News
19
Circuit
Reviews
www.circuit-magazine.com
Opinion
Intel
Exclusives
The Magazine for Security Professionals
s t e r c e S f o r Keepe o p x E r o r r e T r e Count ia d e M l ia c o S
Behavioural Analysis Could you spot a Suicide attacker?
Editorial
EDITORIAL Welcome back to another edition of the Circuit Magazine that is once again bursting with information and stories from around the globe from our much-loved profession. Spring is here and its about time, the weather here in the UK has left a little something to be desired in recent weeks and I for one am looking forward to the summer sun!
editorial, trust me Jon’s coffee making skills went down a storm last year!
April sees once again this year’s Counter Terror Expo at London Olympia. It is always a fantastic event, I have been to many trade shows over the years but this one has always been my personal favorite. It gives a great opportunity to network with others in the industry and you get to see what is new out there allowing you to keep your fingers on the pulse with new trends. Once again the Circuit team will be exhibiting at the event, you can catch up with us at stand number M46.
It has been completely redesigned with a new, modern and fresh look. It holds more information and is a lot easier to navigate; we absolutely love it and hope that you do too! If you do like us please follow us via Facebook and Twitter to keep up-to-date with the latest happenings!
Top event tip - prices are extortionate for food and beverages once inside, come see us as we will have our fantastic purchase of a coffee machine which we got for last years event. We will shout you a freebie if you quote this
Spring has arrived! The sun is shining, the birds are chirping and The Circuit is moving full steam ahead. As in ancient times, spring brings about feelings of renewal and rebirth, new growth and change. Those descriptors also do well to describe the magazine and the North American & British Bodyguard Associations as a whole. We are constantly striving to remain new and fresh. We want contemporary ideas, and want the aim of both the magazine and the organization to uplift the industry and move it forward in a positive direction. While deliberate, the process is also an organic one, as the content and information contained in these pages are derived by the same people that both read the magazine, and do the work. The Circuit is not a “Fanzine”, meaning we don’t sit around on the weekends after our unrelated day jobs end and talk about how cool the close protection industry is, instead we actively work the craft and share experiences, best practices and even a humorous anecdote or two. We also try and do all this without a chip on our shoulder. Yes, we are extremely proud about this four-color, glossy, labor of love you are holding in your hands. Yes, on occasion, the editorial and production staff have taken a moment to give each other a high five or virtual “fist bump” over our ability to successfully deliver the magazines content to our readers and subscribers on a consistent basis
For all those whom have not yet checked out The Circuit Magazines new website please do visit - www.circuitmagazine.com
Finally we always get lots of praise for the magazine as it is created with such a small team, however it just wouldn’t be possible without your contributions of articles and stories so I would like to say a personal thanks! Please keep them coming in and long live The Circuit, the magazine for Security Professionals! Shaun West
for many years now. With that said, we are also cognizant enough to take constructive criticism and acknowledge that there is always room for improvement. We are thankful for the readers that take the time to post to the message boards or social media that they are looking forward to an upcoming issue, or start a dialogue about articles they really liked (or might have disagreed with in some way). Interestingly enough, some of those same comments and discussions have spawned new articles and cover stories. (See what I mean about that “organic” process?) Ok, now I have a confession to make: Editors always wonder how many people actually read the foreword. I mean it’s usually right in the beginning, and their are heaps of juicy, eye-catching articles just a page turn away. He’s my challenge to those that have made it this far -- Take 2 minutes out of your life and send me an email to admin@ americanbodyguards.org. In it list 3 things about the magazine. It could be something you like, something you want to see more of, or something that you want us to improve upon. Remember, spring is rebirth time, and in keeping with that idea, we are enlisting your help to make sure The Circuit is delivering exactly what our readers want. Elijah Shaw Managing Editor (US Edition)
Issue 19
03
CONTENTS ISSUE19 03Editorial 06Police in the EP profession 08High Net Worth Individuals
12
10 10Professional Development 12Behavioral Analysis 18Age of the Super Crises 22Keeping Your Edge
Contents
30Self-defence
With the internet, and especially Youtube, it is very easy to get hold of information nowadays that only a few years ago was restricted to a few professionals that understood what they were looking at.
34The Keeper of Secrets 38Medical: Breathing Assessment p2 42Front Right Seat 44Counter Terror Expo 2013 46Social Media 49Working Girl 50FocusOn: Nigeria 56Time Management 58Masking The Risk 60Classifieds
50 Issue 19
05
Feature
Police in the EP Profession: The Do’s and Don’ts By: Robert S Michels
06
Circuit Magazine
Police in the EP Profession I will have to say that far more have held the door open for me, than slammed the door, but I wanted to find out why there was so much resistance to police being in the business. I actually asked one of my critics, who told me that police training is centered on guns and use of force and that carrying a gun does not a bodyguard make. He told me that police officers use a hammer to fix all the problems they face. That got me thinking. Well, I looked at our training. We shoot, we drive, we talk to people, we fight, and we shoot. Did I mention that we shoot? In retrospect I received more training in my 26 years on firearms than I did on anything else. I drove and talked more in those years and received minimal training on both. How do I fix my training deficit? I bought a few used books on the subject and had an understanding of the mindset that was in play. The new paradigm is one of protection over enforcement. Also something that the British call “softer skills” was in play. I learned that there are other things in my toolbox besides a hammer. I get it! At some point, 3 or 4 books later, I decided that I need to take that step and get some formal training. So I did some checking and found some training that was close to me in southwestern Michigan. I made an effort to come to class with an open mind and I learned more in the class than from books. I will say that again, “I learned more in class than from books”. The other thing in class that was stressed was that one 40 hour class is not going to certify me as an EP man. I am a still a work in progress. A few things that I would suggest to my fellow law enforcement officers considering EP as a profession would be, and most important: Check your ego at the door.
These guys and gals have been there and done that and you have not. As they said in our Field Training Officer Program, ears open mouth shut. Shooting. Yes, it is an important skill but not the most important. These professionals do not want to hear you talk about what gun is best for this or that. Guns are viewed as tools and you better be familiar with all kinds. Educate yourself. Do what I did. Get a couple used books on the subject and read them cover to cover. It helped me with the terms and the mindset. Believe me; the mindset will give you the most trouble. Start thinking protection. Training. Spend the money on a training course if you are serious about doing this type of job. Do your research and due diligence. No course will make you an instant success, just like the academy did not make us Jethro Gibbs. Don’t get suckered into a training program that guarantees job placement. That is something you do on your own. Networking. This job is based on how you market yourself and how you treat others. If you don’t know how to network, ask someone. Watch what you say and how you say it, because literally your boss could be the guy you are flaming on a facebook post. My bottom line is that given the proper training, that police officers can be great in the EP field. We have a lot to give to the profession but we have to adapt to it, as the profession accepts us. Approach this as an extension of the mantra “protect and serve” with emphasis on protection. So give us a chance, we promise to be good… and professional.
We shoot, we drive, we talk to people, we fight, and we shoot. Did I mention that we shoot? In retrospect I received more training in my 26 years on firearms than I did on anything else. I drove and talked more in those years and received minimal training on both. Issue 19
07
Feature By Jessica Kuyper & Raffaele Di Giorgio
INTELLIGENCE SUPPORT TO HIGH NET-WORTH INDIVIDUALS – BE THE RIGHT KIND OF YES MAN
The High Net Worth Individual (HNWI) is often a person used to taking calculated risks. In order to support this, HNWIs need bespoke intelligence and security services that are flexible and responsive. These are people who have the resources to fly a hot air balloon around the world; to launch their own airlines to travel places they wish to go; to start charities that change the world. High profile activities; often in dangerous locations across the globe. This is not to say that everything is a good idea or that you should encourage foolish or inherently dangerous behaviour in your client out of a fear of saying no. A request to go on an ‘extreme camping holiday’ in southern Afghanistan is something that should be treated with caution. However simply saying something “cannot be done” is the antithesis of a bespoke solution. Remember – anything at all can be done, it is just a matter of what resources you might need to acquire. Tailored Solutions - Be clear about the threat level and be clear about the risk. You are in the wrong industry if you prevaricate on, falsely minimise, or are afraid to inform the client of the level of risk that may surround their chosen activity or location. It is important to realise and differentiate between threat and risk. Threat consists of natural and manmade hazards or people/
08
Circuit Magazine
groups that are likely to or have the potential to cause harm. For example: hostile armed groups, or extreme weather events such as cyclones or bushfires. Analysts can identify umpteen threats to a given individual or location - the sun could explode after all, or nuclear war could break out, or a zombie apocalypse could erupt (highly improbable). How to cut a sensible swathe through all of this? Work with levels of probability and determine what is most likely to happen. Eg – threats to the extreme camping holiday in southern Afghanistan likely consist of armed hostile groups, IEDs and other devices and kidnap. Cyclone and nuclear war is unlikely to make the cut. Conversely, that same extreme holiday transplanted to Antarctica unveils a whole different raft of threats – weather patterns and natural threats from fauna (and the abominable snowman as an unlikely but possible threat) far outweigh the probability of chancing upon a hostile terrorist group. After you have made a realistic assessment of the existence of particular threats to your task/HNWI, apply mitigating measures to determine the level of risk. However, like your elementary school maths teacher taught you way back when; the working needs to be visible. So if your mitigation strategy
Intelligence Support for the southern Afghanistan camping trip includes dedicated aero-medical support; commercial grade UAVs and a 200 man PSD team then provide the costing statement and level of residual risk in un-emotive terms. This gives the HNWI client the ability to decide whether the resources and risk are worth the outcome Don’t cut corners. Planning high risk activities with a cavalier attitude is the fastest way to disaster. Use a robust and transparent planning process and apply it thoroughly to all tasks. This means that decisions are not based on ‘the vibe’, ‘spider senses’ or any other gloriously wishy washy method of assessment. It also means that you can be confident that your ‘yes’ is not going to end in misadventure. Consider the emotional as well as logical reasoning behind a task. Imagine yourself in the client’s position. No I don’t mean try on their clothes a la Jackie Chan in “The Suit” or Jennifer Lopez in “Maid in Manhattan”. Rather, consider their reasoning process for why they might wish to do something
and this will give you an insight into how important a given task might be. This then allows you to be not just responsive to the client’s intelligence and security requirements but to pre-empt them: the mark of a true tailored security solution. Levels of risk acceptance are dynamic – be responsive Even the most adventurous of spirits has a threshold for a level of unacceptable risk. While the HNWI will often be prepared to accept a high level of personal, reputational or organisational risk, their threshold for family, friends and other loved ones is generally much lower. This applies to general static security arrangements, travel and recreational tasks. Whether you are operating from a cold start or have been working with the client for some time, it is important to quickly become familiar with the client’s perceptions and levels of comfort on this matter. Overall, working with HNWI clients can be particularly rewarding and give you the opportunity to be involved in some thoroughly interesting activities. If you have the chance, do your homework, take a deep breath and enjoy the ride!
Jessica Kuyper is an All Source Analyst and Intelligence Manager, Loss Prevention Advisor, CI Specialist actively working in support of protection operations. Raffaele Di Giorgio is a Senior Executive with Global Options & Solutions www.GOS911.com
Issue 19
09
Opinion
By Mark James EPS,CPO, CAS
Professional Development – Straight Talk As an agency owner and active member in many professional protection organizations I try to always lead from the front. As a member of the North American Bodyguard Association (NABA) and British Bodyguard Association (BBA) our mission is to help grow the industry in a positive direction, enhance the safety of our protectees, while building the skills of our members. Our tag line is excellence through intelligence. It is that intelligence which truly separates the best agencies and agents/operators whether they are government or private sector firms. Since our organization focuses on intelligence it is important that we develop some common platforms and definitions going forward so the collective applications of the terms will have the desired effect of accelerating the development of our members and enhancing the service levels experienced by our clients. Let’s take a look at some often overused or misused words in professional growth and development: mentoring, consulting, sponsoring, and networking Mentoring – verb • To advise or train. • Is a developmental partnership through which one person shares knowledge, skills, information and perspective to foster the personal and professional growth of someone else. A mentor may also serve as a motivator when their mentee is facing a challenge or a developmental road block. It may come through the form of positive feedback (reinforce
10
Circuit Magazine
behavior) or constructive feedback (change behavior). In rare occasions it may also come in the form of incentives. However we must understand a person has to agree to be your mentor since as the definition implies it is a developmental partnership. Consulting – verb •The providing of expert knowledge to a third party for a fee. Consulting is most often used when a company or individual needs an outside, expert opinion regarding a business or development decision. Mentorship generally comes for free. However, it comes based on the availability of the mentor, who as a successful practitioner is often very busy. If you chose to want them to provide assistance and development on your time frame and not theirs that is often called consulting. In your growth and development your mentor will help you identify skills to be developed, assist you with that development or may recommend others to you to assist you in your growth. However, the arrangement you make or develop with the other individuals is your own personal or business relationship and may come with a cost (their knowledge may not come for free) from the other individuals.
Professional Development Sponsorship – noun • Assuming responsibility for another person or a group during a period of instruction, apprenticeship, or probation. • Vouching for the suitability of a candidate for admission. After developing your skills the next logical step is sponsorship. While mentors can help you develop skills, only sponsors can help you create or secure opportunities. Both are critical to the success and future on-boarding of an individual. The number one reason people don’t receive active sponsorship is the requested sponsor cannot vouch for the skills of the requesting individual and they are not willing to put their personal credibility at risk for someone they have not vetted. Mentorship will often lead to sponsorship as it removes the uncertainty from the equation. When I help you develop the skills then I have no exposure in the recommendation or providing the opportunity. Networking - verb • Networking is a socioeconomic activity by groups of likeminded businesspeople to recognize, create, or act upon mutually beneficial business opportunities. • The exchange of information or services among individuals, groups, or institutions; specifically: the cultivation of productive relationships for employment or business.
If the activities or outputs are not mutually beneficial then it truly isn’t networking. Social media sites and chat groups like Facebook and Linked In, are not networks but target rich environments which may assist you in developing your network. Effective networking can open up additional opportunities for the associated members and help extend your resource capacity and capability. As a good friend regularly reminds us, “your net worth is only as good as your network.” Remember mentorship and sponsorship are not entitlements but an agreed upon arrangement born out of commitment, sacrifice and discipline. Best of luck to you in both your professional development and advancement in your career, and remember when the situation changes to “pay it forward!” Mark “Six” James is the Executive Director of Panther Protection Services a full service protection agency and an internationally published author. To find out more about Panther Protection Services visit www.pantherprotectionservices.com or www.facebook.com/pantherprotectionservices
Issue 19
11
Feature
In 2005 three suicide bombers detonated body-borne improvised explosive devices (IED’s) in a busy tourist area of Bali, Indonesia killing 20 people. Just three years prior, a mix of both vehicle-borne and body-borne IED’s killed 202 people in the same resort. These horrific attacks were the result of carefully planned operations linked to radical Islamic terrorism. Asking questions What as security professionals could we have done to protect a client in similar situations? If faced with a similar situation in the future would we be able to identify the threat early enough to react? Is it just a case of accepting that it is a
12
Circuit Magazine
situation of ‘wrong place, wrong time’ and would therefore be out of our control? There are no guarantees within the security industry, let alone dealing with extremism. It is the author’s strong belief that behavioral and appearance analysis might make a difference in such situations. Detailed and focused observations of suspect individuals and their behaviors may lead to identifying life threatening situations early enough to provide that all important, time to react.
