Circuit Magazine #51

Page 1

News • Opinion •

Reviews •

Exclusives •

Intel

51

TSCM

FIGHTING AT BAD BREATH

DISTANCE

TECHNICAL SURVEILLANCE

COUNTER MEASURES

CORPORATE ESPIONAGE 1

N O N - V E R B A L C O M M U N I C AT I O N / / / P R O X I M I T Y & V I O L E N C E / / / F I T N E S S M I N D S E T


CIRCUIT MAGAZINE ISSUE 51

CONTENTS 14

02 Contents 04 UK Foreword 07 US Foreword 08 Industry News 14 Non-Verbal Communication Inward Focus for EP

22

22 Navigating The “Craft” 28 Corporate Espionage The Role of the IO 37 TSCM In the Private Security Industry 46 Fighting at Bad Breath Distance Proximity & Violence

28

56 Law Enforcement V Executive Protection Roles and Responsibilities 62 Fit for Purpose Mindset, Ideas, & Planning 68 Tactical Firearms The Shotgun P2

68

76 Cybersecurity AI, Machine Learning & Bias

2


CONTENTS

84 82 Ask the NABA Network 84 Kidnap & Ransom Finding a Resolution 92 Incident Report Global Round Up

107

100 Ammunition Does it Matter? 107 Foot Steps Sam Alicea 112 Global Events Map 114 Event Review

118

118 Keeping Your Edge Flowers For the Living 123 Classifieds

Editor’s Note: We regret to inform readers that due to unforeseen circumstances; we are unable to continue the Kidnap & Ransom series and publish part 3. However, we are indebted to regular columnist, Bob Shepherd, who has provided a replacement article, outlining his views on the ransom and negotiation phase.

3


EDITOR FOREWORDS

Welcome to another belting issue of the Circuit. Readers around the world will be all too aware of the Coronavirus (COVID-19) outbreak, that is, unless you're so far off the grid you make outdoor evangelist, Ryan Naish, look like Morpheus! The World Health Organisation has now declared this a public health emergency of international concern. And as it's a new illness, it is not known exactly how it spreads; though it's believed, similar to the flu virus, it is contracted via cough droplets. Current advice is to wash your hands with soap and water, and often. Maintain a healthy lifestyle and avoid close contact with people who are unwell; simple, right? Well, with each day that passes, more cases are confirmed, and it looks like things will get worse before improving. Nobody knows where it will lead, but following the official advice and applying a large dose of common sense to situations will help. It's advised to work remotely, if possible, but for the majority of readers, working on a protection detail, that's going to be tricky. However, we must remember our role and think about the bigger picture. Our number 1 aim is to protect the Principal from harm, and that extends beyond physical protection. Infecting the client would be viewed as unfavourably as leaving your firearm in an airplane restroom, along with the Principals passport; if it's deemed you neglected to mitigate the risk by following proper procedures. For sure, it's going to be difficult, our jobs demand frequent travel, but don't overlook the small things you can do. Avoid busy airport lounges, board flights last, so you're not stood in a queue with hundreds of other travellers. Carry wipes and sanitiser and disinfect seats and tray tables, particularly the metal fixings where virus molecules linger longer. Your client employs you in a protective

capacity; don't also be the biggest threat to their health! In other news, we are now a quarter of the way through 2020, and so far, for me, this year has been about streamlining daily tasks and freeing up precious time otherwise consumed by the daily chores of running a security business. While some tasks simply can't be automated, I have found that by investing in the right tools, I've been able to make considerable improvements to workflow. Specifically, one tool I highly recommend is monday.com. The addition of this one piece of software has had the same impact as hiring an extra member of staff. I've been so impressed with it that we're now using it in the production of the magazine too. Before I sign off, I wanted to give a shout out to CTG Intelligence, who, with the support of the British Bodyguard Association, hosted the CP Technology forum in London. The event was a resounding success, and it was excellent to meet with so many fellow professionals, Circuit subscribers, and magazine contributors, many of who took to the podium to share their knowledge and experience. The pre and post networking drinks were a particular highlight, where ideas were exchanged, stories told, and heated debates ensued, the hallmark of a passionate industry! So my friends, until next time, stay safe and remember… keep those hands clean! Stay safe, Shaun West Editor

4


10 Mar – 22 Mar 2 Sept – 14 Sept

2

21 Apr - 3 May 30 Sept – 12 Oct

5


PERSONAL COUNTERING VEHICLE SECURITY ATTACKS SNIPERS IN HOTELS

COLORADO 2019

MAY 2020

6


CIRCUIT MAGAZINE ISSUE 51

Confession time: I’m typing the foreword to this issue from my bed, and I’m praying that I will finish before the sleep monster grabs me. Today has been a long day, of an even longer weekend. I’m 1/3 the way through an international assignment that has me in a foreign country in which I don’t speak the language and is pretty well known for their, ummm …“logistical” challenges. With that said, the last hour, which could have been spent sleeping (or finishing up this column), has been spent laughing with the other agent on this assignment before we called it a night. Over a cold sandwich and some fruit, we joked about some of the unexpected curve balls that had been thrown at us the past few days, and while some would have used that as an opportunity to bitch and moan, we saw the humor in it, and chalked it up to, “just another day at the office.” You see, there’s an old saying that also fits very well within our industry, “When you are doing something you love, it doesn’t feel like work.” Don’t get me wrong, the work is important, but if you are genuinely committed to the

craft, I mean 100% invested, it doesn’t feel like you are just punching a clock and collecting a paycheck. Now, what does all this have to do with the magazine you are holding in your hands? Well, do you recall how tired I told you I was in the opening? Well, here I am 300 words later, and still typing. It must be the fact that I love helping to produce The Circuit and take pride in its impact globally. To think that something I’ve played a part in creating has informed, educated, and even motivated agents from Moscow to Morocco (I know this because I’ve talked to readers both places face to face), is one of the coolest things. So, it’s things like that, and the ability to be able to blow off some steam with a teammate before we start it all up again tomorrow, that makes the long days’ worth it. Elijah Shaw Editor

7


CIRCUIT MAGAZINE ISSUE 51

Industry News At A Glance

We cast our eye over the main stories impacting the security industry. Here's what's appeared on the radar since the last issue.

SIA Get tough on Unlicensed operators

Leicester, UK

When contacted by the SIA, Dogan claimed that Cobra Security Services had not been in operation since the start of 2017, which was a lie.

A UK security company boss has been ordered to pay £30,000 (aprox $39,000) or face jail after operating without a licence.

Nathan Salmon, SIA criminal investigations manager, said: “We want to support compliant businesses by ensuring that there are no financial benefits to operating without being properly licensed.”

Irfan Dogan, who ran Cobra Security Services in Leicester, falsely claimed he had Approved Contractor Scheme (ACS) status. Dogan has been ordered to pay £30,000 of his income back. If he does not pay within three months, he risks being jailed for eight months.

Guglielmi said Juice WRLD was with about a dozen people, including his entourage, security guards and aircraft staff, and was seen “basically convulsing” at a private hangar.

During a sentencing hearing on Friday, February 14, Judge Timothy Spencer QC told Dogan: “You were playing fast and loose with the law.”

Guglielmi said two of the guards were armed with weapons. The guards had valid concealedcarry permits, but they don’t allow them to bring weapons to an airport, so they were arrested and charged with misdemeanor gun violations.

Dogan’s licence to operate expired in 2017, but he continued to operate as the owner and manager of Cobra Security Services, offering door staff for 22 venues. As a manager of a security company, he was required to be licensed.

Source >

8


INDUSTRY NEWS How an elite team of security operatives Smuggled Carlos Ghosn our of Tokyo Tokyo, Japan

him in prison for more than a decade. Despite being under intense surveillance while out on bail, with a camera trained on his front door and undercover agents tailing him when he left his house, Ghosn somehow made it to Lebanon.

Sometime last fall, a security contractor based in Asia took a call that he found curious. The man on the other end of the line, a longtime acquaintance and, like him, an expert in protecting VIPs and valuable cargoes in challenging environments, was looking to hire for a job in Japan. He offered few specifics. The assignment would involve escorting someone out of the country, he said. It would pay well. And he was looking for operatives with military or police experience and, ideally, fair-skinned East Asian faces—the kind that wouldn’t stand out in Tokyo.

Most criminal defendants, in Japan or elsewhere, don’t have the option to simply exit their proceedings if they believe they can’t win. Ghosn—with ample financial resources and passports from Lebanon, France, and Brazil—did. For months, a team of more than a dozen security operatives, led by U.S. Army Special Forces veteran, Michael Taylor, had been designing a plan to get him to Lebanon, the country where Ghosn has the most extensive connections. The secrecy was intense: Some of the participants, according to a person familiar with the operation, didn’t know the identity of the person they were going to extract, even after they’d accepted the job.

The contractor was noncommittal but said he would get in touch if anyone else came to mind. They hung up, and the contractor didn’t really think about the job again—until he and the rest of the world saw the news about Carlos Ghosn.

The elite extraction team spirited the former CEO out of Japan by studying hotel layouts and airport security.

Just before New Year’s, Ghosn, the ousted leader of Nissan Motor Co. and Renault SA, completed a daring escape from Tokyo, where he was facing criminal charges that could have put

The extraction was executed to military precision and the fascinating story is outlined by Matthew Campbell for Bloomberg here: Source >

9


CIRCUIT MAGAZINE ISSUE 51 UK Authority sets out code of conduct for private security London, UK The Security Industry Authority (SIA) is inviting the industry, licence holders, and anyone with an interest in private security to have their say on the draft code of conduct by taking part in a survey. The consultation will end on 23 February. “The ethos of the code of conduct is that it will improve standards and public safety by setting out the standards of conduct and behaviour we expect people to uphold if they are entrusted with protecting the public, premises and property,” says Ian Todd, Chief Executive, Security Industry Authority (SIA). SIA is suggesting Six Commitments of behaviour that will apply to all licensed security operatives and to applicants. If the code of conduct is sanctioned by the U.K. Home Office, it would become mandatory and incorporated into SIA’s licensing criteria Get Licensed. A commitment to certain standards of behaviour is fundamental to what it means to be fit and proper, and to being part of a profession. The six commitments are: • Act with honesty and integrity • Be trustworthy

• Protect the people and property you are entrusted to protect • Be professional at work • Act with fairness and impartiality at work • Be accountable for your decisions and actions

“We will review the comments from the consultation once it concludes on 23 February, analyse the results and publish a report on our findings,” says Todd. “The SIA will then use the comments it has received to write a final version of the code of conduct. The introduction of a code of conduct will be subject to final approval by Home Office Ministers.” SIA’s current Standards of Behaviour provide guidance on professional behaviour but are not mandatory. The draft code of conduct builds on the Standards of Behaviour. The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act. It is likely that they will be required to enforce the code of conduct should it become mandatory. Source >

10


INDUSTRY NEWS Secret Service open fire on opera singer after she crashes SUV through two security checkpoints at Trump's Mar-a-Lago Resort Palm Beach, Florida A Connecticut opera singer has been arrested following a police-involved shooting after she crashed her SUV through two security checkpoints near President Donald Trump's Mar-a-Lago resort. Hannah Roemhild, 30, was taken into custody following the ordeal near Trump's resort in Palm Beach, Florida on Friday just hours before the President was due to arrive. Police say the incident unfolded after they responded to reports of a white woman acting irrationally and dancing on the top of a car in the parking lot of a motel near Mar-a-Lago. When an officer arrived at the parking lot, Roemhild - who police say was impaired - got off the top of the car and into her black SUV. Authorities say they approached her as she sat inside the SUV but she would not respond when they tapped on the window.

Security Industry Association Selects ASSA ABLOY as 2020 Member of the Year Las Vegas, Nevada The Security Industry Association (SIA) has named ASSA ABLOY as the recipient of the 2020 Member of the Year Award, which honors SIA member companies that have shown noteworthy involvement in SIA committees. ASSA ABLOY – the global leader in access solutions – is a long-time SIA corporate member. The SIA will present the award at The Advance, the SIA’s annual membership

Officers smashed through the window glass when they saw her rifling through her glove box. Roemhild sped off and led officers on a high-speed pursuit, at times driving on the wrong side of the road at speeds nearing 70 mph. She crashed through two security checkpoints before authorities caught up to her and opened fire. Roemhild was speeding toward a third when sheriff;s deputies and Secret Service agents fired numerous rounds at her car. She kept driving and investigators believe she picked up a female relative before authorities located her car using a license plate reader. She ran from her car outside a nearby motel and was tackled by a trooper. It is not yet clear if she was struck by the gunfire. Photos from the scene show the SUV riddled with bullet holes. The checkpoint, a series of concrete barriers and armed officers, is blocks away from the actual resort.

Source > meeting, during ISC West. “SIA is proud to honor ASSA ABLOY as the 2020 SIA Member of the Year and applauds the company for its invaluable engagement, thought leadership efforts and contributions to SIA, our members and the security industry overall,” said Scott Schafer, chairman of the SIA Board of Directors. The Advance will take place during ISC West 2020 on Tuesday, March 17, from 10:30 to 11:30 a.m. in the Sands Convention Center in Las Vegas, Nevada.

Source >

11


CIRCUIT MAGAZINE ISSUE 51 After Deadly Firefight, Pirates Kidnap Three Gulf of Guinea, Nigeria

Three of the dredger’s eight crew members have been reported abducted, Dryad states.

Pirates off the coast of Nigeria have abducted three crew members from a dredger after a deadly exchange of gunfire with the ship’s embarked security team, maritime risk firm Dryad Global reports.

Dryad says the attack marks the first offshore incident near the mouth of the Ramos River since November 2018 when a vessel was fired upon. In December, the International Chamber of Commerce’s International Maritime Bureau (IMB) Piracy Reporting Centre raised concerns over what it said was an unprecedented level of crew kidnappings in the Gulf of Guinea region, and advised ships to be extra vigilant when transiting through the region.

According to Dryad, the attack occurred January 2nd against the Nigerianflagged hopper dredger Ambika located approximately 3 nautical miles from the Ramos River, near the Forcados oil terminal.

The IMB said recent incidents, in which a combined 39 seafarers were kidnapped, underscore the serious escalation in the kidnapping of seafarers for ransom in the Gulf of Guinea.

Reports indicate that pirates engaged in a heavy firefight with embarked security personnel before boarding the vessel. As a result, it is reported that four armed military personnel have been killed and two others injured.

Source >

From PA to CP to SIA Board member London, UK Previous Circuit contributor, Ms Kate Bright, has been appointed to the SIA board as a non-executive director and begins a 3-year term from February 3rd. Among other responsibilities, Kate will be charged with the task of setting the SIA’s strategic direction. Joining Ms Bright is retired Cambridgeshire Chief Constable, Alec Wood. Elizabeth France, Chair of the SIA, said: “I am delighted that the Home Secretary has appointed Alec and Kate. They will bring new perspectives and valuable experience to the Authority. I am looking forward to working with them as we take the SIA forward.” Kate Bright, who has worked in and with private security for 20 years, was a close protection-trained chief of staff to international families in London prior to setting up the security-focused recruitment and concierge firm UMBRA

International Group. Kate wrote for the Circuit back in 2013 (issue 20) and described her desire to have a positive impact on the direction of the industry. I think it’s fair to say Kate is fulfilling that and the Circuit congratulates you! You can read Kate’s article from issue 20 here > From Personal Assistant to Close Protection Specialist

Source >

12


13


CIRCUIT MAGAZINE ISSUE 51

By: Luke Daniel

Nonverbal Communication The Ability to Focus Inward

within the Executive Protection something to be said about the Industry. There's art of reading people, especially in the protection industry. The ability to pick up on nonverbal communication is an area where most, if not all, protection practitioners are skilled. 14


NONVERBAL COMMUNICATION

Where the gap lies is in articulation. More specifically, having the ability to articulate what has been observed. Without the ability to articulate what we see, as protection agents we are fundamentally flawed. Observing those around us and identifying threats is the name of the game. As the culture and environment continue to become more polarized, there will be no lack of conflict, especially around those who can afford the service of protection.

driving, and medical proficiency are always at the forefront of minds when talking to old and new practitioners alike. And while these hard skills should not be overlooked, neither should be the less ‘sexy’ soft skills. I believe that a heavier emphasis should be placed on building and honing soft skills. The ability to train a soft skill doesn't take hours a day or a dedicated facility. Often, building or practicing soft skills can be achieved through our daily interactions with those around us.

Continuation training skills related to shooting,

The benefits of developing these soft skills can

15


CIRCUIT MAGAZINE ISSUE 51

be immeasurable. For instance, learning a second or third language will give an agent a head start against those who may want to harm the principal. While English may be widely spoken, it will often be a second or even third language and likely not the primary means by which a potential attacker would communicate their intent.

Communication Communication: the imparting or exchanging of information or news, a means of sending or receiving information. Communication isn’t a new concept for any of us. What you may not know, however, is the breakdown of how communication works.

16


NONVERBAL COMMUNICATION

Nonverbal communication accounts for 55% of all information communicated

When talking about communication, it’s broken down into three categories: • Verbal (the language used) • Tone • Nonverbal Cues (body language or behaviors). Nonverbal communication accounts for 55% of all information communicated. The other 38% is tone, and only 7% is the verbiage used. Those numbers may surprise those who think they have a complete understanding of someone based merely on what they say.

Verbal Communication Verbal communication is the language and words spoken. This accounts for only seven percent of all communication. The verbiage used is entirely independent of the tone and the behaviors expressed. Language has the advantage that it is also encompassing the culture from which it comes, predominantly when it is the spoken native language. Tone The tone is how a person expresses verbiage

17


CIRCUIT MAGAZINE ISSUE 51

through the vocals they use. Tone accounts for 38% of all communication. Tone is entirely subjective in so far as that when a person expresses something, how it’s perceived is dependent upon the emotional state of the receiving party. As conscious beings, we communicate most effectively when a thought is at the forefront of our minds, to make sure that “what” we say is perceived

in a way that delivers the most bang for our buck. The outcome of a conversation is often based upon the listener's current mindset and emotional state the instant they hear the tone associated with the verbiage used.

Behaviors The last category, and by far the most expensive regarding available information, is nonverbal

18


NONVERBAL COMMUNICATION communication. Nonverbal behaviors or cues contribute to 55% of all communication. This is because the primal segment of the brain controls nonverbal cues. The same segment that makes rabbits freeze when they see a larger animal, or when a cat fights a larger animal out of desperation to escape and survive.

