Circuit Magazine #55

Page 1

News

Opinion

Reviews

Exclusives

Intel

55

COUNTER

NON-VERBAL COMMUNICATION

SURVEILLANCE

BEHAVIORS & ANOMALIES

SOCIAL MEDIA POLICIES

EDUCATION

LOSE THE FEAR

PHISHING HOW IT WORKS WHY IT WORKS

TACTITAL FIREARMS

//

1

KEEPING YOUR EDGE

//

COMMS PLANNING


contents issue 55

14

44

04

UK FOREWORD

07

US FOREWORD

08

INDUSTRY NEWS

14

CLIENTS SHOULD YOU TRUST THEM?

22

COUNTER SURVEILLANCE

30

CRISIS MANAGEMENT AND SOCIAL MEDIA

38

HOW TO IMPROVE YOUR CHANCES WITH CYBER SECURITY HIRING MANAGERS

44

EDUCATION: LOSE THE FEAR, LOVE A PROCESS!

50

PHISHING IS EMOTIONAL

56

DEALING WITH WHAT GOES BUMP IN THE NIGHT

66

BEHAVIORS & ANOMALIES

76

GEOPOLITICAL ANALYSIS

80

PROTECTION PROVIDERS AND SOCIAL MEDIA POLICIES

87

COMMS PLANNING HARDWARE & TECHNOLOGY

94

TACTICAL FIREARMS

102

ASK THE NABA NETWORK

104

GLOBAL SITUATION REPORT

112

EVENT REVIEW

116

INDUSTRY EVENTS

118

KEEPING YOUR EDGE

123

CLASSIFIEDS

2

94


80 50

22

3


EDITOR FOREWORDS

Welcome to another topical and feature-rich issue of the Circuit Magazine! Ordinarily, I like to use our end-of-year edition to reflect back on the previous 12 months and look forward to the new year. And while it won’t be too difficult to look ahead to 2021, what can we say about the year gone? I think I’ll borrow a term used by Her Majesty, the Queen, and simply describe it as ‘annus horribilis.’ 2020 will certainly be remembered as a landmark year in history and will no doubt be spoken about for years to come. So much has happened, the pandemic that has changed the way we live and affected the world’s economy so dramatically is still infecting millions and killing thousands daily. Hats off to all of our health service professionals who are working so hard helping patients recover and to the scientists who are working tirelessly to find a vaccine. Without them things would be so much harder, though we must all continue to do our bit. Maintaining social distance from others, sanitise regularly and if you have symptoms, avoid the workplace. What is clear is that the virus requires a team effort with everyone pulling in the same direction if it’s to be defeated.

to the test. In the world we operate in, sometimes our principals/clients require protection from themselves far more than they do from external sources. There is no doubt you will be tested when operating with clients who aren’t keen on hearing the word “No” or continually being reminded that their actions might be putting themselves or others at risk. Many countries are now entering another lockdown period, if you reside in one of these countries and wondering what to do with your time to stay focused consider your personal and professional development. Look into online training and enrol on courses to learn new skills and polish up those older ones. There are lots of good training opportunities out there, many of which have been made available at no cost at all. It will keep you sharp, motivated and give you some focus. So, don’t write 2020 off completely, turn a negative into a positive and come out of lockdown stronger! As always, we at the Circuit wish you well, please stay safe and continue to read, like, and share the Circuit Magazine, we wouldn’t exist without you!

Protection is an art and COVID has now added many more considerations to factor in when we assess the best way to keep our principals safe. The virus we are facing has provided us with many challenges to deal with, and the resilience of all organisations and management skills are being put

Stay safe Shaun West Editor

4


10 Mar – 22 Mar 2 Sept – 14 Sept

2

21 Apr - 3 May 30 Sept – 12 Oct

5


An Introduction to Celebrity Protection and Touring WORKING WITH THE MEDIA

by Elijah Shaw & Dale June

This is a "Real World" look at the business of VIP Protection and a MUST READ for anyone wanting to learn more about the job, written by those who know it best. I cannot recommend it highly enough.

available now on amazon 6

Miguel DeCoste


CIRCUIT MAGAZINE ISSUE 55

With 2020 racing to the finish line, I want to welcome you to the latest edition of, The Circuit - The Magazine for the Security Professional. Our hope is that you have enjoyed the content produced month after month, content I might mention, that is generated almost exclusively by specialist in the field. While I know we won’t win any awards for literary prose, I do think there’s something to be said about reading quality produced articles written by subject matter experts from all over the world. In fact, I think it’s pretty much impossible to go into an issue and not learn something new. Well, that is, unless you are one of those Super Ninja’s I encounter from time to time.

classified Above Top Secret, so if they were to tell you, black government helicopters would swoop down and lock you up on a CIA Black-site. Soooo… Those guys notwithstanding, for the rest of us, The Circuit has some great news, interviews, tips and reviews, that we hope do our small part to push the industry forward.

How can you help up with our mission? One way is to tell your colleagues about the magazine, as we are sure they respect your opinion. I mean it goes without saying you have great taste, and as such, recommending The Circuit You know the ones I’m taking to others is a great way to about, they are good at everything, having been there round out the year and lay the and done that, more times than groundwork for the next. you can even count. However, Elijah Shaw the details of these things Editor they can’t get into because it’s

7


CIRCUIT MAGAZINE ISSUE 55

Industry News At A Glance

We cast our eye over the main stories impacting the security industry. Here's what's appeared on the radar since the last issue. Peter Lavery elected as next chair of The Security Institute 19 November 2020 London, UK

THE SECURITY Institute has announced that Peter Lavery FSyI will become its new chair from next January, taking over the role from Professor Alison Wakefield PhD CSyP FSyI when her three-year term of office finishes at the end of December. Lavery brings a wealth of experience within the security sector to the role having dedicated many years of pro bono service to The Security Institute. He was voted on to the Board of Directors in April 2017 by the membership, having previously served on the Institute’s Validation Board for several years. Lavery has also held the role of deputy chair since 2018, playing a key role in the Institute’s senior leadership team and overseeing a period of significant and continuing growth and development for the organisation.

appointed by the Board of Directors as the next chair of The Security Institute, which is the UK’s largest professional membership body of security practitioners and increasingly the pre-eminent voice of the protective security profession. Today’s continuingly uncertain political and economic landscape, together with the ever-present threat of terrorism, presents significant challenges and opportunities for our essential workers and organisations, all of whom look to the Institute to help them manage their skills and development during what is a time of protracted uncertainty.”

Following 22 years with the Royal Military Police (including 14 years undertaking close protection operations for the Foreign and Commonwealth Office), Lavery has worked in corporate security across the manufacturing, finance, telecommunications and real estate sectors. Commenting on the announcement, Lavery stated: “I’m extremely honoured to be

Source >

8


INDUSTRY NEWS Former Army Green Beret Pleads Guilty to Russian Espionage Conspiracy November 18, 2020 New York, US

the national security threat posed by our nation’s adversaries, including Russia.” From 1998 to 2005, Debbins served on active duty as an officer in the U.S. Army, serving in chemical units before being selected for the U.S. Army Special Forces. The Russian intelligence agents encouraged him to join and pursue a career in the Special Forces, which he did, where he served at the rank of Captain.

A former Army Green Beret pleaded guilty today to conspiring with Russian intelligence operatives to provide them with United States national defense information. According to court documents, from December 1996 to January 2011, Peter Rafael Dzibinski Debbins, 45, of Gainesville, a former member of the U.S. Army, conspired with agents of a Russian intelligence service. During that time, Debbins periodically visited Russia and met with Russian intelligence agents. In 1997, Debbins was assigned a code name by Russian intelligence agents and signed a statement attesting that he wanted to serve Russia.

Over the course of the conspiracy, Debbins provided the Russian intelligence agents with information that he obtained as a member of the U.S. Army, including information about his chemical and Special Forces units. In 2008, after leaving active duty service, Debbins disclosed to the Russian intelligence agents classified information about his previous activities while deployed with the Special Forces. Debbins also provided the Russian intelligence agents with the names of, and information about, a number of his former Special Forces team members so that the agents could evaluate whether to approach the team members to see if they would cooperate with the Russian intelligence service.

“Debbins today acknowledged that he violated this country’s highest trust by passing sensitive national security information to the Russians,” said John C. Demers, Assistant Attorney General for National Security. “Debbins betrayed his oath, his country, and his Special Forces team members with the intent to harm the United States and help Russia. Debbins’s guilty plea represents another success in the Department’s continuing effort to counter

Debbins is scheduled to be sentenced on Feb. 26, 2021. He faces a maximum penalty of life in prison.

Source >

HMRC Records 73% Growth in Email Phishing Attacks During #COVID19 November 19, 2020 London, UK

Mohammad Sohaib, director at Lanop Outsourcing, added: “Cyber-criminals have not missed a trick when it comes to using the devastating coronavirus to lure unknowing victims into leaking their own private information, such as passwords and payment details, via a phishing scam.

MIt revealed that from March to September 2020, there was an average of 45,046 email attacks per month in the UK. This compares to an average of 26,100 in the two months preceding the introduction of COVID-19 lockdown measures, in January and February. In total, HMRC revealed it had received 367,520 reports of phishing email attacks during 2020 up to September.

“In one such example, scammers impersonated HMRC to trick business owners into believing that their VAT deferral application, a key government support initiative during the pandemic, had been rejected. They would then redirect victims to a website with official HMRC branding, before stealing credit card details.”

During the six months since the start of lockdown, September had the largest monthly quantity, at 57,801 cases, while August experienced the lowest, at 38,096.

Source >

9


CIRCUIT MAGAZINE ISSUE 55 Director denies 'complacency had set in' before Manchester Arena atrocity 19 November 2020 Manchester, UK The director of event security company Showsec denied 'complacency had set in' to its operations by the time of the Manchester Arena bombing. Mark Logan, the firm's 'line manager' for its health and safety department, was giving evidence at the public inquiry into the 2017 bombing, which claimed 22 lives and left hundreds more people injured. Showsec has a contract with the Arena's operators, SMG, for event stewarding.

Giving evidence over video-link to the inquiry, he said there had been a 'management system failure in the delivery of the information and cascading it down to the operation'. Duncan Atkinson QC, on behalf of some of the bereaved families, asked him: "Were costs being kept down at the Arena by allowing that to carry on?" Mr Logan said: "I don't think that was...I never understood that to be the consideration." Nicholas de la Poer QC, counsel for the inquiry, suggested 'complacency had set in to Showsec's operation by May of 2017'. "I don't believe that's the case," Mr Logan said. Suicide bomber Salman Abedi, 22, detonated a rucksack bomb in a foyer area of the Arena, known as the City Rooms, at the end of an Ariana Grande concert on May 22, 2017. His younger brother Hashem Abedi, now 23, was convicted of 22 counts of murder, one count of attempted murder and one count of conspiracy to cause an explosion following a trial in March. He was jailed for a minimum of 55 years in August. The inquiry, which has now been adjourned for a week, is investigating the circumstances that led to the 22 people being killed in the blast. Chapter seven of the inquiry is due to continue on November 30. Source >

Bodyguards on Demand – There’s an App for That! November 1, 2020 New York, US A new app just launched, which allows ordinary citizens to hire bodyguards on demand is being trialled in New York. The app is called bond and users can hire protection for as little as $30 for 30 minutes. The program comes as New Yorkers say they feel increasingly unsafe as the country deals with fallout from a contentious election. One early adopted, Tammy Johnson, is not a celebrity, just an everyday New Yorker - but 2020 has her questioning her personal safety.

"As much as I love my neighborhood, we know that safety is not always at the top," Johnson says. "There has been a rise in the number of homeless folks that are basically throughout the neighborhood where that was not the situation prior and it's a little concerning to me. I'm always out and about and sometimes I'm a little afraid." "There's just the perfect storm of the COVID, politics, rise in crime, all those things combined can create a dangerous situation," her bodyguard says. Johnson's bodyguard is a veteran of the NYPD who spent 20 years with the department's intelligence division. Source >

10


INDUSTRY NEWS Security Research Initiative publishes latest report focused on careers in security business sector 11 November 2020 London, UK THE LATEST report produced by the Security Research Initiative has now been published. Entitled ‘Understanding Influences on Security as a Career/Job Choice: What Those Working in the Security Sector Think’ Professor Martin Gill CSyP FSyI (who led the research) noted: “We’ve discovered that people don’t join the security sector because they don’t know about it. It’s as simple as that. This is a pretty damning indictment, though. Those who do know about the sector generally reflect very positively upon it, noting that it’s varied in nature, obviously important and can even be a lucrative career choice. Going forward, our task as a sector, then, is to ensure that security is no longer a well-kept secret.”

is low paid – and, sadly, that can all-too-often be the case as far as the lower front line roles are concerned – actually disguises the fact that many individuals do, as stated, find commercial security work more lucrative than some of the alternatives (some public sector roles included). However, the very fact that security is seen as low paid by many is an inhibiting factor when it comes to attracting experienced workers, not to mention peaking the interests of those embarking on their first career steps. Professor Martin Gill CSyP FSyI concluded: “During our research, we were pointed to some good work being undertaken by some companies, a range of security associations and, indeed, the Security Industry Authority here in the UK. *Copies of the report ‘Understanding Influences on Security as a Career/Job Choice: What Those Working in the Security Sector Think’ may be downloaded by visiting HERE

The widespread perception that security work

Source >

Fifth of UK Firms Planning to Downsize Security Teams 11 NOV 2020 London, UK

they’re still lagging globally on several fronts.

Over a fifth (22%) of UK businesses are planning to downsize their cybersecurity teams, despite COVID-19 pressures giving the function a greater role at the heart of organizations, according to PwC. The consulting giant polled 3249 business and technology executives globally, including 265 from the UK, in order to compile its Cyber Security Strategy 2021 Report. It revealed that, although 96% of UK respondents have shifted their strategy due to the pandemic, and half claimed that they will now bake security into every business decision,

In terms of headcount, just 16% of global respondents said they are planning to cut the size of their security team, for example, while 51% said they were expecting to hire more staff, versus 42% in the UK. PwC cybersecurity chair, Richard Horne, said it was surprising that so many organizations lack confidence in their cybersecurity spend. “It shows businesses need to improve their understanding of cyber-threats and the vulnerabilities they exploit, while changing the way they think about cyber-risk so it becomes an intrinsic part of every business decision,” he argued. Source >

11


CIRCUIT MAGAZINE ISSUE 55

Weapons charges dropped against former bodyguard for rapper Juice WRLD Nov 18, 2020 Chicago, US Weapons charges have been dropped against two men who were with the rapper Juice WRLD when he suffered a fatal overdose last year. Juice WRLD’s bodyguard, Henry Dean, of Chatham, and a second man, Christopher Long of Buena Park, California, were each charged with misdemeanor counts of carrying a concealed firearm at the airport after the rapper’s entourage was searched when authorities raided his private plane on Dec. 8, 2019, at Midway Airport and found a large amount of marijuana. A spokesman for Chicago police at the time said both men had valid permits to carry a concealed firearm, but the permit did not allow them to carry guns at the airport. All charges against Dean, 28, and Long, 36, were dropped by the Cook County state’s attorney’s office at a hearing Nov. 12.

“After a thorough review of the facts, we concluded that deferred prosecution, a court alternative for nonviolent offenses, was the most appropriate resolution for offenders Henry Dean and Christopher Long based on the facts and circumstances of their cases,” a spokeswoman for the Cook County state’s attorney’s office said Tuesday. “Neither offender has a criminal background and both have completed community service.” Emergency crews responded a private airplane hanger when Juice WRLD, whose real name was Jarad Anthony Higgins, suffered an apparent seizure, according to the Chicago Fire Department and the Cook County medical examiner’s office. The rapper was taken to Christ Medical Center in Oak Lawn but died shortly after arriving, authorities said. An autopsy found Higgins, who had just turned 21, died of an accidental overdose of oxycodone and codeine. A friend of Higgins told authorities the rapper ingested several Percocet pills prior to his death, possibly to conceal them from local and federal police officials at Midway, a police source told the SunTimes last year. Source >

12


BRITISH BODYGUARD ASSOCIATION The dedicated association for dedicated professionals

Membership starting from £60

admin@the-bba.org.uk www.the-bba.org.uk 13


CIRCUIT MAGAZINE ISSUE 55

By: Orlando “Andy” Wilson

In theory, when providing close protection services, you should show unflinching loyalty to your clients, but will they show you the same level of commitment in return? I am fortunate as the clients I tend to work with are those who understand that I will work with them 100% if they let me, if they cooperate with me, and if they pay me! Mutual respect and efficient communications are essential in any business, and I think more so in the close protection industry as you tend to become very involved in your clients' private lives.

Boundaries must always be made clear as business is business, and this works to protect you and the clients’ interests. Your clients are not your friends, they are clients paying you to provide them with a service, and if boundaries are ignored, it can undermine any respect in the business relationship. You need to decide if you are providing protective services to your clients so you can

14


CLIENTS SHOULD YOU TRUST THEM?

Mutual respect and efficient communications are essential in any business, and I think more so in the close protection industry as you tend to become very involved in your clients' private lives.

15


CIRCUIT MAGAZINE ISSUE 55 earn money or are you just going to hang out with them?

told. They were told that clients should not question security procedures as they are not the experts I stopped dealing with a and that they must always client that used to come have control of their clients to me for firearms and passports etc. To me, this self-defense training. In is wholly unrealistic and many ways, he could have unnecessary. I know from been an excellent client the clients I have worked to have, but he had an with that if some asshole obsession for strippers tried to bully them around, and hookers. He could they would be fired on the be classed as reasonably spot and rightly so. high-profile, but when his Forging and maintaining wife and kids were not professional relationships around, he was making can be very difficult, and a lot of stupid decisions, there needs to be givewhich he liked to brag and-take on both sides. about. When he asked if I If people are mature could get someone to go enough and understand the and get his wife’s favorite situations they are in, most designer coat back from a will be able to cooperate hooker he had lent it to, effectively without while she'd been staying at unnecessary drama. his apartment, when the The question this article wife and kids were away, asks is "should we trust I stopped answering his clients?", my personal view calls. It's easy to make on this is that you should money from stupid clients, never trust them‌ respect but remember, shit sticks! them, but never trust them! Now, think about There needs to be a it, and give me a reason healthy relationship with why a client would want your clients, you don't want to deceive you about their to let them dominate you, true intentions for hiring and you don't want to try you? to dominate and control them. I have had students There are multiple reasons come to me who have been as to why a client would told on close protection lie, and as counterintuitive courses that when they as it seems, divulging the are working their clients actual threat level is one must do as they are of the main ones. Many

16


CLIENTS SHOULD YOU TRUST THEM?

Should we trust clients?", my personal view on this is that you should never trust them‌ respect them, but never trust them!

years ago, I had a client that did not exactly lie to me but certainly didn't tell the whole truth about a situation. The job was a simple asset check on an ordinary businessman investing in Eastern Europe. The client conveniently forgot to tell me that they knew he was working with suspected organized criminals and that he was under active government investigation. Eventually, we found all this out and adapted accordingly, but we were fortunate it didn't turn out worse, and it would have been far safer for my people if we had been given the heads-up from the outset. Why did the client not tell us? He would probably claim that he'd expect us to have access to this information or to find out independently. However, I know that they will have thought that by being honest it would have led to a far higher quote than I gave them, and he'd have been correct in his assumption! Understand that where business and money are concerned, many clients will see you as expendable and replaceable. One incident, early in my

17


CIRCUIT MAGAZINE ISSUE 55 career, highlighted perfectly why clients should never be fully trusted and why everything they say should be questioned. Many years ago, I was working in South Africa, and the boss of the company I was working for said he had a special job he wanted me to do, which meant little to me at the time as the pay was the same. A factory owner had a problem that he needed fixing. Every night, trucks that parked up on his site were being broken into. I'm in South Africa, so naturally, I was armed and understood the risks. That night as I was waiting close to where the vehicles parked, I heard someone climbing over the sheet metal gates and into the complex. It was dark, I had my 4" .375 revolver out, and as I slipped between the parked truck to intercept them, they'd vanished. Luckily, I'd heard them get into one of the many trucks but, all I could do then was wait for them to make a move and try to intercept them. Early in the morning, at about first light, I heard movement coming from amongst the vehicles. I rushed across and managed to intercept the person who turned out to be a homeless local. When he saw me and the revolver pointed at his head, to put it very politely, he shit himself!