Behavioral Analysis Suicide Terrorism A suicide terrorist may experience strong emotions prior to carrying out an attack, which in turn can be manifested through body language and physiological responses. Certain behaviors and tell-tale actions may be exhibited and these emotions, behaviors and actions could be used to help identify potential suicide terrorists. Security organizations throughout the world use behavioral analysis and screening at checkpoints, airports, and rail stations to help identify threats. Individual systems differ in methodology, but all aim to observe behavior and appearance to help their employees identify potential threats. Fear factor High levels of stress or fear are sudden, intense and normally of short duration. The effects of this can be positive and negative, producing an immediate physical reaction and performance enhancing benefit but also a negative reaction with typical problems including tunnel vision, failure to prioritize, freezing and loss of concentration. In high stress/high anxiety situations the biochemical changes that occur can have a significant negative impact on an individuals ability to assess their environment and make effective decisions. Experiments have shown that when stress and anxiety are increased there is a marked decrease in both the speed and accuracy in problem solving tasks. Controlling emotions Training has been proven to play a pivotal role in managing stressful situations, SLA Marshall wrote in his book: Men Against Fire, that only 15 – 20 % of soldiers in WWII combat situations fired their weapons at the enemy. Military training in the aftermath thus focused considerably on improving this. They rehearsed and trained, simulating combat situations and focused on this to a greater extent. In The Korean War firing rates had risen to 50% and in Vietnam it had climbed to 90%. His research, though questionable based part of this on poor management of fear and stress due to lack of correct training. The stress and anxiety in such situations certainly contributed to these figures, most likely causing soldiers to freeze, not think properly and become confused. In the American Civil War after the Battle of Gettysburg according to research some 90% of the muskets recovered from the battlefield were found to be loaded, further inspection found that nearly 50% were loaded more than twice and even up to ten times and not fired. Fail to prepare… Why is this important? Because if terrorists have not had a high level of training there is a good chance they could be
affected by acute stress in a negative way. Therefore thought processes and problem solving abilities may be affected, behavioral signs may become more obvious. The general consensus is with more experience and better training people cope with stress and anxiety better, but quality training is usually quite limited in terrorist organizations and therefore they will be more vulnerable to the negative effects of acute stress. A recent example of stress affecting an Islamic suicide terrorist is that of the UK 7/7 bomber, Hussain in London, U.K. They were seen laughing and joking prior to the split but on his own when his rucksack failed to detonate on the underground train, it was then he went to ground level, wandered around for nearly an hour, got a new battery for detonation and for some reason decided to board a bus. An eye witness saw Hussain board the number 91 bus at King’s Cross and noticed his bad manners in blocking fellow passengers with his rucksack. She was giving evidence at inquest into the bus bomb at Tavistock Square. Mrs DybekEchtermeyer, said she noticed Hussain as he stood at the front of the bus after boarding. “He looked very exhausted and he had sweat going onto his chin that looked very horrible,” she said. “He had dry white lips, he looked nervous and exhausted”. The 18-year-old angered those around him as he travelled on a No91 bus along London’s Euston Road. Another eye witness told the hearing “A woman in her 20s tapped him on the shoulder and politely asked him to be careful because he was hitting an elderly woman and perhaps others.” The witness added: “He simply did not react. I thought he was a lost and anxious tourist. He was behaving very oddly. This evidence suggests that Hussain was reacting adversely to stress and anxiety. Richard Reid the ‘shoe bomber’ was actually refused entry onto a flight due to his appearance and abnormal behavior. He managed to get on another flight the next day. The ‘underwear bomber’ Abdul Multullab by all accounts showed high levels of stress and anxiety at airport check points yet no one challenged him. Identifying factors What are the identifying factors of stress? • Exaggerated yawning • Whistling • Facial flushing • Repetitive touching of the face • Rubbing or wringing of the hands • Widely open staring eyes • Excessive fidgeting • Clock watching • Shuffling feet • Leg shaking
Issue 19
13
Feature What are the identifying factors of fear? • Trembling/shaking • Excessive sweating inconsistent with environment • Rigid posture, arms close together • Exaggerated, repetitive grooming gestures • Exaggerated emotions or behaviors inappropriate to location such as laughter or chatter • Hesitation/indecision • Scanning • Tunnel vision There are other factors that may also be taken into account, acts that are undertaken as part of deception. Suicide terrorists may use methods to conceal their intent. What are the identifying factors of deception? • Maintaining covert ties with others (keeping eye contact with others, hand gestures etc.) • Appears to be confused or disoriented • Does not respond to authoritative commands Observations Detailed and in-depth observations of suspect individuals and their behaviors could be of real benefit to the security professional. The majority of well trained people reading this
14
Circuit Magazine
article will no doubt do some or most of these consciously and sub-consciously already. There are never definitive answers in situations like these and the world of the suicide terrorist is far from clear and concise. It is doubtful that a suicide terrorist will manifest all of these characteristics at once, if at all and any factors that are noted must be put into context. For example a person sweating, with repetitive grooming gestures and scanning the room nervously may just be looking for his first blind date. Other indicators could also be taken into account. • Powerful grip of a bag or hand inside a bag • Emotionless face • Hands in pockets or closed hands for prolonged periods of time • Rigid mid section • Inappropriate clothing or luggage/rucksack • Walking or pacing with deliberation • Repeatedly patting upper body • Talking to oneself/mumbling or in a trance like state • Not responding to authoritative commands What-if scenario A protection detail could have been dining in Bali, Indonesia in 2005 protecting a client, would they have spotted the
Behavioral Analysis
It is doubtful that a suicide terrorist will manifest all of these characteristics at once, if at all and any factors that are noted must be put into context.
behavioral factors? Would the suicide terrorists have even been showing any external factors? Would the protection detail have had time to react even if they had spotted the threat early? These are all hypothetical questions that we will never know the answer to. What we do know however is, that it is vital to see and not just look, attention to detail, powers of observation and pre-empting danger are vital in our roles as protectors. If suicide bomber indicative behaviors are noted early then further interest can be paid to the potential threat, pre-emptive measures can be taken. It is by no means an exact science but security professionals must constantly add skills to their protective arsenal, using everything in their means to offer the best level of protection to the client. Explorer Travel Security: Travel security specialists providing covert executive protection and protective surveillance services to those traveling abroad. Through their dynamic and proven backgrounds in covert counter-terrorism they focus on providing the highest level of protection in a low profile manner.
Issue 19
15
Feature
By Gene Stratton
Don’t Shoot Me... I’m the first line of defense of the free world!
The reality is that if you make any portion of your living working any form of security, your safety is at risk.
16
Circuit Magazine
Issue 19
Don’t Shoot Me.. .
Individual responsibilities may vary but that is our collective objective. From security guard to international keepers of the peace, from loss prevention agent to anti-terrorism agent and from night watchman to the highest levels of executive and celebrity protection, it’s a crazy world out there and the bad guys view you as fair game… Practically every day I read of some atrocious crime committed against not only innocent victims in society, but against security personnel. Assaults such as shootings, and stabbings, are growing more and more common as the regard for human life seems to continue its downward spiral. Rather than being respected, a badge can be nothing more than a bull’s eye on a walking, breathing target. Apartment complexes, nightclubs, construction sites, armored vehicles are among the most dangerous places to work protecting life and property. How many can you think of to add to that list? Here is a sample of some of the stories to be found …” Lowe’s security agent stabbed by shoplifter” “Shoplifters (four women) shoot at J C Penny security agents”...”Retired police officer after 27 years of service gunned down while working security”. Have we established yet that it’s dangerous? Okay here are a few more tidbits…”San Antonio nightclub security gunned down”, “Nashville armored car guard pepper sprayed and robbed.” If security is armed at all, they may be heavily out gunned and out numbered. Then again, who wants to live in an apartment complex, party at a club, or shop…where security totes a 12 gauge shotgun? Many companies are more concerned about liability and lawsuits than the safety of their personnel despite the sweet sounding songs they may sing to the contrary.
Finally, records are being kept as best they can be, regarding the number of security personnel killed or attacked. Yes, I did say killed. It’s tragic when a member of our military dies, a peace officer is killed, or a fireman perishes while saving lives and property. When a protective fields specialist dies safeguarding life and property, it’s every bit as tragic and he or she is just as great a hero. Efforts are being made now to construct a memorial wall for those in the security industry killed in the line of duty. Additionally, I urge you to support legislation wherever you may be in the world, for tougher penalties for those found guilty of assaulting security personnel. You and all those who safeguard life and property are the first line of defense of the free world. No, that’s not grandiose or exaggerating, it’s simply the truth. Individual responsibilities may vary but that is our collective objective. Sure, the fire department, a SWAT team, or even the Marines may have to be eventually called in, but that’s because you were there and knew who to call and what steps to take. As as Circuit Magazine US Editor Elijah Shaw says, ”He thinks he was born fully grown.” The industry we work in was not born fully grown either…it was built and is still being paid for by the blood, and the very lives, of many of our predecessors. It is important that they are honored, revered and remembered with the utmost respect. Good luck, and as always, stay safe! Gene Stratton is an Executive Protection specialist in the Kentucky area and a 2010 graduate of ICON’s “Celebrity and VIP Protection” course. For the majority of the past 26 years he has worked in the Fire, EMS, Police and Security industries. He holds a Bachelor of Science degree from Morehead State University. genestrattonbg@gmail.com
Issue 19
17
Feature By Richard Bingley
North Korea’s recent nuclear tests should not be underestimated. 2013 could well be the most pivotal year for strategic military weapon controls (i.e., concerns around armed nukes) since the closing of the Cold War more than two decades ago. Why do I say this?
18
Circuit Magazine
The Age of the Super Crises Nuclear weapons have always been used as tools to influence international negotiations and brinksmanship. It is perhaps no coincidence that underground tests, estimated to have achieved a 7-kiloton yield (around half of that dropped on Hiroshima), took place less than two weeks before the inauguration of South Korea’s newly elected President. Security analysts in the South observe that North Korea may be cranking up the tension in order to strengthen the North’s position in any subsequent peace negotiation. In Iran, it is clear that IAEA officials have received disruption after diversion in their attempts to monitor Iranian atomic and nuclear research facilities. And, such is the polarised split of the power anatomy in Iran, full blame can’t be laid at the feet of President Ahmadinejad. However, he is up for re-election in June. He will perceive (perhaps incorrectly) that his government’s recalcitrance against inspectors’ could be tactically deployed as a popular anti-western ‘dog whistle’ election strategy for conservatives at home. Such postures and chess-like manoeuvres have rightly engrossed many analysts since the fall of the Iron Curtain. Moreover, diplomatic successes, such as the US Senate’s ratification of the Strategic Arms Reduction Treaty with Russia (2009) – to cut nuclear weapons by a third (although huge bilateral tension remains over Ballistic Missile Defence Systems) – has sadly been eclipsed by hostile rhetoric emanating from Tehran and Pyongyang. So, what’s different right now, if anything? Many feel that with North Korea the world has reached a ‘tipping point’ in terms of risk. When I first began analysing missile ranges more than a decade ago, North Korea’s Taepo Dong and NoDong (aka, Rodong) rocket missile technology was already a huge concern, with potential ranges between 500 to 1,500km, depending on the analysis one read. At that stage, this was already of grave direct concern for South Koreans, American troops stationed in the peninsula, the Japanese… and certainly a negative mark on the regional economy scorecard.
These gamechangers have now galvanised a far stronger than expected reaction from North Korea’s neighbour and protector
Reports from strategic arms analysts now estimate that the Taepo Dong ballistic missile family can potentially reach up to 6,000km, well into Alaska and US Pacific bases. North Korea itself claims to be capable of enriching domestic uranium and has repeatedly tested nuclear explosions. At 7 kilotons yield, this week’s explosion could flatten entirely urban areas approximately the size and density of Islington and Camden; that’s before we begin to think about fall-out, contamination, economy and recovery. These game-changers have now galvanised a far stronger than expected reaction from North Korea’s neighbour and protector; China. China’s participation in a unanimous condemnation of her ally at the recent emergency UN Security Council meeting is most noteworthy. As was, North Korea’s ambassador being formally summoned and reprimanded by the Chinese government. Such action will please President Obama and US security officials, facing huge domestic challenges themselves. They will be acutely aware of evidence heard recently in the US Senate Armed Forces Committee, that a potential $35bn shortfall in the military budget will create an “immediate crisis in military readiness.”
Issue 19
19
Feature For two decades now a dominant, questionable, perception has permeated that nuclear weapons are broadly under control. That their complexity and tactical indiscrimination has prevented terrorists from getting their hands on actionable nukes. Moreover, that Iran and North Korea’s embryonic programmes are too infant. What does this mean for those of us concerned with implementing continuity and risk? Well, Professor Ian Mitroff ’s insistence that strategic and security leaders need to get our heads around ‘the age of super crises’ certainly rings true here, and elsewhere. The political, diplomatic and other potential, strategic responses - before we even consider worst-case future scenarios - may themselves unlock more instability, anxiety, vulnerability and complexity for industry and employers. Particularly those in highly networked and multi-functional global enterprises, or firms with dependencies (such as supply chains), in either region. How ‘Strategic Security Issues’ can impact and influence organisational risk management is a question which requires
“Their complexity and tactical indiscrimination has prevented terrorists from getting their hands on actionable nukes.”
20
Circuit Magazine
much due diligence when considering the importance of business resilience. Leaving analysis of such matters on the back-burner, could potentially imperil future operations, or cause security consultants reputational embarrassment. Aren’t we meant to know about these things? Alternatively, is it that we are just being hyper-sensitive to a raft of news headlines? I would be keen to hear your thoughts and insights about this challenge and the re-emergence of strategic military issues within the business risk sphere. Is there anything that we can realistically do to confront and prepare for magnitudinal crisis scenarios? Have the strategic issues which I highlight above, really got to a crunch point? Questions without conclusive answers often won’t merit serious discussion in industry. But these complex and dangerous scenarios certainly should, shouldn’t they? Richard Bingley is Senior Lecturer at the Department of Security and Resilience, Buckinghamshire New University, and author of ‘Terrorism: Just the Facts’. He is Course Leader for the BA (Hons.) Security Consultancy programme. He can be contacted at: richard.bingley@bucks.ac.uk
SILVERKRIEG
TR AINING
C lose Prote c tion C ou rse s ru n n in g n ow Ed e x c e l a n d C ity & G u ild s q u a lific a tion s www.silve rk rie g tra ining .c om
01694 720124
Keeping Your Edge
KEEPING YOUR EDGE Recently I had the opportunity to take two, very capable Close Protection Specialists and have them work alongside me on a protective detail. The last time I had utilized these two individuals was several months ago for a political event, namely the 2012 US Republican and Democratic National Conventions. In those capacities, the agents were involved with ensuring the safety and security of our client --members of a Fortune 100 organization, and as such worked shoulder to shoulder with local, state and federal law enforcement including the United States Secret Service. For over two weeks, they encountered aggressive media, large crowds, angry protesters, entitled politicians and demanding handlers. Not to mention dealing with the logistical challenges and restrictions placed on us by senior level security agencies such as the USSS. In an environment such as that, everyone is a “VIP”, many have personal security details, entourages and their own personal schedules and itineraries that they need to adhere to. The balancing act then becomes performing the required tasking while walking a tightrope that balances Protective Services with Customer Service. Offend the wrong person? Today might be your last day on the detail. Get caught up in a roadblock due to a senatorial motorcade and cause your client to miss out on their important meeting? Thanks, but maybe we’ll find someone who can do the job a bit more efficiently. These are the realities of working a client in a high profile event with
22
Circuit Magazine
multiple VIP’s on hand. I’m happy to say the two agents performed in a stellar fashion. So much so, that when the opportunity again presented itself to use them on a detail, It was a no brainer right? --Not so fast. The above event was a political one with a corporate client. The new one was a national sporting event with a high profile musician. In light of that new information, it would be safe to say that not everyone suited for one opportunity is the best fit for another, correct? As a Protector, we must be honest with ourselves and ask that just because there is a job opening, are we the right person for that job? Do we have the right temperament? The right skill-set? In some cases, even the right “look”? If you are the agent who is going for that Detail, those are questions you SHOULD be asking yourself. If you are the Detail Leader, those are question you HAVE to ask. Success or failure may depend on it. When I tapped the two individuals I thought long and hard. I also made sure they understood the different dynamics that were in play. This is not to say that they had not worked in similar situations in the past, however not with me. It’s a given that different Detail Leaders have different manners of doing things, just as different Principals have different likes and dislikes. The two agents were well briefed and ready
Elijah Shaw
for the assignment and throughout the run, what did they encounter?
assignment. The Craft is the Craft. How we execute it, including the proper mindset is where the variances occur.
Aggressive media, large crowds, entitled celebrities and demanding handlers
Now you may be wondering how those two agents did upon completion of the assignment? Well, late one night at the conclusion of the multi-day event I was escorting the Principal through the lobby and up the elevator to his room. One agent stayed on the lobby level to wait for me to come down and do the end of day debrief. As we walked to the room, I mentioned to the Principal that as we were flying out very early in the morning, and as the agent had to secure the vehicles and was not flying, he would not be seeing him again. The Client then abruptly did a U-turn, and then took the elevator back downstairs to then lobby to personally shake hands with the agent and tell him that he appreciated all of his help during the assignment.
