Circuit Magazine #11

Page 1

Circuit The

SPRING TWENTY ELEVEN

£4 /$8

.50 £4.50/$8

The Magazine for Security Professionals

COUNTER TERROR EXPO EDITION

A Quarterly publication from the British and North American Bodyguard Association


2 : : Circuit


� 4]

Foreword

by Shaun West & Elijah Shaw

� ReadersWrites 6]

Your Comms to HQ

� OnTheJob

8] Field Communications 11] Medical Training Control of Compressible Catastrophic Haemorrhage 14] Deployment Of CCTV Equipment In Hostile Environments 18] The Hostile Planning Cycle 21] Ambush 22] Sharpen Up Your Act Practising Your Weapon Skills at Home 24] Surviving an Active Shooter 26] Physical Training Improvised Strength Training

� Course Reviews

Contents

28] Certified Security Consultant 30] Unarmed Combat for Bodyguards A review of the UAC-BG course offered by Safer Security Training 32] Firearms for Beginners Kyle Carr reviews the Firearms Foundation Course run by Euro Tactical Ltd 34] Using The Internet As An Investigative Tool

� HardTalk

38] The State of 21st Century Piracy in the Gulf of Aden And Beyond Kevin Whyte talks to Lucus Young of Transafe maritime ltd.

� ShopTalk

36] Networking And First Impressions 40] Industrial Espionage Is it Strictly the preserve of Bond and Bourne? 42] Arab & Muslim Terror The new approach to better cope with homeland security issues 47] The Role Of Law in Afghanistan 50] Famous Last Words What’s the point of hiring bodyguards if we all end up dead?...

54] Get Your Kit On 55] What’s in your Go-Bag? Pt3

� BoyZone

� TechTalk

52] Anti-Social Explosion The Not So Hidden Dangers of Information Sharing

� Features

37] Keeping Your Edge with Elijah Shaw 41] Where Do You Read Yours? Members pics from around the globe reading our favourite magazine 45] Working Girl with Jacquie Davis 46] PodPickers The Top Ten iPod apps for The Circuit 49] Financial Q&A Session with Mitchells 56] BooKlub

Circuit : : 3


I

t has been an extremely busy period for all at the BBA with development of our upcoming security related mobile software applications and the development of the new website/ forum coming to a close as well as preparing for the upcoming Counter Terror Expo and producing the Circuit Magazine. There doesn’t really seem to be enough hours in the day at present but good progress is being made on all fronts and I’m looking forward to seeing the fruits of our labour! There has been many interesting developments around the world of late, particularly in the Middle East which has

Foreword

flared up fairly quickly since the last issue of the magazine most notably Egypt and Libya as well as an upsurge in piracy attacks! With all of this going on it will most certainly bring with it more opportunities for work and many challenges to be faced for those working within the industry in the coming months. With this in mind make sure that you are ready to go and all of your inoculations are up-to-date as you never know when the call may come. For those just starting out within the industry it is more often than not fastballs like these that give you that all-important first foot on the ladder then it is down to you to grasp the opportunity with both hands and make things happen. We all know that luck plays a huge part in this industry, but its not just about being in the right place at the right time, that’s just the start you also have to be able to deliver when the call does come, once it does come give yourself that all important

Once again in this issue as ever we have some great contributions within the magazine from new contributors as well some from our regulars. If you would like to see some of your work in print and fancy writing an article then do get in touch as we are always looking for quality content for the magazine and the magazine is currently growing and the circulation is constantly expanding so producing an article for the magazine can be a great way to pass on your knowledge and with it let people know about yourself or your company. Well that’s all from me and I look forward to seeing you all at the Counter Terror Expo in London 19-20th April, if you’re about and attending the event do pop over to our stand and say hello, ask for Nick, he’s the one with all of the money for the brews!

W

to capture between these pages the energy and diversity of the industry and I think one of the things that allows us to do that is by being in the thick of it daily. As magazine publishers we feel the crunch of the deadline much as any major publication, but let’s see the editorial staff of Time Magazine or Entertainment Weekly try to proof & layout a magazine in the middle of a war zone in Afghanistan (kudos, Jon). I’m also happy when the writers bring that same enthusiasm to the article submissions that come in from all over the world. Of course they wont all make the cut, and we do get some, umm… “unique” ones from time to time. (I for one am not touching the 3-page article on the sex life of the Hungarian Bodyguard.) However, by and large, the ones that do end up in print are informative and well written. Our promise to you is that in return for your support, we will

4 : : Circuit

pat on the back and get out there and start making your own luck!

Shaun West

elcome to the Spring 2011 Edition of The Circuit ~ The Magazine for The Executive Protection Professional. I’m always proud when we turn in that final draft and prepare to go to print, and personally feel that what you are holding in your hands is a tangible example of teamwork in action. We try and do our best

endeavor to continue to make the magazine the best it can be. We welcome feedback –even in the form of criticism, and if you take a look at the earlier issues and compare them to this you should see the evolution in living color. I’d also like to acknowledge Nick, Shaun, Kal & Tamra for keeping me deadline conscious (and keeping the spell-check handy!) Then there are the trendsetters and pioneers: Tony Scotti, Bob Duggan, Robert Oatman, Dr. Kobetz, Gavin De Becker & John Sexton. Finally I’d like to thank a few close associates, Harlan Austin, Justin Johnson, Mike Briggs, Steve Mastalerz, Dave Marris & Ivor Terret for the inspiration & motivation. On a Close Protection assignment, a multi-person detail is much more effective than a lone operator, and such is also the case when producing a magazine.

Elijah Shaw


We aim to unite and support both trained and aspiring bodyguards worldwide via our membership and information program. Whether you are a seasoned security professional, or just setting out on a new exciting career path, the BBA will provide you with the most up to date information on current training providers, equipment suppliers, employment vacancies, a message forum and the great networking facility BBA Chat. No other close protection organisation offers so much for so little. Since its initial formation in early 2007, The BBA has grown rapidly - in fact we are probably the fastest growing association of its kind. We are now attracting membership not just from the UK but worldwide. Annual individual membership to the BBA includes: • Regular updates on job and contract opportunities worldwide • Daily industry news • Weekly updates on international terrorism and global hot spots • Extensive global networking • Exclusive access to various industry experts • Special offers and discounts on services and products • Use of our logo on your letterheads, business cards and website (conditions apply) • Personal one-to-one advice with C.V. and job applications • Certificate of membership • Subscription to “The Circuit” Magazine • BBA Lapel Badge

Personal, Business and Corporate Packages Available

www.the-bba.org.uk The British Bodyguard Association is represented globally in: -

Afghanistan : Australia : Austria : Belize, Brazil : Canada : Cayman Isles : Cyprus : Czech Republic : Denmark : France : Germany : Greece : Hungary : Iraq : Israel : Italy : Jamaica : Latvia : New Zealand : Portugal : Slovakia : South Africa : Spain : Sweden : UK & the USA

SUMMER

2010 £4.50/$8

Circuit The

The Magazine for Security Professionals

Cover: THE BODYGUARD DIARY 6 days in the life of WISE WORDS FROM CINDY SOMMER GIL BOYD IS HOME ALONE HEALTH MATTERS WITH RYAN NAISH BRITISH CONTRACTOR JAILED FOR BRIBERY IN AFGHAN COURT HOW TO SAFELY RETRIEVE A CASUALTY WE’RE STILL PENETRATION TESTING IN pt. 5 OF THIS SERIES and the final installment of THE HISTORY OF SNIPING

A Quarterly publication from the British and North American Bodyguard Association


Circuit :: ReadersWrites

Your Comm’s to I have downloaded the BBA iPhone App in preparation for my Close Protection Course and am finding it very useful. It works really well. There does not seem to be that many security industry apps out there – do you have any more planned? Chris H, BBA member

Thanks Chris, glad it has been some use. We feel it works well, looks good and is much needed. Yes, we have 2 others in progress and a 3rd on the drawing board so hopefully there will be something in amongst that lot for most people. Watch this space!

I have always read with interest your medical articles and note that there were a couple in the last issue. I am looking to do a course but cannot decide which one and with which TP? M Rob, BBA member

Rob, much depends on your current level of 1st aid/medical training and experience, as you often have to have a certain level of knowledge to be accepted on certain courses. Obviously we recommend Premetheus who write regularly for us and who have a variety of courses on offer. They get fantastic feedback. Give them a call! I found the article on CV writing in issue 10 excellent value. Vanessa Cohen really seems to know her stuff. I have not considered paying for someone to write a CV for me previously but I am tempted now, especially having seen some of the examples on her website – what do you think? Gaz T, Circuit subscriber

Well Gaz we recommend CV Specifics

6 : : Circuit

extremely highly, we have had our CV’s done by Vanessa and were mightily impressed by what was produced. We always thought that our CV’s were pretty good as we have all had some good feedback from them but after seeing what was produced it was like night and day. Recently, one of the BBA guys went for an interview and was told that his CV was the best they had ever seen. Now that is a compliment. Vanessa has been kind enough to offer BBA members a generous discount and we fully recommend that if you are serious about your career then this is a must have. Her service from beginning to end was fantastic. It is the equivalent to maybe 1 or 2 nights out….stay in and get it done and if you join the BBA you will get it cheaper! The article on Philip Young that was in the last issue was excellent. I’ve heard many a story but not many like that and never from the horse’s mouth. It is totally shocking what has happened to him and others. Can a campaign not be mounted? Nathan J, Circuit subscriber

Nathan, glad you liked the article. It came in at the last safe moment but we felt it worth a place so made some room! Many of our readers and BBA/NABA members are deployed in Afghanistan and if it benefits them in some small way by reading that article then we will be happy people indeed. You can join Philips FaceBook group……., just search him on groups and you will find it. I sometimes find the computer articles bloody hard work but enjoyed the one on encryption and it has made me start thinking about that side of things. Actually, after the research that I have done I’m

not sure if ignorance is bliss where this is concerned! Ross Pearson, BBA member

Ross, IT security is a big, big thing but we do know what you mean about ignorance….sometimes you get slightly paranoid when you have a little bit of knowledge and IT can be slightly overwhelming to us non techie types. That said, it is something that must be taken seriously. Read books, do a course and go online to satisfy your thirst for knowledge. I have noticed a few threads on the BBA message board recently, some of which appear to be a little inflammatory. Do you guys not say that this will not be tolerated on the BBA as it is elsewhere? What is the party line on this one? O.M. BBA member

You are quite correct, we will not tolerate as much as others but in order to have good debate you must let people have an opinion and respect their opinion even if you disagree. You must also consider that some people find it difficult to express themselves when writing and things may come out not quite as intended. We try to identify threads that are getting out of hand and take appropriate action. So, there is no party line as such, we look at them on a thread by thread basis but no racism, sexism and some other isms that others may find offensive. If you represent yourself well then you will have no issues at all. I note that there has been quite a lot on the BBA forum now for some time about the Counter Terror Expo. What do I have to gain from attending this as an individual? It is a long way for me and I’m not sure about the benefits. Mark P, Circuit Subscriber

Each person who attends will potentially have different things to gain. Networking, increasing your knowledge by attending various workshops, increasing product awareness by visiting the stands, you can even pop over and see us & Shaun will make you a cup of coffee! You cannot always expect to get something from attending events but if you do not attend then you definitely won’t. Why not arrange other meetings around your time in the capital?


As you can see the most important person in the team, once mobile, is the driver!”

Edexcel Level 3 BTEC Close Protection Driver Course Course contents includes: • • • • • •

Close protection driving techniques Advanced defensive driving Security principles for mobile security Chauffeur protocol & etiquette Incident management Emergency first aid

Work with/in a close protection team?

Want to know more about your specialist role?

Want to be qualified to the same level?

Want to develop your employment opportunities?

Want to work around the Olympics?

Want to get ahead of the competition?

Security Chauffeur College, Atrium Court, The Ring, Bracknell, Berkshire, RG12 1BW Tel 01344 393066 Web www.securitychauffeurcollege.com

CRITICAL NATIONAL INFRASTRUCTURE PREVENT

Institute of Professional Drivers and Chauffeurs Driving for better business

|

PROTECT ROTECT

2011 |

PREPARE


“

In this modern world we all rely increasingly on IT and communications. Often the communications part is just viewed as an extension to the IT element rather than an important discipline in its own right. This is one of the reasons why knowledge, or more correctly lack of knowledge, contributes to the problems faced by organisations the world over when it comes to specifying, procuring and implementing successful, functional and effective communications platforms.

“


FIELD COMMUNICATIONS by

N

ANDREW CLARK

o one disputes that the effective use of communications in operational situations and during CP and surveillance tasks is vital to the success of any mission. Why then, do many people and organisations place their communications requirements so low on the agenda? Why do they fail to acknowledge this importance and invest in equipment and services that will bring immediate and ongoing benefit? And why is there not more use made of emerging technologies? The answer to all of these questions is the same and that answer is knowledge. Everyone knows that good communications is vital to success. You only need look at a military operation to realise this. The first thing to be deployed in any military environment is the communications infrastructure. Without this capability the commanders can neither issue instructions to their forces nor receive intelligence feedback; without communications they are deaf, dumb, blind and vulnerable and this is true for virtually every other situation from the Boardroom to the Ops Room.

Circuit : : 9


I

Circuit :: OnTheJob

t is true to say that the lines between Information Technology and communications technology have moved closer together, almost to the point of being ‘blurred’. Many organisations have viewed this as the ideal opportunity to do away with the communications discipline in its own right and add the responsibility for communications to the already over burdened IT department. This is a mistake because, in reality, they are completely different and require a totally different understanding and approach in both design and implementation. And Heaven knows the IT guys have enough to keep on top of in their own trade without adding another layer of complexity to an already complicated and ever changing portfolio! Understanding communications in its own right requires some fundamentals to be addressed so let’s go right back to basics and ask the question ‘what is communication?’ In its very simplest form communication is the act of passing information from one person to another. The simplest and quickest way to do this is by using your voice and for many years that was all we had. However, technology has provided us with many new ways of communicating and we find ourselves using the ‘old fashioned’ way less and less. How often have you sent a text message or composed an email to someone asking a question to which you needed a pretty immediate answer? You even hit the button on your email programme marked ‘High Importance’ in the belief that this will somehow elicit a prompt response. What happens when you don’t get the answer by return; let me suggest a scenario. You find yourself constantly checking your inbox and message log for the reply. You begin to wonder if the message actually got through. Was it caught by the recipients SPAM filter? Are they at their desk? Are they even in the office today? If you sent a text, are they in mobile phone coverage? If they have replied has it gone into my junk email folder? Did I even use the right address in the first place? Does this situation sound familiar to you? It does to me and how much time does it waste? Because we are fixated waiting for the reply we can’t settle or concentrate on any other work and this causes disruption. So what do we do in the end? Of course, we dial their number and speak to them only to find out that ”yes” they received the message seconds after you sent it but just haven’t got round to replying yet! But, and here’s the thing, you get your answer then and there because you bothered to pick up the phone and call them!! And if you had done that in the first place how much time, effort and hassle could you have saved? The answer, of course, is ‘no one knows’. But I use this example to illustrate that sometimes we forget that it pays just to keep it simple and that is always the principle that should be adopted when planning a communications strategy regardless of where in the world it is expected to operate. Just because the technology is

10 : : Circuit

there, it doesn’t mean it has to be used. It’s all about choosing what is right and appropriate for the situation and importantly, knowing what is out there and available for you to use. Believe it or not, the world of communications changes almost as quickly as the world of IT and keeping on top of it is a full time occupation! When approaching any communications project, it is important to establish what you need to achieve from the outset and not to lose sight of it. The first question which every communicator should ask is ‘what, functionally, do I need to achieve?’ This may seem obvious but, even having asked that question, it is easy to go off track and provide an overly complicated solution to what is, fundamentally, a simple problem. On the other side of the coin, if the correct questions aren’t asked in the early stages, you could end up with a fantastic solution that works brilliantly but doesn’t actually fulfil what is required of it. It’s all well and good providing a fully functional digital radio network that allows your users to make and receive incoming telephone calls to their UHF handheld radios in the middle of the Amazonian rain forest (yes we can do that!!) if all of the other agencies that they need to work with are still using analogue VHF radios! A word on data. Despite what my opening paragraphs may have said, data i.e. email, file transfer, text messages etc. is a vitally important part of communication today, but voice is the ultimate fallback. If all else fails you can dictate the letter over the radio and you can read the figures from the spreadsheet over the telephone. Additionally, once we have a functioning voice network in place, it is relatively simple to enhance this by overlaying a data network. Indeed, from a transmission point of view, data will often get through when voice cannot because of the built in error correction protocols. The problem with data is the added layer of complexity that it brings, with additional equipment in the form of modems, programming protocols and laptop computers, all of which provide additional points of failure and require an additional level of knowledge to operate. When it comes to communications the abiding ‘keep it simple’ philosophy is more relevant today than ever. Technology is fantastic, but use it only where it is necessary. I always apply the principle ‘just because I can, does it mean I should?’ Just because the technology is available for you to use, it doesn’t mean that you have to use it. Apply this to your communications planning and stick to it, and you won’t go far wrong! For more information or guidance on any communications issue, wherever you may be in the world, please contact us. We are always reading and willing to communicate with you!! In the next issue of The Circuit we will look in more detail at communications planning and equipment selection. Andrew Clark is MD at G6 Global Communications: www.G6-Global.com, +44 (0) 1454 610050


Circuit :: OnTheJob

T

here are two types of Haemorrhage, Compressible and Non-Compressible. Compressible Haemorrhage is external and can be controlled by direct or indirect pressure. Non-Compressible is either internal that is not accessible for direct compression or from a wound that is so large that compression is impossible.

A major cause of death following trauma is uncontrolled haemorrhage and resulting haemorrhagic shock. Therefore, identification and immediate management of life-threatening external haemorrhage has been recognised as critical to the successful management of some casualties. Catastrophic haemorrhage is recognised as being profuse, uncontrolled and sustained external blood loss that may be arterial and/ or venous bleeding. Such haemorrhage will usually be apparent but it may be necessary to perform a rapid assessment especially in entrapped casualties and confined space rescue. This article gives advice on the management of Compressible Catastrophic Haemorrhage. Some catastrophic haemorrhage will be controlled with an appropriately applied haemorrhage control bandage, for example the Olaes Modular Bandage, the Blast Bandage and the Israeli Bandage. Such bandages have an elasticated bandage in addition to an absorbent pad in order to maintain direct pressure on the wound and allow the medical provider to continue with casualty management. Elevation of a limb may be required. If bleeding continues

through the bandage then a second bandage may be applied over the first. The use of novel haemostatic agents like HemCon, QuikClot and Celox, is becoming more widespread. These new agents are particularly useful in the management of catastrophic haemorrhage in junctional areas (such as the groin, anterior triangle of the neck and axilla) where large vessels are more superficial and it is not possible to apply a tourniquet. Newer haemostatic impregnated bandages may be a useful addition to the first aid kit. Tourniquets have been used for centuries and a well applied tourniquet can be lifesaving. It should normally be considered as a last resort in haemorrhage from extremity trauma in a limb. In rare instances, it may be considered as the first resort in entrapped casualties, mass casualty situations or hostile environments when it is not safe or there is no time to apply a bandage. The two main ones on the market are the SOFTT W and the CAT but a triangular bandage and stick can be improvised to create the same windlass effect. A tourniquet should be tightened until the bleeding is controlled or stopped.

by

DAVID PREECE

The tourniquet should be applied as close to the wound as possible (up to 5cm). It is important to ensure that a tourniquet is applied tight enough to occlude both the venous and arterial blood flow and to note that this is a painful procedure. Note the time of application and ensure that whoever the casualty is handed over to knows that a tourniquet has been applied. It may be useful to write ‘T – 1245hrs’ on the casualty’s forehead but this may be ‘sweated off’ in hot climates. The principle concern is loss of viable tissue distal to the tourniquet and there is no safe time when this can be guaranteed not to occur. As a rule of thumb, a tourniquet may be left on for up to 2 hours without detriment in most cases but any longer may lead to loss of the limb.

