Issue 62 - Intelligence Gathering

Page 1

News

Reviews

Opinions

Intel

Exclusives

62 SPYING OPERATIONS

TIK TOK

SOCIAL MEDIA INVESTIGATIONS

CASE STUDY

INTELLIGENCE

GATHERING

Lessons For Security Professionals

FATAL FLAWS OF THE MODERN PROTECTOR KEEPING YOUR EDGE

Ι

THE IMPORTANCE OF

DISCIPLINE IN TRAINING

LEARNING & DEVELOPMENT

Ι

BEHAVIORAL TRAITS 1


contents ISSUE 62 04

UK FOREWORD

07

US FOREWORD

08

INDUSTRY NEWS

14

TIKTOK LESSONS FOR SECURITY PROFESSIONALS

20

FATAL FLAWS OF THE MODERN BODYGUARD

28

INTELLIGENCE GATHERING P3: SPYING OPERATIONS

38

CYBERSECURITY FUNDAMENTALS: BUILDING ON QUICKSAND

44

SOCIAL MEDIA INVESTIGATIONS

54

TACTICAL MEDICINE: WHAT IS YOUR MEDICAL READINESS?

62

TEAM BEHAVIORAL TRAITS

74

THE IMPORTANCE OF DISCIPLINE IN TRAINING

82

GEOPOLITICAL ANALYSIS: UKRAINE: THE NEED FOR REINFORCEMENTS

90

ASK THE NABA NETWORK

92

GLOBAL SITUATION REPORT

98

TACTICAL FIREARMS: SHOOTING FROM THE HIP

106

EVENT REVIEW: LEARNING & DEVELOPMENT FORUM

113

THE POWER OF READING

118

INDUSTRY EVENTS

120

KEEPING YOUR EDGE DOES EP NEED TO BE EXCITING?

125

CLASSIFIEDS

2

82


14

38

20

113 3


EDITOR FOREWORDS

UK FOREWORD Welcome to issue number 62 of the Circuit Magazine, the dedicated publication for protectors. How things have changed since I was last sat here writing this column. In that short space of time the global geopolitical situation has changed beyond recognition, once again. With the Coronavirus pandemic still in the rear-view mirror, few could have imagined they’d be witnessing the sad and horrific scenes they’ve seen coming out of Ukraine.

The British (BBA) and North American (NABA) Bodyguard Associations connect our industry and provide opportunities, resources and advice. If you haven’t already joined one of the communities you can get started for free by downloading either the BBA Connect app or the NABA Protector app.

Community members who caught our latest The Russian invasion of Ukraine has had a Learning and Development event will agree massive impact on the whole world and not that the array of speakers on display and least for those working in the security industry. knowledge passed was first class. I know On the one hand, it has created opportunities personally, I was inspired to start planning the for our industry, as is always the case in next steps of my own personal development. times of global insecurity. But elsewhere, the If you missed it, the replay is available to watch executive protection community has taken inside the apps. a serve knock especially for those whose business and incomes were structured Elsewhere, the Podcast continues to go from around protecting Russian HNW’s. The strength to strength, and we’ve introduced sanctions that were implemented to target listeners to some fantastic guests who have those in support of the Kremlin have struck shared the benefit of their knowledge so much deeper and have, in many cases, we can all continue to learn. Recently, we’ve destroyed businesses and stripped individuals covered some fascinating topics, including: of their livelihoods. Physical and mental fitness, travel and risk management and managing violence to name The speed at which sanctions took hold left but a few. many unable to react and rendered continuity plans useless. Sadly, for many businesses, As we jump into the latest issue, let us hope the landscape has changed permanently and pray that the Russia-Ukraine conflict and there is no going back. In situations like comes to a speedy resolution with minimal this, it is more important than ever that, as a further loss of life. From the team at The community, we continue to look out for one Circuit, safe out there till next time! another and offer support wherever we can. Stay safe Long-term Circuit readers will know that we have 2 thriving communities that have been Shaun West supporting protectors for the last 14 years. Editor

4


THE APP THAT CONNECTS THE SECURITY INDUSTRY Download the app and sign up for a free account Available on:

Fully featured Member events Exclusive opportunities

Regular content Trusted information Learn & grow

Jobs Board

TRAINING

EVENTS

Join the BBA Network 5


6


EDITOR FOREWORDS

US FOREWORD Spring is here, and just as it represents a renewal of the seasons, we at The Circuit Magazine are looking at it as a great excuse to renew and revitalize things on our end. Having produced the publication for over a decade, we take great pride in our mantra of being a magazine for Protectors, written by Protectors. The ability to have subject matter experts from all over the world come and share their experiences have been invaluable. How do we know this? Primarily by the conversations we have with readers who approach us both in real life and online, and tell us how a particular article made them think about a subject a different way, or how they learned something about a related field that they were unfamiliar with. That’s the beauty of The Circuit, we don’t want to just deliver ‘content,’ we want to produce a body of work that can be digested, absorbed and have replayability. In fact I put that concept to a test myself, when I went back and picked some random Circuit issues from

several years back, and reread them. Of course there was a fair selection of ‘of the moment’ topics, like the news, and technology reviews. However, far exceeding that, were articles that were just as relevant now as they were when they came out. Our business has an established history, and it’s nothing short of amazing that myself, and the other publishers of Circuit Media, have been able to play a part in documenting, and canonizing the evolving tactics, techniques, interest and personalities that make up the craft. So in the spirit of renewal, we promise to give you not only more of what you expect, but to also provide new and fresh perspectives by setting up the next generation, and therefore the industry, to make their voices heard. Elijah Shaw Editor 7


CIRCUIT MAGAZINE ISSUE 62

Industry News At A Glance

We cast our eye over the main stories impacting the security industry. Here's what's appeared on the radar since the last issue. Crack down on celebrity raids before someone gets killed, says security boss Athletes, television stars and other wealthy individuals have fallen victim to violent burglaries and street robberies in recent years, with some left with serious injuries. The head of the national police unit responsible for monitoring intelligence around organised thefts told The Times that stars’ social media exposure was fuelling the raids, with organised gangs harvesting intelligence on what valuables are available and when houses are empty. Alex Bomberg, whose firm works with foreign royalty, football stars and other VIPs, warned that the raids would soon lead to a death if there was not a culture change around relying on technology such as alarms and CCTV for protection. VIPs — including foreign royalty — are increasingly turning to private security in response to highly publicised robberies, such as the recent attack on the cyclist Mark Cavendish at home and raids on the mansions of footballers, including the former England defender Ashley Cole and the Manchester City wing-back Joao Cancelo. The warning over high-value burglaries and robberies came shortly after the boxer Amir Khan was robbed in an east London street at gunpoint for his Franck Muller Vanguard Chronograph watch, worth £72,000. Simon Morgan, a former royal protection police officer who is head of operations at the security firm Trojan Consultancy, warned that police response times were adding to the problem.

“We’ve sometimes been brought in by new clients where they’ve been victim of a home invasion or they’ve been carjacked,” he said. “When we do have clients that have come to us because they’ve been victims of crime, it’s about establishing how and bearing down on that.” He warned that delivery drivers, builders and other casual staff often passed on indirect intelligence that was picked up by opportunist criminals or organised crime groups and even traded between criminals prior to a raid. The groups responsible range from organised foreign gangs, such as Chilean burglary tourists, to local opportunists and more established, organised groups, he said. Morgan added that criminals were aware that crimes such as the theft of keyless cars carried relatively light sentences, making the targeting of luxury vehicles an attractive approach for some gangs. Source >

8


INDUSTRY NEWS

Dave Chappelle attacked on stage during stand-up Netflix show at the Hollywood Bowl in LA Stand-up comedian Dave Chappelle has been attacked by a person who ran on stage at the Hollywood Bowl in LA. "A man charged and tackled" Chappelle just as the show was ending, according to Brianna Sacks, a reporter at the show. She said security "rushed and started punching and kicking the s*** out of Chappelle's attacker". A man, 23, has now been charged with assault with a deadly weapon. Video later showed the attacker, with what appeared to be a dislocated arm, being loaded onto L.A. District Attorney Won’t Press Felony Charges The Los Angeles District Attorney has declined to file felony charges against the man accused of attacking Dave Chappelle

an ambulance. Another journalist at the show said they had "lunged" at Chappelle and sent him "flying in the air". Los Angeles Police Department told NBC that the male suspect had been armed with a replica gun that could eject a knife blade when discharged correctly. It was unclear if the suspect made an attempt to use the weapon. Chappelle also spoke about needing more security after his recent controversy, as well as the Chris Rock incident, according to audience members. Source > on stage Tuesday night during a standup comedy show, the DA’s office said Thursday—but misdemeanor charges are still possible. Source >

9


CIRCUIT MAGAZINE ISSUE 62

Biden Administration Releases Domestic Counter-Unmanned Aircraft Systems National Action Plan The Biden Administration is releasing the first government plan to address UAS threats in the Homeland. Through the Domestic Counter-Unmanned Aircraft Systems National Action Plan, the Administration is working to expand where we can protect against nefarious UAS activity, who is authorized to take action, and how it can be accomplished lawfully. To achieve this balance, the Administration is calling on Congress to adopt legislation to close critical gaps in existing law and policy that currently impede government and law enforcement from protecting the American people and our vital security interests. To protect our Homeland and prevent their growing use from threatening the safety and security of our people, our communities, and our institutions, this

10

Counter-UAS National Action Plan will set new ground rules for the expanding uses of UAS and improve our defenses against the exploitation of UAS for inappropriate or dangerous purposes. The Plan provides eight key recommendations for action, including: • Create a list of authorised UAS detection systems to avoid the risks of inadvertent disruption to airspace or the communications spectrum. • Support critical infrastructure owners and operators in purchasing counterUAS equipment • Establish a National Counter-UAS Training Center • Set penalties to deter the most serious UAS-related crimes and close loopholes in existing Federal law. Source >


INDUSTRY NEWS INVESTIGATION FINDS SECURITY COMPANY EXPOSED OFFICERS TO DANGERS OF WORKPLACE VIOLENCE A federal investigation has determined that Professional Security Consultants Inc. – a Los Angeles-based security company that provides officers for shopping malls, schools, hotels, hospitals, office buildings and gated communities – repeatedly exposed its employees at the Boise Towne Square mall to workplace violence hazards and failed to follow its own procedures for interacting with armed individuals to enforce the mall’s code of conduct. The U.S. Department of Labor’s Occupational Safety and Health Administration initiated an inspection following the fatal shooting of an unarmed

security officer on Oct. 25, 2021. OSHA cited the company for not instituting controls to protect security workers from hazards likely to cause death or serious physical harm. the agency proposed penalties totaling $14,502. “Professional Security Consultants’ policies and procedures did not effectively address the risk of gun violence, a recognized hazard in the security services industry,” said OSHA Area Director David Kearns in Boise. “Every worker has the right to a safe and healthful workplace. This employer must provide enhanced safeguards and training to ensure workers have the knowledge and tools to better protect themselves against assault.”

Source >

Briton Aiden Aslin ‘surrenders’ in Mariupol as he runs out of food A Briton fighting in Ukraine has been captured by Russian troops in the besieged city of Mariupol, according to a statement issued on his behalf. In a message posted on Twitter, Aiden Aslin, 28, said that his unit, which contains other international volunteers, had been forced to surrender after running out of food and ammunition. The former care worker from Newark, Nottinghamshire, volunteered to fight Islamic State in Syria before moving to Ukraine in 2018, where he serves in the country’s marines. There are hopes that he will be freed as part of a prisoner exchange. A statement posted to his Twitter account this morning read: “We’ve gotten word from Johnny [Aslin]. ‘It’s been 48 days, we tried our best to defend Mariupol but we have no choice but to surrender to Russian forces. We have no food and no ammunition. It’s been a pleasure everyone, I hope this war ends soon.’”

this out after direct consultation with his family. Until we’re told otherwise we’ll continue working on sharing the facts of the war. Hope for a prisoner exchange.”

The statement continued: “We’re putting

Source >

11


CIRCUIT MAGAZINE ISSUE 62 British embassy guard charged with spying for Russia A security guard at the British embassy in Berlin suspected of spying for Russia has been extradited to appear in court charged with nine offences under the Official Secrets Act. David Ballantyne Smith, 57, is due to appear at Westminster Magistrates' Court The UK national was arrested by German police on 10 August. The offences are alleged to have happened between October 2020 and August 2021. Mr Smith, who had been living in Potsdam, in Germany, was flown back to the UK ahead of his appearance at Westminster Magistrates' Court.

12

The Metropolitan Police said the nine charges related to the collection and communication of information useful to the Russian state. Nick Price, head of the special crime and counter terrorism division of the Crown Prosecution Service (CPS), said Mr Smith was accused of seven offences of collecting information with the intent of sending it to the Russian authorities, one of attempting communication and one of providing information to a person he believed was a member of the Russian authorities. He said the CPS had worked closely with its German counterparts to bring Mr Smith back to the UK after obtaining an extradition warrant. Source >


INDUSTRY NEWS

Congress Approves Cyber Attack Reporting Requirement for U.S. Companies Companies critical to U.S. national interests will now have to report when they’re hacked or they pay ransomware, according to new rules approved by Congress. The rules are part of a broader effort by the Biden administration and Congress to shore up the nation’s cyber defenses after a series of high-profile digital espionage campaigns and disruptive ransomware attacks. The reporting will give the federal government much greater visibility into hacking efforts that target private companies, which often have

skipped going to the FBI or other agencies for help. State hackers from Russia and China have had continued success hacking into and spying on U.S. targets, including critical infrastructure targets. The most notable was Russia’s SolarWinds cyberespionage campaign, which was discovered at the end of 2020. The new rules also empower CISA to subpoena companies that fail to report hacks or ransomware payments, and those that fail to comply with a subpoena could be referred to the Justice Department for investigation.

Source >

13


CIRCUIT MAGAZINE ISSUE 62 By Ben Kunde, CFE

TikTok Lessons for Security Professionals An Eye-Opener for Us All

Recently, I came across a case that I was sure should prick up the ears of risk managers, security officers, and the like, across the industry. Imagine your thirteen-year-old girl sets up a TikTok account and posts harmless videos of herself having fun dancing and lip-syncing to her favourite tunes. Her popularity skyrockets on the social media platform as more users subscribe to view her latest videos. She is also active on other online social media platforms where she makes no effort to hide the fact that she is the girl with that TikTok account. 14

Her followers, well… follow her to other social media sites and play online games with her. They chat with her and, being the personable and chatty girl she is, she says hi back to them all. Most are happy just to connect once and have a brief chat. However, it feels uneasy when your daughter mentions that one of her fans, an eighteenyear-old male with the username EricJustin111, seems to be present


TIKTOK LESSONS FOR SECURITY PROFESSIONALS

15


CIRCUIT MAGAZINE ISSUE 62 wherever she is online and always tries to communicate with her. Now, imagine the peace of your safe and sleepy neighbourhood in Florida being shattered when Eric Justin strides up to the front door of your home and shreds it with a blast from his shotgun after having tracked down your daughter to your residence! That is exactly what happened to Ava Majury, a teenager who has lived to tell the tale, seemingly thanks to pure chance. Justin’s shotgun jammed mid-rampage, and Majury’s father, a retired police officer, was able to get to his handgun and incapacitate the intruder. Threats Are Everywhere Justin had gathered personal information on Majury by connecting with her classmates who sold him photos and information. He even did a child’s math homework in exchange for information. Before the attack, he had used the information to contact Majury, offering to pay for photos of her body. She had told her parents about the messages, but her father had dismissed Justin as a threat as he lived hundreds of miles away. The subsequent Collier County Sheriff’s Office report speculated that Justin was: “most likely a stalker”. 16

The internet means physical proximity no longer limits would-be stalkers when it comes to their targets.


