WINTER
2010 £4 .50
Circuit The
The Magazine for Security Professionals
Cover: PAPARAZZI – ARE THEY BECOMING A THREAT? ROUGH JUSTICE JUVENILE INJUSTICE IN AFGHANISTAN JACQUIE DAVIS TALKS ABOUT FEMALES ON THE CIRCUIT SO YOU WANT TO BE A PENETRATION TESTER PT.3 PLUS: Course Reviews, Finance Advice, Book Reviews and Physical Fitness
A Quarterly publication from the British Bodyguard Association
We aim to unite and support both trained and aspiring bodyguards worldwide via our membership and information program. Whether you are a seasoned security professional, or just setting out on a new exciting career path, the BBA will provide you with the most up to date information on current training providers, equipment suppliers, employment vacancies, a message forum and the great networking facility BBA Chat. No other close protection organisation offers so much for so little. Since its initial formation in early 2007, The BBA has grown rapidly - in fact we are probably the fastest growing association of its kind. We are now attracting membership not just from the UK but worldwide. Annual individual membership to the BBA includes: • • • • • • •
SPRING
2009 SUMMER
2009 AUTUMN 2009 £4.50
Personal, Business and Corporate Packages Available
www.the-bba.org.uk The British Bodyguard Association is represented globally in: -
Afghanistan : Australia : Austria : Belize, Brazil : Canada : Cayman Isles : Cyprus : Czech Republic : Denmark : France : Germany : Greece : Hungary : Iraq : Israel : Italy : Jamaica : Latvia : New Zealand : Portugal : Slovakia : South Africa : Spain : Sweden : UK & the USA
2 : : Circuit
KIDNAP AND RANSOM
Quarterly Magazine of The British Bodyguard Association
Hostage Exploitation and Resistance
The Magazine for Security Professionals
SURVEILLANCE FOR THE CPO Anti Surveillance pt. 2
COMMUNICATION
Conflict Resolution Cover: LEADERSHIP SPORTING STARS – DO THEY REALLY How to run a CP team REQUIRE SECURITY?
STARTING OUT
Starting out in THE ROLE OF The FIREARMS INBusiness CLOSE PROTECTION HAND TO HAND COMBAT Do martial arts have a role for the modern CPO? STARTING OUT AS A CPO Tips for beginners
Journey to Baghdad
SO YOU WANT TO BE A PENETRATION TESTER PT.2
PLUS: HIGH RISK OPERATIONS Course Reviews,
THE TIMES THEY ARE A CHANGING Factors that have changed the Industry
Field Report Damian Buckwell EFFECTIVE EMERGENCY Decision-Making for the Team Leader & Security Manager
Finance Advice and
“what the bloody hell-am I doing here?” pg6 Physical Fitness Should it be part of the CP Course
Plus: Can door supervisors make good bodyguards?, Financial answers and Book reviews
So you want to be a penetration tester? 6 page technical guide inside
A Quarterly publication from the British Bodyguard Association
Circuit_Mag_02.1.2.indd 1
Regular updates on job and contract opportunities worldwide Daily industry news Weekly updates on international terrorism and global hot spots Extensive global networking Exclusive access to various industry experts Special offers and discounts on services and products Use of our logo on your letterheads, business cards and website (conditions apply) • Personal one-to-one advice with C.V. and job applications • Certificate of membership • Subscription to “The Circuit” Magazine • BBA Lapel Badge
Quarterly Magazine of The British Bodyguard Association
£4.50
01/07/2009 09:31:29
CONTENTS FOREWORD � Foreword by Shaun West
by
� ReadersWrites 4] Your Comms to HQ
Hi All
� OnTheJob 7] Mobile Surveillance Stakeouts 10] Close Quarter Combat 12] Physical Fitness - Functional Training 14] Rural Surveillance 22] Road Traffic Collisions In The Remote Environment
� HardTalk 16] Q&A - The BBA talks to John Morrison of Close Protection World 20] Q&A - Mike Jones talks to Fred Davis about the ESI course 23] The Role Of Firearms In Executive Protection 24]
Shaun West
Paparazzi – Are they becoming a threat?
First of all I’d like to wish all members and subscribers alike a Merry Christmas and a very prosperous New Year. Let us hope that the global recession draws to a close as soon as possible so that more of us can experience new opportunities to show our skills and professionalism in the market place. As ever this period has been extremely busy both for the Association and the Circuit Magazine, subscriptions are up and we’re extremely pleased with the feedback and progress made on both fronts. We take onboard all of the comments that we receive and reply to all in due course. Please keep the feedback coming on both the Association and the magazine. Since the last issue there has been plenty happening in the world of security as there always is. Things that have hit the headlines since the last issue have ranged from the Leona Lewis incident at her book signing, the constant piracy troubles off the coast of Somalia and the terrible incident where an Afghan policeman killed 5 British Soldiers. We send out our heartfelt condolences to all involved in that and the other incidents that have taken place since. I think you will all agree that our servicemen and women are doing a fantastic job out there under some extreme circumstances. The Leona Lewis incident has sparked much criticism and will no doubt lead to a change in procedures for many involved with the protection of celebrity VIP’s.
27]
The Importance Of Bodyguard Associations
� TechTalk 28] So you want to be a Penetration Tester Pt.3 � ShopTalk 32] Protection for The Close Protection Officer 34] Juvenile Injustice in Afghanistan 36] Eye-Hand Coordination 37] The History of Sniping 38] Working Girls - Females on The Circuit 40] Black Box Tracking Technology � BoyZone 42] Get Your Kit On - Kit Reviews
� Features 19] Financial Advice with Ask Anna 18] BooKlub with Mike Jones & JD Woolsey 33] Keeping Your Edge with Elijah Shaw
This issue sees the continuation of articles from our regular contributors Elijah Shaw, Ryan Naish and Anna Cooperwhite as well as follow up articles on Penetration Testing and Handguns for the CPO from Keith Loose and Justin Johnson. Although the IT piece is a little “left of field” in a CP related magazine it has received some excellent feedback from what can be seen as a bit of an ‘outpost’ in the security industry but never has IT security been more important than it is in today’s world so its good to have a piece from someone whom is in the know. Top tips for the New Year: keep your portfolio up to date, continue to develop yourself personally, treat others as you wish to be treat yourself and do the small things well and you won’t go far wrong. Kindest Regards
Shaun West The BBA Team
The TheCircuit Circuitisiscompiled, compiled,edited editedand andpublished publishedquarterly quarterlyby: by: The TheBritish BritishBodyguard BodyguardAssociation. Association. www.The-BBA.org.uk www.The-BBA.org.uk::::Info@The-BBA.org.uk Info@The-BBA.org.uk ::Tel: ::Tel:0845 0845519 5192538 2538
Circuit : : 3
Circuit :: ReadersWrites
Your Comm’s to
want the magazine to reach out to the different areas of the industry and of course the different levels that people occupy within their particular area. The Magazine will develop and with this I suppose some people will like more than others but we will keep our ears to the ground and try to get it right!
-------------------o--O--o-------------------
Hi guys, my magazine took rather a long time to arrive? Is there a standard delivery? Just like to say what a great improvement between issues, great work. I like the diversity of articles by a variety of contributors. Being a BBA member I have read some interesting threads on the forum, some really quite harsh, which at this stage of the mag I feel is rather unfair.
guys would like us to cover but very much believe in working proactively with people rather than against them. For example, why write an article with bias if we can get a Q&A with ‘certain’ people or organisations where they can put their point of view rather than just us stating ours. Banging fists rarely solves problems.
-------------------o--O--o-------------------
Guys, how do I advertise in the mag?
Ian, via e-mail
CM: thank you Ian. There were some points made on the forum that some members thought were a little bit too much but every body has the right to an opinion. Really, all we are after is constructive criticism, so if anybody has a problem we like them to offer solutions rather than just state opinions!
-------------------o--O--o-------------------
Circuit Magazine, when are you going monthly!!!! Come on guys, we need to see more of the magazine more often! Elizabeth, via e-mail
CM: wow, Elizabeth.....thanks. We would love to go monthly but it just isn’t possible for now but of course we will be re-assessing the situation periodically and will of course let you guys know!
-------------------o--O--o-------------------
Liking the mag…..biggest compliment that I can give it is that it is my toilet read….top of the pile! Colin, via e-mail
CM: erm, thanks Colin….i think?!
-------------------o--O--o-------------------
Guys, great magazine, very light and fluffy and everybody loves everybody but how about looking at some of the harder hitting issues of the day. A bit ‘too’ friendly for me! What do you say guys? A bit of hard-hitting journalism next time perhaps? Jon, via e-mail
CM: Jon, we at the Circuit are in no way afraid of tackling difficult or controversial issues but we are not in the business of giving people an axe to grind so to speak. We are well aware of many of the issues that you
4 : : Circuit
Gavin, via e-mail
CM: We have a rate card Gavin and have sent you a copy. Basically, if you have had an advert designed previously and it is not to our spec then all you will have to pay is the advertising costs based on the ad size that you select. If the ad you have is not our specifications or you do not have one then we would have to charge for design. We believe that we are very reasonable though and that the work carried out by Kal is ‘top notch’! You could also get a classified in the back which is so cheap it is unreal!!!
-------------------o--O--o-------------------
I noticed a USD price on the front cover? Is the magazine on sale in the US also? Hodgy, via e-mail
CM: Hodgy, yes mate it is! We have partnered up with the North American Bodyguard Association to produce the magazine ‘together’! The NABA is headed up by Elijah Shaw [keeping your edge] and now has a US ‘version’. Hopefully, over time this will increase and give us an excellent readership and a real footprint in the USA. We feel that this is good as the industry on either side of the pond is different and we can all learn from the experiences of others. Hope you agree!
-------------------o--O--o-------------------
Hey Circuit Magazine, like what I have seen so far and am going to join the BBA on the back of it as I have heard good things from some of my work colleagues. I realise that the magazine will develop/grow over time but I urge you not to forget ‘the operators’ as is often been the case before. Withheld on request, via e-mail
CM: You make an excellent point here and it is one that we will take onboard fully. We
Jamie, e-mail.
CM: Hi Jamie, apologies about that. We aim to get them out within 2 days of arrival at our offices but this isn’t always possible. The overseas ones go 1st on day one, followed by BBA members and Circuit subscribers also on day 1 and day 2. NABA members have to wait a little longer. I note your mailing address is in Scotland so really you should get yours within 3 days of posting which could be 5 days from when we receive it if you go on day 2! We still feel that is pretty quick to be honest? Some members have PO Box addresses so again this may add time and we are keen for members to update their addresses as soon as they can as we have had several people saying that they never got it but checking had changed their address? If you didn’t get it then please let us know, as a certain percentage will go missing despite the best efforts of our beloved Royal Mail!
-------------------o--O--o-------------------
There seems to be quite a lot of surveillance related stuff in the magazine? Any reason? Withheld, via e-mail.
CM: Not really no. We have people like Peter Jenkins from ISS Training who apart from being a trainer is also an author and as such has lots of interesting material for people to read. He writes well, its interesting and topical so why not? Also, as you may know the surveillance industry has more equipment related to it than Close Protection and so again this opens itself up to be written about. We also feel that surveillance and CP are extremely closely intertwined so the subject should interest those involved with CP. Besides, like we said to someone previously we fully intend to cover on and off topic material such as surveillance and IT security amongst others. Do you have anything that you like or dislike about The Circuit? We are always looking for feedback so that we may improve the product; all feedback will be taken seriously and actions taken to remedy any points where we feel they are valid and can improve the magazine. We will publish as much or as little of your name as you wish:
feedback@circuit-magazine.com
Circuit :: News
INTERNATIONAL NEWS IN BRIEF UK Somali Pirates issued a demand for
a ransom of $7 million USD after capturing a British couple on the 23rd of October. The couple, Paul and Rachel Chandler from Kent were captured while sailing their yacht from the Seychelles to Tanzania. Their vessel was later found in international waters. This is just one of many such kidnappings that have taken place in this region on various vessels from oil tankers to privately owned small yachts as is the case with the Chandlers. Naturally, the British government has refused to co-operate.
Pakistani Security Body Gets Help From The UK
In order to help combat terrorism and promote stability the UK is to set up a national security authority in Pakistan. It is thought that it will be modelled on units currently in place within the UK’s own set-up such as Mi5. As we have seen over recent months Taliban activity in Pakistan is increasing and the country itself is also thought to be a hotbed of activity in terms of the planning and preparation of terrorist attacks over-seas including the UK. This can only be a positive step towards our increased efforts to limit the Taliban and their impact on the West.
Iraq Kidnap Group Freed
In a move that will anger many the Iraqi government has decided to release from prison nearly 100 members of a Shia group thought to have links to the group that kidnapped 5 Britons in May 2007. At least 3 of the 5 have been murdered and as ever our thoughts are with the families involved. We can only hope for some positive news on the 2 remaining is released soon.
Trouble Escalates in Northern Ireland
A woman’s car was high jacked at
a railway crossing in Lurgan, Co Armagh. The armed men told the motorist that they had attached an explosive device to her car and told her to drive to the nearest Police Station. The PSNI received various reports that armed men were on the streets in what were thought to be preplanned and well-orchestrated violence. Orange Hall’s have once again been targeted as well as vehicles hijacked and set on fire. Tensions are on the rise in the Province and we can only just hope that the PSNI can deal with it despite the still fragile political situation that exists.
SOUTH ASIA
Explosion in Peshawar leaves 4 dead
A police station in the Pakistani City of Peshawar was targeted by a suicide car bomber killing 4 and injuring 20 others and was the 5th attack in little over a week. The building itself was seriously damaged along with a small mosque. 2 weeks previously more than 100 people were killed in a blast in a market as attacks across Pakistan increase dramatically as the army continues its offensive against the Taliban. The attack in Peshawar came despite Police opening fire on the vehicle as it approached the checkpoint which demonstrates the desire of these people to carry out their mission.
10 Killed in Afghan Market Attack
A rocket attack on a market in the north-east of Afghanistan has killed at least 10 people and injured around 30 others. Chinese made rockets landed in the Tagab Valley, which is north of Kabul. The attack took place as the head of the French forces were holding a meeting with tribal elders nearby.
NATO Base Targeted
3 foreign soldiers and 3 Afghan civilians were injured as a car bomber struck outside NATO base in the Kabul. Afghan forces are trained at Camp Phoenix; the bomber went for a coalition vehicle nearby. The Taliban has admitted responsibility for the bombing.
MIDDLE EAST Hezbollah Dismisses Obama Pledges Hassan Nasrallah, the leader of Lebanon’s mainly Shia movement Hezbollah says President Obama’s promise to engage with Muslims has so far come to nothing. Nasrallah says that the US has shown its commitment to Israel by sending more aid backtracking on demands to stop West Bank settlements.
Trouble on the Gaza Border
A Palestinian was shot dead and another wounded by Israeli soldiers. The body of the young man was found after an incident on Friday at the Karni crossing.
Swedish Troops Injured in Afghanistan
5 Swedish soldiers have been injured by an improvised explosive device while on patrol in Afghanistan; the explosion also claimed the life of a local foreign interpreter. The soldiers were on patrol in west of Mazar-eSharif where Swedish troops serving in Afghanistan are based.
Saudi Jets Attac Rebels Rebels in Northern Yemen were attacked by the Saudi air force following the killing of a Saudi security officer in a border area. F-15 and Tornado jets targeted known strongholds of the Houthi rebels.
EUROPE
CIA Men Convicted in Italy! 23 Americans were convicted by an Italian judge of kidnapping a Muslim Cleric in 2003 along with 2 Italian secret agents. The agents were accused of abducting Hassan Mustafa Osama Nasr from Milan and taking him to Egypt. The trial actually began in June 2007 and was the first involving the so-called ‘extraordinary rendition’ programme. The US has expressed its disappointment at the verdicts.
Circuit : : 5
Circuit :: Focus In each issue of The Circuit we focus on various companies and operatives from within the industry and reveal a little more about them
Member Spotlight
WHY
BODYGUARD?
_____________________ Justin L. Johnson _____________________
J
ustin Johnson has been in the protection industry in one way, shape or form for the last 13 years. Beginning with military service a United States Army Infantry Scout as well as a member of the US Marine Corps Fleet AntiTerrorism Security Team (FAST Co.) with a tour as a Jungle Warfare Instructor and time spent in hostile environments. Justin’s career in the private sector has included Private Security assignments for a domestic US Corporation and work overseas as a Security Medic. Justin is currently a full time close protection agent and security manager at an Executive Protection firm providing client services internationally. With a core emphasis on defensive tactics, Justin’s background includes several martial arts disciplines. During his military career, Justin also functioned as a marksmanship instructor and a subject matter expert (SME) with extensive training in close quarters battle techniques (CQB). However, what he considers more important and an invaluable tool both for professional marketing and client safety, is his skill as an active Emergency Medical Technician with experience in pre-hospital, emergency room and diverse field medicine in the areas of field trauma care and medical emergencies. He also excels in logistics planning in high-risk environments such as South America and the Middle East. Justin’s roster currently includes providing close protection services and consultation to several Fortune 500 Companies as well as a number of international celebrities. Together with his military experience Justin has attended training courses on Executive Protection, Counter-Surveillance & Force Protection through xe (Formerly Blackwater) and Icon Services Corporation. He also has extensive knowledge within the arena of firearms training and marksmanship. In addition, Justin is a current instructor himself, teaching certified firearms courses for all levels as well as operating as an assistant instructor of the Icon Celebrity & VIP protection course. For more information on NABA Member, Justin Johnson visit: www.JustinJohnsonBG.com
If you you would like yourself or you company included in the Member Spotlight of the magazine please email us. admin@circuit-magazine.com
6 : : Circuit
by HARLAN ‘HUCKY’ AUSTIN
“
”
Hey, Hucky people ask, “Why do you still use the term bodyguard?” Some visitors to my long standing website Bodyguard Careers www.BodyguardCareers.com have been giving me a bit of a hard time about the fact that I still use the word bodyguard but there is a method to my madness! Let me explain. The majority of the public does not know the up-to-date terminology for what we do. I know that some of the preferred job titles are EPS (Executive Protection Specialist) or CPO (Close Protection Operative), however, the fact is that most people who are NOT in the business know the term “bodyguard” and that is what they will type in when they want to go online to find out more information. Google search engines recognize the word and this recognition means a website such as mine is ranked higher, and thereby gets more traffic. More traffic means more job listings, more stories, more information and, in general, more connectivity for all of us in this business. For example, did you know that people in the film industry who work as crew (gaffers, lighting people, best boy, grips, production assistants) are said to work “below-the-line”? That’s an insider’s term for those positions. You can see how someone who isn’t an insider, who is trying to locate film production assistant, let’s say, would search by “production assistant” rather than “below-the-line talent.” Shakespeare said, “A rose by any other name would smell as sweet,” and I’d like to state, “An EPS by any other name would still save your life.” It’s just a word. I know it’s archaic and for some brings to mind knuckle-headed over-sized brutes in black suits and sunglasses, but sadly, the rest of the world just hasn’t caught on to the new terminology. Until they do, I will continue to use it in my stories and articles, interchanging it as often as possible with the preferred nomenclature. In the future, the word “bodyguard” may go the way of the dinosaur but for now it’s here to stay. Harlan V. Austin has acquired over 20 years of experience in Guard force Management & Executive Protection, seven years of which he served as Director of Security Services for the musical artist Prince. Harlan is currently the editor for bodyguard careers and is also a member of the NABA, ASIS (American Society for Industrial Security) & IAEPA (International Academy of Executive Protection Agents).
Circuit :: OnTheJob
STAKEOUT Mobile Surveillance Stakeouts by PETER JENKINS
C
onsidering the phases of our surveillance operation (Stakeout, Pick Up, Follow and Housing) we will discuss the tactics used in a mobile surveillance stake out. There are other terms used for the stakeout such as: on ‘plot’, on the ‘grid’, on the ‘diagram’, in the ‘box’ and on the ‘carpet’.