Assimilating the Information We all have different ways in which we learn. Be it through touch (kinesthetic), sound (audio), sight (visual), or holistically. Knowing how we learn as an individual is important, but that won’t help us in our desire to find the missing pieces when it comes to effective communication. How does someone who has no prior training become proficient at seeing and understanding the nonverbal cues a person may give off? First and Foremost Being able to identify and understand what you are seeing is first. Having a common verbiage or language will create an understanding of the topics. It will help

19

facilitate the information with finding homes in the file folders of your mind. Much like a Rolodex, our minds can store information and then recall it in the blink of an eye. Thinking of memory as a filing cabinet allows information to store all the tidbits together. Having the data stored in files allows for quicker access when a similar situation arises. There is no gym needed to build or practice these skills, and It doesn't take hours of focused attention and neglecting other essential duties. A small investment of time is all that is required and can be as short as thirty seconds spent watching the people around you— observing and trying to identify which of the four behavioral categories the subject's baseline of behavior falls into.

Behavior Types The four major behaviors are: • Dominant • Submissive • Comfortable • Uncomfortable These are the most prevalent behaviors and the easiest


CIRCUIT MAGAZINE ISSUE 51 way to categorize most nonverbal communication. We’ll take a closer look at these behavior classifications and how to distinguish them in a future issue.

Baselines of Behavior Baselines of behavior are nothing more than a snapshot of the subject’s behavior. These snapshots can be taken in seconds and will always be evolving. The baseline is not a static data point or an immovable structure. The baseline is much like a ship on the water, ebbing and flowing with the waves below it. It will be ever-changing based on each piece of information gained through the majority of the senses, be it hearing, sight, touch, or smell. Does the person stutter as part of their typical mannerisms? When someone is speaking, do they hold their hands in their pockets? Do they fidget with something around their neck? If someone is standing in line, are their shoulders rolled back standing tall, or rolled forward? How are their feet

positioned, and in which direction are their hips facing? Who in the group are the majority of members facing? All these questions can be answered exceptionally fast and give a vast amount of information from the baseline of behaviors. Without first acknowledging and creating the baseline of behavior, there are no way anomalies can be noticed, let alone articulated. If they cannot be articulated, then they cannot be explained nor fully understood. Focusing on the basics of identifying which category a person's baseline matches is the easiest way to build the skill from scratch. It is so easy that my daughters, who are eight and twelveyears-old, have figured it out. Like learning anything new, it can be fun, exciting, and may even become addictive. Once you understand the baseline of behaviors and have developed this basic building block, the doors to understanding non-verbal

20


NONVERBAL COMMUNICATION communication swing open wide.

How then can this skill be utilized for looking inward within the protective circle? When working as part of a team on a protective detail, the body man/ woman should not be the one tasked with watching the outside. It's the job of the team member assigned with the protective role to focus on the needs of the client and facilitate said needs. In a corporate setting, a business may need to justify the use of a protective detail against the bottom line. Knowing the baseline of behaviors for the principal is also an important task that is not so much overlooked as misunderstood. When the defecation hits the vertical rotary oscillator, people always revert to their level of

training. That being said, the goal as the protector is to intervene before a situation gets out of hand. This is done most effectively by reading your client as well as those who may do them harm. If a protector is unable to notice the behavioral changes of their client visually, then the team is ultimately set for failure when something unfortunate happens. Rather than continuing to make excuses, invest in yourself and learn how to read the nonverbal cues of those around you. Be it the bad guys if you are in the projection role, or the client if you are in the protection role. If you are interested in learning more about Nonverbal Communication and Baselines of Behavior you can download a free eBook wrote by Luke Daniel here: Download the eBook >

Luke Daniel, Primary Security & Consulting, LLC Luke's experiences as a Global Executive Protection Agent, Instructor at Tony Scotti's Vehicle Dynamics Institute, and a student of behavioral analysis/nonverbal communication have led him to work with Fortune 1000 companies as a leader in human assets, "buy in," and business resiliency.

21


CIRCUIT MAGAZINE ISSUE 51

By: Mark Roche EPS UASP

Navigating The “Craft” 22


NAVIGATING THE “CRAFT”

While the professional Executive Protection community, on the whole, is small, some of the decisions we encounter navigating our craft loom large. There are many reasons for an individual to get into this work; for some, it’s the primary line of work they were seeking and are in for the long haul, while for others, it’s secondary and just an opportunity to earn a second income. The barriers to entering this industry may be quite low, but not all will make the cut and advance to our ranks. Through this article, I hope to offer some practical advice to newer specialists and offer some guidance to those who have become confused about how to navigate the craft.

‘your truth’ is essential towards visualizing your path and, in my opinion, crucial for formulating a solid foundation and understanding. Here are some things to consider, which will help you to understand your placement in the industry.

Time Time is something this industry demands from every specialist. The amount of time you choose to dedicate to the industry is the most influential factor in your career endeavors. Because of the time demanded, it requires that we put other commitments to Knowing your truth one side, can you do that? So, you have chosen You must be honest when and graduated from your assessing the impact of EP initial training. As all time on your life. Can you who join the ranks know, put in 60, 80, sometimes training is ongoing and 100 hours a week? Are necessary for a successful you prepared to? Can career in Executive you spend more time Protection. Knowing where away from home than at you ultimately want to home? Will your existing end up in this industry, family commitments should, I believe, be the allow you the time starting point in mapping needed? Does your out your path. Knowing physical condition allow

23


CIRCUIT MAGAZINE ISSUE 51 for the excessive stresses placed on it with all the time you’ll spend working? Knowing the answers to these questions will help dictate your approach when beginning or advancing your EP career. Time restraints will also inform the types of detail you can accept. In my assessment, time is the factor most underappreciated by newer specialists when determining their career aspirations. Personal Traits What traits do you have or conform to in your life that will help your EP career, and just as importantly, what will hinder your path to success? For example, are you self- sufficient, or do you rely on others for continuous guidance? EP professionals must be selfsufficient because guidance is often minimal, and decisions must be made by you, the specialist. Are you responsible? There is no greater responsibility than that which we have to our clients. Daunting responsibility is how I would describe it. How are your personal or professional habits? Will they help or hurt your objectives? Are you a person who is on time, do you anticipate and prepare well, do you follow proper procedures? Next, consider,

Physical conditioning is just as important as any other professional trait. It is a personal requirement to be physically fit, our obligation to protect, demands it. A big misconception, in my opinion, is that gun skills or martial arts are more important.

24


NAVIGATING THE “CRAFT” are you someone who can handle pressure? Meaning, can you change direction in a moment’s notice, can you deal with itinerary changes and then quickly adapt the security situation to accommodate those changes for the client? These are just a few of the traits required to operate professionally in this industry, but these are the things that will shape your career in protection. Physical conditioning It goes without saying that physical conditioning is just as important as any other professional trait. It is a personal requirement to be physically fit, our obligation to protect, demands it. A big misconception, in my opinion, is that gun skills or martial arts are more important. Indeed, these are desirable skills, but how can you perform these skills without the proper physical conditioning? Are there specific factors in your life that may hinder your performance? For example, do you require daily medication, and for what? Can you support your need for medication while supporting a sixmonth world tour? Do you require a certain amount of rest per day? Does your conditioning

25

provide you an extended amount of time to react physically? Can you carry your client to safety, if that safety is a measurable distance? Are you prone to sickness? If you easily contract illnesses, it could be a liability to the detail, especially if you’re a solo protector. I guess my point is, to be able to conduct your professional duties, it is incumbent upon you to be honest about your physical preparedness for duty. Soft Skills Soft skills are an essential skill for our craft; without these skills, a specialist is at a severe disadvantage. How are your de-escalation skills, for instance? Can you deescalate a situation instead of resorting to physical action? It is a skill and one that must be cultivated over time and usually on the job. Conditions on the job are different, complex, and sometimes hostile; therefore, can you perform in this theatre with confidence, control, and professionalism? What is your personality type? Do you have a “short fuse”? Are you able to deal with others professionally, if they have different views on religion, age, gender,


CIRCUIT MAGAZINE ISSUE 51

political opinions, etc.? Do you have a firm understanding of the personal and private affairs of your client and where the line is that you do not cross? Known in our craft as “mission creep,” the lines between professional duties and personal attachment

must not become blurred. Having said that, if you spend a significant amount of time with your client, then it’s natural for a certain familiarity to develop. Be careful not to stray too far in your professional conduct; you must know where the line is at all times.

26


NAVIGATING THE “CRAFT”

Your personal preparedness is the KEY to opening up that path to success Some young guns coming into the industry, and a few old-hats, too, believe that the only route to a successful career is to be favored, lucky, known, or especially skilled. The truth is, in my opinion, those who understand and practice the foundational skills of our craft are those that excel. To navigate this industry, you must have a firm grip on all things EP, not just showing up and prophesizing your knowledge, but practicing that knowledge every day, whether working or not. Your personal preparedness is the KEY to opening up that path to success. Navigation of this industry is complex;

however, it’s made easier by showing those who do the hiring that you prepare every day, not the day before your detail but every day on all the skills we’ve discussed here. While the issues I have mentioned in this article are just a microcosm of the overall set of skills one must possess to advance in our industry. By laying out some of these elementary skills, hopefully, I have given you a template from which you can construct and navigate a successful career. Remember: be comprehensive in your training, and your training will never fail you. I wish you all great success.

Mark Roche is a US Based, full-time Executive Protection Specialist. He is a FAA Licensed Drone Pilot, specializing in EP related uses and a graduate of multiple close protection programs.

27


CIRCUIT MAGAZINE ISSUE 51 By: Mark Deane

Corporate Espionage

28


CORPORATE ESPIONAGE

Understanding the Role of an Intelligence Officer

Foreign intelligence services and competitors deliberately target economic intelligence in advanced technologies and flourishing industries. Many foreign countries and large corporates actively seek information and material to advance their military, technological, political, and economic programs. In today's technologydriven world, the intelligence requirements of several countries are more extensive than before. They now include communications technologies, IT, scientific research, defense, aviation, electronics, and many other fields. Intelligence services, therefore, are targeting commercial as well as government-related organizations. They sometimes do this on behalf of state-owned or sponsored companies in their own countries. A foreign intelligence service operates best in its own country and therefore finds it more

29

comfortable to target foreign commercial interests traveling in their home territory, where they can control the environment and take advantage of any perceived vulnerabilities. The most capable foreign intelligence services are also able to operate all over the world and regularly target businesses in their home arena. This article will refer to any threat actor, whether a State Directed asset or one deployed commercially, as an intelligence officer (IO). Methods of Exploitation: An IO will work to utilize the following five ways to garner information, or exploit a resource: 1. Bribery -Â When government


CIRCUIT MAGAZINE ISSUE 51 employees apply for Top Secret or Developed Vetting (DV) clearances, they have their finances heavily scrutinized. If someone is in debt or living beyond their means, they are more likely to sell secrets. Greed has been a leading factor in some of the most high-profile double agent cases in history. An IO will look to exploit vulnerabilities, whether that being debt or a taste for the finer things in life.

seem implausible. However, a skilled IO has many tricks up their sleeve to elicit information, and in a manner that is often difficult to recognize as intelligence collection.

Skilled and experienced IOs will utilize subtle and indirect questioning to obtain information from you. If done correctly, elicitation will feel and look like every other type of harmless encounter, business relationship, 2. Blackmail – or friendship. IOs will Blackmail is the technique focus on utilizing mutual when IO’s utilize friends, professional personal information – contacts, and 'random' whether true or false meetings at specialist – against you to coerce conferences or events. you into providing Add some alcohol or classified information. sexual interest into the Again, vetting agents mix, and this can be a for governments focus potent weapon in the IOs heavily on personal arsenal. character, integrity, and any potential deviancies, 4. Surveillance affairs, habits, etc. for This section can be a reason. If you are broken down into two hiding something or you further areas: Physical have just been caught Surveillance and doing something illegal, Intrusive Surveillance. immoral, or of poor judgment, then it can be Physical Surveillance used against you. An IO may put you under surveillance to identify 3. Elicitation who you are meeting Regular face to face and where. An IO will conversation where the utilize surveillance to get IO, utilizing subtle and close and eavesdrop on skilled methods, works a conversation, typically to extract classified with the assistance information. This may of technical means.

30


CORPORATE ESPIONAGE

If someone is in debt or living beyond their means, they are more likely to sell secrets. Greed has been a leading factor in some of the most high-profile double agent cases in history.

This may sound like a Hollywood spy trick, but it is very easy to follow an unaware individual and blend in next to them, perhaps at a restaurant, or bar. The IO will blend in, sit back and listen to a conversation, or place a technical device strategically to record any meeting or discussion. Intrusive Surveillance An IO may attempt to gain covert entry into a hotel room, place of residence, or an individual piece of property such as personal luggage. Government agencies and more recently, corporate entities have developed multiple covert methods of entry (CMOE) techniques to garner intelligence without the target realizing. 5. Technical The single biggest threat to the majority of businesses is technical espionage. Very simply, it is often the easiest method for an IO to obtain and capture data, or introduce malware, and gain access to a whole host of your electronic devices. All of these are often done without you even knowing it. Legal or illegal intercepts of

31


CIRCUIT MAGAZINE ISSUE 51 electronic communications, predominantly cell phones, and laptops, are efficient ways for IOs to garner extensive information.

accepting of personal transgressions, and there is less stigma associated with several incidents that historically may have been career-ending or An IO’s Modus Operandi life-changing. Blackmail is In the intelligence the blunt tool of corporate community, the most espionage. aggressive method of obtaining intelligence, Bribery is still used blackmail, is used least. extensively. Why? In rare cases, IOs in the Simply because it works commercial world have very well. Money talks. used aggressive tactics History has shown and such as trapping someone continues to show that in a shameful act, initiating people will sell secrets and recording an affair, for money. Whether to or deviance away from fund a lavish lifestyle, their public persona, e.g., keep a partner happy, Homosexual action when or sometimes because living as a heterosexual. they feel undervalued by However, IOs want to their current employer. avoid drawing attention to threat of a CHIS or IO-led themselves or their clients, attack. This could be the and there is never any downloading of data or guarantee which way a transfer of files oft seen in blackmail attempt can go. insider threat cases where a CHIS is directed to provide specific proprietary Jeff Bezos was allegedly information. blackmailed by threatening to release embarrassing photos, including sexually explicit ‘selfies’. He decided to counter the threat and made this statement: “Rather than capitulate to extortion and blackmail, I’ve decided to publish exactly what they sent me, despite the personal cost and embarrassment they threaten,” Mr. Bezos wrote. “If in my position I can’t stand up to this kind of extortion, how many people can?

Furthermore, the modern era has become far more

Aldrich Ames, a former CIA intelligence officer, spied for the Russians, and his primary motivation by his own admission was greed. This was also partially because of his Colombian Wife’s expensive tastes and his desire to maintain his marriage.

Sometimes cash exchanges hands and is part of the deal, and also part of the motivation, but

32


CORPORATE ESPIONAGE often there are secondary reasons too, e.g., disgruntled employees. Back in 1997, an engineer at a company working for Gillette faxed and emailed drawings of Gillette's new razor to rival companies. The engineer said he stole the designs because he was angry with his boss.Â

Elicitation is commonplace and a core skill among experienced IOs. In the

33

day and age of extensive industry conferences and social media, multiple faceto-face opportunities can be exploited. A skilled IO will strike up a conversation with a target, and work to get information. The basic fact that people like talking and feel uneasy lying or shutting down a conversation often yieldsan IO extensive material. Only a few tidbits of information can help build an intelligence picture or link to the next line of enquiry.


CIRCUIT MAGAZINE ISSUE 51

The Technical threat is pervasive and everpresent to any business. A lot of focus in the media is placed on phishing attacks. It would be remiss, however, to neglect the threat of a CHIS or IO-led attack. This could be the downloading of data or transfer of files oft seen in insider threat cases where a CHIS is directed to provide specific proprietary information. On May 25, 2017, an engineer loaded five GE Aviation documents to the hard drive of his personal laptop and boarded a flight to China. He had been recruited by a Chinese agent prior and delivered classified documents.Â

Surveillance is regularly utilized as an asset to initiate other methods, for example, technical surveillance to obtain footage in a bribery attempt. Technical surveillance is also a frequently used system. Working in Unison It is worth noting that all methods can be utilized in unison and that some are used to lead onto others. For example, an IO may identify a target, then undertake OSINT research via social media to micro-locate, e.g., a conference, then carry out surveillance to build a target profile, eavesdrop in conversation, and plan an approach. If an

34


CORPORATE ESPIONAGE opportunity presents itself to carry out a technical attack, then that may be affected, and an elicitation carried out, during which an opportunity for bribery, or strategizing how best to develop a person as a Covert Human Intelligence Source (CHIS) is identified. A World of Opportunity The former FBI Counterintelligence Assistant Director Frank Figliuzzi coined the phrase “Industrial Espionage, on an industrial scale.” Billions of dollars’ worth of secrets and proprietary information are stolen via espionage every year. An IO is continuously searching for a range of competitive advantage. According to Figliuzzi, the current FBI caseload shows that secrets worth more than $13 billion have been stolen from American companies — often by insiders or former insiders at the companies that have been victimized. “They’re looking for everything from price lists to the latest pharmaceutical research, marketing strategies,

new product information — typically whatever you view as your crown jewels at your company is likely the target of foreign economic espionage,” Figliuzzi said. Countering the Threat The next article will look at how a security professional can counter the threat of corporate espionage to their client, principal, or employer. References:

Targets Of Espionage | MI5 The Security Service. Source > Jeff Bezos' Phone Hacked, Shows Link to Saudi Prince, UN. Source > Amazon CEO Jeff Bezos Accuses Tabloid of Attempted. Source > The American Greed Report: Corporate spying costs billions. Source > CNBC Colleen McKown | @ColleenMcKown 9:08 AM ET Sat, 13 May 2017

Mark Deane, the CEO of ETS Risk Management Inc. and ExecSecure™ Inc. Mark has managed the security for multiple Fortune 500 clients major event corporate packages, including tier one sponsors for the Olympics and Paralympics.

35


Communications simplified: delivering practical solutions to mission critical users SECURITY | SURVEILLANCE | MARITIME | DEFENCE | HUMANITARIAN | EXPLORATION

Web: www.g6-global.com Telephone: +44 (0)1454 610050 Email: g6@g6-global.com

36


TSCM By: Ben Gunn

TSCM in the PRIVATE SECURITY INDUSTRY

Introducing TSCM The art of technically and physically searching for illicit bugs, and/or devices, is generally referred to as a Technical Surveillance Counter Measures (TSCM) inspection. This was agreed by a committee of TSCM specialists who provided their public and private sector knowledge in order to establish the first National Occupational Standards (NOS) for TSCM, in the United Kingdom. The NOS are an excellent foundation for governance of TSCM in the security industry.