What did they have to deal with? An environment where everyone is a “VIP”, many have personal security details, entourages and their own personal schedules and itineraries that they need to adhere to. At this point you may be thinking, “wait a minute this all sounds familiar”? Hopefully I didn’t use too many words, to get to this point, in this this edition of, Keeping your Edge – The fact that Corporate/Dignitary Protection and Celebrity Protection are two different animals, but they are also the same in many ways. A major deciding factor in the success or failure of the Detail is the individual Agent working the
I think that sums it up perfectly.
Elijah Shaw is the CEO of Icon Services Corporation and The National Director of the North American Bodyguard Association
Issue 19
23
Feature
By Joshua Lee
If I had told you a year ago five top-tier operators in the executive protection industry would come together in one location and deliver a protection-specific summit filled with discussions on best industry practices, working internationally, building your brand and getting noticed by decision makers…. oh and it would cost less than a day at the range, I’d be voted off the EP island. Sounds crazy right? Why would operators ACTIVELY working in the industry share tricks of the trade with a room full of fellow operators, from the newly graduated protection school attendee to the seasoned veteran? In the words of one of the presenters, Eric Konohia, “Your net worth is only as good as your network”! This group (I’ll refer to as “The Five”) had a vision; ran with it, and in my opinion delivered big time. In December of 2012, I received a formal invitation from Mr. Konohia to attend the NABA sponsored 1st annual ICON “Social Summit” in Atlanta, Georgia on January 20th, 2013. Having no prior knowledge of the event, I employed a little “Google Fu” to see what it was all about. Upon locating the official flyer and seeing a speaker lineup including industry professionals such as Mark “Six” James of Panther Protective services, Raffaele Di Giorgio of Global Options and Solutions, Benjamin Alozie, Director of International Operations for ICON, Eric Konohia of BPI Security and finally, Elijah Shaw the founder of ICON Services
24
Circuit Magazine
Corporation, I immediately booked my flight, hotel room and summit registration. The morning of the summit came starting at 0400 with me getting in my daily workout. I didn’t get much sleep the night before anyway, too much anticipation and excitement for the event. I finished my work-out, ate breakfast, showered and gave my business wardrobe one final look-over before descending down to the hotel lobby. The week prior, I reached out to Mr. Konohia, asking if he would put me in touch with a few “squared away” protection specialists he knew would be attending the event. He didn’t disappoint and connected me with three solid professionals, Chad Duke, Michael Brown and Uriah Riley. Chad and I were the first to meet down in the lobby. It took all of 10 seconds to realize Chad and I were of the same mindset and approach to the EP industry. Moments later I had the pleasure of meeting Michael and Uriah. Unfortunately, both were pressed for time as they were helping with the logistics of the Summit, however it did not impede our newly found relationship (more on this later). The summit started as myself, Chad and
GAME CHANGER 65 other Men and Women, all with a connection to executive protection industry, filled into the conference room that was set –up to deliver the goods. The Summit was underway and was switched on! The Summit began with a brief welcome and introduction of the speaker cadre from Elijah Shaw. For those who don’t know Mr. Shaw or have been hiding under a rock for 15+ years, Elijah has been heavily involved in cleaning up the image of the celebrity protection industry; taking it from an image of sloppy untrained “knuckle draggers” to the sleek, sophisticated professional. Once introductions commenced, Mark James was the first presenter to speak on the topic of “Developing the brand of YOU”. Mark kicked off the Summit by diving head-first into the topic of branding and marketing yourself as a protection professional. Having held corporate executive positions with power companies such as Nike along with being a successful author and business owner himself, Mark knows a thing or two about how to successfully market and brand. He delivered his presentation with precision and presented several keys to success as well as pitfalls to avoid. You could see the wheels turning in the minds of the attendees. Success in branding and marketing has eluded even the best protection specialists, yet here we are, talking best practices from someone who knows both sides of the business.
The next speaker to take the bat and step up to the plate was Eric “The Corporate Beard” Konohia. Those who haven’t had the privilege of reading Eric’s Blog, talk with him over the phone or meet him face to face, you’re really missing out. Eric is a straight-to-the-point, tell it like it is guy who will make you want to run through a wall for the good of the industry or take your ball, go home and cry, depending which side of the fence you fall on (Pro vs. untrained wannabe). Eric gave his presentation on “getting noticed by decision makers”, which included his “4P formula” of success along with numerous examples on subjects such as preparedness, social media etiquette and proper protection terminology. Eric’s blend of professionalism and keen sense of humor made for a presentation filled with extensive note taking and endless laughter. After Eric’s presentation, we all broke for lunch. Gauging from the comments, excitement and general reactions amongst the attendees, the summit had far exceeded expectations and we’re only half way through. After a lunch break that lasted a bit longer than we anticipated (It’s a shame the day’s only “technical difficulties” came from the hotel restaurant being understaffed, but we won’t go there), Raffaele Di Giorgio stepped up to the podium to deliver his presentation titled “So you want to work internationally?” Raffaele made a point to quickly dispel a myth that is all too common in our industry, the
Issue 19
25
Feature
notion that anyone, “can go overseas, work and make a ton of money right away” myth. From financial issues and training requirements to the cold hard truth of possibly coming home in a box, Raffaele’s years of experience across the pond, both good and bad, opened our eyes to the reality of working internationally. Did I mention Raffaele flew in from an assignment the Middle East just days before specifically for the Summit? Real World lessons indeed. The final speaker for the day, Mr. Benjamin Alozie presented his topic on “The challenges of working in Africa.” Having never traveled to Africa, let alone worked there, I took great interest in his presentation, which ranged from using the proper resources and personnel along with dispelling common misconceptions and travel concerns. Once Mr. Alozie wrapped his presentation, I had a better understanding of the country and culture, along with a greater respect for the men and women who risk their lives to work there. After Alozie’s presentation, Elijah Shaw stepped back up to the podium and announced a previously unpublished part of the day’s itinerary. What happened next is what I believed to be an industry first. I’m not going to it give away, as it was definitely one of the perks of being in attendance. I’ll just say this final presentation was bold, risky and executed perfectly!
26
Circuit Magazine
I witnessed total engagement of each person in attendance as they soaked up every bit of information that was given. I’ll go on record as saying if others in the future attempted to duplicate that last presentation; they’d likely come up short. That’s just my opinion. The classroom portion of the Summit came to an end as attendees and speakers made their way over to the hotel bar for the “Social” phase. Now was the time to network, socialize and meet many that you only knew by reputation or the Internet. Phone numbers and business cards were exchanged, pictures taken and laughs’ shared. I’m happy to report while a few drinks were poured that late January evening, no one lost their mind, damaged their credibility or ended up dancing on the bar. As the social portion of the summit winded down, I said my goodbyes to the newfound network of professionals I’d just met and personally thanked each speaker for an outstanding job. I spent some additional time speaking to Eric Konohia, thanking him once again for his personal invitation allowing me to attend. The event ended, however this was only the beginning of a new journey. All of that is well and good but a very important questions that had to be asked is, “did I as an individual gain anything?”
GAME CHANGER
“What happened next is what I believed to be an industry first. I’m not going to it give away, as it was definitely one of the perks of being in attendance.”
issues that affect the working specialists at a price point that made it possible to attend, was a benefit to the entire industry. They hit upon the issues everyday working protection specialists face and attempt to master. I’ve attended plenty of training schools that provide excellent instruction in advance work, driving, formations and motorcades. Most of these programs don’t approach the subjects the summit took head on. I’ve enhanced my skill set and it’s made me a better protection agent.
The answer unequivocally is yes. Since the Summit, I’ve spoken with several attendees on topics from church security and estate protection to passing on job leads and training opportunities. I’m proud to announce two of the specialists mentioned earlier in the article, Michael Brown and Uriah Riley along with myself have shared numerous conversations via email and phone and are in the process of putting together a personal “meeting of the minds” to discuss future projects.
Bottom line, the summit provided a tremendous insight to a side of the protection business I needed to enhance along with a new network of top-tier protection professionals. Those of you who for whatever reason decided not to attend, you missed out big time. Those who have the next Summit on their radar, I suggest you block off your calendars now; you won’t want to miss it. I’ve even offered to help with the logistics of the next Summit location, which I’m trying to convince Elijah and company to hold right here in my hometown, but it sounds like a few cities are “bidding for the opportunity”. Stay tuned for more details…
This business is full of ego and alpha-type personalities. It kind of has to be, and the timid and weak don’t last long in our world. To have the Five distinguished speakers check their egos at the door, take time from running their respective companies and deliver presentations filled with
With over twelve years of experience in law enforcement and protective security services, Joshua Lee is an executive protection specialist based in Indianapolis, Indiana. Josh can be reached at joshlee041980@gmail.com.
Issue 19
27
Maritime
This edition’s Maritime article is slightly unusual from my normal submissions as I have stepped over onto land for some of the discussion, mainly as compliance is going to affect both theatres of operations.
The main emphasis of this article is on the International Code of Conduct (ICOC) as this is the primary focus on the development of compliance standards for companies and operators deployed in complex security environments, and to date the lack of a maritime equivalent has drawn maritime security companies into this standard as well. This subject is not really being written because I think it will be exciting to highlight compliance or that it will be the main topic of conversation out on the ground, but because of the potential impact it will have on us as an industry over the coming year and years to come. There are five standards of compliance being introduced or amended in the near future that will potentially affect working in a Complex or Maritime Security Environment; in some cases these standards will merge depending on types and areas of operations, and company structure, they are: • Private Security Company 1 (PSC1) Standard for land based operations • International Code of Conduct (ICOC) for land based • International Standards of Organisation ISO 28007 ISO (PAS) 28007 for maritime Security • Maritime Labour Convention 2006 • Manila Amendments 2010 In September 2008, the Montreux Document was produced, which several States signed up to say they would commit to observe existing international legal obligations relevant to the operations of Private Security Companies (PSC) in areas of armed conflict. In 2010, an International Code of Conduct (ICOC) for PSC was produced which complimented the Montreux Document. This document provided a set of
28
Circuit Magazine
principles to guide companies. As of the beginning of February this year, ICOC had been signed by almost 600 PSCs, around 30% of them British and 11% from North America. Although the ICOC is dedicated to land based operations and focusing on Human Rights and Humanitarian Law, 47% of the signatories to the ICOC are maritime security companies. In 2010, Private Maritime Security Companies (PMSC) did not have a recognised industry framework to demonstrate they were responsible and compliant in their operations, so to offer credibility to their activities, a large amount of maritime companies signed up to the ICOC. The International Maritime Organisation (IMO) did suggest that although ICOC was not designed for PMSC’s it did offer some guidelines that could be followed. Since then the IMO has been more responsive to recognising the issues that affect flag states and their clients, so various interim guidelines to assist shipping companies and maritime security alike have been issued. During this period, Best Management Practice 3, then 4 were produced offering advice on the practicalities to the industry for vessels transiting the High Risk Area (HRA) and as pressure from various areas within the shipping Industry a specific maritime security ISO has been released. It is in its very early stages and is still classed as a Publicly Available Specification, companies cannot be certified against the standard until later this year, which is the same for the PSC1, but both are being progressed. In February, I was fortunate enough to take part in the Drafting Conference for the introduction of the Charter for the Oversight Mechanism of the ICOC, which is the next
Complex Environments step in adopting the ICOC as the standard being acceptable to Governments, Civil Society Organisations and the security sector, which took place in Montreux, Switzerland. If I can quote part of Paul Gibson’s, Director of Security in Complex Environment Groups (SCEG) summing up on the conference: “The conference took place in the sumptuous surroundings of the hotel, The Montreux Palace. SCEG was well represented with over 20% of the membership present including no less than 5 Executive Committee Members. Despite the luxurious surroundings this was no holiday”. Paul was very accurate in his description. The conference was hard work with long hours but was a success and was due in no small part to the dedication and sterling work of Sylvia White and Andy Nicholson who represented part of the British contingent representatives for industry members on the Temporary Steering Committee (TSC). There is still a lot of work to be done but is a step in the right direction. The PSC1 is a set of standards written in America aimed at land based security companies operating in complex environments. This standard has now been recognised by the UK Government as the standard that is also applicable for UK companies operating in areas of conflict overseas. The PSC1 is heavily focused on Human Rights and may well be a standard ICoC members are audited against, but there is more work to be carried out before this is established. Also this year will see the accreditation of Certification Bodies who will be empowered to certify maritime security companies wishing to demonstrate their capability to work to the ISO 28007 standard which is derived from the ISO 28000, Security in the Supply Chain. This new standard is in its Publicly Available Specification (PAS) stage at present and can be for up to 3 years, which means it hasn’t been fully introduced by ISO yet and can be amended, or let go depending on its success. PSC1 and ISO 28007 are very different in what they aim to achieve even though they both represent security in complex environments, but each theatre presents different challenges to operations. From an operators perspective the auditors are likely to be out on the ground looking at how operators knowledge and how they professional they operate. This is far from the ISO 9001 quality type audit, which is all office based back at HQ, but 28007 is concentrated on risk and operational procedures and PSC1 and ICOC are Human rights and humanitarian law. The last section focuses on maritime security and will come from the introduction of the Manila Amendments 2010 that comes into affect in 2014. At present, and according to the Policy Advisors within HM Government, Maritime Security Operatives will be regarded as falling into this legislation as Seafarers, there is some discussion to be had on this, but if that is the case then this will potentially impact upon PMSCs. It is still up in the air and needs more work carried out to
define our roles and responsibilities as to whether we will meet the definition. Watch this space. Apart from the ISO 28007, all these documents are freely available on the web. One of the biggest concerns for companies is what will the implementation cost? If there is little or no commercial incentive then why have it? By having the ticks in the correct boxes hopefully it will make a difference to ability to secure contracts? There is no point in having all the ticks if the clients don’t require these standards to contract you, and if some company under cuts you as they don’t have all the safety nets in place. Then it’s worthless. PSC1 is intended to be a pre-requisite for tenders by the US Department of Defence. ISO 28007 will probably also be driven the same way by the shipping associations and P&I clubs like, which is all good news for raising standards if it pushes out the companies who cut corners and give us a bad reputation. This article is really to highlight that companies if they wish to remain either compliant or competitive then they are going to have to ‘raise the bar’ to satisfy their clients, Flag states and Civil Societies Organisations needs. Due to the nature of these standards it will incorporate everyone from the CEO down to the newest team member, knowing and understanding and more importantly complying with their roles and responsibilities. It won’t be easy, it will no doubt be costly, but if it removes the cowboys from the sector and raises our professional profile, then that is no bad thing. If you are struggling to sleep at night just follow the links to the available free documents: Montreux Document: http://www.icrc.org/eng/resources/ documents/misc/montreux-document-170908.htm PSC1, see under ‘Standards’ on the web page http://www.acq. osd.mil/log/PS/psc.html ICOC 2nd draft charter, this will develop, but gives some idea: http://www.icoc-psp.org/Charter_Consultation.html International Maritime Convention 2006: http://www. ilo.org/global/standards/maritime-labour-convention/ WCMS_090250/lang--en/index.htm The Manila amendments to the STCW Convention and Code: http://www.imo.org/MediaCentre/PressBriefings/Pages/ STCW-revised-adopted.aspx Scott recently changed from operating as a consultant in the HRA to the newly appointed position of the Head of Quality and Compliance within MAST Ltd. He has over 28 years military, public and commercial experience in security and is an experienced Maritime Security Operator having deployed in various front line operational roles including Validator/Instructor and managerial positions within MAST over the last 3 years. He is a Qualified Lead Auditor and an ISPS/ISM Auditor.
Issue 19
29
Feature By Michael Baillie
With the internet, and especially Youtube, it is very easy to get hold of information nowadays that only a few years ago was restricted to a few professionals that understood what they were looking at. This is also true for martial arts and self-defence techniques.