TIKTOK LESSONS FOR SECURITY PROFESSIONALS Ava Majury is now fourteen and, despite this nightmarish experience, continues performing on TikTok and other social media networks, having bagged sponsorship deals and garnered interest from Hollywood reality TV producers. The amount she has been able to earn doing what she does has astounded her parents, and they don’t want to take that away from her, a fourteen-year-old girl making relatively innocent and wholesome videos that she admits are popular because: “My whole thing is my pretty smile — that’s my content.”

onto the big screen as she took the stage for her commencement ceremony. The aggressor turned out to be a former boyfriend. The judge for the case called the harassment perpetrated on K.C. and another young woman “an ongoing and inescapable, 21stcentury nightmare…”

We Are All Targets Now The internet means physical proximity no longer limits would-be stalkers when it comes to their targets. If this can happen to teenagers, one of whose would-be attackers lived hundreds of miles away, how can Another victim, known as K.C., was more established high-profile eighteen when she was threatened influencers, executives, VIPs, and celebrities stay safe? For the type with having photos of her nude of individuals I just mentioned, sent to her friends, family, technology is a necessity for them and church. The stalker even threatened to have them projected to keep doing what they do.

17


CIRCUIT MAGAZINE ISSUE 62 safety, a multi-pronged approach is essential for a comprehensive approach that covers all bases. That is why highly-trained experts not only interpret data but also supplement it K.C.’s stalker was experienced in the ways of the dark web. Ongoing with on-the-ground research. Professionals assess the threat automated web and dark web level, reveal the potential monitoring and scanning using perpetrator’s true identity behind artificial intelligence are part of the online persona, track them the solution to keeping public and conduct deep background figures safe. Programs that scour checks for an in-depth risk social media globally for specific profile before bringing in law keywords that imply threats enforcement for urgent or highagainst an individual are crucial. level cases. However, security technology always works best when Remain Vigilant, Increase Your complemented by a dedicated Protection team of security and protection professionals. After all, technology It may sound a little like Minority Report, but it’s necessary alone will not unmask a potential when in 2021, women and girls attacker. For that, instinct, experience, and investigative skills experienced a record high of 60% of all online risks. The tools are also necessary. perpetrators use are always Cover All Bases with Experience evolving, and so must we, the security experts people rely on to and Tech stay safe. When it comes to individuals’ They cannot afford to stay offline. The best way to fight cyberstalking is to turn technology to our advantage.

Seasoned by a Northeast German upbringing, military training, and raising young children, Ben Kunde is no stranger to unforeseen complexity and security risks. His career as Executive Vice President at Interfor International spans over a decade of experience in the field. Ben Kunde has been advising executives, celebrities, HNWIs, and Chief Security Officers on emerging threats. He regularly works with attorney teams and cyber experts to help mitigate data breaches, security concerns, and fraud incidents. As a Certified Fraud Examiner, he oversees complex and cross-border investigations, asset identification and due diligence matters. Mr. Kunde earned his M.B.A. from the Leonard N. Stern School of Business at New York University, specializing in Economics, Business Law, and Management. Following his military service in Berlin at the elite German honor guard battalion, he received a B.A. in Political Science and an M.A. in Sociology from the University of Rostock, Germany.

18


TIKTOK LESSONS FOR SECURITY PROFESSIONALS WORLDVIEW Powered by Stratfor

Intelligence for security and protection specialists INTRODUCTORY OFFER

$99 $199 FOR THE FIRST YEAR SAVE $100

worldview.stratfor.com/magazine All subscriptions are set to auto-renew annually at the regular price.

19


CIRCUIT MAGAZINE ISSUE 62 By Westminster Security

Fatal Flaws of the Modern Bodyguard

The skills, training, and common traits of competent bodyguards are extensive.

20


FATAL FLAWS OF THE MODERN BODYGUARD Anyone looking to join the close protection profession can readily obtain a list of all the necessary knowledge needed to qualify as an operator. However, unwanted traits may lie hidden and not surface until after a trial working period. Details of these negative characteristics and behaviours are not readily available. Many freelance “bodyguards” spend years of their careers bouncing from one task to another, hoping to land that golden full-time position. These freelancers don’t spend long enough in one place for unwanted character flaws to appear. With the rise of social media and the lack of work opportunities due to the pandemic, these unwanted characteristics have become ever more apparent. Operators and companies do not realise how detrimental such factors can be to their employability and credibility. The vast majority of close protection operatives in the UK are selfemployed contractors. So, the adage that you are only as good as your last job and reputation is everything does ring true. Of course, we all must move with the times. Social media is

king, so why shouldn’t you tell the world how good you are? Let us look at some of the most prevalent character flaws that we come across as employers and individual operators. Narcissism Narcissism is a self-centred personality style characterised as having an excessive interest in one’s physical appearance and an excessive preoccupation with one’s own needs, often at the expense of others. Decades ago, bodyguards, close protection officers, or close protection operators as they are now known were thought of and acknowledged as the ‘grey men’ of the security industry. Professional operatives would go about their daily tasks protecting the rich and famous. They did not feel the need to be permanently broadcast their location, what a successful job they had just completed and how great they must be. There was no posting of selfies on task next to their principal’s car, private jet, or yacht! Today’s self-publicists should consider whether these epic 21


CIRCUIT MAGAZINE ISSUE 62 security and confidentiality failures are a “success”. Is selfcongratulation necessary for just doing what you are paid for? Such behaviour highlights a lack of discretion and insecurity. Selfies and self-praise are unprofessional. Potential hostile or criminal entities can use openly shared images on social media to link operatives to a principal, their principal’s family, their principal’s assets. Future principals, their families and assets are also put at risk. This narcissistic behaviour provides a gold mine of information to organised criminals, and those that indulge in it are completely failing in their duties to protect their principal. Many seasoned and ‘old school’ operatives will go out of their way to avoid being photographed by the paparazzi and avoid being recognisable. Being identifiable attracts the wrong kind of attention. It makes it easy for the paparazzi to look for potential photo opportunities. Experienced paps will recognise the operative before the celebrity appears. It is difficult to avoid getting “papped” if working in the celebrity protection circuit. But 22

Nothing is more dangerous than a friend without discretion, even a prudent enemy is preferable. (Jean de la Fontaine).


FATAL FLAWS OF THE MODERN BODYGUARD there are still steps to take to avoid being in every photograph with a principal. And, even if you are snapped, there is no need to share the images in a boastful manner all over social media. Anyway, the wise operative will realise that this behaviour is probably counterproductive. Who wants to hire a bodyguard willing to share pictures of clients on social media as a cheap way of self-marketing? With the rise in social media platforms, many operatives have lost focus on one of the fundamental core skills required to be a successful operator – discretion! A professional avoids giving TV and magazine interviews if they are still “operational” and does not publicly name an extensive list of clients. Inadvisable publicity makes it easier for the paparazzi or undesirables to target them, their family, their house, and clients. Professionals can join industry bodies and institutes that will verify expertise and qualifications earned over many years of successful training and operation. However, more and

more names on social media are granting themselves the postnominal of SME (Subject Matter Expert). Industry peers and leaders should only acknowledge an individual that has passed this high bar as an SME. Most true industry leaders are humble enough not to call themselves subject matter experts. Every day is a school day, and we should always be learning, not being naive enough to call ourselves “experts”. Arrogance Narcissism then leads nicely (or not so) into the next damaging characteristic flaw of close protection operatives, arrogance. Arrogance – unpleasantly proud and behaving as if you are more important than or know more than other people. Arrogant operators will make statements such as: “I know everything there is to know about the industry, been there done that, and you can’t tell me anything I don’t already know!”. Such beliefs are not just wrong but dangerous. Professionals should always learn and update 23


CIRCUIT MAGAZINE ISSUE 62 their skills and knowledge in the face of ever-changing scenarios and situations, threats, risks, technology, and tactics. As operators progress through the industry, the more naive and arrogant operators place themselves on a pedestal. Prima donnas may declare themselves too good to cover “menial” tasks such as RST or security drivingroles.

The pandemic should have taught us that you cannot and should not be a job snob. But we hear the constant whine of self-appointed SMEs, “security consultants”, and “bodyguards” proclaiming that they no longer cover RST shifts, only the elusive well-paid close protection or executive protection tasks. So, let us look behind the statement:

I know everything there is to know about the industry, been there done that, and you can’t tell me anything I don’t already know! 24


FATAL FLAWS OF THE MODERN BODYGUARD “I don’t work RST anymore“. Professional executive protection operatives in London spend most of their time in hotel corridors, offices, and private homes, waiting around, ready to jump into action at a moment’s notice. Perhaps they are not monitoring CCTV or alarm panels. Still, they are sitting around for exceptionally long periods, even for such a long time that the actual RST team has changed shifts! So, should these CPOs feel they are too good for RST tasks? If they do, then their close protection career will most likely be shortlived. Insecurity Insecurity – uncertainty or anxiety about oneself, lack of confidence. How can an operative be both insecure and arrogant? Insecurity is a hidden trait within the industry, often masked by arrogance and overconfidence. We can often observe the behaviour within teams. For example, a group member may exaggerate their previous tasks and consistently talk about what they have done, where they 25


CIRCUIT MAGAZINE ISSUE 62 have been, and with whom they have been working. Insecure operators may exaggerate their experience to inflate their ego by impressing the rest of the team. The aim is to create a false sense of security for themselves, especially if they feel threatened by other team members known to be successful, experienced and sought after.

households. Uncertain security team members may be vying for popularity with specific house staff that have the same agenda.

In Summary Narcissism, arrogance and insecurity are undesirable character traits found in individuals in any walk of life. However, they seem increasingly common within the security industry, specifically The insecure operative can ostracise themself from the rest within the close protection sector. of the team with unwarranted The best close protection boasting. Worse still, insecure operatives should be: individuals may attempt to empathetic, not narcissistic; get one over on the other humble, not arrogant; and selfteam members. In addition to assured, not insecure. Close lying about their abilities and accomplishments, they may lie protection freelancers and companies need to market about colleagues hoping they themselves to survive. But will shine out before the client they should not lose focus on or boss. the main objective, which is protecting people and assets Insecure behaviour can be whilst remaining unassuming, even more problematic discreet, and professional. when working within private Westminster Security are an independent private security company based in central London. we have established an enviable reputation in providing the highest quality security services in London. Our services have been tailored to provide complete security and lifestyle management for highnet-worth individuals, families and businesses based in/or visiting London. For more information please visit www.westminstersecurity.co.uk 26


THE COOPER COLOUR CODE

Who’s protecting Who’s protecting Who’s protecting YOU, while you YOU, while you YOU, while you protect others? protect others? protect others?

With our premium tier of membership, we’ve got you covered under the BBA Protect insurance policy, providing complete peace of mind while With our premium tier of membership, we’ve got you covered under the you work in addition to the standard BBA membership benefits. BBA Protect insurance providing we’ve complete of mind whilethe With our premium tier policy, of membership, got peace you covered under Designed forin professionals looking toproviding maximiseBBA their employability and their you work addition the standard membership benefits. BBA Protect insuranceto policy, complete peace ofdemonstrate mind while commitment to industry standards, there are two levels of Protect membership available: you work addition to the standard benefits. Designed forin professionals looking to maximiseBBA theirmembership employability and demonstrate their commitment to industry standards, are two levels of Protect membership available: Designed for professionals looking tothere maximise their employability and demonstrate their PROTECT PROTECT+ commitment to industry standards, there are two levels of Protect membership available: Individual public and products liability Personal accident and health insurance PROTECT PROTECT+ insurance designed for UK Close designed for armed Close Protection and Individual public and working productsinliability Personal accident healthworking insurance Protection operators nonMaritime Security and operators in PROTECT PROTECT+ insurance designed UK Close designed for armed Close Protection and hostile regions. hostile regions. Individual public andfor products liability Personal accident and health insurance Protection operatorsfor working in nonMaritime Security working and in insurance designed UK Close designed for armedoperators Close Protection hostile regions. hostile regions. Protection operators in nonMaritime Security membership operatorsorganisation, working The in As a trusted professional FROM JUST £60working PER MONTH BBA are dedicated to bringing our members the best hostile regions. hostile regions. IT’S EASY TO UPGRADE YOUR BBA

FROM JUSTTO £60 PER MONTH MEMBERSHIP PROTECT YOU. IT’S EASY TO UPGRADE YOUR BBA FROM JUST £60 PER MONTH MEMBERSHIP TO PROTECT YOU. IT’S EASY TO UPGRADE YOUR BBA MEMBERSHIP TO PROTECT YOU.

possible resources and tools to enhance their standing and As a trusted professional membership organisation, The credibility as close protection operators within the industry. BBA are dedicated to bringing our members the best As a trusted professional membership organisation, Theand possible resources and tools to enhance their standing BBA are dedicated to bringingoperators our members thethe best credibility as close protection within industry. possible resources and tools to enhance their standing and credibility as close protection operators within the industry.

Visit our website at www.the-bba.org.uk to find out more. Visit our website at www.the-bba.org.uk to find out more. Visit our website at www.the-bba.org.uk to find out more. Lockton Companies LLP is a limited liability partnership incorporated in England and Wales, registration number OC353198. Authorised and regulated by the Financial Conduct Authority.

27

Lockton Companies LLP is a limited liability partnership incorporated in England and Wales,


CIRCUIT MAGAZINE ISSUE 62

28


HUMAN INTELLIGENCE

By Orlando Wilson

INTELLIGENCE gathering: part 3

Spying Operations Where possible, a network of informers (sources) should be established. You should seek to recruit people who could have information on the targets or are close to them. Methods of recruitment for sources varies greatly from person to person and depends a lot on their personality and reason for giving up information on the target. Our initial phase is to find people who have a grudge against the target; they could be owed money, be exlovers, etc. They could possibly still be in contact with the target or be able to establish communications

because they are seeking revenge or compensation in return for cooperating. The second group of potential recruits would be those who under normal circumstances would not be considered sources of information. These are people who would need to be persuaded to provide information on the 29


CIRCUIT MAGAZINE ISSUE 62 targets. If you believe someone could provide you with information and be a semi-reliable source, you will need to compile a lifestyle check on the person and identify anything that could be used against them. Such as debts, vices (sex, drug or alcohol use, gambling, etc.), extramarital affairs, criminal activity, etc. that they would not want to become public knowledge and, would be willing to provide information on the target to prevent this from happening. A little pressure can sometimes work wonders and useful information and actions should always be rewarded.

giving bullshit reports to his cop buddies so they would fuck with the businessman. The reason the auxiliary cop was trying to contact the businessman was part of his egotistical power trip: he wanted to show the businessman he could fuck with him. You need to ensure the people you recruit are not prone to going on power trips or spending sprees with any cash you give them as they can end up compromising whole operations and getting themselves and others killed.

Everyone in your network should be offered some form of compensation. If you identify a Sources and informants need to potential source has debts, then understand that they should not let money could be the only incentive anyone know they are working for they need to provide information or with you. I know of one situation on the target. Any exchanges of in the US where a businessman cash or assets with sources need had a falling out with someone who to be videoed and could be used in happened to be an auxiliary cop, the future if the source becomes which means they made donations uncooperative. to a police department to be given a police badge. Official records need to be kept on all sources and informants, but The businessman was approached in high-risk environments, where by the local police out of the blue your communications devices and for bullshit reasons on numerous records could be compromised occasions and a few days after you need to be very careful. Code every incident the auxiliary names need to be allocated for cop always tried to contact the sources and informants so they businessman, even though he had cannot be identified by 3rd parties blocked his known phone numbers and in high-risk environments and social media accounts. their personal photos and details need to be kept off record. Source We take it the auxiliary cop was records can include: 30


HUMAN INTELLIGENCE • Name, photograph, and physical description of the source. • Home and business addresses

You need to ensure the people you recruit are not prone to going on power trips or spending sprees with any cash you give them as they can end up compromising whole operations and getting themselves and others killed.