37


CIRCUIT MAGAZINE ISSUE 51 Definitions For the purposes of this article, the following definitions are used by the author: • Eavesdropping. Interception of information transfer, including conversations by bugging, tapping, or other technical and non-technical means without the knowledge of the individuals. • Tapping. Illicitly connecting to conversations and communications media for the purposes of gathering information. • Bugging. The planting of suitable transducers in order to gather information. • Bug. An eavesdropping device.a • Device. A piece of hardware made or adapted for a particular purpose, \ especially for a piece of mechanical or electronic equipment. • Information Security (InfoSec). Managing policy and process to protect and prevent information loss to digital and non-digital information (data) and to secure against unauthorised use of this data. However, the TSCM sector still can’t seem to agree on the correct term for TSCM, nevermind industry licensing! The National Authority for Counter Eavesdropping refers to ‘Technical Security Countermeasures,’ while the stalwarts of the industry still affectionately refer to ‘Technical Sweeps.’ You might also hear it referred to as a ‘Technical Search’ inspection, or simply as ‘Electronic Counter Measures’ (ECM). Eavesdropping The Bible refers to acts of espionage, but only hints that individuals covertly listened to conversations, evidently

without the sophisticated technical equipment that supports a modern-day eavesdropper. Research has not confirmed exactly where or when the word ‘eavesdrop’ was introduced into the English language, but it is believed to have originated in the 17th century. It won’t surprise the reader to learn that the word eavesdrop derives from two words, eaves and drop. It is believed that eavesdrop originated from when a single storey dwelling had a thatched roof; long before guttering and drainage pipes were designed. The constant dripping of rainwater

38


PRIVATE SECURITY INDUSTRY from the thatched roof produced a noticeable line in the ground called the eavesdrop line.

professions in the world. It is alleged that espionage comes in second only behind the ubiquitous, profession of prostitution! It was then said that if an Espionage (and possibly individual stood inside this prostitution) continues to line, under the eaves, and dominate the thoughts stood next to a window of leaders, executive opening (shutters), they boards, and VIPs within all would, in theory, be able businesses and sectors. to listen into [eavesdrop] Often the risks associated the conversation held with business espionage within the building, and and eavesdropping can be without the knowledge mitigated by taking simple of the occupants. The preventative action. phrase ‘the walls have Business espionage quite ears’ is recognised to rightly remains high support this theory. on all government and commercial organisational Espionage agendas, and the need The act of espionage for effective counteris one of the oldest measures seems endless.

39


CIRCUIT MAGAZINE ISSUE 51 Threat The main InfoSec threat is unequivocally from cyber-related actors; this may include cyberrelated eavesdropping, which is conceivably an IT Security concern. A conventional TSCM inspection does not cover cyberspace but could detect illicit cyber devices attached to hardware or cabling infrastructure. Not dissimilar to Personal Protection, a professional TSCM inspection team will consider the threat. The threat of business or corporate espionage is deemed to be of particular relevance to sensitive industry conversations where competition is high, in particular, between similar companies providing the same services. This, however, does not suggest that these companies conduct espionage, but any sensitive information loss to a rival or the impact caused by any security incident could have serious implications.

Many countries, businesses, and individuals actively seek privileged and proprietary information to advance their own political, economic, technological, and personal aspirations.

Many countries, businesses, and individuals actively seek privileged and proprietary information to advance their own

40


political, economic, technological, and personal aspirations. The need for an action plan to cater to all Information Security (InfoSec) incidents is critical for those who have in interest in protecting some of the most valuable assets, reputation, proprietary information, and personal data. There is a real and credible eavesdropping threat. London’s premier spy shop sold approximately 1500 covert units (covert video, audio recording, and GSM audio) from their London shop in their last financial year. This figure only includes actual units sold over the counter and does not include online sales, not to mention the number of general inquiries. In theory, if this shop remains open for six days a week, this equates to five covert sales a day. My assumption, therefore, is these people are purchasing this type of equipment to conduct a form of espionage or eavesdropping into other people’s conversations. Admittedly, a percentage will end up in the

Executive Protection Lifestyle Podcast

"To be good at what we do you must know that it's more than just a job." Byron Rodgers

41


CIRCUIT MAGAZINE ISSUE 51 domestic world, but I have no doubts that some of this equipment will make its’ way into the corporate world. With technological advances in recent years, in particular in the GSM industry (mobile phone/ SIM card), the most capable commercial or state-sponsored eavesdropper can operate on a global scale. Suffice it to say the technology in the eavesdropping industry means that smaller and more sophisticated technical devices are available and are easier to acquire than ever before, in particular, devices using SIM cards. The availability of these eavesdropping devices on the commercial market, and the internet, plus the additional ease of installation to a permanent power source is indicative of a significant eavesdropping threat to businesses and individuals. The Argument The threat from business espionage remains relevant but is on the decrease due to: • Better awareness of the threat. • In general, improved

layers of security and procedures with the overlapping of technology and human in a corporate building. • Improvements in employee and subcontractor vetting. The threat from individuals, private espionage, and voyeurism (covert camera installations) are on the increase due to: • GSM technology. • The ease of searching for spy products on the web and the ease of purchase and installation. • Technology advances – products are easier to use, smaller, and available to purchase with no due diligence. The Trigger A TSCM inspection may be ‘triggered’ or requested for several reasons. Most requests received are following a confirmed or suspected leak of confidential information. Some requests are a part of good business practice and as a precautionary, proactive measure to ensure the integrity and conversational security in the areas of interest. No matter what the trigger is, for the TSCM

42


PRIVATE SECURITY INDUSTRY

With technological advances in recent years, in particular in the GSM industry (mobile phone/ SIM card), the most capable commercial or state-sponsored eavesdropper has the capability to operate on a global scale.

inspection, the credible threat should be considered and a task planned accordingly. Circumstances in which to consider an inspection can be: • Before any confidential meeting/function. For example, an AGM. • Prior to a temporary move into a location. For example, VIP into a hotel room. • Following a confirmed or suspected physical security breach. • Following a confirmed or suspected leak of confidential information. • When supporting an investigation to confirm/ deny facts. • When supporting other search/inspection regimes (i.e., physical, explosive/ drug dogs). • Following the introduction of new equipment/ furniture/fittings. • Following a period where third party subcontractors have completed construction work, cabling work, or renovation. • Periodically (as required). Governance Apart from the the lack of government direction, private security industry governance, or licensing,

43


CIRCUIT MAGAZINE ISSUE 51 is no formal government support here in the UK. Health & Safety A minimum twoperson team, working in tandem, is generally accepted. I do not concur with the counterargument from the solo practitioners. It is my firm belief that, based on health and safety factors, a minimum of two persons is always recommended. The dangers of working with, and close to, 240v ac electricity, and often at height are plain for the craft is commonly anyone to see. It should flaunted by poorly trained, also be remembered inefficient, and maverick that inspections are TSCM teams. Anyone can often conducted in purchase equipment and unsociable hours purport to deliver TSCM when a building is on in the commercial sector. minimal manning, not to This is not uncommon mention the overlapping, in any other sector or complementing security capability that techniques of a twostruggles with regulation person team. and standards. Trade body’s have long been advocated for to create an ethical culture, draft

legislation, best practice, and guidance for TSCM practitioners. However, despite the inception of the TSCM Institute, this remains a self-governed area and, to date, there

Legalities A TSCM inspection capability should not deliberately interfere with or prevent the operation of thirdparty communication equipment, specifically, the transmission of,

44


PRIVATE SECURITY INDUSTRY or the receiving of, licensed communications equipment and frequencies. In particular, from the primary threat vector, GSM signals, and the omnipresent SIM card. The legal way to conduct a TSCM inspection is by employing SIM card detectors that, without transmitting any interfering signal, provide visible and/ or audible warnings if an active or passive device is nearby. The ability to determine if a GSM device is in the area of interest should be ascertained by the powers of deduction, technology, and also the overlapping TSCM search techniques. No matter what your

security procedures, protocols, or awareness are, nefarious individuals with an increasing quest for third-party information are keeping espionage and eavesdropping topical on a threat assessment. Is society partly to blame? The open willingness to circulate, distribute, and publicise personal and proprietry information on the www and social media may be instrumental. Where is the line drawn on privacy? TSCM remains an integral part of InfoSec. The next issue of The Circuit will guide you on the process and methodology of a professional TSCM inpection.

Ben is a former member of the British Army spending 29 years out of a 33-year military career in UK Special Forces – 19 years in the Regulars and a further 10 years in the Reserve. He had a unique military career; initially expeditionary and latterly, 4 years seconded to Intelligence and a further 4 years in a Counter Terrorism liaison role. Ben is a businessman, incorporating a UK Special Forces tenet into his business planning; ‘the unrelenting pursuit of excellence’ and as such, has established under his directorship, a truly global company based in London, offering a multi-service approach to the security of any asset; protecting People, Property (including Intellectual Property), and Possessions. E: ben.gunn@olchon.co.uk T: +44 (0)203 1903030

45


CIRCUIT MAGAZINE ISSUE 51 By: Mark “Six” James CPO, EPS, CAS

Fighting at Bad Breath Distance When it comes to fighting, it is primarily about two things, proximity and violence. The one who brings the most violence usually wins.

And remember, when it comes to fighting with a firearm, closeness can negate skill. So, muzzle awareness and pre-attack indicators should always be at the forefront of your mind. Professional predators are usually quite good at what they do, robbery and assault, and that’s because they practice it often. When it comes to initiating an encounter,

expect them to be up close and personal to their target. No one walks down the street announcing, “hey, guy in the grey suit, when I get up to you I’m going to assault you!” TIME IS LIFE The 21-foot rule has long been an established firearm and combative training standard. Simply put, it means an average man can close down

46


FIGHTING AT BAD BREATH DISTANCE 21 feet in 1.5 seconds. As we’ll see in the data (below) of attacks on law enforcement officers, the previous standard far from reflects the reality of dynamic encounters. It is clear to see that both distance and timing enhance your ability to

prevail in a violent, closequarter firearm encounter. In a ten-year study conducted by the US Justice Department, involving 500 law enforcement officers killed, they found: • 39% were killed within 6 – 10 feet. • 47% were killed within 5 feet. Based on the above data, from the moment of recognition to the moment of reaction, you

47


CIRCUIT MAGAZINE ISSUE 51 have from 0.35 seconds to 0.71 seconds to launch your respective countermeasures. Remember, firearms are not contact weapons, so closing the gap for a perpetrator is often not required. However, your choices are limited: move yourself, your family, your client, or impact the threat. You may ask, what is the relevance of the distance that law enforcement officers were killed at for a civilian or a protection specialist? When it comes to armed violence, most civilian attacks take place at close range and are often as the result of a dispute between known individuals. The other common occurrence happens when an attack is disguised, thereby reducing your ability to defend it. By shortening your time for recognition, the assailant thus reduces your reaction time. Also, when it comes to threats, whether human or canine, we know the engagements will typically come at close quarters, the officer’s

accuracy statistics indicate there is a lot of room for improvement. • 38% Hit rate NYC Police Officer involved shootings vs. Perpetrators and Dogs at distances between zero to two yards. • 17% Hit rate from three to seven yards. • 15% Metro-Dade Police officer hit rate. When we look at the firearm performance from two of the largest police forces in the nation (NYPD and Miami Dade) who have an ongoing firearm qualification requirement compared to those with little or none, I have little optimism that most civilians or protection specialists, who don’t train regularly would fare much better. Inside of three yards, it is not about being perfect; it is about being effective. Strive to become a student of combatives in general, not merely a firearms student. Learn to develop one fight system that works empty hand, with or against an edged weapon or firearm.

48


FIGHTING AT BAD BREATH DISTANCE Understand movement can often compensate for lack of marksmanship, but a fast draw and good marksmanship often cannot compensate for lack of movement. In extreme CQB, rarely is a perfect sight picture acquired. Often a flash sight picture or natural body indexing will allow you to have a positive ballistic impact on the perpetrator. Carry your tools in a way that helps you to balance your attack, engage from any position, or maintain their stealth. The situation should always dictate the tactics, tools, or carry position. Many gunfights occur at or near ‘bad breath distance.’ Therefore, your combatives training, whether empty hand or with a firearm, should more closely reflect the environment in which you may have to fight. Remember, weapons don’t make you a better warrior; they just extend your reach. THE IMPORTANCE OF UNDERSTANDING PROXIMITY Based on the distance of the potential perpetrator,

49

I understand which weapons they may be able to use on me or which weapons I may be able to use on them. At bad breath distance, we are often engaged in grappling, headbutts, elbows, knees, or locks and holds. Outside of whispering distance, we often see strikes like jabs, palm heel strikes, or hammer fists. When we move to normal talking range or outside of punching distance, you are usually in kicking distance. If you are not a good kicker, you may want to engage your adversary at grappling distance or punching distance. If you are good with your hands and feet, you want to stay out of grappling distance. If you learn to understand the angle of attack, you can often defeat an adversary, whether empty hand, with an edged weapon, or firearm. A jab travels at the same angle as a straight thrust or shank with a blade. It also travels on the same line as when an attacker punches out with a handgun, so if you are not getting off the line


CIRCUIT MAGAZINE ISSUE 51

If you look at a hook punch or haymaker, it often travels at the same angle or arch of attack as a high knife slash. of attack or moving the knife or firearm off the desired route, you are either getting hit, cut, or shot.

will often be our key to success if forced to engage.

PRE-ATTACK INDICATORS If you look at a hook The speed of violence is punch or haymaker, it often much faster than often travels at the same many are prepared for. angle or arch of attack So, to get in front of as a high knife slash. the reactionary curve, Remember, a weapon we must also learn to is just an extension of recognize the signs of the hand. A folding knife pre-attack indicators often adds 3 – 5 more (i.e., balling up the first, inches to the reach of pulling up their pants, an attacker, while a blading the body or the butcher knife may add person’s hands suddenly 6 – 12 inches of reach. disappearing behind And a baseball bat or a them or going into their pipe may add 2 -3 feet. pockets, etc.). Since we The way we defeat the are often the second aggressor is through ones into the fight, we training and learning to must learn to get off the recognize these angles, line of attack efficiently, then we learn to attack move the attacker off the attacker. If you talk their intended line and to many special forces efficiently launch our own operators you will often counterstrike, whether hear them say, surprise empty hand, with your and violence of action are blade or your own usually two of their keys firearm. I like principles to success in combat. and techniques that For us, violence of action are size and strength (focused aggression), neutral. In a deadly force often coming from a situation, if I am emptynon-threatening posture, handed, I often focus on

50


FIGHTING AT BAD BREATH DISTANCE disrupting the vision or breathing of the attacker. If the attacker can’t see you, they can’t hurt you. If they are trying to suckin air, their focus often shifts away from hurting you.

Disarming late occurs when the attacker has cleared their holster or garment. At this point, the muzzle may or may not be oriented on you or their intended target. If you are in a ‘disarming late’ situation, your first There are two ways responsibility is to disrupt to disarm an attacker, the aim and then focus disarming early on the disarm. It is far or disarming late. easier to disarm someone Disarming early involves who is not at full capacity not allowing the attacker or capability. That is why to get their weapon out of we must learn to attack their holster or clothing. the attacker. Stopping the Haymaker (Sucker Punch) This punch is circular and often starts with the attacker cocking back before coming forward. For smaller frame people, I like the touch-and-go counter. This is a double arm block, followed by an immediate strike to the attacker’s carotid artery or a rake across the eyes. For more advanced people, they may consider blocking and striking simultaneously to the carotid artery, as you see in the second photo above. All counters should be followed up with combinations until the attacker stops trying to hurt you.

51


CIRCUIT MAGAZINE ISSUE 51 Defense against a straight jab This punch comes directly at you and is often followed up by a cross. To counter this strike, I like a high parry while simultaneously stepping off the line of attack of the attacker’s lead foot, followed by your own combination. Stepping outside the leading foot of the attacker takes the attacker’s other hand, knee, or foot out of play and also helps against a potential jab/cross combination of the attacker. Another counter is the high parry followed by a finger jab to the eye pictured above. Continue following up with additional combinations until the attacker is no longer a threat.

Jamming the Draw If a person reaches for a firearm, we are now in a deadly force situation. If you are in contact distance as opposed to reaching for your firearm and potentially trading rounds, one of the most effective counters is to jam the attackers draw and simultaneously shift their focus with your counter strike. One technique I like to employ is to disrupt the breathing, whether with a chop, Y strike, or eagle claw to the front of the throat. All counters should be followed up with combinations until the attacker stops trying to hurt you.

52


FIGHTING AT BAD BREATH DISTANCE Drawing Your Weapon Extreme Close Quarters If I am forced to draw my weapon at an extreme close-quarters, I like to use my reaction hand to give the attacker a palm heel strike, below the attacker’s chin, and getting to full extension. This gets the attacker off balance and rocking backward. I draw my weapon and index the magazine well against my ribcage canted outward. This allows the slide to work freely without the risk of being taken through contact with the attacker. The muzzle is pointed downward at the attacker’s abdomen. This helps avoid any potential contact with my reaction hand. As I start to create separation from the attacker, I can target other zones if required.

Defense against a Straight Trust with a knife This attack comes directly at you and is often seen as a straight thrust to the abdomen. To counter this attack, I like a low parry, trap, and break. Another option is the scoot back, trap, and break. This is executed by catching the knife hand with both hands slightly behind the attacker thumbs near the crease of the wrist, followed by rake across the eyes to change the attacker’s focus, followed by a trap and break. Continue following up with additional combinations until the attacker is no longer a threat.

53


CIRCUIT MAGAZINE ISSUE 51

One technique I like to employ is to disrupt the breathing whether with a chop, Y strike or eagle claw to the front of the throat Defense against the Grab and Shank Countless YouTube videos show that when many perpetrators target victims they often grab them with their non-weapon hand while the other hand often disappears and later produces a weapon or is followed by a barrage of hits. Whenever a hand disappears, I focus on intercepting or jamming that hand before an attacker can hit me or attempt to stab me. On their nonweapon side hand, often the hand on my shoulder, I immediately execute a thumb gouge to the attacker’s eye. Continue following up with additional combinations until the attacker is no longer a threat.