30
Circuit Magazine
Self-Defence
I, within my job as an instructor, always make sure that my students understand that I cannot turn them into high level operatives that react on cue to any kind of situation after a few hours of training. I also make sure that they understand that hard and continuous study is essential to be at the top of their field. This is where the internet comes in, and with it the difficulty that my students have to distinguish between techniques that actually work in real-life situations and those that are just flashy or simply dangerous. This article is going to focus not on techniques but on concepts that will help operative select between those techniques that work and those that don’t in a conscious way when doing autodidactic research. I will be reviewing three different types of weapons that an operative is most likely to encounter when working in an urban environment; handguns, sharp edged weapons and blunt weapons. Revolvers vs. Pistols I often get asked to teach handgun disarming techniques and my reply is always for what type of handgun are these techniques intended. There are many techniques out there that can be used on both revolvers and pistols but in my opinion, due to their mechanical differences, they should be kept separate. As an examples, a butter knife and a carving knife are both types of knives, but you would not use a butter knife to carve a turkey or vice-versa.
Revolvers have two key parts which can stop the actual mechanism of the weapon from working. When the trigger of a gun is pressed, the cylinder starts rotating to align a bullet with the barrel of the gun and the hammer moves back ready to fall and hit the firing cap. If either the cylinder or the hammer is blocked from moving, the cycle will be interrupted and thus the gun will not fire. Pistols have a more complicated internal mechanism. As with many things that have moving parts, it is fairly easy to create a blockage in their mechanism. Anybody that has worked regularly with pistols knows that they jam fairly regularly and that the two most common ways that this happens is (a) the slide gets displaced, for example by pressing the muzzle of the pistol against a soft object and (b) the shell doesn’t eject properly thus blocking the whole mechanism. At this point I am very tempted to give you example of techniques that can be used to disarm either type of handgun but I will refrain from doing so. I will simply say that next time you watch a training video analyze it, think about it, ask yourself “Can the handgun be fired?”. The fact of the matter is (a) a blown-out eardrum, assuming you were not shot, is going to make your life very difficult if you are still grappling for the gun and that (b) you can keep on grappling for it as long as you want if you can be certain that it is not going to go off.
Issue 19
31
Feature Sharp Edged Weapons I am scared stiff of sharp edged weapons and I will always be openly honest about it. They are highly dangerous in trained hands (quite as efficient in an idiot’s) and I would always choose to bring a knife to a gun fight if it involves close combat. You would have to be a professional speed shooter to think otherwise. I have my students do an exercise that astonishes them every time. Do this with a partner. Stand with your gun holstered at 3-5 meters from him, let him attack you with a training knife as if he really meant it (war cry and everything), react to his attack, observe the result. You have to be very good not to get touched by the knife. Knives are very difficult to defend against but you should keep two key facts in mind. The first, and probably the most counter-instinctual, is the closer you are to the attacker, the less likely you are to get stabbed. Due to how your body works the closer you are to the attacker the less leverage they will have. The second key fact is if you ever get hold of the wrist holding the knife do not let go. It is much nicer to get punched in the face than stabbed in the gut. As a word of advice always be careful of your rear and be ready for surprises. Nobody is perfect and mistakes happen. You
32
Circuit Magazine
“Knives are very difficult to defend against but you should keep two key facts in mind. The first, and probably the most counterinstinctual, is the closer you are to the attacker, the less likely you are to get stabbed.” might have a slip of a hand and not catch the forearm of the attacker but rather the elbow thus letting the forearm swing down and stabbing you in the back. Another case might be that an attacker has a second knife that is wielded with the other hand as you concentrate on the primary weapon. When looking at techniques see if the facts apply or how much is there is room there for error. This doesn’t mean that
Self-Defence all techniques that don’t incorporate the above stated won’t work but just be critical in their analysis. There are a great deal of techniques that look good out there but that won’t save your life. Blunt Weapon In my personal experience if you get attacked with a blunt weapon you will get hit by it at least once. The trick is not to get hit in a spot that will incapacitate you and stop you from defending yourself. The techniques that are worth learning should incorporate some type of two handed control, if only briefly, of the weapon. In a real situation your adrenaline will be going, your hands will be sweaty and there is a very high likelihood that your one handed grip will fail, thus leaving you with a headache and blood streaming down your face and into your eyes. You also have to think of the distribution of the weight of the weapon. It is, for example, fairly easy to block a baseball bat attack by catching it underneath of your arm before disarming the attacker, it will hurt but it is very doable. In contrast you would not want to catch a hammer in the ribs as that will effectively stop the fight.
Another regular question that I get is about the effectiveness of catching a weapon versus deflecting it. The answer to that is simply it depends on the situation and you should learn both so as not be caught in a situation that you do not know how to react to. Generally speaking, when analysing a technique you have to ask yourself, is it effective for all types of blunt weapons and what would be the result if the technique was not done correctly. It is easy to find a great variety of techniques freely available for all. Some are more effective than others and some are just made to show off. As an operative you want to select the easiest and most effective techniques that will be quick to execute when under attack. On a personal safety note, be intelligent about what you do and make sure that you do not get into situations in which you have to use self-defence techniques. Before learning about techniques familiarise yourself with how the human body and the weapons you are more likely to encounter work. The more you know about how things work, the easier it will be to detect flaws in the techniques you are going to teach yourself.
Issue 19
33
The Keeper of Secrets
By Avery Mitchell, CMAS
The Personal Protection Specialist takes an “Oath” to keep “Confidential” and “Secret” the things they may see, hear or come across concerning the life of the client they are working with. Let’s look at these three words much closer: 1. Oath-meaning a solemn attestation of the truth or inviolability of one’s words. 2. Secret-meaning something kept from the knowledge of others or shared only confidentially with a few. 3. Confidential-meaning something that is private or secret. Every personal protection specialist when he steps forward for the job of “Protector” is taking an oath to be the “Keeper of Secrets” concerning his client’s life and knows they must keep confidential and secret every aspect of that client’s life. Early on in my personal protection career I asked a very influential business executive who made the decisions on what personal protection teams to hire and fire, what did they consider the key to being a successful personal protection specialist in this field and his response was this. “Avery a protector is the keeper of secrets, they see everything that happens in the life of the celebrity- the good, the bad and the ugly in that client’s life, and they have the power as a personal protection specialist to kill the clients brand or career based on the things you see, hear and read.” So privacy is the most important thing to that client, that personal protection specialist must ensure that they are
34
Circuit Magazine
doing thier absolute best job in being a “Keeper of Secrets” to their client. In this era of Social Media one must be even more aware than ever of his oath to protect the client from harm due to physical threat, embarrassment or accident. When the protector is home with fellow professionals and family friends they must constantly discipline and challenge themselves to protect the client and not speak on what they have seen heard or read around the client. The character of that professional must be strong enough to resist the temptation to tell “war stories” or share experiences with the client which may jeopardize client privacy. Our role is an awesome responsibility given by the client who believes you will be that Keeper of Secrets through constant self-assessment, self-discipline and self evaluation. As Protectors, we spend a lot of time honing our skills in shooting, hand to hand combat, driving, swimming etc, any skill that we feel we need to make us better protectors. How much time is each protector spending disciplining their own tongue not to engage in gossip about their clients to other professionals, family or friends? We must always assure through self reflection that we are being the best protector that we can be and keeping the lives of our clients confidential.
Social Counter Terror ExpoMedia 2013
Counter Terror Solutions for an Evolving World
Counter Terror Expo 2013 is the must attend event to mitigate threats, protect against terrorist attacks and understand current modern day risks in a secure environment. Discover solutions to protect against threats for: Police, Emergency Services, Government, Military, Intelligence & Security Services, Private Sector, Large scale sites, Oil & Gas, Cyber, Maritime/AntiPiracy and Critical National Infrastructure.
• • • • • • • • • •
Discover new innovations and solutions Hear successful case studies Meet 400+ exhibitors Attend strategy led conference streams 12 show floor workshops Closed door and secure meetings 200+VIP and International delegations Meet the Buyer Programme Networking Opportunities Co-located Forensics Europe Expo
Visit our website to register for FREE entry and to use our ‘Plan Your Visit’ tool
www.counterterrorexpo.com/ir
Co-Located with
Lead Media Partner
Supported By
SAMIIssue Issue19 19 www.seasecurity.org
15 27
Feature
HAVE YOU SEEN THE GREY MAN? By Paul Rock Higgins
36
Circuit Magazine
Have You Seen the Grey Man?
Well for starters he isn’t that grey and he is easily seen. For those of you who do not know of the grey man/woman let me explain and I’ll do this from three different perspectives: · The Executive Protection Specialist · The Sheep · The Wolf For the uninitiated the sheep are the unaware people of our society and the wolves are the bad guys out there. The Protection Specialist Cool names have been attached to the ‘Grey Man’. Hey, you would think being called the ‘Grey Man’ was a cool enough name, but there are a few more: invisible, covert, unseen, subtle and Nondescript are just a few more. It would sound as if ‘the protector’ has super powers and can disappear at will, move among us without our knowledge, only showing himself when the life of the client/principal is under threat. Please, this isn’t the movies, I happen to be one of these protection specialists. I work in the real world and I am sorry to burst the Bubble (OK I am not sorry) of those who believe in the Grey Man, but he is a myth. A myth started by training providers and perpetuated by those who blindly follow what has gone before with their only thought being, ‘hey the myth has been around for so long it must be right, who am I to challenge this concept’. The Sheep Within our society the Grey Man is just as much a myth as in the protection world. These members of the public, just your everyday people living there every day life with one big problem, they do not want to be noticed, they want to be Grey, they want to be invisible. The only thing is they do not know how to go about not being noticed.
You see them everywhere, head down looking at the ground or head in a book, ear phones on, trying to be small or scurrying about as if the faster they move the less noticeable they will be and the faster they can get from A to B the safer they will be. They don’t or won’t make eye contact; well you can’t if you’re looking down can you? They are like children who think they can’t be seen if they close their eyes. These are the sheep. The Wolf The big bad wolf sees everything. At the top of the wolf pack are the terrorists, murderers, kidnapers and rapists while lower down are the muggers, robbers and violent abusers. The upper echelons of the wolf pack see the so-called Grey Man of the protection detail trying to not be noticed, how? Because they have studied or taken our training, they know how we operate, where and how we stand, whether we are armed or not, formations, movements and driving skills, they know it all. The lower echelons of the wolf pack target the weak, timid and nervous, the unaware and the downright dozy. They see you darting about not hearing or seeing anything until it is too late. You may be grey to other law abiding members of the public but to the wolf you are very much in plain sight and you are their prey. There is no such thing as grey when it’s your life on the line. This is where everything is either black or white. Stay Dangerous V.I.P.A. Tactical Training. www.vipatacticaltraining.com
Issue 19
37
Medical All Photographs ©Prometheus Medical Ltd 2012
Breathing Assessment, Chest Injury and Management: Part 2 By Dean Bateman Following on from Part 1, Prometheus Medical’s Chief Instructor, Dean Bateman, continues the series on <C>ABC, with Part 2 of Breathing Assessment, Chest Injury and Management. Chest trauma is a significant source of morbidity and mortality and is one of the leading causes of death in trauma. This article focuses on chest trauma caused by blunt and penetrating mechanisms. Injury to the chest can affect any one or all components of the chest wall and chest cavity (thorax). These components include the bony skeleton (ribs, clavicles, shoulder blades, sternum), lungs, oesophagus, heart, great vessels of the chest (e.g. aorta), and the diaphragm. Chest injuries should be actively looked for and managed during the assessment of the patient under “B” of the primary survey <C> A B C D E. Using the ‘RISEN’ pneumonic, which was covered in depth in Part 1, will ensure any injuries present are identified rapidly: R – rate I - injuries S – symmetry E – effort N – neck signs There are many life threatening chest injuries, some of which are immediately fatal from massive direct forces disrupting the great vessels in the thorax. Listed below are the most common life threatening chest injuries:
38
Circuit Magazine
ATOMIC BOMB • Airway • Tension pneumothorax • Open chest injury (sucking chest wound) • Massive haemothorax • Incursion (flail chest) • Cardiac tamponade • BOMB Blast lung Tension Pneumothorax May be caused by blunt or penetrating injury from a knife, broken rib etc. The thin membrane surrounding the lungs (pleura) is penetrated. The pleura acts as a one way valve allowing air in during inhalation, but closes during exhalation allowing a build up of air around the lung. Pressure builds reducing effective ventilation, the lung collapses and pressure is placed on the great vessels in the thorax reducing blood flow to the heart and, therefore, reducing cardiac output. Signs & symptoms • Difficulty in breathing • Increasing respiratory rate • Absent breath sounds over the injured side • Hyper-resonant if percussed (drum-like) on affected side
Breathing Assessment • Chest wall over-inflated on affected side • Surgical emphysema (air trapped under the skin) • Distended neck veins (listed for completeness, but often an absent sign if the patient has suffered blood loss, as they often have) • Tracheal deviation away from the affected side (note that this is a very late sign and therefore not often seen).
avoid damage to the neurovascular bundle that lies along the lower edge of the ribs.
Management Pleural drainage is required to release the build up of air within the chest cavity but is not without risk and should only be carried out by an appropriately trained medic. There are two types of chest decompression:
Formal chest drain This involves making an incision through the 4th or 5th intercostal space anterior axillary line, then blunt-dissecting through the intercostal muscle and placing a drain into the thorax. This procedure takes time and should only be carried out by a competent clinician.
Needle chest decompression (also known as ‘needle thoracoscentesis’) This involves placing a wide bore needle in the 2nd intercostal space mid-clavicular line, above the border of the 3rd rib to
Open Chest Injury (Sucking Chest Wound) Usually caused by a penetrating object that enters the chest wall. Occasionally blunt injuries may result in an open chest injury from severe rib fractures. An open chest injury
Be aware that in approximately 50% of cases the needle isn’t long enough to pass through the anterior chest wall. If this is the case then the needle should be placed in the 4th intercostal space in the anterior axillary line.
Issue 19
39
Medical affects the mechanics of ventilation, especially if the wound is two-thirds the diameter of the trachea. The air is drawn in through the chest wall during inspiration and only partially expelled during expiration, eventually collapsing the lung and potentially creating a tension pneumothorax if left untreated.
The mechanics of ventilation are affected due to part of the chest wall moving independently, ventilatory failure will soon occur. Most patients with flail chest will also have serious underlying injuries within the chest cavity. Pain is usually significant and can also contribute to ventilator compromise.
Signs & symptoms • Bleeding • Open wound • Difficulty in breathing • Air may be bubbling through the wound
Signs & Symptoms • Multiple rib fractures leaving a “free segment” – this can move outwards with expiration and inwards with inspiration, doing the opposite to what the chest wall is doing, leading to the term, “paradoxical movement.” • Difficulty in breathing • Pain on respiration and palpation (often severe)
Management The open wound needs a dressing applied as early as possible; one that allows air to escape from the chest wall but prevents air entering through the wound. There are many different types of these dressings available including improvised three sided occlusive dressings, though improvised dressing tend to be very ineffective. Prometheus’ favoured device is its own “Russell Chest Seal™”, which is being adopted widely (see image). If more than one wound is present on the same side of the chest then the other wounds should be completely occluded where possible, or covered by valved dressings too. Massive Haemothorax A haemothorax (blood in the chest cavity) can result from penetrating or blunt trauma. The source of bleeding may be from injury to the lung, small vessels within the chest wall or the great vessels in the chest cavity. Each side of the chest can potentially hold half of the circulating blood volume, therefore early recognition and transport for surgical management is essential. Signs & symptoms • Difficulty in breathing • Poor movement on the injured side • Absent breath sounds on auscultation • Stony dull when percussed • Signs of hypovolaemic shock Management A chest drain will be required, usually in the hospital setting in order to drain the blood and assist ventilation and the patient may need surgical intervention to control bleeding. Carry out a good primary survey with high flow oxygen and arrange immediate removal to a medical facility. Flail Chest Flail chest is defined as an injury to the thorax where two or more ribs are fractured in two or more places. It is caused by blunt trauma with extremely high-energy transfer forces.
