Circuit Magazine #53

Page 1

News • Opinion •

Reviews •

Exclusives •

Intel

53 SOCIAL M EDIA ENG INEERING & S S E N D E R PREPA ANCE

R E V E S R E P

CORONAVIRUS &

MARITIME PIRACY

COVERT CAMER AS

BASELINES NON-VERBAL COMMUNICATION

OF BEHAVIOUR CYBER SECURITY

///

1

ACADEMIC STUDY

///

AMMUNITION


CIRCUIT MAGAZINE ISSUE 53

CONTENTS 14

02 Contents 04 UK Foreword 07 US Foreword 08 Industry News 14 Preparedness & Perseverance 20 The One Percent

28 36

28 From Oil Fields to Field Medic and Beyond 36 Covert Cameras 44 Staying Grey 50 Before & After The Security Profession & COVID 54 The Baselines of Behaviours Non-Verbal Communication 66 Tactical Firearms Selecting Firearms for Close Protection Details

66

72 Believe in your Intellectual Net Worth! Why Bodyguards are Naturally High Achievers in Academic Study

2


CONTENTS 80 Ask the NABA Network 82 Cybersecurity Fundamentals Social Media Engineering 88 Fit for Purpose Packing for Adventure

82

94 Armour for Security Personnel

94

100 Global Situation Report With Global Geopolitical partner, Stratfor 106 Could the Corona Virus Pandemic Fuel a Resurgence in Maritime Piracy? 112 Ammunition Do Ballistics matter?

119

119 Foot Steps Benjamin Alozie 124 The Role of Chokes In Law Enforcement and Private Security 134 Industry Events 136 Executive Protection in a Complex World Book Review

124

140 Keeping Your Edge The Great Divide 147 Classifieds

3


EDITOR FOREWORDS

Welcome to all our readers spread far and wide across the globe. dive into the world of Cybersecurity, shines a light on the dangers of social media engineering. James explains how what some people believe might not necessarily be a product of independent, free-thinking, and may instead have been ‘engineered’ with nefarious intent.

The world is once again starting to open up, and personally, I think it’s great to see a bit of normality creeping back in. But with bars, restaurants, and shops already beginning to reopen, is it too soon? Only time will tell, but one thing is for sure, and that’s until a vaccine is found life as we knew it is still some way off. We are still waiting for the full effects and numbers to come in to see how much the economy has been affected, but it is plain to see the pandemic has been disastrous for a vast amount of businesses. We can only hope and pray that the population as a whole is sensible and takes precautions moving forward so we can avoid another lockdown, as I doubt many businesses could survive further restrictions. And, nowhere is that truer than within our industry, which has been hit particularly hard. As an advisor, service provider, and employer within the security industry, it is my business to stay informed and up to date on matters as they happen. Despite living in the ‘information age,’ being able to validate the authenticity of any given data is becoming more and more difficult. This is why I take my role as Editor of the Circuit Magazine seriously. We strive to bring our readers not just entertaining and engaging content, but above all, a trusted and reliable source of industry information. That’s why I want to highlight two specific sections of this issue.

Next up, we know that one of the most popular sections in the magazine has always been the analysis and monitoring of global incidents. And, now, more so than ever, we know how important it is to have informed insight in today’s increasingly complex international environment. That’s why we’re delighted to announce a strategic new partnership with Stratfor, the world’s leading geopolitical intelligence platform. Stratfor, a RANE company, will now provide the magazine with geopolitical analysis and accurate forecasting of global trends that will be valuable to all readers. I think we’re all going to be feeling a lot more confident about our knowledge of international affairs.

Let me hold you back no longer. Go, and delve into this bumper, content-packed issue. Until next time, stay safe!

Firstly, I want to draw your attention to the incredibly insightful article by James Bore, who, in continuing his deep

Shaun West Editor

4


10 Mar – 22 Mar 2 Sept – 14 Sept

2

21 Apr - 3 May 30 Sept – 12 Oct

5


6


CIRCUIT MAGAZINE ISSUE 53

What a time to be alive. Traditionally that statement is used in a celebratory way to champion success or memorable moments. Well, in this case, I can say that the first half of 2020 has certainly been memorable. We’ve had raging wildfires, melting polar caps, murder hornets, a global health pandemic, and social-political protests, that have at times turned violent. Did I mention that was all in the first half of the year? As we enter the latter, I have to believe that things will get better, however our profession lives by the creed, “hope for the best, but prepare for the worst.” As such, I do spend quite a bit of time thinking about, what’s next? I mean how do you top murder hornets? (With that said, I did just watch a video someone sent me of an eagle plucking a shark out of the ocean and carrying it away!)

will set us apart. In the future we will be able to look back with the benefit of hindsight, and be able to critique not only our own actions but the actions of others. However, at this moment we exist not in the future, or the past, but in the NOW.

As a community of protectors, we come into this field knowing that we will have to make sacrifices, and experience discomfort. We bring a measure of aggression with us, as it can be a necessary requirement to achieve our objectives. What we also must bring with us is the power to reason. If the previous 6 months have been any indication, 2020 still has some tricks up its sleeve; some that may challenge In all seriousness, every our current way of thinking or generation has had adversity, ideology. I ask that we all take and a byproduct of that is, it has produced stronger individuals that a moment to breath before we are battle tested. That’s actually react. When this is all over, the one thing we don’t want to be, is the one thing about experience, on the wrong side of history. good or bad, it can never be taken from you. These days we are encountering challenges Elijah Shaw left and right, but it is how we respond to those challenges which Editor

7


CIRCUIT MAGAZINE ISSUE 53

Industry News At A Glance

We cast our eye over the main stories impacting the security industry. Here's what's appeared on the radar since the last issue.

Gavin de Becker adds Harry and Megan to his A-List clientele June 03 Los Angeles, CA

De Becker, indeed, is a celebrity in his own right, thanks to his bestselling memoir The Gift of Fear – now published in 18 languages and a favourite of Oprah Winfrey’s

The Duke and Duchess of Sussex arrived in Los Angeles in March from British Columbia, where reportedly their security arrangement with the Royal Canadian Mounted Police expired. It is now understood in America that they are being guarded by one of America’s best-known celebrity protection companies, which charge clients up to £7,000 a day, according to reports.

De Becker is the A-list choice, even described by the actor Michael J Fox as a ‘secret service for famous people’. It is reported that the Duke and Duchess of Sussex are estimated to be looking at a bill of close to £7,000 a day – or £2.5 million a year – for de Becker’s services. For that, they can expect a team of six bodyguards working in rotation, with four on duty by day and two at night. According to reports, the highly trained team might include former intelligence officers from the FBI and CIA, former US Marines, as well as behavioural scientists specialising in threat assessment.

That company is Gavin de Becker and Associates, who claims to protect ‘over 90 of the world’s most prominent families and at-risk individuals’, believed to include, over time, the Beckhams, the world’s richest man Jeff Bezos, Elizabeth Taylor and John Travolta.

Source >

8


INDUSTRY NEWS Boris Johnson's car hit by security vehicle outside parliament June 17 London, UK

been forced to make “a split-second assessment” of the risk to the prime minister during the incident. “There clearly wasn’t a strong enough cordon when the prime minister was coming out but people do get through. If it had been a suicide bomber then the police cyclist and the driver of the PM’s Jag would have to have decided to have driven through.

British Prime Minister, Boris Johnson, has escaped unhurt after a security vehicle collided with the back of the car he was travelling in as he left parliament after prime minister’s questions. Video of the incident showed the grey Jaguar carrying Johnson pull out of the main gates of parliament as part of a convoy, including police motorcycles.

“But it’s a better outcome that there’s a dent in the PM’s car rather than a protester ending up nose down in the street because they’ve been knocked over.”

As it left, a man believed to be part of a protest by Kurdish activists ran towards the prime minister’s car. Even though the man was pulled back by a police officer on foot, the car stopped suddenly, and a black Range Rover that was next in the convoy failed to stop in time.

Close protection officers would probably have been in the black Range Rover that crashed into the prime minister’s car. “Normally it is a cardinal sin to crash into another car in this kind of situation, but I think there are mitigating circumstances this time,” Geddes added. Source >

Will Geddes, the managing director of close protection specialists ICP Group, said that Johnson’s security team had Executive Protection unit driving IOWA Governor ‘deliberately’ hit protestor with SUV June 30 Iowa, US

‘I’m going to stand here. Surely the driver of the governor is not going to hit me with her car. This is the governor, my governor, who’s supposed to be representing me. I’m sure that her car is not going to intentionally hit me.’ I was wrong,” he said.

An SUV carrying Iowa Gov. Kim Reynolds hit a Black Lives Matter protester who was trying to block the vehicle as she was leaving an event in northern Iowa.

Cavil said the impact spun him around and lifted him onto the SUV's hood but he wasn't hurt.

The Iowa State Patrol confirmed the SUV hit the protester, who was among about two dozen Black Lives Matter activists who had traveled from Des Moines to Ackley. Members of the group weren't allowed into the event so they gathered at the end of a driveway and tried to block the governor's SUV.

“I 100% think they intentionally hit me,” he said. “There’s no way that this driver could not see me right in front of his car.” “Preliminary reports from law enforcement at the scene suggest the demonstrator intentionally stepped in front of the moving vehicle," patrol spokesman Sgt. Alex Dinkla said in a statement. “The demonstrator appeared to suffer no injuries, denied all medical treatment, and continued with his activities. The Iowa State Patrol is investigating the circumstances."

Jaylen Cavil, a Black Lives Matters organizer, told the Des Moines Register that he stood in the driveway in the hopes that Reynolds would roll down a window and talk with protesters. “I was standing right in front of the car and I just stood there. I was like,

Source >

9


CIRCUIT MAGAZINE ISSUE 53 Private security personnel deployed against demonstrators to protect war memorial. June 26 Brighton, UK

the operatives “chose” to stand with police to “assist with any issues”. However, mystery still surrounds their appearance on June 13 as both police and council could not say who they were.

A private security firm faced Black Lives Matter demonstrators at a war memorial.

Brighton and Hove City Council, which is the custodian of the monument, insists it did not hire the firm.

Pictures show the firm’s personnel donning stab vests and facing protesters at the Old Steine War Memorial, where tempers almost boiled over.

A Sussex Police spokeswoman said: “These were private security contractors who attended the war memorial.

Police, who stood shoulder-to-shoulder with the men, have confirmed that private security was at the memorial last during the 10,000-strong march.

“They were not police officers and they were not hired by the force.

The Security Industry Authority (SIA) said that

Source >

Security officers recognised for outstanding contributions during COVID-19 July 01 United Kingdom

Security Awards to close by recognising an outstanding individual who has made a fantastic and life-long commitment to the industry. This year is different in our changing world, though. I had only one nomination in mind and, therefore, only one winner that I felt deserved the recognition of this particular award, which is our front line officers.

THE 2020 edition of the British Security Awards, the flagship event run by the British Security Industry Association (BSIA), has paid tribute to all of the security officers working on the front line during COVID-19 with a Chairman’s Special Recognition Award being bestowed upon security guarding companies and their personnel. In announcing the Chairman’s Special Recognition Award, Simon Banks explained: “It has always been the tradition of the British

They deserve to be commended for the work they’ve carried out during COVID-19. We wanted to recognise their resilience and the risks they have taken, and continue to take, and also to highlight their role as critical workers in keeping the country running. This is our clap for the security guarding sector.”

Source >

10


INDUSTRY NEWS

Kanye West’s ex-bodyguard calls star a ‘bully’ and threatens to sue June 29 United States Kanye West’s former bodyguard is calling the rapper a “bully” and is threatening to sue for damages after West accused him of breaking a confidentiality agreement — when the bodyguard called him the “neediest, moodiest client” he’s ever had. Steve Stanulis spilled about his time protecting West on a podcast back in May, and lawyers for the “Jesus Is King” star fired off a cease-and-desist to Stanulis in early

June, threatening to sue him for $10 million if he continued to run his mouth. The letter claimed that Stanulis had made “false and defamatory” statements on the “Hollywood Raw” podcast with Dax Holt and Adam Glyn, and claims he breached a confidentiality agreement he purportedly signed in February 2016. Source >

In this issues instalment of Ask the NABA Network we get your thoughts on this story

11


CIRCUIT MAGAZINE ISSUE 53 Royals and top politicians could become sitting ducks June 26 London, UK Bodyguards who protect Prince Charles and Prince William have expressed grave concerns over moves to strip junior royals and other VIPs of armed protection, according to a bombshell leaked report. Officers who have to rely ‘solely’ on Tasers to stop someone being attacked are ‘playing Russian roulette’ with their lives and those of the people they are protecting, it adds. The report, accuses police chiefs of putting cost-cutting above the safety of VIPs, the officers who guard them and the public. It says the lessons of the Westminster and London Bridge terror attacks – where police were attacked by knife-wielding jihadis – have been ‘quickly forgotten’

and that ‘a reckless trade-off of cost vs safety has taken place’. security measures have been downgraded for a number of senior politicians, community leaders and others previously deemed vulnerable to an attack. The report’s conclusion states: ‘It would appear that the lessons learnt as a result of Westminster and London Bridge [terror attacks] are quickly forgotten and a reckless trade-off of cost vs safety has taken place, whereby once again cost is the winner that takes all. ‘Maximising the safety of the Principal [the VIP] must remain the primary objective, whilst simultaneously ensuring the risk to the public and police officers is minimised. 'Any new tactic must be safe and fit for purpose. It is our view that this tactic, as implemented, is neither.’

Source >

12


BRITISH BODYGUARD ASSOCIATION The dedicated association for dedicated professionals

Membership starting from £60

admin@the-bba.org.uk www.the-bba.org.uk 13


CIRCUIT MAGAZINE ISSUE 53

14


PREPAREDNESS & PERSEVERANCE

By: Mark Roche EPS

Preparedness and perseverance are two of the more essential traits that you may not consider daily. Still, they are two traits you need to grasp fully, in my opinion, to be successful in Executive Protection. To prepare is to make (something) ready for use or consideration. To persevere is to continue in a course of action even in the face of difficulty or with little or no prospect of success. Among the many skill sets, we must attain, practice, and develop over time, preparedness and perseverance aren’t necessarily those most associated with the

15

traits of a reliable EP practitioner. There are many reasons why the focus on these skills are overshadowed by wrist locks, positioning, being the body man, fancy martial arts, and firearms. Why? You ask. Well, in my opinion, it’s because there is no immediate gratification, or “look at me” moment(s). There are plenty of instances where all those other


CIRCUIT MAGAZINE ISSUE 53 skills are useful; however, they all start with being prepared. Secondly, what is your mental fortitude? How do you prepare (there’s that word again) a plan that includes overcoming (persevering) difficult operational hurdles? Staffing, weather, and environmental difficulties? You must have a mindset to persevere no matter what, even if you know it won’t be a total success or the exact outcome you want. Being ill-prepared is the downfall of many EP professionals, young and old, experienced or amateur, corporate or celebrity sector. To some, being prepared is having a working phone number and a Facebook page with “bodyguard” in the employment status. To others, being prepared is, “I have a suit, sunglasses, $25.00 in cash, and I know what time to be there.” I continue to see daily the un-preparedness of many EP practitioners (not to be confused with a specialist) in the way that they prepare daily. Being prepared is a DAILY fundamental, whether you are on a detail or not.

As many have found, even myself early in my career, in the beginning you don’t get the regular taps on the shoulder that more experienced specialists may get. You may find yourself having to have a fulltime job in a different field while waiting for your chance to answer the call.

16


PREPAREDNESS PREPAREDNESS & PERSEVERANCE & PERSEVERANCE How many times have we seen EP hopefuls say, “call me if you got something” then you call them, and you hear, ”well I’m waiting for my license(s), “I’m waiting to find childcare,” “ I can help out on one of the five days you’re asking me to work,” “are you flying me there? Because my car probably won’t make it the 100 miles.”

professional demeanor, ethical practice, and moral behavior against? Notice, you didn’t hear me make any reference to guns, karate chops, ninja moves, or evacuating under fire. The most egregious thing you can do to yourself, the agency you may work for, or the client you represent is to show up unprepared.

How deep does preparation go? To the individual measuring success in the field by saying, “One day I’ll fly on a private jet,” what do you know about private aircraft? What does decompression sickness look like? What is a flap, what is an aileron? What’s the maximum operational weight capacity of the aircraft? Being prepared is being an EP professional every day, of every month, of every year, there are no exceptions. How is your health, physical strength, and intel gathering skills? What is your knowledge of current events in the region you live or visit? What do you measure your

As many have discovered, myself included, in the beginning, you don’t get the regular taps on the shoulder that more experienced specialists may get. You may need a fulltime job in a different field while waiting for your chance to answer the call. You may have certain restrictions on the amount of time you have to dedicate to this profession or “Craft” as we like to call it. You may find yourself low on funds to commit to improving your preparedness to work. Maybe you live in a region where EP is not an everyday occurrence, how do you maintain the perseverance to

17


CIRCUIT MAGAZINE ISSUE 53

In the end, preparedness and perseverance go hand in hand, and in my opinion, one cannot happen without the other. continue to follow your interest in protective services? Sure, it’s easier when you have fewer personal restrictions, but there are plenty of family men and

women performing EP daily, so what is stopping you? If you prepare for longevity, accept, and practice good discipline while bracing yourself for the lean times, when the lean times come, you’ll be ready.

18


PREPAREDNESS PREPAREDNESS & PERSEVERANCE & PERSEVERANCE In February, the world was hit with a global pandemic that shut down almost every industry, including ours. Many in our craft were taken by surprise and, unfortunately, were grossly unprepared to persevere. Some were fledgling specialists, and others were experienced, EP professionals. What is fascinating to see is how different specialists reacted, and the differences in behavior displayed. I realized that those who practiced good discipline during the good times were prepared. And for those who didn’t, it was a crushing blow. From one camp, we saw creative thinking, and from the other, excuses and anger. So, while the prepared folks realized that the situation would pass, they didn’t stop practicing their preparedness, and were ready for the loss and slowdown in opportunity, while the other side just complained. The unprepared have languished in the “look

at me stage” they cared more about being relevant than being a security-minded, educated specialist. Their open display of political comments, their disdain towards the pandemic rules and requirements, and their underhand remarks about colleagues all came hand-in-hand with being ill-prepared. Worse still is that they failed to realize the gravity of what they spewed out until it was too late. This goes back to being knowledgeable and having the foresight to consider what poorly judged comments and opinions bring to bear. Preparedness and perseverance are synonymous, and in my opinion, one cannot happen without the other. Your individual dedication to excellence will lead you to be a valued, experienced specialist on a team with the same goal, namely maintaining your professionalism and keeping our client’s safe.

Mark Roche is a US Based, full-time Executive Protection Specialist who works full time with a HNW Family. He is also a FAA Licensed Drone Pilot, specializing in EP related uses, and a graduate of multiple close protection programs.

19


CIRCUIT MAGAZINE ISSUE 53

The One Percent By: Jeffery Mayger

The cyber ecosystem is under relentless attack with increasing intensity, volume, severity, and sophistication. Corporations have sophisticated firewalls and other countermeasures; individuals are largely helpless. Some think they have a plan against this threat, but the reality is that security is never 100 percent, and attackers, the one percent, always have the advantage. But there is a path forward – by unifying security, political, social, and economic measures The One Percent Cybersecurity provider NTT Security reports that five countries are the

most common sources to 50 percent of global cyberattacks (Figure 2). Akamai states that twothirds of Distributed Denial of Service (DDoS) cyberattacks originate in ten countries. Symantec, another provider, adds 13 more countries for a total of 23 countries, which are homes to the worst cyber offenders and who are responsible for two-thirds of all malicious internet activity (Figure 3).