54


FIGHTING AT BAD BREATH DISTANCE Defense against an overhead strike or stick attack This is a high downward attack that you might see with a stick, bottle, or knife. To counter this, I like a step forward with a two-hand catch and ride the attacker’s momentum and bring the weapon forward and downward. This can be performed as a two-hand catch with your thumbs and hands facing each other. The top hand rotates downward, exposing the attacker’s elbow toward you. It then slides down to the attacker’s wrist, allowing you to trap and break at the attacker’s elbow or knee. Continue following up with additional combinations until the attacker is no longer a threat.

Mark “Six” James is Founder and Executive Director of Panther Protection Services, LLC. He is an internationally published author, keynote speaker, security consultant to educational institutions and frequent contributor to several print, broadcast and online media. Panther Protection Services is a full-service protection agency focusing on Risk and Crisis Mitigation, Protective Services, Self-Defense Training, and Firearm Instruction. www.pantherprotectionservices.com

55


CIRCUIT MAGAZINE ISSUE 51

By: Carlton Smith

Is there a difference between the Law Enforcement and Executive Protection fields? The Law Enforcement and Executive Protection fields aren't new to each other. A proven historical fact is that for many years, the two fields have intertwined with each other. Executive Protection teaches topics such as security advances, countersurveillance techniques, and terrorist operations. Law Enforcement tends to have a more reactive approach, whereas Executive Protection is more proactive. Executive Protection focuses on identifying the threat and mitigating the risk before it becomes an issue. An Executive Protection

agent has to possess those essential skills including, but not limited to, executive and dignitary threat assessments, assassinations and methods of attack, terrorist operations, countersurveillance techniques, close protection formations and tactics, motorcade operations, and advance firearms and defensive tactics. It is essential to understand that the protection and policing fields are two entirely different animals. While some of the skills you learn as a Law Enforcement

56


DEFINING ROLES AND RESPONSIBILITIES officer will be used in protection, they are different working environments. Newly qualified officers will likely find themselves working a static post during the offhours. This may require you to maintain your focus throughout many hours of standing around where very little happens. With experience and training, you will gain competence and be able to conduct advance work (checking sites, coordinating the visit,

57

etc.), driving the lead/ chase vehicles, as well as working inside the bubble (close protection). Obligations Executive Protection is a highly specialized field within the private security industry. In the United States, Executive Protection services are regulated at the state level and, in most cases, require insurance, state licensing, and a separate concealed carry permit. Federal law (House


CIRCUIT MAGAZINE ISSUE 51 Regulation) HR218, does not serve as a license for off-duty Law Enforcement officers to provide Executive Protection services. Hiring unlicensed, uninsured protection services, including those offered by off-duty Law Enforcement officers, creates direct liability for the client. Police officers represent the local, state, or federal agencies and enforce laws. Executive Protection agents represent private businesses and individuals and have a contractual obligation to the client. In addition, an Executive Protection agent accompanies executives, keeping watch over them and protecting from lifethreatening emergencies. He/she does all of this while maintaining a low profile and remaining as unobtrusive as possible.

Their main concern is the welfare and safety of the public. Public Police perform additional duties not typically carried out by private security. For reasons of certification, liability, and oversight, private security is tasked with protection, and public police are charged with enforcement. Law Enforcement is trained to have that "reactive motion." Law Enforcement must protect life, people, and property through the enforcement of laws and regulations. Law Enforcement possess qualities such as humanity, integrity, professionalism, and courage.

Relationship Overall, the security professional's perception of their relationship with police departments has been positive. Written Respective Duties comments from both The Public Police are sides provide insights on a government service the issues that hamper provided at local, county, a productive working state, or federal levels. relationship between Public Police adhere to them. However, the strict requirements and findings reveal that training, and their remit both police officers and is dictated by politics, security professionals government, and the law. believe that they could

58


DEFINING ROLES AND RESPONSIBILITIES

probably do more to encourage a positive working relationship. Profile Law Enforcement officers are sworn to "maintain the peace and public order. "Protect the people and property and apprehend or arrest anyone who violates the people's rights and the legal law. When a law is broken, or someone's life

59

or property is threatened, a Law Enforcement officer has sworn to uphold the law and make an arrest, if the subject is known. Law Enforcement officers are known to be confrontational. Police officers are trained to be aggressive and assertive. On the other hand, Executive Protection agents are very lowkey, and avoid drawing attention to themselves.


CIRCUIT MAGAZINE ISSUE 51

The Executive Protection practitioner must have "hard skills" AND "soft skills. "In today's society, to stay employed Training Training for executive and dignitary protection is different from other Law Enforcement courses. Executive Protection officers require a unique set of skills and tactics when protecting executives and other VIPS that can only be learned by attending specialized executive protection and dignitary training programs. The training that I have been fortunate enough to obtain has shown me the difference between Law Enforcement and Executive Protection. The Executive Protection practitioner must have "hard skills" AND "soft skills. "In today's society, to stay employed, one must learn this fundamental balancing

act and to master this lesson. Networking is another valuable lesson to be learned. Keep the lines of communication open between friends, peers, and colleagues. In closing, there is not a big difference between the Law Enforcement and Executive Protection fields. It turns out that the two fields are remarkably similar and often go hand in hand with each other. Both fields offer a wide range of career opportunities, and operators from both disciplines must be able to multitask daily. Practitioners must be willing to continue to learn their "craft" and respect the awesome responsibilities that come with this work.

Carlton has served in the US Army, law enforcement & protective services for over 25 years and is an active LEO in Washington DC. Carlton has provided protection for various government officials, DC sports talent, and numerous touring artists.

60


BRITISH BODYGUARD ASSOCIATION The dedicated association for dedicated professionals

Membership starting from £60

admin@the-bba.org.uk www.the-bba.org.uk 61


CIRCUIT MAGAZINE ISSUE 51

Fit for Purpose By: Ryan Naish

Mindset, Ideas, and Planning Adventure series P1 With the majority of people now living and working in built up, artificial environments, it is now even more prevalent to proactively seek out opportunities to maximise time in natural surroundings and include adventurous activity frequently. As security professionals we can be away for long periods and do less than favourable hours; having an outlet that allows us to disconnect and recharge our

batteries is absolutely essential. Analyse your own unique situation, look to log a typical week and note down the hours you are inside at work and separately in your own time, log the time you spend exercising (at whatever intensity, a walk to the shops is included) and finally the time spent doing adventurous activities outside of a gym environment. The results will highlight where you can make positive changes or

62


FIT FOR PURPOSE confirm a good indoor/ outdoor balance.

dramatically, one persons risk boundaries will vary dramatically The Fit for Purpose from another as well definition of adventure: as what is considered “normal routine”. Many “An activity that of the readers will promotes physical and already be heavily mental stimulation involved with involves an element of adventurous activities, risk and a break from the more power to you, keep normal routine.” doing your thing. For those who need a nudge As we are all different, in the right direction the interpretation of here are 5 tips to get the this definition will vary process started.

63


CIRCUIT MAGAZINE ISSUE 51

What is my current physical condition, and how might it restrict me in certain activities? 5 Tips For Getting Started 1. Take some time out Go into a natural environment alone, leaving all electrical devices behind. Take time to move through the area at a walking pace, allowing the mind to wander. (Many Greek philosophers would teach a class on the move; by increasing the blood flow to head and body, it generates a greater capacity for ideas and productivity). Ask yourself general questions like: What does adventure mean to me? What activities would I like to see myself and others (family members, close friends etc) getting involved in? What environments attract me the most? Woodland, mountains or hills, beaches or

rivers etc. What positive changes am I looking for when engaging in my chosen activities? A greater connection to nature and/or family and friends, reducing stress, improving physical fitness, pushing resilience boundaries? 2. Think like a Stoic The ancient philosophers taught how to look at things in an objective, less emotive manner, viewing situations based on facts over feelings. This thought process will help those that struggle to initiate positive changes by eliminating self induced stumbling blocks from the outset. To avoid self sabotage, address the pure facts: How much time do I REALLY have available to me? Am I wasting too much of it on

64


FIT FOR PURPOSE

social media and other artificial sources when I could be spending more quality time outdoors? Am I aiming too high initially? Whilst grand ideas are great and very important, they can often create an overwhelming feeling and stop people initiating the first, vital steps forward. Get things off the ground at a low level,

65

be consistent and then progress. What is my current physical condition and how might it restrict me in certain activities? We are certainly more capable physically than our mindset generally allows us to believe, but jumping feet first into an activity way out of your current physical capacity may result in injury or simply


CIRCUIT MAGAZINE ISSUE 51 put you off trying it again. The same theme keeps cropping up, take the first steps and be consistent; physical condition will improve, alongside greater skill and confidence in the chosen activity. 3. Keep it simple Look to the local natural areas in your vicinity initially, places that you may be able to get to on foot (a good excuse to include locomotive movement; increasing cardio-respiratory function, load carrying abilities and endurance). If young family members are included in the activities, make it enjoyable with plenty of natural stimulation e.g. building shelters, getting into the elements and out of their comfort zone (building resilience from a young age). If you are already competent in an activity, alter the layout to make it more of an adventure: If hiking is your thing, add an overnighter out on the ground, maybe push on after last light with a head torch for an added challenge; look

66


FIT FOR PURPOSE

If hiking is your thing, add an overnighter out on the ground, maybe push on after last light with a head torch for an added challenge to maximise whatever activity you decide on, aiming to make the most of your time outdoors.

environments, seasons etc. (See next issue for a look at kit and equipment basics.) Some activities can be purely spontaneous 4. Prepare for Action and require little to Don’t over complicate no planning due to but plan accordingly. reduced risk factors or You have a responsibility low complexity in the to yourself and others activities, just beware of (if included) and that’s complacency. not something to be taken lightly. At best a 5. Take Action bad situation resulting The time for from negligence can put procrastination is over. someone off ever trying You’ve come up with something adventurous your ideas, processed again, at worse, well and formulated them it goes without saying. in a logical and realistic Construct a general, manner, addressed generic kit list with add logistical considerations, on sections for: different planned (if required)... activities, additional now it’s time to get out people, durations, there and amongst it! Ryan is a former physical training instructor in the Parachute Regiment and now specialises as a movement and outdoor skills coach. He is active in the security industry and also runs seminars and workshops, where he shares his passion for cultivating an active lifestyle that’s fit for purpose. Follow him on Instagram, @fitforpurpose.ffp, for practical tips and advice.

67


CIRCUIT MAGAZINE ISSUE 51 By: Orlando Wilson

One of the main advantages of shotguns is that they can fire a wide variety of ammo for defense, hunting, or sporting applications. With a 12ga shotgun, you can literally shoot clay pigeons, real pigeons, deer, bears, or pedophiles, and terrorists. You just need to choose the right type of shells. The ammunition used in shotguns is referred to as shells, not bullets. Shotgun shells come in various sizes, but the most common for 12ga guns are 2 ¾ inches, 3 inches, and 3 ½ inches. Most modern 12ga shotguns are chambered for 2 ¾ inch

68


TACTICAL FIREARMS

69


CIRCUIT MAGAZINE ISSUE 51 and 3-inch shells, but some older guns only take 2 ¾ inch shells. The size of the shells the guns are chambered for is usually marked on the barrels, and most guns from the main manufacturers have barrels that can be easily taken off and changed. 3 ½ inch shells are typically used for sporting applications such as duck or geese hunting. Shotgun shells are made up of the shell case, a primer, powder charge, a wad, and the shot or slug. Most shells are plastic, as are the wads, but there are still some shells on the market with cardboard wads. The wads separate the powder charge from the pellets ensuring the gases from the powder are contained when the shell is fired. Plastic wads these days usually have a cup for the shot that opens up when it exits the barrel of the gun. Below I will discuss a few of the main types of ammunition that can

be used for tactical/ security applications. Some locations will have restrictions on some types of ammunition, so all I can say is work with what you've got and learn how to use it to maximum effect. There are things you can do to modify shotgun shells to make them more lethal, but this can also affect how the shells shoot and can also be illegal. For this reason, I advise people to stick to factory ammo, it's deadly enough! Types of Shotgun Ammo 000 Buckshot: In terms of size, one pellet of 000 Buckshot is .36 caliber (9.1MM) and averages 8 pellets in 2 3/4" shells and 10 pellets in 3" shells. So, hitting someone with a 3" shell of 000 buck is like shooting them 10 times with a 9mm pistol. 00 Buckshot: This is the most popular tactical load for shotguns with 9 pellets of .33 caliber (8.3MM) in 2 3/4" shells. In the

70


TACTICAL FIREARMS larger 3" shells, there are, on average, 15 pellets.

There are things you can do to modify shotgun shells to make them more lethal, but this can also affect how the shells shoot and can also be illegal.

#4 Buckshot: This is a common tactical load, and one pellet of #4 buckshot is .24 caliber (6mm) with an average of 27 pellets in 2 3/4" shells and 41 pellets in a 3" shell with velocities of around 1200 feet per second. This is a devastating defensive load and can also be used for hunting medium size deer and game. T-Shot: This load is generally used for hunting geese and foxes, but it is also excellent for defense or tactical applications. One pellet of T-Shot is .20 caliber (5mm) with an average of 50 pellets in a 3" shell with velocities of around 1300 to 1500 feet per second. T-Shot in 2 3/4" shells are very difficult to find, if not impossible, as it is primarily a hunting caliber. BBB: This is another load that is primarily used for hunting ducks and geese, but it is also a good defensive load. One pellet of BBB is .19 caliber (5mm), and there is an average of 65 pellets in a 3" shell with velocities of around 1400 to 1550 feet per second.

71


CIRCUIT MAGAZINE ISSUE 51 Birdshot: In quite a few countries, birdshot is used for riot control because at a distance it will hurt people, but the pellets do not have the weight to penetrate and cause permanent damage (unless someone is hit in the eyes). One 3" shell of #4 birdshot can hold over 130 pellets of .12 caliber (3mm). I have seen security guards in several countries carrying birdshot in their shotguns, most probably because its cheap and they don't know the difference between one shotgun shell and another. Slug: The primary use for slugs is hunting big game such as boar, deer, and elk and can reach out to distances beyond 300 meters. Shotgun slugs have been romanticized by zombie apocalypse computer games and also by the special forces using them to blast off door hinges. For tactical applications, if you hit someone with a solid lead or copper hollow-point slug, they are going to have big problems. But in my opinion, its shots are scattergun. If you want to shoot single projectiles, use a rifle as they are more accurate and carry more ammo. A 30 round AK-47 magazine is smaller than an 8 round Saiga 12

Shotgun slugs have been romanticized by zombie apocalypse computer games and also by the special forces using them to blast off door hinges.

72


TACTICAL FIREARMS

magazine. If rifles are not legal and you need to deal with targets at a distance, then slugs are a viable option. I would personally mix them up with other loads to have options for all situations. Exotic: There are a lot of "exotic" rounds on the market, many of which are just gimmicks and are more for show, i.e. to

73

talk about at the bar or to show off on a range. For tactical and defensive applications, use reliable and tested ammo, not something that looks cool on YouTube. There are many more shotgun loads and pellet sizes. However, I feel these are the main one’s worth talking about in this brief article. As I said


CIRCUIT MAGAZINE ISSUE 51

At 50 meters and beyond, it would be causing pain and keeping people's heads down. above, shotguns to me are scatterguns and can put out a lot of pellets very quickly with devastating effect, if the shooter can handle the gun properly. In an under-and-over shotgun that I had professionally cut to just over the legal US barrel length of 18 inches (18.25 to ensure it was legal), I used to load 3" shells of T-Shot. The gun was compact and for home defense. It could put down 100 .20 steel pellets traveling at 1500 feet per second as quickly as I could pull the trigger. Within 10 meters, that gun loaded with that type of ammunition would shred a bad guy. At 50 meters and beyond, it would be

causing pain and keeping people's heads down. I am a big fan of shotguns for tactical and security applications, but as with any firearm, the user must know how to use them and ensure they are well maintained. Many other things need to be considered when working with shotguns and firearms in general that cannot be learned from a magazine or a video. However, it is a starting point and needs to be supplemented with professional and reality-based training. As they say, "practice, practice, practice," and especially with your firearms. And remember to keep your drills real and straightforward!

Orlando Wilson has worked in the security industry internationally for over 25 years. He has become accustomed to the types of complications that can occur, when dealing with international law enforcement agencies, organized criminal and Mafia groups. He is the chief consultant for Risks Inc. and based in Miami but spends much of his time traveling and providing a wide range of kidnapping prevention and tactical training services to private and government clients.

74


THE INDUSTRY AND THE UGLY TRUTH

Who’s protecting Who’s protecting Who’s protecting YOU, while you YOU, while you YOU, while you protect others? protect others? protect others?

With our premium tier of membership, we’ve got you covered under the BBA Protect insurance policy, providing complete peace of mind while With our premium tier of membership, we’ve got you covered under the you work in addition to the standard BBA membership benefits. BBA Protect insurance providing we’ve complete of mind whilethe With our premium tier policy, of membership, got peace you covered under Designed forin professionals looking toproviding maximiseBBA their employability and their you work addition the standard membership benefits. BBA Protect insuranceto policy, complete peace ofdemonstrate mind while commitment to industry standards, there are two levels of Protect membership available: you work addition to the standard benefits. Designed forin professionals looking to maximiseBBA theirmembership employability and demonstrate their commitment to industry standards, are two levels of Protect membership available: Designed for professionals looking tothere maximise their employability and demonstrate their PROTECT PROTECT+ commitment to industry standards, there are two levels of Protect membership available: Individual public and products liability Personal accident and health insurance PROTECT PROTECT+ insurance designed for UK Close designed for armed Close Protection and Individual public and working productsinliability Personal accident healthworking insurance Protection operators nonMaritime Security and operators in PROTECT PROTECT+ insurance designed UK Close designed for armed Close Protection and hostile regions. hostile regions. Individual public andfor products liability Personal accident and health insurance Protection operatorsfor working in nonMaritime Security working and in insurance designed UK Close designed for armedoperators Close Protection hostile regions. hostile regions. Protection operators in nonMaritime Security membership operatorsorganisation, working The in As a trusted professional FROM JUST £60working PER MONTH BBA are dedicated to bringing our members the best hostile regions. hostile regions. IT’S EASY TO UPGRADE YOUR BBA

possible resources and tools to enhance their standing and As a trusted professional membership organisation, The credibility as close protection operators within the industry. BBA are dedicated to bringing our members the best As a trusted professional membership organisation, Theand possible resources and tools to enhance their standing BBA are dedicated to bringingoperators our members thethe best credibility as close protection within industry. possible resources and tools to enhance their standing and credibility as close protection operators within the industry.