When I reported what had happened to the owner of the complex, he was not happy and wanted to know why I had not shot the homeless guy. When I stated there was no reason to do so, he accused me of being a coward.

18


CLIENTS SHOULD YOU TRUST THEM? He was compliant, not at all aggressive, had no weapons, and even opened his coat and lifted his shirt to show me that he hadn't stolen anything. When I asked what he was doing, he explained he'd been sleeping in the trucks and had nowhere else to go. I told him to go and not to come back. However, when I reported what had happened to the owner of the complex, he was not happy and wanted to know why I had not shot the homeless guy. When I stated there was no reason to do so, he accused me of being a coward. Then, when the boss of the company I was working for turned up,

19

he too wanted to know why I hadn't shot the homeless guy. I think my response was something like “let's go find him, and you can shoot him". My view, both then and now is that I would definitely have been a coward for shooting an unarmed homeless man who was just looking for somewhere to sleep. That situation could have played out differently had I bumped into that homeless guy without warning, as he climbed over the gates. He would likely be dead now. Why? Because I was young and stupid? Maybe, but mainly because I'd been given false information about what was really


CIRCUIT MAGAZINE ISSUE 55

going on and believed it. The owner of the complex, the true coward, thought he could hire people to do the dirty work he would never have had the guts to do himself. The owner of the security company that employed me was another coward who's only concern was about keeping the contract and impressing the compound owner. That one short night taught me to always question the reason why someone is hiring me, especially if there is the likelihood of hostilities occurring. I can recall many more examples of ways in which

clients have demonstrated they should not be trusted until they have proven to be half-trustworthy. Even though the romantic and Hollywood image of the “bodyguard” is of someone who would unquestionably die for their clients, the reality is that you must question everything. Think about this; if things go wrong who will be paying your hospital bills, bailing you out of jail, paying for your lawyers, looking after your family while you’re in hospital, prison, or the morgue? You think it will be the client or your boss? I think neither!

Orlando Wilson has worked in the security industry internationally for over 25 years. He has become accustomed to the types of complications that can occur, when dealing with international law enforcement agencies, organized criminal and Mafia groups. He is the chief consultant for Risks Inc. and based in Miami but spends much of his time traveling and providing a wide range of kidnapping prevention and tactical training services to private and government clients.

20


21


CIRCUIT MAGAZINE ISSUE 55 By: Peter Jenkins, ISS Training LTD

Counter Surveillance is a complex subject and is frequently neglected on CP courses and therefore often misunderstood. Therefore, in the space available here, I’m going to point out the key principles to a counter surveillance operation.

that a person (Principal) is under surveillance and to identify the composition and makeup of a hostile surveillance team.

Counter Surveillance is defined as the actions that a person (or team) carries out, in order to detect

Protection Bodyguards that are responsible for their Principal’s safety, will carry

22


COUNTER SURVEILLANCE

“You have to know surveillance and understand its processes in order to detect it”. This is a very bold statement, but I can prove it… Preferably over a pint. out counter surveillance especially when there is a high threat level. Anyone who is a serious threat and intends to carry out an attack or kidnap will most probably do his homework and carry out some reconnaissance and surveillance beforehand. Surveillance Detection Route (SDR) Your principal wants to get from A to B. Before arriving at B, he has to make sure that he is not under surveillance. He has to be run through a counter surveillance

23

detection route (or SDR). This route should be as natural as possible without deviating from the most logical route otherwise it could be identified by the surveillance. It will require four separate choke points that can be monitored by the CS team when the principal passes through. Four because we are trying to create a situation that is beyond coincidence. CS can either be carried out by a full team (one


CIRCUIT MAGAZINE ISSUE 55 person manning each choke point) or by a single person (who can cover each choke point by leap frogging ahead). Single-handed can prove to be hard work and is likely to mean that the principal may have to stop on one or two occasions for the CS to get ahead, if not taking a slower route or the CS uses a motorbike. The CS should be armed with a camera or video recorder to film activity and scrutinise it for unnatural behaviour and repetitive sightings. Each choke point should be observed for routine activity and you should get a feel for the

environment. Should a surveillance team arrive, you should be able to notice the difference in tempo and activity from certain individuals or vehicles. The first choke point should not be too close to the start (or departure location) as any surveillance team may be disjointed. Human error also comes into consideration and losses may occur. Either way, you want the first choke point to be far enough away to allow a surveillance team to ‘settle down’ and be together somewhat to catch all the cars.

24


COUNTER SURVEILLANCE

Simple Mobile CS Route Without Stops Let’s say that we have a courier who departs from a secure unit at an airport and delivers high value products to his company on a weekly basis, his company premises are unmarked and the location secret. He uses a plain vehicle so that he does not attract attention. The courier wants to go straight from the airport to the company without having to stop en-route. The CS team (comprising of three operators) should look at the route and choose four ‘choke points’ that the Principal has to pass through. They have to be easily monitored with one operator observing each choke point. This can be carried out by examining a map of the route prior to actually going out on the ground for a more detailed recce.

25

If you have four choke points but only three operators, the one manning Choke Point 1, should ‘leapfrog’ ahead to Choke Point 4 after the Principal has passed through his location. Ideally, the route should not be one continuous road over a long distance as there is a fair chance that other ‘innocent’ road users using the same route will be also be caught. Therefore, put in at least two changes of direction to minimise third parties and to draw in any surveillance team. A choke point does not necessarily mean a narrow channel (such as a bridge) but needs to be somewhere that you can monitor securely which gives you the maximum possibility for identifying any surveillance vehicles. Mobile choke points can be:


CIRCUIT MAGAZINE ISSUE 55 chosen because: • It is likely that the team have settled down and are looking for a handover by this stage. It is doubtful they will a team will handover at the lights at the risk of getting held, therefore they should all get through this change of Try to avoid choke points direction. at very busy roundabouts, • Identify the cars that busy junctions or on fast make the left turn in the roads as it will be difficult same direction of the to note vehicle details. principal. • Remember, someone SAMPLE THREE CHOKE may have been held at POINT CS ROUTE the lights turning left If the Principal were to be and so a second wave subjected to surveillance of traffic should also be from the airport, it is likely noted. that any team would be • They may handover at plotted up close with a the layby you are in. callsign covering the only • They should be going roundabout on the exit. relatively slow as they It may not be beneficial travel away from the to put a choke point here junction. This assists as you may not ‘trap’ all obtaining vehicle details. of the team (who should Identify the details of be spread out). The team leader will decide how the information is to be collated so that a pattern of multiple sightings is identified. Each choke point will report his findings to the controller. • • • • • • • •

Road junctions Roundabouts Bridges One way streets Long straight roads Retail Parks Quiet roads Entry onto a motorway or service stations

CHOKE POINT 1 CP1 is in a layby just after a crossroads junction controlled by lights where the principal’s route takes a left turn. This point is

26


COUNTER SURVEILLANCE at least 8 to 10 cars that are behind the principal (colour, make, registration). • Log and record all sightings, transmit the list on WhatsApp. CHOKE POINT 2 The route has travelled through the town of Otley, crosses the River Wharf and then takes a right turn. CP2 is the right turn after the bridge, this point is chosen because:

stacks up. This gives you the opportunity to identify and record potential surveillance vehicles. • A surveillance team may carry out a handover here, so watch for someone continuing

straight on and then carrying out a U turn to get back into the follow. • This CS callsign is also in a good position to ‘leapfrog’ ahead if it decided to throw in a fourth chokepoint. • Log and record all sightings. CHOKE POINT 3 • All surveillance will have This is a junction where the principal turns left. to cross the bridge, Immediately before the there is nowhere to parallel and go around, junction is a narrow bridge where oncoming so should be a ‘catch traffic has a right of all’. way. This point is chosen • When turning right, because: he has to wait for any • Traffic will be forced to oncoming traffic to close up if the principal clear, which means is held at the bridge there is a chance he will waiting for traffic to be held at the junction, clear. and any traffic behind

27


CIRCUIT MAGAZINE ISSUE 55

• If the principal gets over and then turns left, it is possible part of the surveillance team will be held at the bridge. As a consequence, you may see some aggressive driving in order for them to make ground. • Log and record all sightings.

route, you have to identify a location as an ERV where each person from each choke point can move to, until the operation has finished in the event hostile surveillance is detected.

Detected or Not Detected If no surveillance is detected, you can call Collating & Reporting All sightings and details of your Principal and tell him vehicles from each choke that he is clear to run and that is the end of the job. point are now collated. The controller will cross If surveillance is detected refer the sightings at you now have several CP1, CP2 and CP3 to identify if any of the cars options open to you. sighted are the same. An The priority may be to go overt to protect and assessment will then be escort your principal made to decide whether to safety. The other the principal is under surveillance or is clear to option, (which could carry on with his journey be risky) is to run the principal through another unimpeded. choke point (that you have either planned or The Emergency RV improvised) in order Somewhere along the

28


COUNTER SURVEILLANCE to further establish the makeup of the surveillance team. It may be that you want to run them into a trap to effect an arrest or approach them to cause a compromise. If the hostile element is followed, you will either take them back to their base (hotel or office) or it is likely that they will lift off and RV at a suitable spot, quite often a café or fast food outlet where

they will carry out a quick debrief over coffee. At this stage they will probably drop their guard as they switch off and therefore you can use this to your advantage to obtain closer identities of the team. When this happens, it’s great! A successful CS route takes planning but don’t forget to search your Principals car for trackers!

Peter Jenkins has worked internationally with CP Teams in a CS role and this article is an extract from the chapter on surveillance detection in his forthcoming book The Theory of Covert Surveillance. To see what’s inside, scan the QR code…

29


CIRCUIT MAGAZINE ISSUE 55 By: Radoslav Savkov

In the last decade, social media has grown in popularity and importance than most companies risk management capabilities can handle. Between 2012 to 2013, the number of social-network users around the world rose from 1.47 billion to 1.73 billion, an 18 percent increase. More than 72 percent of all Internet users regularly access social networking sites and, in the UK and US alone; people spend respectively 13 and 16 minutes every hour using social media. More importantly is the take-up of social media by businesses around the world. Among Fortune

500 firms, 77 percent now have active TwitterŽ accounts; 70 percent have Facebook's pages, and 69 percent have YouTube™ accounts. In the last decade, social media played one of the most significant impacts on the development of crisis management. The ability of the social media to connect

30


CRISIS MANAGEMENT AND SOCIAL MEDIA people around the globe instantly is something that we are to terms with, but from a risk manager's point, it is undoubtedly one of the most powerful tools that they have for gathering, assessing, managing and controlling information. The role of social media in risk and crisis management. In the context of risk and crisis management, social media can be used in three different ways. Firstly, to broadcast information from the organization leadership to relevant stakeholders. For instance, in case of a significant event, via social media, the organization's leadership can push information that will reach the appropriate and affected stakeholders and point them towards a company website with more comprehensive information. Secondly, it can be used as an intelligence-gathering tool, using its network worldwide to supply information for political and economic situations in specific countries if in possession of assets, how they may be affected by natural disasters and

31


CIRCUIT MAGAZINE ISSUE 55

understanding the impact and what damage has been, and what recovery actions need to be taken. The third use of social media in risk and crisismanagement context is for social monitoring. This monitoring can allow the organization to identify and engage with both supporters and critics long before any crisis. Those social media discussions, especially with critics, will

accelerate rapidly as a crisis progresses. However, regardless of how powerful social media can we as a tool in the risk and crisis management, the organization can understand how it can be used as an advantage and what impacts might have over the business objectives. The design and use of social media strategies are one of the areas of the security and

32


CRISIS MANAGEMENT AND SOCIAL MEDIA risk management that requires a comprehensive understanding to be fully productive when a crisis develops. To be used to its full capacity, social media needs to be integrated into the organization strategic framework, so when a crisis develops everyone is fully conversant with social media company policies and able to use it under the pressure of a developing crisis. It is vital that social media is embedded in the organization strategic objectives and maintained and developed accordingly. Social media influence needs to be built over time so that the targeted audience can rely on the information provided by that organization social media channels. It is only then that social media can play an active role in an organization in a time of crisis. The Red Cross and Social Media. Example of successful social media strategy. The expanding use of social media platforms as routine communication by the population was not recognized as an operational tool by Red Cross before Hurricane

33

Katrina. After revaluation of the event, the Red Cross understood that the social media had a crucial role during the disaster and after that for the population exchanging information and their view on humanitarian organizations and their function. Red Cross was facing some criticism in the web space, but they were unable to respond as they did not have any presence on social media platforms. Red Cross understood that social media platforms are permitting two-way interaction, and they can respond to any criticism and correct any misinformation spread about them in the web space, especially if that might put the members of the public in danger affected by the disaster. After the disaster and stock-take from all the following events Red Cross decided to employ a social media expert to monitor anything in the web space regarding the organization, her name was Wendy Harman. Wendy’s main priority to analyze the online conversations about Red Cross. As a result of this monitoring,


CIRCUIT MAGAZINE ISSUE 55 many negative comments were exposed, but the process discovered many positive too. After those findings, Red Cross had a new objective to involve the members of the public online by engaging with them. Wendy had a responsibility not only to monitor but responding to any comments introducing herself. The purpose of those interactions and personal approach was for Wendy to develop a relationship with the members of the public. Once this relationship is established if they have an issue with or criticism of the Red Cross, Wendy worked with her colleagues to acknowledge the problem and if possible, to deal with it.

What the American Red Cross has learned was that social media was vital to ensure that their relationship with the people they are supporting is a positive one.

What the America Red Cross has learned was that social media was vital to ensure that their relationship with the people they are supporting is a positive one. This new communication tool gives the Red Cross the capacity to engage directly with the members of the public in two-way interaction. The capability to have their blogs and other social media websites is especially

34


CRISIS MANAGEMENT AND SOCIAL MEDIA

crucial for the Red Cross when working on disasters. Their social media initiative has excided the initial expectations. All discussions are monitored and tracked, and the Red Cross has established its voice online but also has paced itself at the hub through proactive social media campaigns and initiatives. The organization’s social media program has allowed

35

the Red Cross to reply to misconceptions when they occur. Conclusion. The social media awareness strategy, is consisting of a variety of communication and collaboration techniques, is resulting in new levels of success with its stakeholders. By accepting a policy of engaging with interested and engaged influencers,


CIRCUIT MAGAZINE ISSUE 55

Social media can be a double-edged sword. A clear example is Elon Musk, Tesla CEO, tweet about taking the company private is a clear example of a crisis. organizations can maximize the public relations value with new social media tools. However, social media can be a double-edged sword. A clear example is Elon Musk, Tesla CEO, tweet about taking the company private is a clear example of a crisis. While this tweet had no potential to cause any damage on its own, due to hypercomplex nature of the business world, the perception of this single tweet led to the removal of Elon Musk as chairman of the board and a multimillion-dollar fine, as this was a critical element that can influence shareholder's decisionmaking process.

Effective crisis management inevitably involves social media, whether the organizations are a large multi-national corporation or a small hometown business. When a crisis develops, whether it’s negative publicity, a product recall, or an inaccurate news story going, viral, social media engagement should be a key priority when a crisis develops. The nature of social media makes it an ideal platform for communicating quickly and effectively in our digital age. Communication on social media is nearinstantaneous, so it gets the organization message out right away, much faster and effective than traditional media outputs.

A freelance Personal Protection Specialist & Security and Business Consultant with over 17 years’ experience of serving international clients. Providing discreet and professional security services to many highprofile individuals, including Royalty, Governmental, Corporate, High Net Worth, and Celebrity clients. A member of the Security Institute UK; American Society of Industrial Security (ASIS) and The Institute of Strategic Risk Management (ISRM), with a strong commitment to ongoing training and professional development. For more information: W: www.oxfordprotectionservices.com E: r.savkov@oxfordprotectionservices.com

36


INTRODUCTION TO CYBERSECURITY

● NEW FREE APP ● FREE ISSUE ● SUBSCRIBE DIRECTLY ● EVERY SINGLE ISSUE

E B I R C S SUB & Y A D O T SAVE

Get The Circuit Security Magazine with immediate electronic downloads to read on your PC, laptop or smart 37 39 device.


CIRCUIT MAGAZINE ISSUE 55 By: Stuart Mitchell, Scott & May

Whether you're a seasoned cybersecurity professional or are looking to transition into the industry, it's hard to know how to grab the attention of hiring managers and ultimately improve your chances of making it to the next stage. Here are eight top tips from Renana FriedlichBarsky, Director and Global Head of Cybersecurity Operations at PayPal, a proven leader in this space who's reviewed more than her fair share of applications over the years. Get the Basics Right with Your Resume Let's start with a

straightforward marginal gain. The file name on your resume. On the basis that security hiring managers are going to be looking at over 30 resumes a day, you want to be easy to find in their inbox and folders when they come back for a second glance. A good general rule of thumb for naming conventions on your CV would be:

38


CYBER SECURITY HIRING each application based on the requirements. It's not an exercise in applying for as many jobs as possible in the shortest time. It's about maximising your chances of reaching the next Resume length is another stage. Pick a shortlist of thing you should be 5-10 roles and focus in on thinking about. One page them. This is particularly is typically not enough, true of candidates who but you will rarely hold a hiring manager's attention are looking to transition in a cybersecurity job. for ten pages. As a rule You have to demonstrate of thumb, three pages is ideally the sweet spot. But your passion and your transferable skills. Taking it is critical to ensure the a left-field example, let's content is relevant to the say you were formally a specific position you are barista. You probably have applying to. You need to be helping hiring managers really great experience in multi-tasking and engaging understand why you are with customers, but you the right fit. Use the right need to help the hiring keywords from the job manager understand how specification. Frame the you can take those skills right examples. If specific and apply them to the new technology experience is position. Don't rely on the required, then make sure hiring manager to connect it features on page one the dots. rather than being hidden away on page three. For A covering letter is NOT a more senior-level role, optional you will want to focus A covering letter is also more on the strategy side. Articulate the impact so important here. It's your chance to stand out you've made in terms of and point out why you raw metrics, cost savings, are unique. Don't rely on risk percentage, team copy and pasted cover growth, etc. letters. Do your research on the hiring manager, Personalise your the business, and the approach department. This is your Don't just spray and pray. route through the door, You need to personalise • your name, • the company you are applying to, and • the job role you are putting yourself forward for.

39


CIRCUIT MAGAZINE ISSUE 55 particularly if you are pivoting in your career or at the entry-level. Make sure you include why you are excited about the position and the industry. Think about putting key points in bold. Taking this approach allows you to stress important messages to the hiring manager as they perform their initial 30-90 second scan. Demonstrate your curiosity Hiring managers in this space will have differing opinions around the best qualifications and certifications. What you need to demonstrate is your curiosity and a track record of taking control of your personal development. Expectations will vary depending on whether you are looking at the entrylevel or a mid to seniorlevel position - where a blend of qualifications and experience will be expected. Demonstrate that you are coachable. Think about the role and start researching what qualifications and certifications are most relevant.

A video without a strong message is just a gimmick. But a really considered approach could really help to get your personality and passion across to the hiring manager.

Have a view on the industry Depending on what domain you are in cybersecurity, it's helpful to demonstrate you have a good understanding

40


CYBER SECURITY HIRING of recent events. If you are applying for a role in Identity and Access Management, for example, have an opinion on the toolset and the criteria you would use to evaluate different products. It takes time to do this kind of research, but that's what makes candidates stand out from the crowd. Hiring managers are looking for individuals that have an opinion. Attend events. Demonstrate that you want to be part of the professional community.

for the job description and role requirements. That's going to give you an indication of 75% of what's important to the hiring manager. There might be 20 bullet points there, but you are unlikely to be expected to be an expert in all of them. This is also a useful message to hiring managers. If you want candidates that represent a good fit for your vacancy, be punchy around your job descriptions in terms of what's an important fit for your role and team.