The Stakeout or Plotting Up The stake out is the positioning of the team with a trigger in place, to ensure that the target is boxed in and cannot escape. On arrival in the area where the surveillance is to commence, you will probably meet up with the team at a pre-determined rendezvous (RV) nearby. The team members would now carry out a recce of the general area to familiarise themselves with the layout of the location and escape routes. You need to carry out a recce of the target’s address by carrying out a drive past and possibly, also a walk past. If you have a sketch map drawn from the initial recce, use it in order to identify where the target address is
Any mobile surveillance operation has to start somewhere, normally at the targets home, place of work or a place where they are known to frequent. If at all possible, one operator has to get ‘eyes on’ to the front door, the gate or driveway or the car, what we call the ‘trigger’.
Sometimes it is not possible to get that close due to the geographical area. You may not want to get that close because the target is very aware or the local population are aware. Therefore there are different ways of triggering a surveillance and there are also different ways of plotting up in the area. This article details the different types of stakeouts. before you actually get to it. The last thing you want to do is to drive down the target street, crawling at 5mph whilst trying to identify the target property - you will be noticed by someone. If you consult your sketch plan, you can see which side of the road the targets address is on, how far down it is and you can identify it from a safe distance before you get on top of it. On a drive past you need to consider the following: • Any sign of life or activity such as: lights on, windows open, curtains open or milk on the doorstep • Any vehicles and their details, how they are parked and which way they intend to go • Any trigger positions where you can plot up or put the van in as described earlier • Check and double check that the address you have identified is the correct one - this is important • Consider dropping off a foot person in order to carry out a walk past to take a closer look and obtain more detail
STAKEOUTS The stakeout phase can be carried out in different ways, which we will look at separately:
Primary Stakeout Secondary Stakeout Tertiary Stakeout
Primary Stakeout A primary stake out is when we have a close trigger in place to see and initiate the surveillance, he should be able to see the front door of a property, the gate or vehicle. The other call signs are positioned in a lose box around the target, covering the escape routes and ready to react on a standby. This primary stakeout should always be considered first as you have a trigger that can give advanced warning of any activity so that the call signs can then close up and move to their pick up positions. In the diagram, you will note that there are only two exits out of the estate and these have to be ‘covered’ by the mobile units. By this we do not mean that call signs Hotel and India actually
Circuit : : 7
Circuit :: OnTheJob sit on the junction, they only cover them.
can get to their respective ‘pick-up’ points in time, on a standby.
It may not be physically possible to sit there (double yellow lines, busy traffic for example) or practical. What it does mean, is that the mobile units can park anywhere they like (if it is safe and away from the target) so long as they
In Diagram 1 you will note: • Golf has the trigger. He has to be close enough to be able to identify the target but far enough away not to be noticed. Remember, if you can see the target, he can see you. Golf will trigger, give a description and call a direction at the first T junction. • Hotel’s responsibility is to ‘cover’ the west exit and pick up the target if he goes right at the T • India’s responsibility is to cover the east exit and pick up the target if he goes left at the T
1
When the target goes mobile, Call sign Golf will not move and so it will be Hotel or India that is responsible for ‘taking the first follow’.
Secondary Stakeout Sometimes it is not possible to get an ‘eyes on’ trigger of the target address and therefore no one can call a standby when the target initially goes mobile.
2
8 : : Circuit
3
The only option is to place an operator at each possible exit (or escape route) on the route that the target may take on his departure. If the options are many, the team leader should decide on which exits are the most likely to be taken. All the team members should know the whereabouts of their colleagues and the escape routes that they are covering. It may be that frequent drive pasts have to be made of the target in the event he has slipped the net or to check for any activity. In this stakeout, the operators have to be alert and observant at all times whilst they cover their options. It is not always ideal as the standby is a very quick one and does not give much time for the team to react. In ad-
dition, it may be that a similar vehicle has quickly driven past the option you are covering and so you will now have to move and get close to it in order to confirm or deny that it is your target. In Diagram 2 you will note: • Golf’s responsibility is to cover and observe the east option • Hotel’s responsibility is to cover and observe the west option • India’s responsibility is to float between the two Each call sign should identify how to quickly get to each others options on a standby, as they will have to play catch up. India is positioned in the middle in order to ‘back’ as soon as possible.
Tertiary Stake Out This type of stake out is similar to the above but on a wider scale, where each escape route is covered by a call sign and you wait for the target to pass. It is not used very often in commercial surveillance but normally deployed in very hostile areas where it is difficult to plot up in a neighbourhood or when the target is extremely aware. In Diagram 3 you will note: • Golf is covering the road and option to the east • Hotel is covering the junction to the A1 motorway to the south • India is covering the minor road and roundabout to the south • Kilo is covering the road to the west where it intersects the A1 southbound The problem with this is that the distance is a major factor when trying to back the eyeball. We used this method very recently when working in a rural area where it would have been ideal to insert a rural OP to act as a trigger but it was not possible at the time. By the time the backing call sign caught up with the eyeball, the target had travelled some 20 miles.
The Stakeout or The Trigger Once you have the trigger in position, it is his job to maintain the eyeball on the property and report any events to the remainder of the team. Nothing may happen for a number of hours and so the task requires great concentration. If nothing happens, then report to the team, ‘No Change, No Change’ on a reg-
Circuit :: OnTheJob ular basis and at least every 15 minutes. This not only informs the team that you are still in control but also keeps them up to date and doubles up as a radio check. If there is a problem with communications such as being out of range, it is the mobile units that have to move to a better position to get better reception, as the trigger person cannot move. The mobile units have to ‘plot up’ in a position that is safe, where they will not arouse any suspicion from third parties. These units do not have to see the target address but have to get off the plot completely and cover the targets options to escape. They need to be in a position to take up the follow when the target moves. These positions can be anywhere, so long as they can get to the point where they can intercept the target when he goes mobile. When static, ask yourself the following: What is my reason for being here? How long can I stay here and do I look out of place? If nothing is happening, trust the trigger person and try to avoid carrying out ‘drive pasts’ unless requested. This often happens out of boredom rather than having a deliberate effect. The time you decide to drive past to take a look, the target will be coming out or looking out of his window onto the street.
Cross Contamination The stake out phase can be extremely boring but you have to remain alert to your surroundings at all times. When boredom cuts in, I have seen operators
(not the trigger) drive to each others location for a chat for a short period and then move back to their position. Just about everyone I know in the surveillance industry including myself, has been guilty of it at one time or another. Just be aware of cross contaminating another operator or drawing attention to yourself when drawing up alongside a colleague’s car.
Action on a ‘STANDBY STANDBY!’ As soon as the target appears out in the open or there are signs of movement, the trigger person should call, ‘Possible Standby, Standby’ and commence a running commentary on the target’s activities and description. This ‘standby’ is a wake up call to put the rest of the team on alert. As soon as the trigger gives a ‘standby’, the mobile units should carry out the following: • Instantly acknowledge with your call sign in alpha numerical order. When the team moves, no one should be left behind • Be ready to turn your engine on and put your seat belt on • Listen very carefully to the ‘triggers’ radio commentary, he will be giving descriptions, vehicle details and directions, remember them. • Move from your ‘plot up’ (or Lie Up) position and draw near to the spot where you intend to pick up, or intercept the target • Be prepared to pick up the target and take the first follow or act as back-up • Do not come up on the radio to ask ‘What’s happening?’ If there is a period of silence from the trigger it may be because he is filming or taking photographs, be patient.
4
• If you hear ‘Standby standby, that’s Bravo 1 mobile towards Red 1 and unsighted to me’. Expect a period of silence on the radio net as the target ma-
noeuvres within the box until he is picked up by a team member. There is nothing worse than hearing over the radio net, ‘Who has..?’ by a panic stricken team member. Have patience, wait, if you have a good box around the target, he cannot go anywhere without being noticed. If a standby is a false alarm, the trigger should call ‘Cancel Standby’, to which the team acknowledges and return to their ‘lie up’ positions (LUP’s).
Trigger Person Do Not Move! Remember that surveillance is all about team work; when the target moves, inform the team of the direction. If he goes out of your view, let them know that you are ‘unsighted’, this is their cue to take the eyeball. If a team member hears the phrase, ‘unsighted to me’, he will realise that the target is out of view and control and therefore the eyeball is ‘up for grabs’. Whoever sees the target first can take over the commentary and direct the team. When the target moves off, keep still, do not move or react with the target. Most compromises by inexperienced operators occur when the target initially moves off and is quickly followed. Imagine, the first thing the target does when he pulls out is to check his rear view mirror, especially if he is aware. So don’t be there, wait until he is out of your sight before moving. As Trigger, never move off until you are out of the target’s mirrors Referring to Diagram 4, if the target moves towards the north exit on the estate, it would be Golf’s responsibility to pick him up and call a direction on the main road. If he goes left towards the mini roundabout, Hotel can call this and India can come round and take the first follow. If the target takes a right on the main road, Hotel can call it on the radio and so India can stay where he is until the target passes and then takes up the follow. This is operating as a team should do, passing the target from one person to another. Up to this stage, no one has actually ‘followed’ the target but surveillance has been ‘imposed’. At your briefing, it would have been decided whether the trigger vehicle is to stay where it is, or whether it joins in the follow. Extract taken from ‘Surveillance Tradecraft’ – the new surveillance training manual from ISS Training Ltd. ISBN 978 09535378 22
Circuit : : 9
Circuit :: OnTheJob
INTRODUCTION TO PRESSURE POINTS IN
CLOSE QUARTER COMBAT by JASON DORN
P
ressure Points, two words often surrounded by controversy in the Worlds of martial arts, self protection & unarmed combat. I can see why. A quick google search can throw up a great deal of info, much of it nonsense. If more fuel is needed then search youtube. Here you’ll find demonstrations of ‘no touch knockout’ or ‘simple gentle touches that work in real situations’. I am sure readers of The Circuit don’t buy into this. But sadly many people do!
Forget The Myths
Let’s just forget all the myths and nonsense for a moment and look at some realities. Although we use the term Pressure Points, let’s not look at them as having magical or mystical properties. Instead let’s look at them as weakness in the structure and/or function of the human body. Instead of focusing on all the talk about the ‘pressure point knockout’ lets instead consider that striking these targets will give us a predictable response from which to work from. Let’s not think of ‘no touch and chi balls’ lets think we’re going to strike or manipulate these points with as much force as is ‘reasonable in the circumstances’. What Do You Strike Now? I am always amused when people tell me pressure points don’t work. I cannot offer any argument if this is based on the nonsense outlined at the start of this article. However if you are practicing some sort of unarmed combat (and if not why not?) you must be aiming strikes at specific targets right? Using control and restraint you must be applying specific manipulations right? Well isn’t this anatomical weakness you are taking advantage of? If we can’t agree on this then my future articles may well be lost on you. I hope not!
Future Articles
I am producing a series of articles for The Circuit focusing on pressure points in close quarter combat. It is my aim to provide you with useable information. Information you can work with in your training sessions, and ultimately information
10 : : Circuit
you can apply should the need arise. We’re going to take a trip around the body looking at targets from head to foot. Of course the targets are no good without specifics on how to attack them. So we’ll look at the very best methods to attack these areas to take advantage of weak areas. I’ll provide you with some very basic anatomical information relating to the area. This will be useful for any of you that take a deeper interest and want to research the subject further. If not just ignore that and adopt the ‘just hit here’ approach!
Make A Start Right Now You can make a start applying one of the key principles right now. The areas we will be examining respond to attacks of a specific angle and direction. That is to say we need to know the specific angle to maximise results when attacking certain targets on the body. This isn’t that complicated, is very easy to learn and remember. But for now a good thing to practice would be angled strikes simulated as either in and down (in towards the body/head and down through the body/head) at angles of 30/45 degrees. You can practice these with a partner on focus pads which helps add movement for realism. They can also be practiced on a bag. Also any sparring you do try to work the points you learn and the specific angles into your strikes.
T
hanks for taking the time to read my brief introduction to pressure points. Now we’ve got that out of the way and laid the foundation we can start to look at actual target areas and how we can use them. We’ll kick off with a simple strike that is well worth adding to your arsenal. The first is a strike we call a ‘stun’ which is delivered to a cluster of points on the head. In traditional terminology (if you want to research the subject further) these points are known as the gall bladder (GB) cluster. This cluster is made up of the points GB-13, GB-14, GB-15. GB-14 is just above the eye, 13 and 15 are just on the hairline. In western anatomical terms we have branches of the frontal nerve and or the frontal artery and vein in this area. The best way to strike this area is to hit it with a torque action applying the strike with the fleshy part at the base of the thumb. As you connect just twist the hand outwards. Another way is to simply just slap into the target area! Whichever way you do it (try both) you should be attacking in a slightly in and down direction. You (or rather your partner) will know when it is right! Take a look at the pictures. The first picture shows the target being struck with a simple strike with one hand. The next shows a double
You should practice punches, hammer fist (bottom of fist) strikes, palm strikes, slaps and forearm strikes. Practice these full power trying to deliver your force through the targets we will be learning in future articles.
Further Considerations For any ‘use of force’ it is worth considering the law relating to reasonable force. There is plenty of useful information available relating to this. It’s also worth getting clued up on positional asphyxia and excited delirium relating to any physical intervention / control and restraint. There is a wealth of information relating to these subjects available on the internet.
Strike 1! The single cluster
Circuit :: OnTheJob get a bit of a feeling from being stuck here. So from there you can put a little more into it, and shouldn’t really need to go full power to feel the effects. Of course with consent and a good head guard (we use Top Ten) you can get closer to a powerful strike. But obviously a good hit to this area can cause neck trauma too, so play nicely!
Strike 2! The double cluster strike with both hands!
Practice With Care! It is very important that we take care of our training partners when practicing these strikes. But by the same token it is important we get a feel for the techniques, as after all feeling is believing. I always recommend starting off with a gentle tap perhaps around 10% of your power, ensuring all the correct mechanics and angle and direction is in place. If everything is correct you should
When you are comfortable with the strikes (single and double) you can practice them on the pads, first static, then a little more dynamic with movement. It should go without saying that applying this stuff on the move is critically important. You can and indeed should put together some scenarios based on your own and others experiences and risk assessments. Drill these, learning to locate the targets with control first, then on the pads or strike equipment. Put some protective gear on and turn up the heat a little. You should be finding that once you have stunned with this shot it does buy you time in that your training partner won’t be ‘up for it’ and will be stunned for a number of seconds. A good hit can put them out of it altogether, which is of course the ideal; however we have to plan to follow up. We’ll cover further specific targets you can strike in further articles. But for now you should be doing something, programming yourself to follow
up. Again scenarios are important so come up with some. Are you going to strike them again? Maybe take them down? Perhaps team restraints? I’m sure you get the picture. Next time we’ll look at a couple of further targets that you can add to the info in this article. Over time I hope to put them together with further articles on various aspects on fighting arts such as punching, kicking, wrestling etc which I teach on a regular basis. Please feel free to get in touch if you are having difficulty with any aspect of the material, I will be glad to help.
Jason Dorn has been involved in various aspects of security. He currently focuses his time on teaching personal security and protection skills and physical intervention, drawn from real experience and 25+ years in martial arts. He is available to teach these skills nationally and internationally. Check out: www.paragonprotect.co.uk Additionally he is owner and chief instructor at: www.paragonacademy.co.uk
Circuit : : 11
P
Circuit :: OnTheJob
HYSICAL FITNES FUNCTIONAL TRAINING
DEFINITION: “A classification of exercise, which involves training the body for the activities performed in daily life.”
S
by RYAN NAISH
F
unctional training is a bit of a buzz phrase in the fitness industry, with the help of clever marketing it is hyped up to be a brand new concept, this couldn’t be further from the truth. For the CPO this type of training certainly fits the bill. Strength being a key factor but also a high work capacity and muscular endurance. The popular practice of isolating muscle groups (a much used method in Bodybuilding), is inappropriate for building a well rounded, multi-faceted person capable of operating at a high level in many fitness related tasks. Training the body as one unit is the
logical approach, with heavy emphasis on developing a strong core. Compound movements should be employed in strength training: Deadlift (different variations), one arm press-up, weighted pull-up, one leg squat, one arm military press, dumbbell snatch etc, the list is endless. A common theme with a lot of the exercises is that they are performed with one arm, making the core work incredibly hard to stabilise the body. Too much emphasis is placed on high-rep movements for the abdominals; by training with compound movements, the core, collectively, is worked far harder than by isolating and working on one particular area.
Featured exercise: -
RENEGADE ROW E
ach issue will include a “Featured exercise”; try and incorporate them into your own routine and see how you get on with them. They will be very physically demanding and incorporate multiple body parts. If you find it too difficult to perform then break it down into progressions. You can eliminate much of the core stability by dropping down to your knees, or start with a very low weight and gradually work up.
This is an excellent strength exercise that incorporates static body tension with powerful pulling and pushing movements. It can be performed using either; Kettlebells or Hexagonal Dumbbells. Intensity is placed on the core to stabilise the body whilst the additional movements are being performed. The following images on the opposite page demonstrate the sequence of the exercise:
Circuit :: OnTheJob Start in the press-up position, arms fully extended, core activated
Under control, lower the body until the biceps are parallel to the ground
Press-up back into the starting position
Circuit Challenge Each issue will include a ‘Circuit challenge’. The majority will be time based, encouraging you to work to the best of your ability. All exercises must be done strictly and with good form, both to prevent injury and to give a fair result. If any of the exercises are too difficult, you can either change them for an easier alternative or decrease the weight or number of repetitions. If any of the exercises are unfamiliar, type them into youtube and you should get a good quality demonstration. You’re encouraged to post your results on the BBA forum to aid in competitiveness.
Round 1 – Complete 3 times Close-hand Press-ups ............... 10 Alternate V-Sits ......................... 10 Squats ....................................... 10 Take up to 1 minute rest
Round 2 – Complete 3 times With the left arm locked out, grip hard and push towards the floor and increase the tension of the core. Raise the right arm in a rowing motion so the handle comes level with the base of the mid-s ection. Lower under control to the start position.
Shoulder-width Press-ups ......... 10 Half-sit ups ................................ 10 Alternate Lunges ...................... 10 (each leg) Take up to 1 minute rest
Round 3 – Complete 3 times Wide-arm Press-ups .................. 10 Leg Raises ................................. 10 Squat jumps .............................. 10 Continue the motion with the alternate arm. When it is performed on either side, complete a press-up and continue the sequence for the prescribed repetitions.
Circuit to be completed in best possible time; all exercises must be done to full extension. Rotate through the rounds; don’t move onto the next exercise until all the repetitions are completed. The rest is a guide, the aim is to move through the circuit in the best possible time so try and keep it to a minimum; this will greatly improve your work capacity. Utrinque Paratus
Circuit : : 13
Circuit :: OnTheJob
Rural Surveillance ______________________ by STUART VOLKNER ______________________ Stuart is a Director of United Kindom Intelligence Solutions www..ukintelsolutions.co.uk
you will deal with every (most) unplanned incidents and finally a summary of how the operation will go, finalized by co-ordinating instructions- Timings, equipment, dress etc.