20


THE ONE PERCENT

Everyone thinks they have a plan until they get punched in the face. – Mike Tyson –

21


CIRCUIT MAGAZINE ISSUE 53 The FBI states the odds of a criminal getting caught in the United States are approximately 1 in 5. Applied to the 0.7 percent incarceration rate in the US, 693 per 100,000 people, the second highest global incarceration rate, the criminal population may be five times higher, up to 3.5 percent of the US population. Since FBI crime statistics are credible, represent crime in ethnically and racially diverse geographical areas, and every country has a criminal element (either incarcerated or inclined to commit crimes), it is not a stretch to say that up to 3.5 percent of the global population are either criminals or have criminal tendencies. Since malicious/criminal behavior is no less prevalent online, up to 3.5 percent of internet users may be engaged in cyberenabled crime such as malicious hacking, fraud, the purchasing of illegal drugs and child sexual exploitation. Britain’s National Crime Agency states that the average hacker age is now 17. This age falls in the 15-24 age group, which represents 26.5 percent of internet users. By extrapolation, malicious hackers may

account for up to 0.9 percent of internet users. The Diagnostic and Statistical Manual of Mental Disorders (DSM-5), the definitive diagnostic reference for mental health practitioners, states that Antisocial Personality Disorder (ASPD) is: “a pervasive pattern of disregard for and violation of the rights of others… as indicated by repeated lying, use of aliases, or conning others for personal profit or pleasure…lack of remorse, as indicated by being indifferent to or rationalizing having hurt, mistreated, or stolen from another.” Malicious or criminal behavior fits the DSM5 ASPD and may run as high as 5.8% in men and 1.9% in women. With men and women representing 53 percent and 47 percent respectively of global internet users, it is estimated that up to 4 percent of internet users have ASPD. Considering the average hacker age (15-24 age group), it is estimated that up to one percent of internet users may be malicious hackers, a finding which approximates the previous 0.9 percent. The DSM

22


THE ONE PERCENT

A pervasive pattern of disregard for and violation of the rights of others‌ as indicated by repeated lying, use of aliases, or conning others for personal profit or pleasure‌

Top 5 Source Countries For Cyberattacks* United States

22%

China

13%

Japan

6%

Netherlands

5%

France

5%

*Source: 2019 Global Threat Intelligence Report, NTT Security

23

insight suggests that there are more male than female hackers, by a ratio of 3 to 1. Based on internet demographics, a global cybercriminal population of 46 million is not beyond the pale. A Framework for Social Change Criminal activity is typically a country problem. What sets cybercrime apart from usual criminal activity is that hacking knows no borders. Security measures alone will not work – this approach requires the willingness to apply extreme measures, a solution society would view repressive on a 17-year old hacker. A better approach and one grounded in history aims to marginalize and ultimately coopt hackers through unified security, political, social, and economic measures. Legitimacy, the right, and acceptance of authority and of exercising power, is critical to achieving change. Politicians and civil leadership must collectively reinforce that the judicial system and law enforcement actions against malicious hackers are appropriate uses of power vested by legally established governments. On a cautionary note,


CIRCUIT MAGAZINE ISSUE 53 history has shown that excessive use of power can undermine legitimacy. For this reason, civil institutions must be part of the solution. For a model, consider Sweden’s drug policy, which includes preventive measures involving schools, clubs and associations, social services, psychiatric services, etc. Measures are supplemented by targeted interventions aimed at individuals and groups in risk zones. Outreach and support programs under umbrella organizations such as Health and Human Services can intervene; so can community anchors such

Men occasionally stumble over the truth, but most of them pick themselves up and hurry off as if nothing had happened. – Winston Churchill –

Winston Churchill, UK Prime Minister (1951-1955) during the Malayan Emergency

24


THE ONE PERCENT as churches, synagogues, and mosques. Surveillance raises privacy issues, but these are manageable by effective governance and compliance. Capabilities Not Met More than 1-in-5 businesses have no confidence in responding to a cyberattack. Lack of confidence points to shortcomings in people, processes, and technology to deal with cyber events. Budgets for cybersecurity vary, but large organizations should target 0.4 percent of revenue. Some spend more. Microsoft is estimated to spend twice that. With global GDP at US$ 86 trillion, this would suggest global cybersecurity spending should be US$ 344 billion. Businesses spend a third of this amount – research firm Gartner estimates 2019 cybersecurity spending amounted to US$124 billion. With cyberattacks costing US$1 trillion annually, cybersecurity spending should increase. Insurers have a role to play in protecting client businesses from risks. Cyber policy coverage provides services against attacks and immediate

25

access to legal and technical resources, often coaching businesses through an attack. Insurers can assess the insured to a cybersecurity maturity framework. Assessments benefit multiple parties. The insurer benefits by setting rates based on risk. The insured can remediate identified cyber gaps, and once resolved, should qualify for a lower premium. Assessments are also important to governance and compliance, providing assurance to company stakeholders and shareholders. Historical Context Insurgents and malicious hackers share some characteristics – first mover advantage, often control of the narrative with news headlines, the weak against the strong, and control through subversion. Given the similarities, we may be able to draw on counterinsurgency lessons learned. One counterinsurgent per 357 in a population in a peaceful situation and one per 40 in hostile environments is generally accepted as the minimum. The most recent US lesson in Iraq provides


CIRCUIT MAGAZINE ISSUE 53 Security Forces in Iraq

2007

2010

2011

US Forces in Iraq*

156,200

47,000

3,000

Iraq Security Forces**

439,678

666,500

670,000

28,423,538

30,868,156

31,867,758

Population vs. US Boots on Ground

182 to 1

657 to 1

10,623 to 1

Population vs. Iraq Security Forces

65 to 1

46 to 1

48 to 1

Iraq population***

Source: *NY Times **Iraq Index, Brookings *** The World Bank

guidance, particularly what not to do. Despite quickly defeating Iraqi military forces, the US never adequately planned for the occupation of Iraq, and its presence was never large enough to maintain civil order. Decisions to disband the Iraqi Army and the deBaathification of the government were incredibly misguided and contributed to subsequent chaos. US forces never approached a 40 to 1 counterinsurgent to population ratio (Figure 3). With loyalties divided along ethnic lines and despite sizeable numbers, Iraqi Security Forces were never a competent or cohesive force under the divisive leadership of Prime Minister Nouri al-Maliki (2006-2014). Since then, even under Adnan al-Zurfi, these issues, as well as lack of governance and

nepotism, continue to negate the effectiveness of Iraqi Security Forces. In direct contrast, Winston Churchill was quick to grasp the counterinsurgency challenges Britain faced during the Malayan Emergency (1948-1960). In one of his first actions as Prime Minister (1951-1955, his second time) he appointed General Sir Gerald Templer with greatly expanded command and control authority to defeat the Chinese Communist guerrillas. Templer deployed “clear and hold” operations and populationcentric (“winning the hearts and minds”) tactics, the basis which remains a successful counterinsurgency strategy. In contrast to the US involvement in Iraq, security forces were very visible during the Malayan

26


THE ONE PERCENT

A pervasive pattern of disregard for and violation of the rights of others… as indicated by repeated lying, use of aliases, or conning others for personal profit or pleasure… Emergency amounting to one member for every 16 civilians (Figure 5). It also helped that Chinese guerrillas had limited support among the Malay population (55 percent Malay, 35 percent Chinese, 10 percent Indian in 1957), and Malays firmly supported the government, including heavily enlisting in the security forces. Closing Thoughts By any assessment, the fabric of society is under siege. Malicious hackers are threatening society by subverting

a critical means of communication. While the role of government can be debated, unequivocal is its responsibility as a protector, to provide the safety of law and order, protecting citizens from each other and against foreign enemies. Its obligation extends to essential economic infrastructure, including cyberspace. The fight against hackers requires marshaling society’s resources into a coalition front. And for that, we need, foremost, political leadership.

Mr. Mayger is an information Security Consultant at Concord. His background includes Chief Information Security Officer (CISO) for global mining company Sibelco. In addition to his B.S in Mechanical Engineering, Mr. Mayger also holds a Master of Business Administration (MBA) from the University of Texas, is a Certified Information Security Professional (CISSP), Certified SCADA Security Architect (CSSA), and a designated Payment Card Industry Professional (PCIP). He can be contacted at jeffery.mayger@concordusa.com.

27


CIRCUIT MAGAZINE ISSUE 53 By: Oliver Carter

From Oil Fields to Field Medic and Beyond It had been a long and gruelling day moving from site to site. I had only recently left the military and now found myself in Basra, Iraq as part of a team that was assigned to protect engineers or staff working within the oil and gas sectors across Rumalaih oil fields. It was my first close protection assignment and came only three months after completing my Medicine In Remote Areas (MIRA) course with ExMed, the industry standard at the time. Then a call came in requesting a “medic� on site. Since most people were asleep and I was still up finalising things before bed, I was the clear choice, so I went to the office for a brief. Finally, the time had

come to put all of the theory of my training courses into real-world practice. I told myself I was ready to deal with whatever I encountered on the field because I had been trained on most life-saving skills and interventions explicitly designed for remote or austere environments. And I was confident and prepared especially since the course was amazingly realistic and authentic with ex-military medics from special forces units.

28


FROM OIL FIELDS TO FIELD MEDIC AND BEYOND Once I got in, the brief that I was given as the newly appointed medic was to check over one of the local Iraqi staff members. The history from another local was that a week before someone died overnight with similar symptoms. The pressure was clearly on

29

as I was now responsible for a person’s life. It was Ramadan, the holy month of fasting in the Muslim world and some of the reported symptoms were headache, pain, cramps, and dry lips and thirst. And when I saw the local, he looked like death! I conducted a few basic assessments, and I


CIRCUIT MAGAZINE ISSUE 53 mean basic. Then told the operations manager that I thought he was suffering from severe dehydration. He needed fluids ASAP. We had the supplies on hand at the site, including the IV kit and a giving set, but we would need a medic to administer it. “Can you do it?” he pleaded. I declined at first. He then pleaded once again as there was no medic there and no medical staff would see him for the next couple of days. In the end, I agreed and placed the IV line in, put up the fluid bag, then attached the fluid bag to the IV.

I was humbled by my own circumstances of living a better provided for life in the UK. Out there, some people had nothing but a corrugated metal roof and 2 square meters of dirt to live on.

I thought how easy… and then I saw the blood running up the giving set! Even though I was quite pleased with myself, I had made a rookie mistake and left on the IV tourniquet. I quickly took it off, and it resolved immediately and started to run through. Valuable lesson learned! Work then took me from Iraq to Libya during the national uprising against Colonel Ghaddafi. The Foreign Commonwealth Office (FCO) were on the ground doing varied job roles, and we were tasked to provide armed security using B6 Land cruisers across Benghazi, Tripoli and Misurata. During this assignment, I filled many roles, but mostly as security. As time progressed, I saw

30


FROM OIL FIELDS TO FIELD MEDIC AND BEYOND myself in a dedicated medic role, still the only MIRA level medic in a dual security/medic role. This time I was provided with much more extensive equipment, and I learned a lot on the ground. At times, we had a CMT 1 level medic on hand to provide some advice, along with another medic who was studying as a remote paramedic. It was then that I realised that while I was continually learning on the job, I also knew that at some point, I wanted to further my training and knowledge. But before embarking on furthering my education, I decided to leave the FCO contract and work for some time as an independent security advisor across Libya. This time around, I found myself unarmed, with no armoured vehicles and with mostly local Libyan connections to move around safely. Luckily I had developed some connections and built some loyalties while working out there for a couple of years. And these came in handy, though I couldn’t say the same for the medkits we carried! While they were fitted to the MIRA industry standard, we found that most were

31

out of date. And with a shortage of supplies, most companies just relied on SOS international emergency response, hoping that nothing bad would happen. In the event of a medical emergency, we knew that no one would be on the ground for upwards of 36 hours after an incident! Not exactly a case of “call in the helicopters”... This is right about then when I decided it was time to give serious consideration to continuing my education. After doing some research on the best medical courses, with the end aim to be a UK-registered paramedic, I found the best route was to start with an IHCD Technician course. A paramedic friend who was working on the circuit also recommended this. So I applied for the Ronin, South Africa course in February 2014. I was accepted and then ultimately quit my job as a security manager and started to prepare for the course in Hout Bay, near Cape Town. The course was 6 weeks long, and although I expected it to be difficult, I soon realised that the learning curve was huge. Working in the


CIRCUIT MAGAZINE ISSUE 53 townships and the cape flats, I was humbled by my own circumstances of living a better provided for life in the UK. Out there, some people had nothing but a corrugated metal roof and 2 square meters of dirt to live on.

a lot. On that call, I was on C spine control and holding the man’s head in that position for the next hour. It was an intensive training period on the Ronin course. And again, the learning curve while doing this job was steep. We would attend to jobs such as an old lady/man falling, drunken people hitting their heads and resuscitations. Occasionally, we attended major traffic accidents that would require a lot of resources.

One of my first jobs was to respond as an ambulance medic to a man who fell 25 feet through a load of scaffolding and hit the ground in a very awkward position. We suspected a C Spine injury. But because we were medics in training and still considered Ultimately, I passed the students, we were directed course but to fully 'qualify'

32


FROM OIL FIELDS TO FIELD MEDIC AND BEYOND

One of my first jobs on the ambulance was a man who fell 25 feet through a load of scaffolding and hit the ground in an awkward position. I would need to complete 750 hours on a front line ambulance, as well as a 3-week long emergency driving course. Further to that, I also wanted to work for a private ambulance company because I wanted the flexibility and freedom to still do overseas deployments.

decided it was a no-go location for around 2 years. All work in the region had dried up.

In 2016, I was accepted on to the accelerated paramedic course (Technician to Paramedic) at Birmingham City University. For an entire 12 months, I did five 13-hour shifts per week and completed every Jump forward 12-14 months of ambulance shifts assessment, exam, and assignment given to me. of immersive engagement and practise, I finalised my Exhausting doesn’t even come close to cutting it. portfolio and sent it back Even some of the tougher to my training provider. tours in the military didn't Within a month or so, I come close to this intensity! was notified that I had But on completion, I was qualified and gained my successfully registered as a certificate. I was now an IHCD ambulance technician. UK paramedic. During this Though when telling people time, I gained education grants from the military of my new title most just thought I fixed ambulances! around £12,000-£13,000, including the full degree course paid for in its Luckily for me, I was now entirety. a step further to becoming a paramedic. And I had And having completed this this to get my teeth into part of my career journey, and work through, as the situation in Libya was pretty I’ve now set up a company called Oscar Charlie Medical dire. The FCO evacuated through the border through & Rescue. We provide training, event medical Tunisia, and then they

33


CIRCUIT MAGAZINE ISSUE 53

cover and consultancy in varied sectors. Using the education and training acquired from the quality companies I trained with, I was able to call upon a similar ethos to integrate a solid foundation of skills and education for medical, security, and safety sector specialists to gain further knowledge in varied sectors. Moving forward, we now have a rescue vehicle with water rescue capabilities, paramedic medical and rescue services for events, specialist safety for

media and FREC 3/4/5 courses that are well recognised in varied industries. Coming from a varied career track, I would like to give back training, education, advice and knowledge of my own experiences to others, both military, close protection, and civilian backgrounds alike. Feel free to reach out if you think I can be of service to you. Wishing you well on your own journey!

Oliver Carter is the Founder of Oscar Charlie Medical and Rescue company, a bespoke training and medical services provider. Underpinning Oliver’s professional accomplishments are 12 years military service in the British Parachute Regiment, and Special Forces Support Group (SFSG). After transitioning from the military, Oliver has provided protection to HNW’s, worked as an advisor in Libya and Iraq, and is a fully qualified paramedic. His interest in medicine and passion for teaching led to him to form Oscar Charlie. For more information please visit: https://oscarcharlie.net/

34


Connect your team with G6PTT. Radio without boundaries. G6 Push to Talk brings you the best from the communications world; the power of network radio using 3G, 4G, LTE & WiFi to give unparalleled global coverage. This system is the result of our successful collaboration with TASSTA; leading edge design and engineering for a changing world. Adaptable, scalable and flexible to fit any operational environment.

The functionality of two-way radio but with no coverage restrictions, and with advanced features that will transform the way you operate. Get in touch to see what we can do for you.

Communications simplified: delivering practical solutions to mission critical users SECURITY | SURVEILLANCE | MARITIME | DEFENCE | HUMANITARIAN EXPLORATION Communication connects everything that we |do. G6 Global exists to create the best communications system for your operational needs.

Web: www.g6-global.com Telephone: +44 (0)1454 610050 www.g6-global.com Email: g6@g6-global.com 35

+44 (0)1454 610050


CIRCUIT MAGAZINE ISSUE 53 By: Ben Gunn, Olchon & Associates Ltd

36


COVERT CAMERAS

The deployment of a stand-alone covert camera is a specialised capability. Some practitioners with a military, intelligence, or police background have learnt their skills in some of the worlds’ sensitive areas, where compromise was not an option. This is not to say there aren't excellent installers with a commercial background. For instance, CCTV installers who have developed a particular skill set, when installing additional cameras onto a CCTV network isn’t a viable option or practical. Not getting compromised remains an essential part of any covert task. The history of who started installing covert cameras is unclear. However, the substantial gains in technology in recent years have certainly helped the modern-day experts who ply their trade in this security discipline. The digital age, smaller cameras, improved battery efficiency, smaller storage devices, near-global communications, and the readily available technology on the internet has undoubtedly assisted. History In 1865, a small (in comparison to what was available at the time)

37

sliding box camera was designed and produced in France. This was likely to have been the first spy camera ever made, although there appears to be no evidence of it ever being used for espionage why would there be? In the late 1890s, the Tico Expo Watch Camera was very popular and probably the most famous spy camera of that era. Looking very similar to a pocket watch, it was used by gentlemen in a semi-covert way by posturing to tell the time while conducting their surveillance activity – the wristwatch had not yet been invented. In the 1930s, and 40s, there were great strides made in camera design as the technology improved, and in the 1950s, the first button-hole camera was introduced. The design was very rudimentary and somewhat unsophisticated, yet the concept is still popular today. In 1947, under the National Security Act in the USA, the formation of the CIA


CIRCUIT MAGAZINE ISSUE 53 was instigated, and it mentions that acts of 'other functions and duties' could be carried out at the direction of the newly formed National Security Council. This was widely understood to mean covert activities, including eavesdropping and other acts of espionage, with the ‘possibility’ of deploying covert cameras, worn on the person or installed. I state ‘possibility’, as the camera technology was available, but not at the size and capability compared to that of the modern-day.

the USA and its allies in the West, including the sycophantic British, was a result of different ideologies; Communism in the East and Capitalism in the West – here ends the history lesson! The public sector on both sides of the divide were quick learners when it came to surreptitious behaviour and their supporting technology.

More recently, the emergence of covert camera installations in the private security sector has predominantly developed into an evidence gathering and monitoring Even then, in 1947, to capability, reacting to claim that a Government nefarious activities; agency actually stipulated usually, a product of covert activities would unusual circumstances have been detrimental where maliciousness to the host country, and or immoral activity has other countries may have occurred, is about to reprimanded them for ‘not occur or continues to playing with a straight occur. bat’; an old-fashioned term referring to conduct carried out in an honest Unfortunately, the and simple way because employment of covert you have traditional cameras has had a values and ideas. particular stigma attached to it, with a common Without a doubt, the cold belief that someone who war between the East and installs a covert camera the West had considerable is up to no good. This is input into covert activities. probably due to negative The division between media reporting, where Russia in the East, and accounts of voyeurism

38


COVERT CAMERAS

and perversion (upskirting and live video streaming onto illegal pornographic websites) often make the headlines, instead of how a professionally run covert camera task has aided in the capture of a criminal. The professional covert camera installer remains in the shadows of clandestine media reporting, not dissimilar to the equipment they install and extract!

Korean phenomenon called ‘Molka’. Molka is the deployment of covert cameras and mobile phone technology to capture live footage of women (and men) at their most vulnerable, or during acts of intimacy. If the perpetrators were not using smartphones, the covert cameras and supporting technology are often bought or built by individuals who are happy to exploit In a recent documentary their victims. Changing by the British investigative rooms, toilet cubicles, journalist Stacey Dooley, and homes are targeted she researched and on an unbelievable scale reported on the South for the offenders’ own

39


CIRCUIT MAGAZINE ISSUE 53 pleasure. And also for acts of bribery, where the ability to make a few dollars (or to be factually correct in currency, the South Korean ‘won’) takes precedence. Unfortunately, with pornography being illegal and banned in South Korea, self-gratification and homemade porn films, made without the consent of the person of interest, has probably forced this issue. Fortunately, I’m reliably informed that the porn industry is thriving here in the West, and therefore acts of voyeurism are few and far between.

Without a doubt, the cold war between the East and the West had considerable input into covert activities.

I believe that the covert camera world is split into two main categories. Firstly, the body-borne capability, which also includes the use of a Trojan horse carrying aid like a bag, briefcase or handbag. And secondly, the temporary installation, be it into a vehicle, building, or structure. The word 'covert' is significant, rather than referring to the ubiquitous, overt body and head cams that other personnel in the security industry are often seen to be using. The temporary covert installations are either a cost-effective rental system or the readily available and easy to deploy covert

40


COVERT CAMERAS camera purchased from the internet or a spy shop. I accept that it is not uncommon for a business to purchase the equipment instead of hiring it. Internet purchases have their pros and cons; however, I’m still not convinced that some of these are a credible option for a covert task. Most of the equipment will not be conducive to the surroundings, or the area of interest, that they are to be installed in, and on that basis, I still have some reservations. Lest we forget, one crucial element of a covert camera is not to get caught! A new clock or new smoke detector suddenly appearing on a wall or ceiling may

41

be spotted by a diligent individual – game over! No matter what the requirement is, and considering what an unprofessional covert camera system could be deployed for, the four main professional deliberations to be considered are: Is it legal or intrusive? This is probably the first and most important consideration at the early stages in dialogue with a potential covert deployment. Some questions to pose could be; are you breaking any laws in attempting to prove that a law has been broken? Are permissions required from landlords, landowners,


CIRCUIT MAGAZINE ISSUE 53

or other stakeholders in the business? Are you going to trespass to gain an advantage or enter a facility to carry out the installation without the necessary permission? The other important factor where individuals struggle to determine the legality of their actions is what does the client intend to do with the data (the evidence)? If the intentions are to convict the potential criminal by engaging with the local Police, or to have a disciplinary hearing, or to prove that a crime has been committed, then the covert installation could be deemed as reasonable. It is not uncommon to involve the Police or a legal advisor at

these very early stages. This will be explained in Issue 54, where I’ll explain the planning process. Is the deployment reasonable and proportionate to the task objective? The objective should tie in with the above paragraph. The deployment of a covert camera (or plural) is for individuals or businesses that require essential evidence gathering in the detection of crime and the monitoring of suspicious activity. If the objective is anything different, then you may have to reconsider or advise the client on the legalities.

42


COVERT CAMERAS What are the other options for the client? Unfortunately, my transparency or lack of unscrupulous business prowess has let me down on occasions, where I’ve talked myself out of a covert installation. For example, if there is an existing CCTV system installed, why can’t another, semi-covert camera be added? What other measures could be put in place to eradicate the problem? Once these fundamental questions have been asked, and the conclusive answers lead the client to consider a covert camera task, then the following four phases should commence. For the purposes of this article, I’ll be concentrating on a temporary installation: Phase 1: Planning Phase 2: Installation

Phase 3: Extraction Phase 4: Collation of Evidence and Reporting. Of particular note is the Planning phase, where some of the original questions posed above, may be reconfirmed, especially if you are bringing in new stakeholders like the Police. The attention to detail, and ensuring the client’s expectations are met, or at least discussed, are essential in the planning of a successful covert task. In Issue 54, the followup article will explain the four phases in detail. I will also attempt to clarify the legislation, governance, and all the other concerns that a professional covert camera installer will consider before Phase 2, the installation, commences.

Ben is a former member of the British Army spending 29 years out of a 33-year military career in UK Special Forces – 19 years in the Regulars and a further 10 years in the Reserve. He had a unique military career; initially expeditionary and latterly, 4 years seconded to Intelligence and a further 4 years in a Counter Terrorism liaison role. Ben is a businessman, incorporating a UK Special Forces tenet into his business planning; ‘the unrelenting pursuit of excellence’ and as such, has established under his directorship, a truly global company based in London, offering a multi-service approach to the security of any asset; protecting People, Property (including Intellectual Property), and Possessions. E: ben.gunn@olchon.co.uk T: +44 (0)203 1903030 W: www.olchon.co.uk

43


CIRCUIT MAGAZINE ISSUE 53

STAyING GREY By: Andy Clark

After reading the excellent article, in the Circuit, by Adam Scholl, "The Gray Man Concept" (issue 41), it led me to think about some of the comms implications associated with trying to maintain a low-profile in as an EP or Surveillance Operator in different environments. I think we can all be guilty of assuming that just because we know something, that others do too, whereas often that isn’t the case.

back in the Control Room. But doing this while remaining 'Gray’ can be a challenge.

As a starter, the curly wurly earpiece often I don't think that portrayed as being used anyone would disagree by bodyguards and that in a crisis Government Security situation, the ability to Agencies (the official communicate is critical, name for it is an be that with your acoustic tube, by the Principal, colleagues on way) is definitely out, if the ground, or the team you are trying to keep

44


STAYING GREY

your profile as low as possible. They are used by the masses because they are simple, reliable and cheap!

guy? The truth is there aren't many conventional radios that are commercially available, that are easy to conceal while still But even more giving you the coverage fundamental than that and functionality you is what radio can you need to do the job. And use in this environment, with all conventional that doesn't single you two-way radio, you still out as the security face the challenges of

45


CIRCUIT MAGAZINE ISSUE 53 coverage and range, not to mention licensing and the issues of using the devices outside of UK jurisdiction.