Overcoming imposter syndrome Don't rule yourself out too quickly. Look at the top 3 bullet points

Power of Follow-Up Tenacity is a necessary trait to have when looking for a position. Don't be afraid to send that follow

41


CIRCUIT MAGAZINE ISSUE 55

up email to the hiring manager after two weeks reaffirming your interest in the position and unique selling points. Connect with the hiring manager on LinkedIn. If your request isn't accepted, follow them and take note of their interest areas. It also doesn't hurt to look for referral opportunities with common connections.

more. It's a great way of making yourself more memorable to the hiring manager but focus on your content. A video without a strong message is just a gimmick. But a considered approach could help to get your personality and passion across to the hiring manager.

If you want to hear more about how to position your job application more Standing out from the effectively with hiring crowd managers, then check We are starting to see a out Stott and May's onrange of tactics deployed by candidates to stand out demand event with Renana from the masses, including Friedlich-Barsky, discussing what security hiring the use of videos, QR managers really want. codes on resumes, and Scott and May are a professional search firm with a passion for helping leaders achieve complete confidence that they have hired the right talent, first time, in fiercely competitive markets.

42


43


CIRCUIT MAGAZINE ISSUE 55

By: Dr Mils Hills

I totally understand why even the thought of undertaking any kind of education fills security professionals with dread. It’s a rational response to being faced by an experience which is regularly made almost impossible by the people who instruct on courses and degrees. But of course, the students who flood off to colleges and universities in their late teens and twenties are rarely bedevilled by such thoughts! So why, when it comes to learning later in life, to undertaking vocational-related training and – of course – distance-learning, do we find it so difficult to succeed?

In short, we overthinking the problem. Again, for totally understandable reasons. We invest time, energy, sacrifice leisure activities and sometimes absolutely need to pass a qualification for professional reasons. This adds so much pressure onto us, and with pressure comes stressors on the brain

44


LOSE THE FEAR, LOVE A PROCESS!

that make most of us incredibly inefficient and ineffective. Yes, some of us will grind our way through – but it won’t be fun. And we then share dark stories and cautions about this with our circles of family and friends. The over-thinking is really formed around not being able to see beyond the smokescreen of confusion

45

that lecturers in higher education often specialise in creating. Ultimately, and this will be news to many readers, assignments can be seen as easy. If we maintain an iron grip on what we’re being asked to showcase in an essay, project or portfolio – we can’t really go wrong. If your navigation skills are sound, no matter what smokescreen or whirling


CIRCUIT MAGAZINE ISSUE 55 ten Assessment Criteria. Each one of these is listed in student guidance as a bullet pointed sentence. Each sentence has some additional guidance which The specialism that I and specifies that, if you are being asked to apply my team bring to the some models or theories, higher education sector how many should be is a passion for process. used and what the result Those who love study may not know it, but they should look like. are deploying a process to For a process, then, access great grades with my prescription is to the least possible effort. take each assessment What do you need to do criterion and convert it to clone this success? Annoyingly for me, there into a sub-heading. Write underneath it what the is no simple answer to which expensive tutorials additional guidance is. Then open each section and self-improvement by defining any new courses can be nailed. ‘technical’ terms from Instead, it’s a matter of, the sub-heading, ideally firstly, allowing the fear by using a direct and to subside. Only when referenced quote from the majority of stress an academic author, hormones drain away business leader, specialist can you think and write journalist or trade body clearly enough. (to name but a few). So one or three paragraphs Secondly, fire up the under each of the subprocess. Let’s see headings delivers the assignments and required content, with assessments for what the concluding paragraph they are. They are a vehicle for communicating of each section probably linking through to the that you meet the next one to ensure the requirements set by document has ‘flow’ and the institution. So, for ‘build’ for the reader. And example, on the Masters in Business Administration overall, the assignment (MBA) pathway that I am will need a framing introduction and capping most familiar with, each assignment has, let’s say, conclusion. The military fog that surrounds you – keeping the faith with the process of getting to the next waypoint cannot fail to work for you.

46


LOSE THE FEAR, LOVE A PROCESS!

No one wrote a rule that says an assignment has to be completed in a linear fashion! That’s when the grip on the handrail of the structure and faith in your process kicks in.

adage of ‘tell them what you will do, do it, tell them what you did’ is a reasonable test for the final draft! Even when study and assignment writing seems challenging, with the skeleton of sub-headings in place, when one section isn’t working for you – you can skip on to another. No one wrote a rule that says an assignment has to be completed in a linear fashion! That’s when the grip on the handrail of the structure and faith in your process kicks in. Doing things differently, focusing on the ‘building blocks’ of the assignment – the definitions, examples, observations, a bit of criticism, checking-off against the tick list – is the key to success. In the same way that master craftsmen and women create their own tools, so too we need to realise that we can each have our own approach to academic study. As an added bonus for you, academic assignments need to be understood as the tests that you totally understood the assignment set, that you deployed the correct

47


CIRCUIT MAGAZINE ISSUE 55

forms of examples, analysis, insight and logic to reach sensible and evidenced findings. They are a demonstrator for your intellectual skills, ability to meet the task set, provide the marker with what’s expected and deal really well with a limited amount of material from a topic area. What assignments aren’t is a container that you have to use to

demonstrate how much you have generally learned (stuffing in distracting content) and how intelligent you are in the abstract (using high falutin’ and confusing language)- as many of my students often assume. Keeping the style and presentation of your work as crisp and clearly aligned with the assignment criteria is vital.

Dr Mils Hills is Head of Knowledge at the BBA-recommended private training provider Minerva Elite and heads up a Masters of Business Administration (MBA) pathway which links from Minerva to university graduation. An anthropologist by training, Mils has worked since 1998 supporting defence, security and related professionals through research, consultancy and education. Contact him with any questions or comments at: pdmh@minervaelite.com

48


49


CIRCUIT MAGAZINE ISSUE 55

By: James Bore

We've spoken a couple of times now about tactics used to weaponise social media, and you will have spotted a pattern in these. 50


PHISHING PHENOMENA ON THE RISE As with many methods used to manipulate, they do not try to argue someone around to a position in a rational manner; instead, they are designed to elicit and exploit emotional responses.

numerous verified highprofile Twitter accounts was enabled through a form of phishing rather than a technical exploit.

The overwhelming majority of cyberattacks occur through some form of phishing. The recent, wellpublicised, compromise of

What almost every attempt at training gets wrong is that they try to highlight small technical inconsistencies in phishing e-mails as the

Unfortunately, as an industry cybersecurity struggles to engage with Phishing is a whole family of people to prevent these different attacks designed types of phishing schemes. to manipulate a target into Doubtless, you'll be familiar performing actions against with the some of the their best interest, usually usual phishing training disclosing information in approaches, those with a some way or carrying out quiz at the end telling you fraudulent transactions. to look for typos, suspicious Within that family of links, and similar protocols. different types of phishing These barely scratch the we have: surface. Then, of course, there are also 'practice' • vishing (voice phishing phishing campaigns you can over a phone call), engage, which are usually • smishing (phishing via SMS a little more effective, or text message), but still don't protect • business email compromise everyone. Generally, these (also known as BEC, campaigns, over 12 months phishing with the pretext of of continuous awareness being a senior executive in and training, can reduce a business), response rates to a few • spear-phishing (highly percent of employees. The targeted and personal problem is that this lower phishing), response rate doesn't • whaling (highly targeted last unless the training is phishing against an continued, and can start executive), to climb again as people • and many others. become complacent.

51


CIRCUIT MAGAZINE ISSUE 55 major flaws. Not only will a well-crafted phishing attempt display none of these, but they are very easy to overlook in the moment. I was recently asked to give a keynote on this issue by a company, and of the information I shared will help you understand why the technical phishing training doesn't work as well as expected and how you can give people the behaviours and tools they need to protect themselves. Phishing is Personal Even when phishing is a

volume attack, targeted against everyone, it feels extremely personal. With the number of data breaches, it is almost guaranteed that everyone has at least one old password out there (check https://haveibeenpwned. com with your e-mail addresses to see what I mean). Bad actors take advantage of this to inject an extra personal angle into their attacks, even with modern mass attacks as the picture shows. As an example, consider being the recipient of this:

52


PHISHING PHENOMENA ON THE RISE

You can only imagine the effects of this type of scheme upon a person. And even where the attack is intended to take money from a company rather than an individual, it will still be intended to exploit the human recipient, not an abstract corporate entity. The people behind these attacks are only too well aware that ultimately it comes down to the person to achieve their goals.

the case of such attacks, hackers exploit a feature in email services known as the "auto-forwarding email rules" which allow the email address owner to set up "rules" which redirect incoming emails to another address enabling hackers to gain access to sensitive emails without being detected. Syncing email settings for the web-based accounts with desktop client settings will make it harder to carry out the practice and will For example, the FBI help protect you against recently warned that cyber- this type of attack. https:// criminals are increasingly www.zdnet.com/article/fbiexploiting email forwarding warns-of-email-forwardingfor BEC (business email rules-being-abused-incompromise) attacks. In recent-hacks/

53


CIRCUIT MAGAZINE ISSUE 55 Phishing is Emotional A phishing attack is not intended to convince the recipient through logical, sensible argument to do what the attacker wants. It is usually not intended to fool someone with perfect construction of the message. Instead, a phishing attack is meant to bypass all of that careful training, the list of rational checks to make for any e-mail, and get straight to the heart of the matter (metaphorically speaking). A phishing attack is almost always an attempt to exploit emotions, whether that's to trigger greed over an offer, a sense of fearful urgency because an authority wants something done, hollow dread at threats of public embarrassment, or panic due to some bureaucratic hiccup. There are two basic behaviours which can protect against the vast majority of attacks, without digging through the text looking for typos. The first is to both trust and question your gut. If an e-mail, or any other communication, triggers an emotional response, then the automatic behaviour should

be to take a step away from the communication and breathe. Once calm, start questioning the message, and the best way to do so is to contact the sender through some different, trusted means. If it's supposedly a message from a bank, phone the bank with the number on your card rather than the one in the e-mail. If it's an e-mail from a senior executive, get in touch with them directly, or their assistant, with details that are not in the e-mail. Better, of course, is to contact your security team with details, but there are instances where a company won't have a team to contact. The second is to question anything the first time. If anyone is asking for something new, a change from the usual way, then as with the emotional response above, use some other trusted channel to contact them. These two behaviours will not protect against certain attack vectors (invoice fraud can be devastatingly effective when well-crafted), but they are two of the most effective behaviours to train to protect yourself and anyone else.

James Bore is an independent cybersecurity consultant, speaker, and author with over a decade of experience in the domain. He has worked to secure national mobile networks, financial institutions, start-ups, and one of the largest attractions’ companies in the world, among others. If you would like to get in touch for help with any of the above, please reach out at james@bores.com

54


THE INDUSTRY ANDTHE THEVEIL UGLY TRUTH BEHIND

Who’s protecting Who’s protecting Who’s protecting YOU, while you YOU, while you YOU, while you protect others? protect others? protect others?

With our premium tier of membership, we’ve got you covered under the BBA Protect insurance policy, providing complete peace of mind while With our premium tier of membership, we’ve got you covered under the you work in addition to the standard BBA membership benefits. BBA Protect insurance providing we’ve complete of mind whilethe With our premium tier policy, of membership, got peace you covered under Designed forin professionals looking toproviding maximiseBBA their employability and their you work addition the standard membership benefits. BBA Protect insuranceto policy, complete peace ofdemonstrate mind while commitment to industry standards, there are two levels of Protect membership available: you work addition to the standard benefits. Designed forin professionals looking to maximiseBBA theirmembership employability and demonstrate their commitment to industry standards, are two levels of Protect membership available: Designed for professionals looking tothere maximise their employability and demonstrate their PROTECT PROTECT+ commitment to industry standards, there are two levels of Protect membership available: Individual public and products liability Personal accident and health insurance PROTECT PROTECT+ insurance designed for UK Close designed for armed Close Protection and Individual public and working productsinliability Personal accident healthworking insurance Protection operators nonMaritime Security and operators in PROTECT PROTECT+ insurance designed UK Close designed for armed Close Protection and hostile regions. hostile regions. Individual public andfor products liability Personal accident and health insurance Protection operatorsfor working in nonMaritime Security working and in insurance designed UK Close designed for armedoperators Close Protection hostile regions. hostile regions. Protection operators in nonMaritime Security membership operatorsorganisation, working The in As a trusted professional FROM JUST £60working PER MONTH BBA are dedicated to bringing our members the best hostile regions. hostile regions. IT’S EASY TO UPGRADE YOUR BBA

possible resources and tools to enhance their standing and As a trusted professional membership organisation, The credibility as close protection operators within the industry. BBA are dedicated to bringing our members the best As a trusted professional membership organisation, Theand possible resources and tools to enhance their standing BBA are dedicated to bringingoperators our members thethe best credibility as close protection within industry. possible resources and tools to enhance their standing and credibility as close protection operators within the industry.

FROM JUSTTO £60 PER MONTH MEMBERSHIP PROTECT YOU. IT’S EASY TO UPGRADE YOUR BBA FROM JUST £60 PER MONTH MEMBERSHIP TO PROTECT YOU. IT’S EASY TO UPGRADE YOUR BBA MEMBERSHIP TO PROTECT YOU.

Visit our website at www.the-bba.org.uk to find out more. Visit our website at www.the-bba.org.uk to find out more. Visit our website at www.the-bba.org.uk to find out more. Lockton Companies LLP is a limited liability partnership incorporated in England and Wales, registration number OC353198. Authorised and regulated by the Financial Conduct Authority.

55

Lockton Companies LLP is a limited liability partnership incorporated in England and Wales,


CIRCUIT MAGAZINE ISSUE 55 By: Mark “Six� James CPO, EPS, CAS

Dealing with What Goes Bump in the Night

Statistics tell us that 60 - 70% of criminal encounters will occur at night or in low light conditions. So, it only makes sense that we train under those conditions. conditions Most criminals prefer night as they feel they have a greater opportunity to move in the cover of darkness and potentially avoid detection. In such conditions, it is vital to remain calm. Often when one sense is taken away, the other senses become heightened. Allow those senses to work for you as you plan your search or exit. For instance, use your sense of smell to

help detect a potential threat or adversary (body odor, cologne or perfume, smoke cigarette or tobacco) or any smells uncommon to your environment. Allow your movements to be slow and methodical unless executing a rapid/ dynamic entry or exit maneuver. Be conscious of noise to help you locate a threat or potential adversary. Often it might be more beneficial to stay put

56


BUMP IN THE NIGHT behind cover and let your adversary come to you if an immediate escape is not available. The primary reason for a light is not to see the sights on your handgun, but to identify a potential adversary and provide you with positive target acquisition. This allows you to better scan the environment and when a potential threat is located, to better scan their body or bodies for potential weapons or monitor their movements. The light sources may often be standard white, halogen, green or strobe lights. Strobe lights often make it harder for a threat or adversary to pin down your position within the illuminated area. However, those same lights may also make it harder for you to detect minor movements on a potential adversary. In low light situations, the potential threat or adversary has four major options: 路 Stay hidden if they have not been detected. 路 Choose to fight. 路 Choose to flee. 路 Choose to comply with your commands.

57


CIRCUIT MAGAZINE ISSUE 55 Please be very conscious that once you light an area, you have compromised your position. Since the threat now realizes you are there and may consider any of the above once you turn the light off to move again. You need to remain mentally and physically prepared to deal with any of the above options. Some considerations when utilizing a light: In defensive or tactical situations, you should avoid using a light unless or until absolutely necessary. Keep the element of surprise in your favor. Consider using short bursts of lights 1 – 2 seconds on then off as you scan an area. If no threat is detected, with the light off move to a new location before turning it on again. If working with a team or family member, keep a little distance between you so that it is harder for the adversary to line you up. If a potential threat is detected, remember to scan the body with a focus on hands and feet as they can be used most quickly in a harmful manner. If your partner stays outside of the light beam, he or she will often remain almost invisible to the potential threat. The

person holding the light should keep it pointed in the direction of the potential threat, but both that person and the other team or family member should also remain alert to other sounds or possible movements as the potential threatening intruder may not be alone. Remember to be conscious of what is potentially behind you (check your six). Searching for a Threat In searching for an adversary, there are three primary considerations: 1) avoiding the potential threat (i.e. tactical escape), 2) finding the potential threat, and 3) engaging the threat. Below are my typical sequence of actions: · Flash – Move (This is for target verification) · Flash – Shoot – Step – Move (This is for target engagement of a verified shootable adversary) When it comes to selecting a tactical flashlight, understand its primary points of focus are critical situations and/or selfdefense. Unlike everyday carry (EDC) flashlights which often feature lower output modes, adjustable settings to often include

58


BUMP IN THE NIGHT

Consider using short bursts of lights 1 – 2 seconds on then off as you scan an area. If no threat is detected, with the light off move to a new location before turning it on again.

stroke features. I like a low output feature if I am trying to find my seat in the theatre or a strobe feature if I am changing a tire on the side of the road. However, when it comes to low light or night fighting, brighter is better because movement, depth, and overall target identification is significantly tougher under those conditions. When time is life, I also prefer a single output option as you can't afford to activate the wrong illumination setting and comprise your ability to see the threat. So, having a light with enough lumens to properly illuminate the target is critical. If in the course of the engagement, the situation potentially turns from a lethal one to less than lethal, but still a highly intense and confrontational situation, tactical flashlights often feature strike bezel. One of my favorite self-defense techniques is the "flash and bash," where the light is used to blind or disorient the threat before striking. When it comes to sights and optics, illuminated reticles whether holograms or red dots are best followed by sights with tritium inserts and plain iron sights. Also,

59


CIRCUIT MAGAZINE ISSUE 55 Even if you have a weapon-mounted light, many people particularly security and law enforcement practitioners often carry both. For those who have a natural aversion to pointing a weapon at someone, they usually prefer to search with a handheld light and then transition to their weapons mounted light. Whether with a handheld flashlight or weaponWeapons Mounted mounted light, when I Lights am conducting a solo When it comes to fighting, simpler is better. search for a bad guy, one technique I have found Weapon mounted lights beneficial is to quickly are much easier to use illuminate the ceiling as than handheld lights, as it helps light the entire they don't require the same level of coordination room. I can then direct the beam toward the or dexterity to operate during a potential deadly threat if required. This keeps me from flagging a force encounter. It often non-shootable adversary allows the operator to with my weapon. maintain their regular grip when engaging with Handheld Flashlight their firearm. The light Techniques may be operated by an There is a multitude of on/off switch at the back light options you can of the light or a pressure consider. They range from switch. understand when the muzzle flash from your handgun is going to adversely impact your night vision from anywhere from a few seconds to a few minutes so train for it.

60


BUMP IN THE NIGHT gripping the flashlight in a backhand fist, the gun hand comes forward and creates dynamic tension as it presses against the back of the flashlight hand. The flashlight arm pulls toward the body and moves underneath the bottom of the magazine well, similar to the Weaver stance for enhanced stability. The disadvantage BACKHAND (HARRIES) of this position is it may draw fire directly at the POSITION light which is positioned Works like the Weaver near the operator's vitals. shooting position. While integrated operating systems (light attached to your weapon); to the simplest option of holding a traditional handheld light in your support hand. They may be operated by on/ off buttons mounted on the side or rear of the light source to pressure switches.

61


CIRCUIT MAGAZINE ISSUE 55 THUMBS FORWARD – CHAPMAN POSITION

who have small hands using a heavy flashlight.

The thumb and forefinger of the support hand hold the light. The thumb of the support hand points forward toward the target or adversary. The remaining fingers wrap around the gun hand for a two-hand grip. This technique works well for flashlights with sidemounted switches.