40
Circuit Magazine
Management Largely supportive, high flow oxygen, analgesia and immediate transport to a medical facility, reassessing the primary and secondary survey throughout and intervening where necessary. Cardiac Tamponade These injuries can be caused by blunt or penetrating trauma, although more commonly resulting from penetrating knife wounds to the heart. They have a very high mortality rate and are often fatal in the prehospital setting. Blood fills the pericardial sac, which is a fibrous membrane that covers the heart. As the amount of blood around the heart increases it squeezes the heart preventing it from filling and contracting, very rapidly leading to cardiac arrest. Signs & Symptoms • Signs of hypovolaemic shock • Patient pale and shocked • Beck’s Triad – muffled heart sounds, distended neck veins and hypotension (low blood pressure – no radial pulse) • Cardiac arrest Management Immediate transport to hospital for an emergency resuscitative thoracotomy by a specialist clinician. This involves opening the chest wall and removing the clots around the heart. The patient stands the best chance of survival if the procedure is performed immediately after collapse but this can only be done by highly specialised medical teams. Blast Lung Blast lung is a major cause of mortality for blast victims. The blast waves impacting upon the lungs can cause tearing, bleeding, contusion (bruising) and fluid to leak into the lungs resulting in poor ventilation and oxygenation. Patients may present with severe difficulty in breathing without any signs of external injury. The mechanism should be key to the diagnosis.
Breathing Assessment Signs & Symptoms • Difficulty in breathing • Haemoptysis (coughing up blood) • Chest pain • Decreased breath sounds Management Immediate transfer to hospital. Management of <C> ABCDE, high flow oxygen.
to “Breathing”, should be carried out using a systematic approach like “RISEN”. The pre-hospital management of chest injuries is very limited so early recognition, prioritised management, and early transportation is essential. The condition most amenable to pre-hospital management is the open pneumothorax (sucking chest wound) which must be covered with a suitable valved chest seal. Other chest injuries are treated supportively e.g. by providing oxygen and managing other conditions such as haemorrhage.
In summary all chest injuries have the potential to become rapidly fatal. Therefore, a rapid assessment of the patient using <C>ABCDE, paying meticulous attention
In the next edition of this series of articles, I will be covering ‘C’ – Circulation, describing effective assessment and management of circulation.
Dean Bateman is Prometheus’ Chief Instructor and has 20 years of experience of responding to medical emergencies in ambulances, fast-response paramedic cars, physician supported units and helicopters. In addition to his work in the UK, Dean also has experience of teaching in immediate medical care and providing medical cover in hostile environments across Africa. All photographs © Prometheus Medical Ltd 2012
Opinion
By Eric Konohia
There is an interesting sector of this industry that claims they want to do the job but they do not want to put in the hard work to get it. We are familiar with these individuals that specialize in wanting others to do it for them. Too often they mill around sending emails to others in the industry they feel have influence and ask for consideration. In moderation is one thing, but with too much frequency, It becomes the equivalent of street panhandling. If you talk to some of the owners of industry schools you may be able to identify this behavior at the onset. I have spoken to these owners and found that it is not uncommon for them to receive emails or other correspondence from potential students who express the highest interest in attending their schools. The dialogue usually has some version of, “I was born to do this!” Or “It’s in my DNA.” Then the most honest part of their plea comes out when they start with the “Hardship” speech. This is the first sign of the downfall. Every specialist in this industry knows that there is a constant investment that makes a successful tract in this CRAFT. There are some very kind hearted schools out there that make it happen for these individuals, but at what cost? One argument could be that enabling this behavior only adds fuel to their modus operandi and the cycle repeats itself once they complete the course. Some have even been documented on record as “biting the hand that fed them”. Shame. So what about those specialists that do finance their own way in the door? They have their own perception of how their careers will unfold. Too many feel that after they receive
42
Circuit Magazine
their certificate that somehow opportunities are waiting for them wrapped in a nice bow, or will somehow magically appear. Some wait for things to happen but another group starts grinding to make things happen. The former starts looking to be hand fed through the industry by reaching out to specialists and service providers in an attempt to get on a detail, whereas the latter group follows the proven process of continued training and establishing themselves in viable and fertile networks. Do other industries have the same issue? Universities and colleges pump out millions of students a year with no promise of employment and those that are aggressive after graduation find employment and are very lucky even if it is in their field of study. Closer to our dilemma is the latest trend where police certifications are acquired at certain colleges. When the student graduates he/she is certified under the training commission for the various police agencies in their respective states, BUT they are NOT guaranteed selection. In the past you went into the respective executive protection and law enforcement academies and schools under a conditional offer. In essence you were hired pending successful graduation. They [EP companies and Law Enforcement agencies] would put you through their
Front Right Seat academies to train you for that specific position. Today you enter the EP Schools and the police certification schools where you get trained with no guarantee on the other end. So the answer is yes, in a sense, people are trained for a certain field and it is their responsibility to fulfill their aspirations. There are 2 questions that need to be answered: Why do people come into this industry with the misconception that they don’t have to work hard and who is responsible for letting them know this beforehand? The answer to the first is the appeal of the job has been perpetuated by the media’s coverage of high net-worth individuals. They see the men and women protecting them and automatically associate them with a lucrative career because of who they are protecting. They catch the fever at that site and the excitement overwhelms them to a frenzy. The bait is set and the cycle begins. They search the internet and get inflated hourly and daily rates that are truly inconsistent to reality which further feeds the frenzy to a fever pitched desire to enter the industry. They Google the most used word for this industry “Bodyguard” training and then the calls begin. Enough of the how and why let me get to the “What”. If you or someone you know falls into the aforementioned category let me give you some advice on “What” you should do. The first thing you need to do is understand that this industry is brutal and waits for no one. Each and every service provider and specialist is working hard on a day to day basis to stay busy in this industry. There are peaks and valleys, ups and downs and ebbs and flows when it comes to the average specialist and work. Even the most seasoned specialists find themselves in moments of complete cessation. In those moments they do not sit back and wait for opportunities to happen, they make them happen. If you do not possess a hard work ethic and never give up mindset, this is not the industry for you. It takes years of this evolution of ups and downs before a specialist is able to be a “go-to” guy or gal. This type of mindset is not learned in the industry, you have to already possess it when you come in the door.
The odds are against you when you come into the industry. You are competing against thousands of specialists and selfproclaimed high speed operators. The fact is, many of you will not even get on a detail within the first six (6) months of completing your EP school. When you do get on a detail, you will not be operating at the same level of the person you first saw on television with the high net-worth individual. In fact, it may be YEARS before you are in a place where you are even used on the periphery of one of those details. These are the things you didn’t know about the great devourer. The CRAFT has ferociously chewed up specialists and spit them out along the way. For those specialists that are working frequently, yet you see yourself as being type cast as the low end guy or the halls and walls guy, there may be a reason. Have you considered that you’ve become settled with mediocrity and refused to build upon your platform to separate yourself from the field? Every year hundreds more enter into this competitive field making it harder for you to separate. You are holding yourself back by being comfortable with yourself. You have to consider that more and more specialists are entering the CRAFT already having additional competencies that elevate them above you. If you have been skating along and working frequently as that low-end guy and then “Johnny FaNug” graduates from ABC Executive Protection School with a combat casualty care certification, guess who may have just been replaced on the go-to list? Hard work will always beat talent, when talent refuses to work hard! There is no better quote that can sum this up. It does NOT matter how talented you are if you are competing against someone who works hard. I have never heard of anyone in this industry referred to as a “talented” specialist, but I lost count years ago to the “hard working” specialist reference. It’s that hard work ethic on and off the detail that keep you busy. False perceptions of having to work hard before you enter the industry will always result in a bad taste in your mouth and surely find you the door labeled – EXIT HERE.
“It takes years of this evolution of ups and downs before a specialist is able to be a “go-to” guy or gal.” Issue 19
43
Event
Smart Holistic Security Covered at Counter Terror Expo 2013 Transnational terrorism remains the most dominant national security threat. The need for good security to safeguard our nations, critical infrastructure, companies and individuals against terrorist threats is not reducing, but is instead emerging, adapting and evolving. Counter Terror Expo 2013, 24 â&#x20AC;&#x201C; 25 April, Olympia, London, will bring together diverse disciplines in a way that allows our nations, critical infrastructure, companies and individuals to develop an appropriate and proportionate security plan. New technology, innovations, strategies and solutions on display will show the best and most innovative technologies on the market, to a global audience spanning 68 countries representing the core interests of those most affected. Reducing Vulnerabilities On a micro level CTX 2013 brings to the foreground the widest range of security and counter terrorist products aimed at reducing the threat to individuals in vulnerable areas. Examples of safe rooms, panic rooms as well as live demonstrations of armoured vehicles vital for personal protection will be on display within the Armoured and Support Vehicle Zone. Holistic Security From a macro level we look at how Transport Security must also take a holistic view. Many of the threats remain the same and therefore many of the solutions and best practices
44
Circuit Magazine
can be applied to our maritime routes, ports, airports and public transport systems, just as they can to other areas of our critical national infrastructure. From perimeter security to access control, to emergency preparedness, to screening scanning and detection, Transport Security is a vital part of our holistic approach to counter terrorism at CTX 2013. Private Property â&#x20AC;&#x201C; do not enter It is easy to think that a business is not a vulnerable area due to its lack of proximity to a high threat area and that security
Counter Terror Expo 2013
is a secondary issue. Unfortunately that is rarely the case. Often large sites are unaware of their attractiveness to criminals, whether it is because of the value of the nature of the goods stored there or the potential disruption caused to supply chains by damage or threat. It is far too late to build good perimeter security when a group of protesters turn up and are incensed by your links to the energy industry, for instance. Therefore CTX also brings together, in one holistic forum, the latest perimeter security, access control and facility security techniques and technologies designed to react to the growing need to protect assets and sites. World renowned companies such as Frontier Pits and Cova Security Gates will showcase
the very best in hostile vehicle mitigation. Whilst, Avon Barriers, Betafence and Barkers Engineering will showcase tried and tested products that are successfully operating in highly sensitive and demanding environments. Protecting and Shaping Future Policy Over and above the huge range of solutions, technologies, products and service that are represented by our 400 strong exhibitor base, the 2013 event will also offer a new Cyber Security Solutions Zone and expanded Conference; a new Maritime Security & Anti-Piracy Zone; a new Oil & Gas Security Zone; and a new Integrated Security Solutions Zone and Workshop; all running alongside our hugely successful conference covering Global Counter Terrorism, Critical National Infrastructure, Protecting Crowded Places and the Cost of Terrorism to Business. Pre-registration is now open at www.counterterrorexpo.com
Issue 19
45
Feature
By Theo Allthorpe-Mullis & Dr. Amy Burrell media can be valuable tool for security professionals The Internet, and with it social media, Social working operationally in the field or behind the scenes, have without question revolutionised for due diligence research, intelligence gathering, and networking. It is a powerful tool and understanding it can the way people communicate and give you the edge. However, it also carries risks which must be taken into account by anyone, which of course includes organise. close protection teams, if they wish to use it effectively. Mark Zuckerberg, the inventor of the largest social networking site in the world, Facebook said, when asked said that “the most important thing is that we create an open information flow for people”. That is exactly what Mr. Zuckerberg’s site has done and it has proved to be an extremely potent tool, especially when applied correctly. For example, the Arab Revolutions clearly show the power of social media when it is applied to mass movements and
46
Circuit Magazine
Social Media protest. Through organisation on sites such as Facebook and Twitter the revolutionaries were able to network and organise in the early days of their uprisings. Social media pages were created that were dedicated to tracking police movements and, when local authorities caught on, the pages turned to providing them with disinformation. Where previously the Tunisian government could have controlled the flow of information, after the self-immolation of Mohamed Bouazizi and the subsequent protests, they became powerless to stop images of the police’s heavy-handed response to the protests being shown across Facebook, YouTube, and Twitter which led to further protests. These protests were also filmed and the videos put online. Protests in solidarity sprang up across the Arab world snowballing rapidly, blindsiding governments around the world and leading to a string of revolutions in what’s now known as the Arab Spring. Social Media as an intelligence gathering tool Social media sites, especially Twitter, are useful for open source intelligence gathering (OSINT) tools. It is very common for organisations and individuals to ‘Tweet’ regular updates on events. This can be very useful for security professionals, particularly close protection teams or military personnel working on the ground, as thanks to the speed in which ‘tweets’ can be made, it is possible to get real-time updates on events in the field. For example, during the intervention in Libya, North Atlantic Treaty Organisation (NATO) began to use Twitter as an OSINT tool to gather information about Pro-Gaddafi forces movements. NATO forces were therefore able to keep track of events on the ground better than they would have been able to if they had relied on Special Forces alone. Through Twitter and Facebook it is possible to develop a real-time perspective on a situation through the eyes of ordinary civilians, who may be more honest than official government sources, and the dissemination of this information (as previously asserted) is practically instant. In a close protection context, this instantaneous information transmission can be useful for team leaders in monitoring a potentially volatile situation in real-time. Social Media as a Due Diligence and research tool Social media can be a very useful tool for research and Due Diligence. For example, when researching an article for a University student magazine, contact was made with an organisation called ‘United Free Syria’ (UFS) through Facebook. UFS then put the first author in contact with a student protestor, going by the name of Nadia, who had been detained by the Syrian government for taking part in antigovernment protests. In the subsequent interview, carried out on Google’s social network Google+, it was possible to learn how ‘Shahiba’ or, as Nadia described them “Assad’s thugs”, infiltrated protests to identify ringleaders so that when the protest was ambushed they would be able to make arrests. Nadia outlined the tactics used by the government
“Social networks like LinkedIn, Facebook, Twitter etc. contain a huge amount of personal information which a close protection professional can access to do research on individuals with whom their principal may be meeting or interacting.”
to interrogate prisoners. As an ordinary citizen Nadia was able to provide a perspective of the situation in Syria that could not have been gained through official news channels or government sources. As Nadia’s example shows, social media in research can offer angles and views of a situation which may be very different from the official line views. In fact, the information may be closer to the truth than the official line, especially when it comes to what the public mood is. This is especially true in nations with corrupt governments who ban foreign journalists from reporting and/or with news agencies with an agenda which present a façade, and in nations or areas which may be too dangerous for traditional journalists to operate in effectively. Social networks like LinkedIn, Facebook, Twitter etc. contain a huge amount of personal information which a close protection professional can access to do research on individuals with whom their principal may be meeting or interacting. This information could prove critical for setting up a tailored close protection detail. Wider investigations on links between the principal and their contacts, and between their contacts and the wider world can also be conducted.