F
or many investigators the mere thought of carrying out a rural surveillance operation is quite chilling. This is mainly due to the lack of experience and limited skills. The surveillance techniques used in rural surveillance are far more specialized and require a lot of planning and preparation before surveillance is even attempted. Rural surveillance is more akin to a military operation, operators must have specialized skills typical of most infantry soldiers who have served as Snipers or in a Covert Observation Platoon. All operators must be aware of the inherent demands of this kind of operation. Ideally they should be trained and experienced mobile surveillance operators. In rural locations the use of one man in a vehicle usually means the surveillance is very quickly compromised. The reason for this is that in many rural locations like here in Cornwall everyone knows everyone and every vehicle in the local area. Any strange vehicle immediately arouses interest even though it is a tourist hotspot. You will know from an initial recce whether you will need to use a rural O.P. to either act as a trigger or a full blown surveillance operation. Once we have received instructions from a client we will conduct a thorough map recce to locate possible O.P’s by ‘reading’ the contour lines on the map and assessing the lay of the land. If it is practical we will also conduct an onsite recce bearing in mind that you will likely be noticed and will have to possibly use a different vehicle from the recce to the operation. “On one particular job for a local landowner who was experiencing excessive fly-tipping we had to put in a short term O.P. from a local dog walking area, the surveillance van was parked up with eyes on the potential O.P. area and while I took the dog for a walk my partner videoed the area to locate suitable hide sites and to see if there was
14 : : Circuit
any potential obstacles to putting the O.P. in. At this point we checked comms both mobile phones and our VHF handheld sets. On any kind of surveillance operation you’d expect to receive a set of orders. The type of information that is essential to any operation succeeding would be Ground- In general (the greater surrounding area including Topography) Ground- In detail (specific of the hide site and the target building/area) Situation- Information about the subject(s) such as a description, buildings, vehicles, anything that can be used to build a profile. If it is an injury compensation claim the disability that the claimant is suffering from. The Mission- A statement that clearly defines what the surveillance is for. Execution - general outline: this outlines how the operation will take place on the ground and is broken down into phases, Prep to move, move to target location, action on target, Close Target Recce (‘CTR’) if required. You will then go onto your O.P. set up and routine phases, followed by the withdrawal, route back and you will cover actions on, which is a pre-determined set of rules how
There are many other things that have to be considered when mounting a rural operation, if you are going to be in your O.P. location over 4 hours you will need to seriously think about making provisions for eating, you will not survive on sandwiches so you want something hot if possible, but cooking is out of the question to a point, a possible solution is a Hotcan® Self-Heating Meals or an American MRE (Meal Readyto-eat) a meal inside an aluminium foil pouch which has its own heater. All the while you must be aware how far the smell of hot food will travel and may have to work in hard routine and eat things cold. Now that you have eaten you will need to take away the rubbish and in the next few hours you will need to go to toilet, this presents its own unique problems, movement inside the O.P. and where to go and how to remove it when you leave. We take with us a plastic petrol can to urinate into and a Tupperware tub to defecate into, the good thing with this is that it reduces smells and is less likely to spill or split. At the end of the operation which incidentally always has a name, there is a thorough debrief at a secure location, all evidence is checked and a report written, video is down-loaded ready to be edited & burnt to a DVD. Finally all equipment is checked, cleaned, dried and stored, all batteries are recharged ready for the next op. This had been a brief insight into the complexities of a Rural Surveillance operation there are no hard and fast rules, but basic procedures which will have to be adapted for each and every situation.
Circuit :: OnTheJob
MARITIME SECURITY COURSE REVIEW....EOS W
hen spending hard earned cash on training I always find it wise to carry out some due diligence on training providers as there are so many out there to choose from. Whilst carrying out my research there were a number of names that kept popping up, in particular Eos Risk. The main factor that separated Eos Risk from the other companies I had looked at was the feedback received from a number of colleagues past and present whom had attended previous courses and rated them highly…….and you just can’t beat recommendations. After a short introduction from everyone attending the course we began with the background of the SSO and CSO roles and how over recent years these jobs have been pushed to the forefront of the maritime world. After this the main body of the course began and because of the numerous topics to be covered it was broken down in the following way: -
Risk
by SHAUN WEST
With the recent boom in the Maritime sector of the security industry the Ship Security Officer and Company Security Officer qualifications are becoming ever more desirable qualifications to have if you are looking at breaking into this particular sector. Whether you’re interested in carrying out Anti-Piracy runs off the coast of Somalia or looking for a more exclusive role in securing the Super Yachts of the rich and famous then these are qualifications that are becoming increasingly sought after. Hence the reason I decided to embark on both the SSO and CSO course to bolster my current CV and make myself more attractive to potential employers.
none lethal weapon being used in the fight against piracy.
Security Officers as well as the security of multiple vessels.
Day One
First impressions are hugely important and Eos Risk provided a professional delivery of their program from the outset. The instructor for my course was Paul Bolland. An experienced operator in the field, he was extremely enthusiastic and informative throughout.
The CSO qualification is a culmination of all you have learned as part of your SSO course with the addition of carrying out assessments, plans, inspections and verifications and the coordination and communication for exercises and emergencies.
Day Two
He delivered the training using an array of different methods such as group exercises and discussions to keep things fresh and avoid the ‘death by power point’ approach. During the course he continued to shake things up and made you think about what you were learning by keeping everybody active and involved. In doing this it helped the information sink in and also showed that we understood what was being taught.
Maritime security threats, International Ships and Ports Facility Security Code (ISPS) duties and responsibilities, Maritime (MARSEC) levels, The Ship Security Assessment (SSA), The Ship Security Plan (SSP), International Ship Security certificate (ISSC) and verification. Interaction with vessels, authorities and ports, Training drills and Exercises, Training the trainer, Suspicious persons and behaviour, circumvention of security, weapons and explosives.
Day Three
Practical protective measures and contingency planning, documents, records, communications and confidentiality. After this there was a Multiple choice written assessment covering all you had learnt over the past 3 days. Successful candidates were then issued with their SSO Certificate under the authority of the Maritime and Coastguard Agency and Counter Piracy certificate showing we had successfully completed a programme of training in counter piracy measures and procedures. After the main course was completed on day 3 we received additional training in the transportation, set-up and practical operation of the Magnetic Audio Device (MAD) a
Days 1-3 covered all of the relevant subject matter as laid down by the International Ship and Port Facility Security Code (ISPS Code) to qualify as a Ship Security Officer (This is mandatory for any vessel over 500 tonnes). On day 4 we covered the remaining modules, which enabled us to achieve the Company Security Officer qualification culminating in a practical role playing exam. The Company Security Officer has a little more responsibility and is next in the chain of command for the SSO. Whilst carrying out the role of a CSO you will be dealing more at management level and will be managing Ship
The course contained a high counter piracy content and practical advice on dealing with security incidents and contingency plans. This was of particular interest especially with the current maritime boom and all of the recent events and news regarding pirates that have been hitting the headlines. The other bonus to the course is that EOS Risk is an Operational company as well as a training provider and the content of the course reflected this. This is always good as you get a little more time to impress them as an employer than you would in maybe a twenty-minute interview. In summary if I had to do an SSO/CSO course again I would have no hesitation in booking up with EOS Risk…keep up the good work guys!
www.eosrisk.com
Circuit : : 15
Circuit :: HardTalk
The BBA talks to John Morrison of Close Protection World SW. Hi John and first of all thank you for allowing us to have this Q&A session with you; let’s get started. How long has the Close Protection World forum been online? JM. Hello Shaun, no need to thank us, the pleasure is all ours, thanks for inviting Mally and I along . We’re quite humbled to be part of your magazine. Well firstly can we say thank you for allowing us the opportunity to speak about our forum within your magazine. The Close Protection World forum has now been active for over 2 years and was officially launched in Nov 2008. In that time it has grown beyond anything that either Mally or I could ever imagined. If you had suggested to us at the beginning that in two years we would have over 17,000 registered members we would have never believed you. SW. Why was the forum launched and what was the intention of the forum? JW. Well believe it or not Shaun but the forum was never actually launched with the intention of making it public. It was initially launched many years ago as a privately run website designed to allow fellow RMP CP operators to network internationally with friends and colleagues who had recently left the Forces. Over a period of time though we identified that there was no free central portal networking website designed for both experienced operators and new comers into the industry. Sure there were forums about but it involved spending money. The intention of the forum is simple and mirrors the basic fundamentals of why the Internet was initially designed (no Mally not for Porn! haha) - The passing of free information from one person to another. Pure and simple.
16 : : Circuit
SW. How many registered members do you have? JW. We currently have over 17,000 registered members and over 4,000 people visiting everyday. We also have on average 20-25 members joining everyday from all over the World. The forum is truly an international forum now. SW. What areas of the industry does the forum cover? JW. It’s very easy I suppose to assume that we only deal with Close Protection as our forum name suggests this. But as we have developed and progressed over time as has our forum. Our forum now reflects almost every section of the security Industry. We now have numerous forums which includes but not limited to the following: Close Protection, Surveillance, Maritime security forum, K9, Vacancies, recruitment and CV advice, Driving forum, Company Directors forum, Security news forum, Police ARV, Door Supervision, PI forum, Security consultancy and Security guarding forum to name but a few. SW. What would be your advice for people hoping to commence a career within the security Industry? JW. What would be my advice? I hasten to add that this is of course only ‘my’ advice. It’s a difficult one to pin down as there are so many different career paths within the security industry and the work is extremely varied. What i do say is, as with any career ensure you approach your particular line of work in the security industry with professionalism, dedication and determination. Carry out research, make enquiries and if you still want to pursue your career then by all means go for it but ensure you are not blinkered.
Keep an open mind, listen to advice and be prepared to accept that there may not be a future for you within the field you want to specialise in for whatever reason. Be aware that training courses are not cheap. Ask yourself are you financially in a position to be spending this money to pursue a career that has no guaranteed income. Working within the security industry can be similar to serving in Her Majesty’s Forces - Long periods of time away from home sometimes in war torn countries in the middle of nowhere. I apologise if this seems slightly down beat but people need to realise there is no easy short cut into the industry. You need the skills, experience and training to be good in our game and like wine it takes time to mature. There are no short cuts in this industry. SW. What would be your top tips for securing those all important jobs? JW. Simple - Network. It is single handedly the most effective way of gaining employment or that important contract. Keeping on top of your skills and re-investing in yourself is also very important. Choose personal development courses and add to your skill base. SW. I’ve spoken to many people with regards to CPW and it always invokes mixed reactions. Many being positive saying the forum is great because it offers a free service and that there is a wealth of information available to people working within the industry with others saying that they would never use the forum as there is a lot of negativity generally associated with it, the negativity being towards newer members asking genuine questions what are your comments regarding this? JW. People are of course entitled to their opinions and yes I have heard similar com-
Circuit :: HardTalk This issue The Circuit got the opportunity to put questions to John Morrison aka “Covert Monkey” with regards the hugely popular and sometimes controversial Close Protection World forum. ments. We do not edit the forum, nor protect people from other forum members. It’s the real world, not everyone is nice, not everyone is friendly. We don’t make out to the new people entering the industry that it’s a bed of roses. People are told how it is and sometimes people don’t like it. I would argue that some of our forum members are very busy and they actually take time to go out there way to answer questions. It can be frustrating when they don’t take it and then argue that they are right and know best, I’m sure we’ve all been there at some point. Why ask in the first place if you are not going to listen. The security industry isn’t for everyone and the
humour and piss taking within the forum reflects that of any CP team - it’s friendly banter. On the whole the forum members are very friendly and we regularly have posts of praise from many members thanking people for going out their way in helping them. I therefore disagree, the forum is a friendly place and the membership are there to help others. Otherwise they wouldn’t be there. SW. So what’s next for the CPW forum and where do you see it being in say 5 years? JW. To be honest we are just happy that the forum is as large as it is. We envisage and hope that the forum is going to grow even bigger both nationally and internationally. In preparation we have already started planning a black tie charity night, bi-annual forum meetings, Directors black tie liaison dinner and will be starting specialist workshops and seminars throughout the country. In addition to this we will be launching a new Close Protection world TV channel. Please keep an eye on the forum for these amazing new developments. SW. What are your thoughts on the changes which have been brought in by the SIA in the last few years, do you feel that licensing has benefited the industry or do you feel the bar
has been set too low by the SIA? JM. I believe that the SIA has good intentions and appreciate that there were administration problems when it was launched. The license application fee is expensive and hits you hard after you’ve just paid for a CP course. I do feel that any regulation is better than none and also strongly believe that the Close Protection aspect of the licensing needs to be reassessed. Specifically the driving, first aid and renewal process all need to be looked into. With regards to the bar being set low all I will say is that the cream always rises to the top. SW. What are your thoughts on The Circuit magazine now that you’ve had a chance to take a look at it? JM. The circuit magazine is a very good read and I’m impressed with the set up. The articles are very informative and I especially like the quality of the people you interview! haha SW. So John and Mally thanks very much for your honest answers with regards to CPW and we wish you and the forum all of the best for the future from all at The Circuit and BBA
British Special Forces
Argus Europe Ltd Security Specialists
Our courses are accredited by EDEXCEL and cover all of the core competencies as specified by the Security Industry Authority. In addition the instructors have included extra tuition in subjects, which they believe will be invaluable to a Close Protection Officer.
Argus Europe has been providing specialist training for high-net worth clients and their families for 16 years, worldwide.
Our training scenarios will give you the opportunity to practice the skills of a Close Protection Officer using the knowledge that you have gained throughout the course in a realistic but safe environment prior to heading out into the field as a CPO.
Argus Europe is an operational company working globally with an extensive variety of contracts. Our continued active involvement with our operational commitments ensures that our training remains at the cutting edge giving us an advantage that others cannot match.
Argus Europe provides accommodation and breakfast and all learning materials. Course numbers are strictly limited so that all students enjoy a high instructor to student ratio.
We provide bespoke solutions for our clients using a pool of dedicated professionals and proven protocols. We can present a report outlining projected costs and the probability of success, prior to contract.
CURRENT COURSES • Close Protection [SIA License & BTEC Level 3] • Advanced Surveillance [BTEC Level 3]
OPERATIONAL COMMITMENTS • Close Protection Operations
• Private Investigation [BTEC Level 3]
• Surveillance Services • Commercial & Private Investigations
• Surveillance Videoing & Editing
• Fraud Investigations The Old Brewery, Castle Eden, County Durham, TS27 4SU T: +44 (0) 8456 123 843 | M: +44 (0) 7958 518 181 F: +44 (0) 1429 837 068 | E: arguseurope@msn.com
• Motorbike Surveillance
www.arguseurope.co.uk
Circuit : : 17
Circuit :: BooKlub Here at The Circuit, we know that despite your image, you guys like nothing more than curling up with a good book..... This months reviews:
In The Presidents Secret Service by Ronald Kessler
themselves, from Richard Nixon “strangeness” to Jimmy Carter being described as the “least likeable President”. A favorite in the book is a chapter called “Cutting Corners”. In the past, the Secret Service was accountable primarily to itself, but after 9/11 President George W. Bush and congress created the (DHS) Department of Homeland Security which consists of twentytwo agencies with 180,000 employees. So overnight the USSS was forced to compete for funds, political maneuvering and bureaucratic red tape. From the authors perspective, when this happened quality training is one of the first things that went out of the window. Then there is the chapter in this book that talks about an agent by the name of Timothy McCarthy who many in our industry know as the only agent to have actually taken a bullet for a US President by stepping into the line of fire. His story is compelling reason enough to keep turning the pages to find out what happens next in, In the President Secret Service. Ronald Kessler did a good job in writing an engaging book however there were times that I felt that he was overstepping the boundaries of good taste by digging a little too deep into the presidents personal lives. He seemed to fixate on the alleged sexual adventures of the White House to the point where sometimes I wasn’t sure exactly what book I was reading. In our line of work I was always taught that you don’t pillow talk! In the President’s Secret Service gives you the agent’s stories from their unique perspectives. It also offers a revealing look about how US budget cutbacks have affected an important institution, one that may put US Presidents in danger, particularly current President Barrack Obama.
Review by JD Woolsey I’ve never been in the Secret Service or in my capacity as a PPS ever had to take a bullet for anyone, but after reading In the President’s Secret Service, I felt like I was right at the scene of all the action dating back to President Abe Lincoln and walking though various US Presidents and their security arrangements. Writer Ronald Kessler does a great job of telling the stories of the men and women who risk their lives to protect one of the most important offices on the planet. The book takes the reader back to the agencies formation and goes at length on the USSS’s procedures for dealing with threats to the Oval Office. Of course if you were expecting a dry read, you won’t find it here as the book also offers a behind the scenes view of the President’s of the United States of America, told from an interesting vantage point—the agents
18 : : Circuit
Danger Close by Stuart Tootal
Review by Mike Jones This book gives an excellent account of the 3rd Battalion the Parachute Regiments tour in Afghanistan during Op Herrick 4 from their Commanders point of view. Colonel Tootal manages to get across a truly gripping account without much of the hyperbole that often accompanies many of the modern books of ‘war’. Throughout the book Colonel Tootal gives an honest and sometimes alarming tale of the problems that he faced during this deployment, the burden of command and the problems that should never have happened but did and many of which continue to be reported some years later. You can almost feel Tootal’s frustration as political mission creep hinders the battle group, making their already difficult job far more demanding and indeed dangerous than it should have been. In this reviewers opinion Danger Close is very well written but easy to read and also written in such a fashion that it keeps you wanting more; this writing style is a winner for any author! The book details the Battle Groups tales as they struggle with inadequate manpower while defending their forward operating bases [FOB], often struggling for supplies of food, water and more alarming ammunition or indeed non-faulty ammunition! Whilst on leave Colonel Tootal visited the NHS hospital where his injured troops had been sent and appeared saddened, annoyed and dismayed by the lack of post operation care that the guys were receiving once on the ward. The fact that the guys were on a ‘civilian’ ward and not a specialist ‘military’ wing is my opinion absolutely disgusting and no way to treat our servicemen and women! This book is worth reading if only to understand what being at the wrong end of a British political decision means to those who have to uphold policy abroad. It is commonplace for young men in our society to bear the brunt of complaints; well these young men should be proud of what they achieved in Afghanistan, indeed every man is an emperor! Colonel Tootal’s pride in the infantrymen, cavalrymen and airmen under his command, Paratrooper or not, comes across plainly and is evidenced by his outspoken response to the treatment of injured soldiers and equipment shortages on the front line. Danger Close is a testament to today’s soldiers and demonstrates that the British Army, at the front line, has maintained the resolve of its forebears.
Utrinque Paratus!
Circuit :: Finance
Ask Anna..