• Details of family • Details of lovers and extramarital affairs • Details of business partners • Source’s motivation for providing information • How the source was developed • Area in which the source can obtain information • Source’s connections with criminal or terrorist organizations • Method by which the source can be contacted • Record of payments or other remuneration • Productivity and reliability of the source. Source Security The identities of your sources must be kept on a “need to know” basis, code names need to be allocated and used as soon as a potential source is identified. The personal security of the source and their family needs to be considered always. If a source is compromised, they need to be informed and if possible relocated ASAP. 31


CIRCUIT MAGAZINE ISSUE 62 If a source is killed or kidnapped, it can lead to fear in other sources who may become uncooperative. It would be good operational procedure for a terrorist group to routinely punish or execute suspected informants within their organizations. Even if those executed were innocent it would serve as a severe warning to those considering becoming informants. If people know they are safe and will be looked after, they will be more productive. All files and evidence on sources need to be kept secure, encrypted and quickly disposable. That being said, security concerns for a source always need to be evaluated and should never inhibit the success of an operation. The Placing of Undercover Operatives This is a situation where one of your operatives tries to infiltrate the terrorist or criminal organization. Your operative would need to appear to be a sympathizer to the terrorist cause and have similar interests to those he or she is seeking to become friends with. When a suitable terrorist or one of their supporters is identified, the operative would try to strike up a relationship with them. The initial approach would not be about the terrorist’s cause but should be about a common interest such as 32

sports, food, dating, etc. You would need to compile a lifestyle check on the target for the operative and identify anything that could assist them in building a relationship with the target. A suitable time and location for this first approach would need to be determined, this is when things can get off to a good start or no start at all. Over time it would be the operative’s job to win the confidence of their target. The path the relationship takes will determine how the target could be used. If they are loyal to their cause they should hopefully be able to supply valuable information. If they are disgruntled with their cause they could be turned or guided to cause friction within the terrorist or criminal organization. How involved the operative will become with the target and the terrorist or criminal organizations will depend on the situation and their safety. If an operative is left in place dealing with the terrorists or criminals for an extended period there is a chance, they themselves could turn to the terrorist or criminal cause. The operative’s mental wellbeing needs to be closely monitored and they should be given continuous reassurance and support. Honey Traps Honey Traps are a spy and criminal


HUMAN INTELLIGENCE

tactic that has been around for as long as humans have, but still people, usually men, end up getting entrapped, extorted, kidnapped or murdered. The trap is simple, usually a woman provides or promises a man sexual favors used to blackmail him or to lure him to a location to be killed or kidnapped, etc… The threat is that prevalent that in May 2018 the British Security Service MI5 distributed the “The Smart Traveler” booklet to help protect UK businessmen from honey traps, substance misuse and other entrapment tactics while doing business abroad. Now think about it: which of the guys you know would say “NO”

to an afternoon of sexual games with two attractive young women if you offered it as a gift? Not many, I expect, well I know for a fact… Such a gift can be easily arranged. You just need two female (or male) prostitutes, a hotel room or better still an apartment or an Airbnb these days. Apartments give more privacy and can be easier to rig cameras in… Then the target’s afternoon of sexual ecstasy will quickly turn into a nightmare for their foreseeable future… Honey traps happen all the time and have since men’s dicks controlled their brains, so forever. At the low end of the scale, the hot chick will promise a night of 33


CIRCUIT MAGAZINE ISSUE 62

debauchery but will just take her target to a shady hotel room or apartment where they can be beaten, robbed and maybe raped by her waiting accomplices. At a higher level, a more intricate honey trap can go on for an extended period of time until the target believes it’s some form of relationship, of course, the sex - the more deviant the better - would be videoed and then used to blackmail them for business favors or hard currency. 34

A common criminal tactic is to pimp out a girl or boy who looks of the legal consenting age for sex and then claim after the sex has taken place, they are underage. That way they have a lot of leverage on the unfortunate and stupid gent who has, unknowingly, possibly committed a serious criminal act: sex with a minor. Psychological Operations In simple terms psychological operations are media campaigns


HUMAN INTELLIGENCE

Promote any injustices you have suffered and how you’re working to rectify the wrongs done to you, your associates and the community.

and other such actions to impact the opinions, emotions, attitudes, and behavior of hostile, neutral, or friendly groups to support the achievement of your desired objectives. Within counter-criminal and terrorist operations properly employed psychological operations can help you gain support and promote a favorable image of your organization or your clients and at the same time discredit your opponents. You need to consider who are the audiences that you need to influence and tailor the information that is given to them to ensure they respond as required. This is where accurate intelligence combined with disinformation can be packaged and distributed to ensure it has the maximum effect. Your audiences can include: • Your opponents: Work out a campaign to discredit and isolate them from their family, friends and supporters. • Those supporting your opponents: Highlight betrayals and failures that can cause infighting and division. • Those who are supporting you or your clients: Promote any injustices you have suffered and how you’re working to rectify the wrongs done to you, your associates and the community. 35


CIRCUIT MAGAZINE ISSUE 62 • Those who are neutral: You need to convince this group that your actions or those of your clients are justified and that you have been victimized. Also, highlight the negative actions and crimes of your opponents. Psychological operations when properly planned can have a devastating effect on the public image and reputation of an individual or organization. These days what the public views on social media can prove to be someone’s judge, jury and executioner. Dissemination Once you have the information, photos or evidence you were after you have to work out and plan how you are going to use it. These days with social media it’s easy to promote stories and videos to a vast audience very quickly and affordably. It does not take much time or skill to set up social media accounts to host stories, photos, videos that can then be promoted to the audiences you want. For non-virtual and real-world applications, understanding people’s circumstances and thought processes can help you solve a multitude of problems legally and discreetly. I once helped an overtly happily married client that was being extorted by a ghetto prostitute he invited to his house 36

when his wife and kids were away for the weekend. To cut a long story short, after making it obvious in the neighborhood where this young lady lived that we were looking for her and wanted a chat, for some reason she did want to talk to me… So, I ended up calling her mobile number that I had from day one. Of course, she knew I was the guy that was looking for her and she offered to meet me and to bring her people with all their guns, which was an expected response. I asked her a simple question, “What would the people in your neighborhood do if they found out you just ripped someone off for $50,000?”. That one question stopped the client being extorted and the girl, stopped contacting him. She knew what the people in her neighborhood would do and so did I. Everything my associates I had done was legal, and we solved the problem, because we had taken the time to understand the target and their environment. Conclusion This is just a short chapter on the basics of gathering human intelligence but can also be used as a guide for counterintelligence if you just place yourselves in the target’s place. Where budgets are available


HUMAN INTELLIGENCE

there are plenty of electronic surveillance options available these days but if you do not have the budget then the low-tech traditional methods of gathering human intelligence are still

as reliable today as they were thousands of years ago when people started spying on each other, which I expect was about the same time they learned how to walk and talk…

Orlando Wilson has worked in the security industry internationally for over 25 years. He has become accustomed to the types of complications that can occur, when dealing with international law enforcement agencies, organized criminal and Mafia groups. He is the chief consultant for Risks Inc. and based in Miami but spends much of his time traveling and providing a wide range of kidnapping prevention and tactical training services to private and government clients. 37


CIRCUIT MAGAZINE ISSUE 62 By James Bore

cyber security fundamentals

Building on

Quicksand The vast majority of modern internet technology is built on foundations that make the average sandcastle look earthquake-proofed.

38


BUILDING ON QUICKSAND It's a fundamental flaw in the way that software engineers and developers operate and interact with the open source community, combined with the massive complexity of code that exists today. Those who aren't involved in the development of software rarely understand how many layers upon layers of complexity it's built upon - in fact many of those who are involved in software development fail to understand quite how unsteady and teetering their work is.

The Problem of Standards One is that the requirement for all modern software and hardware to interoperate effectively with any chance of working (which, given the number of different systems involved is a miracle in itself) means everything is working with a standard set of protocols for communication and messaging. These have been tried and tested over the years, but every now and then an unexpected problem comes up with them that means everything breaks.

There are two fundamental problems.

In 2014, on an otherwise normal Tuesday morning in August,

39


CIRCUIT MAGAZINE ISSUE 62 large parts of the internet simply stopped responding or only responded intermittently when people tried to contact them. This wasn't due to a sophisticated attack, or damage to an undersea cable, or even a fire in some data centre. Instead it was a problem with memory limits and Border Gateway Protocol (BGP), the protocol which allows separate networks connected to the internet to communicate effectively with each other. BGP uses a set of routing tables to route messages and in some older hardware, critical to the functioning of the whole system, the memory chips used meant that it was limited to 512,000 entries. When the tables started to reach that and exceed it, they started to fall over. The extent of the damage isn't well-recorded, but it covered major websites and was felt worldwide for multiple hours. Like BGP, many of the protocols our technology relies on were developed before our systems reached the complexity and interconnectedness they have today. While some have been redeveloped, redesigned, and rewritten to account for changes 40

Anyone with fairly basic technical knowledge could query a supposedly secure web server running the library and retrieve random sections of memory - which could contain anything from random useless data to unencrypted passwords.


BUILDING ON QUICKSAND and provide future-proofing, getting these new protocols rolled out raises it's own challenges (if you ever want to upset a network engineer, ask them how the IPv6 rollout is going and whether they'll be ready to decommission IPv4 next year). Even where the protocols themselves don't throw up fundamental flaws when new circumstances arise, software developed to use the protocols can have its own problems. Also in 2014, this time in April, a vulnerability nicknamed Heartbleed was revealed in a piece of software called OpenSSL (it had been introduced into the library in 2012). This flaw meant that anyone with fairly basic technical knowledge could query a supposedly secure web server running the library and retrieve random sections of memory - which could contain anything from random useless data to unencrypted passwords. A patch was released the same day, but even a month later it was estimated that 1.5% of the top 800,000 websites using the protocol that OpenSSL enabled were still vulnerable. Even in 2019, a tool called Shodan reported

91,000 vulnerable devices were still online. With these shared protocols we have risks of obsolescence, discovery of vulnerabilities in the protocol themselves (WiFi encryption used to use a protocol called WEP, now breakable to retrieve the password for a network and decrypt all traffic passing through it with a few minutes work, a laptop, and a cheap WiFi dongle). We also have problems of vulnerabilities being deliberately or accidentally introduced into the software libraries which provide these protocols and are integrated into applications across the planet (often with no real maintenance effort). It Gets Worse - Jenga! As if these problems were not bad enough we face a whole new class of issues when we look to lessessential but more useful software. Many applications integrate standard, open source libraries to provide key functions. Open source software has its code published online under varying licences for anyone to use as part of other projects. In March 2017 around the world applications suddenly broke with 41


CIRCUIT MAGAZINE ISSUE 62

their software in a fundamental way often without their knowledge. Companies such as Facebook, and ironically Kik themselves. That A man called Azer Koçulu had package had been downloaded received threats of legal action about two and a half million times from a trademark lawyer representing a company called Kik. in the previous month, and now every single one of those complex The story rumbled on for a while, applications catastrophically broke. and then the software repository where the package Kik objected to took action and renamed it, Despite this important lesson, little has changed today with software ignoring any protects by Koçulu. companies still using open source components and trusting them as Objecting to this action Koçulu, who had written over 270 part of every-more complicated packages and hosted them on the applications. I've written before about supply chain threats, site for anyone to use, decided to take everything and go elsewhere. but even where organisations are acting to limit threats from managed service providers and One particular package was only application vendors they rarely eleven lines long. It did very little, understand the fragility of the just a simple utility function, one which companies had built into underlying structure and there are no warning, to the despair of developers everywhere.

42


BUILDING ON QUICKSAND

Despite this important lesson, little has changed today with software companies still using open source components and trusting them as part of every-more complicated applications. This year alone we have seen several critical and widespread vulnerabilities affecting thousands To put it bluntly, the shining of systems, due to flaws in open edifice of modern communication source packages unsupported by the companies who make technology no matter how use of them. It’s likely these will impressive it may to look is held together at its foundation with little only increase as more people more than spit and chewing gum look for them, so make sure any technology you work with is kept with failures unpredictable and often dependent on the goodwill of up to date with security patches from an authorised source and those who volunteer their time to support the software on which it all keep an eye on what’s used inhouse. rests. no signs of things getting better soon.

James Bore is an independent cybersecurity consultant, speaker, and author with over a decade of experience in the domain. He has worked to secure national mobile networks, financial institutions, start-ups, and one of the largest attractions’ companies in the world, among others. If you would like to get in touch for help with any of the above, please reach out at james@bores.com 43


CIRCUIT MAGAZINE ISSUE 62 By Denida Grow & Chris Grow

Social Media Investigations and Monitoring for Risk The use of social media and the way it affects our lives and businesses have brought a new challenge to the security industry and the protective team’s responsibility.

44


SOCIAL MEDIA INVESTIGATIONS It gives the entire world the ability to look into people’s lives with the mere push of a button. Scandals are created, secrets exposed, and lives ruined. In the case of personal security, social media can be used in the advancement of a protective detail; however, one must know how to utilize it properly. Today, we will talk about Social Media Investigations and Monitoring. For those who are not aware of the term, as we utilize it in protection circles, Social Media Investigation and Monitoring is the process by which you can identify what is being said about your clients, a brand they represent, or the corporations with which they are involved and any threats or dangers that may exist in relation to those aspects. As we sift through different social media platforms and online channels, we must then determine if what is being said has any significance regarding your clients’ reputation, persona, and safety and if there is the need to mitigate any risks. In other words, it’s like setting up an online, social media “net”. This process then helps you discover everything that is being said, written about, or portrayed

on social media and determine its relevance to your clients. You can gather information about the ‘’public opinion’’ surrounding your clients, about people or entities who are angry with them for one reason or the other, people who are obsessed with them, or people who are making online threats. SOCMINT or Social Media Intelligence (not to be confused with OSINT) has seen a huge rise in necessity due to the use of social media and a competent protective detail needs to always be informed and social media investigations and monitoring are a huge part of this process. Now, let’s see some examples of how social media investigations and monitoring applies in protective services. Let’s say one of the people you are protecting belongs to a large pharmaceutical company and they decided to raise the price of a specific drug, thus affecting the lives and wellbeing of thousands of people. Perhaps another client is involved in a financial institution that quite suddenly makes a significant decision that affects people’s lifetime savings and pensions. You can imagine that there will be a significant 45


CIRCUIT MAGAZINE ISSUE 62 number of people who become very angry, and some may want to harm your client. During the recent pandemic, there were a number of “anti-vaxx” groups that were quite vocal and utilized Facebook as one of their many platforms to accomplish their goals. Another example would be the need to discover if there is someone using your client’s name or company to scam others and commit crimes. We are sure that many of you today are aware of the infamous ‘’Tinder Swindler’’, Shimon Yehuda Hayut, who legally changed his name to Simon Leviev to pretend to be the son of the billionaire Lev Leviev and used his name and company logos to scam people. Although his actions were known since 2017, it was only after the airing of the Netflix documentary in 2022 that the Leviev family found out and filed a lawsuit against Hayut for falsely portraying himself as the son of Lev Leviev, receiving benefits, and committing crimes. According to Leviev’s family attorney, Guy Ophir, they will now include anyone who has 46

Another example would be the need to discover if there is someone using your client’s name or company to scam others and commit crimes.