FBI MODIFIED

The disadvantage of this technique typically comes into play with operators

62


BUMP IN THE NIGHT The Modified FBI technique is accomplished by holding the flashlight in an "ice pick" or "hammer fist" grip with the arm extended away from the body and the gun hand. The handsapart technique helps the operator avoid "marking" their position through intermittent use of light at random heights. The technique also works well with right- or lefthand shooting. The light is often held at multiple heights to avoid identifying the operator's center of mass. To prevent the user from self-illumination, the

63

flashlight is held slightly in front of the body. The major disadvantage of this technique is the operator may become fatigued during extended use. It also requires extensive practice to perfect as most people are not used to making both hands operate simultaneously but independently while performing fine motor skills. NECK INDEX The Neck-Index technique is achieved by holding the flashlight in an "ice


CIRCUIT MAGAZINE ISSUE 55 pick" or "hammer fist" grip against the jaw/neckline below the ear. This helps reduce fatigue as the flashlight is placed in the natural crevice created by the neck and shoulder. This allows the light to move with the operator's head with minimal impact on the operator's peripheral vision. The disadvantage of this position is it may draw fire directly at the light which is positioned at the operator's head.

middle finger of the nonfiring hand with the tailcap pushbutton positioned against the palm/base of thumb (similar to how a Doctor or Nurse would grip a syringe).

This technique is often preferred by operators who have flashlights with a combat ring. The flashlight (reaction) hand is then brought together with the strong hand, the pinky and ring finger wrap around the gripping fingers of the strong hand below the ROGERS SUREFIRE (SYRINGE TECHNIQUE) trigger guard as normal to form a two-hand firing The flashlight is held between the forefinger and grip. The light is activated

64


BUMP IN THE NIGHT

by exerting pressure to depress the tail-cap pushbutton.

• Olight • Surefire • Streamlight

Below are some of the more popular flashlight and weapon mounted light companies:

Once you've secured your light, then train like your life depends on it… because if you are searching/fighting under low light conditions, it truly does!

• Inforce • Niecore

Mark “Six” James is Founder and Executive Director of Panther Protection Services, LLC. He is an internationally published author, keynote speaker, security consultant to educational institutions and frequent contributor to several print, broadcast, and online media. Panther Protection Services is a full-service protection agency focusing on Risk and Crisis Mitigation, Protective Services, Self-Defense Training, and Firearm Instruction. www.pantherprotectionservices.com

65


CIRCUIT MAGAZINE ISSUE 55

66


BEHAVIORS & ANOMALIES By: Luke Daniel

Non-verbal communication is all about understanding of the baselines of behavior, in order to identify and articulate anomalies. If they can be articulated, baseline of the behaviors then they can be explained and fully understood. Without this skill, we are vulnerable and inadequately prepared to fully support our clients' needs.

In the previous article (Baselines of Behavior, Issue 53), we spoke about the four major behaviors: dominant, submissive, comfortable, and uncomfortable. These are the most prevalent and easiest to categorize and I gave you the means to identify each one. However, identifying the behaviors is not our main goal. Creating a

67

and then looking for clusters of anomalies is the goal. These anomalies highlight changes within the individual's emotional state around a specific topic and can be crucial for us, as security professionals, to identify a threat early enough to counter it. What It All Means Knowing how the biological process works means that we can now dive into what it all means. Nonverbal cues are completely based on the perceptions of the mind. When someone perceives incoming


CIRCUIT MAGAZINE ISSUE 55 information in a specific way they will react to it. This reaction is the cause of the nonverbal cues and that reaction is what we, as observers, are looking for. If someone is standing in line and they have their shoulders rolled backward, standing tall they could be either comfortable or dominant. If their shoulders roll forward and they start to slouch as they notice someone enter the space, that could indicate they, not only, know that person, but they have some sort of negative feelings toward them. We have already identified two anomalies before an interaction started. Should an interaction ensue, the observer is ahead of the game. Noticing the change in the baseline that early allows for sharp focus identifying all the incoming information. The change in behavior indicates a change in their emotional state. This is because they went from comfortable or dominant to uncomfortable. Even submissive, depending on the level of slouch, an attempt at making themselves smaller within the space they are occupying.

If you see a group of people talking, pay attention to which direction the majority of their bodies are facing. That will indicate who in the group has the highest stature. The direction the majority of abdomins are facing in a group shows who has the highest level of respect.

Another example would be if you are speaking with someone who does not stutter in their baseline of behaviors. Through the course of the

68


BEHAVIORS & ANOMALIES conversation, they start to stutter when a specific topic is broached. The stutter is an anomaly and could indicate that the topic being discussed is uncomfortable for them. They will most likely try to move as far away from the subject of conversation as quickly as possible.

anomaly and could indicate that their emotional state changed as a result of the topic. It may show that they have somewhere else they need to be though. This is again where clusters of anomalies come into play.

Why Create a Baseline? Creating a baseline is one of the most important things One great behavior to watch that a person or organization can do. It will then allow for is body direction. This for the decision makers concept is useful at great to have an understanding distances as well as face to of what is changing. How face. If you see a group of people talking, pay attention those changes are taking place. How quickly those to which direction the changes are happening, majority of their bodies are facing. That will indicate who and what level of impact in the group has the highest the changes will have immediately. Everyone is stature. The direction the a decision maker after a majority of abdomins are cluster of behaviors has facing in a group shows who has the highest level of been identified. respect. Baselines enable the person or organization When interacting with others, be it staff or clients, to identify at what point the behaviors started to it is advantageous to watch change. If someone “all of how they position their a sudden” becomes closed feet and lower body. If off or uncomfortable, both feet are facing you having a baseline created then it may be presumed at the start of the that they’re engaged and interaction would allow you have their complete for identification of which attention. Be conscious of comment or topic caused topics as they come up so the change in emotional that any anomalies can be state. It could be that joke tied to said topic. When about “going to the bar they change the position and getting naked” which of their feet so that one or caused the employee both are facing away from to show that they were you its known what may uncomfortable. have caused it. That is an

69


CIRCUIT MAGAZINE ISSUE 55 Making It Work For You The days of seclusion and removal from the global society has come to an end. There are an estimated 7.72 billion people in the world at the time of writing. 4.54 billion of them have internet access. That means approximately 58.8% of the world’s population are globally connected.

person or the general public.

How others perceive us is completely under our own control, as long as we are aware of how we are portraying ourselves. I found that through watching others I was able to notice some of my own behaviors. Once I was aware of myself, it became much easier to With the advent of the internet and cellular phones control my behaviors or change them if the need the option to have face arose. Understanding how to face conversations behaviors change based anywhere in the world upon the emotions felt is is no longer fiction. Communication is no longer like getting your foot in the door. Watching how others isolated to the region, hold themselves while state or country. Nor even noticing what feelings cause the planet a person is which behaviors is taking geographically located. the first step. Each of these Embrace the ability to communicate and utilize all lead to understanding available information rather the need to control our than sticking to the ways of own nonverbal cues. Personal space, blocking the past. behaviors, tapping a foot, or something as simple as The Big Cues chewing your nails all have Time Magazine published an article talking about how an effect on the way people perceive you. body language could be betrayed in the workplace. Personal space is a big deal, The article referenced Joe even more so during a new Navarro, Dr. Lillian Glass interaction or when meeting and Patti Wood who are with someone for the first all considered experts in time. It’s something that is the field of non-verbal easy to overlook. Personal cues. The article talked space is all based upon about some of the most how both members feel common behaviors seen toward one another. If the today. It also shed some relationship is new, there light on how behaviors are may not be any bond of perceived by the receiving

70


BEHAVIORS & ANOMALIES

introductions, the other person turns their body away from you (blading), if even in the slightest. If the other person is blading, When meeting someone new, shake their hand then you may have invaded their personal space. If maintain a good distance between you and them. For the person takes a step back then you most likely western cultures personal have broken their normal space ranges from two boundaries. This is a great to four feet on average. time to note that if the This is also referred to person takes a step closer as the personal space to the conversation, bubble. If someone who’s they are showing interest. not welcome enters the personal space bubble, How the body is positioned negative feelings may during an interaction is also arise. If the distance between you is satisfactory a good indicator of how the with the other person, they person feels toward you. Body position can also give will remain in the same place. You may notice that a peek into who in a group of people holds the highest after making the common trust or understanding on either side of personal space boundaries.

71


CIRCUIT MAGAZINE ISSUE 55 level of respect. Someone who has their feet, torso, and head all facing who they are speaking with is completely engaged. That’s a solid example of someone who’s full attention is in the conversation and is a sign of respect for the person(s) they are talking to. When reading nonverbal cues and body language, all we have are assumptions. It’s an assumption until there is enough information to confirm the hypothesis. Nonverbal cues are a result of the hindbrains (primal part of the brain) normal operation. From the outside we will never know what emotion caused the behavior that’s observed. Rather, it offers a sort of insight into

what emotions the person may be feeling. For those who are analytical, the art of nonverbal communication may take longer to understand. Being the conscience beings that we are, we can only comprehend what it is that we ourselves are feeling. The assumptions which we create through our observations are the only thing that we can go on. On the heels of that, do not assume that you know what the subject is feeling, because doing so creates a fallacy. Every conscientious human portrays what their individual limbic system causes them to show. Each person’s behaviors are individual

72


BEHAVIORS & ANOMALIES and needs treated as such when observing them. We observe behaviors, then it’s our job to ask questions to confirm, or deny, our hypothesis (assumptions). Watching the interactions and space between people, you can gain a fair amount of information on the people you are watching. You may even be able to tell if they know each other or if they are meeting for the first time. The space between people will give away if there’s a relationship or if they are acquaintances.

be something as simple as a light touch or a full on embrace that lasts past what is socially accepted. One behavior that needs noted is as follows. A slight touch happens and one of the party members reacts with a jerk, or swift pulling away movement. This reaction could indicate that the person was not ready for the stimulus. It could also mean that they have some sort of reserved feelings toward the other person.

Fidgeting If people are standing close, Even the most subtle body movements are observable within 2 feet or touching, by others. One thing then from the snapshot that needs remembering baseline, they is that we humans, by may have a relationship of nature, are predators. some sort. And that they That our conscience brain, may even have some sort of intimate relationship be it all our senses, and our subconsciousness can be physical or emotional. overridden by the primitive part of the brain. Why is Parents and their children, that an important fact to couples and close friends remember and why should will all break the socially that have any effect on accepted personal space how others perceive us? norms. Military members Well, our eyes are drawn who have served together to movement like all other will display the same predators. When we watch behaviors as above. someone or someone Veterans and military watches us, even the members almost all display a closeness when interacting smallest movement can be highlighted. with one another. This is in part to the shared trauma of Because others will notice bootcamp and the military machine, which is inevitable when we are moving, fidgeting is a negative trait and unavoidable, while when observed by others. serving. The closeness can

73


CIRCUIT MAGAZINE ISSUE 55 An excess of movement can give off the impression that someone is not listening. It may appear that something else is on their minds. Something so important it keeps them from devoting full attention to whom they should be listening to. Or that they are increasingly uncomfortable in the given situation. Excess body movements are associated with the uncomfortable behavioral category. The extra body movement will draw attention to oneself and it’s often a sign of discomfort. An increase in fidgeting or slight body movement can also be a sign of pacifying behaviors. Pacifying behaviors fall into the uncomfortable behavioral category. Whether it’s observing two people speaking or watching a group of people interacting, pay attention to who in the group is fidgeting. Those are the people who are trying to comfort themselves. This along with other uncomfortable anomalies can create a cluster needed to confirm they are actually uncomfortable. Even after having observed a cluster of uncomfortable behaviors, one can’t determine why the person is acting the way they are. At least there’s

some insight to what topic(s) the person is having an emotional response to. I was delivering a class for Tony Scotti’s Vehicle Dynamics Institute’s Solo Practitioner course and an interesting question came up. Being confident in my understanding and abilities, I was uncomfortable with having to present to my peers. My discomfort was noted by one of the students and brought up as a topic of discussion. The student asked “I noticed your left hand in your pocket during the majority of your presentation. But what struck me as odd was that your fingers seem to be playing with some part of your phone. Why was that?” I told the students they did a great job of identifying the pacifying behaviors in which I was giving off during the presentation. I explained to them my discomfort was with presenting to a group of my peers. I explained that up to this point presenting to a group of students, who were currently working in the industry, was a barrier in which I had not yet crossed. Having given the same training to students who are not in the industry was much easier. It was easier because I wasn’t worried about their point of view on the material in which I was covering.

74


BEHAVIORS & ANOMALIES

Excess body movements are associated with the uncomfortable behavioral category. The extra body movement will draw attention to oneself and it’s often a sign of discomfort. The movement which the student identified was my thumb playing with the headphone plug on my phone case. The student stated that they didn’t note any movement in my pocket. What they did identify was the tension in the muscles of my forearm. How those muscles kept shifting between flexing and not. Now, with him being across the room, I’m not sure how he could have seen that. He may have had eyes of an eagle. But he did pick it out, called me out for it, and then understood why I was portraying those behaviors. In that instance the student did what he thought was

correct. He observed a behavior, then created his own hypothesis of why that behavior was there. He identified additional anomalies to create a cluster of anomalies. The student then took it a step farther and verified that his hypothesis was correct. He asked me about it to understand the why and to identify what emotion was being observed. The student had identified the cluster as pacifying behaviors. Because I confirmed that it was in fact a pacifying behavior and the reason why the student was able to confirm the hypothesis he created.

Luke's experiences as a Global Executive Protection Agent, Instructor at Tony Scotti's Vehicle Dynamics Institute, and a student of behavioral analysis/non-verbal communication have led him to work with Fortune 1000 companies as a leader in human assets, "buy in," and business resiliency.

75


CIRCUIT MAGAZINE ISSUE 55

By: Thomas Abi-Hanna

France Pushes to Tighten Europe’s Borders Amid Terrorist Attacks

Proposals to strengthen the border controls of Europe’s passport-free Schengen area could make it harder for criminals and terrorists to enter the region, but would not eliminate the problems of homegrown terrorists and the free movement of criminals inside the area.

controls of the external borders of the Schengen area in December, but did not provide any details. Macron’s comments are part of France’s reaction to French President Emmanuel the terror attacks in France and Austria last week, Macron said on Nov. 5 in which the attackers that France will present were free to move across proposals to improve In the coming years, terrorism and migratory pressure will continue to create threats to the Schengen zone’s survival.

76


GEOPOLITICAL ANALYSIS European countries without controls. • The Schengen area includes 26 European countries, most of which are also members of the European Union. The Schengen members have agreed to eliminate physical controls at their mutual borders and to improve controls of the area’s external borders. •

Greater cooperation in controlling the Schengen area’s external borders and increased intelligence sharing between the member states is more likely than the permanent reintroduction of border controls between the countries, which would have a negative impact on their economies.

Because of the lack of physical controls, the Schengen area reduces The agreement allows transportation costs, as for member states to border crossings of goods reintroduce border and people are faster controls, but only and more efficient. As a during extraordinary result, countries that are circumstances such as a heavily reliant on exports terror attack or a health or depend on tight supply crisis, and for a short chains for their economies, period. such as Germany or the Netherlands, will resist any One of the main security problems connected to the attempts to reintroduce border controls between Schengen area is that it makes it relatively easy for Schengen states. criminals to move across Countries that rely on European countries with tourism, such as Spain little to no control. and Greece, are also likely to oppose the end of the The man responsible for the Oct. 29 terror attack in Schengen area. Nice entered the Schengen area from Tunisia to Italy, • In recent years, Schengen members have granted and then moved to France additional resources to to perform the attack. the European Border and Coast Guard Agency The man responsible for (also known as Frontex). the Nov. 2 terror attack in However, the bloc still Vienna traveled between struggles to control Slovakia and Austria to people entering the acquire ammunition for Schengen area by sea the attack.

77


CIRCUIT MAGAZINE ISSUE 55 and, to a lesser extent, by land. • A fragmented intelligence network (which for the most part is still handled at the national level), as well as logistical and language barriers, undermine EU efforts to increase intelligence cooperation. • Radicalized nationals performed many of the recent terror attacks in Europe. Reforming the Schengen area would not have a significant impact on this situation, though it could limit cross-border cooperation between terrorists. • According to a report by the European Parliament, the suspension of the Schengen Agreement and reestablishment of permanent border controls would result in annual economic losses of between 5 billion and 18 billion euros ($6 billion and $21 billion). A significant escalation of cross-border terror attacks in Europe would increase political pressure on national governments to abolish, or at least suspend, the Schengen area. This could lead some countries to exit the agreement, or demand the expulsion of members that fail to protect their external borders. Demands

78


GEOPOLITICAL ANALYSIS

Radicalized nationals performed many of the recent terror attacks in Europe. to end or suspend the Schengen zone could also be the result of another massive influx of asylum seekers and economic migrants, similar to the migration crisis of 2015-2016. • Nationalist political parties across Europe, such as France’s National Rally, have repeatedly called for their countries to exit the Schengen Agreement out of security concerns. • During the peak of the migration crisis in 2016, Schengen members including Austria and Sweden said Greece should be expelled from the agreement unless it improved the protection of its external borders.

• Countries including France and Austria have also repeatedly criticized the Italian government for allowing (and sometimes encouraging) asylum seekers and economic migrants to leave Italy. • Countries that are not members of the Schengen Agreement, including the United Kingdom and Ireland, are not interested in joining it. • Countries including Bulgaria and Romania still aspire to join the Schengen Agreement, though concerns about the presence of organized crime and a weak rule of law are still delaying their accession.

Thomas Abi-Hanna is a global security analyst with Stratfor's Threat Lens, a best-in-class protective security product that enables clients to anticipate, identify, measure, and mitigate risk. In this role, he tracks trends related to terrorism, industrial espionage and criminal activity, specializing in transnational militant groups including al Qaeda and the Islamic State. Mr. Abi-Hanna received his master's degree in international affairs from the Bush School at Texas A&M University, with concentrations in intelligence and Middle Eastern studies. He speaks conversational Arabic and has studied in Lebanon.

79


CIRCUIT MAGAZINE ISSUE 55 By: Denida Zinxhiria Grow

Since social media has become so much a part of everyone’s daily activities and many use it as a way to promote their services, speak their mind and/or interact with others, companies who either have or utilize a social media presence need to also protect their brand and reputation from the online “acts” of their own staff/personnel. An all too commonplace example: John X works for security company Y and during his social media networking, he posts about his clients, where was he flying to, he speaks about how he is being paid, how much he makes, becomes rude with another colleague with whom he disagrees, he bullies him, etc…

his own, there is nothing wrong and no harm done. WRONG. Anyone who works for you and has his work title/position linked to your company, represent your brand and is responsible for your reputation and can also be a liability for you and considered as the weak link of your company or someone who’s online activities are such that Now, someone may think, your competitors can and an alarming number use it against you. A bad of people do, since John security operative working X is not networking from for you shows the public the company’s Y social how low your standards media account but from may or may not be and

80


SOCIAL MEDIA POLICIES degrade the standards you appear to have when hiring people and how, apparently, you do not care about ethical considerations and personality traits.

available’’, or ‘’Our people are the utmost professionals’’, etc. How many of you have seen someone’s online behaviour and thought, ‘’Wow I can’t understand how that company hired someone It can also be used against like him/her…’’ So we can see your company in the market that a social media policy by your competitors claiming not only will protect your ‘’We have the best operatives company’s reputation but it

81


CIRCUIT MAGAZINE ISSUE 55 can also reflect the maturity and professionalism of your employees. Another reason for having a social media policy is the fact that, when you have a proper one in place, you most likely won’t be dealing with as many social media crisis situations. Keep in mind that in today’s digital age the quick spread on social media posts can make crises go viral quickly and ruin your reputation leaving a negative electronic footprint for you and your company. Now that we’ve addressed why it is needed, let’s see what a social media policy is. Simply put, it is a set of rules/documents that outlines how a company and its employees should carry themselves in online activities. Your employees will be advised of what they should or should not do in social media platforms, protect your company’s trade secrets, improve revenue due to increased and positive productivity, and also be aware and stay away from violating federal law. Is there a ‘’One size fits all’’ social media policy for every industry? No, depending on the industry you are operating within and what your activities are, as well as what you would like to achieve and what your values are, each company must develop its own social

Your employees will be advised of what they should or should not do in social media platforms, protect your company’s trade secrets, improve revenue due to increased and positive productivity, and also be aware and stay away from violating federal law.