Issue 19
47
Feature Weaknesses of Social Media Despite the clear OSINT opportunities presented by social media, it does have drawbacks. Most obviously there is just so much of it. The sheer volume of information generated by social media makes it very difficult to filter the wheat from the intelligence chaff and so it takes time to filter through the information and identify what is (and what is not) relevant. Software designers have identified the problem and have written programs to help businesses and governmental organisations search information from social media site for keywords or phrases that may show trends in public opinion. These programs could also be effectively applied in the security world. However, the authenticity of the information gained is a potential problem as the reliability of information sourced from social media sites may be questionable. This may be a particular issue where it is written by ordinary civilians whose views of a situation may be biased or simply flat out incorrect. This may affect results gained and so it may be advisable to take information gathered from social media websites with a grain of salt unless substantiated by multiple sources. For a close protection officer, these risks have to be considered as information may not only be unreliable but could even be purposeful misinformation which may endanger the team if it is incorporated into close protection planning. It may also be wise to monitor the principalâ&#x20AC;&#x2122;s social networking activity to ensure that they are not posting anything that may put them at risk. This is especially important if the principal uses devices which contain geotagging software, which displays the location of the user
48
Circuit Magazine
when any post is made as this may unnecessarily endanger the principal and their close protection team. Conclusion The use of social media will never replace other OSINT and closed source intelligence tools for good quality intelligence gathering. However, if used correctly (i.e. taking into account the risks of unreliable information and misinformation), it can serve as a useful supplementary tool for close protection teams and other security professionals. About Theo Allthorpe-Mullis Theo is a final year student in International Relations at the University of Leicester. He uses social media extensively in his research for university projects and articles he writes as online news editor of the Universityâ&#x20AC;&#x2122;s student Magazine â&#x20AC;&#x201C; The Ripple. About Dr Amy Burrell Amy holds a BSc in Applied Psychology, an MSc in Forensic Behavioural Science, and has recently completed a PhD in Psychology. Amy is a Training Manager at Perpetuity Training; a company specialising in security and risk management training. As part of her role at Perpetuity, Amy is a tutor for students on the Security Institute distance learning programme, and also lectures on BTEC short courses and supports the development of bespoke training courses. To find out more about Amy and the work she does go to www.perpetuitytraining.com or email training@ perpetuitytraining.com
Opinion
WORKING GIRL
Sometimes we have to protect our principals from themselves, as you will well know if you have seen the recent TV footage of Justin Bieber having a go at the paparazzi outside his hotel before being hustled to his car by his CPO. Bieber then got out of the vehicle again to have another go, the CPO promptly put him self between JB and the paparazzi and then once again put him back in the car. There was obviously a lot of pushing and shoving but the CPO’s kept their calm and carried out their roles well, I don’t know them but a big well done for doing a difficult job with a difficult principal. Surveillance and counter surveillance is a part of our job and can be made even more difficult for the TL when operators turn up without the means to carry out their role effectively. When carrying out a job for my company or myself I at the very least expect the operator to carry with them an oyster card, passport, credit card and cash. I have lost count of the number of occasions I have had to follow someone to an airport having to get on a flight to keep the SOE (subject of enquiry) or “target” as we really call them under observation. It is standard across the industry to carry this as a bare minimum when working for serious surveillance companies, If you agree to come on a tasking and don’t have the above with you and get caught out it will be the last occasion working with mine and most other companies. Having a loss
on a target because you don’t have these standard items on you is unacceptable and highly embarrassing to all concerned. Always remember to be extremely careful when posting on social networking sites, there are bad guys out there whom trawl the likes of Facebook and Linkedin for operator’s personal details. I have a dislike of Facebook and have never had a profile on there. On occasions I have even had to get rid of operators whom have broke NDA’s (non disclosure agreements) after they have put details or photos of locations where they have been when working with a principal. The spring is finally here and we should all start to be very busy in the coming months as the London season starts to kick in. If you are new to the Circuit now is the ideal time to start looking at taking RST or festival work as this will gain you valuable experience and help to grow your network of contacts for the rest of the year. Stay Safe Jacquie Davis
Jacquie Davis is Director of Protective Services at Optimal Risk. Web: www.optimalrisk.com
Issue 19
49
FocusOn: NIGERIA
BACKGROUND The Federal Republic of Nigeria is the most populous nation in Africa with a population of 166 million, comprising 250 linguistic groups, almost as many ethnic factions and with a relatively even religious divide. Northern Nigeria is predominately Muslim while Christians make up the majority in the South with an uneasy mix in the central belt, where communities are more contentious. Nigeria is a former British Colony that has lurched from one military coup to another since independence in 1960, before returning to civilian rule in 1999, the fourth such creation of a republic in its history and one which has governed since. During this period of Republic, no fewer than 18,000 Nigerians have died in more than 600 incidents of communal violence – ranging from large urban hostility to the low intensity conflicts in the Niger Delta where disputes over land, rights or representation can quickly descend into violence, occasionally resulting in fatalities. Nigeria has an abundance of natural resources and boasts the largest oil and gas reserves in sub-Saharan Africa. However, due to endemic problems with an inefficient, corrupt military & civilian rule more than half of its people live in poverty. Trade in stolen oil has fuelled continued violence and corruption in the Niger delta -the home of the industry. Instability is a constant threat to the country and can be seen in its political, social and economic dimensions.
50
Circuit Magazine
RECENT SIGNIFICANT EVENTS • Amid mounting pressure for him to visit Yobe State, the heart of the Boko Haram insurgency, President Goodluck Jonathan visited the region on March 7 for the first time since he was elected in 2011. • Suspected Boko Haram gunmen attacked a bank and the police station in the village of Gwoza in Borno state, leading to eight deaths on March 4. • Nigerian troops killed 20 suspected Boko Haram militants in a botched attack on military barracks in the village of Monguno on March 3. • Gunmen shot dead a senior police officer of Kwara state, while he was visiting his home state of Enugu in southeast Nigeria on March 2. • Six sailors, including two Indians, kidnapped from an oil service ship off the coast were released unharmed by armed pirates on February 27. • On February 26, unidentified gunmen shot and killed seven men guarding a market in Yobe state. • On February 20, Nigeria’s State Security Service said it broke up what it characterized as a terrorist group, backed by “Iranian handlers,” that attempted to gather intelligence about locations frequented by Americans and Israelis. • Armed gunmen abducted seven foreigners at a construction company’s compound in Jama’are on February 16 conflict. Meanwhile, one person was killed in an explosion on the outskirts of the capital, Kabul. Several more were injured in the blast, which took place just off the Jalalabad road, home to many NATO bases and compounds housing international staff. The explosion happened near the offices of an international construction company, but it is unclear what the target was.
Intel
Niger Sokoto Katsina Jigawa
Zamfara armed robbers stopped vehicles and robbed dozens of cars on the Abuja-Kaduna Road, collecting nearly all possessions from occupants.
Benin
Kaduna
Niger
Abuja FCT
Kwara Oyo Osun Lagos an explosive Ogun device went off near Festac, a residential district of Lagos, killing a man and seriously Lagos wounding a policeman.
Borno
Bauchi
Bauchi seven foreign workers were seized and a security guard was shot dead by Plateau gunmen who attacked a construction company site.
Nassarawa
Gombe
Gwoza Borno, suspected Boko Haram gunmen attacked a police station, resulting in eight deaths.
Enugu the new Kwara State police Adamawa commissioner, Chinwike Asadu, was shot dead by unknown gunmen in the AmorjiNike area within Enugu metropolis.
Taraba
Ekiti
Kogi
Cameroon
Benue
Ondo
Bayelsa six foreign sailors were kidnapped when a group of pirates stormed the Armada Tuah ship 40 miles off the coast of Bayelsa state.
Yobe
Borno three suspected Boko Haram gunmen attacked the premises of the Nigerian Flour Mills in Maiduguri, and kidnapped its Administrative Manager at gunpoint.
Kano
Abuja-Kaduna
Kebbi
Potiskum Yobe, assailants killed three North Korean doctors, beheading one of them. This attack followed gunmen killing nine women who were administering polio vaccines in Kano.
Edo
Enugu Ebonyi Anambra Yenagoa roughly Cross River Qua Iboe 100 former militants ImoA biademanding Delta protested Bayelsa
the release of 250 of their members detained by the state police Akwa command.
Rivers
Ibom
ExxonMobil declared force majeure at its loading terminal, as a result of unspecified pipeline damage.
Issue 19
51
FocusOn: NIGERIA
KIDNAPPING Context: Violent crime is widespread which includes violent street crime, armed robberies, carjacking’s, kidnapping and rape. Nigerian nationals are most affected, but expatriate personnel without adequate security will be seen as lucrative targets due to their perceived wealth. Crime levels are highest in the Delta regions and Lagos, but the threat remains high nationwide. There is a strong history of kidnapping in Nigeria where the tactic has evolved away from purely targeting political and expatriate oil sector workers by militant local groups to a more commercially driven model adopted by criminal gangs. Trends indicate that kidnap risk has subsequently spread inland from the traditional hotspots in the Delta region and will continue to do so. Recent Incidents: Gunmen attacked a camp for a construction company in rural northern Nigeria in February, killing a guard and kidnapping seven foreign workers, in the biggest kidnapping yet in a region under attack by Islamic extremists. The hostages included three Lebanese workers and a Briton, a Greek, a Filipino, and an Italian, one of which was a woman. The attack happened in Jama’are, a rural town located roughly 200 km (124 mi) north of the state capital, Bauchi, in Bauchi State. The gunmen first killed a security guard to enable access to the company’s compound. The militants then attacked a local prison, burning two police trucks. They then proceeded to attack a workers’ camp set up by Setraco, a Lebanese construction company that is building a road in the area, and then abducted the foreign workers. The attackers brought explosives with them, showing that they were well prepared. Ansaru, an al Qaeda-linked militant group that broke from Boko Haram, claimed responsibility for the attack and purports to hold the hostages. Shortly after the abduction, the group issued a statement linking the kidnapping to the French intervention in Mali. Prior to this, a similar incident occurred
52
Circuit Magazine
in December 2012, when 30 gunmen attacked a compound and kidnapped a French engineer. Ansaru also claimed responsibility for the attack. Foreigners have long been abducted by militant groups and criminal gangs for ransom in Nigeria’s oil-rich southern delta, and have become increasingly targeted in the north as the violence has grown. The next day, six foreigners, including three Ukranians, two Russians and an Indian, working on the Armada Tuah vessel operated by the Lagos-based Century Group were seized by gunmen 40 nautical miles off southern Nigeria. In the days after the kidnapping, police announced that the pirates issued a 200 million naira ($1.27 million USD) ransom demand. However, police claim the kidnappers abandoned their hostages unhurt on February 20 while Nigeria’s security forces were in pursuit. This is at least the sixth attack off Nigeria’s coast in the month of February, making it a noticeable upsurge. Similarly, a French family of three adults and four children were kidnapped on the Cameroon-Nigeria border on February 19, with officials suggesting the involvement of Boko Haram. The family, who live in Yaounde, Cameroon’s capital, was picked up by men riding on motorbikes near the frontier town of Dabanga, where their vehicle was recovered, 6km (3.72mi) from the Nigerian border. While the hostages were taken away from a crowd, witnesses could not assist the family because the kidnappers were heavily armed and they threatened to shoot anyone that approached. The broader area they were captured from, Waza Park, is a natural wildlife reserve which attracts mainly foreign tourists. No one has yet claimed this kidnapping, which was the first such occurrence in northern Cameroon but took place within Boko Haram and Ansaru’s area of operations. The family was then allegedly taken across the Nigerian border into a region of semi-desert where Boko Haram has its base, near Maiduguri. Military helicopters have been used to search for the tourists who were abducted from Cameroon’s Far North Region, according to a Cameroonian government official.
Intel
Following the kidnapping, the captors released a three-and-ahalf minute video outlining their grievances, which was posted to YouTube on February 25. In the video, one of the hostages, reading from a piece of paper, states that his captors are Jama’atu Ahlis Sunna Lidda’awati wal-Jihad, the official name for the Islamist militant group commonly known as Boko Haram. Also in the video, the captors say the family will be killed if the hostage-takers’ demands— “the liberation of their brothers in Cameroon and their women imprisoned in Nigeria”— are not met. If the video is actually from Boko Haram, then it shows us how this organization is metamorphosing from being a local group with a mainly Nigerian agenda into a more international jihadist organization. However, the group is not known to abduct Westerners, making some analysts weary of whether they did in fact carry out the abductions. Given that Ansaru, an offshoot of Boko Haram, claimed responsibility for the abduction of foreign workers on February 16, they could also be responsible for this abduction. As of going to print the hostages have yet to be released.
to prevent any one region from dominating the country over the long term. Under the system the distribution of power is regulated among the country’s six geographic regions. Yar’Adua’s death and subsequently Jonathan’s unexpected assumption of the presidency, the power-sharing dynamic was upset.
POLITICAL Context: Politically, civilian rule has gained a modicum of resilience with the current Fourth Republic outlasting all previous civilian governments. However, this equilibrium rests precariously and could easily adapt a negative slant if certain catalysts were realized. Weak legislature, courts, police and civil service are all real factors, which contribute towards the problem of governance in Nigeria.
TERRORISM Context: Terrorism from both domestic and transnational groups is a credible, but largely incidental security risk to operations and personnel in Nigeria. Attacks against both military and civilian targets are commonplace, although largely restricted to the northern states and the capital city. A range of tactics is applied including kidnappings; bombings and small arms fire attacks.
Recent Developments: After much debate about President Goodluck Jonathan’s eligibility to run for a second term in 2015, an Abuja High Court has ruled in his favor. The Court, on March 1, ruled that he can contest the forthcoming 2015 Presidential election if he so desires. Jonathan’s assumption of the office of the President after the death of the late former President Umaru Yar’Adua was in line with what the National Assembly aptly described as “doctrine of necessity” and not as a result of emerging winner in any bye election conducted after the death of the late former president. As stated under the country’s 1999 zoning agreement, the country has a power-sharing system designed
The insurgency in the Niger Delta directly effects the country’s petroleum production, accounting for more than three-fourths of government revenue. The 2003 elections indirectly sparked the growth of insurgency as political players and ‘note-worthies’ armed and financed militant groups to act as proxies in aiding their political aspirations. Post-election, many of these redundant militants formed the basis of what is now the Movement for the Emancipation of the Niger Delta (MEND). In order to add potency to their mission statement (to attain development, environmental remediation and resource control within the Delta region) MEND has taken responsibility for several high profile bombings and attacks.
Although Jonathan has not openly declared his interest in running for a second term, saying he would wait until 2014 before announcing his decision, his party, the People’s Democratic Party (PDP) already appears to be divided into pro and anti-Jonathan camps ahead of the presidential race. Outside of his party, Jonathan is facing significant opposition to a possible re-election bid. Apparently, northern leaders have embarked on a plot to checkmate Jonathan. Local sources claim that the anti-Jonathan camp reached out to former President Ibrahim Babangida, while the pro-government group, coordinated by Vice President Namadi Sambo, who is battling to retain his position in 2015, and received briefs from his foot soldiers during the special convocation of the Ahmadu Bello University in Zaria over the weekend.
Issue 19
53
FocusOn: NIGERIA Recent Incidents: The military said that it killed 20 fighters from the Islamist group Boko Haram in the north-eastern state of Borno on March 3, while repelling an attack by the group. According to an army spokesman, the militants were killed as they tried to seize military barracks in the village of Monguno, about 200km (124 mi) north of Maiduguri, left at least 20 people dead on March 3. The attack saw fighters arrive in SUVs and kill a local village leader, which was then followed by an attack on a barracks in Monguno with gunfire and explosives. The military destroyed their four-wheel vehicles and motorcycles, while seizing seven AK-47 rifles, ten RPGs, and a large quantity of assorted ammunition. Gunmen shot dead a senior police officer who was visiting his home state of Enugu in southeast Nigeria, but the motive and identity of the suspects remain unclear. Chinwike Asadu, the police commissioner of Kwara state in central Nigeria, was killed in the evening on March 2 by gunmen in a bus who trailed his car and shot him as his driver was entering his compound. Asadu’s driver, Oliver Omeh, and orderly, Aloha Olaniyi, were also shot, though they survived the attack. Asadu served as the head of the mobile police unit in Kwara prior to being appointed last month as the state police chief. An investigation is ongoing to track down the perpetrators. Factions of the ACP opposition party, said the death reinforces the belief in certain circles that Nigeria is fast becoming a failed state. FLASHPOINTS TO MONITOR Oil Theft • Nigeria’s oil industry appears to be at a crisis point because the theft of oil from pipelines and the pollution it causes are reaching intolerable levels, costing the country and oil companies billions of dollars a year. On March 4, Shell raised alarm over “unprecedented” oil theft, particularly related to the sabotage of one of its key pipelines, and called for urgent action to address the problem. • According to officials from Shell, the problem of oil thieves breaching its Nembe Creek pipeline has gotten so bad that it is allegedly considering shutting it down. This would cut off 150,000
54
Circuit Magazine
barrels a day of crude supplies worth around $15 million a day at current market prices. The pipeline accounts for 90 km (56 mi) of the 6,000 km of pipelines that Shell operates in Nigeria. • Oil theft is a longstanding issue in Nigeria, often leading to supply disruptions and environmental pollution when thieves drill into pipelines in order to siphon off the crude inside. The problem has become increasingly troublesome as the volume of oil being stolen in February is the highest in the last three years—with over 60,000 barrels per day from Shell alone. • Shell’s figures for how much oil is being stolen from pipelines appear to contradict those coming from the Nigerian National Petroleum Corp. According to the NPC, the volume of oil stolen on a daily basis throughout the country was between 50,000 and 80,000 barrels per day. In the fall, Shell pegged the cost of oil theft at over $6 billion per year, based on estimates that more than 150,000 barrels a day are stolen in the country. It is clear that thieves manage to target hard-to-reach areas where there is a smaller security presence. Meanwhile, activists argue that the company does not do enough to prevent such incidents and effectively clean up the damage when they do occur.