SOCIAL MEDIA INVESTIGATIONS attempted to make a profit from his scam during the next lawsuit. What we can ask is, as security providers, why didn’t someone from the real Leviev family ever discover this scam artist who was extremely public and active on social media as the ‘’son of Lev Leviev’’? Although the real family members were never part of this fraudulent scheme, and it didn’t appear to affect their safety, it did, however, involve their name/brand in a very public and negative way. In other words, it should have definitely been considered as a threat to their reputation. Other people who were harmed by this scam artist were the businesses who did work with them, and their secondary service providers as well. Another interesting case to mention is Elon Musk where he, the actual client, took it upon himself to "solve" the issue and directly contacted the person of interest who had begun posting his private flight details and created the security risk for him and was literally blackmailing him unless the POI was paid. According to media reports "Elon Musk states social-media

accounts that track his travel movements are 'becoming a security issue.” Tail numbers and yacht names of billionaires are increasingly being shared on online platforms and one can track them by having the appropriate app unless significant efforts are made to secure them from the reach of those diligent few. These are some unique specific details that the security team needs to pay close attention to at all times. Since Social Media platforms are the way people today communicate with each other, we as security providers must keep in mind that this is not always a positive aspect. Perhaps a person or persons will utilize social media to collectively gather people with their same goal or mission, to get together and plan their next move (Example: protesting outside your client’s house or corporation). In this case, you will want to know what is being said online about the person you protect to determine if there is something of extreme necessity to include in your risk and threat assessment and then take protective measures as well as inform their legal department. 47


CIRCUIT MAGAZINE ISSUE 62 As we have all witnessed too many times, it only takes one well-placed picture or story regarding some alleged activity on the part of your client, and it will go viral quickly, truth or not. Staying one step ahead of this type of “attack” has become a crucial necessity in order to protect your client from embarrassment or exposure. One of the most common issues in recent history is when personnel close to the client i.e., family, staff, vendors, and any other secondary customers post pictures, stories, or opinions and subsequently fail to understand the negative effect these types of communications can and will have on the client’s life, business, and the lives of their loved ones.

3. To evaluate a threat (someone is posting online threats directed at your client).

2. To discover what information about your client is posted online either by himself, the ones close to him, or his employees and evaluate how these affect his safety.

10. To mitigate risks from the information found online about the person you protect (How are the pictures of my client used or tampered with and for what purpose?).

4. To add to your due diligence. 5. To geolocate a picture or a video, sometimes even audio. 6. To include any findings in your Risk and Threat Assessment (We can never highlight this enough, social media surveys and investigations are now a critical part of your Risk and Threat Assessments). 7. To find people obsessed with or following your clients (stalkers).

8. To identify hate groups or terrorist organizations that Why do you need a Social Media may affect your client. Investigations and Monitoring Strategy when you are a 9. To identify people or security services provider? To businesses your client may or summarize we can say: may not want to do business 1. To identify new threats. with.

48


SOCIAL MEDIA INVESTIGATIONS

11. To identify if someone is impersonating your client or a family member. 12. To find out if your client’s moves/visits/travels are posted online (Exposing them to others who may be in the same hotel, conference room, restaurant). 13. To identify workplace violence or insider threats indicators. 14. To find out what is the ‘’public opinion’’ regarding your client (Always keep an eye on what is being said

about your client and have a strategy to respond). 15. To determine if a person or persons are utilizing your client’s name or business name in a malicious or unauthorized manner for their own personal gain. (Claiming associations or partnerships, etc.) How to perform Social Media Monitoring for security purposes? First, let’s clarify one important thing. ‘’Googling it’’ is not enough, nor is it the answer. There are a number of search sites that allow for user input thus 49


CIRCUIT MAGAZINE ISSUE 62 watering down or contaminating information and it’s accuracy. For those who are not aware, Social Media Investigations and Monitoring is quite a different department of protective services and quite often falls under Intelligence Analysis and Open-Source Intelligence. It requires unique skills and knowledge. One must clearly understand different social media and research platforms and how to use each one of them (and/or in combination) to obtain information. How you will approach each case is different and certainly depends on who your client is, their business, close relations, and/ or their public image. This will directly affect the searches and the resources used and for what purpose. It is vital in our current day and age to include SOCMINT (Social Media Intelligence) in your client’s service proposal, no matter how public the person may or may not be. Hiring ten Executive Protection agents and a Residential Security Team is not enough anymore. SOCMINT services are a vital part of your Risk and Threat Assessments (Dynamic Risk Assessments too) 50

and enable your protective detail to function more efficiently. For those who can not provide a certified Social Media Investigator for their clients, follow up with these steps: 1. Understand who your client is, his/her background, the threats, where do they stand in political, social, financial sectors. 2. Be aware of any of the latest changes in your clients’ lifestyle, public opinions, and professional decisions. 3. Be aware of any of their political and social changes. Watch the news from multiple channels. 4. Familiarize yourself with all close family, friends, staff, and associates and their respective social media footprints. 5. Set up a social media investigation and monitoring strategy. 6. Have a good understanding of the Intelligence Cycle (How the intel is being collected,


SOCIAL MEDIA INVESTIGATIONS analyzed, disseminated, reviewed, etc.).

As the threat landscape changes every day, we as protection providers must be able to adapt and keep ourselves up to date with additional training.

7. Have a good understanding of the search tools on different platforms (Facebook, Twitter, Instagram, TikTok, LinkedIn, Tumblr, Reddit, etc.) 8. Do research on the available search engines and the strengths and limitations each one may have. 9. Know how to conduct image, video, and audio research and gather intelligence from them. 10. Invest in appropriate platforms for social media investigations and monitoring (Have in mind, NEVER rely on one platform’s result or just platforms’ results. The user/ investigator is the main component of a social media investigation). 11. Download and use appropriate search engines extensions and apps. 12. Invest time in creating ‘’sock puppets’’ or fake profiles 51


CIRCUIT MAGAZINE ISSUE 62 every day, we as protection providers must be able to adapt and keep ourselves up to date with additional training. Today’s executive protection agent must also be skilled and knowledgeable in investigations, 13. Train yourself in link analysis (How to look for open-source intelligence, protective intelligence, HUMINT, connections between people, events, and and have an increased understanding of cyber security. organizations). Large corporations have already created their own embedded 14. Set keyword alerts (In intelligence departments, while multiple languages in case others are hiring threat analysts your client has ties with and OSINT investigations from more than one country). outside security providers. The 15. Gather, analyze, evaluate, rise of protective intelligence, and report your findings to and whatever that includes, is the appropriate department here to stay and we are seeing it more and more through the or leadership. highly increased number of As the threat landscape changes related job postings every day. and maintain their persona. Sometimes you may need a profile to have access to different forums or groups without being discovered.

Denida Zinxhiria Grow is the Founder and CEO of Athena Worldwide, Athena Academy and Nannyguards. She uses her personal experience as an Executive Protection Operative and Security Consultant to help others learn what it takes to master the ins and outs of the Security Industry and empower women in the security industry. Chris Growisan Executive Protection Specialist with 30 years of experience in a wide range of operational theaters. Through progressive exposure to national and international security, Chris has designed and executed successful risk and threat assessments and implemented security plans and strategies to mitigate risk and enhance security for multi-cultural clientele across many different industries. 52


53


CIRCUIT MAGAZINE ISSUE 62 By Krisztian Zerkowitz

tactical medicine why counting on an ambulance is a bad idea A critical look at your medical readiness So, to start, I understand if you're reading this you might disagree with some of the things being said, or have a different view, opinion, or experience and that is fine. This text is merely based on my own experience, working with different teams and clients around the world. Also, I'm pretty sure everyone is well prepared and has plans for everything that might happen and what is described below, is just a “minority” case. But again, speaking with protection agents 54

and teams and companies, having been on several missions as a close protection officer or medic I must say that this might not be true every time all the time. This article describes somehting that I have spoken about before, have published before but it is


TACTICAL MEDICINE

55


CIRCUIT MAGAZINE ISSUE 62 also my belief, that the way the world is turning today, we need to re-examine this, read about again so we can have a true and critical look at it, re-asses and go from there into a future that is looking promising for those working in this field. It seems that some people disagree about the need of having a paramedic on board. There is cost to consider of course, having a paramedic is going to cost you (or the client). But, it is important to note that not everybody is a paramedic, not everybody is a medic, hell not everyone is a first aider. Doing your one yearly refresher course on your first aid, FREC of FPOS doesn’t make you efficient in anything. Be honest, it doesn’t! Of course, when the client asks, we are all trained, in date with our training needs (worst answer ever, is that we comply with governments guidelines on required medical training) and can solve any issue that might arise on the way. Set the expectations right! We can’t solve all the issues and depending on what a client is willing to pay, will determine what issues we can solve. This is a very strong statement and goes well with medicine as well as drivers as well as the capacity of the team when 56

It seems that some people disagree about the need of having a paramedic on board. There is cost to consider of course, having a paramedic is going to cost you (or the client).


TACTICAL MEDICINE it comes to their direct action drills. Pay peanuts, get… well, you know. Back to why counting on the Ambulance service is not a good idea. And here, I am not talking about non-permissive environments but talking about western cities like London Brussels Paris, capitals, for my friends in the United States Washington, Boston, New York, the western world as you might call it and thus in a place where the health services are very well organised, and the ambulance should be on scene within a certain amount of minutes But then why is it not a good idea to count on this well organised service while we are protecting our principal? Protection is safeguarding our principal from bodily harm, disgrace and death. We deal with this all the time working very professionally, doing recces of venues, doing access control, checking roads and using our skills to put them in a protective bubble while on the move. We know the nearest hospitals, the emergency numbers, safe locations, etc etc. However, there is one case (a multifaceted case) when we (or some of us) provide a very

bizarre answer. Car accidents, heart attacks, illness, choking (think of principal in restaurant), a swimming accident, a fall or even a violent attack… we count on the well-organized emergency health services, or our ability to get our principal as fast as possible to a hospital for definitive care. But let’s examine this. We spend our days and nights keeping uncontrolled, unauthorized, and unknown people out of the way of our principal. We check venues, post advance teams, do bomb sweeps, and even have a private vehicle with driver ready 24h/24h because well, we don’t trust anyone else driving him around. Now something has happened, and we give up on ALL of that, we believe that that one incident is THE scenario of the day, and we call in a third-party player, that we have never met, is usually underpaid (if you are in security, you understand why this can be an issue…) to solve the problem. We call in a third party to: solve the medical problem, to transport the principal and all this, without any control or knowledge about what is being done. Being transported, in the best case with you in the back of the ambulance, but depending on where you are, this might 57


CIRCUIT MAGAZINE ISSUE 62

or might not be possible, to a hospital that you have no control over, that hasn’t been checked, where you don’t have an advance team… And this is the BEST case scenario, if you have a medical emergency that allows you to call for an ambulance. Imagine the worst, an attack, where your SOP is to extract and evacuate your principal, now you are shoving him into a car or a designated “safe” place, while they might be having life threatening injuries that require advanced medical care (the tourniquet won’t do). In this case, you also 58

count on getting the ambulance, to that “secret” safe place, or a rendezvous with your car somewhere while your principal is dying in the back of your car? So why do all that we do when everything is peachy, if so many of our protocols can be discarded the moment ONE thing goes wrong? Your paramedic on the team, and making sure that ALL team members are REALLY trained and have a good level, in date experience with some more than CPR medicine, will make the difference between what could


TACTICAL MEDICINE potentially become a headline, not a positive one.

Count on getting the ambulance, to that “secret” safe place, or a rendezvous with your car somewhere while your principal is dying in the back of your car?

Besides this, having an advanced medical professional on board, will also help your team and your principal in less extreme conditions. Recognizing signs of possible issues at forehand and solving them before they become incapacitating might be just what your principal needs, remember, its not just life you are protecting, also dignity. Consider your current medical set up, training and what you content yourself, your team and your company with. It is not important until it is, but unlike batteries for an empty cool flashlight, you can’t get these skills on the fly or when it all of a sudden becomes necessary. There is a side note, that does need to be mentioned and this is your scope of practice and what you can and should and shouldn’t do. Of course, we are all for doing “whatever it takes” to solve the situation and also, I have found myself guilty saying: “I’d rather ask forgiveness than permission” when it comes to saving someone’s life. But this is not necessarily true and in an industry that is partially about security and partially about the 59


CIRCUIT MAGAZINE ISSUE 62 insurance policy, it is important to consider the legal aspect of things. You can not be accredited to be a paramagician everywhere in the world and at every location where you might travel with your principal. So this too, should be part of the evaluation of the team you put together and where you are getting your medical support from. This is a side note and maybe a little of topic. But, considering the scope

of practice, if you are from the US and planning on getting the same type of medical support as at home, when you are e.g. in Belgium, you will be in for a surprise when you find out that you just called a fast-taxi and your lack of local knowledge and your plan to use an ambulance got you just that… Keep safe, keep fresh and never hesitate to question yourself and your team. You can only improve if you look forward!

Krisztian was raised as a Diplomatic Close Protection Officer, working mainly for diplomatic missions, including assignments to the Middle East and Africa. Recently certified as a Tactical Paramedic, Krisztian spent the last 10 years of his protective career specialising in tactical medicine in high-risk environments and close protection. Two passions combined where enough remains to learn and experience. 60


THE THEORY OF COVERT SURVEILLANCE • • • • • • • • •

Surveillance Operators Bodyguards Surveillance Instructors Professional Investigators Enforcement Officers Intelligence Officers Police & Military Security Consultants INVESTIGATIVE JOURNALISTS

Zap It...

E V I CT

Surveillance Training Course Handbook A R TE

The

IN

By Peter Jenkins ISS TRAINING LTD

www.Surveillance-theory.co.uk

61


CIRCUIT MAGAZINE ISSUE 62 By Luke Daniel

Team Behavioral Traits Show Mindset Gaps Where your team exists on the Workstyles Framework may have more valuable information than most leaders even think possible.

62


TEAM BEHAVIORAL TRAITS SHOW MINDSET GAPS One of the tools I use when working with business leaders is The Predictive Index’s Behavioral Assessment. Some leaders have had experience with other Behavioral Assessments such as the DISC or the Big Five (Five-Factor Model). These behavioral or personality assessments place a value on the measured drives and compare those results to data that had been previously collected. The Predictive Index’s Behavioral Assessment isn’t much different in that aspect.

Workstyles Framework, allowing leaders to visualize in what quadrants their people live.

PI’s Behavioral Assessment looks at the four significant drives related to the needs and motivations of a person. Then it visually shows how much purpose the person has in that specific area. Those results are then transferred onto the

• Process and Precision (Bottom left quadrant)

Workstyles Framework Explained The Workstyles Framework has four quadrants and is broken up like a pie. Starting from the top left quadrant, they are: • Teamwork and Employee Experience (Top left quadrant) • Innovation and Agility (Top right quadrant)

• Results and Discipline (Bottom right quadrant) These quadrants represent the two highest factors or

Workstyles Framework

63


CIRCUIT MAGAZINE ISSUE 62 drives that each person is likely to be most motivated. Meaning where a person falls on the Workstyles Framework directly correlates to how they will interact and act within the workplace. Here’s a blank example of the Workstyles Framework.