FROM JUSTTO £60 PER MONTH MEMBERSHIP PROTECT YOU. IT’S EASY TO UPGRADE YOUR BBA FROM JUST £60 PER MONTH MEMBERSHIP TO PROTECT YOU. IT’S EASY TO UPGRADE YOUR BBA MEMBERSHIP TO PROTECT YOU.

Visit our website at www.the-bba.org.uk to find out more. Visit our website at www.the-bba.org.uk to find out more. Visit our website at www.the-bba.org.uk to find out more. Lockton Companies LLP is a limited liability partnership incorporated in England and Wales, registration number OC353198. Authorised and regulated by the Financial Conduct Authority.

33 75

Lockton Companies LLP is a limited liability partnership incorporated in England and Wales,


CIRCUIT MAGAZINE ISSUE 51

By: James Bore

76


CYBERSECURITY SERIES

Artificial Intelligence, Machine Learning, and Bias

Now that we’ve concluded the introduction series, I’ll be delving into more specialist areas. In this article, I’ll take a look at artificial intelligence, particularly the machine learning area, a basic overview of how it works, and the dangers of overreliance on an algorithmic approach to analysis.

intelligence we talk about in computing – general AI and specialised AI.

General AI is of the type that appears in science fiction rather than anything that actually exists – some experts claim it is close, but What is Artificial it has been ‘close’ now for Intelligence and Machine several decades. This is the Learning type that alarmists refer While the term artificial to when they talk about intelligence gets thrown AI taking over the world around a lot these and wiping out the human days, particularly by race. However, it’s safe marketing specialists, to say this isn’t the most there are substantial significant threat from AI misunderstandings of given the remote chance what it means. There of it happening outside of are two types of artificial Hollywood.

77


CIRCUIT MAGAZINE ISSUE 51 Specialist AI is the it will become more type that we have today: accurate. Programming autonomous vehicles, a computer to play facial recognition, weather a game such as prediction, and any other chess better than the specialised task which a programmer would be human can perform falls an example of this. into this category. Within this specialist category, • Deep learning there are broadly two systems are not a different types: separate category but a subset of the machine • Expert systems (also learning systems. known as rules engines, Essentially, they are knowledge graphs, or multi-layered machine symbolic AI). These learning systems made systems work through up of multiple classical coded procedures based machine learning on banks of knowledge systems, breaking or rules, built by inputs into pieces and taking the appropriate supplying those pieces expert and making to the appropriate a flowchart of their machine learning layers thinking processes for a before recombining to particular task. arrive at an answer. • Machine learning systems This type modify themselves when exposed to more data, effectively learning from the information they are given. This is done by setting goals for the machine, providing them with a starting algorithm or set of algorithms, and then feeding back to the machine on the success of its approach. Initially, errors will be more common than success; however, as the algorithm evolves,

So far so good, and the success of machine learning systems in automating work which would otherwise require significant human resources shows that there is definite value in this approach. I wouldn’t be writing this article if there weren’t some risks to the method, though, and they come in a few forms. The Wrong Goal My favourite demonstration of this

78


CYBERSECURITY SERIES

bias is the case of a machine learning model being trained to land an airplane (fortunately, as you will see, in simulation rather than real life). The program was given the goal of landing an aircraft with the minimum amount of force on landing. Unfortunately, the simulated measurement systems had a slight flat. Instead of setting the aircraft down as gently as possible, the system learned it could achieve its

79

goal by crashing the plane with maximum force – which caused all of those measurement values to overflow and flip over to zero. Any developer of a machine learning system needs to understand their goals and how they will check them. Errors like the above are amusing only when they happen in a simulation – in real life, it would be an entirely different matter.


CIRCUIT MAGAZINE ISSUE 51 Bias Another, more insidious example is the bias found in facial recognition systems. Because the data fed to these machines tend to be weighted heavily towards a particular set of features (mostly North American Caucasians), they have trouble identifying any other set of features reliably. Anyone who does not fit into the category the machine is expecting is at much higher risk of being misidentified – given that facial recognition is used widely for security and law enforcement purposes, the problem here should be apparent. Worse still is the case of algorithms used to assess a defendant’s likelihood of recidivism. ProPublica investigated one particular tool, comparing the predicted recidivism rate for white and black defendants against the actual rate. The tool was correct about six times in ten, but the devil is in the details. White defendants were more likely to have their risk of recidivism underestimated. Black defendants were more likely to have their risk of recidivism overestimated. This was not a minor error, as white re-offenders were mistakenly labelled

The essential lesson is that machine learning is just providing expert information, and just like any information it can be wrong.

80


CYBERSECURITY SERIES at low risk twice as often as black re-offenders. In contrast, black defendants were incorrectly marked as high risk twice as often as their white counterparts. The picture becomes dramatically worse when you consider that in terms of violent recidivism (given a separate rating), the algorithm was only correct with its predictions 20 percent of the time. One of the problems, when these biases emerge, is that it is extremely difficult to understand without relying on the system and checking the validity of predictions. In the case of the recidivism tool, this was the product of two years of research covering over 100 000 cases. With the speed that we are developing and applying machine learning to solve problems, a lot of damage can be done before any systemic biases are uncovered – if they ever are. Black Box Systems Complicating this further is that once a machine learning model is built, its

decisions cannot usually be explained by the developer. For complicated problems, the process of learning results in what are, to all intents and purposes, blackbox systems. The algorithms grow so complex that they are simply not understood by those who set the initial conditions, meaning if an unexpected input occurs outside the model, the output is unpredictable. We cannot analyse why a decision was made. The essential lesson is that machine learning is just providing expert information, and just like any information, it can be wrong. While they are capable of sorting more data more quickly than a human and are arguably less prone to erroneous decisions, they do still make mistakes, and taking them as a source of ultimate truth magnifies the impact of those mistakes. Be skeptical of any decisions from machine learning systems as you would from any human expert, and whenever possible, validate the output.

James Bore is an independent cybersecurity consultant, speaker, and author with over a decade of experience in the domain. He has worked to secure national mobile networks, financial institutions, start-ups, and one of the largest attractions’ companies in the world, among others. If you would like to get in touch for help with any of the above, please reach out at james@bores.com

81


CIRCUIT MAGAZINE ISSUE 51

ASK THE NABA NETWORK Because in protection what you don’t know can hurt you!

Sen. Elizabeth Warren was confronted about her plan to eliminate college debt by a member of the public in what may be considered as an embarrassing situation for the Senator. Full Story >

Loren Johnson Is there anything that could have been done to prevent this "embarrassment" to the Senator? Jim Cutrell In that setting, with a primary candidate, there is nothing a protector could have done other than position him/herself within arm’s reach. The father in question doesn't seem to intend to embarrass her. Just one of the many examples in my "The Politics of Political Protection" presentation. Loren Johnson Do you think a sort of pre-screening could have negated the hostile tone or possibly prevented the question?

Jim Cutrell

Anything is possible but, maybe the gentleman had no intention of approaching her until she said something that triggered him? Why would a protector want to block a question? Candidates (and office holders) need to hear from the public. Most say they want to hear from members of the public. Blocking a question puts the protector into politics and out of protection. The 1st Amendment is the first for a reason. Candidates are going to be embarrassed by their policies or their own words sometimes. That's politics. I would urge any protector involved in safeguarding a political candidate to not confuse protection from embarrassment with protection from an embarrassing situation as depicted in the video. Don't let you candidate trip and fall. Don't let them take a pie or glitter. Don't let them push a pull door. Stay out of their politics. Unless a member of the public tries to do harm to your person it's not a security issue.

82


ASK THE NABA NETWORK Jeff Doc Foust As physical security: 1. You can try to screen as much as you want, but what a person says to the screener usually isn't the same thing they say to the political figure. 2. Unless you have a big shepherd's crook or are going to jerk the political figure out of "harm’s way" you can't keep them from being asked questions, and being the "yanking parent" and pulling them to safety every time someone asks them a question, you are going to be very busy hopping to and fro. Paul Smith There is no protection standpoint. The question is about image and campaign management. Not our job.

Mark James Our job is assisting with image management and candidate management so it becomes campaign management also. In that situation there is little we could have done and there is little Senator Warren would have wanted from an assist standpoint as she is normally pretty quick on her feet with responses. While we may not be able to answer the question for them, we can manage the space around them particularly if a situation starts to become hostile. This gentleman just asked a very honest question which I truly believe caught her off guard. In this situation or any other, if you move the candidate too soon it will appear she is dodging the question. If she gets stuck on that solo question the embarrassment continues. So, there has to be a plan for someone to step in if required. Often you can manage some of the dynamics by only allowing one question per audience member or place a time limit on questions and/or responses. One of the toughest challenges with working with politicians is they want to be seen as men and women of the people. If you are too close to the at the wrong time you can make them look weak. If you are too far it presents its own challenges.

Jeff Doc Foust While I'm not going to get into the politics of the situation, I will get into the stupidity of the situation: In a "town hall" forum, you can control the venue and the screening (weapons, bombs, etc...) of the participants, but when a political figure wants to get face-to-face, talk and handshake everyone, there is very little you can do to mitigate what comes out of a political figures mouth. Paul Smith Being a bodyguard is about protecting the client, not censoring free speech and helping with propaganda. The whole purpose of a town hall meeting is to hear from the constituents and answer their questions.

The NABA network is a fantastic community for getting help and advice on all matter’s security related. https://www.facebook.com/groups/TheNABA/

83


CIRCUIT MAGAZINE ISSUE 51 By: Bob Shepherd

In today’s modern world, there is insurance for almost everything. Any kind of "Risk" is big business, and therefore there is a lot of profit to be made that's the reality.

K&R insurance coverage, especially as it helps to reduce your overall insurance costs of travelling to these places. So, it goes without saying that there is even insurance But, will it guarantee your for kidnap and ransom (K&R). safety, and will it get you immediately released if the The Reality worst happens? If you're travelling to today's hostile environments as Also, just who are the an International actor, winners and losers in a anywhere from Mexico to kidnap and ransom situation Afghanistan, and all the bad of an International individual places in between, it would or grouping, foreign to that be madness to go without country?

84


FINDING A RESOLUTION

85


CIRCUIT MAGAZINE ISSUE 51 For decades now, I've both taught and guided individuals around hostile environments. Right from the very beginning, I've railed against ransoms being paid for hostages, but what if I was the hostage that had been kidnapped? Â Years ago, I told my wife that if it ever happened to me, don't get involved. I will either escape early on or continue to attempt to escape. I may get killed, as this scenario is extremely delicate and dangerous. Or the special forces may come and initiate my release and kill or capture the hostage-takers. But on no account have anyone ever pay a ransom on my behalf.

I may get killed, as this scenario is extremely delicate and dangerous. Or the special forces may come and initiate my release and kill or capture the hostage takers.

Why Paying a Ransom Should be the Last Resort For every ransom paid, you're encouraging further kidnappings for the same result and so on. I've always been against paying ransoms for that reason alone; therefore, I could hardly go along with the idea if it was myself who was the individual kidnapped. Â Of course, it's a whole different ball game if the kidnapping is not about money, but about say a prisoner swap instead. Even so, I would expect the same scenario as mentioned - no swap. The same

86


FINDING A RESOLUTION circumstances apply to not paying ransoms and for the same reasons mentioned. Even for highly trained special forces, attempting a release is extremely high-risk for all involved. But I have faith; it's what they're trained for and their successful assault is the best result, but note again, it is incredibly high-risk, as past incidents in recent times have proven. But even paying a ransom is a high risk too. It's all a game of smoke and mirrors. Just who exactly are you playing with? Who is really on your side, and who is playing along with the kidnappers? There's also a game called doubledipping, where once the

87

ransom is paid, they come back and ask for more. So even paying a ransom is sometimes no guarantee of a released hostage. Another complexity is the multitude of actors involved in these situations. It might surprise you to learn just how many different agencies can be involved in these situations. Main Actors Involved in K&R Situations I was once involved in a K&R scenario in a hostile environment that went on and on. Days quickly turned into weeks and then into months. Without giving away anything key to securing future releases, some of the main actors


CIRCUIT MAGAZINE ISSUE 51 you'd expect to encounter are:

• The hostage • The kidnapping team • The management team of the commercial company that represents the hostage • The hostage negotiating team, acting on behalf of the commercial company that represents the hostage • A commercial security company with K&R experienced operatives • The Embassy staff of the country that the hostage belongs to • The local government of the host country • The security services of the host country • The security services of the country that the hostage comes from • Possibly even the security services of countries allied to the host country or/and the hostage’s country. • Finally, The special forces hostage rescue team… or teams if it’s multiple countries. What an organisation for just one hostage! That's an awful lot of people, many of whom are putting their lives in harm's way for the hostage. Well, sadly, it's not an organisation. All these agencies have their own agendas and that can contribute towards a lot of conflict. Managing Conflicting Agendas The company who represents the hostage may want the ransom paid, and ASAP. And I'm sure that in most cases, so would the family of the hostage. The

government of the hostage may be against paying the ransom however; countries such as the USA and the UK, allegedly. They would prefer the SF team to rescue the hostage successfully with no ransom paid, and the hostagetakers (seen as terrorists) eliminated. That would send a message to future hostage-takers that there will be no ransom paid, only death or capture for the hostage-takers. However, the host nation may have other ideas. They perhaps would not want either the ransom paid, or the SF rescue team deployed. They may have

88


FINDING A RESOLUTION their own way of dealing with it.

So… the longer it goes on, the longer these actors are hatching their plans, the more riled the kidnappers are becoming, the more danger the hostage is in

89

So, the longer it goes on, the longer these actors are hatching their plans, the more riled the kidnappers are becoming, the more danger the hostage is in. Whose plan will be instigated first? There may be more than 100 individuals involved, all with their own outcomes in mind – remember, all just for a single hostage! In the last 20 years, there have been many K&R scenarios. Many have had a successful hostage release with no ransom paid. Many have actually been released with a ransom paid. And many have gone very wrong, where the hostage’s have been killed. In the overview example, I've given, the outcome was successfully dealt with by a cunning plan devised by the host country's security and intelligence agency. No ransom was paid, and the hostage was set free in pretty much one piece, at least physically anyway, with the kidnappers arrested. It wouldn’t be appropriate for me to discuss the details of their plan, for obvious reasons, but needless to say, it was an absolute belter. As I write this, the world isn't getting any safer.


CIRCUIT MAGAZINE ISSUE 51

If you're an individual about to go into a hostile environment as a foreign actor, or if you know someone who is about to go, or indeed, if you're managing someone about to go, then please share this article with all involved, so that they can appreciate what goes into a K&R event involving just one individual. Then put everything in place proactively to ensure that the chances of a kidnap for ransom situation occurring are as low as they realistically can be, given the complexities of operating on the ground in some of today's hostile environments.

The result of who wins and who loses in this type of scenario is sadly down to those groupings on the ground who get their act together first and are bold enough to put their cunning plan into action. The result of all these different agencies striving for different outcomes means that they will never wholly work together. Therefore, understand that in K&R situations, the goal may not always be the safe and straightforward release of the hostage. The ideal scenario is that you don’t leave yourself vulnerable to kidnapping in the first place!

Bestselling author Bob Shepherd has spent nearly forty years operating in conflict areas around the world. A twenty-year veteran of Britain's elite 22 SAS Regiment with nearly two decades of private security work to his credit, Bob has successfully negotiated some of the most dangerous places on earth as a special forces soldier and a private citizen. Bob comments regularly on security issues and has appeared on CNN International, BBC, SKY News, and BBC Radio. He has also authored numerous articles and books including the Sunday Times Top Ten bestseller The Circuit. In addition to writing and lecturing, Bob continues to advise individuals operating in hostile environments. For more of his insights on security and geopolitics visit www.bobshepherdauthor.com

90


INTRODUCTION TO CYBERSECURITY

● NEW FREE APP ● FREE ISSUE ● SUBSCRIBE DIRECTLY ● EVERY SINGLE ISSUE

E B I R C S SUB & Y A D O T SAVE

Get The Circuit Security Magazine with immediate electronic downloads to read on your PC, laptop or smart 91 39 device.


CIRCUIT MAGAZINE ISSUE 51 By: Drum Cussac

92


INCIDENT REPORT

AFRICA

Somalia US Airstrike Targets AlShabaab Militants near Jilib, Middle Juba Region According to a statement issued by the United States Africa Command (AFRICOM) on Monday, 24 February, an airstrike has been conducted by US military aircraft near Jilib, Middle Juba region, resulting in the death of at least one militant. AFRICOM also claimed that no civilian casualties occurred in the attack. Burkina Faso Multiple People Killed in Attack by Unidentified Gunmen in Komandjari Province, Est Region According to local media sources, a group of gunmen attacked a village in Komandjari province, Est region, on Friday, 21 February, killing at least 11 people. The attack occurred in the village of Diamondji in the commune of Foutouri. The assailants arrived in the village on motorcycles and opened fire whilst ransacking homes. Many of the villagers fled as the violence began. No group has claimed responsibility for the attack. Zambia Mob Attacks District Hospital and Injure Nurse in Luwingu District

93

According to local media reports on Thursday, 20 February, a mob of residents in Luwingu district, Northern Province, axed a nurse who attempted to rescue an elderly woman under attack on suspicion that she was harbouring gassers. The mob also attempted to burn down the district hospital on claims that the health facility was a haven for suspected gas attackers. The affected nurse sustained a punctured lung and is receiving treatment. An ambulance and the main gate to the hospital were damaged. Multiple people suspected of being behind a spate of attacks in which people have been sprayed with poisonous substances in Zambia have been arrested.

Americas

Brazil Recent Elevated Murder Levels Attributed to Ongoing Police Strike Across Ceará State International media outlets report on Monday, 24 February, that there has been a recent spike in murder rates throughout Ceará state owing in part to a police strike that began on Wednesday, 19 February, in demand of higher wages. Authorities report that in the past


AMERICAS

CIRCUIT MAGAZINE ISSUE 51 Haiti

five days since the strike began, 147 people have been murdered in various areas of the state, forcing authorities to cancel carnival festivities in several cities. Senior Brazilian defence and justice ministers have travelled to Cearรก's capital, Fortaleza, to oversee the army's response to policing the crisis. Haiti Ongoing Violence and Demonstrations Forces

Authorities to Cancel Carnaval International media outlets report on Monday, 24 February, that Carnaval, the largest celebration of the year in Haiti, has been called off after deadly protests and gunfire interrupted the first day of festivities on Sunday. The three-day festival was cut short after gunshots were reported amid thousands of revellers, with reports of at least one being killed in the melee. The High

94


MIDDLE EAST AND NORTH AFRICA

INCIDENT REPORT Command of the Armed Forces has called on the National Police of Haiti to restore calm amid growing discontent over pay and working conditions. Chile Anti-Government Protesters Clash with Riot Police in Valparaiso, Valparaiso Province According to international media reports on Sunday, 23 February, scores of protesters clashed with riot police in Valparaiso resulting in multiple injured. Initial reports state that 23 riot police were injured during the clashes with water cannons being deployed around 2000hrs (2300 UTC) to disperse the protesters.

