.com T: +44 796 736 55 65 IPSS Security Northfield, Aberdeen, AB16 7EX Security and protection services - UK and overseas. BBA Member. T: + 44 (0) 1224 69455 W: www.ippssecurity.co.uk ISS Training Ltd Riverside Cottages, Nidd Walk, Pateley Bridge, Harrogate, HG3 5NA ISS Training Limited are providers of specialist covert surveillance training courses and publications to the security and investigative industries, enforcement agencies and specialist military units. Formed in 1990, we are the longest established surveillance training company in the United Kingdom. Our credibility and reputation is widespread and we offer nationally recognised qualifications. BBA Member. T: + 44 (0) 1423 712265 W: www.intelsecurity.co.uk Jason Morris Security Hertfordshire, UK Providing a wide range of Door supervision/security for V.I.P and prestige venues, Concerts, Functions, Corporate and Personal Security, Weddings, Private Parties, Gala Dinners, Business Awards & School Proms, Close Protection and Body Guarding Static Guarding and Stewards. T: 01462 478900 W: www.jasonmorrissecurity.co.uk E: agosselin@jasonmorrissecurity.co.uk John Featherstone Security professional with operational experience gained in a variety of theatres. Main specialities close protection and surveillance. T: 24hrs : +44 (0)7702 740722 E: john@johnfeatherstone.co.uk W: www.johnfeatherstone.co.uk


K9 Support Services Ltd K9 Support Services UK Ltd is a supplier of specialist drugs and explosives dog/ handler detection service (which includes arms & ammunition) to individuals, businesses, and the public sector. T: 0845 643 6393 E: info@k9support.org.uk Logas International Tyne & Wear, SR1, GBR Front line SIA, International CPO. Private Investigation and Surveillance operator. E: wscarr@logasinternational.com MLK Security and Protection Services Swindon, UK Close Protection Officer and Door Supervisor E: mattleekane@hotmail.com T: 07917654978 LJE Security Services North Yorkshire, HG1, GBR Close Protection, Residential Security, Asset Protection, VIP red carpet Security and Private Investigation. E: leanneedmondson@yahoo.co.uk One Events Grantham One Events offers you a stress free solution in the organisation, putting together and running of an event. Thisis accomplished by having a group of specialised companies from different industries working together for a more complete service for you. TEL: 0870 974 6779 W: www.oneevents.info Paul Lovatt – CPO After serving 15 year in the Army a move to the Security Industry was a natural step, during the last 10 years I have worked in almost every role in the industry from Door Supervisor and loss prevention to Operations Manager and Director. I have been responsible for the creation and implementation of highly successful crime reduction schemes across Yorkshire working closely with other agencies in the areas of responsibility. Currently I am responsible for the overall running of large events security teams from stewards to Close Protection Officers. Operational planning, contingency planning and flexibility are I feel among my key strengths. E : paul@deltasecurity-eventmanagement.co.uk T : +44 (0)7506726336 Paul Tyler – VIP Protection & Concierge Specialist in discreet personal protection & surveillance. A good current working knowledge of London & its challenges gained through ongoing high risk security operations. Experienced in dealing with high net worth clients with all matters security & concierge striving go the extra mile to exceed expectations through thorough planning & interaction with all involved parties. A strong communicator with a smart appearance who remains synonymous with the principals lifestyle, whilst discretely ensuring a safe environment is maintained at all times, physically capable of adopting a higher profile when required to do so. Demonstrates sound judgement and capability to operate with great levels of autonomy. Exceptional interpersonal skills with the ability to understand, interact & connect with a diverse range of people. E : paul@apparitio.co.uk T : +44 (0)7552515604 W : www.apparitio.co.uk Plymouth Close Protection Highly versatile, physically fit and accomplished security professional with cumulative experience in the areas of security management, close protection, crisis management, risk assessment, emergency management, asset protection and security training. E : chris@plymouthcp.co.uk W : www.plymouthcp.co.uk T : +44 (0)1752 500807 PPSS Group Body armour and stab vests provide a functional solution to individuals who require extra protection in their chosen vocation. All PPSS (formerly ASEO) body armour and stab vests are certified by the UK’s Home Office (HOSDB) and offer unrivalled protection from blunt trauma caused by a punch, blow or kick. Based on our professional frontline experience and extensive research we can confirm that an impact based assault is a more likely event than an attack involving an edged weapon or firearm. T: +44 (0) 845 5193 953 F: +44 (0) 1765 603 512 E: info@ppss-group.com W: www.ppss-group.com Presence Security Presence Security (“ PS ”) is a bespoke security company providing protection for private individuals and VIPs, as well as security services for businesses and organizations.