As you can see in the image, the quadrants are relatively large, and there’s lots of room for each individual to be. Since there is a large area in each quadrant, where the person exists depends on how strong each driver is. The highest two are used to identify which quadrants act as the starting point. For example, I live near the middle of “Teamwork and Employee Experience,” which shows that I am team-focused and would rather worry about how the team feels than building processes or following 64

through with highly analytical tasks. Because I tend to focus on the team and have a strong desire to collaborate and maintain harmony, I may lose sight of the desired results. Another work behavior observed is that I only follow the rules that I see fit or the team has reached a consensus. My current team and others who work closely with me can confirm those behaviors. When the entire team, including myself, is aware of these traits, drivers, and workplace behaviors, we can lean into them and positively utilize them. As a result, there will be fewer daily battles to counter and fewer instances of negative butting of heads with each other. Since no two people are the same, the Workstyles Framework allows us to visualize and compare each individual’s strengths to the team and opens the door to the journey of self-awareness. The group should undertake the journey to build trust, reduce negative conflict, and strengthen the culture of building leaders at every level of the organization.


TEAM BEHAVIORAL TRAITS SHOW MINDSET GAPS

Because I tend to focus on the team and have a strong desire to collaborate and maintain harmony, I may lose sight of the desired results.

People who live in different quadrants of the Workstyles Frameworks will have other behavioral drivers and traits which align with those quadrants. One key factor to note is that the top left quadrant is more team-focused and prefers to talk issues out with others. The bottom two quadrants are more task-focused, analytical, and desire to work through things independently rather than talk them through with their team. The following example will discuss why behavioral diversity is needed to keep teams from falling into thought traps and explore examples of just that. Lacking Behavioral Diversity Example During a recent consulting project with a Forbes 20 company, some mindset gaps were noticed that brought about the idea for this article. I was asked to train the Executive Protection team over the Baselines of Behaviors Framework. When training clients, I have found that utilizing the Predictive Index’s Behavioral Assessment is an outstanding tool. This tool gives the students an immediately 65


CIRCUIT MAGAZINE ISSUE 62

accessible report with their basic behavioral drives. As a result, it allows me to tailor my message to reach the students at their level. Some students need time to work through the material independently, and others prefer to talk it out as that allows them to assimilate the information. Being aware of that as an instructor has shown to be invaluable. As discussed above, because I live in the Teamwork & Employee Experience quadrant, I prefer to talk about topics to understand the concept fully.

in the Workstyles Framework to see where they all found themselves. The process was more for my due diligence than being shared with the crew. The company hired me for training rather than diving into the team’s culture and the larger organization. During the second session of training, the mindset gap became glaring. And that hypothesis was solidified by the conclusion of that session.

As I was gaining a deeper understanding of the roles and responsibilities each team member held while working After the EP team filled out their overseas, each team member BAs, I placed them as a team shared that they had very 66


TEAM BEHAVIORAL TRAITS SHOW MINDSET GAPS few resources while on the ground and operated as “solo practitioners” the majority of the time. Even when working in locations such as China or India, the EP team members held most of the responsibilities of protecting and managing their principals. The team is responsible for the entire C-suite, and the company has a global footprint. Team members shared stories of working in large venues and meetings where politically charged groups protested, and large numbers of staff were being let go from the company. Yet, each time, the agents were short-handed and working by themselves, no matter the location. Scarcity of resources By the time we got to the fifth team member, the Training Director, the lightbulb had clicked for me. The Training Director (TD) explained that before any significant event (no matter the location), he would travel to that location and hold a two-day training session for local Asset Protection (AP) agents. This two-day training covered the Standard Operating

Guidelines of the EP team and facilitated the local agents’ integration with the larger EP team. In addition, these local AP agents were there to support the “solo practitioner” while their protectees were on the ground in the country. The AP agents were tasked with interfacing with local uniformed guard companies and to act as the middle ring of protection. Thus, the outermost circle is the uniformed security guards, the middle ring is the additionally trained AP team members, and the innermost is the dedicated EP team member. This concentric ring approach is widely used within the protection industry. When the TD told me this, I was sort of taken back because I immediately thought that those additional resources were being utilized and supported the EP team from the time they arrived to conduct their advances through when the client goes “wheels up.” Once the TD finished his story, I verified that even after sharing how they train additional local staff to work with and support the EP team, they still felt they were operating as 67


CIRCUIT MAGAZINE ISSUE 62 solo practitioners. Yet, to my may not be the entire reason for amazement, each team member the distrust or lack of inclusion, shook their heads in agreement. it plays a heavy role. I shared with them that their working alone was a stark contrast to another corporate EP team, with a similar global footprint I had trained who contracted out ex-seals to run their Counter Surveillance Team. The budget and how well the threats are communicated seem to play a prominent role in the accessibility to resources.

Because each member of the EP team fell in the lower two quadrants of the Workstyles Framework, they were naturally slow to trust new people, less driven by social interactions, and preferred to work through problems on their own. As a result, they showed a strong desire to observe data before making a decision (such as the need to include the AP agents After the session was completed, in their mental picture of their the TD and I spoke at length team). about the thought that the local AP agents were not supporting Awareness and understanding the EP team. They had a role to can correct that thought or play, and they did a phenomenal mindset gap by identifying the job at it. But the EP team still issue, acknowledging that it felt they were a separate may be counterproductive, and entity. From the conversation, working as a team to include it became clear that the team and trust the local AP agents worked closely together and had more. Adding a team member spent years building trust within (a Balancer or someone in an the group. But, unfortunately, opposing quadrant) who is more that trust did not extend open to collaborating with the beyond those walls even when local AP agents could also open the group trusted the local AP the door to better utilization of agents and had made a positive the scarce resources when they long-term relationship. are available. In my opinion, the lack of trust outside the team can be linked to the behavioral drives of the EP team members. Although it 68

Team Balancer Examples It’s a topic of conversation often when speaking with startup companies that the leader


TEAM BEHAVIORAL TRAITS SHOW MINDSET GAPS tends to hire people similar to themselves. It’s partly because it’s easier to get along with those who share the same drives as the leader and partly because confrontation is never fun or can be looked at as a time sink. There’s some logic there for sure, and some significant issues can arise when that situation is left unchecked.

common goal. Having a Balancer on the team can bring a whole new dynamic. For example, shifting the group’s mindset or allowing a new and different perspective to join the conversation.

So what is a balancer? Balancers are what we call those individuals having behavioral strengths Having the capability to visualize opposite those of most team what your team's motivating members. drives are is one way to identify if that’s happening. It’s one A Balancer does not live in the of the major perks to the same quadrant like the other Workstyles Framework and or majority team. For example, the BA report that each person in the figure below, we can receives when taking the BA. see that the leader exists in the Teamwork & Employee Positive conflict leads to Experience quadrant. On the increased trust and a positive other hand, the Balancer exists culture where each team in the Results & Discipline member works toward a quadrant.

69


CIRCUIT MAGAZINE ISSUE 62 The previous visual, observed while working with a different client, shows an ideal balancer. The represented client is a training provider with a global footprint and a high-performing Adapting team. The group leader is the CEO, and they live in the top left quadrant. The company’s second in command, the COO, exists in the bottom right quadrant. When we explore how these two interact, we can see that there may be friction between them as the CEO prefers to talk things out while the COO likes to think through the issues first. However, these two have spent years building trust between themselves and the rest of the team. That trust allows them to disagree openly and work through the conflict to understand that they are working toward the same goal - to deliver the best training possible while maintaining their market presence.

was able to accomplish their mission, there were significant moral issues and a level of turnover that was not conducive to the company’s culture or the students they were serving. The tasks needed to set up and break down the site were the same every time, but the crew would often find themselves working well into the night to complete the tasks. An average day would start with breakfast at 6 am and end around 10pm.

Once the COO was able to gain a slight amount of autonomy and leaned into their natural behavioral drives, a slew of new Standard Operating Guidelines was produced and implemented. But, unfortunately, the CEO was not suited for building and implementing those SOG’s; instead, the CEO was suited to share their knowledge and put students in their seats. The mentality of the CEO The win shows up when we changed from closing the doors look at the company’s growth due to all the negative personnel over those past years. When issues to building and growing the COO first came onto the the team, developing new ideas team, the team was spending to push the market space, and an absurd amount of time having massive control over setting up and tearing down the the corporate clientele in that training site. Although the team market. 70


TEAM BEHAVIORAL TRAITS SHOW MINDSET GAPS

There is always room for improvement on any team, even those who are high performing already.

The COO was the Balancer for the crew because they were outside of the “normal” employee profile and were given the opportunity, authority, and autonomy to lean into their natural behavioral drives. Thus, strengthening the team's ability to deliver world-class training, increased team morale, reduced labor time, increased efficiency, and allowing the CEO to do what they do best, bringing in more clients to fill more seats and build and develop the team. Conclusion There is always room for improvement on any team, even those who are high performing already. One tool that has been shown to help identify those areas of growth is the Predictive Index’s Behavioral Assessment and the Workstyles Framework. Coupling that level of understanding with effective and efficient communication creates an open door for development. Communication is broken down into three categories or channels. Those channels each have a weighted value associated with how well the observing party can receive the message. Professor Albert Mehrabian’s studies confirmed 71


CIRCUIT MAGAZINE ISSUE 62

the following results. The language or words which are chosen account for only 7% of the available information being passed along. Tone, or how the chosen words are said, accounts for 38%. The most significant portion of communication is passed along via Nonverbal cues or body language. Nonverbal cues account for 55% of the available information being

communicated. If you and your team are ready to explore your natural behavioral drives and strengths or want to explore where you exist on the Workstyles Framework, let’s connect. Understanding oneself is the first step to building leaders at every level and growing culture for the future!

This article was written by Luke Daniel of Primary Security & Consulting, LLC. Luke’s experiences as a Global Executive Protection Agent, Instructor at Tony Scotti’s Vehicle Dynamics Institute and serious student of behavioral analysis/non-verbal communication have led him to working with Fortune 1000 companies as a leader in human assets “buy in” and business resiliency. 72


TEAM BEHAVIORAL TRAITS SHOW MINDSET GAPS

73


CIRCUIT MAGAZINE ISSUE 62

defensive training principles: By Mark “Six” James CPO, EPS, CAS

The Importance of Discipline in Training Martial science is the study of armed and unarmed combat. It implies a deep understanding of all facets of fighting.

Despite people’s deep seeded convictions to a particular style, there are only so many ways to break a man or women down or index a muzzle on them. Though fighting has changed little over the centuries, it is still about proximity and violence our understanding of how to do it efficiently has increased significantly.

arts can be defined as the art of being a warrior. When I think about being a student martial arts or martial sciences, I often tend to lean toward the science side. Science is based on theories and hypothesis and every phenomenon can be explained through science; thus, it is objective. Art needs no proof it cannot be proved; thus, it is subjective.

The key word in martial arts is Martial. Martial comes from the word Mars (the Roman God of War) and means relating to war, combat, As a protection specialist our primary focus is risk or military life. Therefore, martial 74


DISCIPLINE IN TRAINING mitigation. How do we avoid the confrontation, crisis, or engagement, and when despite of our best risk mitigation strategies we find ourselves at the point of crisis, how do we effectively and efficiently neutralize the threat?

When we look at the definition of discipline most people see it as corrective, negative or punishable, however high achievers regardless of professional business sector, see discipline as enabling.

Discipline Defined noun 1. the practice of training people to When I think about the best obey rules or a code of behavior, executive protection practitioners, using punishment to correct in evitability they are the ones that disobedience. are the most disciplined. They are often extremely self-motivated and 2. a branch of knowledge, typically one studied in higher education. have an unquenchable thirst for "Math is a very old discipline." self-improvement.

75


CIRCUIT MAGAZINE ISSUE 62 verb 1. train (someone) to obey rules or a code of behavior, using punishment to correct disobedience. "Well behaved kids are usually a product of love and discipline. " Student Discipline Understand your strengths and weaknesses, so you can, not only develop strategies around your positions of power; you can increase your focus on your developmental areas. This will in time allow you to enhance your overall capabilities. One of the best ways to increase your skills is learning to get past the embarrassment of things we don’t do well. People go to the dojo, the firing range or any other development center and want to continue to focus on the things they do well, particularly if they are around others. When you are learning a new technique, it often looks very ugly until you can develop the coordination or rhythm for it to flow naturally. Remember it will be bad, before it gets good, but when it gets good, it will be very good. So don’t rush or avoid the process, master if first, judge it later. One of the best ways to help you get past the embarrassment or increase your development is to 76

take private lessons, this allows the instructor to place 100% of their focus on your developmental need, without having to split time with other students who may have different developmental concerns. Another way to enhance your development is to get an accountability partner, as it also provides you a practice partner between training sessions. Most people don’t understand the discipline it takes to develop a skill set let alone a high degree of competency. In the words of Usain Bolt, the fastest man in the world, “I trained for 4 years to run 9 seconds!” Just as trophies and medals are won in the offseason, we just pick them up at meets, competencies are built in practice. Instructor Discipline Training discipline does not just extend to students. As instructors one of our biggest challenges is maintaining the discipline to reconcile, participant expectations with social media sizzle reals and actual skills sets. Skill development when it comes to combatives, or the martial sciences (empty hand, edged weapons, or firearms) is incredibly boring. Practice is often redundant. It is slow methodical (crawl, walk, run) Most instructors and


DISCIPLINE IN TRAINING

participants lack the discipline to allow competency development to happen. Going to training classes don’t make you better. Practicing what you learned in the training makes you better. Practice comes from the Latin word to do. The more you do, the more confident you become.

Consistency leads to confidence; confidence leads to competency. If you aren’t doing you will never build competency. Discipline gives you options and frees you up for application. In the world of combatives, we often use pain as a compliance 77


CIRCUIT MAGAZINE ISSUE 62 tool, when teaching self-defense concepts. When you think about applying a joint manipulation to gain compliance in practice, if the students are not discipline in following instructions particularly when it comes to speed of the practice or amount of recommended force applied if any of the students violates those instructions someone often gets severely injured, often a broken bone. Speed will always come in time. Initially our goal is to merely understand the principle or technique; learn to recognize the lines the hand or the weapon move on. A jab, a prison shanking or a basic firearm draw stroke all move on the same line, a straight one. How a person holds a knife is often an indication of how they plan to use it. Early recognition of the line of attack coupled with efficiency of movement with your countermeasures will yield enhanced speed. Remember practice doesn’t make perfect. Practice makes permanent. Only perfect practice makes perfect. Tactical Team Accidental Shooting Last week I watched a video of a negligent shooting during an apparent tactical team engagement. In the video it 78

How a person holds a knife is often an indication of how they plan to use it. Early recognition of the line of attack coupled with efficiency of movement with your countermeasures will yield enhanced speed.


DISCIPLINE IN TRAINING appeared two tactical team members were engaging threats down range. One of the team members was at his teammates six o’clock (behind him). The rear teammate then retreated approximately two steps further rearward. The forward teammate then shifted approximately two steps right just as the rear teammate leaned right to take a shot.

2. Always keep your firearm pointed in a safe direction. 3. Never point your firearm at anything you are not willing to destroy. 4. Keep your finger off the trigger until your sights are on target and you are ready to break the round. 5. Be conscience of your background as well as your foreground.

The unfortunate thing about team dynamics, is sometimes despite what you see, you must trust your teammate to handle it. The rear team member violated many of the cardinal firearms safety rules and team protocols.

Team Protocols 1. Communication 2. CQB - Maintaining position or contact 3. Arc of Fire responsibility/Sectors of fire (defined area which is covered by an individual…where it begins and ends)

Firearm Safety Rules 1. Treat all firearms as if they are loaded all the time.

The rear team member never earned his shot. He violated a

79


CIRCUIT MAGAZINE ISSUE 62 major protocol of muzzle before meat. He did not get in position to take the shot so that his teammate would not have been forward of his muzzle.

o’clock (Levar covering the left half and me covering the right half).