Circuit : : 11


12 : : Circuit


Circuit : : 13


Circuit :: OnTheJob

DEPLOYMENT OF CCTV EQUIPMENT IN HOSTILE ENVIRONMENTS by

D

eployment of Closed Circuit Television equipment in hostile environments must be a last consideration. The reasons for this will become clear as this document article progresses. The factors that need to be considered before any such deployment is undertaken, include a Threat and Risk assessment to both the person deploying or servicing the equipment with fresh batteries for example, or recovering it later, or indeed the compromise of the equipment by the target whilst it is in situ. Due primarily to the conditions that will be experienced at CCTV deployment sites, an installer must take into account such things, like the covert hide that is to be selected for the camera, in the particular geographical environment it is to be deployed in. Hessian cloth and painting of cameras is an example, but each piece of equipment must be evaluated on its own technical merits. Some open lenses operate very well with only a small part of the glassed area exposed, however, these very same surfaces collect dust and sand very easily, thus restricting or degrading the end result on footage obtained. Clearly the light conditions at the site must be assessed before deployment, to produce usable CCTV images later. predetermined range. The most important SELECTION OF EQUIPMENT thing to remember if the covert option of here are two known frequencies of light Infra Red LED’s is to be used at between in the spectrum which are typical when 940 and 960nm, they will only work with purchasing CCTV cameras when overt or monochrome cameras. It is no use buying covert lighting are to be considered. a colour camera if you wish it to work in The most common are 840 or 850 nm total darkness in a covert installation and frequencies which are the typical overt produce usable images as colour disappears Infra red Light Emitting Diodes (LED’s) that at last light. surround many of the cameras purchased It is only when the ambient lighting around today. Easily identified by a red glow. the target, such as street lighting, provides These are normally found in a circular enough lighting to support a colour, array around the open lens in the centre Charged Coupled Device (CCD) camera, of what is effectively an environmental commonly known as a ½” or ¼” chip, housing. This housing will be tested to where enough image is captured to provide stop any contamination like dust entering usable material. The adage to remember the components inside it, and these is, the larger the glassed area the more housings are normally waterproof to a light penetrates to the chip face. If overt IP67 International standard. The colour of LED’s are to be used omitting a red glow, the camera housing needs to be carefully the deployment area should be well lit to considered before purchase, as many of offset its use, and careful consideration these types of camera have been designed should be made in terms of compromise. for the domestic market and are normally Most small CCTV cameras are powered by sprayed in silver, However, when you are 12 volts DC with a mains adaptor, and some considering using CCTV in a hostile location can operate down to 9 volts DC using PP3 940 or 960nm Infra red frequencies should batteries for example. In the case of 12 be sought, which in effect are totally covert VDC cameras, these can still be powered Infra Red lighting LED’s which throw using 75Ah typical car batteries, buried covert light onto a given target at a given from view and solely providing the camera distance dictated by the lens size. Vari-focal with power. A very general rule of thumb lens should be considered also to allow flexibility at the scene of deployment where in terms of the length of operational time that can be provided by such a car battery time is of the essence in terms of safe is 1Ah = 1 hour. So a 75Ah car battery would deployment. The lens can then be zoomed in and then focused accordingly in a provide 75 hours of life. This life can be

T

14 : : Circuit

GIL BOYD B.E.M

affected by climatic conditions however. If the temperature drops dramatically so will the performance of the battery used, whether it is a PP3 or a car battery. These issues should always be considered when equipment is to be buried or hidden on surface. The effective answer is to enclose the equipment in a heated case, but of course the more power that is required in addition to that powering the camera will affect the length of time the camera can run for. It therefore goes without saying that before any equipment is deployed, all the ancillary equipment in addition to the camera itself the power drain should be assessed and evaluated in terms of onsite effectiveness and likely duration time.

LENS

T

he selection of cameras and therefore the lens to achieve the aim effectively must be a major consideration. There are two types of lens available generally, and these are open lens and pinhole lens. The latter is highly effective for very close in operations of no more than 10 feet from the target as a typical range. These types of lens are used typically in ties/Baseball hats/screw heads and easily deployable household goods such as clocks etc. Remember the statement I made earlier, the bigger the glazed area of the lens, the more light enters the chip and therefore produces the better images in either colour or monochrome in good lighting. The pinhole camera lens operates normally with fixed 3.6mm lens. As you can see this is a very short range lens, but readily and cheaply available to be considered in hostile deployments where you can safely get close to the target and be able to covertly hide the “front end” with only a small aperture showing. The lens to avoid is the Chemical Metal Oxide Silicone (CMOS) as they are commonly known. They can be found in very cheap surveillance equipment from the Far East and do service an area of CCTV, but the images are often very poor and degraded when either bright lights or not


Circuit :: OnTheJob enough light is experienced.

the body, especially the head.

These CMOS cameras or the face of a chip so to speak, make up about 40% of much of the covert camera market.

HIDES

Always favour a CCD camera to one with a CMOS lens fitted.

MICROWAVE OR ON SITE RECORDING Microwave technology has moved leaps and bounds in the last ten years and can now be found to provide very stable imagery from point to point, however, its failings are when it is used in rain/ mist or very built up areas. The reason for this is that it is a transmittable signal from point to point, normally found on 2.4Ghz frequency. Unfortunately, in this hemisphere most operating platforms for domestic electronics are based around the same frequency including microwave ovens and strip lighting starter motors, and therefore when considered for use inside domestic dwellings, this frequency should be avoided. The other downfall is that as it is on that frequency, it is easily intercepted by other like minded 2.4Ghz receivers. So in simple terms, anybody operating in the immediate area on the same frequency will intercept your transmitted image on their security screen or TV. There are other frequencies that can be used legally or illegally dependant on the geographical location in the world, and these should also be considered when Risk Assessments are carried out. A handheld Microwave receiver unit with a built in screen is always useful to use before deployment, as it will show any microwave transmitters in the area you are to operate in, and display their picture and frequency on your screen. Very useful when you believe you are the target, highly effective in confined spaces like hotel rooms in foreign countries, and look like a small portable TV if challenged at Customs points!!! Microwave is typically from point A to point B with ranges that are very dependant wholly on the power of the Microwave transmitter. For example a 1 watt transmitter could work up to 1 mile line of sight. Most transmitters used in domestic CCTV operations are no more than 100mW in power and this is normally effective in such things as Baby monitors and the like.

MICROWAVE HEALTH & SAFETY

A

lways remember, anything transmitting a signal, transmits radiation. The higher the power output of any microwave equipment will radiate a very serious health risk, so always avoid being in front of anything transmitting such radiation, and certainly do not consider powerful microwave surveillance equipment against

T

he most enjoyable part of installing CCTV “Covertly” is the selection of the hide to be used. As stated earlier the geographical location will determine the type of subterfuge that is to be used. It is my experience that ex servicemen and women, who have been trained in camouflage and concealment excel at this part of CCTV deployment in hostile environments, and especially those trained in Covert Rural Observation Post operations. Hessian cloth is a great base to start from when used in many passive non electrical equipment operations, such as binoculars or telescopes, but always remember, when used close against any warm environmental camera housing, when wet, steam will compromise the location of the camera. Therefore other options must be considered, such as placing lens in discarded coke cans using the drink

aperture as the lens point, or made up bricks or debris to fit into the geographical location to be operated in. To experience typical internally used hides, such as PIR’s or Sprinkler Valves or pinhole lens deployed in teddy bears or clocks etc, search the web for examples, and from this use your own subterfuge to master this art of camouflage yourself. It is as operationally effective as the width of your own imagination. Everything from pinhole cameras hidden in gateposts to cameras forming part of washing lines have all been used effectively in operations.

BURIABLE EQUIPMENT

M

ost CCTV equipment used in Hostile environments close in has to be buried or placed in some form of enclosure. Experience will quickly prove to you that, “out of sight, is not always out of mind” and the link will show you my approach to the problems of both weather conditions and covert hides used

THE NORTH AMERICAN BODYGUARD ASSOCIATION PRESENTS:

ICON Celebrity & VIP Protection Training “Professional guys, they know their stuff & come highly recommended.” ~ Sha money XL, Personal Manager to 50 Cent

Course Highlights • Operating in the world of Celebrity & VIP Protection • Protecting the Principal (Individual & Team) • Transportation movements and logistics • Working the red carpet & major events • Dealing with fans, paparazzi & stalkers • How to market yourself and establish a career in the industry

Make yourself more marketable in the new economy! Icon Services Corporation is proud to present a five-day course of practical theory and hands-on training in the world of Celebrity & VIP Protection. If you are new to the bodyguard industry or a current operator looking to refresh and polish your skills, this course will offer excellent instruction into the professional side of Close Protection work. Taught by industry veteran Elijah Shaw, who in addition to his corporate clients, has traveled the world as the personal bodyguard of international public figures such as musical giant Usher, supermodel Naomi Campbell, and rap megastar 50 Cent, the course will offer real world problems, scenarios, and solutions from instructors that are currently active in the industry.

www.Industry-Icon.com/Training Discount for BBA & NABA Members Location: Minneapolis, Minnesota (USA) For more info contact: 1 (651) 695-8778 or email Training@industry-icon.com

Circuit : : 15


Circuit :: ShopTalk in hostile environments: http://www. goodmanbentley.com/products/specs/rdk2. pdf This type of hide utilising a secure drainpipe can effectively be used on the surface as well as underground, as the heat of the recording components keep the equipment dry from moisture, however, as components cool, silica gel should be considered in small packets, as supplied with all electrical equipment on purchase. A good tip, is to never throw them away. The bag operates hand in glove with the silica gel balls inside it and cannot be separated as they will soak up any droplets of moisture effectively on these types of hostile environment deployments working together as you find them.

RECORDERS

T

he recorder selected for this type of work will be wholly dependant on how long you want it to record for. As will be seen on my burable pipe on the above link, I use an infra red trigger to activate the recorder inside the pipe on all movements at 10 metres away. The recorder has adjustable settings, so to provide bursts of images or continuous video. The camera selected is typical of the 940/960nm covert Infra Red illuminated CCD waterproofed camera, with the LED’s around the edge inside the environmental enclosure.

16 : : Circuit

VIDEO MOTION DETECTION OR VMD

T

here are many recorders that provide Video Motion Detection or (VMD) on activation. What this simply means is, as soon as something appears in a given area that has been masked to acknowledge any movement, it will throw the recorder into recording mode until that “something” moves out of the area after a given period, set by you the operator. The recorder will then go back to sleep and preserve battery power and recording material time ie SD/ Micro SD or other recording formats used. Video tapes should always be avoided in hostile environment deployments, for the simple reason of contamination to moving parts such as video tape and spools. These quickly become contaminated by dust, sand and moisture, where the footage is useless when recovered. Many operations only provide a one hit chance, and this is where the right selection of a recorder complimented with the right camera comes into its own. A recorder should always be selected with a good battery life and a recording medium that can easily be transposed onto a PC to provide a quick copy of the operation for evidential use. All recorders MUST have a date time capability stamped on the footage recovered in whatever format, otherwise the footage is effectively useless

in court to prove an incident occurred at a specific time which is crucial.

CONCLUSION

CCTV

and the infrastructure needed to produce usesable imagery or video is a massive subject matter, and only through experience and hands on deployments in all weather conditions can it ever be mastered. Your keenness and subterfuge will make you an effective operator in this area, with the ability to improve and adapt anything laid in front of you with the basic ingredients taught you. Once this is mastered, only then can you understand the full potential of working and deploying CCTV in hostile and often dangerous areas of the world. This has been a very basic introduction into the subject, I hope you have found it beneficial and more importantly...........Good Luck Gil Boyd BEM is has served in The Parachute Regiment and as a Principal Technical Officer CID Operations in a UK Police Force. He also formed and was the Secretary of the National Hostage Siege and Hijack Technical Requirements Group at the Home Office. He has designed many operational pieces of equipment still used in the Police and Military worldwide. He is now the Technical Director of the National Association of Security Professionals and runs his own company servicing the Police and the Military and Immigration Borders and Prison services: www.goodmanbentley.com



Circuit :: OnTheJob

THE HOSTILE

PLANNING CYCLE Phase#8 ESCAPE AND EXPLOITATION

The attackers will want to escape, evade capture and will have planned an escape route. Even a suicide bomber would consider this in the event the device fails! It is also likely that they will have preplanned a public statement or video in order to maximise publicity for their cause.

Phase#7 EXECUTION

Phase#5 PLANNING

All of the intelligence the attackers have obtained will be collated and used to form the basis of an attack plan; what weapons or explosives to use, how to get in, how to carry out the attack (normally by surprise) and how to escape. Again, on a lower level, the burglar will be choosing his route in, where to lie up for the house to empty, what best entry tools and maybe some protection.

18 : : Circuit

NI

Phase#6 REHEARSALS

The attackers will conduct rehearsals. They may do this at a safe site with similar characteristics to the target or it may be done over a plan, map or even a model. The plan will need to be fine tuned in order to rehearse; routes, timings, RV’s, deceptions, the attack itself and also escape routes in the event things go wrong. If they are switched on, they would not rehearse in the same vicinity, as the threat of being noticed would be high.

LE

CY C G N

If the attackers (or burglar) get to this phase, there is a chance that they will succeed in their attack plan as it is now too late. However, by vigilant security, their mission can still be disrupted.


Circuit :: OnTheJob

I

have been involved with teaching Surveillance Detection to qualified CPO’s in various countries over the past few years. Interestingly, I have been very surprised to find that not many of them had knowledge of the ‘Hostile Planning Cycle’. A subject, which I would have thought, should be taught as ‘basic stuff’ on any CPO course.

The role of the CPO can be many but they are employed essentially for one reason – to protect. To protect their Principal (or premises) from attack, kidnap, intrusion or theft.

by

There is no doubt that anyone (or a place) that is targeted for attack will have surveillance conducted on them at some stage. Whether it is an attack by sophisticated terrorists, an assault by a stalker or a burglary by low level criminals. All attacks would have gone through some prior planning in a process what is known as the ‘Hostile Planning Cycle’. As part of this cycle, surveillance is present and it is at these times when the attackers are vulnerable to detection (if they can see you – you can see them) and therefore hopefully be identified before an attack takes place. The cycle comprises of the following phases:

PETER JENKINS

Phase #1: PRELIMINARY TARGET SELECTION

The attacker will initially decide who to target and why. For example, to attack the base of an occupying military unit in order to disrupt and obtain publicity, or to attack a high ranking official from the base. It may be that the attackers have a list of potential targets. At a lower level, a burglar will decide to target a wealthy part of town with a view to stealing a car or to carry out a break in.

HO

Phase #2; INITIAL SURVEILLANCE

S T IL E P

The attackers will now conduct their probing recces of a target in order to identify weaknesses and strengths. They will not necessarily be going in close but they will be looking for: overt and covert security patrols, perimeter protection, access control, CCTV, alarm systems, close protection officers, vulnerabilities and routines such as shift patterns. If they find that their target is too well protected and too risky to attack, they go back to Phase 1 and start again. This is the same for Johnny Burglar, he notices that the neighbourhood has a ‘watch’ scheme, the houses are alarmed, have controlled gates, floodlit and some have dogs so he decides to look elsewhere. During this initial surveillance phase, the attackers will be vulnerable to detection, mainly by multiple sightings or behaving un-naturally in the vicinity.

Phase #3: FINAL TARGET SELECTION

The attackers (or burglar) will continue through the above until they have carried out their basic intelligence gathering recces, they will then select a vulnerable target to attack. They will now proceed to gather as much information as possible to make a successful plan, some of which will again be surveillance led (the next phase). They will obtain information on the target by obtaining: press cuttings, using the Internet, brochures, maps and plans.

LA

Phase #4 FINAL TARGET SELECTION

The attackers will now probe deeper at their intended target to obtain detailed intelligence. Rather can just carrying out ‘drive bys’ they may conduct static observations of the site, they may follow individuals such as VIP’s, members of staff or delivery vehicles. They may even infiltrate the site itself under the guise of carrying out deliveries or even obtain employment at the site. Again, during this phase the attackers will be very vulnerable and open to detection. Going back to our burglar, he will also conduct a pre-surveillance. He will observe the routines in order to identify when the household is empty and may even make a pretext visit to the house to identify and scrutinise entry points, security systems and so on.

Conclusion

It is not always easy to identify a potential attack at the stages mentioned above but these are the times that the threat will be exposed and most likely open to detection. The more sophisticated threats are now changing the way that they operate from a few years ago. A hostile element will only carry

out one walk past or one drive past in their recces and are never seen again; then someone else will do the next one, nor would they be sat nearby in a car watching for hours on end. ISS Training Limited are providers of specialist covert surveillance and intelligence training courses. The company director is Peter Jenkins, the author of surveillance training books, ‘Advanced Surveillance’ and ‘Surveillance Tradecraft’. +44(0) 1423 712265

Circuit : : 19


COUNTER TERROR EXPO I9 – 20 April 20II Olympia London www.counterterrorexpo.com

Counter Terror Expo delivers both focus and clarity to the complex and multifaceted task of protecting people and assets from those with the intent to do harm. This critically acclaimed event provides a vital forum for debate and plays a key role at the epicentre of the development of future counter-terrorism strategy. Unique, dedicated exhibition showcasing counter terrorism and specialist security technologies High level conference with six streams featuring over 200 leading international speakers Over 120 free-to-attend technology and practical workshops Live product capability demonstrations Meet the buyer programme Networking functions For more information please contact: Nicola Greenaway t: + 44 (0) 208 542 9090 e: nicola.greenaway@clarionevents.com w: www.counterterrorexpo.com

20 : : Circuit Register

Today at www.counterterrorexpo.com/register2011


Circuit :: OnTheJob

NEWS Oil Prices Rise And Rise! by

FERNANDO FIGUEROA

P

akistani General Mohammed Beg was ambushed by a suicide bomber whom attacked the vehicle that held him when stopping at traffic lights. I have always been taught that most ambushes come when arriving or departing a known static location. An example of this is the ambush on Consul General of the U.S. Consulate in Peshawar Pakistan, Lynne Tracy, she was attacked whilst leaving her home, but the quick thinking and well trained protection agent reversed the vehicle and they both headed back inside. This was not the case for Laurence Foley Executive Officer for the U.S. AID office in Jordan who was shot and killed leaving his home. We must try to change or make less noticed predictable patterns, routines and habits whilst protecting our clients. By doing this we can limit target selections and hopefully throw any “would be” attackers off guard. There are numerous things we can do to try to prevent this. We must have OPSEC (Operations Security). We need to not only protect our client, but also the Intelligence that comes with it, and counter the intelligence held by the people who wants to do harm to your clients. We should also have the ability to change routes at a moment’s notice so an ambush type tactic like the one above does not happen. The ambush may not be carried out with the intent to kill, it could be carried out in order to kidnap your principal. Recently John Solecki, the American who headed the UN refugee agency in Quetta Pakistan was kidnapped. Once again just as in the examples above, the kidnapping occurred as he was leaving his home, the ambush resulted in the death of his driver. Recently there was a jihadist on-line forum advocating luring Western businessmen to Gulf States under the guise of a business opportunity as a tactic to kidnap them which was discovered by The Jamestown Foundation Global Terrorism Analysis. The forum talked about ambush tactics and using bait to lure them to fake business opportunities then kidnapping them, which will bring the U.S. military forces into the kill zone for an ambush.

A training exercise that I like to use to heighten the awareness level of a trainee protector is called Walking the Gauntlet (taught to me by Jim Wagner). This exercise will develop alertness, mobility, and attack skills. It is started by having several participants line up, spread out evenly, on each side of a room facing inwards, you can do this with your team, friends and family or your martial arts school. Walk down the centre through the two lines. Prior to conducting the exercise face the wall and have someone select a couple of attackers on each side of the line, then turn around and walk through the midst of the participants. You are unaware of whom has been selected for the attack, cautiously move through the “crowd” until a noise or aggressive movement from one of the selected attackers catches your attention. Quickly defend yourself against the sudden attack. This exercise is designed to keep you on your toes and to expect the unexpected. You can also do this exercise walking with another person as your client and do some shielding tactics. What would you do if your client were suddenly ambushed by a grenade? This ambush tactic happened to George W Bush while visiting Tblisi. It landed 100 feet away from where he was standing. Suggested actions should this happen to your client -

Grenade Body Cover (Protecting principal from grenade or IED attack) 1. Observe 2. Warning Yell “Grenade!” 3. Turn Principal away and force to ground 4. Lay on top of Principal 5. Kick Principal legs together (no further action to protectee) 6. Souls of shoes point to grenade, heels together (while on top of protectee) 7. Elbows in, ears covered, eyes closed, mouth opened 8. Scan 9. Recover

It is fair to say that prices rarely seem to go down but just how is the latest hike affecting your business? With the continued unrest in the major oil producing areas of the world set to run and run how do you assess the impact on your business? Are your clients accepting the rise in your mileage or are they telling you to take it onboard? Either way, the continual rise in prices at the pumps will have an affect across the board and there seems to be no sign of a change.