T: 0800 002 9734 E: info@presencesecurity.co.uk Prestige Risks LTD 27 Old Gloucester Street, London, WC1N, 3AX, GBR. Close Protection Secure Chauffeurs Surveillance Residential Security Executive Protection Security Guards Asset Protection T : +44 (0)207 5588182 E : info@prestigerisks.com W : www.prestigerisks.com Prometheus Medical Ltd Prometheus deliver unrivalled bespoke emergency medical support in the form of specialist equipment, training, strategic advice and deployed clinical care. T: (+44) 1568 613942 W: www.prometheusmedical.co.uk Prosec Consultancy Ltd 10 Oakfield business park Westbury, BA13 4WF. Prosec Consultancy Limited are dedicated in providing a professional service, which covers a whole range of security services throughout the security industry. T: 01373 228055 W: www.prosec-ltd.co E: info@prosec-ltd.com ProTouch Security ProTouch Security is one of the UK’s key providers of event safety, event security, crowd management, door supervisors, stewards, event management and health and safety. T: 01724 279 522 W: www.protouchsecurity.co.uk Python Security and Protection Ltd Providing Close Protection Officers and Door Supervisors for Events and Venue Security. E : mattleekane@hotmail.com Radoslav Savkov - CPO / Security Consultant Oxford - United Kingdom Bio:
I would introduce myself as a high calibre Security professional with strong customer oriented skills and managerial experience in the Security Industry, interested in a challenging position, which would fully utilize competences gained and provides opportunities for professional and personal development. With 15 + years of international experience in the sector at all levels and a military background (National Service) as well as a practical Close Protection experience in an executive environment, corporate intelligence and investigations. As a Security professional, I never consider my training and development as a complete, therefore I always look to update further my skills and knowledge. In personal plan I am very loyal, discreet , independent and willing to embrace challenges. E: r.savkov@gmail.com T: +44 (0)7886591525 RSM Security UK Ltd London, UK RSM Security UK Ltd offers the experience and expertise necessary to provide security personnel of the highest calibre when you need them. T: 07850091979 or 07792948523 W: www.rsmsecurity.co.uk E: info@rsmsecurity.co.uk RWSSI Rob W is a professional security consultant with world wide experience and capabilities in Security, Surveillance and Investigation; I can support you to overcome any problems and enable you to achieve your goals E: rob@rwssi.co.uk T: +44 (0)7818 220985 SDS Solutions SDS solutions provide our clients with protective solutions that are second to none, our consultants will discuss every aspect of the problems that you are facing that dictate the need for a protective solution, we promise our clients a tailor made service to meet individual requirements. Whether based in the UK or abroad our protective service T: 01453 887815 E: info@sds-solutions.org Shadow Close Protection A leading company specializing in Executive Protection as a professional sector, with participation in high and low risk missions, providing global security solutions and consultancy to individuals, corporations and national agencies worldwide. W: www.shadowcp.gr E: info@shadowcp.gr T: + 30 6948539664 Shaun West United Kingdom