Send your finance questions to Anna Cooperwhite an accountant specializing in delivering accountancy services to people working within the security industry whittakerandcoy@hotmail.com world. For further information check out their website: www.cpsis.co.uk Q. I want to be set up as self employed but along with that I am carrying on with my PAYE job so does this mean I have to pay National Insurance for both?
your resident Accountant Q. Anna, I have jacked in Iraq will I have to pay tax, I put the P85 form into HMRC on the 5th December 2007. A.Your P85 will have allowed you to claim a split year so that your income was not taxed from the date you left, but you would have then had to have completed a full tax year from April 2008 – April 2009, you have clearly done this. As you finished this month, it would mean that the money you earned in Iraq from 6th April 2009 until you finished will be liable to taxation. What we need to do is inform HMRC your back in the UK with the form P86, and arrange to have a tax return for the 2009/10 period This will be due by 31st October 2010 as the supplement sheet for days in and out the UK will need to go into the return, this needs to be a paper return as HMRC are still no further with online submission for non resident supplement sheets. Q. I am having issues with life insurance due to my occupation and (residency status) can you help? A. Our expertise is as Accountants and as such I am not authorised to advise, but we do work closely with insurance brokers, Clarke Jeffreys, of Hereford. They have many years experience in advising both individuals and companies in the industry and are able to provide quotations for insurance for life insurance, travel, personal accident with cover tailored to individual requirements. Cover can be specifically for whilst on leave or working in Hostile Environment anywhere in the
A. If you’re employed If you earn above £110 a week (the ‘primary threshold’) you pay 11 per cent on the excess over £110 as ‘Class 1’ National Insurance contributions up to the upper limit of £844 earnings per week. You also pay one per cent of earnings above £844 a week as Class 1 National Insurance contributions. Below £110 you pay no National Insurance contributions. If you’re self-employed You pay ‘Class 2’ National Insurance contributions at a weekly rate of £2.40. However, if your earnings in the 2009-10 tax year are expected to be less than £5,075 then you may be entitled to the ‘Small Earnings Exception’ and not pay Class 2 National Insurance contributions. You can apply for Small Earnings Exception for the 2009-10 tax year on form CF10 Application for exception from liability for Class 2 contributions. Class 2 National Insurance contributions must be paid unless you apply for, and are issued with, a certificate of exception. In addition to Class 2 National Insurance contributions, you also pay ‘Class 4’ National Insurance contributions on a percentage of your profits. You pay eight per cent on annual profits between £5,715 and £43,875 and one per cent on any profit over £43,875. Class 4 National Insurance contributions are an annual charge and are paid along with tax through the Self Assessment system in two ‘payments on account’ and (if appropriate) a final ‘balancing charge’. Because they are an annual charge you will still have to pay Class 4 National Insurance contributions on any profits for the year in which you reach State Pension age. For example, if you reach
State Pension age on 1 May 2009 you will still have to pay Class 4 National Insurance contributions on all of your annual profits above £5,715 for the 2009-10 year, but will be exempt from Class 4 National Insurance contributions for tax years from 6 April 2010. When might you overpay or wrongly pay? You might have overpaid or wrongly paid National Insurance contributions if: you were employed and self-employed at the same time and paid Class 1 and Class 4 National Insurance contributions or Class 1, 2 and/or 4 National Insurance contributions but paid more than you needed to. We will check this for you though when we do your tax return. Q. Anna I have bought some surveillance kit, a chest rig and a high tech torch for Iraq can I claim this off my tax? A. I know you may have spent a fair bit of money and if you were doing security in the UK and set up as self employed in the UK, then yes this would claimed for in your expenditure computation, however, as you will be set up to work overseas with HMRC then a P85 will be in place, so as long as you adhere to the Non residency rules under HMRC 6 guidelines, then your income is free from taxation and therefore we do not put any figures in to HMRC so therefore no, not when your working overseas. Q. Am working in security on a large site up in Scotland, someone has told me I can claim for my dog I use to walk the perimiter fences is this true? A. Well we are not talking little pugs or terriers here, we are talking proper guard dogs, so if you have a guard dog that you use for your work and your set-up as self employed, then yes we can claim for the expenses you shell out for your guard dog.
Circuit : : 19
Circuit :: HardTalk
Mike jones TALKS TO fred davis about the esi course MJ: Hi Fred, I would just like to thank you for allowing us to do the Q&A with you! The ESI course is one of the most talked about courses in the United States and one that we have had a lot of enquiries about. I wonder before we make a start on the interview, if you could tell us a little about yourself and your involvement with the security industry? FD: My name is Frederick Davis. I was born and raised in South Bend, Indiana. I’m the second of three children. My mother is a teacher and has her master’s degree in education and my father was a well-known entertainer. He was a lead singer in a band called “The Landing Party”; promoters all over the country requested them in the early 70’s. I am the father of two small boys, ages 2 years and 2 months. My involvement in the security industry began while i was in high school. I took a job as uniformed security guard that worked loss prevention, bank security, and property security. That first step in the industry gave me the drive to thrive for the gold in the industry I wanted to work my way from the uniform to the suits. No offense to anyone making an honest living working as a uniformed security guard but I couldn’t see myself doing that forever. I wanted to go after bigger and better. After graduating high school in 2000. I enrolled at Morris Brown College in Atlanta, Ga and majored in Criminal Justice. I always wanted to be a probation officer and retire as a juvenile judge. While in college, i needed money. I landed a job at a local nightclub that led to me getting offers from some of Atlanta’s elite high rollers and big spenders. I was approached on several occasions by celebs (who thought I was a bodyguard) to hang out with them after the club and work for them. I had no idea on how to protect anyone. While in college I lifted weights in my spare time so I had a muscular bulk of a physique, which in most cases would make some do a double take. One night while working at
20 : : Circuit
the club I spoke with the bodyguard of an artist who performed at our club that night. I asked him what kind of training, what credentials are needed, and the starting salary for a bodyguard. He told me he was a retired police officer and martial artist, and he was making 100 thousand dollars a year. My eyes lit up! During my senior year of college and 3 years working in the nightclub and being noticed and remembered by the big names of the city, i decided to give it shot. I looked into several different bodyguard schools and most didn’t offer the training I was looking for nor did they price fit my budget. I then found Executive Security International. I researched and made contact with them about my interest and it took off from there. After i received my Criminal Justice degree I enrolled in Executive Security International. I was excited to hear that one of my instructors was a former secret service agent. My career took off from there. The training at ESI is non comparable. ESI is by far the best. The training and networking I have received from ESI has blossomed my career in the protection field. I’m well known and respected in the industry. ESI has opened the door for me to protect A-list celebrities, athletes, wealthy families, and some of the world’s most powerful corporate executives. It has also opened the door for me to work for some of the heavy hitters in the security industry such as Elijah Shaw, CEO of Icon protection. As of right now, I’m working an exclusive detail for a very wealthy corporate executive. MJ: Thanks for letting us know a little about you Fred. That is a great story and fantastic to see that you have been successful thus far. With this in mind what steps did you take when researching a course and what were you looking to come out of the other end with? FD: The ultimate goal when going through any training is to have certification from a recognized institution, and that is what ESI offered with their Certified Protection Specialist C.P.S. MJ: So the, you have done your research and paid your deposit, what was the response like from ESI? Where they easy to deal with? Did they require you to do any form of ‘pre-course’ learning? FD: There is no pre-course learning required at ESI, everything from the basics to the more advanced concepts are covered in the curriculum provided by ESI. MJ: Ok then, you arrive at the training centre and are received by ESI – what was the atmosphere like and what were you expecting? FD: It’s just like your first day in college! Your nerves are going crazy because you are worried about not being able to fit in and do what is asked of you. The staff at ESI made things warm and comfortable. After a few hours of mingling with the instructors and other students, you learn some of your classmates have interesting backgrounds in law enforcement, (secret service, FBI, ATF, etc). Also the instructors at ESI are top-notch executives in the industry. When
I got off the plane in Aspen, I was expecting somewhat of a military base style training session. Far from my imagination once I got there. Warm and realistic! MJ: That’s excellent Fred, I think making people feel at ease when you are beginning a training course is essential to productive to learning. So then, you are on the course and setting out on your journey. Did you find the methods of instruction suited you personally and were there various ways to learn so that you had every chance of taking the subject matter on-board? Were the instructors happy to go over various aspects of the course again if you or your fellow students could not quite grasp it? FD: The instructors at ESI are very patient, and more than willing to take an extra moment to explain a concept that a student doesn’t grasp. ESI’s Instructors and staff will take time out of their day to address any questions or concerns that you have regarding the training that you are receiving even if it just to clarify a concept. MJ: That shows that these guys obviously know what they are doing. No point in moving on if the students have not understood what has been taught up to a given point! MJ: Was there a good mixture between classroom instruction and practical application? FD: I don’t know about you but I find that actually doing something practically impacts on me more than a presentation? You know many people think that ESI is all lecture time, however you will find that yes you may be in lectures for the first few days getting down the basic concept, but once the basic concept is introduced, the practical application begins. One example of this is the stalker problem where each team must solve and stop an attack from a stalker. This part of the course was not only fun but also an eye opener let me tell you! MJ: I bet! I agree totally with you Fred, practical based learning is what works (for me) as CP is a practically based job but I also agree that an amount of classroom time is also essential. MJ: Were you tested as a team and as an individual? FD: Both, you are tested on an individual level as well as on a team basis. One concept that everyone must learn to do when going through training at ESI is to place your ego aside. The same is true in the real world; you are either working on your own or in a team setting and when one is working in a team setting you must put your ego aside MJ: That is good to see as you get people that try to hide and this does no-one any favours…. especially the people that you will be looking after! MJ: Where you required to complete any work on an evening in your own time? FD: When enrolled in ESI’s distance education program you must set-aside sometime in the evenings to complete your course work. The
Circuit :: HardTalk NEWS
same is true for the resident training you are required to write a threat assessment and when you are there for training it is an all day event leaving your evenings the only time to complete your threat assessment. MJ: Ah, I see. Again, I think that most of the good courses will require a certain amount of work in the evenings and if you want to be successful both on the course and afterwards then there will always be work to complete before/ during and after an assignment. MJ: Do ESI offer any kind of on-going support once you leave them? FD: Once you are a student or a graduate you gain access to the Alumni Association. It is an online network strictly for ESI. On the network you will find support for your career, whether you have questions or are looking for a job the information is available on the network. In addition, there is an annual conference that takes place in Las Vegas where there are seminars, face-to-face networking events as well as job opportunities.
Russia warns ‘don’t pressure Iran’
Russian Foreign Minister Sergi Lavrov has said that pressuring Iran and threatening further sanctions over its nuclear programme would only be counter productive. Iran continues to state that its nuclear programme is for peaceful purposes only but western governments believe that the Iranians are seeking to produce nuclear weapons. Tehran has revealed that it has a second uranium plant and this will only continue to arise suspicions amongst the West.
Terror Charge for French Scientist
A French physicist was arrested in Paris on suspicion of having links to al-Qaeda. The man concerned is a 32 year old of Algerian descent who worked at the European Organisation for Nuclear Research, Europe’s main centre for studying particle physics. The man is one of 2 brothers who has been retained with both being believed to have links to al-Qaeda. The centre has been quick to stress that the man arrested had nothing to do with anything that could bring him in to contact with anything that could be used for terrorism.
MJ: That sounds great and shows that there is some depth to ESI. You get a lot of companies that just want to take your course fee and then you never hear from them again! MJ: Ok then, you have finished your course – what were your overall thoughts on your experience? I know that ESI is not the cheapest course out there but was it good value and would you recommend it to others? FD: Every penny spent with ESI was well worth it. During training I networked with a few of my fellow classmates and shortly after I graduated, we were hired to work a protection detail for a wealthy family. In a month’s time on the detail that paid very well, I made the money back that I spent at ESI. I would highly recommend it to others! MJ: That’s great. What an endorsement! MJ: Would you consider do any other courses with ESI? FD: Yes. I was offered a position overseas protecting American Diplomats. The detail paid well over 150k a year but I didn’t feel comfortable going overseas due to my negative years in the military, however, ESI offers a Special Operations course to get those adjusted to life over the water. MJ: Thank you for telling us about your experiences with ESI Fred. I think that this will help others in a similar situation make a more informed decision about where their training budget should be spent. Good quality training is not cheap and it is essential that you receive good quality instruction from experienced operators so that you can advance your career. Fred, once again thank you for taking the time to speak with us about your time with ESI, We wish you the very best of luck with your future endeavours.
Circuit : : 21
Circuit :: OnTheJob
ROAD TRAFFIC COLLISIONS IN THE REMOTE ENVIRONMENT
What Can You Do?
This brief overview of the principles of safe casualty extrication was provided by Andy Purdie, Chief Instructor at Prometheus Medical Ltd, who runs the Remote RTC Extrication and Casualty Management Course. This covers not only the this approach in greater depth but also considers the application of these principles to RTCs involving armoured vehicles. To find out more about Prometheus and this course, visit www.prometheusmed.com
O
ne of the biggest dangers facing an operator is encountering a road traffic collision (RTC), with a trapped casualty, in a hostile or remote location. Many of the places where CP tasks are undertaken are associated with poor infrastructure, where roads are normally in a poor state of repair and the local driving standards are second-rate at best. As a result the chances of having an RTC are dramatically increased. If you are involved in or encounter an RTC in this environment, the support you are likely to get from the host country may well be minimal and certainly won’t meet the standards we expect in the UK, where we can rely on the Fire Service to cut out any casualties and the Ambulance Service to support and treat them. Therefore, self help may be your best or only option. With a structured approach, a little knowledge and a few simple tools you can safely extricate any casualty in a very short period of time, even from an armoured vehicle. Should you be unfortunate enough to be in this position you can optimise your management by following these steps: Safety – Ensure safety of yourself (including Personal Protective Equipment), the scene, and the casualty. In a hostile environment this may include dealing with enemy action before even attempting a rescue. Command, Control, Communication – If you are in a group, establish a team leader who is able to stand back and oversee the situation and establish communication with your base location (if possible). Read the wreckage – What damage has been sustained to the vehicle? This may indicate potential casualty injury patterns and will also influence the decisions you make when deciding upon an extrication plan.
22 : : Circuit
The following steps are all carried out concurrently: 1. Early Rapid Access – Gain access by the easiest means possible; this may be as simple as opening the door(!) or window to allow access to the casualty. 2. Casualty Assessment (cABCDE) – Conduct an initial primary survey of the casualty and treat any injuries. Treatments may be limited at this point due to entrapment. 3. Vehicle Stabilisation – By any means possible, stabilise the vehicle to minimise movement whilst the casualty is being treated and extricated. 4. Glass Management – Where possible, keep glass breakage to a minimum. If breakage is necessary, protect the casualty and the carer from broken glass inside and immediately outside the vehicle. 5. Space Making – Make as much room as possible around the casualty to ease extrication. This may involve moving seats back, removing the steering wheel, foot pedals etc. Extrication – There should always be a ‘Plan A’ and a ‘Plan B’. Plan B involves a rapid extrication when life threatening medical conditions or external dangers (e.g. fire) are encountered. Plan A is the preferred extrication option and involves a controlled extrication of the casualty, ideally by immobilising and removing the casualty on a long board or improvised device. This may also involve removal of the roof or the side doors of the vehicle.
Casualty reassessment – Now is the time to carry out a full casualty assessment (cABCDE) in a safe area and treating any injuries accordingly. Packaging and Transport – Once the casualty is stable, they should be ‘immobilised, kept warm and continually reassessed (packaging) until help arrives or you self extricate. www.prometheusmed.com
Circuit :: OnTheJob
Handgun Selection for the Executive Protection Agent
A
s promised, in this go around I am going to dive into choosing a handgun for conceal carry. There are two main types that I am going to talk about, Revolvers and Semi-Automatics. Just like when deciding whether to carry or not, there are questions that come into play when choosing the firearm that is right for you. I am going to examine types, make up, and the pros and cons one would encounter when choosing a firearm. Let’s start with the types of handguns out there.
The Role of Firearms in Executive Protection. Pt. 2
Revolvers Revolvers are defined as follows: “A handgun equipped with a revolving cylinder containing several cartridges so that it can be fired repeatedly without being reloaded.” A revolver comes in various sizes and shapes, but for the sake of selecting a revolver for conceal carry purposes we will stick to .38 special and .357 for the calibre and a barrel length under 4 inches. In my opinion, anything over 4 inches starts to get a little hard to hide. There are many things that make a revolver a solid concealed weapon, the big two are that they are simple to use (point and click), and they are reliable; there are fewer parts to break and fewer moving pieces that can malfunction. However there is one big drawback; low round (ammunition) capacity. With that said it only takes one well placed shot to end a hostile encounter. Your personal marksmanship skills should play a part in the decision making process. Makes and models differ from manufacturer to manufacturer so I would suggest you go out there and see what works for you. After all YOU are going to be carrying the gun YOU use to protect yourself and your principle. In terms of concealment, the smaller the frame the smaller the gun, and in turn the easier to hide, but keep in mind small is not always better. For example I own a small J-frame Smith and Wesson 5 shot .357 that is made from a very lightweight material. It weighs in at a little over 12 ounces and has a 2-inch barrel. I can carry that thing all day long and not even know it’s there. It is easy to conceal and it puts no strain on my body when carrying all day. Now the drawbacks… it only has 5 rounds (if I carry a reload lets call it 10), meaning in a firefight I have to get the job done with only a few shots. Another drawback, as many can attest to, is that shooting a .357 + P load through that gun will
by JUSTIN JOHNSON
down right rock your world! If you’re lucky a bruised hand is all you will end up with. Not very pleasant to say the least. And the last negative is the accuracy --anything over 10 feet and hitting the target where you want gets a bit sketchy. But of course practice will help your accuracy improve. Like anything else in life you have to find the balance, if the simple operation, and the conceal ability of a revolver is what you want consider this; how about a 3 inch barrel (to improve accuracy) and an all steel frame (reduces felt recoil) like the Smith & Wesson Model 60 “J-frame” in .357 Magnum, a.k.a., the “60-15.” It weighs in at little over 24 ounces and fires the ever-potent +P rounds. The gun is going to get slightly longer and
slightly heavier but accuracy and follow on shots will benefit.
Semi-Automatic
Now to the second type of handgun, the semi-automatic. The semi-automatic is defined as “a pistol that can be fired in semi-automatic mode, firing one cartridge for each pull of the trigger.” In short every time you pull the trigger a round goes down range towards it’s intended target. Like with revolvers there are a lot of things that go into choosing a Semi-Auto. Size, calibre, and type are the focuses for this section. Like with any firearm you want size to be of major consideration, as the bigger the gun the harder it is to hide. For example a 3-inch Kimber 1911 pistol is going to be easier to conceal then a full size Glock 17. Yes, you will get more rounds with the Glock but by comparison, the overall width and length of the 1911 make it a more concealable firearm, not to mention with the Kimber you get a .45ACP round for more stopping power. Here again shoot ability comes into play, similar to the .357 mentioned above, not everyone can comfortably handle such a big round in such a small package. With consideration of caliber, personal choice plays a major factor. Some swear by nothing but the .45ACP, while others like the smaller .380. There is an old saying, “a .22 in the hand is better than a .44 in the glove box.” A good rule of thumb when deciding what calibre firearm you want to buy is: the bigger the bullet, the better the stopping power, but fewer the rounds in the magazine, and in most cases, the bigger the gun. There are of course exceptions to the rule. Khar makes very slim, very concealable firearms in a wide range of calibres. And more and more manufactures are keeping conceal carry in mind when producing firearms. I personally carry a full size 1911 .45ACP when ever I can. It gives me the accuracy and stopping power along with 19 rounds (with spare magazine) to get the job done. Take a look at some of the different manufactures out there and see what they have to offer. Also remember it’s always a good idea to go to the range and test fire the fine piece of weaponry that you have your eye on. You wouldn’t buy a car without test-driving it would you? www.JustinJohnsonBG.com
Circuit : : 23
THE PAPARAZZI
ARE THEY BECOMING TOO DANGEROUS? By __________ HAN VAN BEUGE &__________ ELIJAH SHAW
P
ublications, TV programs and internet sites such as People, The Star, The National Enquirer, The Globe, US Weekly, OK!, In Touch, Entertainment Tonight, The Insider, Access Hollywood, TMZ, Hollywood. TV, Splash and about another 1,200 celebrity news sites in the US alone, all feed our insatiable addiction for celebrity culture. And if keeping with the religious allegory then the apostles of celebrity worship – ones that fuel this aggressive, global, billion dollar industry-- are the Paparazzi; The freelance photographers who relentlessly and intrusively pursue the famous, record their every move, and supply the avalanche of banal and insignificant details to the media outlets. Roaming worldwide, the paparazzi have had few legal restraints imposed upon
24 : : Circuit
them. They justify their often illegal activities by citing the rights of freedom of the press and free speech. Rights guaranteed in the Constitution of the United States by the First Amendment as well as similar laws (or lack thereof) in other nations. The paparazzi first gained notoriety in those La Dolce Vita days (the term paparazzi originated in this famous Fellini film) of the late 1950’s when Italian snappers were racing around Rome’s Via Veneto on Lambretta motor scooters, photographing the rich and famous. These early paparazzi soon discovered that provoking a celebrity and having a colleague take a photo of the celebrity’s reaction was worth more money than the traditionally posed glamour shots. The concept of the
more invasive paparazzi photographers replacing the old school photojournalists soon followed in the US, UK and France. In 1997 the authorities and the general public finally realized how out of control the paparazzi had become. Although cleared of culpability, the paparazzi were clearly complicit in the fatal car accident that caused the death of Princess Diana. This incident also affected the public perception of protection agents and divided members of our community on how it could have been prevented. As Diana’s brother, Charles Spencer, poignantly expressed the day after her death, “I always believed the press would kill her in the end, but not even I could imagine they’d take such a direct hand in her death, as seems to be the case. It would appear that every
Celebrity worship seems to be the fastest growing religion in the world. In our secular society it seems the need for traditional worship has been displaced and replaced with an obsession for idolizing celebrities. lack of industry regulation are the reasons why the paparazzi started to behave like something out of the Wild West. With the new generation of digital cameras and video recorders literally any one can take a professional shot. The photographic skills of the older generation of paparazzi became redundant. In the past few years the number of paparazzi has increased enormously. Los Angeles for instance had a couple of dozen consistently working paparazzi about five years ago. Now there are over two hundred. The tabloids are willing to pay six figure pay-offs for a “unique” shot. By “unique” they mean something that portrays the celebrity negatively such as having a car accident, appearing drunk, overweight, angry, unattractive or dishevelled. The lucrative money resulted in an increase in the numbers chasing the big payday, which in turn made it more competitive. To succeed now as a paparazzi you need to be far more aggressive, not just in pursuing your subject but in also in beating the competition. With no licensing or accreditation necessary to operate, we have seen an increase in the number of people with violent criminal records working as paparazzi.
proprietor and editor of every publication that has paid for intrusive and exploitative photographs of her, encouraging greedy and ruthless individuals to risk everything in pursuit of Diana’s image, has blood on his hands today.” After Princess Diana’s death, limited laws protecting the rights to privacy for individuals were enacted in France and Germany. The tabloids and the paparazzi avoided controversy for a while at least until the outcry over Diana’s death passed. However, over the past few years a new breed of aggressive and intrusive paparazzo has evolved, and they are responsible for escalating the degree of danger into the duel between celebrities and those who photograph them for profit. Technology, competition, profits and a
I
n the US one particular paparazzi agency is named after an L.A. street gang the owner of the agency belonged to as a teenager. He trains other ‘reformed’ gang members in the business. Other agencies use foreigners working on questionable visas. Photographers are hired less for their camera skills than their ability to navigate the rough-and-tumble of the celebrity chase. A much more accurate term to describe the newer breed of paparazzi is ‘stalkerazzi’. They usually work in teams and will stay hunting their celebrity targets 24/7. Often driving rental cars, obscuring their license plates or using aliases to hide their identities or connections to the big agencies that control much of the market, these stalkerazzi are willing to run red lights or force celebrities off the road to get a photo, with a total disregard for public safety. It seems as if the lesson of Princess Diana’s death has been forgotten.