This is why I so often say, I don’t work with people I have never trained with. This lessens the In the above photo left you see me potential for inconsistency in in a rearward position similar to the coverage models or respective skill set. We don’t have to have other assault team member who the same skill set but we need to executed the negligent discharge. In the right photo you see me push know each other’s strengths and limitations. If you knew nothing forward on a parallel line to get in position for my shot, often referred about sectors of fire or arcs of responsibility, if you are disciplined to as earning the shot. Here you see my muzzle is parallel to Levar’s in your observation of the firearm muzzle, removing him from harms safety rules of: treat all guns as if they are loaded all the time; way. keep the muzzle pointed in a safe If the team members are engaging direction, never point your muzzle at anything you are not willing to parallel to each other, then it is often beneficial to allow two arm’s destroy, keep your finger off the trigger until your sights are on length spacing between each other. This allows each teammate target and you are ready to break to maintain the view of each other the round, and being aware of your background and foreground; in their peripheral vision, while covering their respective sectors of you could avoid flagging your teammate or worse minimize the fire or arc of responsibility. Often potential for a negligent discharge 10 o’clock to 2 o’clock or dividing resulting in injury or death. Stay the sector into two halves left aware, stay focused and stay safe. and right of their respective 12:00 Mark “Six” James is Founder and Executive Director of Panther Protection Services, LLC. He is an internationally published author, keynote speaker, security consultant to educational institutions and frequent contributor to several print, broadcast and online media. Panther Protection Services is a full-service protection agency focusing on Risk and Crisis Mitigation, Protective Services, Self-Defense Training, and Firearm Instruction. www.pantherprotectionservices.com 80


Membership starting from £5

admin@the-bba.org.uk www.the-bba.org.uk 81


CIRCUIT MAGAZINE ISSUE 62

By RANE Worldview by Stratfor, Ryan Bohl

The Need for Reinforcements in Ukraine Backs Russia Into a Corner While Russia is unlikely to declare a full mobilization in the short term, it will likely need to deploy more soldiers to continue waging its war in Ukraine.

This means that Moscow will likely mobilize at least some reinforcements, which could indefinitely prolong the conflict — exposing Russia to more economic problems and pressure from the West. As Russia's offensive in eastern Ukraine grinds on, military 82

analysts increasingly believe the offensive capability of Russian forces in Ukraine will be largely exhausted in the coming weeks, regardless of whether they secure the entire administrative borders of the Donetsk and Luhansk regions. Russian troops now


STRATFOR FEATURED ANALYSIS find themselves outnumbered in Ukraine after losing roughly 15,000 soldiers since the beginning of the war. As Kyiv raises, trains and moves territorial defense battalions to the frontlines, Russian forces will thus first and foremost need more manpower to conduct a new offensive operation, in addition to rest, resources and stronger logistical support. Russia's Options for Military Reinforcements Against this backdrop, the future of the conflict now rests largely in the Kremlin's hands, and in particular, on Russia's willingness to conduct mobilization by raising new troops and readying the country's economy to work on behalf of the war effort. Recent media reports suggest Russian President Vladimir Putin could declare additional mobilization measures — or even war on Ukraine — as soon as May 9, which is Russia's Victory Day commemorating the Soviet Union's role in defeating Nazi Germany in World War II. But even if Putin doesn't leverage the patriotic holiday to make such an announcement, Russia will still need to provide its battered troops in Ukraine with at least some reinforcement. Moscow has three main options for such mobilization — all of which pose considerable

military, political and economic risks: 1) Keep the current course by conducting partial mobilization measures. In this likely scenario, Putin would seek to maintain maximum flexibility by declaring Russia's ''special military operation'' a victory, but noting that defending the victory will be a long-term struggle requiring additional sacrifices from the Russian people. Moscow will choose from a menu of measures to draw additional manpower into the armed forces, which would represent a partial mobilization. The goal of this strategy would be two-fold: consolidate the current territorial gains in Ukraine (specifically the so-called ''land bridge'' connecting Crimea to the Donbas consisting of the southern portions of the Kherson and Zaporizhzhya regions on the left bank of the Dnieper river), and keep pressure on Kyiv to negotiate a peace deal favorable to Moscow. Under this strategy, Russia's partial mobilization measures could include an unofficial mobilization of up to 60,000 reservists in Russia (which Ukrainian and Western sources believe may already be underway); a steady increase the 83


CIRCUIT MAGAZINE ISSUE 62 economic incentive of military with which they should be contract service; a mobilization completed. Because training of troops in specific regions of requirements mean that it will Russia bordering Ukraine on the take months before mobilized grounds of the alleged threat to forces are combat-ready, a them; a decree mobilizing a certain partial mobilization would give percentage of reservists or other Moscow options and peace employees with weapons training of mind no matter how things from federal agencies such as the play out on the battlefield in interior ministry, bailiffs service, the coming weeks. In addition, emergency situations service and partial mobilization measures others for temporary military could sufficiently deter the service; an extension of last year's Ukrainian army from major conscripts' service requirement and counteroffensives. a movement of select conscripts into front-line roles; and, finally, • Constraints: This option could a patriotic campaign declared by raise expectations among the Putin himself calling for volunteers Russian populace without any for military service. guarantee of a greater victory. Hard-liners in the government • Drivers: Russia will probably and nationalist elements require at least some additional could criticize the measures as manpower to confidently evidence that Russia's special stabilize its current control operation has failed, but that of Ukrainian territory in the the Kremlin still lacks the resolve medium term, and the current to take the necessary steps pace of Russians' volunteering to achieve a decisive victory. is insufficient to meet these Should Russian forces prove requirements. These measures capable of holding off Ukrainian would be much less harmful counterattacks (or should to the Russian economy and Ukrainian forces be deterred politically risky than a general from attempting such attacks), mobilization. The Kremlin's these partial mobilization complete control of decisionmeasures would not significantly making means that it can adapt improve Russian military mobilization measures to fit capabilities relative to Ukraine's, whatever it decides its next but would still have political and objectives are and the speed economic costs. 84


STRATFOR FEATURED ANALYSIS

Russia will probably require at least some additional manpower to confidently stabilize its current control of Ukrainian territory in the medium term, and the current pace of Russians' volunteering is insufficient to meet these requirements.

2) Significantly escalate the conflict by declaring war and a national mobilization. In this less likely but still possible scenario, Putin would rebrand Russia's ''special military operation'' into a war to justify extensive mobilization measures in a risky bid to achieve a decisive victory over Kyiv, reverting to the invasion's original maximalist aims. Putin would claim that this massive war effort was the only way to sufficiently ''demilitarize'' and ''denazify'' Ukraine and, in turn, ensure Russia's long-term security as otherwise, low-level conflict would continue to grind as Ukraine maintained its pro-Western course. The declaration of war would open the door for Russia to declare martial law and a national general mobilization. This would make all men between the ages of 1850 eligible for military service, depending on their category of fitness for the army. Men unfit for military service, meanwhile, could be placed in armaments production or other secondary roles. After several weeks or months of organizing and training these reserves, Russia would attempt to use its massive manpower advantage to surround Kyiv and annex as much southern and eastern Ukraine as it desires, 85


CIRCUIT MAGAZINE ISSUE 62 linking up with Transdniestria or going further into Moldova, possibly leaving a rump state in western Ukraine or creating a puppet government modeled off of President Alexander Lukashenko's regime in Belarus. • Drivers: Russia would use this massive mobilization as part of a bid, along with other measures such as raising the nuclear threat level, to intimidate Ukraine into submission in negotiations and deter additional Western support for Ukraine in the

86

following weeks as Russian forces mobilize. Should this fail, Russia would attack with its now significant numerical superiority to achieve its most ambitious stated goals of ''demilitarization and denazification.'' This is because the Kremlin sees the installation of a pro-Moscow regime and occupation of the country as the only sure way to prevent Ukraine from resuming integrating with European and transatlantic structures in the long term. Russia could also use a declaration of war


STRATFOR FEATURED ANALYSIS to force Belarus and Russia's other Collective Security Treaty Organization (CSTO) partners into the conflict that would otherwise resist doing so under all circumstances.

3) Pursue minimal mobilization and rely on negotiations to deescalate. In this more unlikely scenario, Moscow would declare its ''special military operation'' in Ukraine a • Constraints: Putin's repeated victory and claim that it would now false declarations that conscripts pursue de-escalation as it waits aren't fighting in Ukraine suggest for Kyiv to accept the new reality that the Kremlin believes such a of Russia's seized territories in move would be highly unpopular southeastern Ukraine as part of a and would effectively constitute peace agreement. In this scenario, an embarrassing admission that the war is not progressing Moscow would likely unilaterally as originally planned. Russia declare a cease-fire and make small is already confronting tactical withdrawals to defensible shortages of equipment and positions. Moscow would also rations. Bringing hundreds of likely forgo additional mobilization thousands more poorly trained measures under the assumption and poorly motivated troops that its current forces can to the frontlines in Ukraine successfully defend their ground would thus risk only worsening against Ukrainian counterattacks Russia's already poor logistical without major reinforcements. In situation. Russia can already addition, the Kremlin may decide declare victory and can continue against mobilizing more military economically starving Ukraine reinforcements for fear that it'd indefinitely via its naval blockade, provoke costly counterattacks making such a complete victory on its troops by convincing the not worth the cost. Such an Ukrainian leadership to exploit a extensive mobilization, however, potentially unique window during would only exacerbate Russia's which they have a manpower own economic woes by not advantage. But should such only generating new Western Ukrainian counterattacks take sanctions but deepening the place anyway and fail strategically brain drain, as younger and by taking heavy losses, this would more educated Russian men are reduce the extent and necessity of forced from their jobs and many Russian mobilization measures in attempt to flee the country. the future. 87


CIRCUIT MAGAZINE ISSUE 62 • Drivers: Moscow may believe it has already sufficiently accomplished its strategic objectives, as Ukraine will continue to remain a broken, blockaded and outside of Euroatlantic organizations for the foreseeable future. Russia can always resort to mobilization in the future should it feel the situation is truly critical. There is also little strategic reason for Moscow to endure the economic and social consequences of mobilization until such reinforcements are absolutely necessary. Finally, this course of action would most effectively allow Russia to claim that it is Kyiv and the Ukrainians that are continuing the war and an obstacle to peace — an argument Moscow likely believes will be key in turning the narrative in Russia's favor internationally and helping sure up support domestically. • Constraints: Without more forces, many military experts believe that Russia may not be capable of holding their current lines in the coming weeks, in particular on the right bank of the Dnieper in the Kherson region. However, it will take months to adequately assemble, train and transport more Russian soldiers to the 88

In Iraq, Iranianbacked militias will be emboldened to maintain, and potentially even escalate, the violent tactics they’ve already used to break up protests directed at them — pointing to Syria as a validation for their approach.


STRATFOR FEATURED ANALYSIS

frontlines in Ukraine. Failing to start this process now would risk leaving outnumbered and increasingly outgunned Russian troops particularly vulnerable to counterattacks by extending the window in which Ukraine has more manpower. A failure to mobilize could also suggest that Russia is comfortable with abandoning at least some seized territory, which would

disappoint Russian nationalists and collaborators in Ukraine. The situation on Russia's frontline could deteriorate suddenly and quickly, meaning Russia's mobilization could come too late after Ukrainian forces have launched a counterattack — allowing Ukraine to return significant territory before sufficient Russian soldiers can stabilize the front.

Ryan Bohl is a Middle East and North Africa analyst at Stratfor. He holds a bachelor's degree in history and a master's degree in education from Arizona State University, where he studied Middle Eastern history and education. He studied a summer at St. Catherine's College at the University of Cambridge and lived for five years in the United Arab Emirates and Qatar. Link to: Stratfor.com/worldview 89


ASK THE NABA NETWORK Do you prefer the variety of working with multiple accounts/clients knowing there might be a level of uncertainty with gaps between projects - OR Working with a single client/account on a long term basis, knowing the possibility exists it may become too routine or monotonous? j.fair4: It only becomes routine and monotonous if you allow yourself to become complacent. Even though the client and basic scope of the assignment may be the same for an extended period of time, if you are consistently performing risk mitigation and planning for the various issues that could arise or ensuring that safeguards in place so that they don’t… it shouldn’t be boring. Although it’s good to be versed in multiple skill sets, it can take away from a particular one if you’re spreading yourself too thin. A quarterback knows what others need to be doing, but does not snap, the ball or work on defensive technique. Tony Bones: While monotony can breed complacency, and that is always something to be aware of, I’m a huge fan of routine. Personally, I find even “routine” has enough curveballs to keep me on my toes these days. Ray Ace: Single Client. I can control the controllables.

90


Shawn Cooper: In the corporate sector I'm employed in I have several executives that I am responsible for at the office, when they travel domestically or international and their residential concerns. It is definitely enough to keep my team and I busy. However, because most movements and schedules are routine and there are no imminent threats (for the most part) I have seen team members and myself, on occasion, shift gears to neutral. Allowing for complacency to creep in. However, with a new client or jumping from client to client it adds a need to impress and show why the client should continue with you. So your never shifting to neutral. You also find yourself going to locations/destinations that may not be familiar and may make you more aware to details and ensuring efficiency. I think for the financial stability, working with a single client for a long term basis relieves some personal stressors and the uncertainty of work schedules. Tony Ratliff: I am new to the protection profession and would like to develop a relationship with a single client. Focus on what I can do now to improve on the techniques and tactics of this profession. Let my work speak for me on gaining clients based on my proven work ethic. Do the work, stay hungry and be honest and truthful with everyone that I encounter will bear the fruits of my labor. Horace Davis Jr: Although the stability of a single client is ideal for unchanging baseline information and more effectiveness in theory, I would still prefer multiple clients because it makes me more valuable to each client as a go and thus creating the stability one would seek in a profession through true skill tested in various experiences. Tony Bonesr: I am curious how the answers line up with where one is at in their career as well. Because twenty years I used to take as much I could get as fast as it would come. I’m thankful that my “hustle” is much more focused these days. I’m blessed to be in a position where I can have a resume to fall back on, still being able to take what comes when it comes. And I still bounce in nightclubs as well. I do not suffer from boredom.

91


CIRCUIT MAGAZINE ISSUE 62

Global Situation Report ANALYSIS

Each issue our global geopolitical partner, Stratfor, provides an indepth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.

Colombia: Colombian presidential candidate Gustavo Petro canceled events on May 2 in the country's northwestern coffee-growing region after his security team became aware of a criminal gang's plan to assassinate him. Why It Matters: Colombia's upcoming presidential elections are likely to spark an uptick in political violence as criminal groups attempt to influence the outcome of elections by attacking or assassinating candidates, their families, friends, donors or business associates. In addition to attacks against politicians themselves, armed groups may coordinate violent demonstrations that include blockading highways, setting off explosives and burning vehicles across the country as a show of strength leading up to the elections. China: The Chinese government ordered all government agencies and state-backed corporations to remove all foreign PCs and software within two years and replace them with domestic alternatives. Why It Matters: The decision will affect at least 50 million government computers alone, and Chinese technology company Lenovo Group Ltd will likely gain 92


GLOBAL SITUATION REPORT hardware market share, with domestic software companies like Kingsoft Corp. and Standard Software Co., Ltd likely to supplant Microsoft Corp. and Adobe Inc. This is the next step in a decades-long process by the Chinese Communist Party to remove exposure to foreign companies and entities for security reasons. Yemen, Saudia Arabia: A plane carrying around 100 of Suadi Arabia's Houthi rebel prisoners arrived in Aden, Yemen, where the Red Cross will help facilitate their transfer back to Houthi territory as part of an overall cessation of fighting in Yemen. Why It Matters: Saudi Arabia's prisoner releases will bolster the sentiment that anchors Yemen's two-month cease-fire, which has seen a reduction in Saudi airstrikes and Houthi attacks on Saudi territory. Even so, the continued fighting around Yemen's central city of Marib threatens the cease-fire's lifespan.