Bodyguard or Beddyguard?

So then, the latest, greatest ‘follow this family’ the Kardashian’s is now in full flow. A recent episode depicted Kim’s bodyguard sloping off to the bedroom with her after a bit of on screen hot and bother. Is the bodyguard, Shengo Deane, a practicing BG? If so, is this a wise career move for him? Whilst it is fair to say that many male protectors would find it difficult to turn Ms Kardashian away there will be those that will not engage him due to this obvious lack of protocol. A publicity stunt or genuine lust?

Karzai: we’ll take over security

Afghan President Karzai ahs announced that his forces will take over parts of the country starting in July. 7 areas, including parts of parts of Kabul and the hot bed of Helmand are thought to be included in the initial handover. Will this be successful? Whilst it is preferable for the Afghan Army and Police to provide their own security in the long term this is sure to be an eventful handover. Hopefully they will work with the ex-pats rather than against them!

Circuit : : 21


Circuit :: OnTheJob

SHARPEN UP YOUR ACT Airsoft Training Weapons

A Cost Effective and Flexible Alternative to Range Work

Whether your line of work is EP, CP, LE, MIL, High Risk to Low Risk your Gun Skills are and need to be a continued training priority. You may have invested in highly valuable Tactical Pistol and/or Carbine Training Courses at any one of the many reputable training facilities and/or opportunities taught around the country. If you have, how do you take that valuable training home and perfect your skills? by

DAVID SODERGREN

Continuing your Education H

ere’s the challenge. Once you get home how do you duplicate your training? How do you practice what you learned and gain the muscle memory necessary to operate at the highest level? Whether you’re shooting free throws, paper targets or bad guys, the only way you get good is practice, practice and more practice. So, how and where do you satisfy the desire to hone your gun

22 : : Circuit

skills? It’s been my experience that most gun ranges don’t allow you to practice mag changes, holster draw, shooting from movement to cover, low light shooting, shooting with an elevated heart rate among other valuable training technics you may have brought home from your Tactical Training efforts. Although going hot on the firing line and punching paper has its place, its value to real world applications is more than limited.


Circuit :: OnTheJob

Answering the Challenge B

ack when I was on the job in the late 80s-90s I was trained by an Ex-Secret Service Agent named Marcus Wynne who told me to go out and buy a CO2 Air Pistol at Target. After our private sessions spent at the old Edina Gun Range he told me to go home and practice what he taught me using the CO2 Air Pistol.

mag changes and holster work and shooting from movement to cover. This process gave me the opportunity to practice my recent training which helped developed muscle memory (a term not even used at the time), when clearing garments to draw, and the use of cover, all which gave me confidence in my ability to fluidly acquire and address a subject in a three dimensional world.

As I over thought his assignment I hung up static targets in my 3-car garage. Having cleared out the garage I then developed and set up a Three Dimensional Targeting System. A system that allowed me to shoot beyond one or two targets and into the designated target using strategically placed shelving as cover I was able to work on

This brings us to present day training challenges. With the ever growing list of training weapons now available, which include ASP & Rings Training Guns, Simunitions, Paintball, Ram (Real Action Markers) and Airsoft among others, the options are certainly out there.

One to one replication of such weapons and equipment as Sig Sauer; S&W, Glock; 1911; H&K; M-16; M-4; MP5; Shot Guns, and all accommodating LE/ MIL Grade Optics, Lasers, Flashlights and more than include Blow-back action and even fit ‘Real Steal’ heavy duty holsters. In addition the airsoft platform has many speciality items including, Grenade Launchers; Sniper rifles; M134 Vulcan Mini Guns; M249 Saw; Ak47s and even remote detonating Claymore mine variations that are spring operated and use 6mm plastic BBs. Gas operated items include 40mm Grenades and Launchers are also available.

Building your own 3600 3D CQB Target System

N

ow, assuming you have chosen a Training Weapons Platform, the next step is to design and build your own 360 Degree 3 Dimensional Target System. This can be accomplished in a space as small as a one-car garage, a basement or warehouse space.

Since the 80s-90s when I started doing this I have added a couple of items that expand the value of this type of training, a dimmer switch, a fan, and a treadmill, all of which I will explain shortly. Firstly set up your targets. Using a back wall set up a few targets (4-6) at an appropriate height. In the highest corners of that wall on both sides hang one in each corner, this could represent shooting up in a stairwell situation. Now hang 1-2 targets about two feet in front of the eye level targets on the back wall (same height) with a string from the ceiling. Next hang targets out in front of the back wall to the sides of the room, either from the ceiling or the sidewalls of the room. Now fill in the middle of the room with structures (for use as cover) like a shelf unit (if you are in a basement or warehouse), auto (if you are in a garage). Attaching targets to a couple of U-Haul wardrobe boxes is a great way to move targets around

the room to keep the Target Environment changing and challenging. Now that you have the room set up with targets and cover, we install the dimmer switch, fan and treadmill or stationary bike. The dimmer gives you the opportunity to change the lighting so you can work in low light conditions practicing with the use of flashlights, lasers ect. The fan set on low will provide a small amount of movement from the target/s hung from the ceiling, simulating crowd movement. Lastly 4-6 rigorous minutes on the treadmill or bike gives you the opportunity to get your heart rate up to simulate the adrenaline rush or chase you may experience on the street. This is a whole new challenge now, controlling your breathing, acquiring your targets and making the right choices quickly. Moving through this system over and over again, while changing target location from time to time, will give you the opportunity to practice garment clearing, holster draw, shooting from movement to cover, mag changes and low light shooting. I don’t anticipate or wish to be in a gun fight, but, should the situation arise, this training has helped me to develop the ‘Muscle Memory’ necessary to respond at a high level. David Sodergren is the Owner/Operator of MS40 Tactical Training Centre

Circuit : : 23


Circuit :: OnTheJob

SURVIVING AN

ACTIVE

SHOOTER by

MARK “SIX” JAMES

Active shooter situations are often over within 10 to 15 minutes, before law enforcement arrives on the scene, individuals must be prepared both mentally and physically to deal with an active shooter situation. 1

Active shooters often look for soft targets like malls, churches or schools due to their low presence of security and high access to potential victims. The active shootings at Columbine High School, Omaha Mall, Virginia Tech, and Fort Hood left a trail of victims because the shooters were far more prepared than those who suffered in those ordeals. Financial or emotional stressors, forced

24 : : Circuit

AN

Active Shooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area; and continues to do so while having unrestricted access to additional victims. In most cases, active shooters use firearms(s) and there is no pattern or method to their selection of victims.

separation from a lover or a job, bullying or an overly aggressive manager or insensitive instructor may create the flashpoint which triggers workplace or school violence.

Locally, teen shootings are on the rise. While teen shootings haven’t gotten much national media coverage, children are nonetheless being left as brutally victimized as those at Columbine. The increase in teen shootings also impacts innocent party goers. The low presence of security and easy access to potential victims make party scenes perfect soft targets. Does your child know what to do to increase their ability to survive an active shooter’s mayhem? Active shooters generally have a singular focus- cause as much carnage as possible. Shooters range in profile from misguided teenagers to members of highly trained terrorist groups. They often seek to block exits to increase the number of casualties and impede law enforcement’s response. For personal protection, make a habit of identifying multiple exits upon entering a building, arena, stadium or other structure. Think about exits that may not


Circuit :: OnTheJob be seen by the general public. Restaurants typically have an exit door in the kitchen which leads to the outside. During an active shooter situation, be alert that any exit may have been booby trapped by the shooter. Quick, accurate assessment of conditions is critical to surviving. In an active shooter situation your choices are fight, flight or freeze. First try and assess sounds and their source. Freezing is not a realistic option; you become an easy target. Before deciding to fight, first consider fleeing. A tactical escape beats a tactical encounter every time. Remember the three E’s – Evacuate, Evade or Engage. Only consider engaging the threat if imminent danger exists. If you decide to engage, fight like your life depends on it because it does!

Fleeing Take Cover. Cover has ballistic stopping capabilities (brick walls, engine blocks, library books stacked back to back). If left without cover, move to concealment (hedges, clothes rack, and drywall). While concealment can’t stop a bullet it can hide you from view. Exit the kill zone immediately. Move, don’t huddle. Huddling makes you a bigger target and the shooter won’t have to move the gun muzzle very far to target his next victim. Look to leap frog away from the shooter using cover as you retreat. If the shooter has blocked the traditional exits, consider alternate escape routes. State fire codes and deliver requirements often require malls to have secondary exits; they’re often in the back of a store. These exits generally lead outside or to a fire escape corridor. If exit doors are locked intentionally by the perpetrator or for another reason, consider loading dock doors or lower level windows as an escape route (lower may mean the second floor). If pinned down try to wait for a lull in the firefight, possibly when the shooter reloads or gets distracted. Call 911 and get help on the way. Give police as much detail as possible. From the initial onslaught you will be on your own, as the police will not be in a position to respond immediately. Don’t rely solely on mall security, rarely are they trained to deal with threats of this level. After the initial shock and awe shooters often move to the clearing stages, hunting for additional victims. If you are unfamiliar with the layout of the location look for information such as mall directory maps or evacuation maps to identify exits. Many malls have directory maps located at intersections or inside of stores, often behind cash registers. A video camera can be a triple threat. The zoom feature can act like a set of binoculars; the low light setting can serve as night vision; the view finder and lens can work like a periscope to look around corners.

Barricading If inside of an office building, school, library or similar facility consider barricading in an office as you take cover. Use filing cabinets, desks, bookshelves or credenzas to barricade an office door if it opens inward. Once filing cabinets are in place consider filling them with large books such as manuals. This will increase the ballistic stopping capabilities and a heavy filing cabinet will be problematic for a perpetrator to move. Placing a door stop backwards underneath the door provides additional security. If there isn’t a door stop, consider folding a magazine or newspaper and placing it underneath the door. If the perpetrator breaches the door consider scissors to stab or vases, or wall plaques as impact weapons. Try to stay on the hinge side of the door as the perpetrator tries to breach the door. This will force him to lead with a body part or weapon which can be attacked, and potentially hide you from view.

sounds. You must be prepared to attack the perpetrator. This is a deadly force situation so be prepared to cause severe injury and possibly death to the shooter. If you are not a concealed carry holder, consider utilizing improvised weapons. A coat wrapped around your arm can serve as a shield to defend against an edged weapon attack. Attack the shooter’s vitals (eyes, nose, throat, head, groin or solar plexus). A backpack, briefcase or suitcase stuffed with phone books can serve as a small arms impromptu bullet proof vest. Most retailers or offices have scissors and box cutters which can be used in your defense. The center pole from a clothes rack, stiletto or wedge heel, and leg from a desk or chair can serve as an impact weapon. A belt can serve as a flexible weapon to strike (belt buckle) or to strangle. If trapped with multiple people, work together to improve chances for surviving. Your goal is to get the shooter on the ground and neutralized. If the shooter breaches the door you will only have seconds to mount countermeasures. Typically, when a person breaches a door he will look straight ahead first. Those who are in direct line or across from the shooter should move away from the team members who are positioned next to the door, to distract the shooter. Team members who are positioned on the side of the doors or at an ambush area should attack the shooter. One person forces the perpetrator’s weapon down and to the side. Another person attacks the shooter’s lower body, typically behind the knee taking him to the ground. Do whatever necessary to neutralize the attacker. Other team members should secure something to bound and gag the shooter while awaiting law enforcement. The most well trained person should secure the weapon and be prepared to help defend others. Move others into a position of cover away from the initial line of fire and prepare to defend. Do not leave a secure barricade with a firearm; you don’t want law enforcement to confuse a victim with the active shooters.

Changing Paradigm Prior to Columbine the traditional law enforcement response model was to attempt to cordon off the area and await SWAT. In most cases this allowed an active shooter to continue engaging innocent victims and caused more death and pandemonium inside the cordoned area. Police departments are moving to a more aggressive response, in which police immediately pursue, establish contact with and seek to neutralize the shooter. It is now recognized that the sooner the shooter is contained, captured or neutralized, the fewer the casualties. Moving toward the sound of gunfire is a strategy only for highly trained individuals, not the average citizen. If your family is pinned down, try and help them escape and evade until police arrive. Consider texting to give directions while maintaining cell phone silence.

Interacting with First Responders The first response team is typically a small unit of officers. They may be in uniform or plain clothes but will generally be identifiable as law enforcement either by uniform, badge or tactical vest. Do not run toward the officers, but listen for their commands. Keep your hands in plain view. Expect to be treated like a suspect until the officers assess the situation. Don’t expect first responders to render first aid; their initial concern is neutralizing the threat. After an incident seek counseling for yourself and family to help effectively process and overcome trauma associated with the event.

Choosing to Fight

Mark “Six” James is Executive Director is Founder of Panther Protection Services For additional safety tips visit www.pantherprotectionservices.com or

Don’t go looking for an active shooter. Try to find cover and look to set an ambush. Stay quiet and be attuned to environmental

Visit them on Facebook. 1 Department of Homeland Security How to Respond to an Active Shooter.

Circuit : : 25


P

Circuit :: OnTheJob

HYSICAL FITNES

I

with

RYAN NAISH

IMPROVISED STRENGTH TRAINING

t is commonly known that strength is one of the key training qualities that need to be developed as part of a Functional training programme. As I have mentioned in previous articles, the training model that best suits a CPO, is that of a fighter (MMA, wrestling, boxing etc). This will cover all bases: strength (all types), power, metabolic conditioning, endurance etc.

A conventional strength –endurance circuit is fairly easy to put together: Multiple press-ups, squats, sit-ups etc, either with time initiated changes or repetition based. Most people have seen this type of model, especially if you’ve been in the forces. From my experience, the problems occur when a strength session needs to be constructed. The majority of people are used to a traditional gym environment and struggle to think outside the box

S

to achieve the same (or in some aspects better) maximal strength results. What I will focus on in this article is a Maximum strengthtraining model using basic improvised and/or no equipment. Rather than break the body down into specific body parts with a bodybuilding approach (ineffective for fighters or CPO’s). We should look at compound, multi-joint movements, breaking the body down into upper-body (pushing and pulling movements) and lower-body (pushing and pulling movements). Using traditional Maximum strength training principles: 3-5 exercises, 3-5 sets, 3-5 reps per exercise. I usually reduce the rest from the typical 3-5 minutes by training opposing muscle groups e.g. A Press - 60-90 seconds rest – A Pull, continuing back and forth until the desired 3-5 sets have been completed on both muscle actions. The following are a description of the exercises with illustrations:

Upper Body (pushing) Examples

WEIGHTED DIPS

An excellent exercise, this can be performed on standard dip bars in a gym or for added difficulty, a set of Olympic rings. Ensure a good range of motion (ROM) to full extension. Weight can be added by using: Weighted vest/body armor, chains or a dip-belt and discs.

ONE-ARM PRESS-UPS

A challenge for many, great core exercise and added weight is often not needed. To increase difficulty and keep the rep range within the maximal-strength boundaries: Raise the opposite leg, bring the feet closer together or introduce a weighted vest or chains, (combine all if you need to!) If a one-arm press-up is currently out of your reach, fear not, a simple regression is to extend the non-working arm and rest on something at the same level. Gradually reduce the reliance on that arm until a true onearm press-up is achieved.

Upper Body (pulling) Examples:

Weighted pull-ups

Pull-ups are such an effective exercise that can be performed with huge diversity. For many, a regular under-grasp/overgrasp pull-up will be a strength exercise in itself. For the more advanced athlete, weight can be added as discussed in previous exercises. Experiment with different variations: One hand wide/ one narrow, legs horizontal, pull harder on one side or on ropes for an added grip challenge. The list is expansive. Thanks to Barry Gibson at Grapplefit.com in Sunderland, for letting me use his facility for the pictures in this article. Ryan Naish mma-cscc is a former Physical Training Instructor in The Parachute Regiment and an active Close Protection Operative.

26 : : Circuit

Qualified as a Strength and Conditioning instructor for Mixed Martial Arts, he specialises in functional training using improvised equipment. Ryan can be contacted by email: rn@ryannaish.co.uk


Circuit :: OnTheJob

Recline Rows

To make this effective as a Strength exercise, the key is leg positioning and body angle. By elevating the legs and increasing the severity of the body angle it makes the exercise much more strenuous. Again weight can be added.

Lower Body (pushing) Examples

1 leg squat

This exercise takes you right through a full ROM. It can be tricky when attempting for the first time, but achievable with practice. To start off, try wrapping a towel around a post, lean back and keep the tension. This should get you through any sticking points. As the exercise becomes more familiar, less reliance is placed on the towel. For progression, a weight can be held in both hands. This also acts as a counter balance.

Elevated Bulgarian split-squat

Elevating the trailing leg increases the difficulty and inputs a level of flexibility and balance to the movement. Weights can be held in the hands or use: Vest/armour/chains.

Lower Body (pulling) Examples

1 Leg Dead Lift

This exercise takes you right through a full ROM. It can be tricky when attempting for the first time, but is more achievable with practice. To start off, try wrapping a towel around a post, lean back and keep the tension. This should get you through any sticking points. As the exercise becomes more familiar, less reliance is placed on the towel. For progression, a weight can be held in both hands. This also acts as a counter balance.

Bodyweight Hamstring Curl

A very difficult exercise that requires a lot of practice to perform. Can be performed with a partner holding the legs. To make the exercise easier to achieve: Push up with the arms at the bottom position or try using Isometric (muscle contraction without joint movement) static holds at different points in the movement. To arrange the Strength session covering the full-body, sticking to the principles discussed earlier, we can split the exercises up to hit the whole body twice in a week e.g.

Strength 1

1a. One-arm press-up 1b. Weighted pull-ups 2a. 1 leg squat 2b. 1 leg deadlift

3-5 sets x 3-5 reps 3-5 sets x 3-5 reps 3-5 sets x 3-5 reps 3-5 sets x 3-5 reps

1a. Weighted dip 1b. Recline row 2a. Bulgarian split-squat 2b. Bodyweight hamstring curl

3-5 sets x 3-5 reps 3-5 sets x 3-5 reps 3-5 sets x 3-5 reps 3-5 sets x 3-5 reps

Strength 2

NB. Remember to take 1 minute rest between sets moving between groups of exercises e.g 1a – 1 minute rest – 1b – 1 minute rest – 1a etc, until you reach the desired set number for those exercises. These sessions can be incorporated as part of a concurrent training model (discussed in a previous article) e.g: Mon: Strength 1 Tue: Tabata intervals Wed: MMA circuit Thu: Rest/Developmental stretching Fri: Strength 2 Sat: Endurance Sun: Hybrid circuit

Circuit : : 27


Circuit :: Course Review

CERTIFIED SECURITY CONSULTANT

I

by

CHRIS BURMAN-DAY CSC MCMI

n recent articles I have discussed the development of security management and the role of the consultant. Critical to this development, in line with that of the wider security industry is the range of professional courses aimed at managers and consultants. As part of my own development I sought a qualification that would consolidate skills and experiences learned over fifteen years; those acquired vocationally and through successive training courses and seminars. After much research the Certified Security Consultant (CSC) course delivered by Anubis Associates Ltd in Hereford was the course I chose. Comprising three (at the time) modules, two of which were residential over ten days each, and at a cost comparable to the best CP courses on the market, it was a careful decision, both with regards an investment in time and money. The CSC has been designed to provide security professionals with a range of tools with which to provide specialist security knowledge to clients. The qualification is set at level 5 on the National Qualification Framework, comparable to a Foundation

Degree and is jointly accredited by Bucks New University, the Institute for Risk Management and Skills for Security; the only course of its kind to carry this level of accreditation. Running for a few years now, the course structure has evolved as student feedback has come in. In order to make the course more fluid a new structure for the course in 2011 is that of two modules, both residential, with the distance learning unit now embedded within each of the two residential modules. Instead of completing the original four 2000 word assignments as a separate module, the requirement is now for two 5000 word papers, one at the end of each residential module (via distance learning) before the students work is provisionally marked by tutors and then externally verified by the university. Before committing to the investment of the course I attended one of Anubis’ training / career seminars. While the cynic may say this was nothing more than a sales pitch, I found the openness with which the staff and management discuss their company, the industry and their courses refreshing. I was encouraged to go away and do my own research before committing to the CSC. For all of us in my Module 1 cohort, years away from the classroom took their toll

during the sometimes intense PowerPoint sessions. These however were interspersed with practical elements at local facilities conducting surveys and audits. Homework in the evenings, a marked assignment during the module and a presentation to be given by each member ensured the pace was maintained throughout the two weeks. Returning to complete the second residential module provided an opportunity to consolidate information learned, and develop those skills to look at broader subject areas. With an ever evolving industry the content was refreshingly up to date including giving underpinning knowledge of allied disciplines and skills such as continuity management, corporate governance and project management. Completion of the CSC gives 40 academic credit points, now thanks to Bucks New University they can be transferred as credit on their new BA degree in Security Consulting. Exciting times are ahead with this course and what it can offer. I found it an invaluable learning experience, and one that has opened not only my eyes but doors to wider opportunities.