The vehicular pursuit of celebrities, which are called ‘follows’ often devolve into dangerous high speed convoys and are certainly the most reprehensible activity the paparazzi commit. Follows become especially dangerous when competing teams are after the same quarry. Often there can be up to thirty SUV’s (the vehicle of choice) involved, all jockeying for the best position. The desire to get the money shot leads to a flagrant disregard for any road rules including speed limits, red lights and driving on the wrong side of the street. When they have followed their target to the destination, they generally discard their vehicles on the roadway and swarm all over the target vehicle ‘hosing’ down the target with cameras on full auto. The rights of passage are denied to both the target and any passers by and they will frequently start fighting amongst themselves like sharks in a feeding frenzy. When this ‘hosing’ is done at night in conjunction with a camera flash, the effect is like having 30 Surefire flashlights shined in your eyes. It’s painful and you completely lose your night vision and it is obviously extremely dangerous to the driver, passengers and any other vehicle or person near the vehicle they have surrounded. (The term ‘hosing’ is one the paparazzi proudly use and is deliberately meant to convey the sense of indignity and helplessness a naked prisoner feels when they are hit by a high-pressure hose.) Recently in Los Angles, the paparazzi have been involved in several car accidents with celebrities including Nicole Ritchie, Brad Pitt and the late Michael Jackson’s family while on the ‘follow’. They were also implicated in providing information to a gang that was burglarizing celebrity’s homes and one paparazzo got into a punch up with Mike Tyson at LAX after he was harassing Tyson’s family. Meanwhile in Italy, the owner of paparazzi agency was put on trial for blackmailing politicians and celebrities with the photos his agency took. It’s obvious that the Paparazzi industry is completely incapable of self-regulation or establishing an effective code of ethics. Authorities need to enact legislation to protect
Circuit : : 25
Circuit :: ShopTalk written consent of the individual involved. • There should be ‘no go’ areas for paparazzi around certain institutions where reasonable privacy should be expected. This would include but not be limited to schools, hospitals, cemeteries, residences and places of worship.
O
the safety and privacy of both the public and famous individuals from their irresponsible behaviour. The question of how to balance freedom of the press versus the basic right to a reasonable degree of privacy needs to be addressed and defined. There needs to be a clearer definition of what is ‘newsworthy’ and what is just intrusive gossip. Virtually all paparazzi photographs and video are of high profile people doing very mundane, everyday activities – taking the children to the park, shopping, eating, walking or driving. None of which could be reasonably defined as newsworthy or having social value. Last month, California Governor Schwarzenegger signed a new law, Assembly Bill 524, to discourage paparazzi misconduct by allowing tabloid or other publishers to be sued for using images or sound recordings that they knew were obtained violently or illegally. California Assembly Speaker Karen Bass, who proposed the new law, was quoted as saying, “Out-of-control paparazzi are an increasing threat, not only to the celebrities they stalk but to the public at large if they happen to get in their way.” The following are quotes from the text of the new law: “The Legislature finds and declares all of the following: • Individuals and their families have been harassed and endangered by being persistently followed or chased in a manner that puts them in a reasonable fear of bodily injury, and in danger of serious bodily injury or even death, by photographers, videographers, and audio recorders attempting to capture images or other reproductions of their private lives for commercial purposes. • The legitimate privacy interests of individuals and their families have been violated by photographers, videographers, and audio recorders who physically trespass in order to capture images or other reproductions of their private lives for commercial purposes… Such harassment and trespass threaten not only professional public persons and their families, but also private
26 : : Circuit
persons and families for whom personal tragedies or circumstances beyond their control create media interest. • There is no right, under the United States Constitution or the California Constitution, to persistently follow or chase another in a manner that creates a reasonable fear of bodily injury, to trespass, or to constructively trespass through the use of intrusive visual or auditory enhancement devices. • The right to privacy and respect for private lives of individuals and their families must be balanced against the right of the media to gather and report news. The right of a free press to report details of an individual’s private life must be weighed against the rights of the individual to enjoy liberty and privacy.”
O
pponents of the bill say that it violates the First Amendment to the United States Constitution. However, the law does not target the content of free speech; rather, it targets the conduct used to gather information when performed in an illegal manner. This law is certainly a positive step in curtailing the illegal and intrusive activities of the paparazzi. One that with positive support might lead other States and indeed Nations to enact similar legislation. The drafting of legislation, or establishing legal precedent as to a persons legal right to where their likeness can be used is the most effective way to curtail the power of the paparazzi. This already exists in commercial law where the right to use someone’s likeness for commercial purpose must be granted by that individual. Tabloids only publish photo’s of famous individuals in their magazines so they can sell them for monetary gain so commercial law should be applicable. Legislation needs to ensure that: • No photos or videos of children should be taken or broadcasted without the written consent of the parent. • No photos or videos of individuals clearly participating in a non-newsworthy private matter such as a vacation, exercise, eating, at school, at home, at a funeral or wedding should be taken or broadcast without the
ther methods that could be implemented to bring the paparazzi under control include forcing them to be licensed by reputable agencies with uniform standards and Codes of Conduct in the State or Country they are operating in. The Code of Conduct should be enforceable by law or a public entity. To be accredited would entail having a background check to ensure no serious criminal convictions, proof of proper legal documentation and insurance to cover public liability. They should also have to wear official accreditation/licence while working and provide such identification to any member of the public when requested and all vehicle’s they are in while working must have number plates attached. Ironically, providing services that protect famous individuals from aggressive media intrusions and protecting them from the pathologically fixated individuals whose fantasies are fuelled by their products, is a major source of revenue for those of us in the private protection sector. With that said, many an encounter with the paparazzi,-- and the actions taken from security personnel to shield the VIP has resulted in even more negative attention being produced for said celebrity. A YouTube search for “… versus paparazzi” will yield you a laundry list of videos, with over half of them involving close protection staff who often use approaches that, were they off camera, might just be a control tactic, but under the harsh glare of the photo lens or edited down to a 20 second clip make the bodyguard look thuggish and unprofessional. Bad press and public perception aside, what happens when the protection agent has committed all his resources to “paparazzi watch” on behalf of his client, when our mandate should be protection of the client from any and all threats? Does that narrow our focus so much that at the moment of truth our attention is on a money hungry cameraman that we miss the knife of the assailant in the crowd? One hopes the answer is no, but unfortunately the current state of affairs the likelihood of that increases exponentially. In the end, security professionals have a duty of care for our clients and in a broader sense, the public. Advocating restrictions being placed on the way the paparazzi industry operates to ensure public safety and a more civilised society helps strengthen our circle of client protection
Circuit :: ShopTalk
THE IMPORTANCE OF BODYGUARD ASSOCIATIONS I have read many blogs on the internet in relation to the question.....
Bodyguard Associations, what are they good for? by KARL THORNTON
I
find the main reasoning for this question is based on the option of being self imposed as opposed to being mandatory. As we know these Associations are not mandatory, you do not have to be a member of a particular Association to work in our industry, and or to gain employment and or further your professional development. So why join an Association and pay out an annual fee to simply receive a certificate with your name on it, and maybe a nice little tie clip or pin. Also why should you join an Association just to chat on an online blog, or be able to communicate with other professionals? I myself am a member of the BBA (British Bodyguard Association) and of ASIS the largest International organization advancing the security professional worldwide. ASIS International is the pre-eminent organization for security professionals. Now there are two main reasons why I joined these Associations, and it had nothing to do with a mandatory requirement. I am gainfully employed and successful in one of Australia’s elite bodyguard companies 538 Pty Ltd, I provide executive protection services to some of Australia’s top executives for some of Australia’s top companies, as well as other high profile individuals within the entertainment industry and corporate environment. I had achieved this position well before I joined these Associations.
T
he first reason for joining an Association is simple NETWORKING. The world is closing in, and unlike many years ago before the internet, networking was a painstaking and laborious task of network meetings that you had to physically attend. Not just locally but nationally and sometimes internationally. The expense of networking had to be part of the company’s budget, as it was an expense you had to budget for.
These days you can join an Association online and the open doors to networking become overwhelming. You have knowledge, experience, and like minded professionals from all backgrounds and experience to share and evolve with. Not only that these professionals are located all over the world, so sub-contracting, and searching for information in relation to assignment research and or mission critical data, can be assessed and researched via your office computer.
T
he second reason is simple. As a CPO, I am not trying to promote my professional identity and qualifications in relation to my own self endorsement. By this I mean. I don’t pay my own salary, my company does, and where do you think they get their money from, THE CLIENT. The reality is, when talking bodyguard services, the client will undertake due diligence, especially at the elite level where we are talking big dollars for professional services. Your clients will want to see some professional endorsement and or professional Association other than your CV of experience and training qualifications. Yes they will want to make sure you are licensed and qualified, however they will also want to see some industry connection as this builds security in their minds. It doesn’t matter if the Association is backed by Government and or mandatory via legislation. It matters that you are proving your personal and or company’s commitment to the profession. The last point I would like to make is that of the; WHAT ASSOCIATION? Well this is choice. Some Associations will only let you join if you complete a course of theirs whereas others don’t. Now personally I don’t believe that you should have to necessarily spend hundreds of dollars and complete a training course before you can join an Association. Your membership should be based on professional criteria
such as qualifications, experience, licensing etc. Even with an additional reference approach where you need to be able to submit references in relation to you your personal attributes and professionalism. I am a member of the BBA as it is a great Association for networking and is a great resource for information and knowledge. It is reasonable cost wise, and is trying to develop awareness of the industry. With services such as the BBA Circuit Magazine, and the online forum, there is plenty of independent information available. I am also a member of ASIS, once again this is an excellent Association that has many resources and the opportunity once again for professional networking.
Associations are of personal choice. I have just re-signed for another year with the BBA, and can see no reason why my membership will not continue. My advice is to research the Association you wish to join, research online blogs and related information on the different Associations, and above all else, take into consideration why you are joining the Association. Yes it is great to feel you have a professional belonging to a professional organization. However, at the end of the day, unless you are offering your services free of charge because of the love of bodyguard work, being recognized as being associated (a member) with an Association will help your professional growth and development, as your clients will have the added peace of mind knowing you are a professional. Karl is Executive Protection Specialist 538 Pty Ltd The Elite Australian Bodyguard Company
Circuit : : 27
Circuit :: TechTalk
SO, YOU WANT TO BE A
PENETRATION TESTER... pt3
::Application Testing
The third in a series of 6 articles that will give you an introduction to corporate penetration testing
by KEITH LOOSE
Whatis.com Definition: Penetration testing “Penetration testing is the security-oriented probing of a computer system or network to seek out vulnerabilities that an attacker could exploit.”
T
he second logical step, the applications and systems running on the infrastructure, this article will show you just some of the techniques that can be used to manipulate applications in ways that the original developers didn’t intend – we will look at real world examples from a simple publicly facing website, a “internal only” intranet website and a complex payroll system.
Our initial attempt to access the site is un-successful in that it correctly prompts me for a username / password… it is very common of people to use the same password all over the place, let’s try using djones and youcanthackme (the password we recovered using John the Ripper in article 2. What do you know, we are in…
Welcome to the third installment in our penetration series. In this article we will leverage the position that we have gained during our infrastructure test, performing further deeper attacks against the targets that we have identified, using our ever increasing knowledge of Hacme network architecture and some of the usernames and passwords we’ve managed to pick up along the way. It’s worth pointing out at this point that although the first 5 articles in this series is describing a factitious penetration test, the details are actually modified sequences of events I’ve gleamed from reallife jobs I’ve been on. Also worthy of note is that by now you should be starting to realize that a good pentester like any member of the security sector needs a suitable toolkit for the job at hand. In articles 1 & 2 we used xx unique tools and this article alone will you to introduce XX new tools, thankfully most can be carried around on a modern pen drive but later in the series more specialist equipment will be used that will really stand apart from the scripts and programs used. So, we are currently straddling the red/amber zones of Hacmes DMZ and have identified our next likely candidates on our journey through the network, we shall start by simply firing up a web browser and looking at the web servers that have taken our interest to see what page they hold... any shrewd reader will realize that we don’t have direct access to the network we’ve broken into, so it would be impossible to directly view these pages and perform most of the tasks that I’m planning in this article, yes you are right but I’m exercising a bit of creative license and skipping the step where I create a SSL tunnel to forward ports into and out of our new home as this will be covered in great detail in article 6 (and what a way to guarantee repeat readers eh? :o) )
28 : : Circuit
This is a pretty common occurrence at most medium-large size companies, an internal website that contains company directories, health and safety policies, nominate fellow employees for the ‘deal of the month’; as you might imagine it will contain a wealth of information and this can be used to map out a tree of people, match them to departments/job roles usually along with valid email addresses, telephone numbers and more often than not partial schedules as holiday calendars are commonly shared on this type of internal website. In the past company intranets have been a wealth of unexpected information, from complete details of deals in the pipeline (sometimes with handily attached presentations and financials) to classifieds sections that list peoples personal mobile numbers, home addresses and give a strong indication to their
Circuit :: TechTalk hobbies, likes and interests – all of which are invaluable resources to the penetration tester, corporate spy and hobbyist hacker alike… All this information gets filed away into our Hacme dossier, particularly noting down the details of key employees within the company. Personally I like to index everything I collect so I’ve written a small string based tokenizer that I can feed web pages such as this to create offline, searchable databases of information so I can quickly look it up as/when needed, but that’s a whole different discussion itself – for the programmers amongst you google “lucene” and you’ll see the foundations of my search toolkit!
SELECT username, password from USERS where username = ‘%’ and status = ‘ENABLED’; After inserting the ; the statement ends directly after the ; which causes the code to throw a exception (read: an error).That’s all well and good, we’ve found out that the application is vulnerable to attacks, but how about something slightly more useful…
Looking around the homepage of the intranet site, we can see links to a HR application, again this is very common in medium to large companies, HR systems can be complicated to use so many of the features are exposed to end users to reduce the workload on the HR department – computers after all are here to make such things easier for us – its common for such systems to be used for filing timesheets, submitting expense claims, booking annual leave etc etc – anything you can imagine going on in a HR department really. We know from the last article that the HR system seems to have been built around a oracle database (remember we saw TCP port 1521 open) , it’s about time to see if the web front end simply (read: blindly) passes commands back to the database for evaluation… in hacker circles this is called a SQL Injection attack. SQL injects are very simple by nature, but you need to understand SQL (Structured Query Language – the ‘standard’ language used to build, manage and manipulate databases) to really exploit the power of such things and I shall assume a basic level of SQL knowledge for this article. The attack part of the SQL injection attack comes into play by simple oversight of coders, lets first of all go to the HR page and begin our prodding the system to see what happens….This ‘prodding’ is commonly referred to a ‘fuzzing’ passing in random inputs to see what happens.
Ah, so the HR system has a different authentication scheme to the main intranet site, again common – after all, it’s such an important resource it deserves an extra layer of security – also notice that the URL in the address bar has changed to hr-1.hacme.com giving the impression the web application we are currently accessing is on a separate server.
which creates the following statement SELECT username, password from USERS where username = ‘%’; INSERT into USERS (username, password) VALUES (‘thebigbadwolf’, ‘password123123123’); --%’ and status = ‘ENABLED’; Wooah, a bit of a difference; the SQL savvy amongst you will have noticed that I’ve just inserted an account into the USERS table, the – command was added to the end of our malicious command as in SQL this means ‘ignore everything following this command’ and will ensure our statement is valid. Lets check that we can login to the application
Before I move into some of the descriptions, lets go-ahead and enter a single apostrophe into the username field of the login box and press enter. What will such a simple step accomplish?
oooh, lots of information – we can tell from this output, what database the application is running on, it’s hinting towards the structure of the database (we can see actual table and column names that will come in handy later on) but more importantly, this error has told us that the application is vulnerable to SQL Injection attacks – why? Because the benign little ; symbol we inserted means ‘End of command’. The text box is setup to build a query from its input, the developers expect people to only put usernames into this field, and the username would work its way through the code and end up in a SQL statement like this:
So now we’ve gotten into the HR application with a user we’ve created and not done any damage… it’s worth noting a couple of things at this point, while these examples might seem a little over simplistic if you know anything about application design, they are based upon real-world experience (and a tiny bit of paraphrasing to make the article fit within the desired number of pages!!), second while we chose to insert a record into our target database if you know
Circuit : : 29
Circuit :: TechTalk what you are doing (and the application has been deployed with little separation of responsibilities, you could insert commands telling the database to delete all rows, change everyone’s passwords or even shut itself down. The key to application penetration testing (in this example Black Box penetration testing) is (buzzword alert) ‘thinking outside of the box’ – you’ve got to start to think about the what if’s and be prepared to sit and in some cases site and perform monotonous operations over and over and over, particularly when fuzzing an application or infrastructure for the first time (as your experience grows you start to see very common patterns & designs – ironically the bad ones are when developers don’t follow defined ‘design patterns’, but that’s a different article.) What have we learned up to this point? We the HR application is vulnerable to SQL injection via the login screen – certainly not good, we’ve managed to create a user within the HR system as successfully login – although the information we currently have access to seems very limited, so we should start to prod a little deeper. The next logical step would be to review the source code from the page, I’ve seen before developers leaving comments around the code that help a lot when developing applications but tend to leak unsuspectingly useful information out to attackers – things like:
for applications and websites alike. Now, the existence of the cookie isn’t the security hole, it’s how they are used. Many of the high-end SSO (Single Sign On) systems use them extensively to pass around usernames & tokens telling systems that the user has been authenticated already, while this might sound insecure – the tokens are usually hashes that have been encoded with algorithms such as MD5 or SHA-1 and while neither of these are totally fool proof, the amount of time that it would take someone to reverse engineer the hash is usually considerable shorter than the lifespan of the token. Now, in the IT world there are exceptions to every rule and this is true with MD5 and SHA-1 hashes… I’ve seen (and helped program) some FPGA and GPU based systems that have the ability to crack such hashes in a very reduced amount of time, but the difficulty in implementing such an attack means only the most motivated attackers would use such methods and if you’ve got a real pro looking at your system weak hashes will be the least of you worries! Ok, enough explanation – lets get back to it and see how we can manipulate the cookies for our own benefit. You can use any browser to view cookies, but to actually work with them we need to grab another common tool from the pentesters kit bag, an in-line proxy. A proxy is a piece of software that sits between your web browser and the target website that all traffic runs through, it gives you the ability to ‘trap’ requests and responses (you’ll see that the latter is far more important to the tester) and manipulate them if required. My personal favorite is Paros Proxy and we will use it here to sit in between the browser and server, adjusting the traffic as it flies our responses back, modify them and finally submit the changed response to the target server. If you just want to review the source code in an efficient manner or just view the responses and requests there is a plug-in for the popular browser (and the only one you’ll see a real pentester using!) called Firebug, this is used mainly by web developers but is a very flexible tool with a myriad or uses. Installing and setting up Paros is very simple, being written in Java it is pretty much cross-platform and there are packages available for both windows and Unix which covers most platforms (including MacOS X – this is based on a Unix kernel). Once it is installed and running it is simply a case of pointing your browser to the locally running proxy and off you go!