We all use and rely on our phones so much these days, why not simply give it one more job to do? With the addition of a simple So it’s time for a application, you can now paradigm shift, and turn your iOS, Android this is happening slowly or Windows device into but inexorably, from your radio. Push to traditional thinking talk, exactly like you do to something more with your normal radio, creative. For many years but without the issues now, the ability to use of range or coverage your smart device as a and with a whole range two-way radio has been of additional features available, but it has available. gained huge momentum within the past 12-18 Moreover, everyone uses months. a phone, in almost any

46


STAYING GREY

We all use and rely on our phones so much these days, why not simply give it one more job to do?

conceivable environment, so no one will think twice if they see you using yours either. In most cases, you can even use the same accessories as you would for making and receiving regular phone calls, ensuring that you blend seamlessly with the crowd. As with any solution, there are always some drawbacks, and it would be wrong not to highlight them. This technology relies on the mobile phone network, and that, as we all know, can have its limitations. But networks are becoming more and more reliable, and coverage is becoming increasingly ubiquitous. Add a multi-network roaming SIM card, and you can almost guarantee seamless coverage. There is one other thing you should consider if you are a heavy-duty 'radio' user. While putting all your eggs in one basket has its benefits, it also has its risks, for obvious reasons. Having a back-up comms device is a basic SOP, so I would usually recommend to clients that if they rely heavily on radio for their inter-team comms, that

47


CIRCUIT MAGAZINE ISSUE 53

they consider a dedicated smart device to use as the 'radio'. There are plenty to choose from, and they don't need to be expensive. There is also an increasing range of bespoke devices that look just like the conventional radio you know and love, but with all of the benefits already I’ve highlighted.

Times change, and we need to be prepared to embrace those changes to the benefit of ourselves, our colleagues and those whom we serve. Not only will this shift improve and enhance your ability to communicate, but it will also help ensure that you remain in the shadows!

Andy is the Managing Director of G6 Global Communications and has been providing radio communications to individuals and organisations for his entire professional career, spanning over 35 years. G6 Global exists to create the best communications system for your operational needs. To find out how G6 Global will benefit your business or organisation contact Andy directly via: T: 07768 501 775 – E: andrew@g6-global.com - W: www.g6-global.com

48


THE INDUSTRY AND THE UGLY TRUTH

Who’s protecting Who’s protecting Who’s protecting YOU, while you YOU, while you YOU, while you protect others? protect others? protect others?

With our premium tier of membership, we’ve got you covered under the BBA Protect insurance policy, providing complete peace of mind while With our premium tier of membership, we’ve got you covered under the you work in addition to the standard BBA membership benefits. BBA Protect insurance providing we’ve complete of mind whilethe With our premium tier policy, of membership, got peace you covered under Designed forin professionals looking toproviding maximiseBBA their employability and their you work addition the standard membership benefits. BBA Protect insuranceto policy, complete peace ofdemonstrate mind while commitment to industry standards, there are two levels of Protect membership available: you work addition to the standard benefits. Designed forin professionals looking to maximiseBBA theirmembership employability and demonstrate their commitment to industry standards, are two levels of Protect membership available: Designed for professionals looking tothere maximise their employability and demonstrate their PROTECT PROTECT+ commitment to industry standards, there are two levels of Protect membership available: Individual public and products liability Personal accident and health insurance PROTECT PROTECT+ insurance designed for UK Close designed for armed Close Protection and Individual public and working productsinliability Personal accident healthworking insurance Protection operators nonMaritime Security and operators in PROTECT PROTECT+ insurance designed UK Close designed for armed Close Protection and hostile regions. hostile regions. Individual public andfor products liability Personal accident and health insurance Protection operatorsfor working in nonMaritime Security working and in insurance designed UK Close designed for armedoperators Close Protection hostile regions. hostile regions. Protection operators in nonMaritime Security membership operatorsorganisation, working The in As a trusted professional FROM JUST £60working PER MONTH BBA are dedicated to bringing our members the best hostile regions. hostile regions. IT’S EASY TO UPGRADE YOUR BBA

possible resources and tools to enhance their standing and As a trusted professional membership organisation, The credibility as close protection operators within the industry. BBA are dedicated to bringing our members the best As a trusted professional membership organisation, Theand possible resources and tools to enhance their standing BBA are dedicated to bringingoperators our members thethe best credibility as close protection within industry. possible resources and tools to enhance their standing and credibility as close protection operators within the industry.

FROM JUSTTO £60 PER MONTH MEMBERSHIP PROTECT YOU. IT’S EASY TO UPGRADE YOUR BBA FROM JUST £60 PER MONTH MEMBERSHIP TO PROTECT YOU. IT’S EASY TO UPGRADE YOUR BBA MEMBERSHIP TO PROTECT YOU.

Visit our website at www.the-bba.org.uk to find out more. Visit our website at www.the-bba.org.uk to find out more. Visit our website at www.the-bba.org.uk to find out more. Lockton Companies LLP is a limited liability partnership incorporated in England and Wales, registration number OC353198. Authorised and regulated by the Financial Conduct Authority.

33 49

Lockton Companies LLP is a limited liability partnership incorporated in England and Wales,


CIRCUIT MAGAZINE ISSUE 53 By: Carlton D Smith PPS, PSD, CP

Before & After: The Security Profession & COVID

50


BEFORE & AFTER: THE SECURITY PROFESSION & COVID

“Well, that is going to leave a mark.” The first time I heard that statement, I was watching the American pastime known as a NASCAR race. For those Circuit readers unfamiliar with it, NASCAR stands for the National Association of Stock Car Automobile Racing, and they host races every year in Daytona, Florida. The sports announcer was referring to how close the cars were skirting by each other and the likelihood that the near-skirmishes would "leave a mark" on the cars as they brushed up against each other. Before COVID In much the same way, the COVID-19 pandemic has definitely left "a mark" on our industry. As practitioners, our responsibilities are manifold: protecting the client from physical harm, protecting the client from selfembarrassment, or protecting sensitive, private information and data from financial loss. These duty-ofcare scenarios have always been in place for operators and will continue to be. And now that COVID-19 restrictions are starting

51

to be eased in some areas, clients and other high-net-worth individuals will be even more aware of and sensitive of their surroundings. Before the pandemic hit, it was standard practice for a security detail to conduct a security briefing covering all security aspects of the detail. Be it an “A-list” celebrity or a high-networth executive, the detail had to establish a three-ring layer of security with an outer, middle, and inner protective zone. With this barrier and security level in place, the "P" or principal had a level of protection that was not easily penetrated. After COVID And now, in the postCOVID environment, as protectors, we would be


CIRCUIT MAGAZINE ISSUE 53

best served to operate with the same strict standard of care but with some crucial adjustments despite what the “new normal” may be. Some of these changes will undoubtedly require us to modify how we deal with the general public and workforce. In this regard, understanding the five "W's " (Who, What, When Where, and How) will present a clear advantage for understanding how the post-COVID-19 environment will evolve. For example, some key considerations to reduce COVID-19 risks at major public events would be to have a concert/venue scaled down so that fewer people would be attending an event. Also, it may involve more pre-planning

and logistics work, such as pre-ordering sufficient supplies and materials, including tissues and hand sanitizers for all participants. Or there may also be a requirement to display dispensers of alcohol-based hand rub prominently around the venue. Or even to set up and provide a health care number that participants (workers, fans, etc.) can call for advice and/or report health information. Our equipment (personally and professionally) also has to be updated with the latest gear to ensure protocols are in place. Post-pandemic, a protector’s medical bag must be expanded. Besides the standard

52


BEFORE & AFTER: THE SECURITY PROFESSION & COVID

Understanding the five "W's " (Who, What, When Where, and How) will present a clear advantage for understanding how the post-COVID-19 environment will evolve.

medical equipment (bandages, tape, quick clot, tourniquet, etc.), the medical bag must now be improvised to include a non-contact infrared thermometer and a supply of surgical/cloth masks. Guideposts, Best Practices, & Common Sense In deciding which modifications to make, we can turn to major health and safety agencies as guideposts for adhering to best practices. We should also supplement this with our own due diligence and common sense. For instance, in the US, the CDC (Center for Disease Control) has established guidelines and recommendations for businesses and employers to follow. Some of the updated strategies are: • Conduct daily health checks • Conduct a health hazard assessment of the space (venue, hotel) • Implementing policies and practices for social distancing in the venue/ space

Carlton D Smith PPS, PSD, CPO is an executive protection specialist and a law enforcement officer in a major metropolitan area. You can contact him on LinkedIn: https://www.linkedin.com/in/carlton-smith28519b34

53


CIRCUIT MAGAZINE ISSUE 53 By: Luke Daniel

54


NON-VERBAL COMMUNICATION

Without an understanding of the baselines of behavior, there are no way anomalies can be noticed, let alone articulated. If they cannot be articulated, then they cannot be explained nor fully understood. As a protector, this leaves us vulnerable and inadequately prepared to fully support our clients' needs. In a previous article (NonVerbal Communication, Issue 51), we discussed how protection practitioners tend to be highly adept at picking up non-verbal communication. However, where many of us are lacking, is in our ability to articulate and understand what is being observed. Also, in that article, we laid the foundations by explaining what communication is comprised of, and we examined the different behavior types. I suggest reading that article first, but here's a quick recap. Four Major Behaviors The four major behaviors are dominant, submissive, comfortable, and uncomfortable. These are the most prevalent and easiest to categorize most nonverbal communication into. Identifying the behaviors is not our main goal. Creating a baseline of the behaviors is first, then looking for clusters

55


CIRCUIT MAGAZINE ISSUE 53 of anomalies is the goal. Seeing anomalies for what they are, changes within the individual's emotional state around a specific topic. Dominant Behaviors Each of the behavioral categories has some defining characteristics. Someone trying to portray dominance will tend to take up more space than those around them. Much like a person who spreads out over two or three spaces during a staff meeting, they are trying to portray dominance. The guy whose significant other is being checked out at the bar, who in turn gets swole (or so he thinks), is trying to portray dominance. When an employee is getting counseled by their supervisor, and they lean forward, closer than socially accepted. They are attempting to portray dominance.

Watch for any changes in their baseline of behaviors. See if you can pick out who in a group is holding the dominant position within an interaction.

Trying to show dominance or having the upper hand in a situation doesn't have to be a strong behavioral statement. It can be large or small. Something massive, like a whole-body shift towards the person they're interacting with, is huge. Or it can be as simple as how the hand extends forward in the Western Culture's customary style for a handshake. Take the salesman who approaches the prospective client as an example. The salesman may extend their

56


NON-VERBAL COMMUNICATION hand with the palm facing skyward. Extending the hand with a palm skyward is a sign of submissiveness. This gives the prospective client the upper hand by having their palm facing down toward the ground. Without saying a word, the client starts by being on "top" of the salesman during the handshake. This small nonverbal behavior sets the mood for the rest of the interaction. That mood allows the client to feel that they are in a position of power during the pursuing interaction.

their baseline of behaviors. See if you can pick out who in a group is holding the dominant position within an interaction.

Take a couple of minutes during the day and try to pay attention to how people are holding themselves. Watch for any changes in

When you are looking over at a crowd or a group look for the person(s) taking up the most space. They are most likely the first

57

Comfortable Behaviors Comfortable behavior is one of two behavioral categories that are most often observed. There is little or no expectation of fear or danger. There is no need to place one's body in a position that is easy to escape from. This is in stark contrast to what's seen with uncomfortable and submissive behaviors.


CIRCUIT MAGAZINE ISSUE 53 people you'll identify. It's natural when creating a baseline to identify the largest behaviors first. You can implement the same principle when focusing on comfortable behaviors. Someone who is comfortable isn't thinking about escape, and their body positioning will show that. They may have their body positioned, exposing vital areas of the body. The abdomen, inner thigh, and undersides of their arms are good identifiers. They may have their feet sprawled out in front of them, and they would be unable to take swift action in the event of an emergency. Nonverbal behaviors are instinctdriven and controlled by the hindbrain, the primal section. That means most of the time, the behaviors happen without much, if any, thought on the part of the subject.

where a person relinquishes the ability to escape. Waving arms or legs crossed at the feet show comfort. Showing vital parts of the body or any behavior which defies gravity are all examples of comfortable behaviors. Something as small as the thumbs sticking skyward with clasped hands in front of the body is a sign of comfort.

This was behavior I watched for when observing my team and how they held themselves. One venue we worked in was a bar setting, so we often interacted with people who had too much to drink. We trained all our security officers to stand in a neutral stance. This was so they were not perceived as aggressive by the general public. Its secondary purpose was to allow them to have the fastest reaction time possible in any event. During an interaction, I would watch as the when a person exposes Security Officers stood vulnerable areas, it might ready to respond to any indicate a feeling of being at action the patron took. I ease. Comfortable enough notice some of the officers not to worry about anything held their thumbs skyward during the interaction. as they progressed through Because behaviors are the interaction, and others primal instincts, they share did not. common denominators of freeze, flight, and fight. After speaking with Comfortable is the only the officers, I found a category that doesn't take compelling reason for the a protective stance of some difference. I discovered kind. It is the only category that those who did not defy

58


NON-VERBAL COMMUNICATION

We trained all our security officers to stand in a neutral stance. This was so they were not perceived as aggressive by the general public. Its secondary purpose was to allow them to have the fastest reaction time possible. gravity with their thumbs were not as confident in their abilities. Notably, the ability to defend themselves should the interaction turn violent. Submissive Behaviors Submissiveness is; ready to conform to the authority or will of others, meekly obedient or passive. This means that submissiveness is the polar opposite of dominance. As such, there are stark differences between what's observed when watching others. In the previous section, we used the example of a salesman. We explained how their behavior at the onset of the interaction could influence the exchange. Putting the person who is looking to buy in the dominant position within the communication. We used that example to highlight the dominant behavioral traits. It is also

59

a prime example of how making the slightest shift in behaviors can control the outcome. Especially when the interaction is happening between people who do not know one another. How does submissive behavior look when shown between people who already have a personal relationship? There is one leading example that we'll analyze to show what some of those behaviors may look like. Kids are a great starting point because they have yet to be corrupted by the social contract or are unaware of accepted social cues—these very same cues that cause many adults to self-edit or manipulate a given situation. You are standing outside the classroom, waiting for the school bell to ring, and your child to be


CIRCUIT MAGAZINE ISSUE 53 released for the day. You notice that there are many other parents already there waiting alongside you.Â

are breaking away from the crowds and heading to their regular meeting spots. Your daughter comes out, holding hands with one of The bell rings, and the their good friends as they classroom door swings open, come toward you. Once they and the area breaks out arrive, you ask them how into chaos as the children their day was and who they start to flood the area. They ate lunch with. Both children

60


NON-VERBAL COMMUNICATION enthusiastically explain that it was hot ham and cheese day at school! That they scarfed their food then spent the majority of the lunch period on the playground. Through all the ruckus, you notice that there are still parents arriving late after the bell has rung to collect their children. One person, in particular, catches your eye as they are walking toward you vehemently. You have seen them around before picking up a child as well. You are not sure, though, if they are here to pick up your child's friend or some other kid.

adult gets closer, the child's shoulders rise toward their ears, hiding their head, much like a turtle. The child sulks slowly away to meet the approaching adult.

You watch the interaction between the adult and your child's friend. You take note that the adult did not yell at the child. They did not hit or verbally harass the child. The child seemed to be in good health while they were running around as they exited the classroom. You think to yourself, "there's nothing to the feeling I have in my gut. There's no reason I should worry about the child. They You see that your daughter's will be fine." Finishing up friend has also noticed that their goodbyes for the person. And with that, the afternoon, you start walking child's behavior changes. toward the vehicle. The While leaving the classroom interaction is over. and for a couple of minutes, they had been happy, What's important to upbeat, and defying gravity. remember is that the change Their behaviors were happy you observed in the child and excited. Waving hands is indicative of something and arms in the air and being wrong. The adult could dancing around hugging be aggressive emotionally their other friends. or verbally toward the child. The adult may have been As the new adult having a bad day. The child approaches, the friend is may have been feeling guilty restricting their movements. for something they did prior They are not waving in the day. Or something their hands in the air, not more sinister, which we dancing around, and they would never be able to tell are no longer hugging their from simply watching the classmates. But rather they interactions. are behaving in an entirely different way. They are Polar changes in behaviors trying to hide among the of children should be noted. rest of their peers. As the The example above would

61


CIRCUIT MAGAZINE ISSUE 53 be enough of a cluster to approach one of the administrators of the school. Enabling them to watch and be aware that there may be some concern of abuse within the relationship.

their body language and posture in a way that makes them look smaller. They may guard or protect vulnerable areas of the body.

As with all anomalies, a cluster is needed to verify I have observed this type that the hypothesis you of interaction a handful of have created is correct. times while dealing with my Someone showing own children. It is never a uncomfortable behaviors fun experience. is most likely experiencing some emotional or physical One of the best explanations discomfort. Uncomfortable that I can give would be behaviors can be identified any behavior that attempts from the slightest to most to "hide" or reduce the obvious actions. Such as subject's visual footprint. both feet facing the doorway Some other examples of or a slight shift in where the submissive behaviors would abdomen is facing. be hiding the thumbs while someone's hands are in Some uncomfortable their pockets. Or turtling, behaviors to look for may as described in the previous include: example. Gravity-defying • Fidgeting actions should be noted • Self pacifying behaviors when dealing with any of • Blocking the big four behavioral • Positioning the body to categories. escape or react • Sweating above and Dominant = getting big and beyond that of the taking as much space as baseline possible. Submissive = Getting small Examples of uncomfortable and reducing the visual behavior can be seen daily footprint of oneself. in the interview room. When a Human Resources Uncomfortable Behaviors professional begins the With behaviors indicating a hiring process, an interview feeling of discomfort, there is almost always a required may be some apparent step. The interview process shifts in the baseline. is a golden opportunity Uncomfortable behaviors are to observe how some like submissive behaviors. A will act when they are person may show a desire uncomfortable. Interviewing to leave or hide during a for a position is not situation. They may shift something that people

62


NON-VERBAL COMMUNICATION

do on a normal basis. As such, there is quite a bit of anxiety associated with it. Having to brag about oneself while staying humble and attempting to gain employment can be highly stressful.

no longer leaning into the conversation. They are now leaning away from you and sitting with their back straight against the back of the chair. That's anomaly number one.

In an attempt to get the Questions about past work interviewee reengaged, you experiences, credit history, ask about previous personal and/or criminal background accomplishments. It works, are all hot topics. These they are back at it, engaging topics are great places to and back onboard leaning watch for anomalies to the into the conversation once baseline of behavior. again. After a few minutes, you want to test if the For example, you ask an anomaly you noticed before interviewee a question about had something more to it. their past employment The next question is about history. Their baseline of work history again. But behavior up to this point this time you ask about a has shown them engaged different employer than the in the conversation. They last one and this time the have been leaning into the interviewee doesn't show conversation. Speaking with any major changes to their emphasis and modulating baseline. They stay engaged their tone and volume and comfortable in the throughout the previous conversation. questions. But you drop the question, their behavior Past work experience is changes a little. They are not where the emotional

63


CIRCUIT MAGAZINE ISSUE 53 burden is for the interviewee. As a student of nonverbal communication, you make an effort to see if the original anomaly could lead to something. So, once again, you ask about the company you were talking about when the first anomaly was noticed. Sure enough, there's a change in the baseline of behaviors again. The interviewee again becomes distant in the conversation. Leaning away from the conversation and not speaking at the same rate or with the same tone. This time you notice their leg is starting to bounce, and they take a couple of seconds to pick a hair off their coat. Breaking eye contact, which had been stable throughout the previous part conversations. You have noticed a cluster of anomalies and can now articulate what you saw should the need arise. 1. Breaking of, or aversion to, eye contact. 2. Changes in tone and pace of conversation. 3. Creating a space between them and you by leaning away from the

conversation. 4. Self pacifying behaviors such as bouncing of the leg and distracted behavior. It's been identified that there are some sort of emotions about that specific past employer. The emotion isn't tied to past work experience as a whole. The interviewer may never get the chance to figure out why there was an emotional response to being asked about a specific previous employer. Knowing how the biological process works allows us to explore what it all means. Nonverbal cues are entirely based on the perceptions of the mind. When someone perceives incoming information in a specific way, they will react to it. In the next article, we'll be delving into this reaction and, as observers, trying to understand what we should be looking for. If you are interested in learning more about Nonverbal Communication and Baselines of Behavior you can download a free eBook wrote by Luke Daniel here: Download the eBook

Luke's experiences as a Global Executive Protection Agent, Instructor at Tony Scotti's Vehicle Dynamics Institute, and a student of behavioral analysis/non-verbal communication have led him to work with Fortune 1000 companies as a leader in human assets, "buy in," and business resiliency. Luke Daniel Primary Security & Consulting, LLC

64


INTRODUCTION TO CYBERSECURITY

● NEW FREE APP ● FREE ISSUE ● SUBSCRIBE DIRECTLY ● EVERY SINGLE ISSUE

E B I R C S SUB & Y A D O T SAVE

Get The Circuit Security Magazine with immediate electronic downloads to read on your PC, laptop or smart 65 39 device.


CIRCUIT MAGAZINE ISSUE 53

By: Orlando Wilson

Selecting Firearms for Close Protection Details

I hear people talking about the best firearms for close protection details, and 90% of what I hear is complete BS.

66


TACTICAL FIREARMS I recently had some gun store commando in Europe trying to push the benefits of the 12-gauge Saiga shotguns on me over say a regular AK-47. Something to do with the kinetic energy of a 12-gauge slug at 100 meters. Saiga shotguns are very nice guns, but I take it they were all this guy had used or could sell due to the restrictions on semi-auto rifles in his country. Some unwitting buyers could easily take this gun shop owner and 'firearm expert's' advice and buy something for hostile environments that were unsuitable and overpriced. Not to mention the difficulty in trying to buy effective ammunition, spare magazines, and source replacement parts locally. If you are undertaking armed close protection or security details, there are a few questions you need to ask yourself before you start spending money on firearms. Legality First, find out if you can legally work armed and what permits are required for you to possess and carry. If you need to import firearms, you will need a lot more paperwork to purchase, export, and

67

import the guns and ammunition. Also, there are restrictions on what security personnel and private citizens can possess and carry in many locations. Firearms Availability In many states in the US, firearms are available to non-felons and those with the required permits. But in many other locations in the world, firearms are very restricted, and availability can be very limited. There is no point in having a sexy FN Five-seven pistol or a .300 Blackout AR-15 if you can’t get the ammo or spare parts for them. So, consider; What firearms do you have access to? How can you buy the required firearms and where from? Do you have the required licenses and permits to buy the firearms and ammunition? Budget Guns and ammo cost money, so you really need to work out what firearms, magazines, ammo, licenses, and permits you will require and price it accurately. In many cases, you might want to have an FN-SCAR and a dozen magazines, but due to legal restrictions and budget, you end up with a Chinese shotgun and a half a dozen shells.