93


CIRCUIT MAGAZINE ISSUE 62

FEATURED ASSESSMENT Philippines Ferdinand Marcos Jr.'s expected victory in the Philippines' upcoming presidential election would result in a significant degree of domestic and foreign policy continuity. Victory by his main rival could see Manila develop closer ties with the United States. Brazil Despite growing pressure from Russia, Brazil is unlikely to substantively help Moscow create an alternative international payments system due to the South American country's economic reliance on the U.S. dollar. Australia Australia is accelerating its military development in response to China's growing presence in the IndoPacific. But focusing on the threats posed by Chinese encroachment could neglect Pacific Island nations' other security concerns. Moldova While Russia is unlikely to invade Moldova in the shortto-medium term, a series of explosions in a Moldovan breakaway region near 94

Spain's New Stance on Western Sahara Brings Morocco-Algeria Tensions Back to a Boil On March 18, Spain shifted its position on Morocco and Algeria's territorial dispute in Western Sahara by saying it supported Morocco's 2006 autonomy plan. As a past participant in the Western Sahara conflict in the 1970s and as an economic partner of both Morocco and Algeria, Spain is an important voice in the decades-long dispute over the African territory. • In response to the March 18 announcement, Algeria recalled its ambassador to Spain and said it needed clarification on Madrid's stance on Western Sahara before it would reinstate the envoy. • Morocco and Algeria's rivalry is driven by ideological differences dating back to the era of French colonization in northwest Africa in the 20th century • Spain's announcement follows the United States' move to recognize


GLOBAL SITUATION REPORT

Morocco's ''full sovereignty'' over Western Sahara in December 2020 Increased tensions with Algeria over Western Sahara will risk further destabilizing Morocco's droughtstricken, import-reliant economy. In October, Algeria decided not to renew a contract that supplied Morocco natural gas. Rabat has since been scrambling to find new liquified natural gas (LNG) suppliers. The ongoing Russia-Ukraine war has only exacerbated the fallout from Algeria's gas cut-off in Morocco, which is also facing an ongoing regional drought While an outright military conflict between Algeria and Morocco remains unlikely, the ongoing conflict will make it all the harder for the two countries to de-escalate tensions, portending more incidents of low-level violence in Western Sahara The actual fighting will probably remain in Western Sahara, limiting the potential for collateral damage. However, continued violence in the region could eventually hamper Morocco's push to increase foreign investment in Western Sahara by fueling concerns about the territory's long-term stability and the future safety of any new commercial ventures.

Ukraine could eventually grant Moscow a justification for doing so. Ethiopia Recent peace initiatives have not quelled ethnic violence in Ethiopia, and a host of complications mean that the war is likely to continue with high humanitarian and economic costs. Pakistan Pakistan's new government will face mounting economic challenges and political instability as it tries to hold itself together and improve ties with the United States and traditional allies. Sub-Saharan Africa A surge in global commodity prices, inflation and supply shortages — combined with major regional droughts — are increasing food insecurity, which will trigger unrest and could destabilize some governments. Nigeria Growing disputes within Nigeria's governing party will drive political, social and security volatility in the run-up to the country's presidential election in February 2023. 95


CIRCUIT MAGAZINE ISSUE 62

U.S.: A U.S. federal judge sentenced Virgil Griffith, a U.S. citizen and former researcher for the Ethereum Foundation, to five years and three months in jail and fined him $100,000 for teaching North Koreans to evade international sanctions using blockchain technology. Why It Matters: Blockchains are far more difficult to regulate than traditional economic activities, and many nations may not have the legal infrastructure to combat cryptocurrency-assisted money laundering. This means that as North Korea likely accelerates its digital economic activities, it will be increasingly difficult for U.S./ Western authorities and institutions to enforce existing economic sanctions. Japan, U.K.: Japanese Prime Minister Fumio Kishida and British Prime Minister Boris Johnson signed a Reciprocal Access Agreement (RAA) that will allow Japanese and British forces to deploy together, carry out joint training and jointly conduct disaster relief activities. Why It Matters: The new RAA between Japan and the United Kingdom shows Japan's eagerness to engage in global security activities to counter China, pressure Russia and bolster its defenses against North Korea. However, Japanese involvement in future geopolitical security activities will require the nation to change its constitution to allow for a standing military. Israel: Dozens of Palestinian activists clashed with Israeli police officers who were 96


GLOBAL SITUATION REPORT escorting non-Muslim visitors to the Al-Aqsa mosque/Temple Mount in Jerusalem. Why It Matters: The May 5 clashes are unlikely to spark a tit-for-tat spiral of violence, given their small size, but with Friday prayers coming up on May 6, there is a high likelihood of further scuffles at the site. Significant incidents of violence would almost certainly set the stage for lone-actor attacks and could even prompt Hamas or other Gaza-based militant groups to launch rocket attacks. Russia, Japan: The Russian foreign ministry announced sanctions against 63 Japanese citizens, including Prime Minister Fumio Kishida, Kyodo. The sanctions include an entry ban that bars sanctioned Japanese citizens from entering Russian territory indefinitely. Why It Matters: These sanctions deepen the growing divide between Tokyo and Moscow, which will further strain cooperation between the countries as Japan continues its investment in Russia's Sakhalin-2 liquified natural gas project. Despite this additional strain, it is extremely unlikely that Russia's sanctions on Japanese citizens alone will cause Japan to end its involvement in the LNG project. Iran: Mikhail Ulyanov, Russia's lead negotiator in the Joint Comprehensive Plan of Action talks, said Iran could agree to a deal by the end of February and could restore the JCPOA in April. Why It Matters: If progress on JCPOA talks remains slow, a deal may not be reached by the end of February, after which Western officials may be required to reevaluate their stance toward Iran's rapidly advancing nuclear program. Iran is also continuing to demand a legal guarantee that the United States will not exit the JCPOA again.

97


CIRCUIT MAGAZINE ISSUE 62

98


TACTICAL CONSIDERATIONS

By Orlando Wilson

Tactical Pistol Training

Shooting

from The Hip Being able to shoot a pistol accurately and instinctively from the hip is a basic and essential skill you need to master if you intend to carry a pistol for defensive purposes.

Most hostile situations where people employ a pistol for selfdefense take place at very close quarters. FBI statistics show in the 30 years between 1985 and 2014 that 69.7% of police officers killed with firearms in the United States were murdered within 0 to 10 feet (3 meters) of the criminals. Over half of the police officer, 50.9%, were shot within a distance

of 0 to 5 feet (1.5 meters). I am sure the statistics for shootings involving armed citizens would show an even higher percentage of shootings happened well within conversational range. Think about it, if someone was going to rob or attack you on the street, in your business or home how far away will they be? Will they 99


CIRCUIT MAGAZINE ISSUE 62 be at 25 yards/meters or within a conversational range of under 10 feet? Think about where you are now reading this article… If you were attacked from where is the most likely way you could be attacked? What distances would you need to shoot accurately at? What time would you have to react? Would you be able to access your firearm? Would you have the time to get into a formal shooting stance and use the pistols sights etc.? These are basic considerations when planning the requirements for your firearms training program. There is a big between defensive shooting in reality and a lot of what is being taught by most firearms instructors and schools. The trend for firearms training these days is towards competition shooting, which can teach excellent fundamentals firearms skills, but people forget these are skills for an all-inclusive sport, with rules, pats on the back and trophies… There are no rules on the street and the chances are if you survive a confrontation, and even if you get seriously injured, you will be arrested to start with… The reason I see many firearms instructors and schools not teaching shooting from the hip techniques is because they themselves have never bee taught the techniques or have the operational or real-world experience to realize the necessity 100

Most military, police and security firearms qualifications are very basic, and the standards are not set too high as the units and companies need people to pass.


TACTICAL PISTOL TRAINING of this basic defensive pistol skill. Most military, police and security firearms qualifications are very basic, and the standards are not set too high as the units and companies need people to pass. Most qualifications from what I have seen, especially outside of the United States, the shooters only shoot from formal stances with a two-handed grip. I know in the United States the Florida State security guard firearms qualification did require guards to shoot double taps from the hip at a distance of I believe two yards on two side by side silhouette targets. It's funny that Florida security guards needed to be able to shoot from the hip to get their armed security "G License" where as there are people attended and the accredited Hostile Environment Close Protection Operators (HECPO) firearms courses that are not taught this basic skill or even need to shoot a qualification course of fire. Maybe because the Florida "G License" course, even though basic, is for those who will be carrying firearms for professional defensive reasons and the HECPO courses are really just an accredited tacticool vacation. To me if your serious about carry a pistol for self-defense you need to be able to shoot from all positions with strong and weak hands from

ranges of zero to 100 yards/meters with an emphasis in instinctive close quarter shooting. When teaching the Florida concealed carry classes I always focused on instinctive close quarter shooting at ranges up to 12 feet. Most of those attending such classes are not “gun people” they want a gun to protect themselves and won’t be going to the range on a regular basis shooting hundreds of rounds. For most people to be able to safely handle a pistol and to be able to pick it up and fire multiple rounds into the chest of a target within 12 feet is all they need to protect themselves. This can be taught easily, and the majority of abled-bodied shooters will be able engage targets up to at least 9 feet one handed from the hip if taught properly. From a more advanced perspective if you are carrying a pistol for professional reasons, you should be able to draw from concealed and engage targets out to at least 12 feet from the hip instinctively. Remember most attacks will take place at close quarters and your responses need to be quick. No time for gun range theatrics, duck faces for selfies and drama. From a close protection perspective while engaging the target you 101


CIRCUIT MAGAZINE ISSUE 62 might also need to be controlling or clearing a client out of a hostile line of fire. When moving through buildings, crossing obstacles or in confined spaces you might not have the room to hold your pistol out in front of you in the standard two handed grip. At close quarters presenting your pistol in the standard two handed grip can give the criminal the opportunity to attempt to take the pistol from you. Weapon retention is a big consideration in close quarter hostile situations and is something that is not a consideration in competition shooting sports.

102

Read more on this in my article "Tactical Pistol Training – The Necessity of One-Handed Techniques" in issue 45 of the Circuit Magazine. Shooting from the hip is simple as long as you keep it simple. Again, there is a bad culture with firearms instructors and schools to over complicate techniques or try to “reinvent the wheel” to try to make themselves look more intelligent. Defensive tactics and shooting techniques must be kept as simple as possible! Nothing more than an instinctive reaction!


TACTICAL PISTOL TRAINING You must understand firstly how to grip the pistol properly and pull the trigger smoothly. Your grip should be firm and comfortable while the gun points naturally towards the target. The gun should fit comfortably in your hand with your trigger finger next to the trigger guard, your thumb should push towards the center of the pistol grip, and your middle finger wrapped tightly around it. The other fingers should firmly grip the pistol. The pistol should point naturally in a straight line with the forearm and wrist locked tight.

drawing from a concealed holster, pointing and dry firing (handgun unloaded) from different position, this is good training and will improve your shooting.

When you start to live fire, the handgun should be fired with one hand; just look at the chest area of the target and point the handgun where you are looking and fire one shot. Check the target to see where the shot hit and adjust your aim as required. Continue with this until your shots regularly hit the chest area. Then practice firing double taps, then burst up to five rounds Before you practice any techniques or more, and shooting strong with live ammunition you should and weak handed. When you are practice them dry with an unloaded competent at this then practice firearm, and always ensure doing the same while drawing the firearm is pointed in a safe the pistol from a holster. For direction. Practice pointing the more information instinctive pistol with one hand from the hip shooting check my article Tactical at the chest of a target say 9 feet Shooting in issue 43 of the Circuit away and assess where the pistol Magazine. is pointing. This is basic point shooting, point the pistol where For most able-bodied people there you are looking as if you were should be no need to use two pointing your finger. You have been hands while shooting from the pointing at things your whole life, hip. The recoil of most firearms in right? common defensive calibers should be easily manageable. I have Practice this and if you’re not on heard of some firearms instructors target, adjust your aim and try teaching that the pistol needs again. You should practice this to be supported on the body or strong and weak handed while belt which I have never seen any sitting, standing or lying-in bed, this relevance for. The problem with will build up your muscle memory keeping a semi-automatic pistol too and make you flexible with the close to the body is the slide can hit weapon. You want to work up to the body and not cycle the pistol 103


CIRCUIT MAGAZINE ISSUE 62

properly and cause a malfunction or the shooter can tangle the pistol up in their clothing. Again, people trying to reinvent the wheel... Instinctive shooting from the hip is a basic, simple, and essential skill that you should be competent

at and comfortable with if you serious about owing a pistol for self-defense. If you carry a pistol for professional reasons shooting instinctively from the hip or any other position should be second nature, a basic reaction that requires no thought!

Orlando Wilson has worked in the security industry internationally for over 25 years. He has become accustomed to the types of complications that can occur, when dealing with international law enforcement agencies, organized criminal and Mafia groups. He is the chief consultant for Risks Inc. and based in Miami but spends much of his time traveling and providing a wide range of kidnapping prevention and tactical training services to private and government clients. 104


TACTICAL PISTOL TRAINING

AHNA CONSULTING GROUP

The difference between feeling safe

AND BEING SAFE HOTEL & HOSPITALITY CONSULTING

CYBER/IT SECURITY

CORPORATE SECURITY PROGRAMME AUDITING & DESIGN

TRAINING

RISK ASSESSMENTS

We are ready to listen to you ahnagroup.com

+373 79 557736

info@ahnagroup.com 105


CIRCUIT MAGAZINE ISSUE 62

event rEVIEW

Learning & Development Priorities for Protectors The learning and development forum for Executive Protection sought to address the careful balance between addiction to certification and worthwhile further development by uncovering what employers are actually looking for. We looked at subsector specific topics like Celebrity Protection but also areas of personal

106

development which might not have as much light shone on them like personal fitness. In chronological order the discussions and conclusions included:

Making Better Learning and Development Decisions The topic of whether or not someone with an array of exhaustive course attendance


EVENT REVIEW

and certificates beyond the ‘basic’ EP training would progress further in a candidate selection process hinged around whether any candidate would mould their CV / Resume according to the role they are applying for. It was generally encouraged to continue further development in obvious and also less obvious fields as applied to executive protection which could also include hobbies and sports like skiing. However, the creation of a general CV / Resume which did not leave out certain less relevant certifications was discouraged. The topic of whether EP operators with minimal work experience but a high degree of training was a myth or actually the case. Work experience was

generally championed above exhaustive training beyond the original requirements and new operators were encouraged to take work in all areas of security to build a portfolio as opposed to waiting for the ‘right’ opportunity to come up and apply with only theoretical knowledge. Building Corporate and Leadership Skills The dynamic between executive protection and corporate security leadership was addressed as a possible career trajectory along with the necessary skills to move from being an EP operator to a business owner or manager. The question of whether leaders are either natural born leaders or whether such skills can be acquired through 107


CIRCUIT MAGAZINE ISSUE 62 experience, continued education and leadership specific skill development.

which ultimately results in ineffective management.