Reports further stated that around 150 protesters set alight at least seven cars as well as attacking shops close to the O'Higgins Hotel in Valparaiso. Reports have gone on to state that around 15 protesters were arrested following the protest action. Further protest action cannot be ruled out in the immediate term.

Middle East and North Africa Libya Turkish Government Reports of Several Fatalities whilst Providing

95

Assistance to GNA According to emerging unconfirmed social media reports on Monday, 24 February, multiple rockets have been intercepted by Israel's Iron Dome defence system over the city of Sderot, Southern District.

The rocket attack comes shortly after Israel launched a series of airstrikes on targets in the Gaza Strip and Syria over the weekend. This is a developing situation; however, there have currently been no fatalities or injuries reported following the rocket attack. Turkey/Iran USGS Reports 5.7 Magnitude Earthquake Along Turkey-Iran Border The United States Geological Survey (USGS) has reported that a 5.7 magnitude earthquake has occurred close to the Turkey-Iran border on Sunday, 23 February. Initial reports state that the earthquake had a depth of 6.4km (4 miles). Reports have gone on to state that there has been a number of buildings damaged following the earthquake, particularly in the Turkish city of Van, Van province. Currently, there have been no reports of any fatalities at this time.


Europe

Germany Dozens Injured after Car is Intentionally Driven into Carnival Procession in Volkmarsen, Hesse According to international media reports on Monday, 24 February, dozens of people have been injured after a car was intentionally driven into a carnival procession in Volkmarsen, Hesse. Reports state that 30 individuals were injured as a result of the incident at around 1425hrs (1345 UTC). The driver of the vehicle was subsequently arrested, although their motive is not currently known. All carnival processions have been cancelled in Hesse as a precautionary measure. Italy Authorities Introduce Restrictions in Coronavirus Hit Areas of Lombardy and Veneto According to international

and local media reports, Italian authorities have effectively placed around a dozen towns in the regions of Lombardy and Veneto under quarantine after they announced an emergency plan late on Saturday, 22 February to attempt to control the spread of coronavirus in the regions. Around 50,000 people from towns in the two affected regions have been asked to stay at home by authorities. Around 3,500 of these affected people are in the Euganean Hills area of Veneto and the other 47,000 are in ten municipalities in the Lodi area of Lombardy. Prime Minister Giuseppe Conte has said that it would be forbidden to enter or leave the outbreak areas without special permission, and those who disobeyed the restrictions will reportedly be prosecuted and face a three-month prison

Veneto

96

EUROPE

CIRCUIT MAGAZINE ISSUE 51


INCIDENT REPORT sentence. The restrictions come after the number of confirmed cases in Italy rose to 79, with two deaths reported in Veneto. 54 of the reported cases have been in Lombardy and 17 in Veneto, with the other five outside the two main outbreak areas. Norway Fatalities Reported after Avalanche Strikes Guided Tour near Fridtjovbreen, Svalbard According to local media sources, two German tourists that were part of a guided tour were killed in an avalanche on the Fridtjovbreen glacier on the Svalbard archipelago on Thursday, 20 February. The avalanche reportedly took place 60 kilometres (40 miles) west of Longyearbyen, the biggest settlement on the archipelago. The deaths were confirmed by Norwegian news sources, and the two deceased were initially reported as missing but were later found dead after search and rescue efforts were launched.

Asia and the Pacific

India Multiple Fatalities and Scores Injured following Violent Clashes in New Delhi According to international media reports, there were

97

multiple fatalities and scores injured following violent clashes between demonstrators for and against the Citizenship Amendment Act (CAA) in New Delhi on Monday, 24 February. Reports state that there were at least seven fatalities and 150 injured following the violent clashes. Reports have further stated that police deployed tear gas and smoke grenades in an attempt to disperse the thousands of demonstrators in New Delhi. Further unrest is expected in the near-term. Thailand Multiple Injuries Reported After Bomb Explosion in Saba Yoi District, Songkhla Province National media outlets report on Monday, 24 February, that at least eight people were injured when a bomb exploded near a public park in Saba Yoi district in Songkhla province. Among those injured were four local police officers and two students.

Following the explosion, a gunfight was reported between police and the alleged culprits before they escaped. An investigation into the incident is currently underway.


China Coronavirus Statistics and Advice for 24 February The World Health Organisation (WHO) reports on Monday, 24 February, that the total death toll of the novel coronavirus (COVID-19) outbreak has risen to 2,618. In China, there are now 77,262 confirmed cases, and the total number of confirmed cases globally has risen to 79,331 with 2,069 cases now confirmed in other countries in Asia, Europe, North America and Australasia. One new member state (Kuwait) reported cases of COVID-19 in the previous 24 hours. The total number of countries affected is 29, with 23 deaths now reported outside of China. WHO assesses the risk of the COVID-19 acute respiratory disease to be very high in China, high at the regional level, and high at the global level. The basic principles to reduce the general risk of transmission of acute respiratory infections, according to the WHO, include the following: • Avoiding close contact with people suffering

• •

from acute respiratory infections. Frequent hand-washing, especially after direct contact with ill people or their environment. Avoiding unprotected contact with farm or wild animals. People with symptoms of acute respiratory infection should practice cough etiquette (maintain distance, cover coughs and sneezes with disposable tissues or clothing, and wash hands). Within healthcare facilities, enhance standard infection prevention and control practices in hospitals, specially in emergency departments.

WHO does not recommend any specific health measures for travellers. In case of symptoms suggestive of respiratory illness either during or after travel, travellers are encouraged to seek medical attention and share their travel history with their healthcare provider.

ASIA AND THE PACIFIC

CIRCUIT MAGAZINE ISSUE 51

About Drum Cussac, a GardaWorld company Because we put your people first, we’ve built cutting-edge risk and security which keeps up with the pace of change. The only risk and security platform to feature monthly updates, GlobalRiskManager is purpose built to be future-proof and can seamlessly integrate with your own systems. This, combined with over 20 years’ of industry knowledge and a team of in-house security experts, provides you with a comprehensive end-to-end risk and security solution - done your way.

98


INCIDENT REPORT

ROBINBARRATT@YAHOO.COM 99


CIRCUIT MAGAZINE ISSUE 51 By: Justin L. Johnson

“Safety is something that happens between your ears, not something you hold in your hands.”

-

Col. Jeff Cooper

100


AMMUNITION – DOES IT MATTER? In the context of close protection work, the use of firearms is often an all or nothing proposition. In most cases, you are either armed, or you’re not! There is a whole host of things that play into that, be it where you are, your level of certification, or the demands the client puts on you. All of that aside, I wanted to take some time and dig into the finer things, often overlooked when we talk about “strapping up.” Ammunition! This is a subject that could easily be stretched out and I could talk about the external ballistics of a given projectile, or I could dig into the ageless debate of 45 Auto vs. 9mm Luger. That is not the basis for this article.

Let me start by unpacking the types of projectiles I want to talk about. There are two major types of rounds we run into when we talk handguns. Those projectiles are Full Metal Jackets/Total Metal Jackets (FMJ/ TMJ) and Jacked Hollow Points (JHP). Now, before we get our panties in a bunch, I know there are soft points, hard cast, frangible, and lead round nose, to name a few more. And they all have their specific application, but I want to focus on the two that are most common in what we do. Remember, we have a specific application to think about, ammunition, and how it applies in the executive protection environment!

Right out of the chute, I I want to start at the want to talk about FMJ/ beginning and dive into TMJ and how they fit into the major differences in the discussion. An FMJ ammo out there today is typically a lead core and how they have bullet with a full copper evolved. I am going to jacket having an exposed focus on the projectile and base, where a TMJ is a basic terminal ballistics fully encapsulated lead to start. The choice of core. There are some caliber and the velocity health benefits to having at which the projectile a fully coated lead core, travels through the air. but at the end of the day, Other external ballistics those projectiles are often play a part, but those used interchangeably. are subjects for future These types of projectiles articles. are used for training; I

101


CIRCUIT MAGAZINE ISSUE 51 can’t stress that enough, TRAINING! This is the stuff you take to the range and practice with. These projectiles are not designed to expand or deform on impact. They are made as economically as possible to allow us to go to the range and spend our time improving our skills (and let’s be honest, that is where we should be spending more of our off time if we carry a gun). When we talk terminal ballistics, with an FMJ, there is little terminal effect. As stated earlier, the bullets don’t expand or deform and will penetrate DEEP.

The lack of expansion will punch nice neat holes in things but won’t cause much secondary damage (which is what we need to stop the threat). Not to mention

The lack of expansion will punch nice neat holes in things but won’t cause much secondary damage (which is what we need to stop the threat). Not to mention the overpenetration concern. You are responsible for every round you send downrange, period! If a round over penetrates and hits something on the other side, that’s on you! I’m not naïve; I understand that sometimes FMJ is all we have, or we aren’t allowed to carry hollow points. There are other options, such as Expanding FMJs or even frangible projectiles,

102


AMMUNITION – DOES IT MATTER? that will meet those needs. Research your choices and understand the environment you’re working in!

gun and use it, you’re going to want something dependable, accurate, and TERMINAL! That is where the Jacketed Hollow Point (JHP) comes in. The As you can tell, I cannot design of this projectile stress training enough! has a job to do to impact But when the rubber its intended target, meets the road, you’re expand, and dump as going to need something much energy as possible, that is going to step up to causing some sort of the plate when you need catastrophic failure of the it the most. If it sounds central nervous system. like I am overemphasizing The JHP comes in a few this, am I really? If you flavors, and some work find yourself in a life or better than others, but death situation, where they are designed to do you need to draw your just what I described.

103


CIRCUIT MAGAZINE ISSUE 51 How this is accomplished is through the almost instant expansion of the projectile when it impacts some sort of resistance, typically the hydraulic pressure of hitting muscle. That projectile expands in the best-case scenario to 1.5 times (or larger) its original size, causing cavitation inside the tissue, which is referred to as a secondary wound. This is where the damage is done! This is the ripping and tearing inside the wound tract. During this process, the projectile is dumping vast amounts of energy, which is having a heavy effect on the target and also preventing overpenetration. There are a couple of things to keep in mind when talking JHPs. Like in life, not all things are created equal! A good place to start is looking at what law enforcement uses in their duty firearms. You can dig into the merits of bonded projectiles (lead and copper are fused together) vs. non-bonded. Bonded projectiles will hold together better, so you get less jacket/ core separation (more

energy retention and slightly more penetration to get to deeper vital areas). Some JHPs also have drawbacks, as the open face of the bullet can become plugged with heavy clothing or other material, which will prevent expansion. There are some bullets out there that have a polymer in that cavity to help prevent clogging. Do your research on what is out there. I don’t want to turn this article into an advertisement! But make sure the gun you choose to carry will shoot the ammo you choose (reliability is vital in a life and death situation). It tends to be more expensive for the defense type JHPs, but running a magazine or two through your gun before you put it on your hip is a must! This all comes together as a system. The use of FMJs and JHPs should be seen as a complementary set of tools that work harmoniously with one another. I could throw out the cliché of “train as you fight” or “the more you sweat in training, the less you bleed in combat,” but we all know that to hone our craft, you have to practice!

104


AMMUNITION – DOES IT MATTER? I would suggest getting your FMJ to match your JHP ammo as closely as possible, on the external ballistics side of the equation. If you carry 147-grain JHP ammo, try to get yourself 147-grain FMJ training ammo. If you can get ammo that matches velocity, then you are winning! There are a few manufactures out there that ballistically match their training and duty/defense ammo. This will help you as the shooter, train to deal with

recoil impulse, or get you as close to your actual defense ammo as possible (without shooting piles of JHP, with can get super expensive). Get out there and get your repetition’s in; that’s the key! In future articles, I will dig into the deep dark world of it all. I will delve into the Jacketed Hollow Point, and we will go down the rabbit hole of terminal ballistics… Buckle ups folks, this ship’s about to take off!

Justin started his journey in the military and has grown his passion for firearms and training ever since. He has a resume that covers just about every segment of the security industry from armed and unarmed static security, investigations, close protection, highrisk protection, sports and entertainment venue security management, risk assessment, and consulting. He has spent the last 5 years managing ammunition product portfolios for major ammunition and firearms manufactures in the industry. He is also an avid competitive shooting, crossing multiple disciplines.

105


An Introduction to Celebrity Protection and Touring WORKING WITH THE MEDIA

by Elijah Shaw & Dale June

This is a "Real World" look at the business of VIP Protection and a MUST READ for anyone wanting to learn more about the job, written by those who know it best. I cannot recommend it highly enough.

available now on amazon 106

Miguel DeCoste


FOOT STEPS By: Jose Casillas

Episode 5: Sam Alicea Can you give us some insight on your previous line of work for those who may not be familiar with you? I have a background in Law Enforcement as a Police Officer. During that time I worked in the patrol division as a field

107

training officer and a crime scene technician. Just prior to beginning work in the industry I ran a few small businesses. One was in Real Estate and Mortgage Services and the other was in the Funeral Services Industry.


CIRCUIT MAGAZINE ISSUE 51 What were some takeaways you obtained from your past line of work? And how have they helped you in the private sector realm? When I look at the totality of what we do in this industry there are quite a few takeaways. From having dealt with the irate couples during a domestic dispute to negotiating a business deal the importance of not only verbal judo but communicative and interpersonal skills tops the list, followed by the skills I learned from collecting evidence at a crime scene where attention to detail was key. To answer the second part of your question on how these skills have helped me in the private sector, I look at it this way, although we need to continually be well trained and prepared for an attack on principle, I utilize many other “soft-skills,” every day. Whether I’m preparing an advance for a major event a year before “go time,” or simply negotiating with a restaurant manager where I want the Principal to sit during a last-minute OTR, these skills have proven to be paramount.

From having dealt with the irate couples during a domestic dispute to negotiating a business deal, the importance of not only verbal judo but communicative and interpersonal skills tops the list.

What is your current position with ICON and how do you manage such an important task within the executive protection/ celebrity touring industry? I am currently the Operations

108


FOOT STEPS Manager at ICON. How do I manage that?, sometimes I wonder myself, but time management, multi-tasking and that ever-important attention to detail come to mind. It would also be very remiss of me if I did not acknowledge the CEO, Elijah Shaw and the support, guidance, and knowledge he has provided over the years. All of which I have been able to utilize when managing accounts.

recommended Elijah Shaw and the ICON training program. In October of 2011, I enrolled in the Celebrity & VIP Protection Course, then after that the Advanced Executive Protection Course. After successfully completing both, I was fortunate to receive a call that let to being a part of a protective operation, and one call led to another, and the rest is history.

How was your transition to Executive/VIP Protection and how did you discover the company you now work for? The transition was interesting. Falling back on my earlier comment regarding the skill sets I was able to bring with me, I understood the basic premise of what we do and how to accomplish the task, however, coming from a law enforcement background I found out real quick that I no longer had the “authority” to close down streets, stop traffic, or for lack of a better word “tell” people what to do.

How did you develop your niche? Was it something you felt intriguing due to all the chess pieces that either had to be in place or be moved across the board? I don’t think I developed my niche until after I started work in this industry, I think it was just part of the transition for me. I believe I was fortunate enough to have had some of the necessary skill sets from my precious line if work and it was just a matter of me realizing that I could use and expand upon them in this setting.

As far as how I discovered my current firm, I was doing some research on the internet and I came across Hucky Austin’s bodyguardcareers.com website. I inquired about training schools and he

109

As far as an intriguing game of chess? Absolutely! As you mentioned, just like the game of chess, you not only need to think two or three moves ahead but also need to be cognizant that each piece has a specific role and a unique way in which it can move. I feel that It is


CIRCUIT MAGAZINE ISSUE 51 my job to understand those differences and assist in those unique movements and roles. What are some obstacles you have encountered while doing an advance where subtlety was out of the question, how did you overcome it? I don't recall a time during an advance that I couldn't be subtle. I think one of the keys to a good advance is one's ability to be diplomatic. However, I have encountered times where after I completed an advance, arrangements were made and decisions were agreed upon that things were changed, or at least an attempt was made to have things changed. At that point my subtlety may have been thrown out the window a bit, however, tactful, professional and stern negotiations are brought to the forefront. Anywhere from changes to arrival routes and agreed upon entrances to who will be permitted in a restricted area are just a few examples of some of those encounters. What advice would you give those who don't necessarily have an area they specialize in? Specializing in a specific area is not the end all be all, however, it will set you apart from others and can

jumpstart a new agents entrance into the industry. Perfect example, an agent reached out to me a few weeks ago to let me know that he has been competing in Iron Man triathlons and if we ever had a client who wants to participate in triathlon he has the experience. With that being said, one's specialty can be anything. You just have to identify it and capitalize on it. Rest assured I know exactly who to call if a highly visible client gets the itch to try their hand at an Ironman competition. If someone were to follow in your footsteps what would you tell them to do different? What advice would you give them? Wow, that’s a good question. Different?, I guess looking back at things I would have to say get ahead of the curve, identify your specialty and make sure decision-makers are aware via networking, branding or marketing. In my case, I think my niche was basically discovered and stumbled upon after being on a few assignments and my skill sets came to the forefront. So, my advice would be to set a strategic path, a course of action and follow it. The advance survey has a lot of key components

110


FOOT STEPS such as anticipating, planning, preparing and being subtle, what are some specific situations you have found yourself that weren't ideal but you managed to work with what you had and succeeded? The detail that comes to mind was for a HNW client. I was specifically tapped to conduct advance work for a multi-week covert assignment in a communist country. Due to the nature of the assignment, we did not have an in-country liaison. Turns out that everything from setting up a last-minute in-country doctor visit for the principle to coordinating movements while heads of state from multiple countries and their protection teams were on location was the order of the day. I’m happy to report that even with limited resources, the need to be well under the radar, and the not so ideal circumstances, things turned out well.

credentials? From corporate events to political and entertainment venues, each event is unique in and of itself. Unfortunately, with the advent of social media, one of the things that have become prevalent is the counterfeiting of credentials by using images obtained from someone’s social media post. Let’s take a music tour for example, not everyone is going to be security-minded, so inevitably a photo of the event credential will find its way online. So I think educating the tour personnel about the issue and social media monitoring now plays a part in the grand scheme of things. I’m also a big advocate of keeping things simple. Those charts that are given to the local venue security with 20-30 different types of credentials that they need to be aware of can become a bit confusing and may ultimately take an 8 hr shift just to figure out. So, I keep the different credential types to a minimum. Finally, Limiting and controlling it is important to make sure access are crucial when the local venue security it comes to keeping the is well versed in not only inner circle of security the credentials but the established, what are particulars of the restrictions some details that are overlooked when handling as well.