CIRCUIT MAGAZINE ISSUE 53 If you are lucky enough to have access to the firearms and ammo you want and the funds to buy them, you need to consider a few other things before spending your money. You will need to think about what you will be using the firearms for, close protection, residential security, valuable asset escorts, maritime security, hostile environment details, or workplace violence prevention? All of these situations are different and will influence the types of firearms you require. You also want to think about what threats you are likely to encounter, such as street criminals, burglars, activists, organized criminals, and terrorists. If you provide close protection services in a 'nice area,' a compact 9mm pistol and a spare magazine might be more than adequate. However, if you are escorting valuables in a hostile environment, then an AKS-74U and few spares mags might be more preferential. The main things to

consider when buying firearms for close protection and security details are familiarity, simplicity, reliability, accuracy, caliber, and capacity. Let's take a closer look. Familiarity Is the end-user familiar with that particular weapon system - have they been trained on them and used them before? These days, everyone seems to think they are an expert, but I have seen plenty of so-called experts not knowing how to use or shoot a wide variety of firearms. Usually, this comes down to a lack of familiarity with differing safety mechanisms and having no experience with different weapon systems - rifles, shotguns, revolvers, etc. Simplicity A defensive firearm should be a simple firearm. The design needs to be as simple as possible, because the more working parts there are, the more there is to go wrong. Make sure your team members are practiced in working the slides

68


TACTICAL FIREARMS

If you are escorting valuables in a hostile environment, then an AKS-74U and few spares mags might be more preferential.

if they are using semiautomatic pistols. Trigger pulls should be smooth if using revolvers. And of course, everyone should be able to strip and assemble the gun; these might sound like basic concepts, but they are essential for shooting and cleaning purposes. Reliability You need firearms that are going to work when you need them to work. The best way to find out about a firearms reliability is to look at reviews in magazines and ask reputable professional firearms instructors and dealers for their opinions. Additionally, look to see what firearms law enforcement and military forces use. These days, law enforcement units and the military put their firearms through strenuous tests for reliability, accuracy, and stopping power before issuing them to their personnel. I generally do not buy or recommend guns that have not been on the market for at least two years, this is usually enough time for all faults in the guns to be discovered and hopefully rectified. Accuracy You need a firearm that will hit what you are aiming at. If you are buying

69


CIRCUIT MAGAZINE ISSUE 53

secondhand guns, make sure you check the barrels to be sure they are clean, and there are no dents or imperfections. One of the primary reasons guns do not shoot straight is because the barrels have not been cleaned or maintained correctly, especially if the shooters have been using cheap ammunition. If you think the sights on your weapon

are off, then get a second opinion, it may just be the way you're shooting. The sights on new guns will be set at the factories. I tend to go for fixed sights for defensive purposes; at close quarters, we do not use the sights anyway. Caliber There are many opinions on what is the best caliber for tactical applications,

70


TACTICAL FIREARMS and a lot depends on the ranges you might need to shoot at and if you're going to need the rounds to penetrate cover or not. Remember, others’ opinions are nothing more than hot air! You want to choose calibers that you and your team can shoot accurately and comfortably. For example, in a handgun, .357 magnums have excellent stopping power but also have a lot of recoil, especially when fired from a snub-nosed revolver. If someone is not used to shooting this type of firearm, they could easily miss their target, even at close quarters, and a powerful .357 bullet can travel a long distance. .22s are considered too small for defensive purposes by many, but they are light on recoil, accurate, and a favored assassin's weapon. A .22 in the brain will kill a person immediately.

Capacity You will need to consider how many rounds you want to carry in your firearms. Revolvers have capacities of 5 to 8 rounds, and semiautomatic pistols have capacities or anywhere from 5 to 32 rounds before they need reloading. Pump-action shotguns 5 to 8 shells, and with assault rifles, the magazines can go from 5 to 100 rounds. Where you’re working and what you are doing will influence how many rounds you will need in your firearms and what spare ammo and magazines you need to carry. This is just a short article with some very basic information, but hopefully, it will give you some ideas on what you have to consider when planning armed security and close protection details.

Orlando Wilson has worked in the security industry internationally for over 25 years. He has become accustomed to the types of complications that can occur, when dealing with international law enforcement agencies, organized criminal and Mafia groups. He is the chief consultant for Risks Inc. and based in Miami but spends much of his time traveling and providing a wide range of kidnapping prevention and tactical training services to private and government clients.

71


CIRCUIT MAGAZINE ISSUE 53

72


BELIEVE IN YOUR INTELLECTUAL NET WORTH! By: Dr Mils Hills

Believe in your Intellectual Net Worth! Why Bodyguards are Naturally High Achievers in Academic Study You probably wouldn’t expect an academic to see the potential in bodyguards let alone see more in them than many see in themselves. But here I am – a lecturer in a university business faculty and irrepressible social media advocate for making academic study easy - doing just that. My

73

day job is advocating for and working with a wide range of distance learners with (like myself) no prior background in higher education. Supporting this is my hobby of being The Academic Pirate – providing a wide range of totally free podcasts, videos, tips, hints and templates that support my mission of


CIRCUIT MAGAZINE ISSUE 53 de-mystifying study and helping people fit it around their professional and family lives.

succeed in academic study. One small caveat. You have to forget almost everything you have ever heard or experienced before as Whether your aspirations “academic study”. Just as are to remain in the there are many paths to industry long term, develop enlightenment – so, too, your own company, charity there are many ways of or take a completely doing academic study. And different career path: I specialise in the path that this article aims to boost is signposted ‘Easy’ and confidence in your ability ‘Flexible’. to ace ANY academic study – but to encourage you Why People Are to consider direct access Understandably Put Off to a Masters in Business Higher Education Administration (MBA) in Excuse me for a moment particular. - I’m going to preach to the choir. Because even You don’t need a first the best choirs need the degree to study for an MBA occasional reminder that – and the innate skills and they are, well, the best. A knowledge that equip you close protection officer is to do your day job mean an intelligent person. They that you are all set up to have great judgement,

74


BELIEVE IN YOUR INTELLECTUAL NET WORTH! supreme situational awareness skills, weigh up evidence and information, are mindful of their own and the principal or client’s reputation and understand why formal qualifications are badges of honour and licences to practice.

on the books. There is little or no guidance or study skills support other than in feedback on assignments which state that you should have done it differently. This is massively disheartening, to say the least.

However, many people in the security industry would like to acquire a meaningful qualification outside of those required to operate in the sector. Or they have an ‘unscratched itch’ that they don’t yet have a degree. Or perhaps they have an interest in a non- security field that they would love to explore. Whatever the motivation, it is very likely that anyone would be put off proceeding for a wide range of totally logical reasons. Education is super-confusing. There are multiple levels, different providers state you have to have A levels and then you should do an undergraduate degree. This is slow, expensive and even humiliating. You may find lecturers treat you with disdain, if they communicate at all. Distance learning may be incredibly lonely and you may find it impossible to speak to a human that will be working with you in the enquiry phase, let alone when you’ve paid and are

I speak on a very regular basis with individuals with exemplary service records in the military, civilian and veteran communities working in security. To a person, they are humble and self-deprecating. They almost always say “I’m not academic,” in an apologetic manner. That’s where I get really energised. There is no single way of ‘being academic’. What people mean is that they have been written off by others as not good enough for academic study. But just because you flunked your exams at school 5, 15, 25 years ago or annoyed an insecure teacher or were a bit of a pain is not actually a diagnosis of being an intellectual failure!

75

What academics have totally failed to communicate to potential and enrolled learners is that you can produce work of the highest academic standard and still preserve your ‘voice’, style and opinion on the topic(s) in


CIRCUIT MAGAZINE ISSUE 53 question. This is something I am passionate about. And, don’t fear the format! Put off by essays – I’ve got a free template which breaks each paragraph into a series of components you need to research and write. Stick them together, polish and ‘top-and-tail’ and you have a full essay. “Scared by referencing?” (Hills 2019 :6) is how you would quote me if I had written that phrase last year. It’s really simple! The only difficult thing is letting go of the massive psychological and cultural barriers we’ve internalised over the years that “Study is Special and Difficult”. False. Smashing Your Psychological and Cultural Barriers I’m lucky enough to be involved in recruiting learners almost every week of the year. I never tire of smashing the psychological and cultural barriers I mention above. And most years my MBA cohorts are 100% full of those that don’t have a first degree but do have a lot of military / related experience. So, the next myth to be destroyed: you should start with an undergraduate degree (level 6).

Your professional experience and trade training are seen as equalling and exceeding what a first degree provides a graduate with.

Err, no. Don’t do that unless you want to pick up information in a topic that

76


you are personally interested in unrelated to a future job (e.g. Tudor History) - so a hobby – or because it is somehow needed as part of a pathway to, say, a clinical qualification or something similar (e.g. psychologist). If none of those apply – then the elite, generalist qualification of a Masters in Business Administration (MBA) is the way to go. And, yes, it is a post-graduate qualification – but you don’t need a first degree to study it. Your professional experience and trade training are seen as equalling and exceeding what a first degree provides a graduate with. An MBA is really useful because you can retain a subject matter specialism (e.g. security or some sub-aspect of it) by exploring, developing or creating new ideas in your assignments and especially the final year dissertation project. This could even be the development of a business plan, model or marketing approach. After graduation, then, depending on the need you can either emphasise the security-specific nature of your learning OR leverage the fact that the MBA is recognised as THE qualification which gives learners the ability to understand businesses comprehensively, across functions and transfer tools and knowledge to help you

Executive Protection Lifestyle Podcast

"To be good at what we do you must know that it's more than just a job." Byron Rodgers

77


CIRCUIT MAGAZINE ISSUE 53 solve a wide range of real world problems. It is also a much sought-after qualification for many jobs (just search MBA on your favourite job search engine). An MBA is also transformative for my learners because of the personal confidence that it inspires in the individual. There is no doubt about it, this is a qualification which knocks all others into the shade. Few will opt for direct entry because they do doubt themselves and their abilities – but those who are prepared to venture outside of their comfort zone will reap the rewards. As soon as doing assignments is understood as a process to showcase your abilities to understand both the topic area and the stylistic constraints you need to own to effectively win the highest grade – the confidence grows. And then you are on a par with (or head and shoulders ahead of) competitors for contracts, jobs and so on. There is no doubt that the shock value of close protection officers and others also having ‘MBA’ after their name is valuable. But the personal buzz doesn’t go away. University credits are not given away, they have to be earned – unlike some so-called qualifications that are offered in the shady educational sector. However, there is an important truth to bear in mind. University Qualifications are Valuable: but not priceless An MBA can cost as much as

you have to spend. There are programmes which cost well over £100k. Online, expect to pay between £12k-30k. And many of these demand a first degree as well as all of your money. The MBA Pathway, however, is rather different. You cover all of the core curriculum that you would study at any business school in the world, and graduate from a UK university with a regular MBA degree. However, the Pathway involves UK learners taking the respected BTEC EDEXCEL Extended Diploma in Strategic Management and Leadership in year one (£2,625) and an MBA top-up programme in year two (£3,100). This is a route that has been available for well over a decade and hundreds of students a year graduate from my programme alone at the University of Northampton every year. In total, the entire course is delivered 100% online, with full and friendly support at all stages: study skills building, drafting your assignment, review of draft and feedback. The whole pathway embeds my concepts of ‘Conversational Learning’ and ACE: Academic skills, Confident expression and Exploiting time and technology. Even more interesting, perhaps, is that Minerva Elite (the University of Northampton’s preferred partner) provide the Extended Diploma – based on a business model which was at the core of the MBA dissertation developed by my then student, now Minerva

78


BELIEVE IN YOUR INTELLECTUAL NET WORTH!

MD and Associate Lecturer at Northampton: Guy Batchelor. As a leading light in the education world for folk in security, our mission and source of delight is enabling the current and future generations of close protection operatives to recognise and leverage their Intellectual Net Worth, to plot a sustainable business future for themselves, to secure competitive advantage in employment and contractual negotiations and boost self-esteem. Minerva Elite as the BBA’s Academic Partner Minerva Elite are delighted to be the official Academic Partner of the BBA. BBA members will start to

benefit from this unique collaboration in a range of ways – supporting their ongoing professional and personal development and helping make the best possible decisions about how to invest their time and money for the highest return in terms of qualifications. Minerva Elite - and especially in my guise as ‘The Academic Pirate’ are passionate about encouraging as many protection specialists as possible into higher education, and even if we cannot provide you with the solutions you wish to have – we will work with the BBA to transfer skills and confidence to enable you to make informed choices and ace the pathways you select.

Dr Mils Hills is the Head of Knowledge at Minerva Elite and directs the MBA ‘topup’programme at the University of Northampton which follows-on from Minerva’s Level 7 Extended Diploma. Mils has worked with the defence and protection community since 1998 in a range of roles. Find him on LinkedIn and any other social media platform.

79


ASK THE NABA NETWORK So-called, former bodyguard to Kanye West, Steve Stanulis, has threatened to sue the star after making allegations of bullying (see Industry News, page 11). But what does the NABA Network make of EP agents who spill the beans? Shawn Cooper 1st amendment rights - freedom of religion, speech, press, petition and assembly? This clown is making allegations about mistreatment and he's spewing possible defamation/slander of the alleged client? Should be interesting to see how it ends up! Sierra Mike The Bodyguard should know how celebrities are mean with their space. The spotlight MUST ALWAYS BE ON THE BOSS Not the protector. Secondly, don't go bad mouthing or talking negatively about a client, whether you signed an NDA or not. Thirdly, take the business advice where they say the customer is Always right. So humble yourself and keep your head in the game.

Peter Brown There are bodyguards for celebrities.... But no celebrity bodyguards, I was told this hour one, day one of training, many, many years ago.

Blake Holland I don’t get how people come into this field and complain about an outcome of a detail. Grab your bag, walk out with your head high, and get to the next detail.

Dudley Green It's interesting that we have individuals who try to ascertain fame from providing a service to clients that pay for their services. True professionals know the truth of who really works with true professional conduct.

80


Paul A. White This is a case of “a guy worked a detail, didn’t like his interactions with the client and now he’s trying to cry all the way to the bank”. However, when it’s all said and done his pocket will never be as deep as the couple he’s trying to slander.

Daryl A. Yelverton You are there to avoid all hazards, protect the client physically, emotionally, and financially from vicarious liabilities and earn their trust - not to make friends. Working in close quarters with anyone, it's not uncommon to experience a little of what they are going through and even intervene. I've (We've) moderated family fights, sat on the lawn or wherever 3am with the client during emotional breakdowns, kept them from hurting themselves/others, done whatever the moment called for, and the next day, they may not even speak to you or say thank you. However, you do get a check. It's not bullying, it's the nature of the job and we never speak about what goes on unless we are briefing a relief. There are many jobs. EP is not for everyone especially the thin skinned.

Xavier Powell So, I went ahead and listened that interview the headline makes it sound horrible, but it wasn’t that deep. Granted he shouldn’t be discussing clients if you’re a protector. 1) he was discussing stuff from 16 years ago. 2) the interview wasn’t based on being a protector he was there to brand something else but when it came up, he didn’t change the subject. He did make it very obvious he wasn’t the BG because his interactions lacked a ton of info a BG would actually need to know or do. 3) This guy clearly was just a sub-contractor who had law enforcement credentials to carry and that’s what got him gigs. It stains the industry and he wasn’t even one of us!!!

Eric Bauer This might be true.... everybody had one of these clients.... but putting all this out there likes this makes him look like a real bitch and will stop people from hiring him.

The NABA network is a fantastic community for getting help and advice on all matter’s security related. https://www.facebook.com/groups/TheNABA/

81


CIRCUIT MAGAZINE ISSUE 53

By: James Bore

In the 'Introduction to Cybersecurity' series, I spoke about social engineering as a way to manipulate individuals into disclosing information that would benefit an attacker.

82


CYBERSECURITY FUNDAMENTALS In the 'Introduction to Cybersecurity' series, I spoke about social engineering as a way to manipulate individuals into disclosing information that would benefit an attacker. I’m sure recent events have been evident to everyone, and that most readers will have been aware of some of the conspiracy theories, misinformation, and polarisation, which is occurring. While this is, in part, down to the way that certain social media platforms are designed to focus on division, some of it is down to deliberate recruitment techniques.

To take just one example the conspiracy theories around 5G were quickly re-tailored to incorporate Bill Gates and George Soros as targets, and were effective enough that there were arson attacks against 5G infrastructure. In other words, a few memes and videos, along with the use of these techniques (whether deliberate or accidental, though there is strong evidence of deliberate action) were enough to cause homegrown domestic terrorism attacks on UK soil.

While not part of what might normally be These techniques are considered cybersecurity, universal and are often social engineering is used to recruit people into usually included, and a personality cults, multilot of these techniques level marketing schemes, exploit botnets and catfish conspiracy theories, and accounts (fake social various other radical media accounts designed groups. They are lowto present an appealing cost, low-effort, incredibly persona in order to effective, and even more infiltrate social networks) effective in an environment to encourage their spread. where most social This technique, and interaction has been moved others like it, show the online, and face to face is weaponisation of social discouraged. They are used media. to help spread conspiracy theories which target Recruitment Steps and encourage action Recruitment Steps against critical national Classically, recruitment infrastructure, and hightechniques used by cults or profile persons. similar rely on four basic

83


CIRCUIT MAGAZINE ISSUE 53

steps. We’ll do a quick run-through of these before looking at how they can be modified to thrive on social media platforms.

identity following a significant change. Graduates, and recent arrivals at universities, are often favourites as these are very public, very obvious events which will prompt identity reassessments.

• Target selection The right target is often someone who has suffered a crisis. Any • Love bombing identity-threatening Simple and crisis will do, grief, straightforward positive significant life change, reinforcement. The global pandemic, all recruiting group prime someone as a showers the target potential target as with compliments and people often reassess support, simply being

84


CYBERSECURITY FUNDAMENTALS nice. This support is unconditional, with no caveats or constructive criticisms, and when it works, it positions the group as a best supportive friend. • Isolation After the supportive position has been established, the target is isolated. This is one of the areas that adapts well to social media, and we’ll see why shortly. At this point with the target free from outside influences, a whole slew of emotional manipulative techniques can be applied to transition the group from a supportive best friend to a core part of the target’s identity. • Maintaining control This step most replicates abusive relationships, with the group being a source simultaneously of support and terror. The threat of withdrawing the support allows much more obvious use of abusive tactics, and by this point if the other steps have been successful the target will have started to think of themselves as

85

a member of the group, as a core part of their identity. Breaking out, as with any abusive relationship, is difficult, painful, and usually requires outside help. We’ll see how this plays into social media engineering as well. Translating to Social Media In person, these techniques are clearly recognisable to anyone familiar with this sort of recruitment. Even some less-ethical sales books promote similar methods (multi-level marketing companies are founded on this sort of psychological manipulation). Where it can be less obvious is when they’ve moved to social media, where the steps are somewhat different. Target Selection With the breadth of social media, targets often self-select. A few years ago, it was established that 64% of members joining extremist groups on Facebook, of all kinds, came from recommendations from the Facebook algorithm. You may have come across the term ‘dog-


CIRCUIT MAGAZINE ISSUE 53 whistle politics’, meaning phrases or ideas that seem innocuous but carry greater meaning for a particular audience (if you read the article on steganography, dogwhistle politics is a form of steganography making use of what's known as a context code). By interacting with the post, whether responding to the hidden message or not, someone is marking out that they are a potential target. Because these techniques require a much lower investment of time and effort on social media than in person, a much wider net can be cast and so targets can be selected with less (or no) care beyond clicking ‘Like’. Love Bombing, Isolation and Maintaining Control The social media approach combines these two into a single step. Whether it’s through a dog-whistle post of some kind (often a meme), through sharing news from extremist and unreliable sources or groups, or through some other mechanism, the aim is to get the target to post something controversial themselves. At this point, people who are aware of the

Because these techniques require a much lower investment of time and effort on social media than in person, a much wider net can be cast and so targets can be selected with less (or no) care beyond clicking ‘Like’.

86


CYBERSECURITY FUNDAMENTALS dog-whistle context and disagree with it will often react in a knee-jerk fashion with shock and anger. Not only because they disagree with the view, but because of the psychological principle that everyone considers themselves at the centre of a story – so a post that’s ideologically against a person feels like a personal betrayal. Of course, that anger leads to a reaction from the poster, who feels attacked because they meant no harm. Compounding this the group who originally created the innocuous post will jump onto the conversation, giving the unconditional support and acclaim. At the same time, friends and family are more likely to react with negative emotions. This is devastatingly effective – trimmed back to the most shallow level social media is built for instant, knee jerk responses rather than nuanced discussion. Emotionally weighted reactions can very quickly alienate a target from their friends and family, while

simultaneously giving them a supportive new network among the radical group. This reoccurs as the target will tend to then share more controversial posts – both as they get drawn into the group and to upset former friends and family in revenge for their perceived attacks. It merges perfectly from this stage into the keeping control stage, as wider networks reject a person for extreme views, they are driven more towards those views. Countermeasures The best countermeasure is awareness and education on how these techniques work. Another trait is that people do not enjoy the idea they are being manipulated, and effective education works. Once a target has begun reidentifying as part of one of these groups it is a much more challenging and complex problem, and while deradicalisation programmes exist, they are very much still in their infancy.

James Bore is an independent cybersecurity consultant, speaker, and author with over a decade of experience in the domain. He has worked to secure national mobile networks, financial institutions, start-ups, and one of the largest attractions’ companies in the world, among others. If you would like to get in touch for help with any of the above, please reach out at james@bores.com

87


CIRCUIT MAGAZINE ISSUE 53

Fit for Purpose By: Ryan Naish

Packing for Adventure In this article, we're going to pick back up on the Adventure series, which we started in Issue 51 (Mindset, Ideas, and Planning). In that article, I laid out a formula for introducing more adventure into our lives. We looked at exploring the local, natural environment, discussed the Ancient Greek Stoic philosophy in assisting the mindset and dealing with mental blocks. We also addressed some simple strategies for preparing and taking action to make adventure a reality.