Argus Europe Ltd Security Specialists

Our courses are accredited by EDEXCEL and cover all of the core competencies as specified by the Security Industry Authority. In addition the instructors have included extra tuition in subjects, which they believe will be invaluable to a Close Protection Officer.

Argus Europe has been providing specialist training for high-net worth clients and their families for 16 years, worldwide.

Our training scenarios will give you the opportunity to practice the skills of a Close Protection Officer using the knowledge that you have gained throughout the course in a realistic but safe environment prior to heading out into the field as a CPO.

Argus Europe is an operational company working globally with an extensive variety of contracts. Our continued active involvement with our operational commitments ensures that our training remains at the cutting edge giving us an advantage that others cannot match.

Argus Europe provides accommodation and breakfast and all learning materials. Course numbers are strictly limited so that all students enjoy a high instructor to student ratio.

We provide bespoke solutions for our clients using a pool of dedicated professionals and proven protocols. We can present a report outlining projected costs and the probability of success, prior to contract.

CURRENT COURSES • Close Protection [SIA License & BTEC Level 3] • Advanced Surveillance [BTEC Level 3]

OPERATIONAL COMMITMENTS • Close Protection Operations

• Private Investigation [BTEC Level 3]

• Surveillance Services • Commercial & Private Investigations

• Surveillance Videoing & Editing

• Fraud Investigations The Old Brewery, Castle Eden, County Durham, TS27 4SU T: +44 (0) 8456 123 843 | M: +44 (0) 7958 518 181 F: +44 (0) 1429 837 068 | E: arguseurope@msn.com

28 : : Circuit

• Motorbike Surveillance

www.arguseurope.co.uk


DEF APPS ARE THE CREATORS OF WORLD CLASS SOFTWARE APPLICATIONS

DEVELOPERS OF IPHONE, IPAD, ANDROID AND WINDOWS MOBILE APPLICATIONS FOR THE SECURITY AND DEFENCE MARKETS.

www.defapps.co.uk


COMBAT

FOR

UNARMED

Circuit :: Course Review

BODYGUARDS A review of the UAC-BG course offered by Safer Security Training

I

by

SHAUN WEST

recently took part in a training course ran by Safer Security which covers the skill base needed for the modern bodyguard working within the UK whom is not allowed to carry a firearm or any other kind of weapon to protect a VIP or themselves. The techniques taught enabled you as a CPO to shorten the time spent in conflict which would enable you or a team member to get your Principal away from the danger area as quickly as physically possible.

We were warned prior to starting the course that there would be strong physical contact and that any complainers should not attend. I actually paid lip service to the warning thinking it would be a nice easy day where I will learn a few new skills and update my techniques and knowledge base. I was right on that part but

couldn’t have been more wrong about “the easy day” part. The lumps, bumps, aches and bruises experienced by all whom attended were testament to that. The course started with a good old fashioned warm up before going through correct stances and how to read a situation before dealing with it. Scenarios were used first developing the softer communication skills before moving on to the escalation of force. For when things go wrong and it becomes obvious that contact is going to be unavoidable we were taught disguise, re-direction, striking, pressure points, restraint techniques, chokes, ground kill/ ground work and weapons removal. Foot drill tactics were taught also as well as techniques to use when sitting down in and around vehicles, as well as tactics that could be modified when working as a team. I loved the fact when all the nasty demos came up I always seemed to be the one whom was pushed to the front, I’m sure there was some sort of setup or pay off. I had to keep thinking back to my army days and the old saying of “No Pain, No Gain!”. I think we will all agree that there is only so much that can be taught in a day on any course, but I can honestly say that I took more from this course in one day that I have done from many courses of a similar type which have been run over longer periods. The course could run over more days but I think it would then lose the impetus, the thing that made it so good for me was that it was short, sharp and straight to the point. It is a practical subject that can only be taught in a practical manner and there is no need to pad it out with meaningless Powerpoints that aren’t really needed for this type of course. All in all the course has definitely helped me to add some new tools to my personal armoury and I think that this type of course should be mandatory when becoming a CPO. There are many academic courses out there but can’t forget that your role as a CPO is to keep your Principal safe from harm and courses like this will help keep you sharp and “tuned in” for when the softer skills don’t work. A great course, highly recommended and is taught by British Combat Association Personal Protection Instructors. Thank you guys. Anyone wishing to embark on the course take a look at www.safersecurity.com and get yourself booked up!

30 : : Circuit


Circuit : : 31


Circuit :: Course Review

FIREARMS FOR BEGINNERS

Kyle Carr reviews the Firearms Foundation Course run by Euro Tactical Ltd

“I

recently participated in a firearms course run by Euro-tactical Limited. My aim was to continue on with my continuous professional development and hopefully increase my employability. As a civilian with no military experience, firearms were totally alien to me; however by the end of the course I felt

comfortable, confidant and competent having used a variety of firearms throughout the course. The course was 5 days in duration and was held on a range owned by Euro-Tactical. Here are my thoughts and opinions on my experiences from beginning to end.

“

32 : : Circuit


Circuit :: Course Review Administration

I booked my place on the course via the Euro-tactical website and found the booking process easy and the website informative. I was given all of the information that I needed to make and plans prior to deployment. After my initial email expressing my interest in a course Euro Tactical could not have done more for me, helping out with everything including travel and accommodation plans. Every email that I sent was answered promptly, usually within a few hours. Every question was answered thoroughly.

Accommodation

Accommodation was included within the course fee which was great as it saved me time looking for accommodation near to the range in a country with which I was not familiar. The accommodation was clean, tidy, well maintained with free Wi-Fi, a TV, aircon and heating. Breakfast was provided, as was lunch. The shower was hot and the bed big and comfortable! My only gripe was that the TV stations were not English, however that was expected, after all I was in France!

Weapons

During my course we used a variety of weapons and I can testify that they have every weapon that you see on their website! Here are just a few of the hand guns: Glock 17; H&K USP; CZ, Sig Sauer; Dessert Eagle; Colt Python; Ruger; Smith & Wesson; the list goes on. The assault rifles were; M4, AK74. The extensive variety gave on offer gave me a much broader appreciation of weaponry than I ever felt that I could gain in such a short period of time. This course was not just about firing weapon, it was about being safe, we were taught how to strip and assemble all of the weapons that we used learning the intimate workings of each weapon. As a novice I was able to identify the different mechanisms that the various firearms have thus enabling me to become confident with each weapon system.

Facilities

The range was a wellplanned and organized environment. There was a clubhouse equipped with a TV

[English programs] Wi-Fi, tea & coffe, W/C along with comfortable furnishings. The range itself was 100m in length and had 6 firing bays, which gave plenty of room between students. There were well-placed tarmac strips allowing for a comfortable and dry prone position when required.

Training & Instruction

Prior to even stepping on to the range you were taught normal safety precautions or NSP’s and range protocol. Safety was something that was taken seriously at all times throughout my time with the Euro-tactical guys and made me feel comfortable whilst training. After NSP’s had been conducted we were down the range and firing live rounds. We were taught marksmanship principles, which we then implemented during a combat shoot. Initially we started with pistols at 15m and then 25m with them emphasis being on a tight group and point of impact. When we moved on the assault rifles we once again started with NSP’s and then marksmanship principals and being reminded of the firing cycle; breathing, progressively smooth trigger presence, hand placement and sighting. We started at 25m and then moved out to 50m and again the instructors were keen to improve our group and point of impact. Moving on through the course we had a re-cap of all of the training that we had carried out to date, a period that I found particularly useful. The final day of the course concentrated on moving from primary to secondary weapons and brining everything that you have been taught together. The day culminated in a final test! The test is a simulated combat shoot with a mixture of targets [friendly, enemy & hostage] and I found it a great way to test the skills that I had learned all week. Throughout the course the instruction was clear, educational and the instructors were true professionals who were able to adapt their methods to a particular students learning style. This made it possible for someone like me with no experience at all to learn and progress at an excellent rate.

Conclusion

My opinion on this course was that it was enjoyable, professional, and educational and well worth looking at should you wish to improve your firearms skill set. Highly recommended!

Course details can be found on the Euro-Tactical website at: www.eurotactical.co.uk or contact Mark Crawford on: mark@euro-tactical.co.uk

Circuit : : 33


Circuit :: Course Review

USING THE INTERNET AS AN INVESTIGATIVE TOOL Search by

NICK MCCARTHY

IT IS NICE

TO ENTER a room on day #1 of a course and feel immediately welcome and this is just how I felt as I walked in to Preston’s City Business Centre. I was welcomed by Neil Smith and Mick Turner; Neil was to present the course and was to be supported throughout by Mick of Sancus Solutions. I decided to take this course as part of my continual professional development [CPD] as this is something that I take seriously. The course was topical for me as investigating is an area in which I am involved with but like most things there is an iceberg principal going on here and I wanted to know more... what lies beneath the surface of Google and other search engines and really, who knows everything? I set off in a positive frame of mind and adopted my sponge like mentality so I could soak up as much information as was on offer. When it comes to courses, fancy locations are not important to many, me included. I have been to some courses held in great arenas but where the content was woeful, however the setting for this particular course was excellent which did everything to cement a good first impression and if this sort of thing is important to you then rest assured, expectations will be met. The were 10 other delegates on this course all of whom are involved in the security industry in some way; we had the usual mix of ex soldiers, former policemen, active bodyguards, private investigators and also 2 research assistants. So then, what did I expect to learn from course? Well, the advertising literature listed:

• Effectively search the internet for information relating to individuals/ organisations that traditional systems will not contain • Access information without risk of compromise • Produce findings in the form of structured intelligence packages • Trace emails to their point of origin The course literature very much stressed that

34 : : Circuit

the information that we would be searching for would be ‘OPEN SOURCE’ just in case anyone was thinking that we would somehow be accessing privately held data as this is clearly not what professional investigators are about. The course started off at a nice pace, Neil spoke to each of us in turn but as a group...this brought about a few laughs from the audience but it was all good fun and did have somewhat of an impact on the group and made us realise where the 2 days might take us. After this Neil was keen to see what level we were at and gave us a small task to have a go at while he made his way around the room to check on our progress. Once we had done what we could Neil moved his presentation on and showed us what results we could have achieved with just a few small changes and by how much more we could narrow our search down thus saving time and effort and being more accurate in our searches. This in itself was something of a eureka moment for many of us! I think most would accept that the internet is a fantastic resource and something that is here to stay so being aware of what can be achieved through it is an essential part of any investigators inventory and this course certainly made me very aware of just what is out there. Throughout the 2 days we were constantly shown new methods/different avenues to pursue but Neil was also keen to point out the relevant law and legislation with regards to your online investigations...sufficient knowledge in this area is a must! One of the other aspects of this course that I really liked was that we also covered your own security and that of your computers and the various documents that they produce and the information that can be gleaned from

them. Now, as I have often said in the pages of this publication, I am out there, I am able to be Googled [as are most of you!] I am a fan of social networking and general awareness about myself and my business interests BUT there are of course limits and ways in which your personal information can be limited and Neil gave us advice on how to do this. I found the information on ‘document’ security particularly interesting and very useful from a business perspective, in fact the course covers much, much more than the 4 bullets previously outlined. I really enjoyed my 2 days with Sancus Solutions, I feel that I learnt some new skills, revised others but overall added to my skill set which is very important as we are all still training, we just happen to be at different phases. If I had any complaints it is only that I could easily have spent another 2 days with Neil and discovered further ways to access open source intelligence but I think that is true of most courses in a commercial environment. Neil was keen to point out that 2 days does not make you an expert and that like any skill it must be worked at in order to improve. If this is an area that interests you then I highly recommend attending a course as you will learn, you will be able to network with others and you will be able to add to your worth by attending such training.


Circuit :: ShopTalk

BUDDYGUARDS A by

BRANDON J DELCAMP

Initially I was shocked, but after some consideration I realized that the people doing the hiring are not always educated as to what skill sets a protective agent should possess. When hiring someone to protect them they rely on superficial skill sets. These skills can be summed up in three questions that describe the base needs that most clients seek to fulfill. Can I trust this person? Will I feel comfortable with this person being around me at all times? Do I “feel” they can protect me? This is a trifecta of emotional motivators. If the principal, or the person doing the hiring for the principal can say yes to the three questions above the person is likely to get the job, and as long as there are no incidents, they may even keep the job. Look closely at the last question. Does the client “feel”. There are many reasons that the client can and will say, “Yes I do feel the person I trust will be able to protect me” regardless of whether that person actually has the training and skills to protect them. Most commonly the agent may have known or had some connection to the client as a friend or family member. Thus there is a personal connection or trust built into the relationship, and undoubtedly the associate hired as a bodyguard would do anything they can to protect the client. The issue at hand is not the willingness, but the knowledge of how to protect a client.

Many of these protectors may have the reactionary hard combative skill sets that the public at large believes a bodyguard must have, but know nothing of the soft skills used by a Protection Specialist that will ideally mitigate the need of ever having to use their hard skills thus limiting exposure for the principal both physically and legally. I have an example of a retired police officer that was the first choice of a new music artist to come on her first concert tour and provide her with close protection. The retired police officer was her uncle. He filled the basic needs of the client, he was her uncle and therefore trusted, and because he had law enforcement skills it was assumed by all that he had full knowledge of the protection business. The uncle is the one that called me half way through that concert tour. I truly admire the man, he did not let pride get in the way of admitting that his LE skill sets may be a great foundation for a Protection Specialist,

but they were only a portion of what he believed he truly needed to operate within the EP industry and properly protect his niece. After working with other protection agents and teams during the concert tour it became clear to the uncle that he did not fully understand the planning, coordination, protocol, and etiquette of the industry. This would bring up two points that I feel we can all learn from. Those in the industry that are struggling with finding a niche on a detail may bear in mind that; although they have a myriad of skills which appeal to those of us who are in the know, client relations and the ability to quickly develop a rapport with the client that is both comfortable, and professional while making them feel secure may be the missing ingredient to your success. These clients are clearly placing great value on the trust and comfort level they have in an individual. So much so that they are placing value on the base needs illustrated in the aforementioned questions without the knowledge of what skill sets are truly required. Which brings us to the second point; there are many clients and untrained protective agents that need to be educated in the intricacies of protective services. We should all be aware of the fact that there are those who simply do not know any better and it is the responsibility of everyone in the business to push education and training to promote the highest level of integrity and professionalism in this time honored industry. It takes only one incident for everyone to realize that the well meaning “buddy guard “needs training. In some of the situations an “incident” has been the catalyst for them to seek training. In other scenarios working different events and mixing with trained protective agents, the buddy guard/protective agent comes to the realization on their own that they are lacking the skills to give their principal the best. The former police officer uncle is an example of this. The intent was truly to provide the best service possible for the client. Fortunately he realized that the responsibility had grown beyond his ability to deal with the potential threats and negative situations that could arise. Some of you who read this may be in a similar situation where events and opportunity came before you could prepare yourself. You realize that the threats are real and the scope of your job description may be greater than you ever expected. Yet you may hesitate to pursue training wondering if you will be too far behind the curve. The fact is that you have some real field experience and will get more out of whatever training you do because you immediately see how and where to apply the knowledge you get from the training. I am sure that others of you have come across clients and agents in similar situations. The fact remains that information and education is a critical component in elevating the standards of the protection industry. Sometimes the cold hard facts are what these individuals need to hear. This can be an unforgiving business with harsh, if not brutal learning curves and each of us walk out the door every day not just responsible for ourselves and the tasks we are given, but for the safety and security of human life. We train seriously, and take our jobs seriously because it is not just what we do, but who we are.

GROWING TREND

A DANGEROUS AND

s the sales and marketing director for Executive Security International I have had a number of conversations with protective agents working in the industry that have little or no formal training. They are filling the roles of close protection agents for celebrities, ministries, music artists and for the most part are getting by, but the, “what if” factor is frightening to say the least. I queried one of these agents concerning the application of an “advance” his reply. . . . “An ad-what?”

Circuit : : 35


Circuit :: ShopTalk

NETWORKING AND FIRST IMPRESSIONS by Networking groups, such as LinkedIn, Facebook, Plaxo, etc., are great for making business contacts and sharing your expertise with potential employers or employees. Many of us spend a substantial amount of time on these platforms. The costs are minimal, if not free, and allow us the opportunity to enhance our reputations on a regular basis without having to constantly rewrite your resume. These networks have changed the way business is conducted worldwide. All of this sounds pretty positive and productive.

JERRY MACCAULEY CST

T

he drawbacks to these social networking sites usually appear when the poster forgets that he/ she is addressing professional peers, as opposed to friends. For example, Facebook allows one to create multiple accounts. Understand that one account should be used exclusively for business purposes and the other for general socializing. Posting a political rant followed by a professional request or expert response to a query may create the impression that you may not have the patience and discipline to work in a security environment. Hoping that some will not connect the two accounts is wishful thinking. Once a connection is made, it will not be easy to separate the two. Most of us have heard of jobs being lost due to offensive or improper postings on social networking sites. Human resource managers and recruiters generally do check these networks prior to interviewing candidates. Better to not have to come up with excuses for a moment of poor judgment. Another drawback to spending too much time on these networks might be the “blogger shortcuts,” as I call it. Just as texting and Twitter has created the need to change the spelling and grammar rules in the name of brevity and convenience, these shortcuts often make the writer sound like a teenager sending messages to their BFF (slang for Best Friend Forever). Personally, I’m not sure if I want that person watching my back or protecting a valued client. It’s just a matter of being able to separate the posting based on the audience you are addressing. In fact, I have a close friend who I considered to be the most intelligent person I knew. I recently received an email from him in which the most basic words were spelled phonetically and I was immediately disappointed. This is a person who can quote Shakespeare and Bible verses verbatim, but the email made me think that he had been kidnapped and sent to a re-education camp to learn the lazy way to write. Please don’t misunderstand my point here. Everyone makes typos and I frequently have been guilty of being rushed and forgeting to spell check my writing. Hopefully, however, I won’t feel the need to invent

36 : : Circuit

new words and take literary shortcuts when attempting to network with other professionals. Fair or not, that first impression cannot be corrected easily.

SOME COMMON MISTAKES Social networking sites can be a great asset to you or your business if handled with care. There are some traps to be avoided and doing a good “advance,” can help you step around them. Joining a group that shares your goals and objectives is key to surrounding yourself with industry experts. Spending some time to chart the ebb and flow of discussions is a great way to wait for the right time to inject your expertise into the discussion. Once you start receiving a few positive responses, you will find it easier and easier to become part of the family. Avoid the petty arguments that often appear in those groups that have very passionate members. If you’re not an expert, don’t pretend to be one. If you are repeating something you read or heard about, indicate that and always, always give credit where credit is due. Establishing yourself as an expert among your peers takes time. If you have the goods, people will notice. Finally, Facebook type social networks allow you to accept or deny access to you. Use that feature carefully and don’t just try to tally up the highest number. LinkedIn, on the other hand has a much more professional membership. If you are turning away “links,” you are turning away contacts. For example, you may have 100 contacts. Each one of those contacts has their own list of contacts. You can see how you can easily have exposure to 1000’s of potential experts in your field. You won’t get that by handing out business cards at a trade show, regardless of how charming you are. There are new social and business networking sites popping up all over the Internet almost daily, some serious and some frivolous. Be aware of exactly what type of new site you are joining. I have found many of these to be merely a data mining operation for outside interests. Others are just another way of killing time. With a little bit of preparation and effort, you will soon find yourself as an “insider” in the social network scene. Jerry MacCauley is the Asst. Director of Training for Sexton Executive Security, Inc. and has over 30 years in the law enforcement and security fields, specializing in training Personal Protection Specialists. Mr. MacCauley is a frequent contributor to various online security and bodyguard groups.