Jose Casillas is a Los Angles based Executive Protection Agent who specializes in red carpet events, movie premiers & estate security. He also teaches martial arts and works as an Emergency Medical Technician (EMT).

111


CIRCUIT MAGAZINE ISSUE 51

global events map SecurityTwenty20 Dublin Sept 10, 2020 Dublin, Ireland

ITEC London 2020 April 28 – 30, 2020 London, UK

Security – Essen Sept 22-25, 2020 Essen, Germany

ISC West March 18-20, 2020. Las Vegas NV

SECUREXPO Nov 10-12, 2020 Nairobi, Kenya

112

OFSEC Expo Oct 12-14, 2020 Muscat, Oman


114

SecurityTwenty20 Special March 26-27, 2020 Newport, Wales

The Security Event 28-30 April 2020. NEC, Birmingham, UK

Cyber-Physical Convergence Forum June 11, 2020 London, UK VIDSE 2020 Sept 14-16, 2020 Hanoi, Vietnam

ASIS Europe Prague 2020 April 1-3, 2020. Prague, CZ

DESI-JAPAN May 19-21, 2021 Makuhari, Japan

Security Exhibition & Conference July 22-24, 2020 Melbourne, Australia

ISNR Abu Dhabi 2020 March 17-19, 2020 Abu Dhabi, UAE

CIVSEC 2020 Sept 1-3, 2020 Brisbane, Australia

Do you have a security event that is not listed here that you would like our readers to know about? Contact us: info@circuit-magazine.com

113


CIRCUIT MAGAZINE ISSUE 51

Christian West, CEO, AS Solution, highlighting the evolution of technology in executive security

event rEVIEW Executive Security and CP Technology forum

CTG Intelligence, with the support of the British Bodyguard Association, recently hosted the fifth annual Executive Security and CP Technology forum for security professionals, end users and technology providers on the 30th January in London. 114


EVENT REVIEW The event was the best attended so far, with standing room only and those who were there on the day were given a treat. Event topics were divided into three main segments: 1. New technology threats and opportunities for protecting principals, including, communications, and intelligence on demand. 2. Threat intelligence and SOC technology for dynamic risk assessments and preplanning. 3. End-user-led panel discussions

and presentations about resilience versus security, covert surveillance, and ideas for defence against UAVs/Drones. Primarily a technology conference, the CPTF looked at new tech-threats to protection specialists and Principals, as well as innovative opportunities to harness gamechanging intelligence, communications, mobility, medical, and workforce solutions. Six discussion panels were included this year comprising both end-user

From left to right; Horst Ruetten, CEO, IBS (Germany); Jacquie Davis, Operations Manager, Optimal Risk; Angie Clark Rtd. Detective Superintendent, Royalty and Specialist Protection & Intelligence Commands and Mike O’Neill, Managing Director, Optimal Risk

115


CIRCUIT MAGAZINE ISSUE 51 Corporate Security and EP/ CP Operator perspectives. The following are a selection of topics discussed by the panels on the day. Executive Protection and Executive Security How has Executive Protection and Executive Security Changed from an end user perspective? Situational Intelligence Technology How can Situational Intelligence Technology Help Create Risk Assessments? Security vs. Resilience Understanding the Delicate

Balance between Security to Prevent Incidents and Resilience Afterwards. InfoSec Defending Information from a Corporate and Physical Security Perspective. Global Mobility and Travel Security Understanding the Evolution of Global and Mobility and Travel Security in a new Era of Asymmetric Threats. UAV’s - Threats and Opportunities How the executive security professional

Ivor Terret, Founder, Enablement Advisors, discussing the role of covert protection and travel risk management in executive protection

116


EVENT REVIEW From left to right; Ville Patrikainen, Company Security Officer, P&O Ferries; Robert Condina, Director of Security, International SOS; David Herd, Group Security Manager, Unilever; Amy Clark, Manager Corporate Security & Mobility, PwC; Joel Whittaker, Head of High Risk, ITN

of tomorrow can use UAVs for surveillance, communications, and transportation of medical supplies. • • • • • • • •

Circuit Magazine Welund AS Solution QCC Global Optimal Risk Raysecur Juma Communications Dataminr

In addition to being well attended the Event also saw its highest level of support with sponsors and exhibitors coming from: • • • • • •

Wagtail UK FAM International Enablement Advisors KnowBe4 Zenrs Samaritan Protective Services

If you weren’t at this one then don’t miss the opportunity to attend the Sixth Annual Executive Security and CP Technology Forum on the 28th January 2021 in London. www.closeprotectionsummit.com

117


CIRCUIT MAGAZINE ISSUE 51

Keeping Your Edge: Flowers For the Living If you’re one of the many that have a chance to work around me operationally over the years you know one thing, I can be pretty intense and leave very little margin for error and excuses when it’s, “GO Time.”

Keeping Your Edge: Action vs. Reaction

Yet as a counterpoint to that, I think those same people will also attest that I frequently give praise and recognition to those I see excelling in the craft. This is not just limited to whether you work for me or have attended one of

By: Elijah Shaw

my training programs. If I see something good, I say it; if I see someone excelling, I recognize the accomplishment. I try and make it a point to recognize individuals who I see doing things

118


KEEPING YOUR EDGE

What is it about the human condition that says that the recognition of one person lessens the standing of others? Never do I see it more readily than in the world of social media.

the right way. I'm sure some have seen my public declarations and have met with rolling eyes, saying to themselves (but never to me), "so what?" Then there are others who also likely say to themselves, "why this guy and not me?" And it's from there that a personality trait starts to emerge that no one ever wants to own up to – namely envy. What is it about the human condition that says that the recognition of one person lessens the standing of others? Never do I see it more readily than in the world of social media. Spend some time amongst the post and message boards, and you will see a quantifiable trend emerge. Negative posts get lots of engagement, while those that have a more positive slant traditionally get acknowledgment from the same individuals but never reach the critical mass that locks in the attention and gets the blood flowing. With that said, shouldn't inspiration and not condemnation be the thing we aspire to? In the executive protection

119


CIRCUIT MAGAZINE ISSUE 51 community, you can barely walk 3 feet without the word "professional" being thrown around, but in truth, how professional is it to spotlight only the losses, yet ignore the wins of others? Perhaps it's the mindset that if someone else is winning, then you must be losing. If everyone is in competition, then the goal is never to give up the tactical advantage. No one can be saluted

or applauded because that gives them an edge on the playing field, which they might use to convert into even more wins. However, there is one exception to this mentality – when someone dies. When that unfortunate occurrence happens, out of the woodwork, people will come running with stories of how much of a good person

120


KEEPING YOUR EDGE the deceased was and how they have always supported them. There will be online memorials and eulogies, and in some cases, even tears, but there is also something else that may accompany those feelings ‌regret.

you pass him at an event?

The world will always be full of people that don't want you to win; however, many do; the problem is that vocally they are the minority. Perhaps a challenge is in order, and one aimed specifically at those power-users of The regret that comes social media. If you find from knowing that you could have done more to yourself on a platform support a person in life, daily, be it Facebook, even if just by offering a Linked-In, Instagram, or kind word or two. Some the like, make at least one comment directed might think a topic like at a person that inspires, this has no place in an Alpha industry like Close uplifts, or motivates. You would be surprised how Protection but consider an agent who's been on a that a large part of our crappy detail for the last ranks are pulled from two months, away from both law enforcement friends and family, and and the military. We stuck with a problematic can all see how helpful client, might find renewed positive reinforcement strength from even a has been for those stressful careers. What few simple sentences. Inspiration can come from does it cost us to type a few sentences, drop a the strangest places, but quick voice note, or just it can never reach the give a fellow protector a person once they are gone. quick handshake when Elijah Shaw is the National Director of the North American Bodyguard Association and the CEO of ICON Global, and International Executive Protection Consulting Firm. Elijah, who has been featured in international publications such as Inc. Magazine, Entrepreneur, and Portfolio, runs the ICON Academy, an EP Training Program specializing in Celebrity & VIP Protection. He also currently sits on the Board of Directors of Executive Security International (ESI), the United States oldest Executive Protection Training School. His book, An Introduction to Executive Protection & Touring: A Guide to Mastering the Business of VIP Security, hit the Amazon best sellers list, and is available now worldwide.

121


CIRCUIT MAGAZINE ISSUE 51

122


CLASSIFIEDS

Email: info@circuit-magazine.com United Kingdom 3D Security Ltd Taunton, Somerset, TA1 1TG Based in Taunton 3D Security provides security services for a wide range of clients. Whether you need a security guard in Somerset, event security in Leeds or Close Protection in London we will provide a solution for your needs. T: +44 (0)1823 253 001 W - www.3dsecurity.org E - enquiries@3dsecurity.org.uk A.B.I. Solutions A.B.I Solutions is a dynamic, forward thinking company, specialising in surveillance, security and investigations with local, national and internationalexperience. A.B.I provides a wide range of services to the corporate sector and individuals alike. W - www.abisolutions.co.uk Amanda Campbell A highly motivated and experienced female operative both CP and Surveillence training T – 07596542249 W - www.amandacampbell.org.uk E - ac@amandacampbell.org.uk Alex Morgan - Close Protection Officer I am a hardworking, enthusiastic and committed person. Adaptable and driven, I have great attention to detail and high standards. I am honest, reliable, friendly and work well as part of a team as well as on my own initiative. I am also a good listener who has the ability to communicate with people at all levels. I am comfortable, both taking and issuing direction. I am looking for the opportunity to apply and expand my skills. E: adsmorgan74@gmail.com T: 07775 636964 Ambassador Security Management ASM MK Lions Arena, Grafton Court, Snowden Drive, Winterhill, Milton Keynes, MK6 1AJ, GBR. After successfully gaining ACS (Door Supervision and Manned Guarding) along with ISO 9000, we here at ASM have a dedicated management team with hundreds of years combined experience in the security industry. W: www.asmsecurity.co.uk E: scott@asmsecurity.com T: 08458335750 Ark Personal and Asset Protection Ark, 2b Crow Lane, Rochester, Kent, ME11RF, GBR A small, efficient, highly descrete company employing ex special forces and detectives for all civil and corporate covert needs. E: Office@arkprotect.com T: +0044 01634 845526 Argus Europe County Durham Argus Europe has been providing specialist training for high-net worth clients and their families for close to 20 years, worldwide. Argus Europe now offer accredited training for CPO’s,

Surveillance Operators and Private detectives. Argus Europe is an operational company working globally with an extensive variety of contracts. W: www.arguseurope.co.uk T: +44 (0) 8456 123 843 Atlantian Business Solutions Group Rutland, LE15 6SD, GBR Atlantian Business Solutions has been designed to help both individuals and New Companies build for the future as well as support others with training needs. T: 07725970954 W: www.atlantianbsgroup.com E: info@atlantianbsgroup.com Briareus Security Our aim is to give a complete, discreet and professional service to all of our clients, be they large corporations, small businesses, local authorities or private individuals, all tailored to meet their individual needs. W: www.briareussecurity.com E: info@briareussecurity.com Mark Corder - Chief Executive of Carmdale Ltd Suite 3 219 Bow Road London E3 2SJ Mark is a former Senior Police Officer specialising in counter-terrorism; firearms; public order; training and also physical, Critical National Infrastructure and nuclear security, having had responsibility for the security of the UK’s nuclear deterrent. A former Head of Operations, Operational Support and Training, Mark has been involved in a number large-scale incidents (including 7/7) and has also worked at the Office for Security and Counter Terrorism (OSCT) at the Home Office as part of a review into Critical National Infrastructure security. Mark has an MBA via the OU. E: mark.corder@carmdale.co.uk T: +44 (0)844 995 9900 W: www.carmdale.co.uk Alastair Christie Advice on site security, perimeter fencing, lighting, CCTV and manning requirements. Monitor and advise on guard force setting up site procedures and guard SOP’s. T : +44 (0)7736 328112 E : ally.c9496@yahoo.co.uk Control Risk Management Solutions - CRMS Ireland Executive Close Protection Operations & Training (B Tec Level 3 Diploma Edexcel) Threat & Risk Assessments, Consultancy Services. W: www.crmsinternational.com E: martin@crmsinternational.com Crest Security & Surveillance Ltd 51 The Crest, West Heath, Birmingham, West Mids, B31 3QA, GBR Highly experienced Security Consultant with a proven record of accomplishment in the field of protective security. Skilled in all phases of risk assessment, operational planning, logistical organisation, implementation of security measures,

123


CIRCUIT MAGAZINE ISSUE 51 Gareth Evans - CPO, MSO Reliable dedicated hard-working security professional, with outstanding communication skills. Strategic approach to problem solving combined with exceptional interpersonal skills, quick to grasp new concepts and information. Highly motivated, results-driven and thrives under pressure. Strong leadership and management skills with proven experience committed to continuous personal and professional development. E : evansgareth1979@yahoo.co.uk T : +44 (0)7900058603 James Izett All close protection task undertaken, including training tasks. Medic (Registered with the HPCSA, Registered FAAW instructor and Assessor E : J.Izett@gmail.com T : +971 (0)505 574 350 Janice Gurney Proficient and diligent Security Professional gaining extensive knowledge and experience within the security sector. Proactive individual who has a logical, flexible and conscientious approach to all challenges undertaken, ability to work as a member of a team or as an individual willing to work anywhere. T : +44 (0)7885 793061 E : janice382006@gmail.com International Centre of Special Training International Centre of Special Training is an international training and security company based in the United Kingdom. Its priority objective is to provide services to the highest level. W: www.icost-team.com T: +44 796 736 55 65

Michael Boreland Close Protection Officer Since leaving the British Army in 2006 I have been working in hostile environments for private security companies in various roles ranging from Training & Close protection. I have successfully managed a training wing in Afghanistan providing security operations training for local nationals & Expats conducting operations in the region I believe with my skills and experience of the employment I have done in the past I would be an asset to any organisation taking myself on as an employee. mike.boreland@gmail.com MLK Security and Protection Services Swindon, UK Close Protection Officer and Door Supervisor E: mattleekane@hotmail.com T: 07917654978 LJE Security Services North Yorkshire, HG1, GBR Close Protection, Residential Security, Asset Protection, VIP red carpet Security and Private Investigation. E: leanneedmondson@yahoo.co.uk Oliver Mike Close Protection Operative I came from Hungary and live in the Uk in London since 2014. I was a Police Officer for 23 years as a Counter-Terrorism Specialist. Next to the police I became a Close Protection Operative and self-defense instructor (Krav Maga). I was a member of the International Krav Maga Federation (IKMF). During my service I have been protecting Hungarian Prime Ministers, Interior Ministers, Foreign Ministers, Ambassador of Israel and other politicians of other countries. E: info@formerpol.com T: +447413190349 W: www.formerpol.com

IPSS Security Northfield, Aberdeen, AB16 7EX Security and protection services - UK and overseas. BBA Member. T: + 44 (0) 1224 69455 W: www.ippssecurity.co.uk ISS Training Ltd Riverside Cottages, Nidd Walk, Pateley Bridge, Harrogate, HG3 5NA ISS Training Limited are providers of specialist covert surveillance training courses and publications to the security and investigative industries, enforcement agencies and specialist military units. Formed in 1990, we are the longest established surveillance training ompany in the United Kingdom. Our credibility and reputation is widespread and we offer nationally recognised qualifications. BBA Member. T: + 44 (0) 1423 712265 W: www.intelsecurity.co.uk

One Events Grantham One Events offers you a stress free solution in the organisation, putting together and running of an event. Thisis accomplished by having a group of specialised companies from different industries working together for a more complete service for you. TEL: 0870 974 6779 W: www.oneevents.info

Jason Morris Security Hertfordshire, UK Providing a wide range of Door supervision/security for V.I.P and prestige venues, Concerts, Functions, Corporate and Personal Security, Weddings, Private Parties, Gala Dinners, Business Awards & School Proms, Close Protection and Body Guarding Static Guarding and Stewards. T: 01462 478900 W: www.jasonmorrissecurity.co.uk E: agosselin@jasonmorrissecurity.co.uk John Featherstone Security professional with operational experience gained in a variety of theatres. Main specialities close protection and surveillance. T: 24hrs : +44 (0)7702 740722 E: john@johnfeatherstone.co.uk W: www.johnfeatherstone.co.uk K9 Support Services Ltd K9 Support Services UK Ltd is a supplier of specialist drugs and explosives dog/ handler detection service (which includes arms & ammunition) to individuals, businesses, and the public sector. T: 0845 643 6393 E: info@k9support.org.uk

Logas International Tyne & Wear, SR1, GBR Front line SIA, International CPO. Private Investigation and Surveillance operator. E: wscarr@logasinternational.com

Paul Lovatt – CPO After serving 15 year in the Army a move to the Security Industry was a natural step, during the last 10 years I have worked in almost every role in the industry from Door Supervisor and loss prevention to Operations Manager and Director. I have been responsible for the creation and implementation of highly successful crime reduction schemes across Yorkshire working closely with other agencies in the areas of responsibility. Currently I am responsible for the overall running of large events security teams from stewards to Close Protection Officers. Operational planning, contingency planning and flexibility are I feel among my key strengths. E : paul@deltasecurity-eventmanagement.co.uk T : +44 (0)7506726336 Paul Tyler – VIP Protection & Concierge Specialist in discreet personal protection & surveillance. A good current working knowledge of London & its challenges gained through ongoing high risk security operations. Experienced in dealing with high net worth clients with all matters security & concierge striving go the extra mile to exceed expectations through thorough planning & interaction with all involved parties. A strong communicator with a smart appearance who remains synonymous with the principals lifestyle, whilst discretely ensuring a safe environment is maintained at all times, physically capable of adopting a higher profile when required to do so. Demonstrates sound