Now, in Part 2 of the Adventure Series, I'm going to show how putting together a kit list and packing for an adventure is a relatively simple process when a logical system is followed, and all the fundamentals are covered. What has proven very useful throughout my years of adventure travel has been to have a daypack list, which takes into account the basics and essentials required for a twenty-four hour period. Ordinarily, I keep

88


FIT FOR PURPOSE

89


CIRCUIT MAGAZINE ISSUE 53

this ready and good to go (think grab bag), preventing any excuses for not having the time to pack. From this base level, I can then upscale the contents to facilitate a longer duration out, extremes in weather, and overnight stays. I choose a durable pack around the 25-litre capacity and one that I can use as carry-on baggage on a plane. Experience with trial and error has allowed me to move minimally and in light order, while still carrying all the essentials, even

over multiple days in temperate climates (Obviously a larger capacity pack should be taken when required). These six considerations should be the underlying theme when deciding what to carry, choosing items that have multiple uses where possible. Protection The weather and terrain are key factors with the potential degradation of physical and mental performance when out adventuring. With this in mind, we must mitigate the risk with what we

90


FIT FOR PURPOSE choose to carry while being mindful of limiting the overall weight of the pack.

and are comparatively lighter in weight are a key consideration when moving at speed.

Fire While we can keep warm with clothing and a sleep system (if out for a longer duration), the ability to start a fire to maintain warmth or boil water for purification or heating food is essential if a survival situation presents itself. Carrying a select few items that will assist in starting a fire initially before adding a fuel source is invaluable. A simple flint and steel with some dry tinder is lightweight, My personal preference can be waterproofed for more extreme and forgotten about at outerwear and insulation the bottom of the pack. is for natural fibres For more regular use, a that retain warmth basic cooking system is even when wet, a worthwhile addition. without compromising There are several breathability. Ventile options with regards to cotton (tightly woven fibres that swell when wet cooking systems and pros and cons for each: to create a weatherproof barrier) and wool (merino gas, methylated spirits, hexamine, gel fuel, and and lambs) make up the wood stoves are among more substantial layers the most popular. and will often remain in my pack during more favourable weather. I tend Water When venturing out, towards manufactured a good rule of thumb materials for legwear, is always to carry one footwear, and mid-wear litre of water, and the (fleece lining, etc.). Materials that dry quickly ability to purify additional Our clothing choices are the first consideration, covering the temperamental weather systems associated with the exposed natural environment. A weather-resistant system that allows the body to breathe as well as repelling water and providing a windproof barrier is a must. I recommend trialling it on shorter durations in less remote areas first.

91


CIRCUIT MAGAZINE ISSUE 53 sources based on the environment. Obviously, the terrain may dictate that more water needs to be carried, so planning and preparation is paramount. Purification options include water filters, tablets, and boiling. Considerations must be made on the state of the anticipated water source. Think about bacteria and virus risk, animal contamination, and farming nearby (chemical runoff, etc.). Food Personal preference will have a strong bearing on what you choose to carry as a food source. Still, some general knowledge with regards to macronutrients and calorie content may assist in the decision. While we burn carbohydrates as our primary fuel source when the intensity is higher, fat is double the calories for the weight, and the body uses it at a lower intensity to fuel the muscles. Protein is important for the upkeep of muscle but should be a lower priority when engaging in more endurance-heavy activities.

A good example of a combination that hits the spot with macronutrients is the classic peanut butter and jam sandwich. Wholemeal bread will provide the slowrelease carbohydrates, jam the fast release carbohydrates, and peanut butter provides the fat and a small amount of usable protein. When planning longer adventures, more consideration needs to go into food planning. How long will it stay edible based on the environment? Does it need to be cooked, or can it be eaten as it is? How much waste does it produce, and is there an area to offload it? It is also preferable to carry some emergency rations with a long shelflife that don't require any rehydration or cooking; these should be kept in a small waterproof bag that also contains the emergency fire lighting kit. Medical A small medical pack that covers minor injuries and ailments should always be carried. Think cuts and abrasions, strains and sprains, sudden

92


FIT FOR PURPOSE

onset of debilitating conditions like diarrhoea and vomiting etc. Trauma is another consideration, but this opens up a whole different aspect and carrying too much kit to cover every eventuality can be overkill. Best to judge each situation individually and base the considerations on how remote the area you will be moving through, what the dangers are, etc. Navigation In this day and age, we are far too reliant on technology to assist us, dumbing us down and reducing our capabilities to get in tune with the

natural environment to make instinctual decisions. Having a map and compass and the ability to use it is becoming a rarely possessed skill, resulting in emergencies that could have been avoided. GPS systems are a great tool, save a lot of time and make adventure more accessible, but they are no substitute for basic navigation skills and should never be solely relied upon. I will be making my personal kit list and kit recommendations available to Circuit subscribers in the near future.

Ryan is a former physical training instructor in the Parachute Regiment and now specialises as a movement and outdoor skills coach. He is active in the security industry and also runs seminars and workshops, where he shares his passion for cultivating an active lifestyle that’s fit for purpose. Follow him on Instagram, @fitforpurpose.ffp, for practical tips and advice.

93


CIRCUIT MAGAZINE ISSUE 53 By: Thomas Bowman

Armour for Security Personnel

94


ARMOUR FOR SECURITY PERSONNEL

Security Personnel work in very demanding roles, often with challenging circumstances that require them to be completely prepared and aware. During their work, a Close Protection Operative (CPO) has to be aware of their surroundings. available, the first thing to understand is the protection it can provide. Body armour is available at different levels of protection, depending on the size, strength, and speed of the attack it can protect against. The most common image of body armour is of a Kevlar vest, which is lightweight and flexible. This is known as ‘soft armour.’

However, during their preparation, they must also be mindful of the equipment they will need. This awareness may extend to body armour, depending on the situation. If it does, CPOs must be aware of the different options available to them and how they can keep them safe in different situations. Ballistic Protection While there are a number of different models and styles of body armour

All armour is tested and graded according to the level of threat

NIJ Level 11a

NIJ Level 11

NIJ Level 111a

Areal Density

3.5 kg/m

4.2 kg/m

5.9 kg/m

Thickness

4mm

5mm

6mm

.22mm short

X

X

X

.9mm

X

X

X

.45mm

X

X

X

.380mm

X

X

X

.38mm

X

X

X

X

X

.22mm long .44 Magnum

X

An overview of each ballistic threat and what is required to stop it.

95


CIRCUIT MAGAZINE ISSUE 53 it is capable of stopping. The highest level of soft armour available is NIJ Level IIIa, which is capable of protecting against the vast majority of handgun ammunition, including .44 Magnums, for example. The NIJ, or National Institute of Justice, is widely recognised as being the world leader in ballistics testing and is responsible for the standardisation of body armour testing. Ballistic protection is important for all CPOs to consider, particularly those working in hostile environments where there is a risk of firearms. Most

vests come with ballistic protection as standard, keeping you safe against firearms even if it is not a major threat. We are fortunate in the UK to have a very low rate of gun crime, and yet it is important for CPOs to be aware of ballistic protection. Edged and Spiked Protection Of course, for many CPOs, a bulletproof vest will simply not be needed. In the UK, the threat from firearms is low, but CPOs will know that attacks, violence, and weaponry are still very present and need to be addressed.

Knife Resistant Level 1

Knife Resistant Level 2

Energy Level

E1

E2

E1

E2

Energy (joules)

24

26

33

50

5 m/sec

6.2 m/sec

5.9 m/sec

7.3 m/sec

Total Missile Mass

1.9 kg

1.9 kg

1.9 kg

1.9 kg

Maximum Penetration

7 mm

20 mm

7 mm

20 mm

Velocity

Knife Resistant Level 1 & Spike Protection Level 1

Knife Resistant Level 2 & Spike Protection Level 2

Energy Level

E1

E2

E1

E2

Energy (joules)

24

N/A

33

N/A

5 m/sec

N/A

5.9 m/sec

N/A

1.9 kg

N/A

1.9 kg

N/A

KR1 = 7 SP1 = 0

N/A

KRI = 7 SP2 = 0

N/A

Velocity Total Missile Mass Maximum Penetration

An overview of each stab/spike threat and what is required to stop it.

96


ARMOUR FOR SECURITY PERSONNEL

Stab and Spike vests will still use materials like Kevlar in order to absorb the impact of an attack and help mitigate the damage, but they will also use chainmail and/ or plastic laminate to provide a tough surface to protect the wearer.

Weapons like knives and needles may seem less threatening than a gun but are just as deadly, and far more accessible. It is not common knowledge that a bullet proof vest cannot protect you against spiked and edged weapons. This is because the soft fabrics used in a bullet proof vest, although incredibly strong, will be cut or bypassed by edged or spiked weapons. Stab and Spike vests will still use materials like Kevlar in order to absorb the impact of an attack and help mitigate the damage, but they will also use chainmail and/or plastic laminate to provide a tough surface to protect the wearer. This will be of particular importance to those working in Close Protection, who may find themselves in close contact with members of the public and large crowds. Working as the ‘bodyguard’ for a public figure, for example, will put the CPO in close proximity with people who could easily cause otherwise fatal damage. A stab and spike proof

97


CIRCUIT MAGAZINE ISSUE 53

vest will help negate this threat and keep you protected.

of protection, a vest can be worn discreetly.

This will be of particular Styles of Body Armour benefit to those working in Close Protection, The additional materials who require discreet used in a stab or spike protection. Covert vests proof vest will naturally are designed to be worn increase the weight and underneath clothing, and thickness of a vest, and so are very useful for for some, this is a good these situations. These reason to have lower vests are often thinner levels of protection. and slightly lighter than However, the protective overt vests but are still materials used in body available at the same armour are lighter and thinner than ever before, levels of protection. Some and so even at high levels also come with additional

98


ARMOUR FOR SECURITY PERSONNEL when working in active warzones, perhaps guarding oil and gas supplies. These vests are Of course, some CPOs will naturally overt in nature have no need for discreet but come with additional protection for the head, protection, and may actually benefit from body neck, throat, upper arm, and groin. Furthermore, armour that helps them they often come with display their authority. A rigid plates that are Security Operative (SO) capable of stopping working in Site Security, even armour-piercing for example, will want ammunition. to show their authority to the general public and can make use of an As we have seen, there overt vest. These vests are numerous options are worn over clothing available to SOs, and and can form part of a uniform. Most overt vests all of them have their are available with durable, own advantages and weather-resistant covers, disadvantages; tactical armour is far too bulky high-visibility strips, and and cumbersome for even logos and insignia. This helps make an overt Close Protection, and a covert vest provides vest a useful part of a no tactical advantage SOs uniform and can to those working in Site help deter any potential Protection. Whatever attackers. your choice in body armour is, it has to reflect For those working in your own preparation extremely high-risk situations, a covert vest is and experience and has to be suited for the simply unnecessary, and environments you are a simple overt vest may not be sufficient. Tactical working and the threats armour is the only option you will face. materials that help control the temperature of the wearer.

Thomas Bowman has many years of experience in the defence industry and is currently the resident expert writer for Safeguard Clothing, who provide a range of body armor, stab proof vests and other levels of protective clothing.

99


CIRCUIT MAGAZINE ISSUE 53

Global Situation Report ANALYSIS

Each issue our global geopolitical partner, Stratfor, provides an indepth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.

Iraq: Iran-Backed Militia Threatens “Escalation” in Response to Government Crackdown Jul 9, 2020 A spokesman for Kataib Hezbollah said Iraqi Prime Minister Mustafa al-Kadhimi would trigger an “escalation” if he continued to clamp down on Iranian-backed militias in the country, the Associated Press reported July 9. Why It Matters: Al-Kadhimi is facing increased domestic and international pressure to clamp down on militia groups following the assassination of a prominent security analyst in Baghdad, which was widely believed to have been carried out by Kataib Hezbollah or another militia group. India: BJP Leader Killed by Pakistani Militants in Kashmir Jul 9, 2020 A former district president for the Prime Minister Narendra Modi’s ruling Bharatiya Janata Party (BJP), Wasim Bari, was shot dead along with his father and brother a northwestern town in Kashmir by gunmen police have identified as militants from the Pakistani militant group Lashkar-e-Taiba (LeT), the Hindustan Times reported July 9. Why It Matters: This first the first significant attack specifically targeting a member of the BJP in Kashmir, which will almost certainly generate blowback from Modi’s Hindu nationalist government.

100


GLOBAL SITUATION REPORT

FEATURED ASSESSMENT Ivory Coast July 10, 2020 The unexpected death of Ivory Coast's prime minister and the ruling coalition's presidential candidate risks dashing hopes for the country's first democratic transition of power without violence.

Explosions in Iran Point to a Possible Israeli Sabotage Campaign

Israel was likely behind a July 2 explosion and fire at Iran's Natanz nuclear facility, and potentially some of the other similar incidents that have occurred near Tehran over the past two weeks, including a June 26 explosion at the Khojir missile complex.

Although Tel Aviv doesn't typically claim its covert actions against Iran, motive and past history make Israel the most likely actor to conduct such sabotage operations against Iranian infrastructure and assets. • On July 5, an unnamed intelligence official told The New York Times that Israel was responsible for placing the "powerful bomb" that was detonated in a new centrifuge assembly facility at Natanz. The Washington Post and other media outlets have also pointed to a plausible Israeli operation behind the July 2 explosion. • When asked about the Natanz incident on July 5, Israeli Defense Minister Benny Gantz said Israel wasn't necessarily behind every attack on

101

United States July 10, 2020 The U.S. decision to sanction a Chinese Politburo member will provoke a tit-for-tat response from Beijing, adding to the mounting tensions between the two countries. Libya July 6, 2020 Potential changes to the way oil revenue and exports are shared and distributed in Libya could have significant ramifications for the country's sovereignty and ongoing civil war by establishing de facto splits in Libya's financial system. Israel July 2, 2020 Israel is slowing, but not yet stopping, its annexation plans in the face of a COVID-19 resurgence and possible future changes to its relationship with the United States, forestalling Palestinian unrest and international backlash.


CIRCUIT MAGAZINE ISSUE 53 Iran, but he also did not explicitly deny the country's involvement. Hong Kong June 29, 2020 The passing of China's new Hong Kong national security law marks the start of an uncertain and potentially volatile phase in the city's ongoing political crisis, as pro-democracy forces squareoff with newly empowered city authorities backed by Beijing. France June 29, 2020 The failure of Macron's LREM party to win support at the municipal level will make it even harder for his unpopular government to pass reforms ahead of the 2022 presidential election. International Monetary Fund June 25, 2020 With no end in sight to the COVID-19 pandemic, international institutions and private forecasters alike are now projecting huge cumulative losses and a prolonged, uneven economic recovery. Australia June 19, 2020 Australia has been targeted by a sustained and wide-ranging cyberattack on government institutions, public services and businesses. Unnamed top officials said the Chinese government is the primary suspect.

An uptick in such acts of sabotage would suggest Israel may be reverting to a policy of unilateral action against Iran's nuclear and missile programs. Israel is frustrated by the failure of Western and regional countries to fully rein in Iran's military and nuclear capabilities, which it views as direct threats to its domestic and regional security. With the potential for a less friendly U.S. administration to take office in January, Israel may also be calculating that it has an optimal but limited window to act more aggressively against Iran's nuclear program. Iran will likely use its favored asymmetric tactics, such as cyber and proxy warfare, in response to either acknowledged or perceived Israeli actions, while continuing to develop its nuclear and missile programs. Incremental development of its nuclear capabilities remains one of Tehran's primary means of retaliating and reacting to increased U.S. sanctions and Israeli attacks, both of which Iran views as unjust attempts at containment. • On July 5, the spokesman for the Atomic Energy Organization of Iran said last week's fire in the Natanz facility caused "significant damage" and "could slow down the development and production of advanced centrifuges in the medium term," but wouldn't keep Tehran from continuing to develop its nuclear program. • In the near term, Iran needs to maintain its trade ties with Europe, Russia and China to help keep its sanctions-burdened economy afloat, while still depicting the United States as the villain that withdrew from the JCPOA. For this reason, Tehran seeks to only carefully violate the deal with actions that only blur the lines of what's allowed without blatantly breaching the accord.

102


GLOBAL SITUATION REPORT Ethiopia: Over 200 Die in Protests and Ethnic Violence Over Singer’s Death Jul 8, 2020 Police figures indicate that 239 people died during demonstrations and ethnic violence that broke out in the Ethiopian capital of Addis Ababa and the surrounding Oromia region over the killing of Hachalu Hundessa, a popular singer and activist from the Oromo ethnic group, Al Jazeera reported July 8. Why It Matters: The ongoing violence and political unrest triggered by the killing of Hundessa highlight the central government’s tense relationship with Ethiopia’s ethnic populations. China, Serbia: Beijing Completes First Sale of Armed Drones in Europe Jul 7, 2020 Serbia has acquired nine Chinese-made CH-92A armed reconnaissance drones, along with 18 FT-8C air-to-ground missiles, marking the first export of Chinese “military-use aviation equipment” to Europe, China’s Global Times reported July 6. Why It Matters: The overseas sale marks an important win for China’s arms industry, which has sought to expand beyond Asia, the Middle East and Africa.

Iran: Second Mysterious Explosion at Sensitive Site Jul 2, 2020 The Atomic Energy Organization of Iran said July 2 that a fire had broken out at the Natanz fuel enrichment facility in an "industrial shed." Satellite imagery and photos released by Iran, however, suggest that an explosion occurred at a building involved in the assembly of centrifuges. BBC Persian reported that a previously unknown group calling itself the "Cheetahs of the Homeland" had sent it a message claiming responsibility. BBC Persian also said that the messages were sent to journalists before the Atomic Energy Organization of Iran announced that an incident had occurred. Why It Matters: This is the second mysterious incident in the last week at a critical Iranian facility. Either one could in fact have been the result of a domestic group acting with or without foreign support, or the result of a U.S. or Israeli cyberattack.

103


CIRCUIT MAGAZINE ISSUE 53 Russia: Final Tally on Approved Constitutional Amendments Released Jul 2, 2020 The official tally of the vote on amendments to the Russian Constitution stands at 77.92 percent of voters in favor with a voter turnout of 67.97 percent, Kommersant reported July 2. A majority of voters rejected the amendments in just one of Russia's federal regions, Nenets Autonomous Okrug. According to members of the Russian opposition, statistical projections suggest that though a high degree of vote fraud occurred, the measures would have passed anyway. Why It Matters: The Russian regime pushed through the constitutional amendments to prepare its political system for a future after longtime President Vladimir Putin, who the vote means can now remain in office until 2036. Poland: Country to Hold Runoff Presidential Election on July 12 Jun 29, 2020 Polish President Andrzej Duda will compete against Warsaw Mayor Rafal Trzaskowski in a runoff contest on July 12 after failing to secure at least 50 percent of the vote in the first round of Poland’s presidential election, Reuters reported June 28. Duda won the most votes in the first ballot with 43.6 percent, followed by Trzaskowski from the centrist Civic Platform party with 30.3 percent. Why It Matters: Duda’s re-election would preserve the current policy alignment between the president and Poland’s governing nationalist Law and Justice (PiS) party. Serbia, Kosovo: War Crime Accusations Prompt Kosovo to Pull Out of U.S.-Sponsored Summit Jun 25, 2020 Kosovo’s government announced it would not attend a summit with Serbian leaders in the United States, which was scheduled for June 27, after a special international prosecutor in The Hague accused Kosovo politicians, including President Hashim Thaci, of war crimes during the country’s push for independence in the late 1990s, Reuters reported June 25. Why It Matters: A pre-trial judge must now decide whether to present formal charges against Thaci, but the special prosecutor’s decision will still put the U.S.sponsored dialogue between Serbia and Kosovo, and potentially EU-sponsored negotiations, on hold. South Korea, North Korea: Pyongyang Suspends Military Threats Against Seoul Jun 24, 2020 North Korea has decided to defer "military action plans" against South Korea during a meeting presided by leader Kim Jong Un, The Japan Times reported June 23. North Korea has since removed anti-South Korea propaganda from several of its

104


GLOBAL SITUATION REPORT websites, along with half of the propaganda loudspeakers that its soldiers recently installed in the Demilitarized Zone (DMZ). Why It Matters: North Korea is deescalating further from its confrontation with South Korea in recent days. This may have been motivated by backroom discussions with Seoul in terms of concessions on inter-Korean cooperation projects.

Yemen: Southern Separatists Seize Island of Socotra From Saudi-backed Government Jun 22, 2020 Separatists aligned with the Southern Transitional Council (STC) have claimed full control over the Yemeni island of Socotra, Al Jazeera reported June 22. Socotra’s governor and the commander of the local Yemeni air force reportedly fled after being displaced by what Yemen’s Saudi-backed government is calling a coup. Why It Matters: The seizure of the strategic island is the latest sign of the STC’s growing autonomy. Separatist forces have fought alongside the Yemeni government against Houthi rebels and al Qaeda militants in the country for years. But the STC’s increasingly bold push for an independent southern Yemen threatens to undermine this security alliance.

105


CIRCUIT MAGAZINE ISSUE 53 By: Ed Hill

Could the Corona Virus Pandemic Fuel a Resurgence in Maritime Piracy? 106


RESURGENCE IN MARITIME PIRACY?

2020 has so far been an extraordinary year. Few could have predicted the coronavirus pandemic and the global havoc it has caused. As the world now braces itself for a substantial global recession, many of us fear what the future may hold. An economic slump presents unique and difficult challenges for many sectors, particularly those within the maritime domain. Equally, an economic downturn can also present opportunities for crime and racketeering, raising concerns that we may be about to witness an unwelcome resurgence in maritime piracy.

kidnapped and held for ransom was once a regular occurrence. However, recently, attacks in the region have dropped to be almost non-existent.

Over the past decade, great strides have been taken to improve seafarers' safety and security with many painful lessons learned along the way.

The deployment of warships and the widespread use of armed guards have been instrumental in reducing the number of pirate attacks. With the number of reported piratical incidents dwindling with each passing year, it would be easy to assume that the battle is being won. However, recent statistics tell a different story.