82


SOCIAL MEDIA POLICIES

media policy and social media crisis management plan. The most basic concepts we could say that any social media policy for security companies should include are: 1. A list with what not to speak about in public: topics/ information that no one should mention in social media. Basically, do’s and don’ts.

at Athena Worldwide it is our policy that no one use or mention clients’ names or post pictures, many other companies are ok with it. So again, it comes down to what are your company’s values and goals). 3. Who will be the company spokespeople and who will be the people in charge of your social media accounts?

4. Who will be the person 2. Approval or disapproval for in charge of writing or employees to post pictures or approving information and drop clients’ names (Although educational posts for your

83


CIRCUIT MAGAZINE ISSUE 55 blog and social media accounts?

infringements by other companies?

5. Who will be responsible to deal with and address complaints? Most of the time, it is up to the company’s management to deal with complaints which can be a poor choice as dealing with complaints comes down to managing a crisis and how to de-escalate the situation. You have to be trained to do so and not get emotionally involved.

7. What will be your direction on how to respond in online conflict situations? For example, how will you respond if someone attacks your company tactics, your employees, etc?

6. How will your company address training, promotional video, or website copyright

8. Who will be assigned as your social media crisis management person and what will be your crisis management plan? 9. Outline the basic steps that your employees can take to protect

84


SOCIAL MEDIA POLICIES their own privacy online. Does your company provide basic cybersecurity awareness and insider threat awareness training?

or practitioner, you are working with a very specific clientele and you are in charge of their safety, their peace of mind, and their confidentiality.

10. Will your company be offering online etiquette training to your employees?

How you represent yourself in social media, how you react in ‘’challenging’’ posts and critiques, or what content you see valuable and professional enough to share in public, shapes your virtual persona identity/ footprint and your image as a security professional. It takes years to build a good image and reputation… and only a few words online to destroy it.

11. Will your company be enforcing consequences? Any social media policy, without consequences for people who break it, is invalid. Your company must decide how it will handle violations, list the potential consequences, and make sure enforcement is understood by your employees. Always have in mind: as a security company Denida Zinxhiria Grow is the Founder and CEO of Athena Worldwide, Athena Academy and Nannyguards. She is an experienced and well trained Executive Protection Specialist, Security Consultant, and Instructor with 18 active years in the private sector. She has been operating in different countries and cultures and has managed security teams of all sizes. She uses her personal experience to help others learn what it takes to master the ins and outs of the Security Industry and empower women in the security industry. Denida also holds a BSc in Counseling and Psychology. www.athenaworldwide.com www.nannyguards.com femalebodyguards.info

85

Interested to find out more how to build your company’s Social Media Policy and Social Media Crisis Management Plan? Contact us.


THE THEORY OF COVERT SURVEILLANCE • • • • • • • • •

Surveillance Operators Bodyguards Surveillance Instructors Professional Investigators Enforcement Officers Intelligence Officers Police & Military Security Consultants INVESTIGATIVE JOURNALISTS

Zap It...

E V I CT

Surveillance Training Course Handbook A R TE

The

IN

By Peter Jenkins ISS TRAINING LTD

www.Surveillance-theory.co.uk

86


COMMS PLANNING

By: Andy Clark

In the first instalment of this article, I discussed the comms landscape in general and highlighted the importance of treating comms (sig’s) as a defined team role. I also outlined the importance of having a comms plan and looked at: • Why we communicate, • What we communicate, and • How we communicate, which was split into two parts. - Part 1 focused on the language we use - Part 2 is the physical medium, hardware and technology that we use, which is what I will dive into here in this article, It is inevitable if you work within the security sector that at some point, you will have has a radio thrust in your direction for you to

87

use as your primary form of communication. Yes, that’s right: your primary form of communication! As the primary form communication, it means that this is the device that you will use to report into the Control Room, what you will use to see if your relief is on the way so you can go on your well-earned break, and your lifeline to call for help if you find yourself in a situation where you are being threatened or are in some other form of physical danger.


CIRCUIT MAGAZINE ISSUE 55 A useful and handy tool, right? So how much training were you given the first time it was handed to you? What explanation were you given about how well it works and how reliable it is? How much were you told about its limitations? What procedures were outlined about what to do if you press the button and you don’t get a response? What ‘lost comms’ systems were you briefed on? What alternative (backup) methods were you told were in place if your primary comms failed? I’d bet the keys to my car that 90% of people will not

have been briefed on any of the above, and yet this one tool that may just save your life, and yet you have absolutely no idea how it works, or what to expect from it. When was the last time you were handed a first aid kit and expected to know how to use it without the appropriate training? When was the last time you were expected to stand on the front-line without having been taught how to safely and legally restrain someone, should the need arise? When was the last time you were sent to do a security advance survey without being trained on

88


COMMS PLANNING what to look for and how to Most radio networks carry it out properly? are designed to cover a specific area, and with few No wonder one of the exceptions, that coverage things people always is limited to a fairly small bemoan is comms! And footprint. Often this is the main reason for this is sufficient. Why cover an because they don’t know area bigger than the one in how it works. It isn’t their which you are operating? fault; it’s just that they’ve But even within this never had any meaningful bubble, there may well training, and their be areas where coverage expectations have never is patchy. Therefore, it is been managed. important that these are identified and radio users So let’s start with some made aware that they basics. Radio is a line of can expect to lose comms sight technology. In simple (a.k.a. “notspots”) when terms, if you can see it, entering that specific zone. you can talk to it! It’s a bit more complicated than However, the key is that: that because radio waves movement clears notspots! at different frequencies On a recent site coverage behave in different ways survey, we stopped in a and tend to bounce corridor to do a comms about all over the place. check and … nothing. We Therefore, the adage of tried several times but ‘line of sight’ thing is more to no avail. I took one a rule of thumb than a hard pace, yes just one pace, and fast principle. in a different direction and comms was restored. While this falls outside the So remember this, often purview of this article since adjusting your position by this isn’t a technical course, just a small amount can we won’t focus any more make a difference. on that aspect. But it does raise an important point of But what if your operational awareness: conventional area is larger? What if radio technology, whether you want comms across analogue or digital, has a whole town or city? limitations and these To implement a radio limitations are governed, to network of that size has a large extent, by the laws challenges, both technical of physics. and commercial. Finding

89


CIRCUIT MAGAZINE ISSUE 55 enough locations to site repeaters (a repeater is a ‘booster’ for a radio network, generally located at the top of a tall building) is a challenge and paying for them is an even bigger one! Radio networks need licences to operate. Increasingly, licences are hard to come by, especially in densely populated locations such as town and city centres. Where they are available, they are expensive, reinforcing the fact that to provide wide-area coverage in these circumstances is often simply not financially viable. Fortunately, however, technology does advance, and for every problem, there is a solution! As I mentioned in the previous article, we now take it for granted that our smartphones will work pretty much wherever we go. Seldom do we stray into areas where coverage is insufficient to allow us to stay in contact with the outside world. With the advent of 5G, we are going to enjoy even better coverage, with faster speed than we’ve ever had before. We can take advantage of all of this to give us the radio coverage we’ve always wanted. By using the mobile data network, it is now possible to have a ‘radio’ network that covers not only a city but the whole country, indeed the whole world. It sounds too good to be true, but it is a reality.

Devices can be configured and reconfigured remotely, meaning that if anything needs to be changed or a feature added, it can be done in real time, without the need to wait for someone to come to site with a laptop and a programming lead, as is the case with conventional radio...

Think of the mobile phone

90


COMMS PLANNING networks as one huge, interconnected repeater that we can access at will. We don’t own it. We don’t need to pay for licences. We have none of the headaches of maintaining it. That’s all done for us by the mobile network operators. But we can access it whenever and wherever we are. This is the reality today.

• Geo location through GPS • Indoor localisation using BLE beacons • Geo fencing generating alerts when entering or leaving a pre-defined area • Dynamic group allocation • Call recording for postincident playback • Push to Video for real-time situational awareness

You will hear this reality referred to by a variety of different names: Network Radio, Push to Talk over Cellular (PoC), Push to Talk over Broadband (PTToB), LTE Radio, or simply Push to Talk (PTT) as some of the more common ones currently in use.

A further advantage is that all of these capabilities can be deployed almost immediately. Devices can be configured and re-configured remotely, meaning that if anything needs to be changed or a feature added, it can be done in real-time. There will be no need to wait for someone to come to site with a laptop and a programming lead, as is the case with conventional radio. It is also relatively simple to interface this technology with existing radio networks, so you don’t need to throw away what you have now. You can simply enhance it with an LTE capability, where necessary.

Indeed, this is what is replacing the TETRA based Airwave system currently used by the Bluelight and security services. The new Emergency Services Network (ESN) is based on a commercial PTT platform and accessed through the EE mobile network. In addition to virtually limitless coverage, PTT also delivers a range of advanced features that were simply not possible. Or if they were possible, they were not practical to deploy, using conventional two-way radio technology. Here are some examples: • Lone worker protection • Mandown • Remote monitoring of audio and video

91

The question always comes up about the reliability of the mobile phone network. There have been some high profile ‘outages’ in the recent past that have caused chaos for millions. But whilst single networks are prone to problems from time to time, when was the last time that all four of the leading UK mobile networks failed simultaneously? I’m open to


CIRCUIT MAGAZINE ISSUE 55 being corrected here, but I think the answer is ‘never.’

conventional radio, so it is foreseeable that the ‘meet & greet’ volunteers in the I highlight this because Visitor Centre will be using to use the mobile data WiFi enable PTT devices. network, the devices that Using these, they can talk are deployed will obviously to the field workers on the need to have a SIM card margins of the estate, who fitted. If that SIM card is tied themselves are using VHF to a single network, then handheld radios. yes, you are vulnerable. But here technology has This is all possible right here advanced once again. There and right now. If you haven’t are now multi-network yet explored the possibilities, SIM cards, giving coverage I’d highly recommend that across Vodafone, O2, EE you do. Otherwise, you and Three that are readily risk missing out on a world available. This means if one of improved operational network goes down, you will capability and enhanced automatically re-connect to operator safety. one of the others. In the next article, I However, this isn’t a will be discussing more panacea, although it comes about communications close! At G6 we do a lot of planning, including what to work with National Trust consider when looking at properties across the UK, contingencies and the role which by their very nature, of the Operations or Control tend to be in highly rural Room, in whatever form that locations where mobile may take in your comms phone coverage cannot plan. be guaranteed (at least not yet). In these more consider when looking at rural locations, we’re still contingencies, and we’ll deploying conventional radio also consider the role of the solutions. But as mentioned Operations or Control Room, above, technology exists for in whatever form that may us to bridge both PTT and take, in your comms plan! G6 Global has been delivering critical communications since 1999. Communications connects everything that we do, and we will find the most robust and appropriate solution to your communications needs. We recently partnered with Syops Solutions who specialise in delivering communications training that will raise your teams communications skills to the next level. For more information, email G6 Managing Director Andy Clark at andrew@g6-global.com. www.g6-global.com

92


Connect your team with G6PTT. Radio without boundaries. G6 Push to Talk brings you the best from the communications world; the power of network radio using 3G, 4G, LTE & WiFi to give unparalleled global coverage. This system is the result of our successful collaboration with TASSTA; leading edge design and engineering for a changing world. Adaptable, scalable and flexible to fit any operational environment.

The functionality of two-way radio but with no coverage restrictions, and with advanced features that will transform the way you operate. Get in touch to see what we can do for you.

Communications simplified: delivering SECURITY | SURVEILLANCE | MARITIME | HUMANITARIAN practical solutions to| DEFENCE mission critical| EXPLORATION users Communication connects everything that we do. G6 Global exists to create the best communications system for your operational needs.

Web: www.g6-global.com Telephone: +44 (0)1454 610050 www.g6-global.com Email: g6@g6-global.com 93

+44 (0)1454 610050


CIRCUIT MAGAZINE ISSUE 55

By: Orlando Wilson

If you plan on working internationally in close protection or the security industry, you will be expected to know how to handle firearms. What most people, especially Americans, don't realize is that most civilian, non-government close protection jobs are unarmed due to the legal restrictions on firearms in most countries. Part of your threat assessment for any assignment needs to take into account laws on the use of force and weapons in the locations you are going to be working in. Being caught with an illegal weapon, especially a firearm, will get you thrown in jail very quickly, no matter how important you think you are!

So, what do you need to know about firearms if you are looking to work internationally in the close protection and security industry? Well, first and most, the important thing is knowing how to use firearms safely. To become proficient with firearms, like everything else takes practice and time. You're not going to become an expert after a few hours of instruction and tuition. Many firearms-related accidents happen because those handing the firearm are not complying with

94


TACTICAL FIREARMS

95


CIRCUIT MAGAZINE ISSUE 55 basic safety rules, including 1) keeping the firearm pointed in a safe direction and 2) keeping their fingers off the trigger. If you ensure you always follow these two safety rules, you will be acting more responsibly than many others who are working with and carrying firearms. Remember, if you're the one in control of a firearm that accidentally discharges and injures/kills someone, you will be held responsible. Aside from these necessary safety measures, a thorough understanding of firearms and range safety is essential before you even start any shooting with live ammunition. Here is a complete list of firearms safety rules and considerations to bear in mind: WEAPON SAFETY DEPENDS ON KNOWING YOUR WEAPON, CONFIDENCE, ALERTNESS • Safety considerations for firearms must always be followed • Always keep firearms pointed in a safe direction, especially when loading and unloading. • Keep your finger off the trigger until the weapon is pointed at your target. • If the action or slide

on the weapon is closed, always treat the gun as if loaded and carry out the • unload drills. • Always show that a firearm is unloaded to a person before you hand it to them. • When someone hands you a firearm, always check the chamber and make sure it is unloaded. • Never take a person’s word for whether a firearm is loaded or unloaded, always check! • Never point a firearm at anyone just for fun or play games with firearms. • Always know what is behind your target and have a good backstop. • Only fire-controlled shots. You can rapid fire but make sure you are hitting your target. • Always practice tactical drills with unloaded firearms until you’re confident and competent enough • to use live ammunition. • Always unload firearms before dry-fire tactical training. • Only use dummy ammunition or blankfiring firearms for demonstrations or dryfire drills. • Never mix blank, dummy, and live rounds. • Always check that the gun is unloaded before cleaning. • Never tamper with

96


TACTICAL FIREARMS

It would be best if you tried to train with and get to know as many different types of firearms as possible because you never know what you will come across.

ammunition, and only use reloads from reliable sources. • Never use damaged rounds, and always dispose of them safely. • Keep guns and ammunition in secure storage when not in use. • If you do not know how to operate or are having problems operating a firearm, get professional help. • Never used drugs or alcohol when using firearms. • Always check and comply with local firearms law Types of Firearms It would be best if you tried to train with and get to know as many different types of firearms as possible because you never know what you will come across. You might be working unarmed on an assignment in a hostile environment, but you need to know how to use any variety of firearms you might encounter in that environment in case things go wrong. For example, imagine that your hotel is attacked, in which case you will likely have no choice but to use the firearms of the local security, police, military, and bad guy. Pistols: The two main classification for pistols are semiautomatic and revolver.

97


CIRCUIT MAGAZINE ISSUE 55

protection experts, usually from police backgrounds, dismiss the requirements for shotgun training. I believe the reason for this is their experience within a government agency has not required or given them many opportunities to use shotguns or travel to locations where they are used. Having worked Shotguns: Unfortunately, I in Europe, South & West have heard quite a few close Africa, the Middle East, Sadly, most people these days tend to only train with semi-auto safe action guns such as Glock and S&W M&Ps. You need to know how to safely use revolvers, single and double action semi-autos, single-action semi-autos and at least be familiar with derringers and sub-compact pocket pistols.

98


TACTICAL FIREARMS U.S., Caribbean, and Latin America, I have come across shotguns being used for security details in all of those locations. In fact, shotguns are probably the most widely used firearm used for legal security purposes globally. Since shotguns come in various configurations, you should at least understand break action, pump, semi-auto shotguns and the various types of ammunition and chocks. Assault Rifles: Even though most of the tacticool firearms training videos on the internet put an emphasis of training with AR-15s and AK-47s, in reality, there are not many places you can legally use them for security purposes unless you are in the military, on a governmentrelated assignment, or working illegally. In Iraq and Afghanistan, the laws were put in place for security guards to carry assault rifles, but in most places, if you are lucky enough to have firearms legally, there is a greater chance of it being a shotgun or a pistol rather than an A.K., etc. Sporting Rifles: In a lot of countries semiauto firearms are banned or significantly restricted, and the only legal firearms available will be sporting

99

shotguns and lever or boltaction rifles. The only time most tacticool operators will consider learning how to use a bolt-action rifle would be if it were a tricked-out sniper rifle. Well, I don't mean, but all hunting rifles, even with wood stocks, can be used as sniper rifles and for tactical applications. If someone is trained how to shoot properly, understands individual tactics, and is armed with a decent leaver or bolt action .22 rifle, I would class them as far more valuable than the tacticool shemagh wearing operator who uses optics on their tricked-out AR-15 to hit paper targets at 15 meters. Other Firearms: The types of firearms you could encounter will depend on where you are planning to work. In hostile environments, you may need to have the rudimentary knowledge of how to operate belt-fed machine guns. Or, if you're in an area where hunting is popular, it might make sense to learn a little bit about black powder rifles and pistols, which in some places have a lot fewer restrictions on them than cartridge firing firearms. Tactical Firearms Training I have my own views of


CIRCUIT MAGAZINE ISSUE 55 firearms training and the state of the firearms training industry, but I will reserve my judgment for the sake of this article. My basic advice to anyone looking at attending any firearms training courses is to ensure that the course is relevant and that the instructor is experienced enough to teach it. The best place to get a good grounding in firearms training is in the military because you will be given thorough training, the bullets will be free, and you will also be getting paid for your time. There is no way you can replicate a few years of military firearms training experience by taking a two-week tactical firearms course. However, one of the issues with those who have only had regular military training is that they are only used to dealing with a limited range

of firearms. Personally, I only really started to learn and use handguns other than a Browning Hi-Power after I left the British Army and worked in South Africa, Eastern Europe and then joined a gun club in the U.K. before handguns were banned. You must ensure the training you will be getting is relevant for what you are going to be doing and is of a good standard. In the U.S., the general standard for training is what's put out by the National Rifle Association (NRA). Most people don't realize when taking a training course from an NRA instructor that it only takes a one-day course to become an NRA instructor or Range Safety Officer. In the United States, it's easy as a one-day course for a novice shooter to become an NRA firearms instructor!

100


TACTICAL FIREARMS With another one-day course they can become a Range Safety Officer. And after that with another one-day course, a Chief Range Safety Officer who will be able to certify Range Safety Officers! All this without any experience of ever running a firearms course or any understanding of actually working on a shooting range. In fact, I have come across NRA instructors who could not field strip their own firearms and Chief Range Safety Officers who had never used revolvers or shotguns. This defies their certifications, which would lead you to expect them to be experienced professionals!

as "firearms experts" after just a few one-day classes? I think this can be classed as fraudulent in anyone's books. It's just like taking a firsttime driver, giving them a two or three-day theory on how to drive, showing them a car, starting the engine and then certifying them to set up a driving school. Scary, right? Always verify the real-world experience of the instructors who you're intending to pay good money for quality training.