We can see here the developers setup a little short cut for logging on as different users without using the login box, this coupled with at the ability to perform searches (via SQL injection) against the database we could probably get a list of all the usernames in the database and start logging in one at a time to see what information is available. Again, this might seem very contrived but this example has been taken directly from a job I recently worked on… the developers presumed that as the page (and it’s source code) was protected by the ‘secure’ login process (which admittedly was more secure than the example above) it would be ok… For the sake of entertainment and keeping our true hacker hat on we’ll ignore the ability to login as any user once we know the username and look for another way in… you’ll find many developers, hackers and analysts will spend a lot of time working at being lazy; and falling into that demographic so shall we, lets start to play around with cookies… Cookies are very interesting from a number of perspectives, you’ll commonly hear about them in the press as the evil things that ad companies use to track your progress around websites, which is true, After going to the trap tab and selecting ‘Trap Request’ every request but they are more commonly used to store authentication information back from the site will be stopped before it hits your browser, the
30 : : Circuit
Circuit :: TechTalk same applies with the more interesting ‘Trap response’ – you will be able to manipulate responses that are heading their way back to the server for processing.
And here is the script being run to match the bigbadwolf hash
After trapping a request from the HR application we can see a few things…
The script has picked up the fact that the hash is a BASE64 encoded hash, the good news about this (for us) is that it is very easy to decode BASE64, so lets see whats inside the ROLES item of the cookie…
1. JSESSIONID=71330566EFCA5A774D5014B2BFAE7FFA – this is the ID of our session on the server, the main attack vector here is session hijacking, what would be possible if we could work out the session ID for a genuine user on the server? 2. USERNAME=dGhlYmlnYmFkd29sZg== - pretty self explanatory, but if we could work out how to decode the HASH value we can start to set our own 3. PASSWORD=cGFzc3dvcmQxMjMxMjMxMjM= - again, pretty much what is says on the tin. 4. ROLES=VXNlcg== - depending on what is inside this value we perhaps perform a privilege escalation attack 5. First up we need to reverse engineer the hash to see what’s inside those cookie values, we already know our user name so we will used this know value, compute a hash using all the common algorithms and see if we get a match. Below is the script I used to do this, written in perl it will run just as easily on Windows or Unix. #!/usr/bin/perl use Digest::MD5 qw(md5_hex); use Digest::SHA qw(sha1_hex hmac_sha1_hex sha256_hex); # use Math::Base32; use MIME::Base64; $ToHash = $ARGV[0]; $ToMatch = $ARGV[1]; print “Creating hashes for $ToHash \n”; my %hashes = ( “md5”, md5_hex($ToHash), “sha1”, sha1_hex($ToHash), “sha1HMAC”, hmac_sha1_hex($ToHash), “sha256”, sha256_hex($ToHash), “base64”, encode_base64($ToHash)); foreach my $hash (keys %hashes) { my $currentHash = $hashes{$hash}; chomp($currentHash); print “$hash = \”$currentHash\” \n”; if ($currentHash eq $ToMatch) { print $hash . “ matches \n”; } }
mactasic-pro:hacme$ ./create_hashes.pl thebigbadwolf dGhlYmlnYmFkd29sZg== Creating hashes for thebigbadwolf sha1HMAC = "173eee8a1d81fe1fd15a9d4ca78cb5bb650b1513" sha1 = "c340543627f4cd2f3d6fa240be9b4464e24dc0a6" base64 = "dGhlYmlnYmFkd29sZg==" base64 matches sha256 = "f166c30308bf9aff761768c863e2cf37c562aaf723da47628c2b1c0733fb423b" md5 = "0e72b5f362e0831b7c3764343240ce3f"
JSESSIONID=71330566EFCA5A774D5014B2BFAE7FFA; USERNAME=dGhlYmlnYmFkd29sZg==; PASSWORD=cGFzc3dvcmQ xMjMxMjMxMjM=; ROLES=QWRtaW4=; ah, so we can see that the ROLES parameter seems pretty simple, if as default we get given the role User, it would be logical that there is an Administrator, Admin or HR Admin role that has more powerful rights in the system, this is where the trap response feature of paros becomes very handy… enable it and we’ll refresh the page, when it traps the response we can simply replace the ROLES key with a base64 encoded version of Administrator (and if that doesn’t work, Admin then HR Admin etc until you get a hit!) Upon success we can see that we have access to a lot more than we should… now it’s time to get the dossier back out and get adding pages!
In this article I’ve shown a number of ways that applications can be manipulated in ways the original developers of the application did not envisage which is a important concept to take away from this brief introduction to application penetration testing, we have covered the 3 common ways an attacker will attempt to manipulate data going back and forth and as you probably realise the method used depends a lot on how the site/application that is being attacked has been written.
Next time round we’ll take a look at access control systems the kind of “site visits” you may make as a pentester including a look at a technique called lock bumping.
Circuit : : 31
Circuit :: ShopTalk
W
e are living in a world where people are more ready than ever to sue firms or other individuals in their professional capacity. We see this on an everyday basis with the claims we deal with for our Manned Guarding companies, Door Supervisors and more recently, the Close Protection officers we insure. It ranges from alleged negligence against Manned Guarding companies for a theft that has occurred, to Door Supervision companies whose employees are alleged to have caused injuries to individuals, and with Close Protection officers who are asked to carry out very dangerous work in pressurised situations and yet could still face prosecution for negligent acts.
David Ottewill, FCII, FPC is the Managing Director of Camberford Law PLC and can be reached on: 020 8315 5000
T
he readiness of people to actually pursue actions has not only greatly increased but also apparently the willingness of Courts to provide compensation wherever possible. In addition to the costs of Solicitors, Barristers, and also the awards made by Courts continually mean that there is price inflation in the compensation awards that are made. Against this rather bleak background it is even more necessary for Close Protection companies and individuals to adequately insure themselves for their acts, errors, or omissions which can cause injury or property damage/loss. For Close Protection companies based in the UK it is a legal requirement for any of their officers to be insured under an Employers’ Liability policy. This will usually provide £10million level of cover, although in certain situations off-shore this may reduce to £2million or £5million. Failure to insure for risks to employees is a criminal offence with fines and a possible imprisonment. It is usual for such companies to provide some life assurance whether that is under a group life policy or alternatively within the benefits provided under a good personal accident policy. There is very often an advantage to
32 : : Circuit
Protection for The Close Protection Officer
providing a personal accident policy for your Close Protection officers as it can deter a claim being pursued under the Employers’ Liability policy should an officer become injured and temporarily or permanently disabled.
In addition to this, companies and/or individuals should also provide Public Liability cover so that any actions, errors, or omissions they take that cause injury or property damage is covered. Levels of cover can be tailored to the requirements of any particular contract. It is important to remember that if a company does not insure through any of the above, then it is very much open to difficulties should a claim arise and its cashflow will be adversely affected and has, in certain situations, lead to the business having to close down. We would, therefore, regard it as imperative that these liability covers are taken out which are, of course, allowable as a business expense within any accounts you have to prepare. In the last few months we have been involved in placing insurances for all the above for Close Protection companies, individuals, military training organisations, diplomat and executive protection, and film crew security protection personnel. We also insure many Close Protection officers
and companies in Iraq and Afghanistan at present. The coverage that these companies take out actually varies greatly in terms of the limits of indemnity provided and the coverage afforded. Our Underwriters are keen to underwrite many different types of organisations and activities within high risk areas. Failure to have these types of insurances in place could itself be regarded as negligent, with individual directors not being able to hide behind any company structure, they could well be held liable personally. This change itself has been brought about by various recent Companies Acts and has seen growth and development of Directors & Officers insurances which we can also provide! However, we do believe it is vital for any organisation to have relevant insurances given the current compensation culture in which we live. We believe this trend will in actual fact continue and the risks of not insuring are too great. With possible disastrous consequences, sensible planning is a necessity. In other words, don’t be negligent with your insurances.
Circuit :: Feature
Keeping Your Edge Having an Exit Strategy
You’re a security professional; you’ve worked with the same client for 6 years now. He treats you well, making sure that you’re agreed upon wage is paid on time and that his requests are “reasonably” within your job description. While demanding, your routine is pretty standard, even allowing you to get home to see your family most nights before bedtime. For all intents and purposes, it’s a dream job. One you’re lucky to have, and one you’re quite certain your industry peers are maybe even a tad bit jealous of.
Y
ou take pride in your work, and like a true professional, you know that the devil is in the details: You do everything right, from advance work, to driving, to taking a small sense of pride that you’ve never once stepped on the back of your Principal’s heel while moving through a crowd. However, last night something tragic happened: This 52-year-old man of reasonably moderate health laid down for the evening and never woke back up. Cause of death: heart attack. And just like that, your life has changed. Not to be insensitive, but dead clients don’t need bodyguards. The sense of mourning and loss aside, the grim reality is that in the space of a heartbeat, and through no fault of your own, you’ve just found yourself unemployed. What do we as security professionals do when something happens to our client that is beyond our control? While an extreme example, scenarios like this do occur, literally pulling the rug out from under the protective agents feet. While some of us, based off of the client type and contractual agreement, may have a safety net in place, many of us are faced
with the stark reality of being unemployed and having to reenter a very competitive job market. To prevent situations like this, I try to recommend to any that care to listen, that Security Professionals, like stocks traders, diversified their portfolio by having an exit strategy. Now that doesn’t mean engaging in a continuous scramble for new clients and then try to figure out some algebra like equation to work all the assignments personally and simultaneously. Many times a philosophy like that quickly becomes apparent to your #1 client, who could take offense. But what I would say is that having other potential clients who are aware of your services BEFORE you need them as a source of revenue, is a prudent measure to take, especially given the current economic times. I also firmly believe that individuals are savvier with marketing, job hunting and interviewing when they DON’T need a job. Fact of the matter is, there’s an added pressure (read: desperation) when the monthly rent is fast approaching and you don’t have guaranteed work to pay the bills. Without the weight of immediately
J
ELI AH SH AW needing a job on your shoulders, one thinks of themselves more as a valued commodity as opposed to a needy applicant, and it subtly comes across to the potential client or employer.
Even the best clients in the world might have a change of fortune, or of personal taste. And while you may feel secure in your position today, who knows what tomorrow might bring. Our industry is filled with Operators who have horror stories of how a new spouse or business manager suddenly convinced a long time client he or she no longer needed security. It’s a bitter pill to swallow, and one that might feel like a slap in the face, given the long, often thankless hours and self-sacrifice we make to ensure others wellbeing, but it happens.
The wise will have already established relationships with people who, while perhaps not needing security services themselves, recognize the good work you do and would hire (or recommend you) if the right opportunity came up. Get enough people like this in your corner, and heaven forbid a day occurs like the scenario above, you won’t be stuck having all of your eggs in one basket. So yes, client loyalty is very important, but please don’t forget Close Protection is a business and like any other profession you want to think long term. Thinking tactically doesn’t just mean knowing the safest route or floor plan, it also means preparing for your future so that today’s top Protection Agent isn’t tomorrow’s restaurant dishwasher. Elijah Shaw is the CEO of Icon Services Corporation and The National Director of the North American Bodyguard Association
Circuit : : 33
Circuit :: ShopTalk
ROUGH JUSTICE Juvenile Injustice in Afghanistan
by
KIMBERLEY CY. MOTLEY, ESQ
34 : : Circuit
T
hree males kidnap a 14 year-old girl as an act of revenge against her family since her father refused her hand in marriage to one of her 30 year-old male captures. For three days the girl is repeatedly raped and abused. Finally, after being released, she goes back to her family - shamed - and is subsequently arrested and charged with kidnapping of herself and adultery while the men who have kidnapped
Aside from the volatile security situation in Afghanistan, the Afghan justice system particularly for juveniles remains relatively unnoticed. her are never prosecuted nor arrested. In court, the 14 year old is denied her right to allocution; she has no attorney, and based on her limited education is not even aware of her constitutional right to have an attorney according to Article 31 of the Afghan Constitution. Ultimately in court, absent any witnesses who could testify for or against the juvenile, she is convicted and sentenced to two years imprisonment.
Circuit :: ShopTalk
A
teenage girl who ran away from home due to sexual abuse stops a 16 year-old boy. The boy goes to his family to ask their permission to provide housing to the runaway and she stays with his family for a few days. On the fourth day, the boy is instructed by his family to take the young girl to a local women’s shelter anticipating that they will be able to help her. Instead, the 16 year-old boy is arrested, charged, and convicted for adulterydespite the fact that the girl testifies to his innocence. After being arrested, the illiterate teenage boy is beaten and physically forced to thumbprint a written confession authored by Afghan police. Going to court the boy is forced to represent himself in silence after the court refuses to hear him speak. He is told by a panel of three Juvenile Judges that while the court believes that he is innocent that they rewarding him by only giving him two years imprisonment and that it is up to the Appellate Court , the upper court, to overturn the sentence that they just imposed upon him. These are but a few of the tragic stories that plague Afghanistan’s children who find themselves trapped within the juvenile justice system. Afghanistan’s detention centers and courts are replete with juveniles who are charged and convicted of crimesoften erroneously - while their civil liberties go virtually ignored and unchallenged. For many, their convictions are upheld due to little to no tangible or intangible evidence, lack of witness testimony, absence of a defense attorney to represent their interests, and minus their right to even put forth their own defense. With little International support, the juvenile justice system has little hopes for improvement. Pursuant to Afghanistan’s Constitution Article 22 it states that men and women have equal rights before the law. Despite this fact, girls are routinely prosecuted for moral crimes at a much higher rate then boys such as running away from home and adultery-both crimes which do not fall under the codified laws, but whose prosecution is justified based on customary law. In
addition to this, the vast majority of girls are uneducated and illiterate. Many are married to men twice their age and a good percentage are young mothers. Prior to their stay at the detention centers many of the girls recount details of being forced to beg in the streets by day, and being beaten at home by their husbands at night. For the most part, girls are being represented in court, however, more often then not the girls do not invoke their right to testify most likely because of the subservient position that they are culturally accustomed to having. Prior to court the boys tell consistent stories of being beaten and solicited for bribes by police. The boys routinely show off their marks to prove the price that was paid to “confess” to the crimes they are charged with. Despite the fact that illiteracy runs high, many court files hold written confessions that bear the thumbprint of the juvenile but authored by law enforcement. These confessions, coerced or not, are often used as an iron fist to justify convictions In a survey recently conducted, several
Afghan judges openly admitted to not allowing juveniles their right to allocution. One juvenile judge proudly reported that out of her eight years as a sitting judge in Afghanistan that not one juvenile has maintained their innocence throughout a trial in her court. She stated that when kids come to her court she instructs them not to lie for if they do they will be severely punished, admit to what crime they have committed and they shall receive a lenient sentence. The judge further states that although some of the children in the beginning of the proceeding proclaim their innocence, after this speech most indicate that they are guilty. The judge interprets that this speech is necessary because children lie all the time and should not be trusted. Walking into the dungeons of the detention centers I stare into the faces of what is
supposed to be the future of Afghanistan. According to Article 12 of Afghanistan’s Juvenile Code, detention centers are supposed to provide social, educational, vocational, psychological, and health services. Although most of the juveniles are expected to be released from prison, lack of funding and resources does little to prepare them for reentry back into society. In the more upscale detention centers, juveniles, if they are lucky, are given at most forty-five minutes outside per day where they can basically stand around or sit around with one another. Many judges have reported that despite the fact that juveniles are supposed to be allotted 75 Afghanis or $1.25 USD per day for meals they ultimately get about .60 cents in USD per day which virtually eliminates fruits, vegetables, and meat from their diets. Also within the centers, juveniles often serve as prison guards to other children who are also incarcerated. As guards, these children are used to orient newcomers into the facility, they are given the authority to do searches of other kids and rooms, and in some occasions are even given the authority to determine punishments for misbehaving children. With overcrowded bedrooms that often have more juveniles then beds allotted and little to no heat, the dismal environment offers anything but a rehabilitative atmosphere. Overall Afghanistan’s juvenile justice system is not just broken, but it is a catastrophic disaster that arguably causes more harm then good to juveniles and Afghan society as a whole Kimberley Cy. Motley, Esq. is a defense attorney from the U.S. who has been working on civil rights and legal rights issues in Afghanistan for over a year. She serves as an International Justice Consultant to Afghanistan Legal and Social Services Organization (A-LSSO). For more information please feel free to email her at kim.motley.esq@gmail.com.
Circuit : : 35
Circuit :: ShopTalk
|||||||||EYE-HAND |||||||||||||||||||||||||||||||||||| COORDINATION
by
KARL THORNTON
W
hen I talk about eye hand coordination, I am not talking simple about the control of eye movement and the processing of visual input to guide bodily movement, and or the total amount of coordination a person has between their eyes and their hands; a person’s dexterity in activities highly dependent upon sight. I am talking about the ever increasing incidences of attack from hostile individuals that related to guns, knives, shards of glass, pepper spray, and other weapons. It has become an era where the hand is not only quicker than the eye but more devious and dangerous. There is a heightened need to have the ability to respond to visual stimulus with a designated set of hand movements when an attack is underway, but also to be able to assess and process potential threats based on hand movements, gestures, and positioning. I know this doesn’t sound easy, and I never said it was. We cannot always predict a threat and its delivery based on assumptions. However, we can train our eyes to visually register and prepare delivery scenarios, and techniques to deliver effective personal protection to redirect, control, and or neutralize the impact. In this example of eye hand coordination I am not only talking about your eye hand coordination, I am talking about your eyes and your possible attackers hand coordination. As a bodyguard, it is even more important these days to train your eyes to detect abnormal behavior, or actions that warrant observation relating to the hands. The attack can be sudden and devastating. You should learn wrist and arm techniques to lock hands in place. Like locking the hand in the pocket and maintaining directional safety. You need to have directional instincts, by this I mean the ability to guide, deflect, and maneuver
36 : : Circuit
the potential attacker in a way where if he/ she has a concealed weapon, it is more controllable and less likely to be delivered. For example, if the attacker has a handgun under a jacket, and the bodyguard notices abnormal hand movements in the jacket as he/she enters the danger zone, the bodyguard should be able to divert, and or control the potential threat by moving and or restraining the attacker in a way where the weapon is at the furthermost distance from the bodyguard and principal. DO NOT guide the attacker in a way where he/she has a clear shot at the bodyguard and or the principal from under the jacket. It is not like the Hollywood movies, the attacker doesn’t need to hold the firearm in a static standard firing pose before it can be discharged. A handgun can be discharge from under and through the jacket, even through a pocket. As long as there is a finger on a trigger, the projectile can be discharged. This is not to say you can guarantee the firearm will not discharge, but it does give you some control over the direction of the projectile. The same can be said for the sharp edged weapon. Once again as long as there is a hand on the weapon it can be launched. A blade sitting comfortably in the hand with the back or flat edge resting on the forearm, hidden from frontal view, can easily be launched. This technique is used to mimic a punch, where the passing fist produces the sharp edge of the weapon supported by the forearm, to cause major damage as it slashes the victim as it passes. Once again it doesn’t matter if the knife is under the jacket or in the pocket; the weapon can be effectively utilized, by penetrating the jacket of the attacker and into the bodyguard, principal, and or the intended target. Remember the old saying that “The Pen Is Mightier than the Sword”. This is true, a well adapted attacker can, with the right techniques, use a pen as a lethal weapon that can penetrate and cause serious injury and or death.