Ships running the perilous gauntlet through the Gulf of Aden exposing themselves to the likelihood of being attacked by Somali pirates with crew being

Within the past decade, a significant international effort has helped to contain piracy in the waters surrounding Somalia. However, the problem has remained ongoing

107


CIRCUIT MAGAZINE ISSUE 53 in other regions, notably Southeast Asia and the Gulf of Guinea. Nevertheless, there has been an overall steady decline in these regions, and the attack statistics have remained relatively low compared with those previously attributed to Somali piracy. 2019 saw the lowest number of recorded global pirate attacks for 25 years. Although the battle against piracy is far from over, the maritime community have been positively encouraged by this milestone. However, so far, in 2020, we have witnessed a 24% increase in worldwide pirate attacks and attempted attacks compared with the same period last year. With this in mind, the question must be asked as to whether there is a direct correlation with the increase of piracy attacks and the coronavirus pandemic.

world. These unparalleled times have reverberated at almost every level, causing widespread confusion and uncertainty. Governments have been forced to divert their The coronavirus pandemic attention from routine has been unprecedented. internal matters and instead commit significant It has caught even financial resources in the most resolute response to the pandemic. governments off-guard Attempting to minimise and has sent major the infection and death shockwaves around the

108


RESURGENCE IN MARITIME PIRACY?

rates of its citizens while reconciling the financial losses to their national economies. The uncertainty remains, and it is still unclear how long it will continue.

have become hindered in their fight against maritime piracy. The pandemic presents many immediate and worrying economic challenges to those countries whose financial resources are The dramatic weakening already limited. The of the global economy need to address the caused by the pandemic increasing number of means that many deaths has forced many poorer governments regional governments

109


CIRCUIT MAGAZINE ISSUE 53 to shift their focus from piracy towards more pressing issues on land. With many countries already struggling to police their territorial waters, this situation has presented the pirates with a unique opportunity. The knock-on effect of the global economic downturn will undoubtedly hit the maritime industry hard. A global recession and a significant slump in international trade would result in less revenue for maritime stakeholders. A loss in revenue will inevitably lead to less money being available for security, which in turn favours the pirates. It may come as no surprise that crime increases during periods of economic recession. Academic research indicates that recession and the associated financial hardship often leads to desperation where more people turn

to crime to make ends meet. It is usually under these conditions where piracy has previously flourished. An undesirable mix of widespread economic hardship, easy access to firearms, cutbacks to shipboard security, and financially insecure governments now presents an ideal opportunity for piracy to return and prosper. For those countries already struggling to control maritime crime within their territorial waters, coronavirus's arrival is an unwelcome arrival on to their already burdensome economies. With governments forced to divert their immediate attention to dealing with the virus coupled with the inevitable negative financial impact, it is highly probable that many will exploit this weakness. For some communities already living in poverty, a return to piracy could be their only means of survival.

Ed Hill is a former Royal Marines Commando with a Masters Degree in Maritime Security. Ed is the Managing Director of Intrepid Risk Management, a London based company that specialises in superyacht security.

110


111


CIRCUIT MAGAZINE ISSUE 53 By: Justin L. Johnson

"Make your attacker advance through a wall of bullets. I may get killed with my own gun, but he's gonna have to beat me to death with it cause it's gonna be empty." Clint Smith 112


AMMUNITION – DO BALLISTICS MATTER?

Here we are with part 3 of the series, which means you’ve made it to the meat and potatoes! In earlier installments of the series, we talked about the differences in ammunition and dug deeper into why the jacketed hollow point (JHP) is the go-to for defensive purposes. Now we are going to put the rubber to the road. To begin with, it is important to lay some groundwork because ballistics can mean different things to different people. The three most common ballistic applications are: 1) Internal ballistics the study of what happens when the firing pin hits the primer, and the bullet exits the barrel. 2) External ballistics deals with the flight of the bullet through the air and how outside

113

forces could interfere with it. 3) Terminal ballistics the damage a projectile does on the other end when it hits an object. For the sake of this article, we are going to focus on the terminal side of things. At the end of the day, if we have to use our firearm in a defensive situation, we want to make sure we do all we can to stop the threat. Now, buckle up, keep your hands and feet inside the ride at all times, and remember to tip your waiters and waitresses! Terminal Ballistics - The End All, Be all Terminal ballistics is a subset of the ballistics field. It is defined as the study of the behavior and effects of a projectile when it hits and transfers energy to a target. So, what happens when a bullet hits its intended target? In short, the projectile begins


CIRCUIT MAGAZINE ISSUE 53 to slow down, dumping energy (hopefully all of it); the bullet starts to expand, all the while penetrating deep enough to reach multiple vital tissues, thus ending the confrontation. Sounds simple enough, right? There are hundreds, if not thousands, of manhours that go into the science and engineering behind how this works. I want to remind readers, I am not one of those engineers. I am an individual who has spent the better part of twenty years applying ballistics in various ways, including spending the last five working for some of the largest ammunition manufactures in the world. As I mentioned before, there are three phases of

a projectile's flight path once it is initiated. The first phase is the slowing down and energy dump process, followed by bullet expansion in the second phase, and finally, the third and last phase is depth penetration. Phase 1: Dumping Energy With that said, the first thing I want to do is unpack what I mean by “dumping energy.� Energy is a direct representation of the mass of the projectile and the speed at which it travels, often expressed in foot-pounds of energy or Joules for those who use the metric system. There is a metric ton of information on the internet and in the library on this subject, so I am going to keep it pretty simple. Suffice it to say

114


AMMUNITION – DO BALLISTICS MATTER?

Energy is a direct representation of the mass of the projectile and the speed at which it is traveling, often expressed in footpounds of energy or Joules for those who use the metric system.

that the faster you can push a heavy object, the more energy it will have on the other end. And a corollary to that is that as an object slows down, the energy will decrease. An example I often use to illustrate this point is that of a Prius car versus a train. If they are both traveling sixty miles an hour (96.5 KPH) on impact, which one is going to do more damage? The train is, right? That is an extreme example, but it puts energy into perspective. Ideally, we want our projectile to dump ALL of its energy inside the target. Let’s look at the most common calibers out there right now, the 9mm Luger. A standard 124-grain JHP going 1,150 feet per second (351 meters per second) has approximately 364 ft-lb (495 J) of energy at the muzzle and 331 ft-lb (445 J) at 25 yards (22.8 meters). That’s a lot of energy dumping into a threat. There are some good ballistics calculators out there, and manufacturers are getting wise and starting to put this information on their packaging. So do your research and see what's in the marketplace. This is where some folks might

115


CIRCUIT MAGAZINE ISSUE 53 expect me to either enter into the stopping power or the 9mm/45ACP debate. Sorry, everyone, I'm not going down that dark and stormy road. With that said, if you stick it out, at the end of this article, I will wrap it all up in a nice neat bow. Phase 2: Expansion The second phase of this ballistics thing is expansion. If everything goes right, you want your projectile to expand at a minimum of 1.5 times its original size. With the bigger expansion, we end up with bigger wound channels. The bigger the wound channel, the more damage we are going to do to the threat. This one is a fairly easy concept to grasp. If you can put multiple big holes into something, the likelihood of hitting vital tissues or causing serious fluid leakage is almost guaranteed (if your shot placement was good). I will keep with the 9mm Luger example, using the same 124-grain JHP above, fired from a Glock 19 with a 15 round magazine (plus 1 in the chamber), giving you 16 rounds to stop the threat. For math purposes, a 9mm projectile is about 0.355 inches in diameter. If that 9mm expands to 1.5 times its original size, you have a projectile that

If everything goes right, you want your projectile to expand at a minimum of 1.5 times its original size. With the bigger expansion, we end up with bigger wound channels. is roughly 0.533 inches (13.5mm) in diameter. That means you have the potential of putting 16, halfinch (12.7mm) holes into the threat. That is a lot of torn tissue and plenty of leakage. I would strongly suggest that you guys do an internet search for wound ballistics/ballistics gel shoot, and you can see for yourself what the projectile is doing when it hits its intended target. There are a lot of great resources out there on this subject. This would be another opportunity for me to dig into the 9mm/45ACP debate. But you guessed it‌ not yet. Hang on a bit longer, we’re almost there.

116


AMMUNITION – DO BALLISTICS MATTER? Phase 3: Penetration The last piece of this puzzle is penetration. There is a fine line between not enough penetration and too much. If the projectile doesn't go deep enough, it won't hit the vital tissues that we need to hit to "turn the lights out.” On the other side of that coin, if the bullet travels too far, we can damage things on the other side of our threat, including other people. You are ultimately responsible for every round you fire. There is no such thing as a magic bullet when it comes to penetration. The famous Murphy and his Law will ultimately show up when you don’t want him to in that anything that can potentially go wrong will go wrong. This is where we can heed a sound approach by going back to look at the type of ballistics and ammunition that the law enforcement and military community are using. If you look at it from an empirical data perspective, those groups

have more "hands-on" experience than just about anyone out there. Use what they use, and you are going down the right road. Now back to the lingering 9mm/45ACP debate… As I was planning this article, I was thinking about this ongoing debate; however, I didn’t want to fill these pages with a bunch of opinions and hearsay. I personally have carried 9mms, 45s, 357s, and a slew of other calibers in my time. And at the end of the day, apply the principles of this 3-part series to your decisionmaking process and carry what you are comfortable and confident with. You will have to balance things like the size/capacity of your firearm, recoil control, engagement speed, and personal preference. If you want to debate or discuss in-depth, hit me up on one of my social platforms, and we can go down that rabbit hole together. Until next time… stay safe!

Justin started his journey in the military and has grown his passion for firearms and training ever since. He has a resume that covers just about every segment of the security industry from armed and unarmed static security, investigations, close protection, highrisk protection, sports and entertainment venue security management, risk assessment, and consulting. He has spent the last 5 years managing ammunition product portfolios for major ammunition and firearms manufactures in the industry. He is also an avid competitive shooting, crossing multiple disciplines.

117


An Introduction to Celebrity Protection and Touring WORKING WITH THE MEDIA

by Elijah Shaw & Dale June

This is a "Real World" look at the business of VIP Protection and a MUST READ for anyone wanting to learn more about the job, written by those who know it best. I cannot recommend it highly enough.

available now on amazon 118

Miguel DeCoste


FOOT STEPS By: Jose Casillas

Episode 6: Benjamin Alozie Q: How would you describe your background both personally and professionally? Personally, growing up, I was always a protector. I would

119

protect my friends and keep the bullies away from them. I think that just carried over into adulthood, which led me into working in the private sector, first in event management, and


CIRCUIT MAGAZINE ISSUE 53 mostly now in political/ dignitary protection. Q: What type of training have you had thus far, whether it was on-the-job or courses you traveled to attend? When I worked with the WHO. (World Health Organization) I received various on-the-job training opportunities, such as baton and firearm handling, first-aid, crowd management, and access control. The Executive Protection training courses I took were in the US, including ICON's Celebrity Protection course and Executive Protection International’s course. Then when I started working with high profile families, they would offer training opportunities for the EP team. That was when I undertook driving training sponsored by Audi.

We approached them, and we got along so well that they invited us to lunch and it was then they found out we did security. The family was on holiday and needed protection for their kids.

Q: You mentioned working with a highprofile family, how did that connection come about, and what came of that relationship? Funny story. My friend Funny story. My friend and I were in Switzerland, and we noticed this couple

120


FOOT STEPS

that sounded Nigerian, which is what I am. We approached them, and we got along so well that they invited us to lunch. It turned out the family were on holiday and needed protection for their kids. As a private family, they preferred covert EP agents to protect the kids, so we strategically placed ourselves around the schools and the neighborhood. When the family traveled back to Nigeria, we were invited across to work EP for

121

them during the election year, as they were heavily involved with politics. Q: How was your experience traveling with a high-profile political client? And what challenges did you encounter along the way? Nigeria has a population of 200 million within 36 states. Coordination, logistics, and environment were key elements that we took into consideration


CIRCUIT MAGAZINE ISSUE 53 every time we traveled anywhere. During election years, “optics” matter. We ensured we had the right agents for the job and made sure we were all able to blend in. Our main task was, of course, the Principal's safety. As a dignitary, our client had to reach out to every state. The problem with that is that some areas are very dangerous and are even run by criminal factions with warlords controlling the neighborhoods. A solution to this problem was to tap into law enforcement in that area to create and provide an outer layer of security. The next step is to understand how these criminal organizations work. We showed them respect and offered them a “donation” for their services and protection. In turn, they walked us in and made sure we had a safe passage throughout any and all movements we had planned.

Everyone's path is different, not every journey is the same, but they might share similarities. Two main key factors are drive and self-assessment.

Another challenge we encountered was when the Principal traveled to NorthEastern Nigeria, a place where Boko Haram attacks are widespread. We learned from our assessment that

122


FOOT STEPS radio activated IEDs were being used. I brought up a solution to the client, and due to the level of authority my client had, the level of resources and budget were higher. We obtained military-grade radio frequency jammers, tailored for civilian use to counter the remote IED detonators. Q: If someone were to follow in your footsteps, what advice would you give them, and is there anything you would change? Everyone's path is different, not every journey is the same, but they might share similarities. Two key factors are drive and self-assessment. Find your drive, get involved in training, and join a network. I did my training in the US to obtain a different experience. In your core, you have to self-assess and understand who you are and what you want.

Q: How do you balance your personal life with your line of work? Simply put, when I am at work, I am at work. And the same applies when I am at home. I prepared my family very early in the sense that I told them about the nature of my work. I communicate with them as often as I can, and in case of any emergency, they know they could reach me. Alternatively, when I am home, I don't talk about work, and I become a 100% house-husband! Q: Where do you see yourself in the future? What would you like to get involved in? I have a fascination for sharing knowledge and giving back. I see myself helping those who want to get into this field. I would also like to get more into the tech side of security, advising, and consulting on the best tools to mitigate any threat.

Interview by Jose Casillas Jose Casillas is a Los Angles based Executive Protection Agent who specializes in red carpet events, movie premiers & estate security. He also teaches martial arts and works as an Emergency Medical Technician (EMT).

123


CIRCUIT MAGAZINE ISSUE 53 By: Mark “Six” James CPO, EPS, CAS

124


THE ROLE OF CHOKES

In the US, several high profile police cases like the death of Eric Garner, Elijah McClain, and most recently, the horrific death of George Floyd were due to, or partially attributed to, chokes. This has caused municipalities, law enforcement departments, and security companies to question their appropriateness or application in law enforcement. While the discussion right now is about law enforcement, what happens in law enforcement often has a way of trickling down to private security and protective services, as we often share many of the same use of force continuums. First, let me start by saying that most of the general public are engaging in dialogue on a topic they do not fully understand. For the sake of clarity in our discussion, let's break the subject down into four sections. 1. 2. 3. 4.

Definitional Clarity Challenges False Reality Proper Application of a Neck Restraint

125

Definitional Clarity What exactly is a “choke?� A choke involves adversely impacting oxygen from the mouth to the lungs. Term: Choke (Trachea) Merian-webster.com transitive verb. 1. to check or block normal breathing of by compressing or obstructing the trachea or by poisoning or adulterating available air. Dictionary.com verb. 1. to stop the breath of by squeezing or obstructing the windpipe; strangle; stifle. to stop by or as if by strangling or stifling. Strangulation (blood) Dictionary.com noun. 2. the condition in which circulation of blood to a part of the body is cut off by constriction. In martial arts there are


CIRCUIT MAGAZINE ISSUE 53 three basic ways of choking or strangling an opponent, as well as combinations of all three: 1. Compression of the windpipe (trachea) stopping or reducing the flow of air to the lungs. 2. Compression of the carotid arteries on one

Trachea (Air) Choke

Compression of the Chest One of the things officers must remain aware of, particularly when involved in group engagement to subdue a suspect, is the potential for the suspect to lose consciousness from

or both sides of the neck restricting the flow of blood and oxygen to the brain. 3. Compression of the chest and lungs preventing the opponent from inhaling (often used during pinning techniques).

In an air or trachea choke, the inside of the forearm rests against the trachea, and pressure is applied inward. While the technique may cause a lot of pain, it often does not incapacitate an adversary quickly, and because of the force required, it often leads to injury. I am not a fan of the utilization of trachea chokes unless an officer (or agent) is in a deadly force situation, which indicates the potential for severe bodily harm or death to the officer. In that instance, the officer should be able to use the required force up and including lethal if required. Whether that force comes from a firearm, a vehicle, or a choke. inadvertently compressing the chest, restricting the suspect from inhaling. This is most likely to occur when trying to handcuff a non-compliant or violent suspect when multiple officers try to restrain or pin the suspect.

126


THE ROLE OF CHOKES Challenges With any tool or technique, the technique is only as effective as an officer’s initial training and ongoing reinforcement. It does not make any difference if the method is a driving technique, a firearm technique, or a combative one. As a firearms and combative instructor, I have trained many law enforcement officers, security officers, and bodyguards. When it comes to unarmed combatants, most are not very efficient or practical when dealing with a lack of compliance and particularly combativeness when it comes to many less than lethal options. Even long before we get into applying combative skills, it's essential to ask what de-escalation training do the officers or bodyguards actually have? How much recognition of pre-incident indicator training do the officers have? Being able to recognize imminent violence may put them in a more dynamic defensive position to help them prevail in the event the investigation deteriorates.

move a technique from concept to competency. Remember, training exposes a person to ideas, but only proper practice builds skills. An officer or bodyguard that carries a firearm they only shoot once a year when it is time to qualify will never be able to call upon that technique or tool ondemand and anticipate success. So why would we expect different when it comes to either chokes or neck restraints? If departments or individual officers are unwilling to commit to training to build competency, then a call for the banning of certain techniques, including most chokes, is an absolute necessity.

False View of Real World Combat Contrary to popular belief, regardless of whether that belief is held by the public or municipal leaders, no one just gives you a joint manipulation, lock or hold out of thin air and in isolation. Noncompliance, aggressiveness, or combativeness and the required law enforcement response will rarely be YouTube friendly. Real fights are ugly, awkward, Rarely is there enough and often have an time spent in the academy element of ebb and flow, on defensive tactics to where control is gained,

127


CIRCUIT MAGAZINE ISSUE 53 lost, and regained multiple times again before a suspect is subdued. So we must face the facts and realize that fighting for physical control is inherently aggressive by its very nature. In doing so, we need to cleanse our mind and move past our false sanitized view of reality that in these encounters, everything will go perfect like in the dojo or combatives room at the police academy. There is no such thing as clean combat in the real world. As we often say in the martial arts, you have to shock to lock. This usually requires a setup move or some other type of distraction technique (i.e., a finger whip to the groin, twist of the ear, etc.) aimed at changing the suspect’s focus before executing the appropriate compliance technique. Proper Application Rear Naked Choke / Vascular Neck Restraint (Sleeper Hold) The rear-naked choke or the vascular neck restraint, as it is often referred to in law enforcement, is not choking at all. It is an occlusion/ restriction of the blood flow to the brain by impacting the carotid artery. The blood flow falls below a critical level when the carotid sensors tell the heart to reduce the flow rate, which makes the

person lightheaded or lose consciousness. It is actually a very humane technique for dealing with an aggressive or combatant adversary when effectively applied. It is size, strength, and gender-neutral. It is one of the first chokes taught in Judo or Ju-Jitsu because of its ability to quickly incapacitate an adversary (often in 6 – 8 seconds) and often without injury when executed correctly. The recovery time is 2 – 3 seconds after application, and the person regains consciousness again. One of the most critical parts of teaching a choke or a vascular neck restraint is showing the person applying the technique to recognize the signs of either compliance or a loss consciousness and when to release the choke. Mixed Martial Arts practitioners consistently use chokes regularly against very skilled combatants without injury or loss of life. So, is the challenge really the technique, or is it the misapplication? Depending on whether the confrontation starts on your feet or on the ground, the initial move may start from an over (the clavicle) and under (the armpit) move. The bottom hand grabs the meat of the hand or the wrist (approximately where you

128


THE ROLE OF CHOKES wear your watch). If your adversary wants to try and pull your arms down, it forces him to grab higher up on the forearm near the bicep, reducing their

anchor and helps keep the adversary from pulling your arm down from around his neck. The next part of the move, the bottom hand comes

129

leverage. At the appropriate time, your top hand grabs the back of the adversary’s shoulder. This provides an

up behind the adversary's shoulder, and you join your hands together (palm to palm). Here we want to be careful to keep the front of the forearm down and resting against


CIRCUIT MAGAZINE ISSUE 53

the adversary’s back. This becomes the new anchor to help secure the positioning. The next part of the move the

top hand slides right down the inside of the forearm the hand shoots up and directly behind the adversary's hand/

130


THE ROLE OF CHOKES neck right below the curve of the skull and back of the neck (thumb up).

bring my elbows together, removing all the space between my arms and his carotid artery. For The adversary's nose and additional safety and to chin line up with the inside avoid the adversary trying crease of the bend of the to target my face or eyes, I elbow. I like to take my may tuck my head behind right hand and grab my left the adversary’s back to bicep; my left hand often protect my face. grabs my right shoulder. I squeeze and inhale and Here is a perfect example

where the neck restraint can be used to protect an officer and the suspect. The officer finds himself in a struggle with a suspect when a knife falls to the ground. Rather than immediately breaking contact with the suspect and transitioning to his

131

firearm (a lethal tool), the officer instead positions himself behind the suspect and executes a vascular neck restraint. Approximately 8 – 10 seconds later, the officer renders the suspect unconscious and can handcuff him without


CIRCUIT MAGAZINE ISSUE 53 we do not call for banning all firearms. Instead, we enact a multitude of other measures. We provide better training, discipline the officer, or institute a protocol change to the department to bring about the desired result that reduces the likelihood of harm to any person involved. So, before considering banning all chokes or neck restraints, we must increase our own education and knowledge of the application so that we can speak both intelligently and practically about the subject. This is a useful and effective non-lethal measure when used competently in the further duress. Here we see toolbox of law enforcement where we could use a less or private security. As a than lethal option to subdue non-lethal force, we might the suspect and avoid the fare better to increase deadly force outcome. competence in use and application and delivery of In closing, if officers have the technique rather than an accident in their vehicle, an all-out ban. intelligently and police officers have and practically about the accidents all the time, we do subject, before we take this not call for a ban on patrol very useful tool out of the cars. Or if an officer misuses box of law enforcement or a firearm in an encounter, private security. Mark “Six� James is Founder and Executive Director of Panther Protection Services, LLC. He is an internationally published author, keynote speaker, security consultant to educational institutions and frequent contributor to several print, broadcast and online media. Panther Protection Services is a full-service protection agency focusing on Risk and Crisis Mitigation, Protective Services, Self-Defense Training, and Firearm Instruction. www.pantherprotectionservices.com

132


133


CIRCUIT MAGAZINE ISSUE 53

Virtual Events (BSIA) Security – Return to Normality? July 15, 2020

GSXPLUS (Global Security Exchange Plus) Sept 21 – 25, 2020

How are we attracting people into the industry and what will be the requirements of public protection post COVID-19, and what can we do to raise the perception of the role of the security officer?