Firearms training can be very expensive so ensure you're not wasting your money and understand that after just a few days training you're not going to be at a professional You cannot gain the level, regardless of what your experience required to be a certificates say! Ongoing dry decent RSO or instructor by and live firearms training and just attending a few theory weapons familiarization are classes or by watching essential if you are serious tacticool YouTube videos about working in hostile and belonging to Gungenvironments. But the key is ho online chat forums. The to learn to differentiate the schools issuing these NRA difference between tacticool certifications are making money. It's business, but how holidays and worthwhile experience and relevant many of their students then training! go on to market themselves

Orlando Wilson has worked in the security industry internationally for over 25 years. He has become accustomed to the types of complications that can occur, when dealing with international law enforcement agencies, organized criminal and Mafia groups. He is the chief consultant for Risks Inc. and based in Miami but spends much of his time traveling and providing a wide range of kidnapping prevention and tactical training services to private and government clients.

101


ASK THE NABA NETWORK

Why did you choose your logo and does it have any special meaning?

Devon Taitt I chose the shield vs an offensive weapon because what I truly want in my business is to teach effective violence prevention, the motto has biblical meaning, it’s round because it brings it all together.

Mark James PPS Logo was inspired by the color blocking of Presidential Seal. I also built my agency on the Secret Service Model and not the Gold's Gym Model. The World Map speaks to the global nature of our coverage model. The tag line swift but silent was inspired by the movements of the panther. They move stealthily under the cover of darkness often undetected. Most attacks often happen under low light conditions and that is when a panther is at their best. Silent speaks to their movements and as protection specialist we rarely talk, particularly about the things we see. That is the confidentiality and discretion of our jobs. The loyalty, discipline and humility is what I look for in protection specialist.

Brandon Gregory I created SGS logo to stick out but remain professional and elegant...I wanted the logo and name to stick out that our team would provide protection anywhere and provide solutions to client problems...

Elijah Shaw I’ll tackle the Arms Length Away logo. I wanted something that was extremely simple. One that people in our industry would get, but others might draw their own conclusions. What’s funny these days, with the pandemic, people think it means to stay 6’ away from me.

102


Steven Villarreal II After 15+ years of being dually licensed in California and using just my company initials, I consulted www.andalecreative.com and this was the game changer. SCV all incorporated into one logo design in the shape of shield/badge. *we also trademarked my personal mantra of "Busy and billable, not bored and broke".

Mike Brown I choose Mastiff because they are my favorite breed of dog and it’s simple and gets to the point. When people think of mastiff’s they think of guard dogs. Mastiffs are natural born protectors. The shield adds more of a defensive tone and gives a bold impression.

Lee Barnard Jaguar was a nickname I received back in the mid 80’s it stuck. I even owned a karate school named Jaguar Sport Karate. So I just added the logo and my nickname to the brand.

Ues LM I choose to make the logo the way I did because most of the security companies in my direct market operate and look like law enforcement. The way our logo is sleek sharp and to the point says much about how we operate. All our brothers are sharp on detail and work efficiently and effectively to get the job done.

Donald Sadler My logo design was simple yet complex in my thinking. I wanted something that carried the company initials along with the name, but separate so at some point I can remove the actual name and just have the initials/badge and it still be known to the public. I wanted a color that’s easy to print and mold into pins and print but with a raised and 3D affect to it. I did not want anything that represented security or transportation from its look. I did pull from what drew my attention over the years too. That was sliver car badges and the DC comic book logo.

The NABA network is a fantastic community for getting help and advice on all matter’s security related. https://www.facebook.com/groups/TheNABA/

103


CIRCUIT MAGAZINE ISSUE 55

Global Situation Report ANALYSIS

Each issue our global geopolitical partner, Stratfor, provides an indepth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.

Iran: Al Qaeda Deputy's Killing Could Reflect Israeli Fears of U.S.-Iran Rapprochement Nov 16, 2020 The assassination of al Qaeda deputy leader Abu Mohammed al-Masri in Iran reflects an Israeli effort to undermine potential outreach by the administration of U.S. Presidentelect Joe Biden to Tehran by highlighting Iran-al Qaeda ties, Haaretz reported Nov. 16, citing unnamed sources. The New York Times reported Nov. 13 that Israeli operatives assassinated al-Masri sometime in August 2020 in the streets of Tehran at U.S. behest. The United States, Iran, Israel and al Qaeda have all not acknowledged the killing. Why It Matters: While such efforts might complicate outreach to Tehran by the Biden administration, they will not stop it. When Biden eventually takes office, his administration's Middle Eastern policies will likely create Israeli-U.S. friction. Egypt: Government Employee Sets Himself on Fire in Cairo’s Tahrir Square Nov 13, 2020 A government employee set himself on fire in Cairo’s Tahrir Square after shouting about government corruption and wanting to avoid arrest, the Egypt Independent reported Nov. 13.

104


GLOBAL SITUATION REPORT Why It Matters: Although this is one isolated incident, such events still risk further galvanizing anti-government sentiment in Egypt. The growing number of Egyptians who are struggling to make ends meet is creating an environment ripe for unrest, and could prompt more citizens to defy strict COVID-19 restrictions on protests to publicly air their discontent, as some did in September.

Israel, Palestinian: More Israeli Settlements to be Built Near East Jerusalem Nov 16, 2020 Clashes between protesters and police delayed the start of a conference in Bamako The Israel Land Authority (ILA) is moving ahead with a plan to build 1,257 homes in the sensitive area of Givat Hamatos near East Jerusalem, Reuters reported Nov. 15.. Why It Matters: Israel is rushing to approve settlements before U.S. President-elect Joe Biden takes office in January. Current U.S. President Donald Trump has given Israel full range to maintain its long-term strategy of expanding settlements in the West Bank to undermine a future Palestinian state. Biden, however, has indicated he’d be more skeptical of Israel’s regional behavior.

105


CIRCUIT MAGAZINE ISSUE 55

FEATURED ASSESSMENT Scotland, UK Dec 1, 2020 Disputes within Venezuela’s The issue of Scottish independence is re-emerging ahead of the country’s May 2021 parliamentary election. Scotland’s First Minister Nicola Sturgeon said that if her Scottish National Party (SNP) wins the country’s parliamentary elections next year, it will push for an independence referendum. Saudi Arabia Nov 30, 2020 Saudi Arabia appears ready to soften its blockade against Qatar to improve its relationship with the incoming administration of U.S. President-elect Joe Biden. Ukraine Nov 23, 2020 Ukraine is poised to get its nascent program of economic reforms back up and running in order to regain key financial support from the International Monetary Fund (IMF). At least $1.4 billion is immediately at stake, with $700 million scheduled in December if Ukraine’s program remains on track. Turkey Nov 9, 2020 A personnel shakeup among Turkey’s financial and economic leadership indicates growing political pressure on and within the ruling Justice and Development Party (AKP) to fix the country's flagging economy.

Five Years In, Saudi Arabia Is Signalling It Wants Out of Yemen Saudi Arabia’s window to exit the conflict in Yemen without jeopardizing all of its gains is quickly closing, as the United States transitions to a less Riyadh-friendly government, and as Houthi rebels seek deeper concessions on the ground. Waning external support for the Yemen war, combined with economic pressures from low oil prices and the COVID-19 pandemic, has increased Saudi Arabia's impetus to withdraw from Yemen, forcing Riyadh to accept the failure of its five-year military intervention. Riyadh’s ongoing operation in Yemen has failed to accomplish its primary goal of ousting the Houthi movement from the country’s capital, Sanaa, and restoring President Abed Rabbo Mansour Hadi to power. • Saudi Arabia’s heavy reliance on airstrikes and blockades in Yemen has come at the cost of civilian casualties. • In April 2019, the U.S. Congress voted to end

106


GLOBAL SITUATION REPORT military support for Riyadh’s intervention in Yemen, which Trump ultimately vetoed. Saudi Arabia’s relationship with the United States will become more adversarial once U.S. President-elect Joe Biden takes office in January and increases Riyadh’s exposure to U.S. political pressure, deepening distrust between the two allies. Compared with Trump, Biden is also far less likely to block Congressional attempts to end American support for the Saudi intervention in Yemen, which Biden has also vocally condemned. Riyadh may perceive such a decision as the beginning of a greater U.S. diplomatic pressure campaign to draw down its intervention in Yemen after years of the Trump administration’s strident support, pushing the kingdom to further diversify its ties away from Washington. • Saudi Arabia and the United States’ defense ties and economic relationship are substantial. But a decline in the need for Saudi oil due to lower global energy prices and increased fracking operations in the United States has helped Washington consider a looser relationship with the kingdom. • Saudi Arabia has been seeking new defense and economic partners to offset the loss of a close relationship with the United States, including increased defense ties with China and a potential warming relationship with Israel to gain access to Israeli technologies. The longer the Houthis are able to force the Saudis to remain militarily engaged in Yemen, the more likely it is that U.S. pressure to end the war will force Riyadh to grant concessions. A potential U.S. designation of the Houthis as a foreign terrorist organization could also further complicate Riyadh’s ability to reach a political settlement with the rebel group, as the Houthis could demand the removal of the designation as a prerequisite for negotiations.

107

Europe Nov 20, 2020 An ongoing dispute over a 1.8 trillion euros ($2.1 trillion) EU spending package could jeopardize the bloc’s economic recovery. Any delays in the disbursement of these funds would be particularly damaging for southern European countries. Saudi Arabia, Israel Nov 24, 2020 Full normalization between Saudi Arabia and Israel remains unlikely in the near term, but defense and intelligence cooperation will continue to advance in the coming months. EU-U.K. Nov 16, 2020 The race is on for EU-U.K. trade negotiators to resolve their outlying disputes in order to avoid a disruptive no-deal British exit from the EU single market on Jan. 1. A limited trade agreement is probable, but London and Brussels must reach it by early December to ensure their legislatures can approve it in time. Iraq Nov 9, 2020 Intra-Kurdish clashes in northern Iraq could lead to additional attacks against nearby oil infrastructure, as the Kurdistan Workers' Party (PKK) retaliates against attempts by Iraqi and Turkish forces to reduce the group’s presence and activity in the resource-rich region.


CIRCUIT MAGAZINE ISSUE 55 Why It Matters: Although this is one isolated incident, such events still risk further galvanizing anti-government sentiment in Egypt. The growing number of Egyptians who are struggling to make ends meet is creating an environment ripe for unrest, and could prompt more citizens to defy strict COVID-19 restrictions on protests to publicly air their discontent, as some did in September.

U.S..: White House Blocks Investment in Chinese Companies Supporting Mainland Military Nov 13, 2020 U.S. President Donald Trump issued an executive order on Nov. 12 barring Americans from holding direct or indirect shares in 31 Chinese companies that the Department of Defense says supply or support the modernization of China's military, intelligence and/or security services. Why It Matters: The move, which has been in the works for months, aims to blunt China's military modernization and technological progress. U.S. President-elect Joe Biden’s incoming administration is unlikely to overturn the order given the bipartisan consensus on countering China's rise. Morocco: Rabat Deploys Troops to Western Sahara Border Zone Nov 13, 2020 Morocco has launched a military operation at the southern border of Western Sahara to “deter” against recent attacks by the Algeria-backed Polisario Front and end the group’s weeks-long blockade on trade between Moroccan-controlled areas of the disputed region and neighboring Mauritania. Why It Matters: Morocco’s response to Polisario provocations shows an effort to snuff out border unrest before it escalates. In the near term, the military operation will resume commercial and civil traffic through the town of Guerguerat near the Mauritanian-Moroccan border.

108


GLOBAL SITUATION REPORT Lebanon, Israel: Countries Hold ‘Productive’ Round of Talks on Disputed Maritime Border Nov 12, 2020 Lebanon and Israel held their third round of U.S.-mediated talks over their disputed maritime border in the Mediterranean Sea, which the United Nations described as “productive.” Why It Matters: By opening the door to other demarcation options, Lebanon is showing a willingness to compromise with its long-time regional foe, Israel. This may bode well for drawing out new borderlines to resolve the ongoing dispute, which has kept both countries from exploring and developing the potentially gas-rich area.

Bahrain: Crown Prince Named Prime Minister Following Death of Sheikh Khalifa Nov 11, 2020 Bahrain’s King Hamad bin Isa Al Khalifa has named Crown Prince Salman Al Khalifa as prime minister following the death of the country’s longtime leader, Sheikh Khalifa bin Salman Al Khalifa. Why It Matters: Sheikh Khalifa amassed considerable influence within Bahrain’s political system over the course of his nearly 50-year tenure as prime minister. The crown prince’s appointment is thus unlikely to trigger a change in the country’s economic or security policy.

109


CIRCUIT MAGAZINE ISSUE 55

Saudi Arabia: World War I Commemoration Attended by European Diplomats Bombed Nov 11, 2020 An improvised explosive device injured at least two people Nov. 11 in an attack on a World War I commemoration organized by the French Embassy in Jeddah and attended by several European diplomats, AFP reported. No group has claimed credit for the attack, and the culprit has not been identified. Why It Matters: Saudi authorities have cracked down on militant activity in recent years, and explosive attacks in Saudi Arabia are especially rare outside the border region with Yemen. The bombing comes after an Oct. 29 stabbing of a security guard at the French Consulate in Jeddah.

110


GLOBAL SITUATION REPORT

Armenia, Azerbaijan: Countries Agree to Cease-Fire in Nagorno-Karabakh Nov 10, 2020 Armenia has agreed to withdraw from several areas and freeze Azeri territorial gains in Nagorno-Karabakh as part of a new Russia-brokered cease-fire agreement with Azerbaijan. Why It Matters: The cease-fire agreement will end six weeks of fighting between Azeri and Armenian forces in Nagorno-Karabakh. Azerbaijan, however, won many of the concessions it has long sought in negotiations over the decades-old dispute. The deal has thus been received as a victory in Azerbaijan and as a capitulation in Armenia, which will leave the door open to new fighting in the future. Iraq: Rare Islamic State Attack Outside Baghdad Kills 11 Nov 9, 2020 A coordinated attack by the Islamic State killed at least 11 people and wounded eight more Nov. 8 at a military post run by a local tribal militia in the Radwaniyah area of southwestern Baghdad near the international airport. Why It Matters: The attack comes as the Islamic State continues to regroup in northern and western Iraq. While attacks in rural areas have remained common, attacks in and around Baghdad have been relatively rare.

111


CIRCUIT MAGAZINE ISSUE 55

event rEVIEW

Virtual event October 16th, 2020

Circuit Magazine Hosts Executive Security Forum West Africa

The Circuit Magazine held a virtual West Africa Executive Security Forum on October 16, 2020, that was attended by Executive Protection specialists and experts from the West Africa region and globally. The goal of the Forum was to foster improved relationships inside and outside of the region, whilst developing training priorities that should guide and inform the

working CP beyond the pandemic. The event carefully balanced questions ranging from what EP in the region requires to

112


EVENT REVIEW get to the next level among locally based experts and how the international community can help it get there. It also looked at the local rules of engagement within the West African operating picture and addressed how local solo operators can attract the attention of credible international partners. It was reassuring to see that many parallels were drawn between the corporate security professional, for example, in Nigeria and one in Europe, especially where the question of professional development and career advancement found common ground. The event was fortunate to

have many members of the ASIS West Africa Young Professionals chapter attending and speaking, including Victoria Nkemdilim Ogbuehi, Senior Risk and Resilience Manager Nigeria, of Coca Cola Hellenic Bottling Company. Being uniquely placed at the heart of the protection community, the Circuit Magazine brought together and connected thought leaders in this space to dig deep to discover whether online training has a place in this industry and how practitioners can navigate this potential minefield to make valuable investments

Corporate Security does not exist in isolation.” Some security practitioners “came up with new SOPs to contain the spread” They realised “working remotely is a possibility” ‘Businesses want to make sure they are secure first before they can begin to drive their profits Victoria Nkemdilim Ogbuehi, Senior Risk and Resilience Manager Nigeria, Coca Cola Hellenic Bottling Company

113


CIRCUIT MAGAZINE ISSUE 55

held nothing back and delivered a truly memorable experience. We’re indebted to each From topics such as: and every one of you for “Visiting West Africa the time you gave and from an International the selfless dedication in Perspective” and sharing of your valuable “Understanding the Importance of Developing professional experience and knowledge. A Tactical Medical Skills as an EP Professional in West particular word of thanks Africa”, the event featured to the ASIS West Africa key industry heavy hitters, Chapter for all their many of whom generously support. contributed informative and valuable expertise and In an era of perspectives on a range of unprecedented uncertainty relevant and timely topics. facing the modern close protection specialist, Participants also gleaned tips and insights on how to the event was indeed go beyond their paper CVs a valuable addition and welcomed resource for and better navigate their working CPs. careers in post-COVID world. The only question which remains is what topics Special Thanks… should we cover? And Special thanks must go again, this is where we out to all our participants look to hear from you, our and esteemed speakers valued readers. and panellists who in their education and development.

114


EVENT REVIEW Event Programme The half-day forum comprised of an intensive 4 hours of engaging panel discussions. The full agenda included: Opening Panel Discussion: Understanding the Evolution of Corporate Security in West Africa Panellists: • Victoria Nkemdilim Ogbuehi, Senior Risk and Resilience Manager- Nigeria, Coca Cola Hellenic Bottling Company • Gospel Israel Cookey, Head of Security, Daystar Power Group • Hilda Dafe Nwachukwu, Security Manager – West Africa, Cummins Inc • Finn Tore Pettersen, Sr. Strategic Risk Security and Administrations Manager, The Coca Cola Company • Théodore Lompo, Regional Security Superintendent West Africa, IAMGOLD Corporation International Perspectives Panel: Visiting The Region from an International Perspective Panellists: • Michael J Padilla-Pagan Payano, Chairman and CEO, Al Thuraya Inc. • Lee Oughton, COO, Fortress • Mac Segal, Regional Director EMEA, AS Solution • Steve Phelps, Regional Risk and Security Manager, DCPL

If you’d like to suggest a topic for our next event, drop us an email at info@circuit-magazine.com with your suggestions.

115


CIRCUIT MAGAZINE ISSUE 55

Security 500 Conferences (Washington DC) 15 Nov, 2021 Washington, DC

Fifth Annual Cyber Physical Convergence Forum London 10 Jun, 2021 London, UK

IFSEC International 18-20 May. 2021 London, UK

Washington, DC ISC West 2021 March 23 – 26, 2021 Las Vegas, NV

Expo Seguridad Mexico 6 – 8 Jul, 2021 Mexico

ISC East 17 – 18 Nov, 2021 New York City, NY

LAAD Defence and Security Brazil 6 – 9 Apr, 2021 Rio de Janeiro, Brazil

116


INDUSTRY EVENTS Sixth Annual Executive Security and CP Technology Forum London Jan 28, 2021

Virtual Events Executive Office Risk Management Forum 03-Dec, 2020

Corporate Security Modernization Forum Tri-State 20-Nov, 2020

International Security Expo London 28 – 29 Sept, 2021 London, UK

Safety and Security Expo Asia (Singapore) 30 March - 1 April, 2021 Singapore

ASIS Europe 2021 31 May – 2 June, 2021 Prague, Czech Republic

Do you have a security event that is not listed here that you would like our readers to know about? Contact us: info@circuit-magazine.com

117


CIRCUIT MAGAZINE ISSUE 55

Keeping Your Edge:

Is Unity In Our Profession Dead?

Keeping Your Edge: It’s Saturday, November 7, 2020, the day after President-Elect Joe Biden declared victory in the recent US election.