Circuit :: Feature

Keeping Your Edge The Value of Honor & Loyalty

T

hose that have heard my story know that I have never had the distinction of serving in the armed forces. However in my 18 years in the industry, I have had the pleasure of working, training and being mentored by many men and women from all branches of service. I also consider myself a student of history and have tried to make it a point to attempt to understand what makes some of the greatest leaders, and “doers”, tick. The question I ask myself, “What common trait takes these people above average, and makes them remarkable?” Through both experience and research I have found that two of the most prominent underlining principals are Honour and Loyalty. Neither of these words should come as a surprise, as Operators who engage in the age-old business of the protection of others, those are terms that I’m sure all of us have used at one time or another. However, I’ve noticed that in many cases words and actions don’t exactly sync up. It’s easy to say you are an honourable person, but the reality is, the true measure of that statement would only come once it has been put to the test. That is the reason I started this issue’s column with reference to the military. Members of the armed services pronouncements of Honor and Loyalty (H&L) are continuously put to the test, particularly for those that have been in combat. The man that stands side by side with his wounded brother, even when faced with overwhelming odds and possessing a means of escape, exhibits the definition of Loyalty. The soldier who takes the blame for an error that easily could have been pushed off on a subordinate exemplifies honour. These are principals that are drilled into the military mindset since the dawn of time. You will find this thread linking Alexander The Great, to Joan of Arc, to General George Patton. Both words and

actions are in sync because they are forged in the fire of tradition and common goals. However in the private sector, and specifically in the Close Protection industry, these words appear to have less substance. They are used with the same banality as saying, “How are you?” to a person you really don’t particularly know or care about – it’s just the thing to say. All too often Honour and Loyalty are overridden by the all mighty dollar, and the need to try and obtain it. Similar to the dog-eat-dog mentality of the corporate world, we protectors find the need to sacrifice Honour and Loyalty in order to succeed in short term goals. For example: Company Y is paying more, so the agent jump ships, forgetting the fact that the original company X sponsored all of the agents training and fostered many of his professional relationships. Or Client Z’s handlers have made a side offer to the backup agent which cuts out the more experienced (and expensive) primary, to which the agent accepts. Disregarding the fact that the backup’s future was as an untrained club bouncer until the primary gave him this opportunity.

J

ELI AH SH AW ple was just too lax in some of his work ethic. However, let’s be honest, whenever individuals find themselves doing something morally dubious, we can be quick to justify it with an excuse. We are all very familiar with the saying, “The ends justify the means”. Don’t get me wrong, for 99.5 percent of us, we are in the profession to make money and achieve success in life, however where do we draw the line? Is it ok to break a promise or renege on an agreement as long as you spend the majority of your time on the side of the angels? Is a corporation not worthy of loyalty if they are above a certain size and therefore “faceless? “ Is there a time limit or statue of limitations when it comes to pledging your allegiance to someone that helped you get your start? In a previous “Keeping Your Edge”, I went into depth on the topic of ethics, and my analysis was that each individual must answer moral questions both personally to themselves and truthfully with their heart. Remember words and actions are not always the same, and everyone is guided by their own individual compass. However, even with that said, I think this topic is a good conversation for our industry to discuss and think about. At the end of the day Honour and Integrity are more than a nice slogan for a business card. Those concepts have created men and women who have risen to the top of their fields and while they might at some point stand shoulder to shoulder with someone without those traits, one is by far remembered and judged more fondly than the other.

In both of the illustrations arguments and justifications can be made. Perhaps Elijah Shaw is the CEO of Icon Services Corporation Company Y was cheating its employee’s, or and The National Director of the North American the primary agent in the second examBodyguard Association

Circuit : : 37


Circuit :: HardTalk

The State of 21st Century Piracy in the Gulf of Aden And Beyond

Lucus Young of Transafe maritime ltd.

As long as there has been shipping, there has been piracy, but long gone are the days of wooden ships and a broadside of cannon ball. In modern times, (the latter 20th Century and now the 21st Century), you’d think that the Governments and Navies of the world, with all their technology and intelligence would have the piracy problem well and truly wrapped up. You’d be wrong. There are various shipping routes and sea lanes that are of particular high risk. These being the area of the South China Sea and particularly the Malacca Strait, situated between Indonesia and Malaysia. Even in the Mediterranean, acts of piracy

have occurred against the Yachts of the Rich and Famous. However, by far the biggest increase in piracy has occurred in the Indian Ocean and the Gulf of Aden, with the pirates coming from Somalia. Piracy is big business. The pirates have a great deal to gain and it would seem, very little to lose. With no true functioning Government and no prospect of finding meaningful employment ashore, many Somalis with links to the militias have taken up arms and headed for the boats that will transport them to possible riches through robbery on the high seas.

ith the Gulf of Aden being a main cargo shipping route, linking Europe to East Africa and the Indian Sub-Continent through the Suez Canal, there is a constant stream of potential targets sailing by at sometimes very slow speed. ‘An opportunity that is not to be missed’, by people who realistically have no other choice. The pirates’ mode of transport to carry out their attacks is the skiff, a small boat that is powered by powerful outboard engines. Armed to the teeth, with AK47 Assault Rifles, Rocket Propelled Grenades (RPG) and knives, the pirates attack and attempt to board ships at anchor or near to the coastline and even ships underway, with the intention of hijacking the ship and holding the crew hostage, with ransom demands in excess of $1,000,000. Recent events have also shown that it is not just the large ship owners and operating companies that are at risk. The ‘Chandlers’ who were released in 2010 after over a year in captivity, were literally just an ordinary couple, spending their retirement doing what they loved – sailing. More recently we have seen the hijacking of the ‘Quest’ which sadly resulted in the deaths of the American crew on-board. Ransom demands are quite often paid in order to secure the release of the Ship

and the crew from their hostage situation. Clearly the piracy problem has increased the insurance premiums that ship owners and operators have to pay in order to carry out their work. However, it is widely accepted that commerce would be affected more so if ships were re-routed to a longer route, around the Cape of Good Hope. But what is being done about the piracy problem? A multinational task force of over a dozen naval vessels from countries such as the USA, UK, Russia, Denmark, Holland and many more currently operate out of Djibouti, with ships patrolling sectors of sea and in some cases also escorting vessels who are travelling in convoy. Transmitting regularly on channel 16 to warn of the piracy threat and to let ships masters know which ship is in their particular sector and to report any suspicious activity. The naval vessels cannot be everywhere and often their reaction time to a ‘distress’ call is slow, with the pirates gone or the ship already taken by the time they get there. With this in mind many shipping companies are now employing private security companies to provide specialist security teams to ‘harden’ their vessels to aid in repelling pirate attacks and also providing maritime security consultants to travel onboard the vessels (armed or unarmed) to assist the ships master and crew in all matters pertaining to security and the repelling of pirate attacks. Often having security onboard is a necessity of Insurance and more and more often at short notice after a vessel is attacked whilst underway. Who are the security companies that provide this service? Companies such as

Securewest International, Solace Global Maritime, Protection Vessels International (PVI), Drum Cussac, Orchid, Erus Protection, Transafe Maritime, Eos Risk Management, Salamanca Risk Management and Red Four to name but a few are capitalising on the current piracy trend. We interviewed a representative from one of these companies: Transafe Maritime Limited, in order to gain an understanding of how the private security industry works, with regard to providing maritime security teams onboard vessels in high risk areas. Lucas Young is the Managing Director of Transafe Maritime Limited, a UK based consultancy that provides specialist safety and security services to the commercial shipping industry by supplying a market leading maritime consultancy service, giving clients a competitive edge and allowing them to safely transit their assets through potentially hostile waters. Lucas. You are the Managing Director of Transafe Maritime Limited; can you please define your company’s role within the maritime environment? Transafe Maritime primarily concentrate on providing the shipping industry with the training and the means to better protect their assets, i.e. their crews, vessels and cargo, where ever they might be in the world. Currently, international law isn’t on the side of a well-meaning seafarer attempting to afford himself adequate protection in, what are at times, extremely hazardous waters. Fortunately, Transafe Maritime

Kevin Whyte talks to

W

38 : : Circuit

KW: LY:


Circuit :: HardTalk have many years of expertise in working within the existing legal framework and we are very pleased to say that, to-date, we have only success stories to report. We differ slightly from some of the other well established maritime security providers in as much as Transafe provides its services not only to Ship Owners and managing agents, but also to other security providers. Your company provides specialist Vessel Protection Details (VPD), what backgrounds do these teams have and how do you recruit them? The entire Transafe Maritime management team posses’ considerable experience in working within maritime security and all come from UK maritime Special Forces backgrounds. Their connections give us access to a large number of operators, thus enabling Transafe Maritime to cherry-pick our personnel. All of our teams are ex-UK Royal Marines Commandos and UK Special Forces and include a trauma-medic and qualified Ships Security Officer (SSO). With the economic downturn affecting many other industries, how do you see the security industry and in particular the maritime security side of things progressing in years to come? The industry was ‘born again’ with the exponential increase in Somali pirate activity over the past 3-4 years, and we experienced a large number of start-up companies enter the market. Predictably and thankfully, the industry has subsequently matured some what, with some standardization of pricing and services being offered. If and when the international community ‘get a grip’ on the Somali pirate problem we will see the industry diversify in order to survive and some of the less well established and inflexible service providers go by the way side. Another threat to the maritime security industry is the reduction in global demand for fuel and goods, most of which travels on the worlds many water-ways and much of which passes through the now renowned GoA and Red Sea. Ultimately, if there is a decline in the amount of client vessels requiring to pass through these troubled areas, then the industry will understandably contract. Unfortunately, it will be the larger multinational companies that are better positioned to deal with any decline in demand. The smaller companies that offer the bespoke client focused services will be the ones who feel it most and it will be the client that suffers. With piracy in mind, and also terrorist attacks an ever present threat on shore, do you see pirate organisations linking together in partnership with extremist groups in the future for a ‘spectacular’ catastrophic attack?

KW: LY:

KW: LY:

KW:

LY: No I don’t. Despite the rumours out of Somalia of Al Shabab and Somali pirates cooperating, I am yet to see any validated evidence of pirates working together with organized terrorists. It is my understanding that typically the terrorists tend to be ideologically led; the pirates are purely financially driven. However, the piracy problem, in particular off of East Africa, has served to highlight the ease in which huge commercial vessels can be hijacked and I see no reason why a terrorist group could not duplicate the pirate’s modus operandi in order gain control of such a vessel.

KW:

Do you think that the International community could be doing more to prevent the rise in piracy and if so, what should Governments be doing to thwart this problem? This is undoubtedly an international problem but I feel that this requires an African Union solution. The international communities have in the region of 45 vessels conducting anti-piracy off Somalia and Gulf of Aden, unfortunately they have close to 2 million square nautical miles to effectively cover, which of course is impossible. So it looks as though a land based solution is the only truly effective means to finding a solution to the Somali piracy problem. I do not think Somalia’s transitional Government or the African Union will welcome nonAfrican military intervention in any African state. I am also unsure if America or Europe have the will to commence operations in Somalia which will take desperately needed resources from the current ‘war on terror’ being conducted in Iraq and Afghanistan. All I know is that piracy is a problem that has been with us for a more than a millennia and it will not be going away some time soon. Thank you for your time, and for providing an insight into how the pirates of this region operate In summary – It doesn’t look like the piracy issue off the coast of Somalia and beyond is going to be going away any time soon. Where Navies have failed, or simply not responded. The security of shipping has largely fallen to Private Security Companies, with the costs ultimately met by consumers. Piracy is an International problem that we’re all paying for.

LY:

Lucus Young is MD of TRANSAFE MARITIME LIMITED, Specialist Safety and Security Services to the commercial shipping industry. lyoung@transafemaritime.com www.transafemaritime.com Kevin Whyte can be reached at: www.writeme.kk5.org

NEWS Libya Crisis With UN Resolution 1974 in full swing many are suggesting that the Libya could be the next big thing for the Private Security Industry. With Allies unwilling or unable to commit ground troops it is highly likely that once the dust settles on the situation that there will be the need for some sort of influx from PMC’s. at the time of writing the US, UK, France, Italy, Canada, Spain, Denmark and Belgium had all committed militarily to Resolution 1974.

Reporter Missing In Libya

A UK journalist has gone missing in Libya. Dave Clark is an experienced foreign correspondent who is reported to have been arrested by Colonel Gaddafi’s forces. Do all reporters working in such areas of the world take security with them? It is common for the bigger networks to supply security but extremely doubtful that all are provided with it. We wish him a safe and speedy return.

OAP BG

It seems that Adolf Hitler’s last remaining Bodyguard can no longer keep up with all of the fan mail. 93 year old Rochus Misch says that he has boxes of mail piling up in his home in Berlin. Those who correspond with him want signed photos of him in uniform.

Tasers for Royalty?

In the wake of the student riots it has been reported that those who protect the Royals are to be issued with Tazer stun guns, the non-lethal option is thought to be necessary so that officers have more than one option at their disposal. While the threat from the students was a real threat that could have escalated out of control the use of lethal force would have been difficult to justify in any but the most serious of situations.

Circuit : : 39


Circuit :: ShopTalk

INDUSTRIAL Strictly the preserve T

he most naive and potentially dangerous belief that we come across as a practice is that surrounding intelligence gathering and industrial espionage; with ever increasing developments in technology boardroom spies and information gathering through social engineering is no longer the sole preserve of Fleming’s Bond or the Bourne franchise. Believed by some to be the second oldest profession in the world intelligence gathering and espionage can be traced back through the Old Testament to Biblical times and beyond; Sun Tzu wrote the Art of War approximately 500 BC drawing heavily on intelligence gathering intelligence networks. Reports also show espionage as being particularly prevalent in the 1700s when Chinese porcelain manufacturer methods were revealed in Europe. Reports also indicate accounts of industrial espionage between Britain and France as early as the first decade of the 18th century, during which time there were strong efforts to move British industrial technology to France. In the case of intelligence gathering and espionage it would seem that the history lesson is being often ignored. Directors and senior staff often underestimated or ignore issues surrounding intelligence gathering and espionage, the fundamental basics of countering leaks in intelligence and information are often overlooked. Technology that seemed out of this world in the 1963 film From Russia with Love half a century later has not only been mastered but superseded many times over. As a result of the fast technological developments and competitive market places intelligence gathering is no longer the sole preserve of corrupt governments and men with eye patches and white cats. These developments in technology have meant that intelligence gathering equipment can be purchased for just a few hundred pounds, and thanks to the Internet can easily be obtained. And the potential benefits? Depending on the motivations of the gatherer, can be worth many many times more than the few hundred pounds outlay. For the possibility of sourcing equipment

40 : : Circuit

by

CHRIS BURMAN-DAY CSC MCMI

for a mere few hundred pounds, those operations willing to spend multi-thousand pound budgets on gaining intelligence can stand to benefit by hundreds of millions of pounds. Such rewards far outweigh any potential losses. Notwithstanding the technical complexities of technical surveillance and bugging, in simplest terms office security is still a key source of intelligence gold for the gatherer. Basic oversights such as incorrectly disposing of waste paper failure to adhere to clear desk policies and failure to maintain security policies all play a pivotal part in creating the free flow of information through closed office walls. Many organisations large or small for foul of a lack of understanding and implementation of in-house security policies making espionage and the gathering of intelligence far easier. Despite fast improvements in technology the placement of bugging devices in boardrooms and offices is not always the first line of action taken by intelligence gatherers. After all few employees would likely question or cast suspicion upon an office visitor walking around with a hi-viz vest, hardhat and clipboard looking official. A failure to implement and abide by adequate security procedures combined with apathy towards day-to-day technology such as leaving laptops open on desks could prove an intelligence gold mine for the “social” engineer in this example. While conducting a recent audit of a facility in the UK, despite a six-man security guard force, IP CCTV systems and a robust security policy throughout the facility our team was able to gain access through a supermarket car park which bordered the facilities internal park and proceed directly into the main administration building via a fire escape held open with a fire extinguisher to allow fresh air into an office. The more we as individuals use and depend on technology the further espionage intelligence gathering and surveillance encroaches on our daily operation. As with correct waste disposal and basic informa-

tion storage it is general apathy on the part of many that creates this open source, increasing and promoting a culture of security awareness alongside a robust and fitting security policy can go a long way towards reducing the source, for CEO’s and senior managers to dismiss this is a naive and reckless approach to business operation in an increasingly aggressive and technology dependent world. Within the UK espionage and intelligence gathering is on the increase in the past 5 to 10 years we have seen a number of cases made public in which accusations of telephone tapping, mobile phone hacking, e-mail interception and bugging for surveillance footage have been levied. Most notable is the 2006/2007 phone hacking scandal in which the News of the World was the subject of a Metropolitan Police investigation highlights the breadth of espionage activity. This is a story which has recently reared its head in light of further accusations and dismissals. With reports that over 4000 individuals have had their voicemail hacked by the newspaper, it would appear that the list affects not only politicians members of royalty and celebrities but also private individuals and even the children of minor celebrities. More recently, animal rights campaign groups have waged widely publicised campaigns against the meat production industry. More than seven UK companies have been targeted in the last 18 months. These campaigns have largely taken the form of covert video surveillance of animal slaughter obtained via unlawfully accessing company facilities and placing covert surveillance equipment which, once footage is obtained has been made public via the Internet. It might be argued that this act is in name of greater animal welfare; however in a tightly controlled and heavily regulated industry such clandestine footage from covert surveillance within a facility which is regulated for cleanliness as well as welfare can lead to devastating commercial consequences, a loss of information, reputation, contract or client. With such companies serving contracts to supply household names such as the


Circuit :: ShopTalk

ESPIONAGE of Bond and Bourne? major multiples the negative effect outside the victim company can be broad sweeping and disastrous. As I write this, media reports are emerging from France concerning the security of information in relation to Renault’s electric car programme. It is reported that suspected industrial espionage against the company and its $4 billion electric car programme, jointly coordinated with Nissan, will likely pose a serious threat to the company’s strategic assets. Reports indicate that Renault have suspended three senior managers as a result of investigation which highlighted the information leakage. These cases identified above serve to highlight not only how the use of technology in our everyday lives is taken for granted but also how broad and sweeping the gather-

WHERE DO

YOU

ing of intelligence can be. The samples also show the simplicity and in many cases the depth which individuals and organisations will stoop to make our private information public knowledge. It is beholden on security professionals to instil an awareness of the security of information upon their clients be they private individuals high net worth families or corporate PLC’s. In 2009 report by German counter-intelligence officials put the cost of espionage to the German economy at an estimated US$53 billion, equivalent to over 30,000 full-time jobs. The main methods identified ranged from the traditionally old-fashioned spying game through phone tapping, theft of laptops and the use of Trojan e-mail attacks and other Internet-based methods.

Security awareness must play increasingly important part of the work we security professionals do, not only in identifying and highlighting security risks but providing an insight into the understanding of how security impacts our daily lives. PERSEC or “personal security” is ingrained in all of us involved within security, and now in combination with a lack of enforcement of basic security principles the technologies out there able to snoop and pride into our everyday lives, it is reliance upon and apathy towards this technology where the biggest security holes are found.

We asked where you read The Circuit and to send in your pictures from around the world. Thanks go to the contributions below. Send us yours for the next issue! Many thanks to BBA member Damon Paine of Safar Protection Consultants, seen here outiside the infamous Ritz-Carlton Hotel in Jakarta, while escorting Miss Universe 2010 during her visit to Indonesia

READ YOURS? Circuit : : 41


Circuit :: ShopTalk

ARAB & MUSLIM

TERROR

A Double-Edged Sword to Their Native Land’s Insight The new approach to better cope with homeland security issues

T

hroughout history we have learned how the extremist activity can have a great effect, even though most of those extremists are only a small part of their communities, these “noisy” activists, some who were very militant and powerful had in their actions caused, from very early on, a negative attitude and resistance against themselves within their own communities. Their movements have since gained momentum and dominance through the use of intimidation and terror, first in their local areas and then spilling out into the global arena.