From COVID-19 and return-to-workplace (RTW) strategies to campus security, challenges are adding up for security professionals. GSX+ was developed to provide timely content to amplify the voice of the global security industry in managing today’s most pressing issues and showcase global best practices, products, and solutions. Learn more about the decision to move to a virtual experience.

Counter Terror Business 365 July 16, 2020 lockdown has seen us unite as a nation but at the same time it has opened a new network of opportunity for terrorists. Online activity has doubled since the beginning of lockdown and experts fear that this will enable radicalisation and recruitment opportunities for terrorists and, as such, increase the threat to our way of life. Protecting our Critical National Infrastructure (CNI) is of paramount importance.

ISC West 2020 Virtual Event Oct 5 -7, 2020

(SIA) AcceleRISE 2020 July 27 – 31, 2020

ISC West 2020 Virtual offers the chance to uncover showcased technologies and solutions from leading security brands, the virtual event allows you to discover what’s new, next and innovative for your business, from the comfort of your home or office. A 3-day agenda, featuring high-profile Keynote speakers, Virtual Vendor Solution Training Sessions, and more, in addition to virtual opportunities to connect with other security & public safety industry professionals.

AcceleRISE is an essential experience designed to help tomorrow’s security leaders get a leg up in their career development and industry knowledge and connect with other rising stars in the industry.

Behavioural Analysis Week Oct 5 – 8, 2020 Live online presentations exploring how hostile or criminal intent can be identified through the observation of behavioural indicators and the use of tactical risk analysis and non-racial profiling techniques.

134


INDUSTRY EVENTS

Live Attendance Events (Monitor the event sites for Covid19 updates and any changes to schedules) Physical-Cyber Convergence Forum Aug 26, 2020 Phoenix, AZ

International Security Expo 2020 Dec 2 – 3, 2020 London, UK

Managed Security Services Forum Sept 17, 2020 London, UK

ISC West 2021 March 23 – 26, 2021 Las Vegas, NV

Security 500 Conference Nov 16, 2020 Washington, DC

ASIS Europe 2021 31 May – 2 June, 2021 Prague, Czech Republic

Do you have a security event that is not listed here that you would like our readers to know about? Contact us: info@circuit-magazine.com

135


CIRCUIT MAGAZINE ISSUE 53 The Protected, A Book by Mike Trott

Executive Protection in a Complex World

YOU WILL NOT FIND definitions in Webster’s Dictionary for executive protection or close personal protection. However, these terms can be defined as measures taken to ensure the safety and security of a person or persons who may be exposed to elevated personal threats, risks and/or vulnerabilities as a result of their title, position, employment, public profile, wealth, associations and geographical location. In other words, executive protection (EP) involves a person with specialized skills – as well as a particular mindset and sense of dedication – keeping another person safe, even at their own peril. Of course, people in the profession understand it frequently goes even further. Often, experienced and polished

EP professionals will also provide their principals with a limited level of executive and personal assistance while on travel and serve as coordinators and facilitators to ensure itineraries, travel and events are kept on schedule. If we take the definition another step further, it could also be described as

136


EP IN A COMPLEX WORLD providing principals with a certain peace of mind regarding their personal safety, security and privacy that allows them to focus on their executive roles and leadership responsibilities. Principals requiring protection today are a more diverse and dynamic group than ever before. While wealth isn’t the only motive for someone to request or require personal protection, it is often the reason for it. The number of ultra high net worth (UHNW) individuals and families has been on the rise for many years now. In March 2018, Forbes identified 2,208 billionaires from 72 countries and territories. In the U.S. alone, there are over 500 of these ultra-wealthy people. CNBC reported that there is a new billionaire somewhere in the world every two days, with Asia leading this growth. But you don’t have to be a billionaire to need or consider a level of executive protection. People using EP can often require various levels of assistance to facilitate their very active lifestyles, travel and exposure. They may represent governments,

137

organizations, corporations and/or influential family dynasties, but can also be key decision-makers and social influencers. Some live to push the limits of exploration and invention, taking dangerous but calculated risks as a part of their norm. The EP programs that protect such people usually evolve over time, beginning with the individual and then extending to the family; in most cases, coverage includes an office and one or more residences. Normally, the protection at some point involves travel support and begins to slowly cover other aspects of a principal’s life. As it does, the need for additional security facilitation by trained professionals grows with it. Eventually, if a program is developed for a corporate executive, a separate program for the family outside of the corporate program may be necessary to meet the security requirements. Policies and procedures help establish an operational foundation and maintain consistency, but it is still important to recognize that EP encompasses more elements of an art than a


CIRCUIT MAGAZINE ISSUE 53 science. Every principal, every family, every threat and every individual’s risk appetite is different. If the only standard of achieving effective close protection was keeping someone alive, the evaluation process would be simple – but flawed. Executive protection goes well beyond just protecting another life, and it’s in this area that there can be major variances in the capabilities of those providing these services. Therefore, principals should have the right expectations of the EP provider(s) they have hired. When capabilities and expectations don’t match, just like with most services, the result will be eventual disappointment on both sides. No individual or program can predict with 100 percent accuracy when and where close protection may be required. Organizations, executives, officials, UHNW individuals, families and everyday citizens can and will occasionally find themselves at the wrong place at the wrong time, as we have tragically witnessed in many places around the world. In some cases, it might be a matter of preemptive response or reaction by you or your EP team that makes the difference. In June 2017, we witnessed this type of successful response when three Capitol Police

Organizations, executives, officials, UHNW individuals, families and everyday citizens can and will occasionally find themselves at the wrong place at the wrong time, as we have tragically witnessed in many places around the world.

138


EP IN A COMPLEX WORLD “The Protected clearly illustrates both the rewards and risks that come with our growing reliance on technology to aid in protection. Mike’s detailed and insightful look at cybersecurity makes this a must-read for those in the world of executive protection.” Marie O’Neill Sciarrone

Former Special Assistant to the President for Homeland Security; Former Senior Director for Cybersecurity and Information Sharing Policy

special agents assigned to House Majority Whip Steve Scalise were on site during a congressional baseball practice session in Alexandria, Virginia, for an upcoming charity game. On this very early summer morning, an unstable and politically disgruntled man arrived at the ballfield armed with a rifle and the determination to kill; he began to open fire on Republican representatives who had only ball gloves in their hands to defend themselves.

who were supported by responding Alexandria police officers on the scene. It was immediately determined that if the protective agents had not been there that fateful morning and prepared for duty with the proper training and mindset, Congressman Scalise may have been killed – and likely many more might have been injured as well.

Sometimes, EP may seem unnecessary, cumbersome or intrusive – and, in most cases, you’ll never be When the dust had settled, provided advance notice many were injured but of the need for it. But in fortunately only the the right circumstances, attacker died from return your EP may actually hold fire by Agents Griner, the line between life and Bailey and Cabrera, death. The Protected is now available at Amazon, B&N and other retail bookstores via: https://www.theprotected.us/buy Michael Trott is a respected and accomplished international security and intelligence professional with over 30 years of combined military, CIA, Fortune 100 and private sector experience serving corporations and ultra-high net wealth principals and their families. Traveling and operating in over 90 countries and living abroad for more than a decade of his career, he continues to provide confidential advice and assistance to a diverse group of international clients. Currently, he serves as Vice President, Global Safety and Security for Discovery Land Company.

139


CIRCUIT MAGAZINE ISSUE 53

Keeping Your Edge:

The Great Divide Question: Where do you get your broadcast news? From a US perspective, the majority of agents might name one of the BIG 3, which are FOX, CNN and MSNBC. Additonally, by answering that question one might also formulate an opinion on your political stance.

Keeping Your Edge: Action vs. Reaction

Fox may align you with the Republicans (the “right”), MSNBC with the Democrats (“the left”), and throwing a wrench into the works, CNN which in previous years might have been considered moderate or undeclared,

By: Elijah Shaw

would these days also be placed firmly on the Democratic left. Be it the New York Post, the New York Daily News, or the Wall Street Journal, our print news could also allow for similar

140


KEEPING YOUR EDGE conclusions to be drawn. In the past, those would be passive conclusions; a person sitting next to you on the subway could observe what you were reading, or you visited a friends and there was a certain station their parents tv was always tuned to. However, in this new era that we are in, the consumption of news is no longer a passive act, but an active one. Media is not just digested, but regurgitated and rebroadcast to any within our social circles. In many cases this occurs with such frequency that it not only paints a part of the picture of the individual, it becomes the entire painting. In fairness or not, the act of retransmitting news media can be interpreted as an endorsement of the totality of the views. Adding an additional layer, readers/viewers are allowed to engage and interact with the news in ways that far surpass the past. Gone are the days where you

141

could agree or disagree with a newsperson and have to mail a letter into the editor in the hopes that it would be read, and in extremely small cases, reprinted. Now with just a few motions of the thumb we can become our own anchormen and women, summing up stories, and re-presenting them to best fit our needs. This era has even given rise to the word “Fake News,� that can mean two diametrically opposite things depending on what side of the political spectrum you stand on. With social media we can now amplify the positions of others, and usually do so in a way that reinforces our personal viewpoints. With that said, why do I think this is an important enough subject to devote an entire column of Keeping Your Edge to? Surely there are more relevant topics in the world of Close Protection. I mean, we could be talking about


CIRCUIT MAGAZINE ISSUE 53 my missions, which is to pay it forward by alerting others to potential pitfalls in the industry, so there is a frame of reference they can call back on when making decisions. In this case the decision is whether to post, or repost news, which by The answer to this comes the very nature of the society we are in today, in the form of wishing causes others to take to stay true to one of cover and evacuation drills, or the best ways to field strip a weapon, but instead I’m devoting precious space to discussing, “likes” and “shares,” of news articles on social media. What’s that got to do with Protection?

142


KEEPING YOUR EDGE

With social media we can now amplify the positions of others, and usually do so in a way that reinforces our personal viewpoints.

143

a political stance and draw a line in the sand of support or opposition. The byproduct of this, is that opportunities that you never knew could be yours, can evaporate overnight because the perception of your position removes you as a candidate for a work opportunity. Now is this fair? No. Would the decision maker admit it, if confronted? Perhaps. In many cases, the hiring manager, detail leader or agency owner isn’t coming from a place of their own biases, but thinking about their clients, and asking themselves, can I put an agent who is LEFT with a client that is RIGHT? Now the textbook answer should be, yes. Protectors are impartial, and just there to do the job, not insert their personal opinions or viewpoints. However the reality is different, because as illustrated above, the picture painted due to the amplification of political (and in some cases socioeconomical) positions takes over, and


CIRCUIT MAGAZINE ISSUE 53

I am not telling you that you shouldn’t have political views or opinions. I am also not telling you that you shouldn’t share, like, or comment on news stories or articles if they come from a certain organization or another. that’s all the decision makes sees. Therefore, they just assume they will limit the risk by removing you from selection. Don’t get me wrong, I am not telling you that you shouldn’t have political views or opinions. I am also not telling you that you shouldn’t share, like, or comment on news stories or articles if they come from a certain organization or another. Instead, I am saying that we as protectors have to be aware of the potential ramifications

of those actions, even if delivered with the best intent. As such, it stands to reason that those that are more established have more flexibility to voice their opinions and take more potentially polarizing stances. However, newer agents should be especially cautious, as they might not be able to weather the financial drought that could accompany the decision. In any case, all agents should consider the big picture and realize that the things we do live beyond the moment.

Elijah Shaw is the National Director of the North American Bodyguard Association and the CEO of ICON Global, and International Executive Protection Consulting Firm. Elijah, who has been featured in international publications such as Inc. Magazine, Entrepreneur, and Portfolio, runs the ICON Academy, an EP Training Program specializing in Celebrity & VIP Protection. He also currently sits on the Board of Directors of Executive Security International (ESI), the United States oldest Executive Protection Training School. His book, An Introduction to Executive Protection & Touring: A Guide to Mastering the Business of VIP Security, hit the Amazon best sellers list, and is available now worldwide.

144


ROBINBARRATT@YAHOO.COM 145


CIRCUIT MAGAZINE ISSUE 53

146


CLASSIFIEDS

Email: info@circuit-magazine.com United Kingdom 3D Security Ltd Taunton, Somerset, TA1 1TG Based in Taunton 3D Security provides security services for a wide range of clients. Whether you need a security guard in Somerset, event security in Leeds or Close Protection in London we will provide a solution for your needs. T: +44 (0)1823 253 001 W - www.3dsecurity.org E - enquiries@3dsecurity.org.uk A.B.I. Solutions A.B.I Solutions is a dynamic, forward thinking company, specialising in surveillance, security and investigations with local, national and internationalexperience. A.B.I provides a wide range of services to the corporate sector and individuals alike. W - www.abisolutions.co.uk Amanda Campbell A highly motivated and experienced female operative both CP and Surveillence training T – 07596542249 W - www.amandacampbell.org.uk E - ac@amandacampbell.org.uk Alex Morgan - Close Protection Officer I am a hardworking, enthusiastic and committed person. Adaptable and driven, I have great attention to detail and high standards. I am honest, reliable, friendly and work well as part of a team as well as on my own initiative. I am also a good listener who has the ability to communicate with people at all levels. I am comfortable, both taking and issuing direction. I am looking for the opportunity to apply and expand my skills. E: adsmorgan74@gmail.com T: 07775 636964 Ambassador Security Management ASM MK Lions Arena, Grafton Court, Snowden Drive, Winterhill, Milton Keynes, MK6 1AJ, GBR. After successfully gaining ACS (Door Supervision and Manned Guarding) along with ISO 9000, we here at ASM have a dedicated management team with hundreds of years combined experience in the security industry. W: www.asmsecurity.co.uk E: scott@asmsecurity.com T: 08458335750

Amber Security and Protection United Kingdom At Amber Security and Protection Ltd we pride ourselves on providing a bespoke and tailored Close Protection, Residential Security, World Class Travel Security and Risk Management service to all our National and International clients. The Directors and Senior Operators are former military, law enforcement or special forces personnel who are fully operational SIA licensed close protection operatives who have over 40 years experience in both the military and civilian private security sectors. E: info@ambersecurityandprotection.com T: 07425868014 (07540392093) W: https://ambersecurityandprotection.com Ark Personal and Asset Protection Ark, 2b Crow Lane, Rochester, Kent, ME11RF, GBR A small, efficient, highly descrete company employing ex special forces and detectives for all civil and corporate covert needs. E: Office@arkprotect.com T: +0044 01634 845526 Argus Europe County Durham Argus Europe has been providing specialist training for high-net worth clients and their families for close to 20 years, worldwide. Argus Europe now offer accredited training for CPO’s, Surveillance Operators and Private detectives. Argus Europe is an operational company working globally with an extensive variety of contracts. W: www.arguseurope.co.uk T: +44 (0) 8456 123 843 Atlantian Business Solutions Group Rutland, LE15 6SD, GBR Atlantian Business Solutions has been designed to help both individuals and New Companies build for the future as well as support others with training needs. T: 07725970954 W: www.atlantianbsgroup.com E: info@atlantianbsgroup.com Briareus Security Our aim is to give a complete, discreet and professional service to all of our clients, be they large corporations, small businesses, local authorities or private individuals, all tailored to meet their individual needs. W: www.briareussecurity.com E: info@briareussecurity.com

147


CIRCUIT MAGAZINE ISSUE 53 Mark Corder - Chief Executive of Carmdale Ltd Suite 3 219 Bow Road London E3 2SJ Mark is a former Senior Police Officer specialising in counterterrorism; firearms; public order; training and also physical, Critical National Infrastructure and nuclear security, having had responsibility for the security of the UK’s nuclear deterrent. A former Head of Operations, Operational Support and Training, Mark has been involved in a number large-scale incidents (including 7/7) and has also worked at the Office for Security and Counter Terrorism (OSCT) at the Home Office as part of a review into Critical National Infrastructure security. Mark has an MBA via the OU. E: mark.corder@carmdale.co.uk T: +44 (0)844 995 9900 W: www.carmdale.co.uk Alastair Christie Advice on site security, perimeter fencing, lighting, CCTV and manning requirements. Monitor and advise on guard force setting up site procedures and guard SOP’s. T : +44 (0)7736 328112 E : ally.c9496@yahoo.co.uk Control Risk Management Solutions - CRMS - Ireland Executive Close Protection Operations & Training (B Tec Level 3 Diploma Edexcel) Threat & Risk Assessments, Consultancy Services. W: www.crmsinternational.com E: martin@crmsinternational.com Crest Security & Surveillance Ltd 51 The Crest, West Heath, Birmingham, West Mids, B31 3QA, GBR Highly experienced Security Consultant with a proven record of accomplishment in the field of protective security. Skilled in all phases of risk assessment, operational planning, logistical organisation, implementation of security measures, security team leadership, project coordination, and delivery of security advice to a high profile clientele. E: info@stephencahill.co.uk T: 447977071427 CSI Protection Ltd International, GBR A well established security consultant and personal protection operative providing high or low Key protection to high risk and prestigious clientele. Specialising in the maritime industry as a consultant for private vessel protection on super yachts world wide. W: www.csi-protection.co.uk E: gary@csi-protection.co.uk Custodia Custodia is an independent client focused Specialist Security & Risk Management Company, specialising in Risk consultancy and Security project management. Providing a comprehensive portfolio of Risk mitigation solutions to assist Businesses and individuals to plan for, manage and mitigate risk. T: 01432 277693 W: www.custodia.co.uk Daniel Gentry Close Protection Operative I am a former RAF Regiment Gunner with 8 years experience, including various command roles and operational tours of Iraq

and Afghanistan. My previous role as a behaviour specialist saw me de-escalating potentially dangerous situations on a daily basis. These two jobs combined have put me in a position where I am now very effective at managing not only a variety of situations but also a variety of different people, often from very diverse cultures. E: dangentry@hotmail.co.uk T: 07445181281 DF Risk Management Solutions DF Risk Management Solutions N.I. is a modern, professional risk management company, with a diverse range of global strategic experiences and a team of executives who possess dynamic but complementary backgrounds. T: +44 (0)7837642686 +44 (0)7758743918 W: www.dfriskmanagementsolutionsni.com Executive Protection Officer Worldwide CP services W: www.executiveprotectionofficer.com First Class Executive Security Nottingham, UK, Nottingham based, full-service company specializing in Bodyguards and Security Consulting services. Extensive experience in VIP security, also caters for public and private sectors. W: www.firstclasssecurity.co.uk T: 0115 9266466 G6 Global G6 are specialists in all types of radio, telephony and satellite communications for both voice and data with particular emphasis on covert communications installations in both vehicles and fixed locations. In addition, our range of personal covert radios and bespoke accessories is extensive. W: info@g6-global.com T: +44 (0)1454 610050 Gordon Russell Highly trained frontline Close Protection Operatives available for UK and International contracts. Our experienced CPO’s can offer bespoke packages to meet all clients needs, including a variety of language skills. All SIA licenced, BBA member E: Bodyguard-cpo@Email.cz T: +44 (0)7917 281 004 Gareth Evans - CPO, MSO Reliable dedicated hard-working security professional, with outstanding communication skills. Strategic approach to problem solving combined with exceptional interpersonal skills, quick to grasp new concepts and information. Highly motivated, results-driven and thrives under pressure. Strong leadership and management skills with proven experience committed to continuous personal and professional development. E : evansgareth1979@yahoo.co.uk T : +44 (0)7900058603 James Izett All close protection task undertaken, including training tasks. Medic (Registered with the HPCSA, Registered FAAW instructor and Assessor E : J.Izett@gmail.com T : +971 (0)505 574 350

148


CLASSIFIEDS Janice Gurney Proficient and diligent Security Professional gaining extensive knowledge and experience within the security sector. Proactive individual who has a logical, flexible and conscientious approach to all challenges undertaken, ability to work as a member of a team or as an individual willing to work anywhere. T : +44 (0)7885 793061 E : janice382006@gmail.com International Centre of Special Training International Centre of Special Training is an international training and security company based in the United Kingdom. Its priority objective is to provide services to the highest level. W: www.icost-team.com T: +44 796 736 55 65 IPSS Security Northfield, Aberdeen, AB16 7EX Security and protection services - UK and overseas. BBA Member. T: + 44 (0) 1224 69455 W: www.ippssecurity.co.uk ISS Training Ltd Riverside Cottages, Nidd Walk, Pateley Bridge, Harrogate, HG3 5NA ISS Training Limited are providers of specialist covert surveillance training courses and publications to the security and investigative industries, enforcement agencies and specialist military units. Formed in 1990, we are the longest established surveillance training ompany in the United Kingdom. Our credibility and reputation is widespread and we offer nationally recognised qualifications. BBA Member. T: + 44 (0) 1423 712265 W: www.intelsecurity.co.uk Jason Morris Security Hertfordshire, UK Providing a wide range of Door supervision/security for V.I.P and prestige venues, Concerts, Functions, Corporate and Personal Security, Weddings, Private Parties, Gala Dinners, Business Awards & School Proms, Close Protection and Body Guarding Static Guarding and Stewards. T: 01462 478900 W: www.jasonmorrissecurity.co.uk E: agosselin@jasonmorrissecurity.co.uk

Michael Boreland Close Protection Officer Since leaving the British Army in 2006 I have been working in hostile environments for private security companies in various roles ranging from Training & Close protection. I have successfully managed a training wing in Afghanistan providing security operations training for local nationals & Expats conducting operations in the region I believe with my skills and experience of the employment I have done in the past I would be an asset to any organisation taking myself on as an employee. mike.boreland@gmail.com MLK Security and Protection Services Swindon, UK Close Protection Officer and Door Supervisor E: mattleekane@hotmail.com T: 07917654978 LJE Security Services North Yorkshire, HG1, GBR Close Protection, Residential Security, Asset Protection, VIP red carpet Security and Private Investigation. E: leanneedmondson@yahoo.co.uk Oliver Mike Close Protection Operative I came from Hungary and live in the Uk in London since 2014. I was a Police Officer for 23 years as a Counter-Terrorism Specialist. Next to the police I became a Close Protection Operative and self-defense instructor (Krav Maga). I was a member of the International Krav Maga Federation (IKMF). During my service I have been protecting Hungarian Prime Ministers, Interior Ministers, Foreign Ministers, Ambassador of Israel and other politicians of other countries. E: info@formerpol.com T: +447413190349 W: www.formerpol.com One Events Grantham One Events offers you a stress free solution in the organisation, putting together and running of an event. Thisis accomplished by having a group of specialised companies from different industries working together for a more complete service for you. TEL: 0870 974 6779 W: www.oneevents.info