Action vs. Reaction

In what is now the norm in American politics, the election itself has illustrated a sharp division in the population, with one side celebrating victory and the other alleging fraud and conspiracy. As the President-Elect

By: Elijah Shaw

wrapped up his speech, now joined onstage by his extended family, my attention was on the members of the United States Secret Service who were close by. I thought of these men and the job that they were tasked to do. Not knowing them personally,

118


KEEPING YOUR EDGE what I believe is much more corrosive to the fabric of society on a broad level, but for the purposes of this article, our industry in microcosm, is that the commentary coming from us about politics is ofttimes disrespectful, lacking civility, and more disturbingly, may be filled with misinformation or disinformation. Ours has always been an industry that spoke about a code, and many use the words ethics and integrity, on everything from their business cards, to the signature line of their email address. We talk about the importance of client service, and I don’t think many adhering to standards would disagree with such as confidentiality, the above analysis, yet we log onto Facebook, however, my question is, Twitter or Instagram, and if we can attribute that we can’t wait to chime in level of dispassionate and let the world know professionalism to the member of the USSS, why our political stances in can’t those same qualities the form or post, memes, retweets, and video apply to those of us in the private sector? These shares. days, one only has to open up their social media The same individuals that application of choice, and will burst a blood vessel if they see a “bodyguard” there in the timeline, post a picture of they’ll find industry themselves and their colleagues who will make client, due to its supposed their political allegiances lack of professionalism, known loudly. will go online and insult a whole demographic of While that in and of itself people in which half of may sound harmless, I wasn’t aware of their political affiliations, were they a Democratic like Biden, or a Republican, rooting for the current President, Trump? They, like every other citizen of the country, were allowed to cast their votes, and could have picked either, or none. However, at that moment, on that stage, I don’t think it mattered. These agents, surely knowing the risk associated with the occasion, were focused on the task at hand: The safety of their protective charges, no matter their personal political affiliation.

119


CIRCUIT MAGAZINE ISSUE 55 those same clients would fall into. The protectors who play a game of “pileon” when a new guy entering the industry posts a comment on the message boards without proper punctuation, give no thoughts to filling up their timeline with expletives about why this political party or that politician deserves to be hung. Wait, weren’t we talking about professionalism? Do not get me wrong, we are all adults, and as such, we can say what we want. We can have views about any and everything, but make no mistake about it, some of those views in a public setting can have consequences. Do not think that the words that go up on your timeline, aren’t preserved somewhere, just waiting to be used against you down the road – even if you delete it hours later. Do not think that decision makers who were considering you for a project based off of your skills are not now weighing the tone of the words and

language you are using to express your political viewpoints. This might never be brought up in conversation, instead you are simply passed over in favor of someone who is a bit more opaque in their political passions. “Grey man” is a term used in our industry to describe someone who blends into the environment, leaving very little wake in his passing. It is a state that many of us actively work to achieve, as it will allow us to more effectively complete our assignment, because by bringing as little attention to us as possible, we gain a tactical advantage. If this is a preferred state, then why are so many of us running counter to that, by actively trying to bring as much attention as possible to our political beliefs? In this new era of political expression via social media, our words and actions are not aligning with the codes we profess to exemplify. As we move into 2021, my question is, will it get better or worse?

Elijah Shaw is the National Director of the North American Bodyguard Association and the CEO of ICON Global, and International Executive Protection Consulting Firm. Elijah, who has been featured in international publications such as Inc. Magazine, Entrepreneur, and Portfolio, runs the ICON Academy, an EP Training Program specializing in Celebrity & VIP Protection. He also currently sits on the Board of Directors of Executive Security International (ESI), the United States oldest Executive Protection Training School. His book, An Introduction to Executive Protection & Touring: A Guide to Mastering the Business of VIP Security, hit the Amazon best sellers list, and is available now worldwide.

120


KEEPING YOUR EDGE

ROBINBARRATT@YAHOO.COM 121


CIRCUIT MAGAZINE ISSUE 55

122


CLASSIFIEDS

Email: info@circuit-magazine.com United Kingdom 3D Security Ltd Taunton, Somerset, TA1 1TG Based in Taunton 3D Security provides security services for a wide range of clients. Whether you need a security guard in Somerset, event security in Leeds or Close Protection in London we will provide a solution for your needs. T: +44 (0)1823 253 001 W - www.3dsecurity.org E - enquiries@3dsecurity.org.uk A.B.I. Solutions A.B.I Solutions is a dynamic, forward thinking company, specialising in surveillance, security and investigations with local, national and internationalexperience. A.B.I provides a wide range of services to the corporate sector and individuals alike. W - www.abisolutions.co.uk Amanda Campbell A highly motivated and experienced female operative both CP and Surveillence training T – 07596542249 W - www.amandacampbell.org.uk E - ac@amandacampbell.org.uk Alex Morgan - Close Protection Officer I am a hardworking, enthusiastic and committed person. Adaptable and driven, I have great attention to detail and high standards. I am honest, reliable, friendly and work well as part of a team as well as on my own initiative. I am also a good listener who has the ability to communicate with people at all levels. I am comfortable, both taking and issuing direction. I am looking for the opportunity to apply and expand my skills. E: adsmorgan74@gmail.com T: 07775 636964 Ambassador Security Management ASM MK Lions Arena, Grafton Court, Snowden Drive, Winterhill, Milton Keynes, MK6 1AJ, GBR. After successfully gaining ACS (Door Supervision and Manned Guarding) along

with ISO 9000, we here at ASM have a dedicated management team with hundreds of years combined experience in the security industry. W: www.asmsecurity.co.uk E: scott@asmsecurity.com T: 08458335750 Amber Security and Protection United Kingdom At Amber Security and Protection Ltd we pride ourselves on providing a bespoke and tailored Close Protection, Residential Security, World Class Travel Security and Risk Management service to all our National and International clients. The Directors and Senior Operators are former military, law enforcement or special forces personnel who are fully operational SIA licensed close protection operatives who have over 40 years experience in both the military and civilian private security sectors. E: info@ambersecurityandprotection.com T: 07425868014 (07540392093) W: https://ambersecurityandprotection. com Ark Personal and Asset Protection Ark, 2b Crow Lane, Rochester, Kent, ME11RF, GBR A small, efficient, highly descrete company employing ex special forces and detectives for all civil and corporate covert needs. E: Office@arkprotect.com T: +0044 01634 845526 Argus Europe County Durham Argus Europe has been providing specialist training for high-net worth clients and their families for close to 20 years, worldwide. Argus Europe now offer accredited training for CPO’s, Surveillance Operators and Private detectives. Argus Europe is an operational company working globally with an extensive variety of contracts. W: www.arguseurope.co.uk T: +44 (0) 8456 123 843 Atlantian Business Solutions Group Rutland, LE15 6SD, GBR Atlantian Business Solutions has been

123


CIRCUIT MAGAZINE ISSUE 55 designed to help both individuals and New Companies build for the future as well as support others with training needs. T: 07725970954 W: www.atlantianbsgroup.com E: info@atlantianbsgroup.com Briareus Security Our aim is to give a complete, discreet and professional service to all of our clients, be they large corporations, small businesses, local authorities or private individuals, all tailored to meet their individual needs. W: www.briareussecurity.com E: info@briareussecurity.com Mark Corder - Chief Executive of Carmdale Ltd Suite 3 219 Bow Road London E3 2SJ Mark is a former Senior Police Officer specialising in counter-terrorism; firearms; public order; training and also physical, Critical National Infrastructure and nuclear security, having had responsibility for the security of the UK’s nuclear deterrent. A former Head of Operations, Operational Support and Training, Mark has been involved in a number large-scale incidents (including 7/7) and has also worked at the Office for Security and Counter Terrorism (OSCT) at the Home Office as part of a review into Critical National Infrastructure security. Mark has an MBA via the OU. E: mark.corder@carmdale.co.uk T: +44 (0)844 995 9900 W: www.carmdale.co.uk Alastair Christie Advice on site security, perimeter fencing, lighting, CCTV and manning requirements. Monitor and advise on guard force setting up site procedures and guard SOP’s. T : +44 (0)7736 328112 E : ally.c9496@yahoo.co.uk

CSI Protection Ltd International, GBR A well established security consultant and personal protection operative providing high or low Key protection to high risk and prestigious clientele. Specialising in the maritime industry as a consultant for private vessel protection on super yachts world wide. W: www.csi-protection.co.uk E: gary@csi-protection.co.uk Custodia Custodia is an independent client focused Specialist Security & Risk Management Company, specialising in Risk consultancy and Security project management. Providing a comprehensive portfolio of Risk mitigation solutions to assist Businesses and individuals to plan for, manage and mitigate risk. T: 01432 277693 W: www.custodia.co.uk Daniel Gentry Close Protection Operative I am a former RAF Regiment Gunner with 8 years experience, including various command roles and operational tours of Iraq and Afghanistan. My previous role as a behaviour specialist saw me de-escalating potentially dangerous situations on a daily basis. These two jobs combined have put me in a position where I am now very effective at managing not only a variety of situations but also a variety of different people, often from very diverse cultures. E: dangentry@hotmail.co.uk T: 07445181281 DF Risk Management Solutions DF Risk Management Solutions N.I. is a modern, professional risk management company, with a diverse range of global strategic experiences and a team of executives who possess dynamic but complementary backgrounds. T: +44 (0)7837642686 +44 (0)7758743918 W: www.dfriskmanagementsolutionsni.com

Control Risk Management Solutions - CRMS - Ireland Executive Close Protection Operations & Training (B Tec Level 3 Diploma Edexcel) Threat & Risk Assessments, Consultancy Services. W: www.crmsinternational.com E: martin@crmsinternational.com

Executive Protection Officer Worldwide CP services W: www.executiveprotectionofficer.com

Crest Security & Surveillance Ltd 51 The Crest, West Heath, Birmingham, West Mids, B31 3QA, GBR Highly experienced Security Consultant with a proven record of accomplishment in the field of protective security. Skilled in all phases of risk assessment, operational planning, logistical organisation, implementation of security measures, security team leadership, project coordination, and delivery of security advice to a high profile clientele. E: info@stephencahill.co.uk T: 447977071427

First Class Executive Security Nottingham, UK, Nottingham based, full-service company specializing in Bodyguards and Security Consulting services. Extensive experience in VIP security, also caters for public and private sectors. W: www.firstclasssecurity.co.uk T: 0115 9266466 G6 Global G6 are specialists in all types of radio, telephony and satellite communications for both voice and data with particular emphasis on covert communications installations in both

124


CLASSIFIEDS vehicles and fixed locations. In addition, our range of personal covert radios and bespoke accessories is extensive. W: info@g6-global.com T: +44 (0)1454 610050 Gordon Russell Highly trained frontline Close Protection Operatives available for UK and International contracts. Our experienced CPO’s can offer bespoke packages to meet all clients needs, including a variety of language skills. All SIA licenced, BBA member E: Bodyguard-cpo@Email.cz T: +44 (0)7917 281 004 Gareth Evans - CPO, MSO Reliable dedicated hard-working security professional, with outstanding communication skills. Strategic approach to problem solving combined with exceptional interpersonal skills, quick to grasp new concepts and information. Highly motivated, results-driven and thrives under pressure. Strong leadership and management skills with proven experience committed to continuous personal and professional development. E : evansgareth1979@yahoo.co.uk T : +44 (0)7900058603 James Izett All close protection task undertaken, including training tasks. Medic (Registered with the HPCSA, Registered FAAW instructor and Assessor E : J.Izett@gmail.com T : +971 (0)505 574 350 Janice Gurney Proficient and diligent Security Professional gaining extensive knowledge and experience within the security sector. Proactive individual who has a logical, flexible and conscientious approach to all challenges undertaken, ability to work as a member of a team or as an individual willing to work anywhere. T : +44 (0)7885 793061 E : janice382006@gmail.com King Cobra Security Ltd King Cobra Security are a Milton Keynes based company, incorporating Certificated Enforcement Agents, Security and Surveillance officers carrying services for the Domestic & Corporate Sector. Being one of Milton Keynes leading and vibrant companies not scared by trying new technologies sets us out from the rest. We are capable of tasking agents throughout the UK & Internationally when required. E : info@kingcobrasecurity.co.uk T: 0330 223 5099 W: www.kingcobrasecurity.co.uk International Centre of Special Training International Centre of Special Training is an international training and security company based in the United Kingdom.

Its priority objective is to provide services to the highest level. W: www.icost-team.com T: +44 796 736 55 65 IPSS Security Northfield, Aberdeen, AB16 7EX Security and protection services - UK and overseas. BBA Member. T: + 44 (0) 1224 69455 W: www.ippssecurity.co.uk ISS Training Ltd Riverside Cottages, Nidd Walk, Pateley Bridge, Harrogate, HG3 5NA ISS Training Limited are providers of specialist covert surveillance training courses and publications to the security and investigative industries, enforcement agencies and specialist military units. Formed in 1990, we are the longest established surveillance training ompany in the United Kingdom. Our credibility and reputation is widespread and we offer nationally recognised qualifications. BBA Member. T: + 44 (0) 1423 712265 W: www.intelsecurity.co.uk Jason Morris Security Hertfordshire, UK Providing a wide range of Door supervision/security for V.I.P and prestige venues, Concerts, Functions, Corporate and Personal Security, Weddings, Private Parties, Gala Dinners, Business Awards & School Proms, Close Protection and Body Guarding Static Guarding and Stewards. T: 01462 478900 W: www.jasonmorrissecurity.co.uk E: agosselin@jasonmorrissecurity.co.uk John Featherstone Security professional with operational experience gained in a variety of theatres. Main specialities close protection and surveillance. T: 24hrs : +44 (0)7702 740722 E: john@johnfeatherstone.co.uk W: www.johnfeatherstone.co.uk K9 Support Services Ltd K9 Support Services UK Ltd is a supplier of specialist drugs and explosives dog/ handler detection service (which includes arms & ammunition) to individuals, businesses, and the public sector. T: 0845 643 6393 E: info@k9support.org.uk Logas International Tyne & Wear, SR1, GBR Front line SIA, International CPO. Private Investigation and Surveillance operator. E: wscarr@logasinternational.com

125


CIRCUIT MAGAZINE ISSUE 55 Adam McErlane Close Protection & Client Management A qualified/licenced close protection operative and live events technician from the UK. • 12+ years of experience operating within the live events sector as on operational technician/engineer (Touring & In-House) • Extensive knowledge of the operational procedures, security protocols & logistical processes of large tours and venues. • Personal protection/client management experience (unlicensed) for a high net-worth individuals. Personal Qualities - • Determined, motivated & hard working. • Punctual and reliable. • Able to work independently & as part of a team • High ethical & moral standing. • Act quickly and decisively when required. • Working knowledge of defensive tactics in hostile situations. • Patient & Tolerant in stressful situations with others. • Rudimentary understanding of the Spanish languages. • Effective communicator with a diplomatic approach. • Very resourceful & able to find solutions to complex problems. • Possess good foresight & vigilance. • Years of experience working long & unsociable hours. • Physically fit & Healthy E: adammcerlane1989@outlook.com T: +44 7751953009 Michael Boreland Close Protection Officer Since leaving the British Army in 2006 I have been working in hostile environments for private security companies in various roles ranging from Training & Close protection. I have successfully managed a training wing in Afghanistan providing security operations training for local nationals & Expats conducting operations in the region I believe with my skills and experience of the employment I have done in the past I would be an asset to any organisation taking myself on as an employee. mike.boreland@gmail.com Marcin Gebler Close Protection Officer I have experience with work as an armed security officer, an armed security guard at army unit and army airport, an armed officer responsible for searching and identifying explosive devices, an armed CP in Poland. I have experience with work as a mobile patrol security officer and static security guard in UK. I have experience with work as a security officer at hotels, production sites, private households in UK. I am SIA CP and DS licensed. First Aid at Work Level 3 completed in 2020. Firearms Training Course Combat Pistol 1 for CPOs Shockfire in Poland 2020. E: p.i.gebler@gmail.com T: + 44 07799907528 MLK Security and Protection Services Swindon, UK Close Protection Officer and Door Supervisor E: mattleekane@hotmail.com T: 07917654978

LJE Security Services North Yorkshire, HG1, GBR Close Protection, Residential Security, Asset Protection, VIP red carpet Security and Private Investigation. E: leanneedmondson@yahoo.co.uk Oliver Mike Close Protection Operative I came from Hungary and live in the Uk in London since 2014. I was a Police Officer for 23 years as a CounterTerrorism Specialist. Next to the police I became a Close Protection Operative and self-defense instructor (Krav Maga). I was a member of the International Krav Maga Federation (IKMF). During my service I have been protecting Hungarian Prime Ministers, Interior Ministers, Foreign Ministers, Ambassador of Israel and other politicians of other countries. E: info@formerpol.com T: +447413190349 W: www.formerpol.com One Events Grantham One Events offers you a stress free solution in the organisation, putting together and running of an event. Thisis accomplished by having a group of specialised companies from different industries working together for a more complete service for you. TEL: 0870 974 6779 W: www.oneevents.info Paul Lovatt – CPO After serving 15 year in the Army a move to the Security Industry was a natural step, during the last 10 years I have worked in almost every role in the industry from Door Supervisor and loss prevention to Operations Manager and Director. I have been responsible for the creation and implementation of highly successful crime reduction schemes across Yorkshire working closely with other agencies in the areas of responsibility. Currently I am responsible for the overall running of large events security teams from stewards to Close Protection Officers. Operational planning, contingency planning and flexibility are I feel among my key strengths. E : paul@deltasecurity-eventmanagement.co.uk T : +44 (0)7506726336 Paul Tyler – VIP Protection & Concierge Specialist in discreet personal protection & surveillance. A good current working knowledge of London & its challenges gained through ongoing high risk security operations. Experienced in dealing with high net worth clients with all matters security & concierge striving go the extra mile to exceed expectations through thorough planning & interaction with all involved parties. A strong communicator with a smart appearance who remains synonymous with the principals lifestyle, whilst discretely ensuring a safe environment is maintained at all times, physically capable of adopting a higher profile when required to do so. Demonstrates sound judgement and capability to operate with great levels of

126


CLASSIFIEDS autonomy. Exceptional interpersonal skills with the ability to understand, interact & connect with a diverse range of people. E : paul@apparitio.co.uk T : +44 (0)7552515604 W : www.apparitio.co.uk Peter Jenkins Peter Jenkins is the director of surveillance training company ISS Training Ltd. He has been managing his own commercial and corporate investigation business in Yorkshire for the past 25 years. Previous to this, Peter spent 12 years in the Royal Marines where he specialised in various roles which included reconnaissance, intelligence, counter terrorism and instructing. He continues to carry out surveillance work on a regular basis and regularly instructs on surveillance training courses internationally. E: info@intelsecurity.co.uk W: www.intelsecurity.co.uk Plymouth Close Protection Highly versatile, physically fit and accomplished security professional with cumulative experience in the areas of security management, close protection, crisis management, risk assessment, emergency management, asset protection and security training. E : chris@plymouthcp.co.uk W : www.plymouthcp.co.uk T : +44 (0)1752 500807

W : www.prestigerisks.com Prometheus Medical Ltd Prometheus deliver unrivalled bespoke emergency medical support in the form of specialist equipment, training, strategic advice and deployed clinical care. T: (+44) 1568 613942 W: www.prometheusmedical.co.uk Prosec Consultancy Ltd 10 Oakfield business park Westbury, BA13 4WF. Prosec Consultancy Limited are dedicated in providing a professional service, which covers a whole range of security services throughout the security industry. T: 01373 228055 W: www.prosec-ltd.co E: info@prosec-ltd.com ProTouch Security ProTouch Security is one of the UK’s key providers of event safety, event security, crowd management, door supervisors, stewards, event management and health and safety. T: 01724 279 522 W: www.protouchsecurity.co.uk

Presence Security Presence Security (“ PS ”) is a bespoke security company providing protection for private individuals and VIPs, as well as security services for businesses and organizations. T: 0800 002 9734 E: info@presencesecurity.co.uk

Python Security and Protection Ltd Providing Close Protection Officers and Door Supervisors for Events and Venue Security. E : mattleekane@hotmail.com Radoslav Savkov - CPO / Security Consultant Oxford - United Kingdom I would introduce myself as a high calibre Security professional with strong customer oriented skills and managerial experience in the Security Industry, interested in a challenging position, which would fully utilize competences gained and provides opportunities for professional and personal development. With 15 + years of international experience in the sector at all levels and a military background (National Service) as well as a practical Close Protection experience in an executive environment, corporate intelligence and investigations. As a Security professional, I never consider my training and development as a complete, therefore I always look to update further my skills and knowledge. In personal plan I am very loyal, discreet , independent and willing to embrace challenges. E: r.savkov@gmail.com T: +44 (0)7886591525