This kind of process of expansion through terror and intimidation had a great impact on the 20th century as seen in examples such as the rise of the Nazi party in Germany. They began as a very small but militant and “noisy” group that eventually led the silent majority to disaster whose terrible effects were felt for many years thereafter. All this because of the inability to silence this violent minority even though they dictated a violent and frightening regime of internal violence and intimidation which caused suffering and despair to large parts of the German nation long before Hitler’s violent means were brought to the rest of Europe. Other similar examples continued and still continue to spring up all over the globe, where a violent minority takes control of its people or state and steers it and other groups into a cycle of religious wars, ideological struggles, wars and genocides. Violence in recent years and the threat

42 : : Circuit

of a nuclear Iran has only highlighted these dangers and the need for a proper understanding of this problem. Violent terrorist attacks against countries, peoples, organizations and individuals did not just begin in the heyday of terror around Arafat’s Fatah movement dominating the PLO in the mid 1960’s but shortly thereafter did see the advent of gaining recognition and legitimacy from most Muslim and Arab states as well as many of the non-aligned states largely because PLO violence was not directed against them and was therefore “not their problem”. Thus in the 1970’s the Arab and Muslim leaders did not expect that their support for such terrorist movements would bring upon themselves suffering, violence and many casualties. In recent years everyone can see the familiar cycle becoming evident where a small extremist minority, which is militant, powerful, has been granted legitimacy by various Muslim and Arab leaders and even some Western countries who have not understood that this is a double edged sword that will at some point or another hurt its wielder. Today millions of righteous and lifeloving Muslims and Arabs have forced upon themselves the “halo and image” which the small, violent minority sought to achieve through carrying out acts of terror and intimidation in the name of Islam or their Nation and in doing so polarized the entire world by religious

by

DAVID MIRZA

and ethnic divide between “light” and darkness” Sadly for the world population and for Arab states, Muslims and non-Muslims, there is particularly today no radical or cutting separation among those within the Islamic world who have used and continue to use terror as a mean against Jews and Christians who are in my view, a smaller problem compared to the attacks and killing sprees they have perpetrated against other sects within their own nations in the name of their religious or ideological struggle. Even at a short glance it is apparent that the number of casualties within the internal clashes of the Arab and Muslim world inflicted by these terrorist elements is higher than the casualties caused by their attacks on their perceived non-Arab and non-Muslim enemies in the name of Jihad and other such causes. Intimidation and Terrorism used against the Arab and Muslim nations by these small, violent, fanatic minorities is becoming a tool for gaining strength and influence both financially and organisationally, as well as to diminish the influence of the moderate yet tragically silent majority. Throughout the Muslim and Arab world, many leaders and businessmen are living under the shadow of fear and terror. Now they are recognizing that the extortion and violence which emanates from those terrorist groups who had been allowed build the basis for attacking Israel and


Circuit :: ShopTalk the West, Christians and Infidels is also turning very fast against themselves and against their own people. It is not a secret that a large amount of Multinationals Close Protection operatives from various countries are permanently deployed by both Governmental & Civilian sectors, in provision of Protection services to Arab/ Muslim VIPs and their families. It is also known that there are misunderstandings and sometimes, even conflicts between these VIPs and their

W

protectors that occur, mainly, because of the lack of familiarization with the culture, manners or mentality of both parties. Recently we all realize how the Afghan President Hamid Karzai struggles against the western security companies that have protected him and his Government during the very dangerous last few years of the Afghanistan chaos, and his reaction came as a result of the lack of familiarization with the culture, manners or mentality of the local population.

Integration of Protection Specialist through Joint Training

e at ISA - International Security Academy - ISRAEL have decided to open and share our knowledge, gained by Israelis and by our many overseas security and protection professional Arab, Muslim and Westerner associates from all over the world.

I

USB is the key! A UK council has lost a USB key containing the personal details of 4,000 vulnerable and often elderly users of its care service. As well as personal information, the stick also has key codes for 2,000 people, which are used to open boxes outside users’ houses that contain their front door keys.

Encryption BC

The major aim of this New-born innovative initiative is to integrate these Protection professionals laying aside all possible barriers, such as religion, political conflicts, different concepts, methods, tactics, etc., in order to jointly reduce and mitigate the violent crime & Terrorism worldwide.

Starting from August 2011, ISA - Group will activate a new innovative project: International training center for Protection & Counter Terrorism - Europe

sraeli Instructors of ISA – ISRAEL in conjunction with a Multinational Instruction Team of Protection & Counter Terrorism Instructors trained and certified by ISA - ISRAEL will impart their exceptional expertise, proven concepts and methods for the goal of qualification and preparation of Close Protection Operatives for Muslim, Christians , Buddhists and other religions believers’ or Nationalities . For reaching these objectives we have

NEWS

freed ourselves from possible barriers, such as religion, political conflicts, etc. This will be a joint training program for Protection operatives from a variety of countries organized by ISA – Group in Germany & Switzerland and thereafter it will be applied anywhere in the world where our certified Instructors will be active. The entire International Media will be invited to all stages of the training – 5 weeks

We believe that in doing so we will contribute to the decrease in fear and anxiety that arises among civilians in most of the countries, mainly due to the lack of sufficient knowledge and information in dealing with this continuing extremism of the radical Islamic minority. This comprehension of Arabism and Islam will help to confront and stand up against terrorism employed by radical terrorists in order to take control over their own people and religion, as well as over the rest of the enlightened free world.

An IT worker from British Airways has been jailed for 30 years for terrorism offences. The worker used encryption techniques that pre-date the birth of Jesus. The singleletter substitution cipher that was used was invented by the ancient Greeks and had been used and described by Julius Caesar in 55BC.

Rihanna to remake the Bodyguard? Not according to the singer herself. Although she has not been officially asked the question was broached to her about the upcoming remake of the film made famous by Whitney Houston and the answer was a resounding NO!

The SIA Post Public Bodies Bill It seems that the SIA has been maintaining radio silence since October 2010 when the current government announced a massive shake up with regards to many of the QUANGOS currently in existence. Well it seems the SIA have been meeting with key stakeholders to ensure that a proper response is in place. Many of us within the industry are more than a little curious as to what will be the future of the security industry so here’s hoping for some clarity sometime in 2011!

Circuit : : 43


USINESS CONSULTIN

SECURITY INDUSTRY WHITTAKER CO.

Whittaker & Co Accountants focus their skills specifically on the Security Industry, whether you work overseas, offshore or in the United Kingdom. We specialise in providing accountancy services, tax returns and tax advice to security operatives..

Our clients come from the following sectors : -

We are Close Protection & Security Insurance Solutions (CPSIS). We have unique experience in providing specialised insurance solutions for a wide range of professions and applications within the security and close protection industries.

Non UK Residents Maritime Security Sole Traders in the UK Partnerships Limited Companies Personal Tax Payes

INSURANCE ACCOUNT

At CPSIS, we know that no two contracts are the same. We pride ourselves on being close to and understanding the security industry, and tailoring our insurance solution to your specific needs.

Insurance

CPSIS provide individuals and companies with liability, professional indemnity, bodily injury, medical, life, travel and K&R insurance for an extensive range of professions worldwide including:

• Close Protection & Maritime Vessel Protection • Security Consultants

• Training (inc Firearms) • Surveillance, TSCM, Asset Recovery • Event, Alarm CCTV, Patrol & Guarding Call or email us to find out more: T: HEREFORD +44(0)1432 268007 E: protect@cpsis.co.uk • W: www.cpsis.co.uk Close Protection & Security Insurance Solutions is a trading name of Clarke Jeffreys Insurance Brokers Ltd which is authorised and regulated by the Financial Services Authority No. 303997

If you wish to know more about our services or you would like to arrange a meeting to discuss how we can help you in more detail, please contact us Tel : +44(0)1686 610662 Email: info@whittakerandco.com web: www.whittakerandco.com Skype: WHITTAKERANDCD 17 Parkers Lane, Newtown, Powys :: SY16 2LT


Circuit :: Feature

Working Girl by

JACQUIE DAVIS

S

o you think being a CPO is glamorous? Let me take you back to a job I did last year, I have been doing this for nearly thirty years so as you read the events which unfolded know a couple of things, I am highly experienced and never ever panic.

Phone rings and it’s a contact asking for a CP team for a high risk job, client and his family have received a serious threat of harm; the police have been informed and advised him to bring in a protection team. I ring round four of my colleagues and within two hours we are on the plot which is a large estate in Yorkshire. Having recced the area and decided on the best thing to do we sat down with the client, also in the room was his lawyer who made it clear he would be running things. Oh joy a legal eagle with no CP experience. The male client was given a three person CP team to travel with him to and from work, he did not want his family life interrupted despite me telling him that moving everyone from the property into a safe house would be a better thing to do. No he insisted the children had school and his wife her charity commitments. We set about upping the alarm system and the PIR lights about the property, entrance would be through a set of electronic gates, we had all the codes changed and the panic alarms would go straight through to the local police, whom I liaised with. We improvised a panic room on the top floor of the house and I spent a couple of days teaching Mum, the kids and nannies how to get there, two of the children in the house were aged four and five so I made it into a sweet hunt for them, the two elder children aged 12 and 14 just grunted. I made sure in the panic room were mp3 players so they could put the earphones on which would mask the noise coming from outside, also cold drinks, snacks, toys and towels. I explained to the family that they should not open the panic room door unless the password was spoken and although I knew this room would maybe only give them six-eight minutes of safety time, I was praying this would be enough time for the cavalry to arrive. The lawyer kept changing plans and risk evaluation, he would tell us the threat level had gone down only to up it again four hours later, we were work-

TANCY

ing in difficult circumstances but hey no one ever said our job was easy. After about ten days the lawyer phoned and said he thought the risk had passed and so please scale down to one CP in the house on days and one on nights, and two cp for the husband. We had booked ourselves into a hotel about 20mins away as that was the nearest we could get, so on a Monday night at 7pm I am alone in the house with four kids a nanny and a mum who by now is downing the cooking sherry on an hourly basis. The phone call came, the bad guys are on their way, I grabbed nanny and mum and told them to get the kids to the panic room now, I hit the panic alarm phoned my colleagues and then barricaded the doors, both front and back and then for good measure threw cooking oil all over the marble lobby floor. I rushed up the marble staircase with a large maglite torch in one hand and a can of Mr. Sheen polish in the other, the only weapons I could legally use. I waited, my phone was ringing it was the police saying they were about 20 minutes away, my colleagues phoned telling me they were also on way and about 15 minutes, this was the longest 15 minutes I can remember. I can’t tell you the sheer relief when my phone rang and one of my guys said I’m at the front gate, I leant out of the upstairs window with the fob to open the gates electronically, the lights came on outside and I was able to see it was indeed colleagues and not bad guys. Ten minutes behind them came the police with information that the bandits had been captured twelve minutes away from the property. Once we had released the family from the panic room we told them to pack a few things and we would be taking them to a hotel for a few nights. Whilst the packing and clearing up operation was going on I sat in the back garden with a cup of coffee and a cigarette and all I could think about was on-line forums where I had read postings from young newly licensed cp operatives about how great they were going to be and what a great job CP is, all the travel and famous people they would meet, all I could think was “Do you actually realise the responsibility we have as CPO’s “ Our client’s lives are in our hands.

Jacquie Davis is Director of Protective Services at Greymans Inc. www.greymans.com Circuit : : 45


Circuit :: Feature

NEWS AFGHANISTAN

Afghan forces to take charge: On March 22, President Hamid Karzai announced a plan under which Afghan soldiers would take over responsibility for security in seven areas, relegating NATO forces to a supporting role. The areas cover three provinces.

Protestors Killed At Mosque:

On March 23, at least five people died after security forces fired on protesters outside a mosque in the Syrian city of Deraa. Hundreds of people had gathered in the streets outside the Omari mosque to prevent troops from storming it. The mosque has been the focus of antigovernment demonstrations since Friday. At least 10 people have now been killed in clashes with police and soldiers.

Bank Robbers Killed In Speed-Boat Chase

On March 22, at least 18 people suspected of robbing a bank in Cameroon on Friday night were killed in a gun battle as they tried to make a sea-borne escape. Two banks were raided in the port town of Douala by gangs who made off in speed boats on Friday night. A member of the security forces also died in the shoot out. Seven passers-by were killed during the bank raids. Two suspected robbers were arrested. There has been an increase in piracy off the coast of Nigeria and Cameroon in recent years.

Bahrain And Iran Expel Diplomats:

On March 20, Iran expelled a Bahraini diplomat in a retaliatory move, amid an ongoing dispute linked to anti-government protests in Bahrain. Earlier, Bahrain had expelled the Iranian charge d’affaires. Tehran has criticized Bahrain’s Sunni rulers for using troops from other Gulf states to help control mainly Shia protesters.

46 : : Circuit

LISTEN UP POD u PICKERS, IT S THE u TOP TEN APP s FOR THE CIRCUIT OK

then, so most of us know all about smart phones and how much easier they can make our lives due to their ability to surf the net, receive e-mail throughout the day and reply in quick time. However, with the emergence of phones like Apple’s i-phone and the huge amount of applications or ‘apps’ that are available for them they have become even more useful for us as we go about our daily business as operators and business people. This is our top 10 list of i-Phone applications as it stands right now - we will review this each issue so that you can download the most useful apps going – if you have any that you think the readership should know about then just let us know and we’ll take a look!

1 2 3 4 5 6 7 8

SECURITY Q&A - £3.49 Are you taking an SIA test in the near future? Well this is the app for you. You get to see your results over time and where you have gone wrong so that you can measure your progress.

THE TIMES - £8.99 per month Want to keep up with the news but not be saddled with reams of paper? Subscribe to this app via the website and you will get the Sunday edition also. £8.99 per month may seem a lot but it is fantastic value!

1 PASSWORD Still in our top 10 and an amazingly useful app! Security for your passwords and other personal information on the go. Sync well with desktop versions.

GODADDY Want to stay in control of your domains while out and about? This great little app lets you purchase and manage existing domains and webspace.

GOTOMEETING We really like this software and recently undertook an online demo followed by a meeting using GoToMeeting and it worked a treat!

QUICK SALE Is your cash flow a problem? Are you invoicing quick enough or waiting too long? Purchase this app and see your cash flow improve!

BOOKING.COM Another nice, simple clear app that we have used extensively while and about and from the office.

VAT PRO A nice, simple little app for working out VAT at various rates, both inclusive and exclusive.

MYCARCHECK

9

10

Do you carry out recce’s and need confirmed details for vehicles? If you can get a registration this app will provide you with engines size, make, model for free and also allow you to make in app purchases to get things like purchase dates. A nice little app.

IDRAW So, you are on the ground with your device and want to send an image but it would be much better with some input from you. Using iDraw allows you to mark out areas and include text that can help your picture paint a 1000 words! Really useful for recce’s and as things occur.


The role of Law In

Afghanistan

I

n the depths of Afghanistan’s infamous Pul-e-charki prison lies Philip Young, a South African citizen who is being punished for defending his life against the attack of a disgruntled Afghan fired employee. On October 1, 2009 Philip was faced with gunfire from an Afghan employed by a company to which Philip did not work for. After being fired from his position, the local Afghan decided to arm himself, engage the assistance of other local Afghans for arguably an ambush attack and waited for Philip, lock, loaded, and ready. The courts have recognized that it is an undisputed fact that the employee had been fired and that Philip was shot at first. In an attempt to protect his life Philip returned fire. Unfortunately, after four shots fired in total from both parties, Philip has had to fight the system from the inside out. In its Supreme Court decision ruling against Philip Young, the court acknowledged that he exercised his legitimate right to self-defense pursuant to Afghan Law. As if that is not a big enough pill to swallow, the Supreme Court admittedly agreed with Philips defense. In their written rationale as to how they came to their ultimate decision, they even went so far as stating that the deceased “had pointed his weapon towards Phillip Young and (that the deceased) started firing first which motivated Phillip Young to respond in the same manner.” Despite this acknowledgment the highest Afghan Court sentenced him to seven years in prison. In the closed court hearing, the court did not allow Philip to have legal representation and he also was not afforded the opportunity to plead his case in person, as he was not notified of the court hearing. Such examples of blatant violations of codified due process measures in the law are part of the procedural legal process in Afghanistan. With millions of aid money funneling the Afghan system with the purpose of trying to legitimatize a formal legal system, there is clearly much work to be done. After visiting the courts, there are numerous procedural flaws that foreigners face in concert with what is going on with their case. For example, it is not unusual for foreign defendants to not have an attorney, to not be able to speak in court, to not have any evidence presented to the accusation being launched against them, and to not have a translator provided for them, which is a requirement pursuant to Afghan Law. Such practices

are often the norm. Even in the formulized court system, Sharia Law is cited as the primary legal jurisprudence by which the courts operate under. One of the challenges faced in a system that supports Sharia law as the primary law of the land is the lack of consistent follow through of its interpretation with like-minded defendants. In the courts there is little to no oversight of the legal process and such violations are allowed to occur with virtually little to no consequences. Abused within the court system many foreigners often try to rely on their respective governments to assist in the process. The court process is such that defendants by and large often go to court unrepresented. In a country of over 30 million inhabitants with a developing rule of law system many Afghans are unfamiliar and often unwilling to resolve disputes in the “formal” system of justice. What can be found is that even in the formal justice system, which offers strong International financial support, and some written laws that are useful, many Afghans remain skeptical. The formal system often blatantly ignores the rights of accused persons by not

by

KIMBERLEY CY. MOTLEY

offering legal representation, not allowing accused person to testify, ignoring the right to confrontation in court, and not affording defendants their presumption of innocence. As is the case of Philip who was convicted based on no testimony being presented in court, no evidence being presented, and no opportunity to present his case. And that is the formal justice system. In the informal justice system, accused are expected to follow and argue the Sharia Law, Afghan Law, and they bring up International Conventions in order to try and plead their case. Much of the aforementioned legal jurisprudence supports due process rights but still such rights are ignored. On top of this, another issue that accused persons have to face is the fact that often the trial court proceedings are not recorded and difficult to track the progress of the case from the defendants point of view. As a person, such as Philip who continually pleads his innocence, tracking the decisions of one court to the next is key towards fighting for his innocence and his right to be freed. Whilst the verdict of the Supreme Court with its written decision was a painful document to read, perhaps what was even more painful was reading a letter authored by Philip’s eleven year old daughter to President Karzai pleading for freedom on behalf of her 47 year old father. Philip’s family and friends have done what they can in trying to help free Philip. “I’ve been to counseling since my daddy was put into jail,” the eleven year old writes. “I’m too scared to sleep alone, I’m too scared to sleep out at my friends in case I come home and my mom’s not here.” “I sometimes think that he is never coming home,” she continues. “And I sometimes try to pretend that he is on his way home. I miss him so much. Please Mr. President Karzai. Let my daddy out please!!” To support Philip Young and his plight for innocence please visit the Justice for Philip Young facebook campaign at : http://www.facebook.com/group. php?gid=169459004518&v=wall . This article was written by Kimberley Cy. Motley, Esq., an International Attorney from the U.S. who has been working on human rights and commercial issues in Afghanistan for over a year. She serves as partner to Motley Legal Services and Motley Consulting International. For more info please feel free to email her at kim.motley.esq@gmail.com.

Circuit : : 47



Circuit :: Feature

HERE’S SOMETHING YOU DON’T SEE EVERY DAY - A FREE FINANCIAL

Q:

SESSION

I wish to pay my wife to do some book keeping for me. At present she works part-time earning around £15 000 per annum. Will this be tax efficient for us? Currently, I gross around £55 k a year. I want to do this because: 1. To keep the money in the household 2. I trust her 3. She has some experience of this sort of work If you are an employee then it is unlikely that you will get any tax relief for these payments, as they have not been incurred wholly, exclusively and necessarily to do your job, therefore you will not make any tax savings. However, if you are self employed this could be beneficial to you. Looking at this from a tax and national insurance perspective, as you are a higher rate taxpayer your marginal rate of tax and NI will be 41% (40% tax and 1% NIC) and your wife is a basic rate tax payer her marginal rate of tax will be between 20% and 31% (20% tax and possibly 11%NIC) in addition to this you may also be liable to pay employers NIC of 12.8%. As you wife already has other earnings she will be liable to basic rate tax on all of the employment income that you pay her. The National insurance charge will only be payable on income paid in excess of £110 per week (assuming that you are not connected to her other employer). Please note that there are other factors which you will also need to consider, which include the administration of the PAYE scheme, and employment legislation. I am self employed [just starting] and have a question: What are the options for claiming for a vehicle? My research shows that I can get a company car or use a private one and claim mileage? Is there a better option? I think that I will earn around 40k a year.