John Featherstone Security professional with operational experience gained in a variety of theatres. Main specialities close protection and surveillance. T: 24hrs : +44 (0)7702 740722 E: john@johnfeatherstone.co.uk W: www.johnfeatherstone.co.uk K9 Support Services Ltd K9 Support Services UK Ltd is a supplier of specialist drugs and explosives dog/ handler detection service (which includes arms & ammunition) to individuals, businesses, and the public sector. T: 0845 643 6393 E: info@k9support.org.uk Logas International Tyne & Wear, SR1, GBR Front line SIA, International CPO. Private Investigation and Surveillance operator. E: wscarr@logasinternational.com

Paul Lovatt – CPO After serving 15 year in the Army a move to the Security Industry was a natural step, during the last 10 years I have worked in almost every role in the industry from Door Supervisor and loss prevention to Operations Manager and Director. I have been responsible for the creation and implementation of highly successful crime reduction schemes across Yorkshire working closely with other agencies in the areas of responsibility. Currently I am responsible for the overall running of large events security teams from stewards to Close Protection Officers. Operational planning, contingency planning and flexibility are I feel among my key strengths. E : paul@deltasecurity-eventmanagement.co.uk T : +44 (0)7506726336 Paul Tyler – VIP Protection & Concierge Specialist in discreet personal protection & surveillance. A good current working knowledge of London & its challenges gained through ongoing high risk security operations. Experienced in

149


CIRCUIT MAGAZINE ISSUE 53 dealing with high net worth clients with all matters security & concierge striving go the extra mile to exceed expectations through thorough planning & interaction with all involved parties. A strong communicator with a smart appearance who remains synonymous with the principals lifestyle, whilst discretely ensuring a safe environment is maintained at all times, physically capable of adopting a higher profile when required to do so. Demonstrates sound judgement and capability to operate with great levels of autonomy. Exceptional interpersonal skills with the ability to understand, interact & connect with a diverse range of people. E : paul@apparitio.co.uk T : +44 (0)7552515604 W : www.apparitio.co.uk Plymouth Close Protection Highly versatile, physically fit and accomplished security professional with cumulative experience in the areas of security management, close protection, crisis management, risk assessment, emergency management, asset protection and security training. E : chris@plymouthcp.co.uk W : www.plymouthcp.co.uk T : +44 (0)1752 500807 PPSS Group Body armour and stab vests provide a functional solution to individuals who require extra protection in their chosen vocation. All PPSS (formerly ASEO) body armour and stab vests are certified by the UK’s Home Office (HOSDB) and offer unrivalled protection from blunt trauma caused by a punch, blow or kick. Based on our professional frontline experience and extensive research we can confirm that an impact based assault is a more likely event than an attack involving an edged weapon or firearm. T: +44 (0) 845 5193 953 F: +44 (0) 1765 603 512 E: info@ppss-group.com W: www.ppss-group.com Presence Security Presence Security (“ PS ”) is a bespoke security company providing protection for private individuals and VIPs, as well as security services for businesses and organizations. T: 0800 002 9734 E: info@presencesecurity.co.uk Prestige Risks LTD 27 Old Gloucester Street, London, WC1N, 3AX, GBR. Close Protection Secure Chauffeurs Surveillance Residential Security Executive Protection Security Guards Asset Protection T : +44 (0)207 5588182 E : info@prestigerisks.com W : www.prestigerisks.com

Prosec Consultancy Limited are dedicated in providing a professional service, which covers a whole range of security services throughout the security industry. T: 01373 228055 W: www.prosec-ltd.co E: info@prosec-ltd.com ProTouch Security ProTouch Security is one of the UK’s key providers of event safety, event security, crowd management, door supervisors, stewards, event management and health and safety. T: 01724 279 522 W: www.protouchsecurity.co.uk Python Security and Protection Ltd Providing Close Protection Officers and Door Supervisors for Events and Venue Security. E : mattleekane@hotmail.com Radoslav Savkov - CPO / Security Consultant Oxford - United Kingdom I would introduce myself as a high calibre Security professional with strong customer oriented skills and managerial experience in the Security Industry, interested in a challenging position, which would fully utilize competences gained and provides opportunities for professional and personal development. With 15 + years of international experience in the sector at all levels and a military background (National Service) as well as a practical Close Protection experience in an executive environment, corporate intelligence and investigations. As a Security professional, I never consider my training and development as a complete, therefore I always look to update further my skills and knowledge. In personal plan I am very loyal, discreet , independent and willing to embrace challenges. E: r.savkov@gmail.com T: +44 (0)7886591525 RSM Security UK Ltd London, UK RSM Security UK Ltd offers the experience and expertise necessary to provide security personnel of the highest calibre when you need them. T: 07850091979 or 07792948523 W: www.rsmsecurity.co.uk E: info@rsmsecurity.co.uk RWSSI Rob W is a professional security consultant with world wide experience and capabilities in Security, Surveillance and Investigation; I can support you to overcome any problems and enable you to achieve your goals E: rob@rwssi.co.uk T: +44 (0)7818 220985

Prometheus Medical Ltd Prometheus deliver unrivalled bespoke emergency medical support in the form of specialist equipment, training, strategic advice and deployed clinical care. T: (+44) 1568 613942 W: www.prometheusmedical.co.uk

SDS Solutions SDS solutions provide our clients with protective solutions that are second to none, our consultants will discuss every aspect of the problems that you are facing that dictate the need for a protective solution, we promise our clients a tailor made service to meet individual requirements. Whether based in the UK or abroad our protective service T: 01453 887815 E: info@sds-solutions.org

Prosec Consultancy Ltd 10 Oakfield business park Westbury, BA13 4WF.

Shadow Close Protection A leading company specializing in Executive Protection as a

150


CLASSIFIEDS professional sector, with participation in high and low risk missions, providing global security solutions and consultancy to individuals, corporations and national agencies worldwide. W: www.shadowcp.gr E: info@shadowcp.gr T: + 30 6948539664 Shaun West United Kingdom SIA licensed, Highly Experienced Frontline CPO. Ronin SA trained. Providing security for both corporate and hostile environments. E: sw@shaunwest.co.uk T: +44 (0)7830 109 601 W: www.shaunwest.co.uk Steve Pittman - Security Manager of Operations I have been active in the security industry for over 25 years in various roles including close protection where I have been responsiblefor the the welfare of high net worth individuals in low and high risk situations . I have also a vast amount of experience in many other areas of there security industry including Door Supervision, Security Management, Event Security, and Residential Security. E: steve@covert protection.com T: 07818800778 Mark Claydon-Smith – CP Team Leader and Medic I have spent 13 years in the Royal Navy Culminating in the rank of SNCO Petty Officer. In 2004 I started my security career and have worked in Hostile environments. I have held several positions including Operations Manager, Team Leader and Rig Site Manager. I have worked in Kurdistan, Afghanistan and Iraq as well as the UK and Europe. E : mark@claydon-smith.com T : +964 (0)7815 970433 Philip Shearman MSyl – CPO, Risk Manager A professionally Qualified Close Protection and Surveillance Operator and Team Leader with over twenty two years of experience gained in the Military Police, the last fifteen of which were spent with the Military Police Close Protection Unit, working in various hostile countries throughout the world. Since leaving the Army in Nov 06 I have worked in the Private Security sector. I have gained valuable experience in demanding and challenging operational environments, where I have proved to be a self motivated and resourceful individual, performing well under pressure, communicating effectively at all levels whilst exercising tact, diplomacy and integrity. E : benshearman10@hotmail.com T : +44 (0)7930 277586 Spotllght Protection Services Essex based business which provides a broad and growing range of security services to businesses and organisations large and small. T: 07870560208 E: info@spotlightprotectionservices.co.uk W: www.spotlightprotectionservices.co.uk Vas Sotiropoulos London, UK I am a security operator with over nineteen years of experience in close protection, counter-surveillance, diplomatic protection, door supervision, and CCTV monitoring in the United Kingdom and Greece. Second Lieutenant in the elite of the

Hellenic Army, the Special Forces. Undertaken a number of close protection courses run by the Greek Ministry of Defence, the VIP Protection Unit of the Hellenic Police, and the Surveillance Department of the US Embassy in Athens. Highly motivated and confident relocated to the UK for further career progression and to install my own footprint in the private security sector. Fully licensed Close Protection Officer by the British Security Industry Authority. E: info@spartanelitesecurity.co.uk T 02038882020 W: https://spartanelitesecurity.co.uk VIPA Tactical Training A specialist training academy dealing with four specific areas of combat: VIPA Civilian Self Protection Program, VIPA Close Protection Combat System, VIPA Police Defence Tactics and VIPA Military Close Quarter Combat. BBA Member. W: www.VIPAtacticaltraining.com Wagtail UK Wales, UK Wagtail UK are international specialists in detection dogs and dog handler training. Established in 2003, Wagtail UK provides detection dogs and related services for government agencies such as UK Border Force, HM Revenue & Customs, Police, Trading Standards and Armed Forces. Wagtail International School of Excellence in North Wales is a fully approved training centre endorsed by Highfield Awarding Body for Certification. T: +44(0)1745 561166 E: info@wagtailuk.com W: http://www.wagtailuk.com Westminster Security Ltd London, UK Westminster Security Ltd are an independent, industry leading private security company in London; providing security and investigation services throughout the UK, EU and worldwide for our clients. We specialise in close protection services; providing ex-military and police bodyguards to many national and international companies, heads of state, royalty, high-profile personalities, CEO's, private individuals and families. T: +44 (0)207 123 4544 E: Info@westminstersecurity.co.uk W: www.westminstersecurity.co.uk Yoji Security We established Yoji Security in response to our perception of declining professional standards across the security industry. We strive to provide first class customer service in everything we do, drawing on our extensive experience in the fields of special operations, intelligence, counter terrorism and close protection. T : +44 7903231076 E : enquries@yojisecurity.com Europe & Africa International Security Academy P.O.Box 5833, Herzeliya, 46000, ISRAEL. zOur graduates are more recognized, respected and sought after by Distinguish Protection service “consumers” and by most of the “Providers” of Protection services worldwide. Organisers of the 2008 International Summit of Protection Officers. BBA Member. T: + 972 9 950 0969 W: www.SecurityAcademy.org.il

151


CIRCUIT MAGAZINE ISSUE 53 Javier Galan Spain - Security specialist available for operations around the world. E: oejju@hotmail.com T: 34.637080771

protection offers, mission support, other. E: wille.heino@gambeson.fi W: www.gambeson.fi

Military Grade Encryption Phones PO Box 52310, Limassol, CYPRUS Built-in encryption software which converts your voice to encrypted data using a constantly changing mathematical formula. It uses a dual layered RSA/AES combination and a changing session key which modifies the encryption algorithm every second. € 1,398.00 + VAT. All prices include new Nokia N73 phone. BBA Member. T: + 357 7777 7276 W: www.protechcy.com/new Nemesis Protection Ruma, Serbia Nemesis Protection is a Risk Management Company specialized in providing viable, bespoke, optimal, feasible and cost-effective security and training solutions for corporations, government institutions, and private clients worldwide. Nemesis Protection offers a full spectrum of services including Risk Advisory, Close Protection, Asset Protection, Security Driving, Surveillance & Private Investigation, Information Security, Transport Security, Staffing, and Specialist Security Training. T: 00381644679650 E: contact@nemesisprotection.com W: www.nemesisprotection.com TPT Firearms Training Bratislava , Slovakia and Rome , Italy We know from our extensive experience within the industry that it can be daunting when initially carrying a firearm and being responsible for protecting a clients life, but learning the proper techniques and having the ability to understand the weapon will make the job a lot easier and more enjoyable. Hopefully you will never have to use the weapons you carry, but should this prove necessary you will be confident and knowledgeable enough to handle the situation professionally and effectively. T : +44 (0) 7734101910 E : info@tacticalprotectionteam.co.uk W : www.tacticalprotectionteam.co.uk Security Concierge Group SCG Special Projects Ltd, Avenida, Bartolome Vicente Ramon No 10, B16, Ibiza, 07800, ESP Security Concierge Group is a privately owned and fully independent provider of exceptional security services to an interesting and varied range of clients. T: 00 34 600 665 275 W: www.securityconciergegroup.com E: joe.buckle@securityconciergegroup.com Wille Heino Security Specialist, Owner Finland Gambeson is a security training & Consulting Company specialized in countering modern day threats. - Security & safety planning for different events. - Security training: Active shooter/Terrorism awareness/Surveillance detection/Other. Security consulting. We are specialized in executive protection related services. Local knowledge, trained and licensed close

Zika Rakita Managing Director Ruma 22400, Serbia Accomplished, result-driven, and highly motivated Close Protection Operative, conducting protective operations internationally. A background encompassing planning, organizing, leading, and undertaking Close Protection operations in both corporate fields and hostile environments. Proven in achieving results and completing tasks on time, discreetly, and to the highest standards. A confident communicator with the ability to sensitively solve a range of clients’ and colleagues’ problems and inquiries. With the ability to use sound judgment and understanding the operational balance and needs. E: contact@nemesisprotection.com T: 00381644679650 Americas Bodyguard Careers Bodyguard Careers is an informational site with the purpose of providing bodyguards with all the information and tools necessary to succeed in the Close Protection Industry Info@BodyguardCareers.com www.BodyguardCareers.com Canadian Use of Force Systems 7975 Yonge St. # 7124, Innisfil, ON, L9S 1L0, CANADA A professional Use of Force and Defensive. Tactics organization teaching a full range of controlled response options for SelfProtection and Use of Force considerations in public and professional environments. BBA Associate Member. T: + 1 705 456 4333 W: www.canadianuseofforce.com Contact Front Photography Contact Front Photography is the world’s 1st photography studio dedicated to the Close Protection Professional. Stop putting generic or pirated photos on your website; instead commission custom shots to best represent you or your agency. T: +1 (612) 369-6134 E: Info@ContractFrontPhotography.com W: www.ContactFrontPhotography.com Decisiones Estratégicas Buenos Aires – Argentina Executive protection specialists we have experienced in all Latin America, for multinationals companies, also providing support in project throughout Latin America to consulting first the US. and UK. We have a team of specialists and psychologists in assistance and crisis negotiation. T: +54(911) 6415 1941 E: jbenitez@d–estrategicas.com W: www.d–estrategicas.com Detective Lacerda P.O.BOX 25996, São Paulo, 05513-970, BRAZIL Providing the full range of security and investigation services throughout Latin America. BBA Member. T: + 55 (11) 3452 4388 W: www.detectivelacerda.cjb.net Giovanni Rossi South Africa

152


CLASSIFIEDS Doctorates in Criminology, Vessel Security Officer, ASP Instructor, ISSPC Member, BBA Member, IAPPA Member, American Bodyguard and Protection Instructors Association Lifetime Member E: rossi1@mweb.co.za T: +2783 415 9205

domestic and international travel. Robert E. Jones Manager/CEO W: www.silver-star-protection.com E: rejones@silver-star-protection.com TSICS (T6) Miami, Florida, USA TSICS (T6) provides the following services in Central America: Executive Protection, Individual Bodyguard, Close Protection Training, Corporate Invest. W: www.security-professionals.org/members/saldrix E: tsics.t6@gmail.com T: +502 6645 6822

USA Global Bear Protection PO Box 11488, Jackson, Wyoming, 83002, USA Provision of British and US Ex Special forces security/medical specialists. T: 307 413 3619 W: www.globalbearprotection.com E: bear@globalbearprotection.com Icon Services Corporation 1043 Grand Ave. #312, St. Paul, MN 55105, USA A full service security and investigative agency specializing in providing high-level security and bodyguards to international celebrities, public figures and corporations. Licensed, bonded and insured, our diverse roster of clients reads as a virtual who’s who in the corporate, motion picture, fashion and recording industry. Icon has been the hand picked choice to provide Executive Protection to everyone from Superintendents to Supermodels. BBA Member. T: + 1 651 695 8778 W: www.Industry-Icon.com Imperial Protective Service, LLC 15849 N. 71st Street, Suite 100, Scottsdale , Arizona, 85254, USA Imperial Protective Service’ (IPS) is a security consulting and services firm founded in 1978. IPS provides both national and international corporate, executive and celebrity protective services. BBA Member. T: + 1 480 281 1588 W: www.executiveprotect.com Panther Protection Services 3695F Cascade Road, Suite 2207, Atlanta, GA 30331 Panther Protection Services is a full service protection agency offering such services as threat assessment, executive protection, self-defense training, firearms instruction, and high risk tactical protection. Our executive protection specialists have over 75 years of experience. Panther can handle your protection needs whether around the corner or around the world. Member: BBA and NABA T: (404) 349-9117 W: www.pantherprotectionservices.com Rouven Rohler - Security Consultant / HSE liaison - Romania I am a very fit and mentally robust Security Specialist with quality experience gained in the security (Military, Maritime and Commercial Operational Security (Oil& Gas). I have improved the effectiveness of protection teams and significantly enhanced clients’ awareness. My career commenced in the Australian Army, which included hostile environment deployments to Iraq and the Solomon Islands and I have since been operating on various contracts throughout Afghanistan and Iraq. E: rouven@y7mail.com T: +40 (0)746 642 739 SILVER STAR PROTECTION Executive protection, site and event security with global experience. Serving southern Minnesota with integrity and professionalism. Former USSS, ICON Alumni. available for

153

Tony Scotti’s Vehicle Dynamics Institute 1162 St. Georges Ave, Suite 277 , Avenel, NJ 07001, USA The first name in advanced driver training, offering our highly acclaimed Protective/Evasive Driving Programs. Designed specifically for today’s executive chauffeurs, executive protection professionals and others who are responsible for providing safe and secure transportation services. BBA Member. T: + 1 732 738 5221 W: www.vehicledynamics.net Vindex Personal Protection & Investigation Inc. 497 Hooksett Rd #365 Manchester NH 03104 603.289.3161 / Full service Private Investigations & Executive Protection. 10 years combined Law Enforcement, Private security, close protection work, & security contracting. NY Mayors, U.S. President’s, NFL owners, and VIP’s are some of the protection work I’ve gained experience with. ICON alumni, NABA member. T: + 1 732 738 5221 E: vindexinc@aol.com W: www.vindexinc.com Asia Pacific Asia Protective Group Ltd Asia Protective Group (APG) is a Hong Kong based risk management company, specializing in executive protection, overseas travel security and security consultancy services. APG has an extensive network of security specialists operating throughout the Asia Pacific region. W: www.asia-pg.com E: jim@asia-pg.com E: yvonne@asia-pg.com New Zealand Security Investigations & Risk Solutions LTD We are dedicated to providing professional and effective security solutions for your personal or business security requirements. S.I.R.S is one of the only security companies in New Zealand with ISO 9001 and ISO 18788 Running the most advanced security management system Track-Force to help S.I.R.S security operations with real-time reporting and lone worker technology. With a combination of Military and Security industry experienced staff. We offer high-quality security services and industry recognised training programs with international qualifications in Close Protection, Bodyguards, Maritime Security, Hostile Environment, Firearms Training, Door Supervision, Private Investigations, Surveillance, CCTV Operations, Event Security, Mobile Patrols and Static Guards. S.I.R.S has the expertise and flexibility to meet a wide variety of client needs. E: lee@sirs.org.nz T: 02040787549 W: www.sirs.org.nz


Life can be testing, no matter what you fight. - Keep Fighting.

FOP is for you, whether you wear uniform, a suit, or gym kit.

154


Subscrib e today & save

THE TEAM: UK Editor: Shaun West US Editor: Elijah Shaw Managing Editor: Jon Moss

Subscription means you’ll never miss an issue of the Circuit Magazine again. Subscribers get:

Art Direction: Pete Falkous

• Every issue of the Circuit • Full access to the Circuit website. • Priority delivery of each magazine. • Access to all back issues. • Subscriber only content and offers.

CONTRIBUTORS:

Oliver Carter Orlando “Andy” Wilson Carlton D Smith Mark Roche Jeffery Mayger Dr Mils Hills Mark “Six” James Andy Clark James Bore Ryan Naish Luke Daniel Thomas Bowman Ed Hill Justin L. Johnson Jose Casillas

Our Sincere Thanks to all those that continue to contribute their wisdom and experience for the enjoyment of others The Circuit is compiled, edited and published in the UK and US bi-monthly. W: www.circuit-magazine.com E: info@circuit-magazine.com T: +44 0191 645 0865

TO ADVERTISE: IF YOUR BUSINESS OPERATORS IN, OR SERVES THE PROTECTION INDUSTRY THEN YOU NEED TO SPEAK DIRECT TO YOUR AUDIENCE THROUGH A TRUSTED CHANNEL. GET IN TOUCH TO FIND OUT ABOUT THE GREAT OPPORTUNITIES THE CIRCUIT CAN PROVIDE TO IMPROVE YOUR BUSINESS SALES AND GROWTH. Email: info@circuit-magazine.com DISCLAIMER While every care has been taken to ensure that the information contained in this magazine is both accurate and up-to-date, The Circuit accepts no liability in any part for loss or damage incurred by reliance on information contained in this magazine through omissions, errors, howsoever caused.

New app with more features Get The Circuit Security Magazine with immediate electronic downloads to read on your PC, laptop or smart device.

155

©COPYRIGHT Copyright remains with the authors and contributors at all times. No part of this publication can be copied or reproduced in anyway whatsoever without permission from the publisher AND the author / contributor.


facebook.com/groups/TheNABA/ 156


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

US Foreword

1min
page 7

UK Foreword

2min
page 4

Keeping Your Edge: The Great Divide

5min
pages 140-144

Executive Protection in a Complex World

5min
pages 136-139

Global Security Events

1min
pages 134-135

The Role of Chokes in Law Enforcement and Private Security

8min
pages 124-132

Footsteps: Benjamin Alozie

4min
pages 119-123

Ammunition - Do Ballistics Matter?

7min
pages 112-117

Could the Corona Virus Pandemic Fuel a Resurgence in Maritime Piracy?

4min
pages 106-110

Armour for Security Personnel

5min
pages 94-99

Packing for Adventure

5min
pages 88-93

Social Media Engineering

6min
pages 82-87

ASK THE NABA NETWORK

3min
pages 80-81

Believe in Your Intellectual Net Worth!

9min
pages 72-79

Selecting Firearms for Close Protection Details

6min
pages 66-71

The Baselines of Behavior

13min
pages 54-64

Before & After: The Security Profession & COVID

3min
pages 50-53

Staying Grey

3min
pages 44-48

Covert Cameras

8min
pages 36-43

From Oil Fields to Field Medic and Beyond

8min
pages 28-34

The One Percent

7min
pages 20-27

PREPAREDNESS & PERSEVERANCE

5min
pages 14-19

Industry News

8min
pages 8-13

Global Situation Report

9min
pages 100-105
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.