Prestige Risks LTD 27 Old Gloucester Street, London, WC1N, 3AX, GBR. Close Protection Secure Chauffeurs Surveillance Residential Security Executive Protection Security Guards Asset T : +44 (0)207 5588182 E : info@prestigerisks.com

RSM Security UK Ltd London, UK RSM Security UK Ltd offers the experience and expertise necessary to provide security personnel of the highest calibre when you need them. T: 07850091979 or 07792948523 W: www.rsmsecurity.co.uk E: info@rsmsecurity.co.uk

PPSS Group Body armour and stab vests provide a functional solution to individuals who require extra protection in their chosen vocation. All PPSS (formerly ASEO) body armour and stab vests are certified by the UK’s Home Office (HOSDB) and offer unrivalled protection from blunt trauma caused by a punch, blow or kick. Based on our professional frontline experience and extensive research we can confirm that an impact based assault is a more likely event than an attack involving an edged weapon or firearm. T: +44 (0) 845 5193 953 F: +44 (0) 1765 603 512 E: info@ppss-group.com W: www.ppss-group.com

127


CIRCUIT MAGAZINE ISSUE 55 RWSSI Rob W is a professional security consultant with world wide experience and capabilities in Security, Surveillance and Investigation; I can support you to overcome any problems and enable you to achieve your goals E: rob@rwssi.co.uk T: +44 (0)7818 220985 SDS Solutions SDS solutions provide our clients with protective solutions that are second to none, our consultants will discuss every aspect of the problems that you are facing that dictate the need for a protective solution, we promise our clients a tailor made service to meet individual requirements. Whether based in the UK or abroad our protective service T: 01453 887815 E: info@sds-solutions.org Stephen OCallaghan Founder & Managing Director Strategically oriented Close Protection Security Specialist with a proven track record for providing effective leadership and exceeding performance objectives. Has been responsible for implementation of security standards in hostile and non-hostile job roles, security awareness and education, coordination of sensitive investigations, analysis of emerging industry trends and threats and the evaluation of overall team effectiveness. Ability to develop and maintain effective working relationships within a team, whilst at all times keeping the main objective and security needs at the fore front. E: enquiries@protegimusprotection.com T: +44 7306395194 W: www.protegimusprotection.com Shadow Close Protection A leading company specializing in Executive Protection as a professional sector, with participation in high and low risk missions, providing global security solutions and consultancy to individuals, corporations and national agencies worldwide. W: www.shadowcp.gr E: info@shadowcp.gr T: + 30 6948539664

in low and high risk situations . I have also a vast amount of experience in many other areas of there security industry including Door Supervision, Security Management, Event Security, and Residential Security. I have recently finished a diploma in Private Investigations and am a member of UKPIN. E: steve@covert protection.com T: 07818800778 W: Company Website: https://covertprotection.com Mark Claydon-Smith – CP Team Leader and Medic I have spent 13 years in the Royal Navy Culminating in the rank of SNCO Petty Officer. In 2004 I started my security career and have worked in Hostile environments. I have held several positions including Operations Manager, Team Leader and Rig Site Manager. I have worked in Kurdistan, Afghanistan and Iraq as well as the UK and Europe. E : mark@claydon-smith.com T : +964 (0)7815 970433 Philip Shearman MSyl – CPO, Risk Manager A professionally Qualified Close Protection and Surveillance Operator and Team Leader with over twenty two years of experience gained in the Military Police, the last fifteen of which were spent with the Military Police Close Protection Unit, working in various hostile countries throughout the world. Since leaving the Army in Nov 06 I have worked in the Private Security sector. I have gained valuable experience in demanding and challenging operational environments, where I have proved to be a self motivated and resourceful individual, performing well under pressure, communicating effectively at all levels whilst exercising tact, diplomacy and integrity. E : benshearman10@hotmail.com T : +44 (0)7930 277586 Spotllght Protection Services Essex based business which provides a broad and growing range of security services to businesses and organisations large and small. T: 07870560208 E: info@spotlightprotectionservices.co.uk W: www.spotlightprotectionservices.co.uk

Shaun West United Kingdom SIA licensed, Highly Experienced Frontline CPO. Ronin SA trained. Providing security for both corporate and hostile environments. E: sw@shaunwest.co.uk T: +44 (0)7830 109 601 W: www.shaunwest.co.uk Steve Pittman - Security Manager of Operations I have been active in the security industry for over 25 years in various roles including close protection where I have been responsiblefor the the welfare of high net worth individuals

Vas Sotiropoulos London, UK I am a security operator with over nineteen years of experience in close protection, counter-surveillance, diplomatic protection, door supervision, and CCTV monitoring in the United Kingdom and Greece. Second Lieutenant in the elite of the Hellenic Army, the Special Forces. Undertaken a number of close protection courses run by the Greek Ministry of Defence, the VIP Protection Unit of the Hellenic Police, and the Surveillance Department of the US Embassy in Athens. Highly motivated and confident relocated to the UK for further career progression and to install my own footprint in the private security sector. Fully

128


CLASSIFIEDS licensed Close Protection Officer by the British Security Industry Authority. E: info@spartanelitesecurity.co.uk T 02038882020 W: https://spartanelitesecurity.co.uk

most of the “Providers” of Protection services worldwide. Organisers of the 2008 International Summit of Protection Officers. BBA Member. T: + 972 9 950 0969 W: www.SecurityAcademy.org.il

VIPA Tactical Training A specialist training academy dealing with four specific areas of combat: VIPA Civilian Self Protection Program, VIPA Close Protection Combat System, VIPA Police Defence Tactics and VIPA Military Close Quarter Combat. BBA Member. W: www.VIPAtacticaltraining.com

Javier Galan Spain - Security specialist available for operations around the world. E: oejju@hotmail.com T: 34.637080771

Wagtail UK Wales, UK Wagtail UK are international specialists in detection dogs and dog handler training. Established in 2003, Wagtail UK provides detection dogs and related services for government agencies such as UK Border Force, HM Revenue & Customs, Police, Trading Standards and Armed Forces. Wagtail International School of Excellence in North Wales is a fully approved training centre endorsed by Highfield Awarding Body for Certification. T: +44(0)1745 561166 E: info@wagtailuk.com W: http://www.wagtailuk.com Westminster Security Ltd London, UK Westminster Security Ltd are an independent, industry leading private security company in London; providing security and investigation services throughout the UK, EU and worldwide for our clients. We specialise in close protection services; providing ex-military and police bodyguards to many national and international companies, heads of state, royalty, high-profile personalities, CEO's, private individuals and families. T: +44 (0)207 123 4544 E: Info@westminstersecurity.co.uk W: www.westminstersecurity.co.uk

Military Grade Encryption Phones PO Box 52310, Limassol, CYPRUS Built-in encryption software which converts your voice to encrypted data using a constantly changing mathematical formula. It uses a dual layered RSA/AES combination and a changing session key which modifies the encryption algorithm every second. € 1,398.00 + VAT. All prices include new Nokia N73 phone. BBA Member. T: + 357 7777 7276 W: www.protechcy.com/new Nemesis Protection Ruma, Serbia Nemesis Protection is a Risk Management Company specialized in providing viable, bespoke, optimal, feasible and cost-effective security and training solutions for corporations, government institutions, and private clients worldwide. Nemesis Protection offers a full spectrum of services including Risk Advisory, Close Protection, Asset Protection, Security Driving, Surveillance & Private Investigation, Information Security, Transport Security, Staffing, and Specialist Security Training. T: 00381644679650 E: contact@nemesisprotection.com W: www.nemesisprotection.com

Yoji Security We established Yoji Security in response to our perception of declining professional standards across the security industry. We strive to provide first class customer service in everything we do, drawing on our extensive experience in the fields of special operations, intelligence, counter terrorism and close protection. T : +44 7903231076 E : enquries@yojisecurity.com

TPT Firearms Training Bratislava , Slovakia and Rome , Italy We know from our extensive experience within the industry that it can be daunting when initially carrying a firearm and being responsible for protecting a clients life, but learning the proper techniques and having the ability to understand the weapon will make the job a lot easier and more enjoyable. Hopefully you will never have to use the weapons you carry, but should this prove necessary you will be confident and knowledgeable enough to handle the situation professionally and effectively. T : +44 (0) 7734101910 E : info@tacticalprotectionteam.co.uk W : www.tacticalprotectionteam.co.uk

Europe & Africa International Security Academy P.O.Box 5833, Herzeliya, 46000, ISRAEL. zOur graduates are more recognized, respected and sought after by Distinguish Protection service “consumers” and by

Security Concierge Group SCG Special Projects Ltd, Avenida, Bartolome Vicente Ramon No 10, B16, Ibiza, 07800, ESP Security Concierge Group is a privately owned and fully independent provider of exceptional security services to an

129


CIRCUIT MAGAZINE ISSUE 55 interesting and varied range of clients. T: 00 34 600 665 275 W: www.securityconciergegroup.com E: joe.buckle@securityconciergegroup.com Wille Heino, Security Specialist, Owner Finland Gambeson is a security training & Consulting Company specialized in countering modern day threats. - Security & safety planning for different events. - Security training: Active shooter/Terrorism awareness/Surveillance detection/ Other. - Security consulting. We are specialized in executive protection related services. Local knowledge, trained and licensed close protection offers, mission support, other. E: wille.heino@gambeson.fi W: www.gambeson.fi Zika Rakita Managing Director Ruma 22400, Serbia Accomplished, result-driven, and highly motivated Close Protection Operative, conducting protective operations internationally. A background encompassing planning, organizing, leading, and undertaking Close Protection operations in both corporate fields and hostile environments. Proven in achieving results and completing tasks on time, discreetly, and to the highest standards. A confident communicator with the ability to sensitively solve a range of clients’ and colleagues’ problems and inquiries. With the ability to use sound judgment and understanding the operational balance and needs. E: contact@nemesisprotection.com T: 00381644679650 Americas Bodyguard Careers Bodyguard Careers is an informational site with the purpose of providing bodyguards with all the information and tools necessary to succeed in the Close Protection Industry Info@BodyguardCareers.com www.BodyguardCareers.com Canadian Use of Force Systems 7975 Yonge St. # 7124, Innisfil, ON, L9S 1L0, CANADA A professional Use of Force and Defensive. Tactics organization teaching a full range of controlled response options for Self-Protection and Use of Force considerations in public and professional environments. BBA Associate Member. T: + 1 705 456 4333 W: www.canadianuseofforce.com Contact Front Photography Contact Front Photography is the world’s 1st photography studio dedicated to the Close Protection Professional. Stop putting generic or pirated photos on your website; instead

commission custom shots to best represent you or your agency. T: +1 (612) 369-6134 E: Info@ContractFrontPhotography.com W: www.ContactFrontPhotography.com Decisiones Estratégicas Buenos Aires – Argentina Executive protection specialists we have experienced in all Latin America, for multinationals companies, also providing support in project throughout Latin America to consulting first the US. and UK. We have a team of specialists and psychologists in assistance and crisis negotiation. T: +54(911) 6415 1941 E: jbenitez@d–estrategicas.com W: www.d–estrategicas.com Detective Lacerda P.O.BOX 25996, São Paulo, 05513-970, BRAZIL Providing the full range of security and investigation services throughout Latin America. BBA Member. T: + 55 (11) 3452 4388 W: www.detectivelacerda.cjb.net Giovanni Rossi South Africa Doctorates in Criminology, Vessel Security Officer, ASP Instructor, ISSPC Member, BBA Member, IAPPA Member, American Bodyguard and Protection Instructors Association - Lifetime Member E: rossi1@mweb.co.za T: +2783 415 9205 USA Global Bear Protection PO Box 11488, Jackson, Wyoming, 83002, USA Provision of British and US Ex Special forces security/ medical specialists. T: 307 413 3619 W: www.globalbearprotection.com E: bear@globalbearprotection.com Icon Services Corporation 1043 Grand Ave. #312, St. Paul, MN 55105, USA A full service security and investigative agency specializing in providing high-level security and bodyguards to international celebrities, public figures and corporations. Licensed, bonded and insured, our diverse roster of clients reads as a virtual who’s who in the corporate, motion picture, fashion and recording industry. Icon has been the hand picked choice to provide Executive Protection to everyone from Superintendents to Supermodels. BBA Member. T: + 1 651 695 8778 W: www.Industry-Icon.com

130


CLASSIFIEDS Imperial Protective Service, LLC 15849 N. 71st Street, Suite 100, Scottsdale , Arizona, 85254, USA Imperial Protective Service’ (IPS) is a security consulting and services firm founded in 1978. IPS provides both national and international corporate, executive and celebrity protective services. BBA Member. T: + 1 480 281 1588 W: www.executiveprotect.com

The first name in advanced driver training, offering our highly acclaimed Protective/Evasive Driving Programs. Designed specifically for today’s executive chauffeurs, executive protection professionals and others who are responsible for providing safe and secure transportation services. BBA Member. T: + 1 732 738 5221 W: www.vehicledynamics.net

Panther Protection Services 3695F Cascade Road, Suite 2207, Atlanta, GA 30331 Panther Protection Services is a full service protection agency offering such services as threat assessment, executive protection, self-defense training, firearms instruction, and high risk tactical protection. Our executive protection specialists have over 75 years of experience. Panther can handle your protection needs whether around the corner or around the world. Member: BBA and NABA T: (404) 349-9117 W: www.pantherprotectionservices.com Rouven Rohler - Security Consultant / HSE liaison Romania I am a very fit and mentally robust Security Specialist with quality experience gained in the security (Military, Maritime and Commercial Operational Security (Oil& Gas). I have improved the effectiveness of protection teams and significantly enhanced clients’ awareness. My career commenced in the Australian Army, which included hostile environment deployments to Iraq and the Solomon Islands and I have since been operating on various contracts throughout Afghanistan and Iraq. E: rouven@y7mail.com T: +40 (0)746 642 739 SILVER STAR PROTECTION Executive protection, site and event security with global experience. Serving southern Minnesota with integrity and professionalism. Former USSS, ICON Alumni. available for domestic and international travel. Robert E. Jones Manager/ CEO W: www.silver-star-protection.com E: rejones@silver-star-protection.com TSICS (T6) Miami, Florida, USA TSICS (T6) provides the following services in Central America: Executive Protection, Individual Bodyguard, Close Protection Training, Corporate Invest. W: www.security-professionals.org/members/saldrix E: tsics.t6@gmail.com T: +502 6645 6822 Tony Scotti’s Vehicle Dynamics Institute 1162 St. Georges Ave, Suite 277 , Avenel, NJ 07001, USA

131

Vindex Personal Protection & Investigation Inc. 497 Hooksett Rd #365 Manchester NH 03104 603.289.3161 / Full service Private Investigations & Executive Protection. 10 years combined Law Enforcement, Private security, close protection work, & security contracting. NY Mayors, U.S. President’s, NFL owners, and VIP’s are some of the protection work I’ve gained experience with. ICON alumni, NABA member. T: + 1 732 738 5221 E: vindexinc@aol.com W: www.vindexinc.com Asia Pacific Asia Protective Group Ltd Asia Protective Group (APG) is a Hong Kong based risk management company, specializing in executive protection, overseas travel security and security consultancy services. APG has an extensive network of security specialists operating throughout the Asia Pacific region. W: www.asia-pg.com E: jim@asia-pg.com E: yvonne@asia-pg.com New Zealand Security Investigations & Risk Solutions LTD We are dedicated to providing professional and effective security solutions for your personal or business security requirements. S.I.R.S is one of the only security companies in New Zealand with ISO 9001 and ISO 18788 Running the most advanced security management system TrackForce to help S.I.R.S security operations with real-time reporting and lone worker technology. With a combination of Military and Security industry experienced staff. We offer high-quality security services and industry recognised training programs with international qualifications in Close Protection, Bodyguards, Maritime Security, Hostile Environment, Firearms Training, Door Supervision, Private Investigations, Surveillance, CCTV Operations, Event Security, Mobile Patrols and Static Guards. S.I.R.S has the expertise and flexibility to meet a wide variety of client needs. E: lee@sirs.org.nz T: 02040787549 W: www.sirs.org.nz


Life can be testing, no matter what you fight. - Keep Fighting.

FOP is for you, whether you wear uniform, a suit, or gym kit.

132


Subscrib e today & save

THE TEAM: UK Editor: Shaun West US Editor: Elijah Shaw Managing Editor: Jon Moss

Subscription means you’ll never miss an issue of the Circuit Magazine again. Subscribers get:

Art Direction: Pete Falkous

• Every issue of the Circuit • Full access to the Circuit website. • Priority delivery of each magazine. • Access to all back issues. • Subscriber only content and offers.

CONTRIBUTORS:

Orlando “Andy” Wilson Peter Jenkins Radoslav Savkov Stuart Mitchell Dr Mils Hills James Bore Mark “Six” James Luke Daniel Thomas Abi-Hanna Denida Zinxhiria Grow Andy Clark Orlando Wilson

Our Sincere Thanks to all those that continue to contribute their wisdom and experience for the enjoyment of others The Circuit is compiled, edited and published in the UK and US bi-monthly. W: www.circuit-magazine.com E: info@circuit-magazine.com T: +44 0191 645 0865

TO ADVERTISE: IF YOUR BUSINESS OPERATORS IN, OR SERVES THE PROTECTION INDUSTRY THEN YOU NEED TO SPEAK DIRECT TO YOUR AUDIENCE THROUGH A TRUSTED CHANNEL. GET IN TOUCH TO FIND OUT ABOUT THE GREAT OPPORTUNITIES THE CIRCUIT CAN PROVIDE TO IMPROVE YOUR BUSINESS SALES AND GROWTH. Email: info@circuit-magazine.com

New app with more features Get The Circuit Security Magazine with immediate electronic downloads to read on your PC, laptop or smart device.

133

DISCLAIMER While every care has been taken to ensure that the information contained in this magazine is both accurate and up-to-date, The Circuit accepts no liability in any part for loss or damage incurred by reliance on information contained in this magazine through omissions, errors, howsoever caused. ©COPYRIGHT Copyright remains with the authors and contributors at all times. No part of this publication can be copied or reproduced in anyway whatsoever without permission from the publisher AND the author / contributor.


facebook.com/groups/TheNABA/ 134


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Keeping Your Edge: Is Unity In Our Profession Dead?

4min
pages 118-120

EVENT REVIEW - Circuit Magazine Hosts Executive Security Forum - West Africa

3min
pages 112-115

GLOBAL SITUATION REPORT

9min
pages 104-111

ASK THE NABA NETWORK

3min
pages 102-103

TACTICAL FIREARMS - THE BASICS

9min
pages 94-101

COMMS PLANNING - HARDWARE & TECHNOLOGY

9min
pages 87-92

PROTECTION PROVIDERS AND SOCIAL MEDIA POLICIES - AN EMERGING NECESSITY

5min
pages 80-85

FRANCE PUSHES TO TIGHTEN EUROPE'S BORDERS AMID TERRORIST ATTACKS

4min
pages 76-79

BEHAVIORS & ANOMALIES

13min
pages 66-75

Dealing with What Goes Bump in the Night

9min
pages 56-65

PHISHING IS EMOTIONAL

5min
pages 50-54

EDUCATION: LOSE THE FEAR, LOVE A PROCESS!

5min
pages 44-48

CRISIS MANAGEMENT AND SOCIAL MEDIA

6min
pages 30-36

COUNTER SURVEILLANCE

8min
pages 22-29

CLIENTS - SHOULD YOU TRUST THEM?

7min
pages 14-20

INDUSTRY NEWS

10min
pages 8-12

US FOREWORD

1min
page 7

UK FOREWORD

2min
page 4
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.