It is now common place hearing the stories of our crowd controllers, and bodyguards, being faced with the general public having access to illegal, ready to buy on the internet weapons. Those who work for the law, abide by the law, and work within the law. Unfortunately those who work outside the law, use whatever weapon they can, and use it however and whenever they can. I myself have witnessed illegal weapons being carried and or used by untrained and non-licensed individuals for the purposes of illegal activities. Like everything in life there are fashions that come and go, there are phases and waves of different types of crime and social-unrest that pass by. It seems that these days, it is the era of gutless and cowardly attackers. Whether it is suicide bombers, or premeditated gang bashings on single individuals, you need to remember that no matter how big, strong, and well trained you are. The least expected can now be expected. All bodyguards and or crowd controllers should make sure they incorporate visual and observational training in their physical training programs. As the world becomes more violent and desensitized to social morality, by this I mean, no one fights fair anymore, professionals in the security industry need to be alert. They need to have eyes in the back of their heads, mainly because these days many attacks come from that direction. 538 Pty Ltd train their operatives in Advanced Protective Formation strategies, that focus on this need to be visually alert and respond to visual stimulus with techniques and methods for when an attack is underway. But also to be able to assess and process potential threats based on hand movements, gestures, and positioning. If you are new to the bodyguard profession, or are updating your bodyguard skills, make sure the course you apply for deals with today’s environment, and today’s situations. Karl is a Executive Protection Specialist with 538 Pty Ltd, www.538.com.au
Circuit :: ShopTalk
THE HISTORY OF SNIPING by
PT1
Simon Fraser, both officers died that night.
JULES THORN
Although not strictly security related, sniping is I’m sure of interest to most people within the security industry, as there is a heavy balance of ex military out there. With this in mind we were asked if we would accept a 3 part article on the subject starting out with the History of Sniping. Part two of the article will look at sniping in World War One and Two then the article will come to completion with the third instalment talking about modern day sniping. ORIGINS Modern sniping can find its origins amid the tall ships of the 19 hundreds when Marines were stationed aloft in the crow’s nests of ships and directed to pick off officers and gun crews on opposing ships. The most publicized success of this type of sharpshooting was performed by Robert Guillemard a french Marine on board the Redoubtable on October 21 1805. Who fired a shot from his Charleville musket at two British Officers from a distance of around 15 - 20 yards. The heavy lead ball punched through the coat of one of the officers just in front of his epaulet, drove down his trunk and came to rest in the spine of that officer, unfortunately that officer was none other than Britain’s most famous naval Hero Lord Horatio Nelson. THE AMERICAN REVOLUTION Well aimed rifle fire and feildcraft became part of the legend of the colonial victory in the American Revolution. Here German and Swiss craftsmen developed a .45 rifle known as the Kentucky rifle, which had an extreme range of 300 yards (270m) and was deadly accurate to 200yds (180m) and could fire three rounds a minute. Riflemen were organised under people such as Daniel Morgan who deployed his troops in battles such as the battle of Saratoga in October 7, 1177, where one of Morgans men an illiterate Pennsylvanian rifleman Tim Murphy who fired three shots perched in a tree, after his first shot missing he mortally wounded General Burgoyne’s Aide de Camp, Capt Si Francis Clerke at a range of 300yds with his second. His third shot mortally wounded General
The British made several attempts to establish corps of riflemen, however they were all aborted, including one of the most noted attempts being the one by Major Patrick Ferguson who developed the Ferguson flintlock. Ferguson was badly wounded in the elbow by a colonial bullet at Brandywine. THE NAPOLEONIC ERA Due to the lessons of the American Revolution it was the British whose interest in the rifles application formed experimental Rifle units which proved successful and became the 95th Regiment of foot in 1800 more commonly known as the rifle brigade (made popular by the series Sharps Rifles). They were equipped with the Baker rifle which was extremely accurate for its era with an effective range of 400 - 500 yards in favourable conditions. The rifle Brigades use of the Baker rifle was not in the sniper role “Certainly there but used as a skirmisher’s rifle. THE AMERICAN CIVIL WAR The American civil War proved fertile ground for the growth of long range military shooting. Here smoothbore gave way to rifled barrels with weapons such as the Whitworth claiming to kill at 2000 yards (1800m) It also saw the introduction of telescopic sights being fitted to rifles. 14.5inch long low power Davidson telescope mounted on the side of the rifle.
is no hunting like the hunting of a man and those who have hunted armed men long enough and like it never care for anything else”
Ernest Hemingway’ Both sides used troops in a scout sniper type role and although there was no formal training they did show their worth. Even at this early stage it was noted that the only way to silence one of these sharpshooters was by sending another one after him.
THE VICTORIAN ERA Although firearms technology grew in leaps and bounds there was little movement to develop organized sniper training on either sides of the Atlantic. However the British suffered again at the hands of various hidden marksmen to the Boers of South Africa to the hill men of Afghanistan. Rudyard Kipling penned a great deal of verse about British Military campaigns one such verse comments on the economic and military value of sniping to the various indigenous people of the colonies. ‘One sword-knot stolen from the camp will pay for all school expenses of any kurrem valley scamp who knows no words or mood of tenses but, being blessed with perfect sight picks of our messmates left and right’
n
Jo
s
os
M
It is during this era that the term that it’s commonly used nowadays got its origin, when British soldiers based in India took to shooting at a small, fast and very alert bird called ‘The Snipe,’ It took a great deal of skill with the rifle to become a successful ‘Snipe’ hunter. The individuals that showed a particular flair in shooting this bird were dubbed ‘Snipers!’ ::
Circuit
37
Circuit :: ShopTalk
WORKING GIRLS F
Working as a close protection operative or surveillance operator can be a great career especially for females as there are so few of us compared to the males that dominate our world, admittedly when I started nearly 30 years ago on the circuit there were only two of us, now at least thirty of us are licensed operators, but we have to accept we are not equal to our male colleagues in all respects
irstly I object to people thinking we are all raging feminists and probably built like Russian shot-putters, in a recent Marie Claire magazine article sadly titled “Babes with Bullets’ I was quoted as saying we need more females on the circuit, this gave way to me receiving over eight thousand emails from women either wanting to be an operator or telling me what a great role model I was for the feminist cause, yuk yuk and yuk, I do not support feminism but rather equal opportunity, most of the females I know on the circuit are eloquent, smart, and very capable operators, we can drive as well as our male counterparts and work equally as well on a team, but we do not have the physical strength that the guys have. Some male operatives have never worked with a female before, especially those out of the military compared to the Police service where males are used to having female colleagues; I have noticed this on many an occasion and we need to make these guys feel comfortable with us. There is usually only one female operator per team
38 : : Circuit
As for sexual harassment, a lot of it is good natured banter that should not be taken out of context, believe me girls if you are being really sexually harassed then a word with your team leader will usually work.
deployed with eight guys half way round the other side of the world for weeks on end.
On the odd occasion that I have worked with someone new it always amuses me when I hear them on the phone to their wives/girlfriends and refer to me as Jack, thus making the other half think they are with a male. Do these guys honestly believe we are interested in them rather than getting the job done and getting home to our husbands/ partners.
As female operators we can get away with so much more than the guys when on a job. Recently I was working in the USA on a surveillance job, at the car hire counter I was given a car and went to the parking lot to look at it, on inspection I realised it had a foot brake instead of a handbrake, which is no good for night stops when you don’t want your brake lights to be seen, I looked around the cars and found one with a handbrake then went back to the counter and told the guy I didn’t like the car he had given me and could I have the other one, he sneeringly said what’s up don’t like the colour of it, absolutely I replied smiling sweetly but thinking what a twat, needless to say I got the car I wanted with no fuss and him thinking that I was just another ditzy female.
Him at home does not give me a hard time when I go off on a job with a team of guys, he has made it his business to get to know them in a social setting and therefore not worry about me being
So the gist is girls, play to your strengths think before you make a complaint, was he really harassing you or just passing a compliment and guys think before you make that mortal mistake.
I admit to probably giving as good as I get, the guys I work with are good humoured and know where to draw the line, their wives do not worry that I have been deployed with them or even on occasions had to share a room with their dear snoring farting other halves.
Circuit :: ShopTalk Jacquie Davis is Director of protective services at Greymans Inc www.greymans.com
Circuit : : 39
Circuit :: ShopTalk
THE BLACK BOX This aim of this article is to give an overview on tracking technology and some of the terminology used within the industry. As a two part guide it will cover the technology and how it can be used within the security industry. This article does not go into too much technical detail on the technology as this is not always important to the end user. We are Track Clarity, a company dedicated to providing tracking solutions and software for the security industry. The equipment and software we provide is currently used by the UK and other European governments for policing, surveillance, security and asset recovery. We also deal in the private commercial sector with both covert surveillance equipment and loss prevention. We deal heavily in bespoke requirements for our clients. We are writing this article to help everyone understand the industry and how the equipment can be used by the operators in the industry.
Let’s start with the technology There are two types of devices on the market; passive and active trackers. A passive tracker does not transmit its data. It stores its data onto the device which can then be retrieved by physically collecting the data via a computer or other device. An active tracker is a device which not only gets position data and may store it but also transmits this data live to be used and collected elsewhere. Also consider that these devices can send and record a whole range of data from external sensors such as temperature and alarm triggers. For these two articles we will be concentrating on active trackers. Now let’s move onto the types of trackers.
GPS Tracking A gps tracking unit is a device that uses the Global Positioning System to discover the location of a device, This can be used to track assets such as a vehicle, people, or any other asset you would like to track. Normal operation is for the device to collect gps data which can be transmitted to a device (a sms to a phone for example) , or online server (a online based mapping panel for example). This data is transmitted using a cellular link (GPRS),Sms, Radio or satellite connections
Some points to consider • Although all device manufactures will state a device needs clear line of sight to the sky this is often not the case. The device needs to be able to get the gps signals sent from the satellites. This can occur in a covert
40 : : Circuit
installation under a car from gps signal bounce off a road surface, also with a good quality device, they work in headrests, under dashboards and in rear light clusters.
Further points to consider
• Although when you use this service it gives you a centre point and a radius from this point (can be in a variety of shapes depending on device and cell operator) you have to be careful. The device could be right on the border of this area. It does not mean its in the centre!
• Accuracy is varied, it will range from 2.5m up to 50m depending on how good the signal is, the more satellites the device can see and the better the signal strength the better the gps “fix” and the quality of position.
• Its important to pick the right service. Normal services ask the operator where the device is. This will not always be an up to date position and there is a cost every time you perform this task. The way our service works is the device provides the location data, which means there is no cost per ping and the data is time accurate. Very important when there is no gps (it is being blocked for example).
Cellular Tracking
RF tracking
This is getting the “cellular based location” from a device which is on the gsm (phone)
This is Radio frequency tracking. There are many varieties of this but we will only cover the most common in regards to asset recovery. Typically it emits a pulse which you can find using radio direction finding equipment. Commonly on 433 MHz although some of the smarter devices allow you to change the frequency to prevent problems from other devices which use this frequency.
network. This is archived by the network operator or 3rd party processing the cell tower information to which the device is connected and calculating its position with this information. The accuracy of this varies widely. In one of the systems we prove to clients we can achieve sub 50m in London, however ranges of 300-1500m radius of accuracy is more common.
Other points to consider • Direction finding is a skill set which needs to be learnt. There are some courses in the UK and around the world which will teach this. If you are looking to recover assets using RF tracking you must learn this skill set. • This works very well in recovery of assets because even with no gps lock you will have the last cell position and be able to detect this signal though a very small gap in concrete. That brings us to the end of the first article. The next article will cover mapping options and explain about the difference between using these devices for covert and asset tracking. We will also specifically cover must have features on tracking devices and software. Track Clarity Limited info@trackclarity.co.uk www.trackclarity.co.uk
Circuit :: ShopTalk
AN HONORARY MEMBER FROM ACROSS THE POND
W
ilson Graham from the U.K’s Northern Ireland Chapter of the British Bodyguard Association presenting Mr Scott Monico from Goodman Inc. Protective Services, Beverly Hills, California U.S.A. with his prestigious Certificate welcoming him as a member of the British Bodyguard Association and increasing the U.S.A. chapter.
EXPO 2010
Whilst on contract in Belfast of the Muldiss Darton Production of YOUR HIGHNESS both Wilson and his business partner Mr Tom Bryans from DF Risk Management Solutions N.I where introduced to Mr Scott Monico from Goodman inc. Protective Services in Beverly Hills. U.S.A. Scott was on a Close Protection role looking after an A list American Actress.
14-15 April 2010 | National Hall, Olympia
Countering the Global Threat
Dedicated exhibition for companies of specialist security and counter terrorism technologies and solutions High level conference featuring multiple streams Comprehensive programme of free-to-attend technology and practical workshops Networking Functions
PRE-REGISTRATION ENTRANCE ONLY, ATTENDEES WILL NOT BE PERMITTED TO REGISTER ON-SITE
For more information on exhibiting, visiting or attending the conference please contact: Nicola Greenaway Tel: + 44 (0) 208 542 9090 or email: ngreenaway@niche-events.com Headline Sponsor
Working on the same contract for three months it became very clear that Scott had considerable experience as a close protection operative and his long standing career as a law enforcement officer became evident with both his integrity and his professionalism of which he displayed not only to his principal but to all of those around him. As witness to this gentleman’s truly professional manner both Tom and I recommended that he be given the Honor of becoming a member of the British Bodyguard Association. On the day of his presentation he had this to say “It is a total honor to be accepted into the organisation and hopes this will continue to strengthen the bond of the brotherhood across the pond, I also wish to thank all concerned with the BBA and extend my good wishes for its continued success for the future, with a big thank you to Wilson and Tom for their acknowledgement in this very honorable act of true Brotherhood.” Now that this contract has come to and end Mr Scott Monico can be assured that his association with the BBA and our friendship with the Brotherhood worldwide will never end. Good luck Scott till we meet again Stay Safe.
R e g i s te r n ow at w w w. co u nt e r t e r ro rex p o. co m
CTX Ad 203x133 Oct09.indd 1
29/10/09 18:17:05
Wilson Graham DF Risk Management Solutions N.I.
Circuit : : 41
Circuit :: BoyZone
GET YOUR KIT ON
We a look at some of the essential and not so essential tools of the trade so that you don’t have to, gadgets, games, movies and ‘simply must-haves’.
Sony EV1-D70P Price: circa : £650 GBP/$950 USD
T
his is the successor to what was the industry leading EV1-D31. The D70 combines a high quality ¼ type EX view HAD™ CCD colour camera with the flexibility of a remote pan/tilt/zoom [PTZ] operation, all in a compact and easy-to-use package. Compared to its predecessor, the superior EVI-D70 camera incorporates a wider pan/ tilt range with an 18x optical zoom lens and a faster pan/tilt mechanism, making it ideal for distance learning, video conferencing, courtrooms and just about any other remote shooting application that you can think of. In addition the D70 is ceiling mountable! So why oh why would the BBA be interested in such a device? Well, for us the D70 has two uses, the first as a straightforward conference camera and the second as a lens to be used in conjunction with surveillance equipment. We are very aware that many of the BBA members, Circuit readers and Security Professions are not just ‘boots on the ground’ but also accomplished business people in their own rights and to this end may well have the need [as we do] for video conferencing. Generally speaking we find video conferencing to be an excellent way to conduct meetings especially in these economically challenging times when travel budgets and expenses are being looked at more than ever…..especially by Shaun W who is so tight he looks under his pillow to see if he has lost any sleep! The unit itself is extremely impressive, like most Sony hardware it just looks and feels
42 : : Circuit
REALLY sexy! We agree that more often than not Sony products come at a premium but they do feel like they should be expensive and generally perform superbly. Setting up the D70 up the for conference was relatively simple although you would need to know your way around PC’s and you Features and Technical Specification:
will also require a good broadband internet connection along with differing connections to allow you to actually connect the D70 to the internet. If you have a particularly large conference to cater for then you can daisy chain up to 7 D70’s or get the wide angled attachment for greater field of view. We may
PAL compatible -EVI-D70P or NTSC DVI-D70 White Version (EVI-D70PW) or Black (EVI-D70P) 1/4 type 380k pixel EX view HAD CCD Wide Range Pan/Tilt: 340 degrees Pan / 120 degrees Tilt High Zoom Ratio AF Lens: 18x Optical + 12x Digital Excellent Low Light Sensitivity: Minimum illumination less than 1 Lux Desktop or Ceiling Mount Installation E:Flip Function (electronic flip): Electronically flips an image upside down so it displays correctly when ceiling mounted 37mm Mount for Optional Conversion Lens Fully Remote Controllable via RS-232C (VISCA) or RS-422 Auto ICR Function Auto Focus Video Output: VBS (pin jack) and Y/C (4 pin Mini DIN) Alarm Function AE Spot Setting Custom Preset Function Image Range: 100 - 100,000 lux S/N Ratio: More than 50dB Shutter Speed: 1/1 - 1/10,000 sec Gain: Auto/Manual (-3 ~ 28dB, 2 dB step) White Balance: Auto/ATW/Indoor/Outdoor/One push WB/Manual WB Position Preset: 6 Positions Analog Output: VBS (pin jack), Y/C (4 pin Mini DIN) Camera Control: RS-232C / RS-422 VISCA (protocol) Power Requirement: DC 10.8 to 13.2 V Power Consumption: 12W Dimensions (WxHxD): 132 x 144 x 144 mm (5-1/4 x 5-3/4 x 5-3/4 inches) Weight: 950 g (2 lb. 2 oz.) Model: EVI-D70P (Black) EVI-D70PW (White) Signal System: PAL Image Sensor: 1/4” IT CCD with EXview HAD technology Effective Pixels: 752 (H) x 582 (V) Horizontal Resolution: 460 TV lines (wide end) Synchronization: INT Angle of View (H): 2.7° (tele end) - 48° (wide end) Min. object distance: 10mm (wide end), 800mm (tele end) Pan/Tilt: Pan: +/- 170° (max. speed: 100°/s) Tilt: -30° to + 90° (max. speed: 90°/s) Lens: Focal Length - f=4.1 mm (tele) - 73.8 mm (wide), F1.4 - F3.0 Zoom - 18xD. Zoom:- 12x Minimum Illumination: 1 lux, F1.4
go in to the ‘how to’ of video conferencing in a future edition of The Circuit but for now suffice to say that it performed very well on a trans-atlantic meeting.