SIA licensed, Highly Experienced Frontline CPO. Ronin SA trained. Providing security for both corporate and hostile environments. E: sw@shaunwest.co.uk T: +44 (0)7830 109 601 W: www.shaunwest.co.uk Mark Claydon-Smith – CP Team Leader and Medic I have spent 13 years in the Royal Navy Culminating in the rank of SNCO Petty Officer. In 2004 I started my security career and have worked in Hostile environments. I have held several positions including Operations Manager, Team Leader and Rig Site Manager. I have worked in Kurdistan, Afghanistan and Iraq as well as the UK and Europe. E : mark@claydon-smith.com T : +964 (0)7815 970433 Philip Shearman MSyl – CPO, Risk Manager A professionally Qualified Close Protection and Surveillance Operator and Team Leader with over twenty two years of experience gained in the Military Police, the last fifteen of which were spent with the Military Police Close Protection Unit, working in various hostile countries throughout the world. Since leaving the Army in Nov 06 I have worked in the Private Security sector. I have gained valuable experience in demanding and challenging operational environments, where I have proved to be a self motivated and resourceful individual, performing well under pressure, communicating effectively at all levels whilst exercising tact, diplomacy and integrity. E : benshearman10@hotmail.com T : +44 (0)7930 277586 Spotllght Protection Services Essex based business which provides a broad and growing range of security services to businesses and organisations large and small. T: 07870560208 E: info@spotlightprotectionservices.co.uk W: www.spotlightprotectionservices.co.uk VIPA Tactical Training A specialist training academy dealing with four specific areas of combat: VIPA Civilian Self Protection Program, VIPA Close Protection Combat System, VIPA Police Defence Tactics and VIPA Military Close Quarter Combat. BBA Member. W: www.VIPAtacticaltraining.com Yoji Security We established Yoji Security in response to our perception of declining professional standards across the security industry. We strive to provide first class customer service in everything we do, drawing on our extensive experience in the fields of special operations, intelligence, counter terrorism and close protection. T : +44 7903231076 E : enquries@yojisecurity.com Europe & Africa International Security Academy P.O.Box 5833, Herzeliya, 46000, ISRAEL. Our graduates are more recognized, respected and sought after by Distinguish Protection service “consumers” and by most of the “Providers” of Protection services worldwide. Organisers of the 2008 International Summit of Protection Officers. BBA Member. T: + 972 9 950 0969 W: www.SecurityAcademy.org.il Javier Galan Spain Security specialist available for operations around the world. E: oejju@hotmail.com T: 34.637080771 Military Grade Encryption Phones PO Box 52310, Limassol, CYPRUS Built-in encryption software which converts your voice to encrypted data using a constantly changing mathematical formula. It uses a dual layered RSA/AES combination and a changing session key which modifies the encryption algorithm every second. € 1,398.00 + VAT. All prices include new Nokia N73 phone. BBA Member. T: + 357 7777 7276 W: www.protechcy.com/new TPT Firearms Training Bratislava , Slovakia and Rome , Italy We know from our extensive experience within the industry that it can be daunting when initially carrying a firearm and being responsible for protecting a clients life, but learning the proper techniques and having the ability to understand the weapon will make the job a lot easier and more enjoyable. Hopefully you will never have to use the weapons you carry, but should this prove necessary you will be confident and knowledgeable enough to handle the situation professionally and effectively. T : +44 (0) 7734101910 E : info@tacticalprotectionteam.co.uk W : www.tacticalprotectionteam.co.uk


66

To place a classified lineage or box advertisement telephone our sales team on: +44 (0) 191 6450 865

t Security Concierge Group SCG Special Projects Ltd, Avenida, Bartolome Vicente Ramon No 10, B16, Ibiza, 07800, ESP Security Concierge Group is a privately owned and fully independent provider of exceptional security services to an interesting and varied range of clients. T: 00 34 600 665 275 W: www.securityconciergegroup.com E: joe.buckle@securityconciergegroup.com Americas Bodyguard Careers Bodyguard Careers is an informational site with the purpose of providing bodyguards with all the information and tools necessary to succeed in the Close Protection Industry Info@BodyguardCareers.com www.BodyguardCareers.com Canadian Use of Force Systems 7975 Yonge St. # 7124, Innisfil, ON, L9S 1L0, CANADA A professional Use of Force and Defensive. Tactics organization teaching a full range of controlled response options for Self-Protection and Use of Force considerations in public and professional environments. BBA Associate Member. T: + 1 705 456 4333 W: www.canadianuseofforce.com Contact Front Photography Contact Front Photography is the world’s 1st photography studio dedicated to the Close Protection Professional. Stop putting generic or pirated photos on your website; instead commission custom shots to best represent you or your agency. T: +1 (612) 369-6134 E: Info@ContractFrontPhotography.com W: www.ContactFrontPhotography.com Decisiones Estratégicas Buenos Aires – Argentina Executive protection specialists we have experienced in all Latin America, for multinationals companies, also providing support in project throughout Latin America to consulting first the US. and UK. We have a team of specialists and psychologists in assistance and crisis negotiation. T: +54(911) 6415 1941 E: jbenitez@d–estrategicas.com W: www.d–estrategicas.com Detective Lacerda P.O.BOX 25996, São Paulo, 05513-970, BRAZIL Providing the full range of security and investigation services throughout Latin America. BBA Member. T: + 55 (11) 3452 4388 W: www.detectivelacerda.cjb.net Giovanni Rossi South Africa Doctorates in Criminology, Vessel Security Officer, ASP Instructor, ISSPC Member, BBA Member, IAPPA Member, American Bodyguard and Protection Instructors Association - Lifetime Member E: rossi1@mweb.co.za T: +2783 415 9205 USA Global Bear Protection PO Box 11488, Jackson, Wyoming, 83002, USA Provision of British and US Ex Special forces security/ medical specialists. T: 307 413 3619 W: www.globalbearprotection.com E: bear@globalbearprotection.com Icon Services Corporation 1043 Grand Ave. #312, St. Paul, MN 55105, USA A full service security and investigative agency specializing in providing high-level security and bodyguards to international celebrities, public figures and corporations. Licensed, bonded and insured, our diverse roster of clients reads as a virtual who’s who in the corporate, motion picture, fashion and recording industry. Entering into our 10th year, Icon has been the hand picked choice to provide Executive Protection to everyone from Superintendents to Supermodels. BBA Member. T: + 1 651 695 8778 W: www.Industry-Icon.com Imperial Protective Service, LLC 15849 N. 71st Street, Suite 100, Scottsdale ,