124


CLASSIFIEDS judgement and capability to operate with great levels of autonomy. Exceptional interpersonal skills with the ability to understand, interact & connect with a diverse range of people. E : paul@apparitio.co.uk T : +44 (0)7552515604 W : www.apparitio.co.uk Plymouth Close Protection Highly versatile, physically fit and accomplished security professional with cumulative experience in the areas of security management, close protection, crisis management, risk assessment, emergency management, asset protection and security training. E : chris@plymouthcp.co.uk W : www.plymouthcp.co.uk T : +44 (0)1752 500807 PPSS Group Body armour and stab vests provide a functional solution to individuals who require extra protection in their chosen vocation. All PPSS (formerly ASEO) body armour and stab vests are certified by the UK’s Home Office (HOSDB) and offer unrivalled protection from blunt trauma caused by a punch, blow or kick. Based on our professional frontline experience and extensive research we can confirm that an impact based assault is a more likely event than an attack involving an edged weapon or firearm. T: +44 (0) 845 5193 953 F: +44 (0) 1765 603 512 E: info@ppss-group.com W: www.ppss-group.com Presence Security Presence Security (“ PS ”) is a bespoke security company providing protection for private individuals and VIPs, as well as security services for businesses and organizations. T: 0800 002 9734 E: info@presencesecurity.co.uk

Radoslav Savkov - CPO / Security Consultant Oxford - United Kingdom I would introduce myself as a high calibre Security professional with strong customer oriented skills and managerial experience in the Security Industry, interested in a challenging position, which would fully utilize competences gained and provides opportunities for professional and personal development. With 15 + years of international experience in the sector at all levels and a military background (National Service) as well as a practical Close Protection experience in an executive environment, corporate intelligence and investigations. As a Security professional, I never consider my training and development as a complete, therefore I always look to update further my skills and knowledge. In personal plan I am very loyal, discreet , independent and willing to embrace challenges. E: r.savkov@gmail.com T: +44 (0)7886591525 RSM Security UK Ltd London, UK RSM Security UK Ltd offers the experience and expertise necessary to provide security personnel of the highest calibre when you need them. T: 07850091979 or 07792948523 W: www.rsmsecurity.co.uk E: info@rsmsecurity.co.uk RWSSI Rob W is a professional security consultant with world wide experience and capabilities in Security, Surveillance and Investigation; I can support you to overcome any problems and enable you to achieve your goals E: rob@rwssi.co.uk T: +44 (0)7818 220985 SDS Solutions SDS solutions provide our clients with protective solutions that are second to none, our consultants will discuss every aspect of the problems that you are facing that dictate the need for a protective solution, we promise our clients a tailor made service to meet individual requirements. Whether based in the UK or abroad our protective service T: 01453 887815 E: info@sds-solutions.org

Prestige Risks LTD 27 Old Gloucester Street, London, WC1N, 3AX, GBR. Close Protection Secure Chauffeurs Surveillance Residential Security Executive Protection Security Guards Asset Protection T : +44 (0)207 5588182 E : info@prestigerisks.com W : www.prestigerisks.com Prometheus Medical Ltd Prometheus deliver unrivalled bespoke emergency medical support in the form of specialist equipment, training, strategic advice and deployed clinical care. T: (+44) 1568 613942 W: www.prometheusmedical.co.uk Prosec Consultancy Ltd 10 Oakfield business park Westbury, BA13 4WF. Prosec Consultancy Limited are dedicated in providing a professional service, which covers a whole range of security services throughout the security industry. T: 01373 228055 W: www.prosec-ltd.co E: info@prosec-ltd.com ProTouch Security ProTouch Security is one of the UK’s key providers of event safety, event security, crowd management, door supervisors, stewards, event management and health and safety. T: 01724 279 522 W: www.protouchsecurity.co.uk Python Security and Protection Ltd Providing Close Protection Officers and Door Supervisors for Events and Venue Security. E : mattleekane@hotmail.com

Shadow Close Protection A leading company specializing in Executive Protection as a professional sector, with participation in high and low risk missions, providing global security solutions and consultancy to individuals, corporations and national agencies worldwide. W: www.shadowcp.gr E: info@shadowcp.gr T: + 30 6948539664 Shaun West United Kingdom SIA licensed, Highly Experienced Frontline CPO. Ronin SA trained. Providing security for both corporate and hostile environments. E: sw@shaunwest.co.uk T: +44 (0)7830 109 601 W: www.shaunwest.co.uk Steve Pittman - Security Manager of Operations I have been active in the security industry for over 25 years in various roles including close protection where I have been responsiblefor the the welfare of high net worth individuals in low and high risk situations . I have also a vast amount of experience in many other areas of there security industry including Door Supervision, Security Management, Event Security, and Residential Security. E: steve@covert protection.com T: 07818800778 Mark Claydon-Smith – CP Team Leader and Medic I have spent 13 years in the Royal Navy Culminating in the rank of SNCO Petty Officer. In 2004 I started my security career and have worked in Hostile environments. I have held several positions including Operations Manager, Team Leader and Rig Site Manager. I have worked in Kurdistan, Afghanistan and Iraq as well as the UK and Europe. E : mark@claydon-smith.com T : +964 (0)7815 970433

125


CIRCUIT MAGAZINE ISSUE 51 Philip Shearman MSyl – CPO, Risk Manager A professionally Qualified Close Protection and Surveillance Operator and Team Leader with over twenty two years of experience gained in the Military Police, the last fifteen of which were spent with the Military Police Close Protection Unit, working in various hostile countries throughout the world. Since leaving the Army in Nov 06 I have worked in the Private Security sector. I have gained valuable experience in demanding and challenging operational environments, where I have proved to be a self motivated and resourceful individual, performing well under pressure, communicating effectively at all levels whilst exercising tact, diplomacy and integrity. E : benshearman10@hotmail.com T : +44 (0)7930 277586

using a constantly changing mathematical formula. It uses a dual layered RSA/AES combination and a changing session key which modifies the encryption algorithm every second. € 1,398.00 + VAT. All prices include new Nokia N73 phone. BBA Member. T: + 357 7777 7276 W: www.protechcy.com/new

Spotllght Protection Services Essex based business which provides a broad and growing range of security services to businesses and organisations large and small. T: 07870560208 E: info@spotlightprotectionservices.co.uk W: www.spotlightprotectionservices.co.uk

Nemesis Protection offers a full spectrum of services including Risk Advisory, Close Protection, Asset Protection, Security Driving, Surveillance & Private Investigation, Information Security, Transport Security, Staffing, and Specialist Security Training. T: 00381644679650 E: contact@nemesisprotection.com W: www.nemesisprotection.com

VIPA Tactical Training A specialist training academy dealing with four specific areas of combat: VIPA Civilian Self Protection Program, VIPA Close Protection Combat System, VIPA Police Defence Tactics and VIPA Military Close Quarter Combat. BBA Member. W: www.VIPAtacticaltraining.com Wagtail UK Wales, UK Wagtail UK are international specialists in detection dogs and dog handler training. Established in 2003, Wagtail UK provides detection dogs and related services for government agencies such as UK Border Force, HM Revenue & Customs, Police, Trading Standards and Armed Forces. Wagtail International School of Excellence in North Wales is a fully approved training centre endorsed by Highfield Awarding Body for Certification. T: +44(0)1745 561166 E: info@wagtailuk.com W: http://www.wagtailuk.com Westminster Security Ltd London, UK Westminster Security Ltd are an independent, industry leading private security company in London; providing security and investigation services throughout the UK, EU and worldwide for our clients. We specialise in close protection services; providing ex-military and police bodyguards to many national and international companies, heads of state, royalty, high-profile personalities, CEO's, private individuals and families. T: +44 (0)207 123 4544 E: Info@westminstersecurity.co.uk W: www.westminstersecurity.co.uk Yoji Security We established Yoji Security in response to our perception of declining professional standards across the security industry. We strive to provide first class customer service in everything we do, drawing on our extensive experience in the fields of special operations, intelligence, counter terrorism and close protection. T : +44 7903231076 E : enquries@yojisecurity.com Europe & Africa International Security Academy P.O.Box 5833, Herzeliya, 46000, ISRAEL. zOur graduates are more recognized, respected and sought after by Distinguish Protection service “consumers” and by most of the “Providers” of Protection services worldwide. Organisers of the 2008 International Summit of Protection Officers. BBA Member. T: + 972 9 950 0969 W: www.SecurityAcademy.org.il Javier Galan Spain - Security specialist available for operations around the world. E: oejju@hotmail.com T: 34.637080771 Military Grade Encryption Phones PO Box 52310, Limassol, CYPRUS Built-in encryption software which converts your voice to encrypted data

Nemesis Protection Ruma, Serbia Nemesis Protection is a Risk Management Company specialized in providing viable, bespoke, optimal, feasible and cost-effective security and training solutions for corporations, government institutions, and private clients worldwide.

TPT Firearms Training Bratislava , Slovakia and Rome , Italy We know from our extensive experience within the industry that it can be daunting when initially carrying a firearm and being responsible for protecting a clients life, but learning the proper techniques and having the ability to understand the weapon will make the job a lot easier and more enjoyable. Hopefully you will never have to use the weapons you carry, but should this prove necessary you will be confident and knowledgeable enough to handle the situation professionally and effectively. T : +44 (0) 7734101910 E : info@tacticalprotectionteam.co.uk W : www.tacticalprotectionteam.co.uk Security Concierge Group SCG Special Projects Ltd, Avenida, Bartolome Vicente Ramon No 10, B16, Ibiza, 07800, ESP Security Concierge Group is a privately owned and fully independent provider of exceptional security services to an interesting and varied range of clients. T: 00 34 600 665 275 W: www.securityconciergegroup.com E: joe.buckle@securityconciergegroup.com Wille Heino Security Specialist, Owner Finland Gambeson is a security training & Consulting Company specialized in countering modern day threats. - Security & safety planning for different events. - Security training: Active shooter/Terrorism awareness/Surveillance detection/Other. - Security consulting. We are specialized in executive protection related services. Local knowledge, trained and licensed close protection offers, mission support, other. E: wille.heino@gambeson.fi W: www.gambeson.fi Zika Rakita Managing Director Ruma 22400, Serbia Accomplished, result-driven, and highly motivated Close Protection Operative, conducting protective operations internationally. A background encompassing planning, organizing, leading, and undertaking Close Protection operations in both corporate fields and hostile environments. Proven in achieving results and completing tasks on time, discreetly, and to the highest standards. A confident communicator with the ability to sensitively solve a range of clients’ and colleagues’ problems and inquiries. With the ability to use sound judgment and understanding the operational balance and needs. E: contact@nemesisprotection.com T: 00381644679650 Americas Bodyguard Careers Bodyguard Careers is an informational site with the purpose of providing bodyguards with all the information and tools necessary to succeed in the Close Protection Industry Info@BodyguardCareers.com www.BodyguardCareers.com

126


CLASSIFIEDS Canadian Use of Force Systems 7975 Yonge St. # 7124, Innisfil, ON, L9S 1L0, CANADA A professional Use of Force and Defensive. Tactics organization teaching a full range of controlled response options for Self-Protection and Use of Force considerations in public and professional environments. BBA Associate Member. T: + 1 705 456 4333 W: www.canadianuseofforce.com Contact Front Photography Contact Front Photography is the world’s 1st photography studio dedicated to the Close Protection Professional. Stop putting generic or pirated photos on your website; instead commission custom shots to best represent you or your agency. T: +1 (612) 369-6134 E: Info@ContractFrontPhotography.com W: www.ContactFrontPhotography.com Decisiones Estratégicas Buenos Aires – Argentina Executive protection specialists we have experienced in all Latin America, for multinationals companies, also providing support in project throughout Latin America to consulting first the US. and UK. We have a team of specialists and psychologists in assistance and crisis negotiation. T: +54(911) 6415 1941 E: jbenitez@d–estrategicas.com W: www.d–estrategicas.com Detective Lacerda P.O.BOX 25996, São Paulo, 05513-970, BRAZIL Providing the full range of security and investigation services throughout Latin America. BBA Member. T: + 55 (11) 3452 4388 W: www.detectivelacerda.cjb.net Giovanni Rossi South Africa Doctorates in Criminology, Vessel Security Officer, ASP Instructor, ISSPC Member, BBA Member, IAPPA Member, American Bodyguard and Protection Instructors Association - Lifetime Member E: rossi1@mweb.co.za T: +2783 415 9205 USA Global Bear Protection PO Box 11488, Jackson, Wyoming, 83002, USA Provision of British and US Ex Special forces security/medical specialists. T: 307 413 3619 W: www.globalbearprotection.com E: bear@globalbearprotection.com Icon Services Corporation 1043 Grand Ave. #312, St. Paul, MN 55105, USA A full service security and investigative agency specializing in providing high-level security and bodyguards to international celebrities, public figures and corporations. Licensed, bonded and insured, our diverse roster of clients reads as a virtual who’s who in the corporate, motion picture, fashion and recording industry. Icon has been the hand picked choice to provide Executive Protection to everyone from Superintendents to Supermodels. BBA Member. T: + 1 651 695 8778 W: www.Industry-Icon.com Imperial Protective Service, LLC 15849 N. 71st Street, Suite 100, Scottsdale , Arizona, 85254, USA Imperial Protective Service’ (IPS) is a security consulting and services firm founded in 1978. IPS provides both national and international corporate, executive and celebrity protective services. BBA Member. T: + 1 480 281 1588 W: www.executiveprotect.com Panther Protection Services 3695F Cascade Road, Suite 2207, Atlanta, GA 30331 Panther Protection Services is a full service protection agency offering such services as threat assessment, executive protection, self-defense training, firearms instruction, and high risk tactical protection. Our executive protection specialists have over 75 years of experience. Panther can handle your protection needs whether around the corner or around the world. Member: BBA and NABA

127

T: (404) 349-9117 W: www.pantherprotectionservices.com Rouven Rohler - Security Consultant / HSE liaison - Romania I am a very fit and mentally robust Security Specialist with quality experience gained in the security (Military, Maritime and Commercial Operational Security (Oil& Gas). I have improved the effectiveness of protection teams and significantly enhanced clients’ awareness. My career commenced in the Australian Army, which included hostile environment deployments to Iraq and the Solomon Islands and I have since been operating on various contracts throughout Afghanistan and Iraq. E: rouven@y7mail.com T: +40 (0)746 642 739 SILVER STAR PROTECTION Executive protection, site and event security with global experience. Serving southern Minnesota with integrity and professionalism. Former USSS, ICON Alumni. available for domestic and international travel. Robert E. Jones Manager/CEO W: www.silver-star-protection.com E: rejones@silver-star-protection.com TSICS (T6) Miami, Florida, USA TSICS (T6) provides the following services in Central America: Executive Protection, Individual Bodyguard, Close Protection Training, Corporate Invest. W: www.security-professionals.org/members/saldrix E: tsics.t6@gmail.com T: +502 6645 6822 Tony Scotti’s Vehicle Dynamics Institute 1162 St. Georges Ave, Suite 277 , Avenel, NJ 07001, USA The first name in advanced driver training, offering our highly acclaimed Protective/Evasive Driving Programs. Designed specifically for today’s executive chauffeurs, executive protection professionals and others who are responsible for providing safe and secure transportation services. BBA Member. T: + 1 732 738 5221 W: www.vehicledynamics.net Vindex Personal Protection & Investigation Inc. 497 Hooksett Rd #365 Manchester NH 03104 603.289.3161 / Full service Private Investigations & Executive Protection. 10 years combined Law Enforcement, Private security, close protection work, & security contracting. NY Mayors, U.S. President’s, NFL owners, and VIP’s are some of the protection work I’ve gained experience with. ICON alumni, NABA member. T: + 1 732 738 5221 E: vindexinc@aol.com W: www.vindexinc.com Asia Pacific Asia Protective Group Ltd Asia Protective Group (APG) is a Hong Kong based risk management company, specializing in executive protection, overseas travel security and security consultancy services. APG has an extensive network of security specialists operating throughout the Asia Pacific region. W: www.asia-pg.com E: jim@asia-pg.com E: yvonne@asia-pg.com New Zealand Security Investigations & Risk Solutions LTD We are dedicated to providing professional and effective security solutions for your personal or business security requirements. S.I.R.S is one of the only security companies in New Zealand with ISO 9001 and ISO 18788 Running the most advanced security management system Track-Force to help S.I.R.S security operations with real-time reporting and lone worker technology. With a combination of Military and Security industry experienced staff. We offer high-quality security services and industry recognised training programs with international qualifications in Close Protection, Bodyguards, Maritime Security, Hostile Environment, Firearms Training, Door Supervision, Private Investigations, Surveillance, CCTV Operations, Event Security, Mobile Patrols and Static Guards. S.I.R.S has the expertise and flexibility to meet a wide variety of client needs. E: lee@sirs.org.nz T: 02040787549 W: www.sirs.org.nz


Life can be testing, no matter what you fight. - Keep Fighting.

FOP is for you, whether you wear uniform, a suit, or gym kit.

128


Subscrib e today & save

THE TEAM: UK Editor: Shaun West US Editor: Elijah Shaw Managing Editor: Jon Moss

Subscription means you’ll never miss an issue of the Circuit Magazine again. Subscribers get:

Art Direction: Pete Falkous

• Every issue of the Circuit • Full access to the Circuit website. • Priority delivery of each magazine. • Access to all back issues. • Subscriber only content and offers.

CONTRIBUTORS: Luke Daniel Mark Roche Mark Deane Ben Gunn Mark “Six” James Carlton Smith Ryan Naish Orlando Wilson James Bore Bob Shepherd Justin L. Johnson Jose Casillas

Our Sincere Thanks to all those that continue to contribute their wisdom and experience for the enjoyment of others The Circuit is compiled, edited and published in the UK and US bi-monthly. W: www.circuit-magazine.com E: info@circuit-magazine.com T: +44 0191 645 0865

TO ADVERTISE: IF YOUR BUSINESS OPERATORS IN, OR SERVES THE PROTECTION INDUSTRY THEN YOU NEED TO SPEAK DIRECT TO YOUR AUDIENCE THROUGH A TRUSTED CHANNEL. GET IN TOUCH TO FIND OUT ABOUT THE GREAT OPPORTUNITIES THE CIRCUIT CAN PROVIDE TO IMPROVE YOUR BUSINESS SALES AND GROWTH. Email: info@circuit-magazine.com DISCLAIMER While every care has been taken to ensure that the information contained in this magazine is both accurate and up-to-date, The Circuit accepts no liability in any part for loss or damage incurred by reliance on information contained in this magazine through omissions, errors, howsoever caused.

New app with more features Get The Circuit Security Magazine with immediate electronic downloads to read on your PC, laptop or smart device.

129

©COPYRIGHT Copyright remains with the authors and contributors at all times. No part of this publication can be copied or reproduced in anyway whatsoever without permission from the publisher AND the author / contributor.


facebook.com/groups/TheNABA/ 130


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.