Circuit :: BoyZone
Now to the second use for the D70, as a surveillance device. It was actually a former UK policeman that one of us met many years ago who we first noticed using PTZ cameras as part of his mobile surveillance set-up. Without going in to the methodology of surveillance operations there is often the need to see and record footage behind you and for this the D70 is perfect! We found that the unit was best mounted on a parcel shelf as this provides a stable platform for the unit which you need for good footage and because it is rather expensive and you wouldn’t want to break it. Because the unit has an analogue ‘out’ the D70 can be used with the MiniDV range of camcorders [that have an AV in] which although ageing still find favour amongst many of those that conduct surveillance commercially. [The reasons why may be discussed in a following article!] The D70 comes with an excellent IR remote control that allows you to control up to 3 different D70’s and is also the control for the PTZ functions. One great little feature is that you can set the unit up with programmed positions [6] so that with a push of a button the unit rotates to a number of set positions so for example you could be looking at a front door and then have a particular vehicle that you want to gain footage of or a junction of interest. You also have a ‘home’ position set at 12 o’clock so that the D70 can be quickly re-orientated. The PTZ action is extremely smooth and the zoom has a two-speed approach for quick in/ out or smooth in/out. One REALLY important feature that the D70 has is the ability to set the focus to infinity meaning that rain on glass will not cause the lens to focus on that but the far distance instead meaning that the subject/area of interest will remain in focus. All in all we thought that the D70 was an excellent addition to our surveillance equipment and although the price may well put some off it is excellent quality as we have come to expect from Sony. We would advise that if the unit were to be used in a moist environment that copious amount’s of silica gel be strategically placed to avoid moisture damage as much as possible. As far as PTZ goes, there are cheaper options and there units that will do more such as networked PTZ’z but the more hi-tec a unit is the more there is to go wrong and there is every chance that this will happen just as you are about to get the all important money shot! So, if you are working with analogue cameras and want a lens that provides good PTZ facilities with an excellent CCD then the D70 could very well be the unit for you!
Let me explain why we use this device. With the recording software running on a dedicated 12volt mini ITX computer in the back of the van (this runs as our network video recorder), it allows us to concentrate on our surroundings and the subject of the surveillance operation. Because the recording system will automatically record when there is motion you
USING THE I-PRO WV-NS202 CAMERA FROM PANASONIC IN SURVEILLANCE
T
do not have to worry about missing any evidence or pressing the wrong button on a camera. You know that if the event occurred it has been captured. PTZ cameras are also excellent for allowing the repositions of the field of view within physical contact with the camera itself. This reduces movement and noise within the van.
Software Is also not a problem. Milestone systems offer a one user licence version of their excellent IP recording software for free. This supports USB joysticks.
One point which is important to consider is the data format which the client requires. Some clients will only accept footage in a miniDV tape format. Some clients are happy with other digital formats. Using professional video recording software you get date and time on the footage as well as being able to export video and the raw database file for evidence. Milestone recording software is used in a large number of ip video systems and is internationally recognised.
This device does have some limitations. The resolution is only standard vga (640x680) and it is not ideally suited to low light work. It does however perform well with strong external lighting such as street lights. The vide quality is however high and with 22x optical zoom it allows you to get excellent evidence from a more remote location.
To operate this device I use a USB joystick which allows full control of the device. It is also worth mentioning you can setup presets on these joysticks which can then be activated via buttons on the joystick. This enables you to very quickly snap between different camera positions without manually setting up the image.
A review by SAM BURNS OF TRACK CLARITY LTD
his is a device which I personally use in surveillance operations and has produced excellent results. Currently I use one in the front and one in the back my dedicated surveillance van. The device offers some key features, progressive scan images, 22x optical zoom and the ability to be networked into wireless network. This allows you to operate and record from the camera from a remote location.
CLASSIFIED A.B.I. Solutions A.B.I Solutions is a dynamic, forward thinking company, specialising in surveillance, security and investigations with local, national and international experience. A.B.I provides a wide range of services to the corporate sector and individuals alike. www.abisolutions.co.uk ___________________________ Argus Europe County Durham, T:+44 (0) 8456 123 843 Argus Europe has been providing specialist training for high-net worth clients and their families for close to 20 years, worldwide. Argus Europe now offer accredited training for CPO’s, Surveillance Operators and Private detectives. Argus Europe is an operational company working globally with an extensive variety of contracts. www.arguseurope.co.uk ___________________________ ANZU Executive Protection Fairgate House, 205 King’s Road, Tyseley, Birmingham, B11 2AA Tel: + 44 (0) 121 707 9296 Training services include: Close Protection, Threat Analysis and Risk Management, Close Quarter Combat (including live weapons) Surviving in Hostile Environments, Advanced First Aid Treatments and Protective Driving. BBA Member. www.anzuexecutiveprotection.com ___________________________ Athena Security & Intelligence Consultants Ltd 69 Buchanan Street, Glasgow, UK, G1 3HL Tel: + 44 (0) 141 314 398 Specialist intelligence training and operations for private and public bodies working in permissive and non-permissive environments. Covert HUMINT, CounterIntelligence, Hostage Awareness and Negotiation specialities. www.athenaintelligence.co.uk ___________________________ Briareus Security Our aim is to give a complete, discreet and professional service to all of our clients, be they large corporations, small businesses, local authorities or private individuals, all tailored to meet their individual needs. www.briareussecurity.com info@briareussecurity.com ___________________________ Camberford Law Plc Lygon House, 50 London Road, Bromley, BR1 3RA Tel: + 44 (0) 20 8315 50 We provide bespoke insurance solutions for Bodyguard, Door Supervisor, and Security companies of all sizes. Cover can apply for worldwide services. It is an exclusive arrangement - not available to anyone else. BBA Associate Member. www.camberfordlaw.com/closeprotection ___________________________ Canadian Use of Force Systems
44 : : Circuit
7975 Yonge St. # 7124, Innisfil, ON, L9S 1L0, CANADA Tel: + 1 705 456 4333 A professional Use of Force and Defensive Tactics organization teaching a full range of controlled response options for Self-Protection and Use of Force considerations in public and professional environments. BBA Associate Member. www.canadianuseofforce.com ___________________________
___________________________
Challenger Chauffeuring and Security Ltd Eaton Place Business Centre, 114 Washway Road, Sale, M33 7RF Tel: +44 (0) 161 905 1424 Based in South Manchester, we aim to take customer service levels to new heights by providing smart, high calibre drivers and vigilant, professional door supervisors and security staff. Licensed close protection operatives are also available to work both at home and abroad. BBA Member. www.challengergroup-mcr.co.uk ___________________________
D.McKenzie Associates Stacey Bushes, Milton Keynes, MK12 6HL Tel: + 44 (0) 1908 225474 Operational management, training, threat and risk assessment, threat management, executive (personal) and corporate security / investigations. BBA Member. www.dmckenzieasociates.com ___________________________
Concept Tactical London, England Telephone : +44 (0)78 538 79913 (0)78 538 79913 Through Concept Tactical well known author and protection specialist Casey Christie provides clients with specialised close protection and a security consultancy service operating to only the highest standard. www.concepttactical.com ___________________________ Control Risks Cottons Centre, Cottons Lane, London, SE1 2QG Tel: + 44 (0) 20 7970 210 Control Risks training services is the training division of business risk consultancy Control Risks. We run courses including close protection, hostile environment training, close protection within hostile environments, first aid and defensive driver training for organisations and their staff, ex service personnel and other private individuals. www.controlrisks-training.com ___________________________ Coversure Insurance Services 23, Croydon Road, Reigate, Surrey, RH2 0LY Telephone : 0800 308 1010 Coversure ( Reigate ) is a Specialist Insurance Broker to the Security Industry including Event Security, TV & Media Security, Guarding and Close Protection. www.1nsurance.co.uk ___________________________ Covert Solutions Group International 27, Old Gloucester Street, London, WC1N 3XX Tel: + 44 (0) 7005 964 17 A UK based Specialist Security Company with Global reach and are leading providers of Close Protection and Surveillance to Private, Executive and High Profile Clients. BBA Member. www.covertsolutionsgroup.com
Cunningham Support Services Cunningham Support Services offers all BBA members a discount of at least 10% on all their Services. T - 01582 520327 / 07882 883591 E - admin@cunninghamsupportservices.co.uk W - www.cunninghamsupportservices. co.uk ___________________________
Detective Lacerda P.O.BOX 25996, São Paulo, 05513-970 , BRAZIL Tel: + 55 (11) 3452 4388 Providing the full range of security and investigation services throughout Latin America. BBA Member. www.detectivelacerda.cjb.net ___________________________ DM Security (UK) Ltd The Elms Business Centre , 62 High Street, West Bromwich, B70 6JT Tel: + 44 (0) 8444 821 460 A highly professional and reliable outfit catering for all aspects of security and close protection. We have an enviable reputation within the industry and guarantee a friendly, efficient and consistent service. BBA Member. www.dmsecurityuk.com ___________________________ Female-Bodyguard.com 2 William Street, Berkhamsted, HP4 2EL Telephone : + 44 (0) 780 1066315 A highly trained team of female close protection officers providing CP services worldwide. BBA Member. www.female-bodyguard.com ___________________________ Griffith Corporation Security Service 332 South Pennsylvania Ave, Glendora, California CA 91741-4231, USA Tel: + 1 775 790 9446 Provides security consultation and serves as the hub of its Security Network Portal. Also operates the Homeland TV Network and Griffith Broadcasting, both of which are on-line TV channels dedicated to security issues. The firm also operates Air Securitas, a private air security firm providing VIP security and air transportation. In addition to these venues, Griffith Corporation Security Service provides executive protection referrals and services. BBA Member. www.griffithcorp.com ___________________________ Hawk East PO Box 339, Stoneville, NC 27048, USA
To place a classified lineage or box advertisement telephone our sales team on: 0845 519 2538
Tel: + 1 336 427 8699 The Complete Bodyguard Training Video Series, VHS or DVD. BBA Member. www.bodyguard-training.com ___________________________ Heimrisks Svartemyrar 2, 458 93 Färgelanda, Sweden Security services and training provider with focus on the middle east region www.heimrisks.com ___________________________ Icon Services Corporation 1043 Grand Ave. #312, St. Paul, MN 55105, USA Tel: + 1 651 695 8778 A full service security and investigative agency specializing in providing highlevel security and bodyguards to international celebrities, public figures and corporations. Licensed, bonded and insured, our diverse roster of clients reads as a virtual who’s who in the corporate, motion picture, fashion and recording industry. Entering into our 10th year, Icon has been the hand picked choice to provide Executive Protection to everyone from Superintendents to Supermodels. BBA Member. www.Industry-Icon.com ___________________________ Imperial Protective Service, LLC 15849 N. 71st Street, Suite 100, Scottsdale , Arizona, 85254, USA Tel: + 1 480 281 1588 Imperial Protective Service’ (IPS) is a security consulting and services firm founded in 1978. IPS provides both national and international corporate, executive and celebrity protective services. BBA Member. www.executiveprotect.com ___________________________ Intelligent Network Services Unit 27B, Wolverhampton Airport, Stourbridge, DY7 5DY Tel: + 44 (0) 845 2572193 We provide a full and comprehensive range of services into all areas of business and the private sector including Close Protection, static security (all UK SIA Lincensed), Private Investigation, Aviation, Maritime & Fire Services and a Secure Document Transfer Service. BBA Member. www.intelligentnetworkservices.org ___________________________ International Protection Group 16 Penn Plaza, Suite 1570, New York, NY10001, USA Tel: + 1 212 947 1681 A highly specialized team of current and former law enforcement and experienced protection professionals that provide the best individual or group protection at every turn. BBA Member. www.internationalprotectiongroup.co ___________________________ International Protection Management Dublin, EIRE Tel: + 353 1800 771 772
CLASSIFIED Specialists in Security Risk Management & Consultant Bodyguard Services for Media, Corporate, Hotel, Private, Executive and Celebrity Clients. BBA Member. www.bodyguards.ie ___________________________ International Security Academy P.O.Box 5833, Herzeliya, 46000, ISRAEL Tel: + 972 9 950 0969 Our graduates are more recognized, respected and sought after by Distinguish Protection service “consumers” and by most of the “Providers” of Protection services worldwide. Organisers of the 2008 International Summit of Protection Officers. BBA Member. www.SecurityAcademy.org.il ___________________________ IPSS Security Northfield, Aberdeen, AB16 7EX Tel: + 44 (0) 1224 69455 Security and protection services - UK and overseas. BBA Member. www.ippssecurity.co.uk ___________________________ ISS Training Ltd Riverside Cottages, Nidd Walk, Pateley Bridge, Harrogate, HG3 5NA Tel: + 44 (0) 1423 712265 ISS Training Limited are providers of specialist covert surveillance training courses and publications to the security and investigative industries, enforcement agencies and specialist military units. Formed in 1990, we are the longest established surveillance training company in the United Kingdom. Our credibility and reputation is widespread and we offer nationally recognised qualifications. BBA Member. www.intelsecurity.co.uk ___________________________ John Featherstone 24hrs : +44 (0)7702 740722, john@ johnfeatherstone.co.uk Security professional with operational experience gained in a variety of theatres. Main specialities close protection and surveillance. www.johnfeatherstone.co.uk ___________________________ K SA Security Kodratou 22, Athens , 10436, GREECE Tel: + 30 210 5235558 K Security Agency offers a wide range of services including VIP protection security consulting and risk analysis. BBA Member. www.ksasecurity.gr ___________________________ Komodo Red Security Services Unit A The Courtyard Business Centre, 27 Norfolk Street, Peterborough, PE1 2NP Tel: + 44 (0) 1733 567253 We offer bodyguard, close protection, security, surveillance and consultancy services such as risk assessments. We also provide unarmed combat conflict management training. BBA Member. www.komodored.com ___________________________
MAF Protection P.O. Box: 25996, São Paulo, 05513970, BRAZIL Tel: + 55 11 3452 4388 MAF Protection was formed in 2001 by a Group of experienced independent Security Specialists, who have trained and gained their experience from service within the Armed Forces, Police and Civilian Security Sector. We provide an extensive range of specialised security services. BBA Member. www.mafprotection.com ___________________________ MB Security Service Furstenbergs Gatan 4, Gothenburg, 41664, SWEDEN Tel: 46 (0) 31 150 333 Close Protection and security services worldwide. BBA Member. www.mbsecurityservice.com ___________________________ Military Grade Encryption Phones PO Box 52310, Limassol, CYPRUS Tel: + 357 7777 7276 Built-in encryption software which converts your voice to encrypted data using a constantly changing mathematical formula. It uses a dual layered RSA/AES combination and a changing session key which modifies the encryption algorithm every second. € 1,398.00 + VAT. All prices include new Nokia N73 phone. BBA Member. www.protechcy.com/new ___________________________ New Security via Rome 100, 95030 Gravina of Catania, Sicily, ITALY Tel: + 39 0954 197 546 La New Security di Carmelo La Rosa è stata fondata nel 1993 per fornire servizi di Investigazioni, Ricerche, Informazioni Commerciali, Intelligence, Security, ad Aziende, Istituti Bancari-Commerciali e Finanziari, a Studi legali e Privati, in tutto il mondo. BBA Member. www.newsecurity-investigazioni.it ___________________________ Stuart Pagett 24hrs : +44 (0) 7814114619 Experienced Security Professional and Front Line Close Protection Officer. Web - www.sjprotection.co.uk ___________________________ Primus Group 8, Earlswood Road, Llanishen, Cardiff, CF14 5GH Tel: + 44 (0) 29 20757578 Conflict Management, Workplace Violence, Management & Development, PhysicalIntervention, HSE First Aid Training, Security Consultancy. BBA Member. www.primusgroup.co.uk ___________________________ Protector Network 156 Queens Road, London, SE15 2HP Tel: +44 (0)759 434 9911 The Protector Network provides worldwide operational and training solutions. Closely bound with the International Bodyguard Association and ILETA we are able to provide global coverage through
our professionally qualified affiliates. Free membership for BBA members. BBA Member. www.protectornetwork.com ___________________________ Red Diamond Security PO Box 775, Christchurch , 8140, NEW ZEALAND Tel: + 021 0227 0093 Providing professional proactive security ranging from basic security guarding through to Close Protection (Bodyguard/ PSD) in Iraq. BBA Member. www.reddiamond.co.nz ___________________________ Richard James Cooper 24hrs : +44 (0) 7890 676839 , info@ richardjamescooper.co.uk Experienced Security Professional and Front Line Close Protection Officer. www.richardjamescooper.co.uk ___________________________ Saint Security Consultants Pte Ltd 20 Kramat Lane, #03-04 United House, 228733, SINGAPORE Tel: + 65 67373104 Licenced by the Criminal Investigation Department of the Singapore Police Force, Saint Security Consultants Pte Ltd was incorporated by former Police officers from various departments and specialist professionals with decades of expertise in Criminal and Commercial Investigation, Intelligence Operations as well as Security Planning and Management. BBA Member. www.saint-security.com ___________________________ Shaun West United Kingdom, E: sw@shaunwest. co.uk T: +44 (0)7830 109 601 SIA licensed, Highly Experienced Frontline CPO. Ronin SA trained. Providing security for both corporate and hostile Environments. www.shaunwest.co.uk ___________________________ Sting Protection Germiston, Guateng, SOUTH AFRICA Telephone : + 27 82 791 0119 Our highly trained staff will assure that you receive piece of mind, and that you and your valuables are safe and secure during your visit to South Africa. BBA Member. www.sting-protection.co.za ___________________________ Sun Security Personnel Suite 7/Level 1, 564 Princes Highway, Rockdale, NSW 2216, AUSTRALIA Telephone : + 1300 736 795 Founded in 1992 with a vision to provide a professional and outstanding level of security service to our clients worldwide. BBA Member. www.sunsecurityñcom.au ___________________________ Tony Scotti’s Vehicle Dynamics Institute 1162 St. Georges Ave, Suite 277 ,
Avenel, NJ 07001, USA Tel: + 1 732 738 5221 The first name in advanced driver train-
To place a classified lineage or box advertisement telephone our sales team on: 0845 519 2538
ing, offering our highly acclaimed Protective/Evasive Driving Programs. Designed specificallyfor today’s executive chauffeurs, executive protection professionals and others who are responsible for providing safe and secure transportation services. BBA Member. www.vehicledynamics.net ___________________________ Varsity Publications PO Box 222, Chipping Norton, Oxford, OX7 5WY Telephone : +44 (0) 870 350 1231 Varsity International Directory of Security & Close Protection features around 2000 Security Advisors, Bodyguards & Executive Protection Specialists and it covers over 150 countries throughout the world. It is laid out by Continent and thereafter alphabetically by Country and City for ease of use. There is a map for every Country covered plus information panels giving vital details such as local currencies, languages spoken, dialing codes and time differences. www.varsitypublications.com ___________________________ Viking Security 185 Langworthy Rd, Salford, Manchester, M6 5PW Tel: + 44 (0) 161 745 880 Our aim is to provide first class security solutions. By using the skills of our dedicated team of professionals, we will ensure the very best service and support is offered to all our clients. BBA Member. www.vikingsecurity.co.uk ___________________________ VIPA Tactical Training P O Box 353, Roweltown, Cumbria, CA1 9DP Tel: + 44 (0) 7954 218125 A specialist training academy dealing with four specific areas of combat: VIPA Civilian Self Protection Program, VIPA Close Protection Combat System, VIPA Police Defence Tactics and VIPA Military Close Quarter Combat. BBA Member. www.VIPAtacticaltraining.com ___________________________ Watchman Protective Services Inc 1306 Fairlakes Pl, Mitchellville, MD 20721, USA Tel: + 1 866 608 8000 We provide executive protection and security guard services with unarmed and armed security officers and mobile patrol services to industrial and manufacturing facilities, commercial properties, local and federal governments, residential communities and retail establishments. BBA Member. www.watchmanprotective.com ___________________________
Circuit : : 45
New From ISS Training Ltd The most comprehensive surveillance training book ever published
Every aspect and element of surveillance covered
Over 500 Full Colour Pages
Available from 15 December 2009 th
For further details and ordering
www.surveillance-tradecraft.co.uk