A:

Q:

A:

Only employees can have company cars by virtue of the definition. AS you are self employed you and the business as the same legal entity. You can deduct the cost of using your car for business purposes. There are two ways of working out how much you can deduct: a fixed rate for each mile travelled on business, using our fixed mileage rates the actual expenses, worked out using detailed records of business and private mileage to apportion your recorded expenditure. In addition to this if you own the car then you will be entitled to claim capital allowances. I have an office in my house, can I claim a % of the bills such as internet/ phone/heating? Yes, even though many of the bills for household expenses cover both business and private use. For example a self-employed person who uses electricity both privately and for business will normally get one electricity bill. A single bill does not mean that the whole of the expenditure is disallowable. The part of the cost attributable to business use is allowable. Is it possible to be self employed and salaried at the same time? Employment status is the term used to distinguish between whether you are employed or self employed, and your employment status is determined by fact, based on your key working terms and conditions. In most cases determining your employment status is straight forward and the following general rules are applied: • Employed if you work for someone and don’t have the risk of running a business • Self employed if you run the business and you are responsible for the success or failure. However in some cases the distinction is not always clear and the roles and responsibilities need to be considered in a wider context. A person will be class as

Q: A:

Q: A:

an employee if most of the following apply to them. • If some one can be told what to do, where to do it and when to do it. • There is no right of substitution that person must perform the required task • You are contracted to a set number of hours • You get a regular wage or salary • You are entitled to paid leave for example holiday pay • You are paid overtime It is likely that you are self employed if any of the following apply to you • You can hire somebody else to do the work or take on helpers at your own expense • You decide or influence where, when and how the work is performed • A fixed price is paid for the job regardless of how long it takes • You can make a loss as well as a profit • You are responsible to remedy unsatisfactory work at your own cost • You provide the tools and equipment for the job What receipts do I need to produce in order to claim mileage on my tax return? I have been informed that I can 40p a mile for all work related travel, what documentary evidence do I need to produce to prove these miles? Employees are entitled to claim mileage allowance via their tax returns for business travel at 40p per mile for the first 10000 miles per tax year then 25p per mile thereafter if they have not been reimbursed for these amounts from the employer. Only two types of journey count as business travel, these being Journeys that form part of an employees duties and journey’s that relate to an employee’s attendance at a temporary work place. In order to make a claim for this then the employee needs to keep mileage records including the date, starting and destination details and the actual mileage travelled.

Q: A:

Send your finance questions to Jason Cheesman ACA, Partner at Mitchells Chartered Accountants specialising in delivering accountancy services to people working within the security industry 0191 416 4820 JC.mitchells.ca@btconnect.com

Circuit : : 49


FAMOUS LAST Circuit :: ShopTalk

What’s the point of hiring bodyguards if we all end up dead?...

...John Lennon asked. Typical of Lennon’s character, this approach nonetheless was to prove fatal when, on the night of the 8th of December 1980, he was shot dead by a deranged fan, in one of the most notorious assassinations of the 20th Century. Like all of us, Lennon had no way of predicting what was going to happen next, but perhaps precautions could have been taken. In the same way we use a seat belt – ‘just in case’ – there is a strong argument for using a bodyguard in much the same way; being in the right place at the right time if something unpredictable or unavoidable happens. For some people, the need for personal protection is obvious – presidents, royalty and other heads of state. But what about the ‘Grey Area’ - high profile people who, like John Lennon, either don’t want, or don’t know they need protection? 24 hour security is obviously not needed for the majority of celebrities, actors, athletes and other public figures but they will require bodyguards a lot of the time. Not all day, every day providing around the clock protection, but whilst they are out, working and attending high profile events: ensuring they are safe in general, making them appear as a ‘hard target’ and observing closely when they come into contact with the public. In this case it’s the job of the bodyguard to identify the ‘potential assassin’ in the street or crowd who, for example may have turned up to see the principal’s performance six nights in a row and to then take steps to reduce future contact and avoid any possible confrontation.

50 : : Circuit

WORDS by

ED LAWRENCE

Of course, it’s in our nature to think everything will be all right. Few of us leave our homes in the morning, expecting not to return in the evening. But, as John Lennon found to his cost, unexpected violence may lurk just around the corner. If price is factored into this, we can see that the situation becomes even more dangerous. To put it bluntly, people are put off by the cost of staying safe, particularly if the money is being spent on something which isn’t tangible. For example, artist security is by no means near the top of the list on most production budgets. The chances are the only reason a bodyguard is sat discussing daily rates with a producer, event organiser or tour manager is because it’s a tick in their box; a contractual formality. If it wasn’t for the contract, it’s possible that they would rather spend the money elsewhere and possibly protection would be completely overlooked: until something happens. The amount of, or lack of protection is what makes the difference between a ‘hard target’ and ‘soft target’, as it depends on the motivation and resources at hand of the would be attacker. For example what is perceived as a hard target to one individual, without a weapon could well be seen as a soft target for an armed assailant. It’s very easy for people to become complacent thinking, like John Lennon, that ‘it will never happen to me’, thus leaving themselves open to unwanted attention and ultimately attack; becoming a ‘soft target’. On that night in December 1980 when Mark

David Chapman shot John Lennon, the mere presence of a bodyguard could have been enough for John Lennon to appear as a ‘hard target’ through the eyes of his assassin, this simple change of perception could have been enough to deter him and save Lennon’s life.

Two of the most common threats faced by celebrities today are from the Paparazzi and Stalkers which both have a drastic affect on lives. The Paparazzi; photographers who tirelessly hunt celebrities, public figures and their families for the opportunity to photograph them in candid, and often compromising moments. With the demand for snapshots into the lives of celebrities rising, so does the price paid for these pictures and with that, the ever increasing risks that these people are willing go to to get ‘the shot’ by any means necessary. In more extreme cases, paparazzi have taken photographs from rooftops or tree tops. They have shot private events from rented helicopters or boats. In some cases, if the event is in a sealed building, paparazzi have staged fire alarms or bomb threats to cause an evacuation of the building that forces their subjects onto the streets. Is that legal? The answer is, probably not. But with the lucrative nature of the business, the paparazzi are prepared to take risks and legal expenses have become part of operating costs, contributing significantly to the high price tag on such photographs. In a 2003 interview with The Guardian, Ewan McGregor spoke out against paparazzi and the publications that buy their pictures: “Heat magazine’s a dirty, filthy piece of shit and I’d like to put that on record. People shouldn’t buy it because it sucks… If a guy comes up and asks me, ‘Can I take a picture of your daughter?’ that’s one thing. But if he’s hiding behind a bus and he takes a picture of me and my daughter he’s legally allowed to publish that photo in the press. I have no rights to stop him and I think that’s wrong. I think we should encourage people to beat up paparazzi.”


Circuit :: ShopTalk

Stalkers

Psychologists have developed three general stalker profiles:

(I) Former-intimacy stalker Former intimacy stalkers, have had a history of intimacy with the victim which for some reason has now ended, they can be identified as having two subsections:

Rejection - This could either be due to a break up of a long or short term relationship like a divorce or the calling off of an affair. They perceive it as an insult, they feel wounded and seek vindication. They stalk their victims in order to reverse, correct, or change their minds. Resentment – This could occur in the work place, where an employee is made redundant or suspended; they may stalk their superior or rival who they believe is the cause of their dismissal. The stalker wants to teach the victim a lesson, they pursue a vendetta because of a sense of grievance against the victims – motivated mainly by the desire to frighten and distress the victim. (II) Desired-intimacy stalker Desired intimacy stalkers, known as Erotomaniacs fall under three subsections:

Delusional erotomaniac - They believe they are loved or will be loved by the victim. They often focus on someone of higher social status, usually a stranger or famous person. This person is mentally ill and delusional, they seek to establish an intimate, loving relationship with their victim, who may not even know, and often does not know of the existence of the person operating under the delusion. To many of them the victim is a long-sought-after soul mate, and they were ‘meant’ to be together. They are dangerously motivated by the desire to gain some kind of recognition from their target. Shortly before 14:30, on Monday the 30th of March 1981, John Hinckley Jr, attempted to assassinate American President Ronald Reagan. During the attack Hinckley fired six bullets, hitting and seriously injuring both the President and members of his entourage. Reagan only survived as a result of the quick thinking of his bodyguards, who moved fast to protect their principal by quickly shielding him with their bodies, before bundling him into a waiting car. Bodyguard James Parr further distinguished himself by checking the President for wounds once in the car and, realising the extent of the injuries, diverting the

motorcade to the nearest suitable hospital; a split-second decision that probably saved the wounded President’s life. Hinckley’s supposed motivation behind the attack stemmed from an obsession with actress Jodie Foster, due to erotomania. Apparently, Hinckley had watched the film Taxi Driver at least 15 times, identifying strongly with the protagonist Travis Bickle. The story involves Bickle’s attempts to protect a 12-year-old child prostitute, played by Foster. Toward the end of the film, Bickle - apparently driven mad by jealousy and obsession - attempts to assassinate a U.S. Senator who is running for President.

The borderline erotomaniac - Firstly borderline erotomaniacs have developed intense emotional feelings towards other people who they know do not reciprocate their feelings. Secondly unlike delusional erotomaniacs, borderline erotomaniacs usually have some history of actual engagement with the object of their attention. It may have been quite trivial; a slight glance at a social gathering could have been enough to set them off. The incompetent - This person is socially backward, they don’t understand the social rules involved in dating and romance. They don’t mean any harm but they have a fixation, or in some cases a sense of entitlement to an intimate relationship with those who have attracted their interest. Their victims are most often already in a dating relationship with someone else.

(III) Predatory stalker Also known as Sociopathic stalkers. This type is about sexual gratification, control, and violence. This type of stalker doesn’t necessarily know their victim and the victim may not know they are being stalked. A predatory stalker plans their attack, rehearses it and has lots of sexual fantasies about it. Two important features distinguish the Predatory stalker from the other categories; Firstly they generally do not seek a intimate personal relationship with their victims. Secondly they formulate a profile for their ‘ideal victim’, then they seek an acceptable candidate that fits their criteria. I spoke with Laura Richards, BSc, MSc, FRSA Criminal Behavioural Psychologist, who comments:

Stalkers come from all backgrounds and do not form one ‘type’. Stalkers are not homogenous and the moti-

vation for stalking can vary. Understanding the motivation is important when assessing the risks the stalker may pose. Motivation is often multi-determined and dynamic and some stalkers transition between categories. The danger of this in risk assessment and case management of a particular case can be deformed or adapted to fit a particular typological category.” “The most malignant and dangerous of all the stalkers are those who have had an intimate relationship with the victim. A prior intimate relationship is the most powerful predictor of violence in stalking cases.”

Perhaps one of the main incidences caused by the harassment of the paparazzi occurred on the 31st of August 1997, when Princess Diana and Dodi Al-Fayed were killed in a high speed car chase in Paris.

Taking into account the circumstances leading up to John Lennon’s death, it appears that after requesting that Lennon sign an album cover his assassin Mark David Chapman then hung around for several hours, waiting for Lennon and his wife Yoko Ono to return home around 11 p.m. On their return and noticing the figure of Chapman waiting outside, the couple exited their car on 72nd Street, as Lennon liked to oblige any fans who had been waiting for long periods of time to meet him. Taking the front entrance of the Dakota building, instead of driving around to the secure courtyard where the couple would have avoided Chapman completely. The actions of Chapman would have made any bodyguard suspicious and again possibly the mere presence of a bodyguard may have been enough to deter a madman like Chapman, and Ono then spared the agony of seeing her husband shot five times from behind.

www.edward-lawrence.com

Circuit : : 51


Circuit :: TechTalk

ANTI-SOCIAL

EXPLOSION Social Networking has exploded in popularity in the last few years, even encroaching into the business world with sites such as LinkedIn and Yammer and their usage has been a regular topic of debate on the BBA forums with people commonly falling into one of three camps – adamantly obverse, casual users that for instance would use Facebook to stay in touch with old friends and very proactive networkers that tweet regularly as well as maintaining an active presence in all of the popular sites.

I

initially decided to run an experiment to see just how easily usage of these sites would place information in the hands of the bad guys and what better way to do this (and provide an interesting article) than to run a penetration testing exercise against a security professional, so for the last few months I’ve increased my previously casual use of Facebook, Twitter, LinkenIn and Google Latiude, I started using all the sharing features of Google Reader

52 : : Circuit

There are plenty of services out there today the most popular of which is by far, Facebook which I’m sure needs little introduction. I’ve become aware during the writing of this article that while LinkedIn is immensely popular it doesn’t have the same de-facto awareness that the socially orientated sites such as Facebook and Twitter carry but is an invaluable resource for the working professional.

:: The Not So Hidden Dangers of Information Sharing by KEITH LOOSE

and finally reset my very old MSN account before asking a select group of my peers to track + trace my activities delivering (at least) a list of my clients, locations and ideally details of the types of work I was undertaking, it turned out to be very interesting, particularly proving that it is easy to fall pray to the tricks of a determined attacker!! Next issue will have the postmortem analysis of the guys work, but for now I hope the following tit-bits will assist you in having a more secure online presence – some may seem very obvious but I feel they need pointing out for clarity as 90% of all the initial attacks concentrated in one of these areas in one way shape or form. While it’s impossible to escape every social networking security threat out there, there are steps one can take to significantly reduce the risks and how better to establish what those risks are, in the process discovering a few tit-bits of advise that I want to share that will help you secure your online presence, use the tools properly as a powerful marketing platform and laugh a little at pictures taken at a night out with friends.


Circuit :: TechTalk Something that I’m sure most readers will be very cautious about, but it is worth mentioning as some disciplines rely on the prestige of your client base and not just word of mouth so there must be a strong balance between pride in the work you a performing and aside from the obvious, sharing too much would stretch to details (however brief) about your employers work. Perhaps you have been tasked to protect an individual that is in the processes of developing a drug to cure cancer, which is tested in the most eco/ animal friendly way possible - no negative connotations. By sharing too much about your employer’s intellectual property on social networks, you threaten to put it out of business by tipping off a competitor who could then find a way to duplicate the effort or find a way to spoil what they can’t have by hiring a hacker to penetrate the network or by sneaking a corporate spy (and yes, they are not just a myth purported by Hollywood!) into the building. This social networking security sin has sparked a debate in the industry about whether companies need to revise their employee computer use policies with more specific language on what is/isn’t allowed in the social networking arena. A play on words of an old saying has started to appear in the industry which everyone should abide by: “Loose Tweets Sink Fleets.”

Mixing personal with professional This sin is closely related to the first, but extends beyond the mere disclosure of company data. This is the case where someone uses a social network for both business and pleasure, most commonly on Facebook, where one’s friends include business associates, family members and friends. The problem is that the language and images one shares with friends and family may be entirely inappropriate on the professional side. A prospective employer may choose to skip to the next candidate after seeing pictures of you drunk or showing off a little too much leg at someone’s birthday party. In sharing such things, you also stand a good chance of making the company you represent look bad. Of course there are exceptions to every rule but you must remember that you may be quoted all over the Internet, so make sure to choose your words carefully. Be diplomatic and extremely professional. In some cases, it’s nearly impossible to separate business from the personal on a social networking site. Those who work for media companies, for example, are sometimes required to use all their social networking portals to proliferate content in an effort to boost page views which, in turn, attract potential advertisers. But wherever and whenever possible, security practitioners at the firms should work to keep each locked in their respective boxes. Engaging in Tweet (or Facebook/LinkedIn/Myspace) war For the person who has just been laid off or had their professional integrity called into question online, the urge to fire back with a stream of vitriol can be irresistible. Short and sweet this one, be mindful of what you say and imagine you are at a party where everyone is listening, including your boss, spouse or future employer and always remember that everything you post online will potentially be available for decades to anyone that knows how to type your name into a search engine.

Believing he/she who has the most connections wins For some social networkers, it’s all about accumulating as many connections as possible. Chaps on LinkedIn are notorious for

doing this, especially those in such LinkedIn groups as TopLinked and LION. This may seem harmless enough or, at the worst, just annoying. But when the name of the game is quantity over quality, it’s easy to link or “friend” a scam artist, terrorist or identity thief. The whole concept behind LinkedIn for instance is to only connect with people you really know (and usually have worked with) and I would extend this to all other social networking sites (Twitter is the obvious exception to this). Always verify the person who wants to get in contact with you and don’t go around adding everyone under the sun just because you once received an email that you were cc’d on.

My decision tree when I receive an invite goes as follows: 1) Do I know him or her? a. If not, why is the person trying to connect with you? 2) Can I see their profile. a. If you can’t retrieve a list of that person’s connections, why, if I know them I’ll either instantly recongise their email/picture/ description or will be able to see them through a pre-existing connection.

Over-sharing work activities

To summarise, the mantra for establishing (and accepting) connections is 100 relevant contacts are far more useful than 1000 unknowns.

Password sloth This particular item is one of laziness and a subject I have covered in previous articles so there should be no-excuses here amongst our readership!! Picking passwords for your social networks that you’re least likely to forget. In many cases, that means using the same password for LinkedIn and Facebook that you’re using for your online bank account or work machine. If someone with malicious intent figures out the password for one social network, that person can now go and access everything else. Using the same password on several sites is like trusting the weakest link in a chain to carry the same weight. Every site has vulnerabilities, plan for them to be exploited. I haven’t even covered the subjects of personal data, identity theft and helping build the bad guys bot networks by opening your machine up to malicious software writers of viruses and of course the biggest no, no tweeting / updating your facebook status saying “on the way to the airport for holidays – I’m so excited” but we will cover all of these next time as every trick in the book was used against me during my experimental period! Thankfully most unsuccessful but I don’t mind admitting I fell foul to some of the more creative attacks – which should make an interesting read!

Circuit : : 53


Circuit :: BoyZone

GET YOUR

KIT ON Kit reviews by Shaun West and Nick McCarthy

King of Headsets

Skype

Skype has been a round for years but it is constantly getting better! The latest version lets you conference call and that is really useful when collaborating on projects. If you pay a bit more you can even do video conferencing and look in to the eyes when you ask those difficult questions! www.skype.com

Key Fob Recorder

My love affair with DogCam Sport continues with my latest purchase, a covert camera with voice recording all nicely concealed in to what looks like a remote keyfob! Now, in any ordinary circumstance this would be impressive, and it is, until I realised that it recorded in HD [1280 x 1024 res]. Now that ladies he Novero Lexington is an expensive and gentlemen is very impressive. To Bluetooth headset so is aimed be fair the set-up process for the time at those with plenty of pennies, and date could be a little easier but for however it is packed with features and £149.95 then hey, I’ll struggle on. Best built with style. I’ve lost count of the number of Bluetooth results were obtained when filming static scenes but it does work well enough earpieces I’ve had and lost in the past; I have spent an absolute fortune so I’ve [in most cases] when filming people at always tended to stick to the cheaper walking pace. Colour production was models, however the Novero Lexington particularly good. The RC200 Plus is has certainly caught my eye, both because excellent for covert entries where a more of how it looks, the battery life, features traditional device may not be suitable

T

and because of a simple thing like a clip so I can clip it onto my jacket or shirt so it is with me all of the time yet I don’t have to wear it until a call comes in. It has dual mics and digital sound processing to eliminate any background noise and make your own voice clearer, the sound quality is noticeably different to any ear piece I have previously used. You can pair it with eight different phones, and connect to two at once, so if you’re like me and have a work phone as well as your personal one then you can be connected to both at the same time whilst driving and can take calls from either phone without any hassle or adjustments. It’s easy to use and has extremely good battery life comes packaged with a leather-encased holder which has a backup battery that extends the total life of the Lexington up to 20 hours talk time before you need to plug it in again. The headset is both compact and discreet and looks extremely expensive the problem is that the price also matches the look. If you have the money and like your gadgets then this is an excellent purchase.

54 : : Circuit

Microsoft Windows 7 on The Mac

Ok then, so maybe not a piece of kit per say but definitely something that allows you to use certain bits of kit! Most CCTV type footage is written for PC’s, something that the BBA office finds a little frustrating, as we are almost mac exclusive and hate dirtying our hands

with anything to do with Microsoft. However, I’ll admit it, its damn hard not to have some exposure to the things. So, to minimize everything we have just purchased Windows 7 and use it via Bootcamp allowing us to run windows on our macs. It is fair to say that Windows 7 is a vast improvement on the previous version and it works well with Bootcamp allowing us to work with exe files which can then be easily transferred to the mac OS so they can then be worked with on the mac platform. Windows is around £160 but it is a lot cheaper than buying a new PC that would be rarely used.