Arizona, 85254, USA Imperial Protective Service’ (IPS) is a security consulting and services firm founded in 1978. IPS provides both national and international corporate, executive and celebrity protective services. BBA Member. T: + 1 480 281 1588 W: www.executiveprotect.com Panther Protection Services 3695F Cascade Road, Suite 2207, Atlanta, GA 30331 Panther Protection Services is a full service protection agency offering such services as threat assessment, executive protection, self-defense training, firearms instruction, and high risk tactical protection. Our executive protection specialists have over 75 years of experience. Panther can handle your protection needs whether around the corner or around the world. Member: BBA and NABA T: (404) 349-9117 W: www.pantherprotectionservices.com Rouven Rohler - Security Consultant / HSE liaison Romania I am a very fit and mentally robust Security Specialist with quality experience gained in the security (Military, Maritime and Commercial Operational Security (Oil& Gas). I have improved the effectiveness of protection teams and significantly enhanced clients’ awareness. My career commenced in the Australian Army, which included hostile environment deployments to Iraq and the Solomon Islands and I have since been operating on various contracts throughout Afghanistan and Iraq. I am now looking to make a continued significant contribution within similar High Risk contracts. E: rouven@y7mail.com T: +40 (0)746 642 739 SILVER STAR PROTECTION Executive protection, site and event security with global experience. Serving southern Minnesota with integrity and professionalism. Former USSS, ICON Alumni. available for domestic and international travel. Robert E. Jones Manager/CEO W: www.silver-star-protection.com E: rejones@silver-star-protection.com TSICS (T6) Miami, Florida, USA TSICS (T6) provides the following services in Central America: Executive Protection, Individual Bodyguard, Close Protection Training, Corporate Invest. W: www.security-professionals.org/members/saldrix E: tsics.t6@gmail.com T: +502 6645 6822 Tony Scotti’s Vehicle Dynamics Institute 1162 St. Georges Ave, Suite 277 , Avenel, NJ 07001, USA The first name in advanced driver training, offering our highly acclaimed Protective/Evasive Driving Programs. Designed specifically for today’s executive chauffeurs, executive protection professionals and others who are responsible for providing safe and secure transportation services. BBA Member. T: + 1 732 738 5221 W: www.vehicledynamics.net Vindex Personal Protection & Investigation Inc. 497 Hooksett Rd #365 Manchester NH 03104 603.289.3161 / Full service Private Investigations & Executive Protection. 10 years combined Law Enforcement, Private security, close protection work, & security contracting. NY Mayors, U.S. President’s, NFL owners, and VIP’s are some of the protection work I’ve gained experience with. ICON alumni, NABA member. T: + 1 732 738 5221 E: vindexinc@aol.com W: www.vindexinc.com Asia Pacific Asia Protective Group Ltd Asia Protective Group (APG) is a Hong Kong based risk management company, specializing in executive protection, overseas travel security and security consultancy services. APG has an extensive network of security specialists operating throughout the Asia Pacific region. W: www.asia-pg.com E: jim@asia-pg.com E: yvonne@asia-pg.com

The Team: Editor Managing Editor International Editor Art Direction

Shaun West Jon Moss Elijah Shaw Peter Falkous

Contributors: Mark “Six” James Robin Barratt Raffaele Di Giorgio Dr Liz Royle Cath Kerr Mark Roche EPS Kate Owen Jacquie Davis

Shaun West Jon Moss Elijah Shaw Orlando Wilson Rob Coulthard Rich Aitch Dr Amy Burrell Dale L. June Anna Cooperwhite

Our Sincere Thanks to all those that continue to contribute their wisdom and experience for the enjoyment of others The Circuit is compiled, edited and published in the UK and US quarterly. W: www.circuit-magazine.com E: info@circuit-magazine.com T: +44 845 519 2538

DISCLAIMER While every care has been taken to ensure that the information contained in this magazine is both accurate and up-to-date, The Circuit accepts no liability in any part for loss or damage incurred by reliance on information contained in this magazine through omissions, errors, howsoever caused. ©COPYRIGHT Copyright remains with the authors and contributors at all times. No part of this publication can be copied or reproduced in any way whatsoever without permission from the publisher AND the author / contributor.


Circuit



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.