MEDIUM-LONG TERM Boko Haram Negotiations The latest string of Boko Haram attacks this quarter, coupled with the recent kidnappings of foreigners claimed by Boko Haram and its affiliates, offered fresh doubts about the ability of Nigeria’s weak central government to stop the bloodshed, despite its deployment of more security forces in the region. On March 7, amid mounting pressure to visit Yobe state, the heart of the Boko Haram insurgency, President Goodluck Jonathan visited the region for the first time since he was elected in 2011. His visit followed calls this week from Nigeria’s top Islamic figure, the Sultan of Sokoto, Mohammed Abubakar, for an amnesty deal for
Intel insurgents. The Sultan proposed that the Jonathan administration announces an amnesty deal similar to that applied to the Movement for Emancipation in the Niger Delta (MEND) in 2009. During his visit, Jonathan said he could not rule out an amnesty deal in the future, but said it was not feasible to negotiation an agreement with Boko Haram due to the lack of clarity regarding the identities and demands of the militants.
“Human rights organizations estimate roughly 3,000 Nigerians have been killed” Human rights organizations estimate roughly 3,000 Nigerians have been killed in violence related to the militant Islamist group Boko Haram just over the past three years. Since then, numerous negotiation attempts have been stalled due to distrust on both sides, and the factionalized leadership of the group’s different cells. The recent kidnapping of seven foreigners claimed by Ansaru, an offshoot of Boko Haram, demonstrates the challenges the Jonathan administration is facing regarding negotiations. Given that past attempts at dialogue with the group have not borne fruit, future efforts look to hold little promise. The apparently successful French action in Mali could incline the Nigerian government to adhere to a military solution in its north down the road, rather than pursue dialogue. POLITICAL As the elections approach, Nigeria will likely continue to face a rising domestic political crisis. National elections in Nigeria are often shaped by extensive violence and intimidation, including the role of militias. To help Jonathan get elected in 2007, the political elite in Jonathan’s home region of the Niger Delta supported
militant attacks through the MEND. Pipeline sabotage and expatriate kidnappings in the Niger Delta were part of the campaign and will likely be replayed in the next election cycle. Since Northern Nigeria feels it had been cheated out of its chance to hold the presidency, due to the death of former President Yar’Adua, Boko Haram has led the way in prompting unrest in the region. They have been waging an increasingly violent campaign to destabilize northern Nigeria in a bid to make the region ungovernable and force the Jonathan administration to sue for peace and yield the presidency. If Jonathan goes ahead and seeks a second term, northern Nigeria will very likely see additional attacks. As the string of recent kidnappings of foreigners and the killing of the North Korean doctors has demonstrated, these attacks could very well target non-Nigerians. In related news, on March 5, local sources reported there are strong indications that Jonathan will drop Vice President Namadi Sambo as his running mate in the 2015 election. Apparently, Jonathan’s strategists recommended that Sambo be dropped for one of the PDP governors in the northwest zone, as a strategy for grabbing the support of the three northern zones. It is likely that Jonathan’s main worry about Sambo is his inability to organize a strong political base in his home state of Kaduna and the north, given his serial electoral losses in previous elections. As the elections approach, tensions between parties are very likely to intensify alongside the destabilizing forces of Boko Haram.
Shaun West
By Shaun West Working as a self-employed security professional can be very rewarding but it can also take over your life at times if you let it! I have found one of the most useful skills needed, which is not taught on any Bodyguard course is that of time management. By this I am not talking about the time management of our clients as we have very little control over this, I am talking about the planning of your own personal time, the time that you allow yourself to complete any administration that you have to do. You must make best use of your time whether your role allows you a lot of free time or whether your time is limited and you have to cram everything in when you can. More so if your situation is mirrors that of the latter! We as human beings are not machines and to be as productive as we can be we have to manage our time effectively to enable time to relax and recharge our batteries.
56
Circuit Magazine
Time Management
If time is not managed correctly things can quickly build up and get on top of you, this can affect your sleep and will definitely affect your thought process if you have an evergrowing “to-do list”. When looking at time it can be classified in two categories “clock time and real time”. Clock Time There are 60 seconds in a minute, 60 minutes in an hour, 24 hours in a day, 7 days in a week and 365 days in a year. Real time This is where time is relative, which means time will drag or fly depending on what we are doing. As the saying goes “Time flies when you are having fun” however when you are carrying out those mundane everyday tasks time will do anything but fly! No matter what type of job you do your time can only be spent in three ways: thoughts, conversations and actions. A large proportion of people go through life where a large portion of their time is spent “in thought” as opposed to “action”. If this is the case for you then your to-do list will get longer and longer and your relaxation time will get shorter and shorter. The positive thing about “real time” is that it’s mental; it is the time you personally allocate yourself. You must remove yourself from any distractions Sky TV, Xbox or whatever it is that usually sabotages your time to take advantage of this. Of course you cannot eliminate all interruptions but there are some you can certainly limit moving forward. By using your time effectively you will find you will enjoy the afore mentioned interruptions a lot more when you know you have nothing pending to take care of. Time Management Tips • Take 30mins to plan your day, give yourself a plan, allocate the time to complete and get ticked off items you have pending. Have the discipline to stick to this, its greatly
rewarding as these tasks get ticked off one by one. • Before making any phone call take 5mins to decide what you would like to achieve from the call, also take a little time after to reflect on whether you managed to achieve what you set out to achieve. If not, why not and how can you make it happen next time? • If you have work you must attend to without disruption put a “Do Not Disturb” sign outside of your door or go to a library or somewhere quiet where disruption will be minimal and you can give your work your full attention. • Prioritize your work so the most important and time sensitive items get taken care of first. • If you are using your computer block out distractions like Facebook and other forms of social media unless you use these tools to generate business. It is amazing how much time can be stolen getting sucked into social networking sites. • Use any transit time you have well, dead time on trains and at airports are great to catch up on and empty your inbox or complete any IT related admin. This is “dead time” take advantage of it! • Carry your equipment, you should have some form of IT device (Laptop, iPad etc) with you at all times if possible so you can take advantage of any spare time that may come your way. • If you have too much to do, say “No”. People will understand! Remember that it’s impossible to get everything done…….. there is a saying that 20 percent of your thoughts, conversations and activities produce 80 percent of your results so make these thoughts and conversations count! You may ask why a ”Time Management” article in a Close Protection Magazine? Because as a security professional to stay on top of your game you must stay on top of your own personal administration! It is no good going on task having your personal thoughts clouded, if you have too much pending on your mind it will impede on your decision making, thought process and reaction time. Stay Safe.
“Prioritize your work so the most important and time sensitive items get taken care of first.” Issue 19
57
Review
An old saying goes: “I would rather have it and not need it, than need it and not have it” What the phrase refers to could be numerous; cash, a tourniquet perhaps, maybe even a sharp knife, but until now, never a Mask.
Readi Mask can be found on YouTube at http://www.youtube. com/watch?v=MnhgyQZEseQ
Explorer Travel Security recently reviewed a new piece of safety equipment called the Readi Mask. After some testing this mask now ranks on our list of things we would rather have and not need, than need and not have.
What we think it is best suited for? 1. Surviving fires: • Stops smoke particles from getting in eyes • Reduces deadly smoke particle (soot) inhalation
Readi Mask is a new innovation in eye and respiratory protection. It is a small, fully sealable facemask that comes with and without an integrated eye shield and also comes in adult and child sizes. This particulate mask forms a barrier in seconds to smoke particles, liquids, bacteria, viruses, spores, pepper spray, and a large host of other potentially dangerous particles. It is not like the N95 masks that doctors and nurses wear or the masks seen worn by the public during the Bird Flu pandemic. Those masks are not airtight at the perimeter and do not protect the wearer as much as they protect those around the wearer - hence the main reason doctors and nurses wear them in surgery – primarily for the patient’s benefit.
Both of these are vital in helping to escape buildings, boats, trains, planes or any scenario with smoke filled areas. In a fire, smoke can blind people very quickly making escape more difficult. Coupled with this, inhalation of just one breath of smoke can cause serious respiratory issues. This mask can buy valuable minutes when escaping a fire/smoke situation. The fact that it can be applied in seconds and carried on one’s person at all times makes it that much more suited to purpose. “I carry the Readi Mask™with me and would use the Readi Mask™. I do not hesitate to recommend its use for its intended purposegiving people time to escape from a fire or other emergency situation where breathing or vision could be impaired.” Richard A. Marinucci- Fire Chief
Readi Masks, on the other hand, are particulate, filtering facepiece masks that use a hypoallergenic medical adhesive to create a seal at the perimeter, thereby preventing more than 95% of dangerous particles from entering the lungs. They are not like any other mask. Instead of being bulky and conjuring up images of the gas masks used by riot police, they are instead taken from a small pack that can fit in a pocket. It can be applied within seconds, instantly forming a barrier that offers protection to a standard higher than most other masks on the market. How does it work? Simply take it out of the package, remove the band-aid like release liner, and place on your face sealing the medical adhesive around the forehead and cheek, and then sealing the end around the chin. Voila…a fully sealed facemask that forms a barrier to nearly everything you can think of. A demonstration of the
58
Circuit Magazine
2. Escaping pandemics or biological attack: • The mask filters out over 95% of viruses, bacteria, pathogens and spores. If there were another flu pandemic or bacterial/biological attack, simply applying this mask would help filter out these potentially deadly items. The 2009 flu pandemic infected an estimated 61 million people nationwide, resulting in 274,000 being hospitalized and killed over 12,000 people. If outbreaks occur, masks could be worn to assist in exiting high-risk areas safely. What could the future pandemics hold? The below article from the Daily Mail highlights how easily a strain of flu could cause levels of devastation not seen since the Spanish flu of 1918 that killed over 20 million people.
Masking The Risk “A group of scientists is pushing to publish research about how they created a man-made flu virus that could potentially wipe out civilization. Virologist Ron Fouchier of the Erasmus Medical Centre in the Netherlands lead a team of scientists who discovered that a mere five mutations to the avian virus was sufficient to make it spread far more easily. The deadly virus is a genetically tweaked version of the H5N1 bird flu strain, but is far more infectious and could pass easily between millions of people at a time. He conducted his tests on ferrets as the animals have become a model of choice for influenza and have similar respiratory tracts to humans. The research done was part of an international drive to understand H5N1 more fully. Fouchier admitted the strain is ‘one of the most dangerous viruses you can make.’” Read more: http://www.dailymail.co.uk/sciencetech/ article-2066624/Anthrax-isnt-scary-compared-Man-flu-viruspotential-wipe-millions-created-warns-frightened-scientist. html#ixzz2Hp0ToUhQ Why every security team should have them to hand. Security Teams: • The client’s safety is the priority at all times, threats are far more varied than just kidnap and attack. Fire and infection would both rank highly on a list of possible risks to clients and their families. • Escaping and surviving fires in hotels, accommodations or forms of transport. The mask would significantly improve vision and breathing for both the client and security team. American Ambassador Chris Stevens died in Benghazi from smoke inhalation before a rescue team arrived. Heavy diesel filled smoke filled the building and visibility was severely hampered. If security teams and the ambassador had safety masks on, could they have performed more effectively with improved vision and less hampered breathing? Could the Readi Mask or a similar mask have bought the ambassador some more time, increasing chances of survival? • A number of affordable and easy to carry Readi Masks could make a big difference in certain situations for both the client and the security team. Medics: • Airborne and fluid borne pathogens and liquids can pose significant risk to medics in close proximity to patients. Readi Mask provides a barrier not only to the respiratory system but the eyes and face also. • Small and easy to carry, but disposable after use. • Proven to extremely high standards and passed every test with flying colors. List of advantages • They are affordable at $7 each. • They are small and easy to carry in a pocket or bag. • They are very easy to put on.
• You can wear glasses over them. • They have passed a large number of tests and are the only mask on the market to have passed the TIL test (We wont bore you with the details but basically it is a very good sign of its effectiveness). • Many other possible uses include: respiratory and eye protection in explosions, earthquakes, volcanic eruptions, dust/sand storms, radioactive particles, mold remediation, construction, mold remediation after a flood, and protection in freezing temperatures, etc. • Some locations where Readi Mask can be beneficial: hotels, airplanes, trains and subways, cruise lines, hi-rises, schools, stadiums and convention centers, etc. • There are masks with eye shields and without eye shields. • Readi Masks are Made in the USA • Adult and Child Sizes List of Disadvantages: • You won’t win any fashion awards wearing one. • It may give a false sense of security in certain emergency situations. Though it can give vital extra minutes in smoke and fire conditions to assist escape, it is not effective against carbon monoxide. It filters the byproducts of smoke before carbon monoxide reaches lethal levels and so it is a tool to escape and not an excuse to sit in a room whilst waiting for the fire services to save you. • The face must be dry when putting the mask on and sealing it, otherwise a true adhesive seal may not be formed. • Not re-usable (though a re-usable one has been developed and will be on the market later this year – it is currently available for large bulk purchases). Our overall opinion The manufacturers asked a number of specialists what they thought were the best masks on the market. One switched on guy responded; “The one that you have with you.” The Readi Mask has that advantage over every competitor that it is small enough to carry with ease and extremely effective for purpose. For under $10 this is a fantastic bit of kit that by all accounts fills its role perfectly. The majority of people may never use it, but just as we mentioned earlier, if you ever do need it, you will be very thankful you have it.
Article written by Explorer Travel Security Use the code: Explorer to get 10% off the Readi Mask Explorer Travel Security is a dynamic and elite travel security company dedicated to managing the risks of individuals and groups traveling. Through our collective experiences at the very highest level of risk-management and counter-terrorism we are able to offer unique and bespoke training and security packages to our clients. Based in the greater Washington D.C area.