Circuit :: BoyZone

WHAT’S IN YOUR

“GO BAG” by

I

JUSTIN JOHNSON

n my professional opinion one of the most important pieces of “kit” you can have in your Go Bag is a medical bag. Outside of a warzone, you are 10 times more likely to use your med kit than use your firearm. Based off of those facts, it’s safe to say that this is one of the MOST important pieces of equipment you can carry --and I’m not just saying that because I am a certified Medic. Remembering that this article is a continuing discussion on “Go Bags”, and therefore equipment in it should be at-the-ready and portable, your medical kit needs to be mission specific. Would you carry 10 IV bags and just as many packets of Quick Clot while working a celebrity red carpet detail in a major metropolitan area? Makes sense if you are the team medic in Iraq or Afghanistan, but it might be a tad bit overkill at the Oscars. To simplify things, I am going to focus on low profile, low to moderate risk EP work. I will also give a run down of what I carry on every detail as a basic load-out for my medical equipment. First and foremost on your mind should be trying to keep the kit compact and portable. Yes it would be nice to have a level I trauma kit with me at all times, but the only place that is going to work is in the back of a Sports Utility Vehicle. We need to consider having something that is easy to carry and fits in our bag (for me a backpack 80% of the time). What I find that works really well is placing the medical items in a larger travel shaving kit bag and then inside my Go Bag. That style of bag keeps things nice and compact and easy to get to. Segmented like that, an Operator can carry a multitude of different items and make it easier to remove or restock as needed. After you pick out the bag within a bag, now you have to decide what goes into it. Again, think about your mission. Some of the things that I always have in great supply are Band-Aids, cloth tape, mole skin, 2x2 and 4x4 gauze patches, 2 inch gauze rolls, cravat’s, alcohol wipes, hand sanitizer, acetaminophen, ibuprofen, a pair of scissors or EMT shears, and tampons (even for male principles, in an emergency insert one into an open wound and it will stop or at a minimum slow the bleeding until you can render more in-depth aid). Working with just the items listed above and their many different uses, I can and have treated quite a few of the most comment aliment & injuries that one would likely encounter on a low risk security detail. Sometimes it doesn’t even have to be an injury per se. How about if a female Principle kept complaining about her designer shoes not fitting properly? Who knows, a single piece of Mole-Skin might be all it takes to save the day (and spare you having to hear the continued complaining!) This is after all a service industry, and your resourcefulness might be remembered when compared to another agent who doesn’t even know what a Go-Bag is. Having been a trained medic for 10 years, which has included time as a civilian EMT, Security Medic, and ER Tech, I have taken what I know and have applied it to what works for me in this ever-changing world of Close Protection. I hope this gives a good starting point or refresher on building one of the most critical pieces of kit you can carry. In my next installment I will be talking about digital media. The reasons why we should carry digital cameras or camcorders with us while on a Detail. Stay tuned and until next time:

PART 3

Stay Safe…

Circuit : : 55


Circuit :: BooKlub Here at The Circuit, we know that despite your image, you guys like nothing more than curling up with a good book..... This months reviews:

The Bodyguard’s Bible by: James Brown Review by Shaun West

I

have numerous books that I have used as a reference during my time as a CPO and I have found this to be the one that I repeatedly come back to. It is a great book to have in your kit bag, it is extremely easy to read, well laid out and is a

56 : : Circuit

great aide memoir which I have used on numerous occasions to refer back to whilst teaching and for jogging the old memory. It is great for new entrants into the industry as well as experienced operators and its good to see that there is no gung-ho-ness just a wellwritten book, which will help educate and refresh you on the role of the bodyguard.

Close Protection - The Softer Skills by: Geoffrey Padgham Review by Shaun West

A

pleasant surprise seeing a book which focuses on, the “softer skills” of close protection as opposed to the harder skills that most books tend to cover with lots of photos of ranges, driving and unarmed combat. This title is very different from most ‘bodyguard’ publications, which have a tendency to over-hype the job of protection featuring hollywood’esque images of big muscular guys stood next

to their principal wearing sunglasses. This is not what the industry is about, anyone can stand and look “mean” next to their principal but the modern bodyguard needs to have brains also. 95 percent of our job as a CPO is about managing people, situations and dilemmas. You need to be able to think on your feet, remain flexible, have sound judgment and be decisive in your decisions. You also need to be able blend into the background whilst remaining mindful, alert and able to react to any threats around your principal. The book covers many topics such as interpersonal communication techniques, pro-active planning ability, flexibility and about keeping a professional relationship with the protected person. Geoffrey’s knowledge and experience is plain to see throughout the publication and I wholeheartedly recommend it to any new aspiring CPO’s as well as the “seasoned operator”. The book highlights many of the most important issues facing a close protection operative, ways to deal with them and is an accurate reflection of the realities of the job.


CLASSIFIED United Kingdom A.B.I. Solutions A.B.I Solutions is a dynamic, forward thinking company, specialising in surveillance, security and investigations with local, national and international experience. A.B.I provides a wide range of services to the corporate sector and individuals alike. www.abisolutions.co.uk Alphyn UK Ltd Alphyn UK Ltd are a UK registered limited company primarily based in North Wales, with the ability to offer our range of services on a global scale. nfo@alphyn-uk.co.u Tel: +44 (0) 1745 538962 Amanda Campbell A highly motivated and experienced female operative both CP and Surveillence trained. T – 07596542249 www.amandacampbell.org.uk ac@amandacampbell.org.uk Argus Europe County Durham, T:+44 (0) 8456 123 843 Argus Europe has been providing specialist training for high-net worth clients and their families for close to 20 years, worldwide. Argus Europe now offer accredited training for CPO’s, Surveillance Operators and Private detectives. Argus Europe is an operational company working globally with an extensive variety of contracts. www.arguseurope.co.uk Broadstone Security Ltd T: +44 (0) 844 474 5001 Broadstone Security is a modern security provider in an increasingly insecure world. The company offers bespoke security services to clients who require everything from discreet close/executive protection to covert long-term surveillance operations enquiries@BroadstoneSecurity. co.uk Briareus Security Our aim is to give a complete, discreet and professional service to all of our clients, be they large corporations, small businesses, local authorities or private individuals, all tailored to meet their individual needs. www.briareussecurity.com info@briareussecurity.com Camberford Law Plc Lygon House, 50 London Road, Bromley, BR1 3RA Tel: + 44 (0) 20 8315 50 We provide bespoke insurance solutions for Bodyguard, Door Supervisor, and Security companies of all sizes. Cover can apply for worldwide services. It is an exclusive arrangement - not available to anyone else. BBA Associate Member. w w w. c a m b e r f o r d l a w. c o m / closeprotection Challenger Chauffeuring and

Security Ltd Eaton Place Business Centre, 114 Washway Road, Sale, M33 7RF Tel: +44 (0) 161 905 1424 Based in South Manchester, we aim to take customer service levels to new heights by providing smart, high calibre drivers and vigilant, professional door supervisors and security staff. Licensed close protection operatives are also available to work both at home and abroad. BBA Member. www.challengergroup-mcr.co.uk Coopersec Ltd Welwyn Garden City (Hertfordshire, UK) tel: 07969288494 Coopersec offer security to businesses and general public, experienced with 25 years in the industry info@coopersec.co.uk Custodia T - 01432 277693 Custodia is an independent client focused Specialist Security & Risk Management Company, specialising in Risk consultancy and Security project management. Providing a comprehensive portfolio of Risk mitigation solutions to assist Businesses and individuals to plan for, manage and mitigate risk. www.custodia.co.uk DF Risk Management Solutions Telephone : +44 (0)7837642686 / +44 (0)7758743918 DF Risk Management Solutions N.I. is a modern, professional risk management company, with a diverse range of global strategic experiences and a team of executives who possess dynamic but complementary backgrounds. www.dfriskmanagementsolutionsni.com First Class Executive Security Nottingham, UK, Tel: 0115 9266466 Nottingham based, full-service company specializing in Bodyguards and Security Consulting services. Extensive experience in VIP security, also caters for public and private sectors. www.firstclasssecurity.co.uk G6 Global T - +44 (0)1454 610050 G6 are specialists in all types of radio, telephony and satellite communications for both voice and data with particular emphasis on covert communications installations in both vehicles and fixed locations. In addition, our range of personal covert radios and bespoke accessories is extensive. info@g6-global.com Gordon Russell Highly trained frontline Close Protection Operatives available for UK and International contracts. Our experienced CPO’s can offer bespoke packages to meet all clients needs, including a variety of language skills. All SIA licenced, BBA mem-

ber Email - Bodyguard-cpo@Email.cz Tel - +44 (0)7917 281 004 International Centre of Special Training T: +44 796 736 55 65 International Centre of Special Training is an international training and security company based in the United Kingdom. Its priority objective is to provide services to the highest level. W: www.icost-team.com IPSS Security Northfield, Aberdeen, AB16 7EX Tel: + 44 (0) 1224 69455 Security and protection services UK and overseas. BBA Member. www.ippssecurity.co.uk ISS Training Ltd Riverside Cottages, Nidd Walk, Pateley Bridge, Harrogate, HG3 5NA Tel: + 44 (0) 1423 712265 ISS Training Limited are providers of specialist covert surveillance training courses and publications to the security and investigative industries, enforcement agencies and specialist military units. Formed in 1990, we are the longest established surveillance training company in the United Kingdom. Our credibility and reputation is widespread and we offer nationally recognised qualifications. BBA Member. www.intelsecurity.co.uk John Featherstone 24hrs : +44 (0)7702 740722, john@johnfeatherstone.co.uk Security professional with operational experience gained in a variety of theatres. Main specialities close protection and surveillance. www.johnfeatherstone.co.uk K9 Support Services Ltd T: 0845 643 6393 K9 Support Services UK Ltd is a supplier of specialist drugs and explosives dog/handler detection service (which includes arms & ammunition) to individuals, businesses, and the public sector. info@k9support.org.uk One Events Grantham, UK, Tel – 0870 974 6779 One Events offers you a stress free solution in the organisation, putting together and running of an event. This is accomplished by having a group of specialised companies from different industries working together for a more complete service for you. www.oneevents.info Pheon Close Protection T - 0800 975 3038 “We Protect Because We Care” Here at Pheon we understand precisely what is important to our clients requiring Close Protection Services – you want a high quality service that provides protection to the highest standard and gives you the utmost in value for money

To place a classified lineage or box advertisement telephone our sales team on: 0845 519 2538 info@pheoncloseprotection.com

PPSS Group T: +44 (0) 845 5193 953 F: +44 (0) 1765 603 512 Body armour and stab vests provide a functional solution to individuals who require extra protection in their chosen vocation. All PPSS (formerly ASEO) body armour and stab vests are certified by the UK’s Home Office (HOSDB) and offer unrivalled protection from blunt trauma caused by a punch, blow or kick. Based on our professional frontline experience and extensive research we can confirm that an impact based assault is a more likely event than an attack involving an edged weapon or firearm. E: info@ppss-group.com W: www.ppss-group.com Presence Security T: 0800 002 9734 Presence Security (“ PS ”) is a bespoke security company providing protection for private individuals and VIPs, as well as security services for businesses and organizations. E: info@presencesecurity.co.uk Prometheus Medical Ltd T - (+44) 1568 613942 Prometheus deliver unrivalled bespoke emergency medical support in the form of specialist equipment, training, strategic advice and deployed clinical care. www.prometheusmedical.co.uk Prosec Consultancy Ltd 10 Oakfield business park Westbury, BA13 4WF, tel: 01373 228055 Prosec Consultancy Limited are dedicated in providing a professional service, which covers a whole range of security services throughout the security industry. www.prosec-ltd.co info@prosec-ltd.com ProTouch Security T - 01724 279 522 ProTouch Security is one of the UK’s key providers of event safety, event security, crowd management, door supervisors, stewards, event management and health and safety. W - www.protouchsecurity.co.uk SDS Solutions T: 01453 887815 SDS solutions provide our clients with protective solutions that are second to none, our consultants will discuss every aspect of the problems that you are facing that dictate the need for a protective solution, we promise our clients a tailor made service to meet individual requirements. Whether based in the UK or abroad our protective service E: info@sds-solutions.org SGS Tel: +44 (0)1252 546957 semagurkha is an elite security provider, founded and directed by an ex Royal and Diplomatic

Circuit : : 57


CLASSIFIED Protection Officer and manned by fully trained, SIA licensed, English speaking, ex Gurkha professionals. We offer a flexible, discreet and expert support service to design, deploy and manage security services customised to fit your specific requirements and dynamics. enquire@semagurkha.com Shaun West United Kingdom, E: sw@shaunwest.co.uk T: +44 (0)7830 109 601 SIA licensed, Highly Experienced Frontline CPO. Ronin SA trained. Providing security for both corporate and hostile environments. www.shaunwest.co.uk UCP Group T: 0700 3496 007 UCP Group provide a range of security services, training programs, security consultancy, security merchandise, VIP/celebrity close protection services including residential security and highly trained rapid response teams for hostile environments. E: contact@ucpgroup.co.uk Veritas Group Romania, Hungry, UK Head of Security, WS Carr +44 73 50 50 967 Operations, M Gray +40 73 50 50 971 wwwvamsrl.com Viking Security 185 Langworthy Rd, Salford, Manchester, M6 5PW Tel: + 44 (0) 161 745 880 Our aim is to provide first class security solutions. By using the skills of our dedicated team of professionals, we will ensure the very best service and support is offered to all our clients. BBA Member. www.vikingsecurity.co.uk VIPA Tactical Training A specialist training academy dealing with four specific areas of combat: VIPA Civilian Self Protection Program, VIPA Close Protection Combat System, VIPA Police Defence Tactics and VIPA Military Close Quarter Combat. BBA Member. www.VIPAtacticaltraining.com

Europe & Africa International Security Academy P.O.Box 5833, Herzeliya, 46000, ISRAEL Tel: + 972 9 950 0969 Our graduates are more recognized, respected and sought after by Distinguish Protection service “consumers” and by most of the “Providers” of Protection services

58 : : Circuit

worldwide. Organisers of the 2008 International Summit of Protection Officers. BBA Member. www.SecurityAcademy.org.il Military Grade Encryption Phones PO Box 52310, Limassol, CYPRUS Tel: + 357 7777 7276 Built-in encryption software which converts your voice to encrypted data using a constantly changing mathematical formula. It uses a dual layered RSA/AES combination and a changing session key which modifies the encryption algorithm every second. € 1,398.00 + VAT. All prices include new Nokia N73 phone. BBA Member. www.protechcy.com/new Multi Tier Solutions Ltd. Modiin, Israel +972 8 926 5091 secure@multi-tier.com www.Multi-Tier.com A specialist risk management company providing security management software (off the shelf and custom), covert protection services, security auditing, specialized training in the fields of counter terror, covert protection and surveillance detection. Israel Ministry of Defense licensed secure@multi-tier.com www.Multi-Tier.com

Americas Bodyguard Careers Bodyguard Careers is an informational site with the purpose of providing bodyguards with all the information and tools necessary to succeed in the Close Protection Industry Info@BodyguardCareers.com www.BodyguardCareers.com Canadian Use of Force Systems 7975 Yonge St. # 7124, Innisfil, ON, L9S 1L0, CANADA Tel: + 1 705 456 4333 A professional Use of Force and Defensive Tactics organization teaching a full range of controlled response options for Self-Protection and Use of Force considerations in public and professional environments. BBA Associate Member. www.canadianuseofforce.com Contact Front Photography +1 (612) 369-6134 Contact Front Photography is the world’s 1st photography studio dedicated to the Close Protection Professional. Stop putting generic or pirated photos on your website; instead commission custom shots to best represent you or your agency. Info@ContractFrontPhotography.

com www.ContactFrontPhotography.com Decisiones Estratégicas Buenos Aires – Argentina Tel: +54(911) 6415 1941 E: jbenitez@d–estrategicas.com Executive protection specialists we have experienced in all Latin America, for multinationals companies, also providing support in project throughout Latin America to consulting first the US. and UK. We have a team of specialists and psychologists in assistance and crisis negotiation. www.d–estrategicas.com Detective Lacerda P.O.BOX 25996, São Paulo, 05513-970 , BRAZIL Tel: + 55 (11) 3452 4388 Providing the full range of security and investigation services throughout Latin America. BBA Member. www.detectivelacerda.cjb.net Icon Services Corporation 1043 Grand Ave. #312, St. Paul, MN 55105, USA Tel: + 1 651 695 8778 A full service security and investigative agency specializing in providing high-level security and bodyguards to international celebrities, public figures and corporations. Licensed, bonded and insured, our diverse roster of clients reads as a virtual who’s who in the corporate, motion picture, fashion and recording industry. Entering into our 10th year, Icon has been the hand picked choice to provide Executive Protection to everyone from Superintendents to Supermodels. BBA Member. www.Industry-Icon.com Imperial Protective Service, LLC 15849 N. 71st Street, Suite 100, Scottsdale , Arizona, 85254, USA Tel: + 1 480 281 1588 Imperial Protective Service’ (IPS) is a security consulting and services firm founded in 1978. IPS provides both national and international corporate, executive and celebrity protective services. BBA Member. www.executiveprotect.com Panther Protection Services 3695F Cascade Road Suite 2207 Atlanta, GA 30331 (404) 349-9117 Panther Protection Services is a full service protection agency offering such services as threat assessment, executive protection, self-defense training, firearms instruction, and high risk tactical protection. Our executive protec-

To place a classified lineage or box advertisement telephone our sales team on: 0845 519 2538

tion specialists have over 75 years of experience. Panther can handle your protection needs whether around the corner or around the world. Member: BBA and NABA www.pantherprotectionservices.com

SILVER STAR PROTECTION www.silver-star-protection.com Executive protection, site and event security with global experience. Serving southern Minnesota with integrity and professionalism. Former USSS, ICON Alumni. available for domestic and international travel. Robert E. Jones Manager/CEO rejones@silver-star-protection.com Tony Scotti’s Vehicle Dynamics Institute 1162 St. Georges Ave, Suite 277 , Avenel, NJ 07001, USA Tel: + 1 732 738 5221 The first name in advanced driver training, offering our highly acclaimed Protective/Evasive Driving Programs. Designed specifically for today’s executive chauffeurs, executive protection professionals and others who are responsible for providing safe and secure transportation services. BBA Member. www.vehicledynamics.net Vindex Personal Protection & Investigation Inc. 497 Hooksett Rd #365 Manchester NH 03104 603.289.3161 / Full service Private Investigations & Executive Protection. 10 years combined Law Enforcement, Private security, close protection work, & security contracting. NY Mayors, U.S. President’s, NFL owners, and VIP’s are some of the protection work I’ve gained experience with. ICON alumni, NABA member. vindexinc@aol.com /vindexinc.com

Asia Pacific Saint Security Consultants Pte Ltd 20 Kramat Lane, #03-04 United House, 228733, SINGAPORE Tel: + 65 67373104 Licenced by the Criminal Investigation Department of the Singapore Police Force, Saint Security Consultants Pte Ltd was incorporated by former Police officers from various departments and specialist professionals with decades of expertise in Criminal and Commercial Investigation, Intelligence Operations as well as Security Planning and Management. BBA Member. www.saint-security.com


Circuit The

www.circuit-magazine.com

The Circuit is compiled, edited and published in the UK and US quarterly by: The British Bodyguard Association. www.The-BBA.org.uk Info@The-BBA.org.uk Tel: +44 845 519 2538 Design, Layout and Sub Edited: Kal Wilkins

Contributors: Gil Boyd

Jerry MacCauley

Kyle Carr

David Mirza

Chris Burman-Day Andrew Clark Jacquie Davis

Brandon J Delcamp Fernando Figueroa Mark “Six” James Peter Jenkins

Justin Johnson Ed Lawrence Keith Loose

Nick McCarthy

Kimberley Motley Ryan Naish

David Preece Elijah Shaw

David Sodergren Gene Stratton Shaun West

Kevin Whyte

DISCLAIMER While every care has been taken to ensure that the information contained in this magazine is both accurate and up-to-date, The Circuit accepts no liability in any part for loss or damage incurred by reliance on information contained in this magazine through omissions, errors, howsoever caused. © COPYRIGHT Copyright remains with the authors and contributors at all times. No part of this publication can be copied or reproduced in any way whatsoever without permission from the publisher AND the author / contributor.

Circuit : : 59


INTERNATIONAL LAWYERS WITHOUT BORDERS AFGHANISTAN - UNITED KINGDOM - UNITED STATES

For more information visit Motleylegal.com

INT’L TEL: +1(704) 765-4887

|

US TEL : +1(704) 763-5413

|

AFGHAN TEL : +93 (0) 795 069 652


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.