Issue 19
59
Classifieds
To place a classified lineage or box advertisement telephone our sales team on: +44 (0) 191 6450 865
CLASSIFIEDS United Kingdom
3D Security Ltd Taunton, Somerset, TA1 1TG Based in Taunton 3D Security provides security services for a wide range of clients. Whether you need a security guard in Somerset, event security in Leeds or Close Protection in London we will provide a solution for your needs. T: +44 (0)1823 253 001 W - www.3dsecurity.org E - enquiries@3dsecurity.org.uk A.B.I. Solutions A.B.I Solutions is a dynamic, forward thinking company, specialising in surveillance, security and investigations with local, national and internationalexperience. A.B.I provides a wide range of services to the corporate sector and individuals alike. W - www.abisolutions.co.uk Amanda Campbell A highly motivated and experienced female operative both CP and Surveillence training T – 07596542249 W - www.amandacampbell.org.uk E - ac@amandacampbell.org.uk Ambassador Security Management ASM MK Lions Arena, Grafton Court, Snowden Drive, Winterhill, Milton Keynes, MK6 1AJ, GBR. After successfully gaining ACS (Door Supervision and Manned Guarding) along with ISO 9000, we here at ASM have a dedicated management team with hundreds of years combined experience in the security industry. W: www.asmsecurity.co.uk E: scott@asmsecurity.com T: 08458335750 Ark Personal and Asset Protection Ark, 2b Crow Lane, Rochester, Kent, ME11RF, GBR A small, efficient, highly descrete company employing ex special forces and detectives for all civil and corporate covert needs. E: Office@arkprotect.com T: +0044 01634 845526 Argus Europe County Durham Argus Europe has been providing specialist training for high-net worth clients and their families for close to 20 years, worldwide. Argus Europe now offer accredited training for CPO’s, Surveillance Operators and Private detectives. Argus Europe is an operational company working globally with an extensive variety of contracts. W: www.arguseurope.co.uk T: +44 (0) 8456 123 843 Atlantian Business Solutions Group Rutland, LE15 6SD, GBR Atlantian Business Solutions has been designed to help both individuals and New Companies build for the future as well as support others with training needs. T: 07725970954 W: www.atlantianbsgroup.com E: info@atlantianbsgroup.com
60
Circuit Magazine
Briareus Security Our aim is to give a complete, discreet and professional service to all of our clients, be they large corporations, small businesses, local authorities or private individuals, all tailored to meet their individual needs. W: www.briareussecurity.com E: info@briareussecurity.com
Alastair Christie Advice on site security, perimeter fencing, lighting, CCTV and manning requirements. Monitor and advise on guard force setting up site procedures and guard SOP’s. T : +44 (0)7736 328112 E : ally.c9496@yahoo.co.uk Control Risk Management Solutions - CRMS Ireland Executive Close Protection Operations & Training (B Tec Level 3 Diploma Edexcel) Threat & Risk Assessments, Consultancy Services. W: www.crmsinternational.com E: martin@crmsinternational.com Crest Security & Surveillance Ltd 51 The Crest, West Heath, Birmingham, West Mids, B31 3QA, GBR Highly experienced Security Consultant with a proven record of accomplishment in the field of protective security. Skilled in all phases of risk assessment, operational planning, logistical organisation, implementation of security measures, security team leadership, project coordination, and delivery of security advice to a high profile clientele. E: info@stephencahill.co.uk T: 447977071427 CSI Protection Ltd International, GBR A well established security consultant and personal protection operative providing high or low Key protection to high risk and prestigious clientele. Specialising in the maritime industry as a consultant for private vessel protection on super yachts world wide. W: www.csi-protection.co.uk E: gary@csi-protection.co.uk Custodia Custodia is an independent client focused Specialist Security & Risk Management Company, specialising in Risk consultancy and Security project management. Providing a comprehensive portfolio of Risk mitigation solutions to assist Businesses and individuals to plan for, manage and mitigate risk. T: 01432 277693 W: www.custodia.co.uk DF Risk Management Solutions DF Risk Management Solutions N.I. is a modern, professional risk management company, with a diverse range of global strategic experiences and a team of executives who possess dynamic but complementary backgrounds. T: +44 (0)7837642686 +44 (0)7758743918 W: www.dfriskmanagementsolutionsni.com Executive Protection Officer Worldwide CP services W: www.executiveprotectionofficer.com
First Class Executive Security Nottingham, UK, Nottingham based, full-service company specializing in Bodyguards and Security Consulting services. Extensive experience in VIP security, also caters for public and private sectors. W: www.firstclasssecurity.co.uk T: 0115 9266466 G6 Global G6 are specialists in all types of radio, telephony and satellite communications for both voice and data with particular emphasis on covert communications installations in both vehicles and fixed locations. In addition, our range of personal covert radios and bespoke accessories is extensive. W: info@g6-global.com T: +44 (0)1454 610050 Gordon Russell Highly trained frontline Close Protection Operatives available for UK and International contracts. Our experienced CPO’s can offer bespoke packages to meet all clients needs, including a variety of language skills. All SIA licenced, BBA member E: Bodyguard-cpo@Email.cz T: +44 (0)7917 281 004 James Izett All close protection task undertaken, including training tasks. Medic (Registered with the HPCSA, Registered FAAW instructor and Assessor E : J.Izett@gmail.com T : +971 (0)505 574 350 Janice Gurney Proficient and diligent Security Professional gaining extensive knowledge and experience within the security sector. Proactive individual who has a logical, flexible and conscientious approach to all challenges undertaken, ability to work as a member of a team or as an individual willing to work anywhere. T : +44 (0)7885 793061 E : janice382006@gmail.com International Centre of Special Training International Centre of Special Training is an international training and security company based in the United Kingdom. Its priority objective is to provide services to the highest level. W: www.icost-team.com T: +44 796 736 55 65 IPSS Security Northfield, Aberdeen, AB16 7EX Security and protection services - UK and overseas. BBA Member. T: + 44 (0) 1224 69455 W: www.ippssecurity.co.uk ISS Training Ltd Riverside Cottages, Nidd Walk, Pateley Bridge, Harrogate, HG3 5NA ISS Training Limited are providers of specialist covert surveillance training courses and publications to the security and investigative industries, enforcement agencies and specialist military units. Formed in 1990, we are the longest established surveillance training company in the United Kingdom. Our credibility and reputation
is widespread and we offer nationally recognised qualifications. BBA Member. T: + 44 (0) 1423 712265 W: www.intelsecurity.co.uk Jason Morris Security Hertfordshire, UK Providing a wide range of Door supervision/ security for V.I.P and prestige venues, Concerts, Functions, Corporate and Personal Security, Weddings, Private Parties, Gala Dinners, Business Awards & School Proms, Close Protection and Body Guarding Static Guarding and Stewards. T: 01462 478900 W: www.jasonmorrissecurity.co.uk E: agosselin@jasonmorrissecurity.co.uk John Featherstone Security professional with operational experience gained in a variety of theatres. Main specialities close protection and surveillance. T: 24hrs : +44 (0)7702 740722 E: john@johnfeatherstone.co.uk W: www.johnfeatherstone.co.uk K9 Support Services Ltd K9 Support Services UK Ltd is a supplier of specialist drugs and explosives dog/ handler detection service (which includes arms & ammunition) to individuals, businesses, and the public sector. T: 0845 643 6393 E: info@k9support.org.uk Logas International Tyne & Wear, SR1, GBR Front line SIA, International CPO. Private Investigation and Surveillance operator. E: wscarr@logasinternational.com MLK Security and Protection Services Swindon, UK Close Protection Officer and Door Supervisor E: mattleekane@hotmail.com T: 07917654978 LJE Security Services North Yorkshire, HG1, GBR Close Protection, Residential Security, Asset Protection, VIP red carpet Security and Private Investigation. E: leanneedmondson@yahoo.co.uk One Events Grantham One Events offers you a stress free solution in the organisation, putting together and running of an event. Thisis accomplished by having a group of specialised companies from different industries working together for a more complete service for you. TEL: 0870 974 6779 W: www.oneevents.info Plymouth Close Protection Highly versatile, physically fit and accomplished security professional with cumulative experience in the areas of security management, close protection, crisis management, risk assessment, emergency management, asset protection and security training. E : chris@plymouthcp.co.uk W : www.plymouthcp.co.uk T : +44 (0)1752 500807 PPSS Group Body armour and stab vests provide a functional solution to individuals who require extra protection in their chosen vocation. All PPSS (formerly ASEO) body armour and stab vests are certified by the UK’s Home Office (HOSDB) and offer unrivalled protection from blunt trauma caused by a punch, blow or kick. Based on our professional frontline experience and extensive research we can confirm that an impact based assault is a more likely event than an attack
involving an edged weapon or firearm. T: +44 (0) 845 5193 953 F: +44 (0) 1765 603 512 E: info@ppss-group.com W: www.ppss-group.com Presence Security Presence Security (“ PS ”) is a bespoke security company providing protection for private individuals and VIPs, as well as security services for businesses and organizations. T: 0800 002 9734 E: info@presencesecurity.co.uk Prestige Risks LTD 27 Old Gloucester Street, London, WC1N, 3AX, GBR. Close Protection Secure Chauffeurs Surveillance Residential Security Executive Protection Security Guards Asset Protection T : +44 (0)207 5588182 E : info@prestigerisks.com W : www.prestigerisks.com Prometheus Medical Ltd Prometheus deliver unrivalled bespoke emergency medical support in the form of specialist equipment, training, strategic advice and deployed clinical care. T: (+44) 1568 613942 W: www.prometheusmedical.co.uk Prosec Consultancy Ltd 10 Oakfield business park Westbury, BA13 4WF. Prosec Consultancy Limited are dedicated in providing a professional service, which covers a whole range of security services throughout the security industry. T: 01373 228055 W: www.prosec-ltd.co E: info@prosec-ltd.com ProTouch Security ProTouch Security is one of the UK’s key providers of event safety, event security, crowd management, door supervisors, stewards, event management and health and safety. T: 01724 279 522 W: www.protouchsecurity.co.uk Python Security and Protection Ltd Providing Close Protection Officers and Door Supervisors for Events and Venue Security. E : mattleekane@hotmail.com RSM Security UK Ltd London, UK RSM Security UK Ltd offers the experience and expertise necessary to provide security personnel of the highest calibre when you need them. T: 07850091979 or 07792948523 W: www.rsmsecurity.co.uk E: info@rsmsecurity.co.uk RWSSI Rob W is a professional security consultant with world wide experience and capabilities in Security, Surveillance and Investigation; I can support you to overcome any problems and enable you to achieve your goals E: rob@rwssi.co.uk T: +44 (0)7818 220985 SDS Solutions SDS solutions provide our clients with protective solutions that are second to none, our consultants will discuss every aspect of the problems that you are facing that dictate the need for a protective solution, we promise our clients a tailor made service to meet individual requirements. Whether based in the UK or abroad our protective service T: 01453 887815 E: info@sds-solutions.org Shadow Close Protection A leading company specializing in Executive
Protection as a professional sector, with participation in high and low risk missions, providing global security solutions and consultancy to individuals, corporations and national agencies worldwide. W: www.shadowcp.gr E: info@shadowcp.gr T: + 30 6948539664 Shaun West United Kingdom SIA licensed, Highly Experienced Frontline CPO. Ronin SA trained. Providing security for both corporate and hostile environments. E: sw@shaunwest.co.uk T: +44 (0)7830 109 601 W: www.shaunwest.co.uk Spotllght Protection Services Essex based business which provides a broad and growing range of security services to businesses and organisations large and small. T: 07870560208 E: info@spotlightprotectionservices.co.uk W: www.spotlightprotectionservices.co.uk VIPA Tactical Training A specialist training academy dealing with four specific areas of combat: VIPA Civilian Self Protection Program, VIPA Close Protection Combat System, VIPA Police Defence Tactics and VIPA Military Close Quarter Combat. BBA Member. W: www.VIPAtacticaltraining.com Europe & Africa International Security Academy P.O.Box 5833, Herzeliya, 46000, ISRAEL. Our graduates are more recognized, respected and sought after by Distinguish Protection service “consumers” and by most of the “Providers” of Protection services worldwide. Organisers of the 2008 International Summit of Protection Officers. BBA Member. T: + 972 9 950 0969 W: www.SecurityAcademy.org.il Javier Galan Spain Security specialist available for operations around the world. E: oejju@hotmail.com T: 34.637080771 Military Grade Encryption Phones PO Box 52310, Limassol, CYPRUS Built-in encryption software which converts your voice to encrypted data using a constantly changing mathematical formula. It uses a dual layered RSA/ AES combination and a changing session key which modifies the encryption algorithm every second. € 1,398.00 + VAT. All prices include new Nokia N73 phone. BBA Member. T: + 357 7777 7276 W: www.protechcy.com/new Security Concierge Group SCG Special Projects Ltd, Avenida, Bartolome Vicente Ramon No 10, B16, Ibiza, 07800, ESP Security Concierge Group is a privately owned and fully independent provider of exceptional security services to an interesting and varied range of clients. T: 00 34 600 665 275 W: www.securityconciergegroup.com E: joe.buckle@securityconciergegroup.com Americas Bodyguard Careers Bodyguard Careers is an informational site with the purpose of providing bodyguards with all the information and tools necessary to succeed in the Close Protection Industry Info@BodyguardCareers.com www.BodyguardCareers.com
Issue 19
61
Classifieds
To place a classified lineage or box advertisement telephone our sales team on: +44 (0) 191 6450 865
Canadian Use of Force Systems 7975 Yonge St. # 7124, Innisfil, ON, L9S 1L0, CANADA A professional Use of Force and Defensive. Tactics organization teaching a full range of controlled response options for Self-Protection and Use of Force considerations in public and professional environments. BBA Associate Member. T: + 1 705 456 4333 W: www.canadianuseofforce.com
protection agency offering such services as threat assessment, executive protection, self-defense training, firearms instruction, and high risk tactical protection. Our executive protection specialists have over 75 years of experience. Panther can handle your protection needs whether around the corner or around the world. Member: BBA and NABA T: (404) 349-9117 W: www.pantherprotectionservices.com
Contact Front Photography Contact Front Photography is the world’s 1st photography studio dedicated to the Close Protection Professional. Stop putting generic or pirated photos on your website; instead commission custom shots to best represent you or your agency. T: +1 (612) 369-6134 E: Info@ContractFrontPhotography.com W: www.ContactFrontPhotography.com
SILVER STAR PROTECTION Executive protection, site and event security with global experience. Serving southern Minnesota with integrity and professionalism. Former USSS, ICON Alumni. available for domestic and international travel. Robert E. Jones Manager/CEO W: www.silver-star-protection.com E: rejones@silver-star-protection.com
Decisiones Estratégicas Buenos Aires – Argentina Executive protection specialists we have experienced in all Latin America, for multinationals companies, also providing support in project throughout Latin America to consulting first the US. and UK. We have a team of specialists and psychologists in assistance and crisis negotiation. T: +54(911) 6415 1941 E: jbenitez@d–estrategicas.com W: www.d–estrategicas.com Detective Lacerda P.O.BOX 25996, São Paulo, 05513-970, BRAZIL Providing the full range of security and investigation services throughout Latin America. BBA Member. T: + 55 (11) 3452 4388 W: www.detectivelacerda.cjb.net Global Bear Protection PO Box 11488, Jackson, Wyoming, 83002, USA Provision of British and US Ex Special forces security/medical specialists. T: 307 413 3619 W: www.globalbearprotection.com E: bear@globalbearprotection.com Icon Services Corporation 1043 Grand Ave. #312, St. Paul, MN 55105, USA A full service security and investigative agency specializing in providing high-level security and bodyguards to international celebrities, public figures and corporations. Licensed, bonded and insured, our diverse roster of clients reads as a virtual who’s who in the corporate, motion picture, fashion and recording industry. Entering into our 10th year, Icon has been the hand picked choice to provide Executive Protection to everyone from Superintendents to Supermodels. BBA Member. T: + 1 651 695 8778 W: www.Industry-Icon.com Imperial Protective Service, LLC 15849 N. 71st Street, Suite 100, Scottsdale , Arizona, 85254, USA Imperial Protective Service’ (IPS) is a security consulting and services firm founded in 1978. IPS provides both national and international corporate, executive and celebrity protective services. BBA Member. T: + 1 480 281 1588 W: www.executiveprotect.com Panther Protection Services 3695F Cascade Road, Suite 2207, Atlanta, GA 30331 Panther Protection Services is a full service
62
Circuit Magazine
TSICS (T6) Miami, Florida, USA TSICS (T6) provides the following services in Central America: Executive Protection, Individual Bodyguard, Close Protection Training, Corporate Invest. W: www.security-professionals.org/members/ saldrix E: tsics.t6@gmail.com T: +502 6645 6822 Tony Scotti’s Vehicle Dynamics Institute 1162 St. Georges Ave, Suite 277 , Avenel, NJ 07001, USA The first name in advanced driver training, offering our highly acclaimed Protective/Evasive Driving Programs. Designed specifically for today’s executive chauffeurs, executive protection professionals and others who are responsible for providing safe and secure transportation services. BBA Member. T: + 1 732 738 5221 W: www.vehicledynamics.net Vindex Personal Protection & Investigation Inc. 497 Hooksett Rd #365 Manchester NH 03104 603.289.3161 / Full service Private Investigations & Executive Protection. 10 years combined Law Enforcement, Private security, close protection work, & security contracting. NY Mayors, U.S. President’s, NFL owners, and VIP’s are some of the protection work I’ve gained experience with. ICON alumni, NABA member. T: + 1 732 738 5221 E: vindexinc@aol.com W: www.vindexinc.com
The Team: Editor Managing Editor International Editor Art Direction
Shaun West Jon Moss Elijah Shaw Peter Falkous
Contributors: Robert S Michels Jessica Kuyper Raffaele Di Giorgio Mark “Six” James Gene Stratton Richard Bingley Joshua Lee Scott D Michael Baillie Avery Mitchell Paul Rock Higgins
Dean Bateman Eric Konohia Dr Amy Burrell Theo AllthorpeMullis Jacquie Davis Explorer Travel Security Elijah Shaw Shaun West Jon Moss
Our Sincere Thanks to all those that continue to contribute their wisdom and experience for the enjoyment of others The Circuit is compiled, edited and published in the UK and US quarterly. W: www.circuit-magazine.com E: info@circuit-magazine.com T: +44 845 519 2538
Asia Pacific Asia Protective Group Ltd Asia Protective Group (APG) is a Hong Kong based risk management company, specializing in executive protection, overseas travel security and security consultancy services. APG has an extensive network of security specialists operating throughout the Asia Pacific region. W: www.asia-pg.com E: jim@asia-pg.com E: yvonne@asia-pg.com
To place a classified lineage or box advertisement telephone our sales team on: +44 (0) 191 6450 865
DISCLAIMER While every care has been taken to ensure that the information contained in this magazine is both accurate and up-to-date, The Circuit accepts no liability in any part for loss or damage incurred by reliance on information contained in this magazine through omissions, errors, howsoever caused. ©COPYRIGHT Copyright remains with the authors and contributors at all times. No part of this publication can be copied or reproduced in any way whatsoever without permission from the publisher AND the author / contributor.
Circuit