Celebrity Protection Skills Overall it was thought that Celebrity Protection (in this many ineffective leaders are too context ‘CP’ not close protection) focussed on tactics instead of stressed the type of protector strategy which causes them to who would suit the celebrity fill a lot of gaps themselves as environment would definitely not opposed to refining their strategy be a ‘selfie hunter’ but who would ahead of time and possibly be comfortable being in a ‘fish not work between security bowl’. One crucial difference in siloes. Risk management was the scope of operations included cited as key to understanding the need to acknowledge that management and leadership guarding a person of interest level mastery. would mean that not everybody running towards them physically Recruitment processes were would indicate a possible attack. also critiqued on the possibility of employing mid-management The celebrity protection skillset level roles according to personal was posited to include more friendships and connections operational and business skills

108


EVENT REVIEW

The type of protector who would suit the celebrity environment would definitely not be a ‘selfie hunter’ but who would be comfortable being in a ‘fish bowl’.

on account of a CP professional being more embedded in the business and with the power to possibly pull entire events from a security perspective. The short leadtime to do advances was also compared to high net individual protection. The ‘buddyguard’ in a potential team was highlighted as a challenge when working with a newly minted celebrity. The challenge of possibly inexperienced principals with a lot of funds at their disposals was highlighted as a possible feature which would be harder to manage which would mean that the successful CP operator would need to rely on their ability to influence and become a trusted advisor. Risk Management within Executive Protection as a Vocation The opportunities for EP professionals to become a trusted advisor or security consultant as a career path was discussed along with the incorporation of risk management skills. The idea was floated that regardless of certification ‘good’ operators would recognise ‘good’ operators. However, frequently attaining courses could indicate dedication. It was asked whether operators wanted to do ‘a job’ 109


CIRCUIT MAGAZINE ISSUE 62

or have ‘a career’ in a mindful way. A key piece of advice from Japanese Karate master Mas Oyama, founder of Kyokushin Karate was relayed as ‘Open your eyes, shut your mouth, bow your head’. Understanding Vehicle and Medical Converged Training Requirements The skillsgap dynamic between operators who train for advanced firearms and operators who obtain new medical or driving skills was discussed. The need to bring medical and driving skills together was put forward as the key combination in demand in the States today. The prevalence of corporate clients who are seriously looking at armoued vehicles in addition to 110

the core duties and roles and responsibilities was highlighted. The need to use soft skills for communication and even IT skills was highlighted as the deciding factor in being hired. Business skills to put a budget and business case together was seen as key for the converged or holistic EP professional of the future. Uncovering Online Training Benefits for EP The debate between whether EP skills can be learned online or not was addressed when looking at hard and soft skills. The problem of corporate RFPs for training required was stressed as asking for the ‘what’ and not the ‘how’. The definition of hard and soft


EVENT REVIEW skills were highlighted as actually very hard to define – accountancy is a hard skill for accountants but perhaps a soft skill for EP. The question of whether soft skills can actually be trained for was raised. It was also observed that many of the external skills like firearms training and medical skills come from external non-EP professionals and that it might be beneficial if trainers in those fields came firstly from EP. It was also posited that EP training standardizations could not come before an operational standard.

whole event about addition to certification. Scaling tests were discouraged because threat actors would not scale down their attack accordingly. Fitness and nutrition was also looked at as a careful balance when on operations but planning meals and supplements according to your own body-type. ‘Movement is life’ as a mantra was also put forward to keep operational readiness.

It was also advised to know your own capabilities and limitations The possible opportunity of and if you cannot carry out a carrying out paper-based training physical task then either train for online in advance of an in person it and achieve that level or direct experiential training experience your career to a different place was put forward. where your actual skills can be made use of. Fitness Skills for Today’s Protector Overall the event covered a This panel sought to address large array of possible skills for whether there is an EP fitness tomorrow’s protector but the gap and if so, how we might be overall direction was to encourage able to measure it. The possibility learning and development that that an EP professional might go was either directly relevant to through their career without being current or future employment or physically tested. for private personal development or interest – instead of believing The question was also asked if that endless certificate hunting fitness skills are being neglected would lead to direct job because they do not often come opportunities. Certifications should with a certificate – playing back be seen as a license to work, not to the original question of the the magic key to employment. 111


112


THE POWER OF READING By: Dale L. June

THE POWER OF READING

THE VALUE OF READING FOR THE MODERN PROTECTOR “Some books are to be tasted, others to be swallowed, and some few to be chewed and digested; that is, some books are to be read only in parts; others to be read but cursorily, and some few to be read wholly, and with diligence and attention. – Sir Francis Bacon

Why should reading be important to a modern protector? As Elizabeth Barrett Browning asked and said in her sonnet, “How do I Love thee, Let me Count the Ways”. It was Thursday, late in the afternoon, when I took a mental break from my computer, writing student progress for two classes, sociology and American Government which I had finished teaching a couple days earlier. I checked my email 113


CIRCUIT MAGAZINE ISSUE 62 and found a question from a personal protection friend. The question asked, “What is the value of reading for the modern protector?”

“Are you freaking kidding me? I asked myself. It’s obvious, to gain knowledge, to be informed, and entertained”. I continued working on the progress reports, but that question hung in my mind. Like Scarlett O’Hara in Margaret Mitchell’s classic novel, Gone with the Wind, I said, “I can't think about that today, I'll worry about that tomorrow." However, after walking and checking the chock to find that it was only 1:45am, the question still hung. Not only the question, but also how to approach writing about it to an audience that might be more interested in more tactical topics. I thought, “Why not throw in an attempt at a little entertainment while composing this article, and as Edgar Allan Poe wrote in his story, A Predicament, “Danced! Could it then be possible? Danced! Alas, thought I, my dancing days are over. Such a simple request in that email placed me in a predicament, and so the glove of a challenge was dropped, and I picked it up. 114

I always kept a book in my “go bag”. When on an assignment there is always down time, and that’s when a book makes it’s appearance to keep all the gears turning.


THE POWER OF READING Why are you reading this article? Why are you reading this magazine? To be informed! About a week ago I listened and watched a podcast of an interview of a person who was “selling” his agenda. He stated, “People write books and that is their opinion”. He was only partially right. When an article or book is written it is based on the experience of the writer, research, analysis, critical thinking, opinion, and experience of others and is often peer reviewed prior to publication. It is left up to the reader to think about what he has read and decide if it met his criteria for being informed and if the information was useful to him. When a writer expresses his opinion in a book to be read by an intended audience, such as personal and executive protection related material, it affords the reader an opportunity to gain from the writer’s experiences, mistakes, procedures, and opinions. Everyone has an opinion and sharing them through books enlightens the reader of pitfalls to be avoided and exhibits means leading to successful operations. When I was a working agent in

the United States Secret Service there were always three things I always packed first when I was traveling, my running shoes, running shorts, and at least one book. I always kept a book in my “go bag”. When on an assignment there is always down time, and that’s when a book makes it’s appearance to keep all the gears turning. I have a serious problem and I’m offended with the so-called “dumbing down” of society. We humans tend to take the easiest route to the finish line and as a result we have “lazy minds.” I believe if people are forced to use their brain, they will continue to become more educated, motivated, and intelligent. As a result, someone will be innovative enough to make the “breakthroughs” we are seeking, and through thinking skills and research, create more efficient methods and procedures. If our opponents stay one step ahead by challenging themselves (even sacrificing their lives); we will always be playing catch-up. From an online research of the health benefits of reading, 10 Benefits of Reading: Why You Should Read Every Day - Lifehack 115


CIRCUIT MAGAZINE ISSUE 62 1. Mental Stimulation – Shake out the boredom spider webs and mental fog. 2. Stress Reduction – Protection is a stressful game.

9. Tranquility – Time to breathe 10. Entertainment – previously mentioned.

A protector is handicapped if he does not read, for in his position of trust and duty 3. Expansion of Vocabulary – requirements, communication Create the ability to converse is the key difference with anyone in any setting between understanding and misunderstanding. Reading is 4. Memory Improvement – the forerunner of knowledge Stimulation expands and and communication. We live in repairs brain cells a pragmatic and ever-changing world, as such, failure to 5. Knowledge Enhancement – comprehend the value of the Learning should never stop written word, can lend to a world 6. Build stronger analytical skills of misinformation and one-sided perspectives of a problem. 7. Improves focused The content of a book holds the concentration and attention power of education, and it is with this power that we can shape 8. Create better writing skills our future and change lives. – The best readers make the Malala Yousafzai best writers

Dale L. June is a former U.S. Secret Service Agent serving the Presidential Protective Division at the White House with four presidents. He’s worked directly with executives of multi-national corporations, VIPs, political figures, royalty, and celebrities. An accomplished author, his two most recent works Introduction to Executive Protection (4th Editon) & An Introduction to Celebrity Protection & Touring, co-authored with Elijah Shaw, spent weeks on the best sellers list. Find them both on www.ArmsLengthAway.com/books 116


117


CIRCUIT MAGAZINE ISSUE 62

MSS PHOENIX FORUM 12 May, 2022 Phoenix, AZ

GSX 2022 12-14 Sept, 2022 Atlanta, GA

PHYSICAL CYBER CONVERGENCE FORUM PHOENIX 18 Aug, 2022 Phoenix, AZ

Exposec Brazil 7-9 June 2022 São Paulo

CORPORATE SECURITY MODERNIZATION FORUM TEXAS 27 May, 2022 Texas, US

118

International Security Expo 27-28 Sept, 2022 London, UK


INDUSTRY EVENTS IFSEC International 17-19 May, 2022 London, UK

Eurosatory Paris 13-17 June 2022 Paris

MSS Amsterdam 17 May, 2022 Amsterdam, NL

CYBER PHYSICAL CONVERGENCE FORUM LONDON

9 June, 2022 London, UK

ASIS Europe 2022 22-24 May, 2022 Prague, CZ

Milipol Asia Pacific 18-20 May 2022 Singapore

Information Security Summit 2022 30 June, 2022 Hong Kong

Securex South Africa 31 May - 2 June 2022 Midrand

Do you have a security event that is not listed here that you would like our readers to know about? Contact us: info@circuit-magazine.com 119


CIRCUIT MAGAZINE ISSUE 62

Keeping Your Edge: Does EP need to be Exciting? The Executive Protection field can take you many places, allowing you to see and experience many wonderful things.

Keeping Your Edge: Action vs. Reaction

By Elijah Shaw

Depending on your particular segment of the industry, you could be working on the red carpet, surrounded by the glitz and glamor of the Hollywood elite. Alternatively, you could be providing coverage for a high profile political figure, 120

this time, finding yourself at ground zero of decisions that could affect the country, or even the world. Many would consider experiences like this the pinnacle of the profession, proof that we have “made it.” However, the reality for many


KEEPING YOUR EDGE protectors, is that the job is much more mundane than that. The assignments you see others working on social media, or catch a glimpse of on cable news represent only a small portion of the overall industry. Instead, for many it’s a plate of, halls, walls and more walls, along with a nice big side of, “hurry up and wait.” Truth be told, ours is a business where if nothing happens, we should consider that a success, however many don’t. During the walking drills portions of my Executive Protection training program, I can often be overheard saying, “If any of your find this boring, this is possibly the wrong profession for you.” While that inviably gets a few chuckles, I couldn’t be more serious. What we do, day in, and day out, bears very little resemblance to what the general public sees at the movies. Cover and Evacuations are rare, gunfights are even rarer. What isn’t rare at all, is the act of conveying the Principal from Point A, to Point B. And as training produces proficiency, drills, that reinforce and refine the technique,

should be the order of the day. High speed, low drag, is a military term, but it’s also a great description of the expectations of the adrenaline junkie agent. He could be described as one who can’t wait to roll up both sleeves , and dive head first into the business. He’s go, go, go, and willing to put in the long hours to get the mission accomplished. The problem occurs when the mission (mostly) involves watching a bank of CCTV monitors. It’s at that point that the enthusiasm for the assignment begins to lose a bit of its luster. Maybe, he thinks to himself, now’s the time to jump over to another sector of the industry in search of a bit more activity. The entertainment sector seems like a no brainer, and after eventually securing a place in that segment, disillusionment again strikes when he finds out that those hours staring at the screen, have now been replaced with hours sitting in a studio. I would hazard to say that it’s not that the assignments that

are boring, it’s that the agents 121


CIRCUIT MAGAZINE ISSUE 62 haven’t approached them with the proper mindset. Alpha personalities want to “Do,” and while that’s commendable, the problem is when that doing isn’t’ defined. Standing next to the Principal might feel like this is the only important part, but it’s the time spent away that will tell the whole story.

the task at hand or a future one.

To put it bluntly ,if your time manning a static post during an event feels like jail, you should be the inmate that walks out of the building with a law degree. To use another analogy, think of a roller coaster; They offer a ton of fun, usually delivered in a massive rush of That assignment that has you excitement and adrenaline. sitting in the recording studio The downside, however, is, in the wee hours of the night, it’s quickly over, and upon conclusion you find yourself can be spent eating donuts right back where you started. and waiting the clock slowly and painfully click by, or it can Equate that to the business, and you’ll see the formula to be spent conducing online success can really be spelled research, route planning and risk assessments for any out in terms of longevity and upcoming movements. Figure staying power. In short, we want to be the tortoise not the out how to use the slower periods, not to disengage, but hare, and there’s a great deal instead shift to other projects of excitement in reaching that finish line. that will help you with either Elijah Shaw is the National Director of the North American Bodyguard Association and the CEO of ICON Global, and International Executive Protection Consulting Firm. Elijah, who has been featured in international publications such as Inc. Magazine, Entrepreneur, and Portfolio, runs the ICON Academy, an EP Training Program specializing in Celebrity & VIP Protection. He also currently sits on the Board of Directors of Executive Security International (ESI), the United States oldest Executive Protection Training School. His book, An Introduction to Executive Protection & Touring: A Guide to Mastering the Business of VIP Security, hit the Amazon best sellers list, and is available now worldwide. 122


KEEPING YOUR EDGE

Connect your team with G6PTT. Radio without boundaries. G6 Push to Talk brings you the best from the communications world; the power of network radio using 3G, 4G, LTE & WiFi to give unparalleled global coverage. This system is the result of our successful collaboration with TASSTA; leading edge design and engineering for a changing world. Adaptable, scalable and flexible to fit any operational environment.

The functionality of two-way radio but with no coverage restrictions, and with advanced features that will transform the way you operate. Get in touch to see what we can do for you.

Communications simplified: delivering practical solutions to mission critical users SECURITY | SURVEILLANCE | MARITIME | DEFENCE | HUMANITARIAN EXPLORATION Communication connects everything that we |do. G6 Global exists to create the best communications system for your operational needs.

Web: www.g6-global.com Telephone: +44 (0)1454 610050 www.g6-global.com Email: g6@g6-global.com

+44 (0)1454 610050

123


CIRCUIT MAGAZINE ISSUE 62

124


CLASSIFIEDS

Email: info@circuit-magazine.com United Kingdom 3D Security Ltd Taunton, Somerset, TA1 1TG Based in Taunton 3D Security provides security services for a wide range of clients. Whether you need a security guard in Somerset, event security in Leeds or Close Protection in London we will provide a solution for your needs. T: +44 (0)1823 253 001 W - www.3dsecurity.org E - enquiries@3dsecurity.org.uk A.B.I. Solutions A.B.I Solutions is a dynamic, forward thinking company, specialising in surveillance, security and investigations with local, national and internationalexperience. A.B.I provides a wide range of services to the corporate sector and individuals alike. W - www.abisolutions.co.uk Amanda Campbell A highly motivated and experienced female operative both CP and Surveillence training T – 07596542249 W - www.amandacampbell.org.uk E - ac@amandacampbell.org.uk Alex Morgan - Close Protection Officer I am a hardworking, enthusiastic and committed person. Adaptable and driven, I have great attention to detail and high standards. I am honest, reliable, friendly and work well as part of a team as well as on my own initiative. I am also a good listener who has the ability to communicate with people at all levels. I am comfortable, both taking and issuing direction. I am looking for the opportunity to apply and expand my skills. E: adsmorgan74@gmail.com T: 07775 636964 Ambassador Security Management ASM MK Lions Arena, Grafton Court, Snowden Drive, Winterhill, Milton Keynes, MK6 1AJ, GBR. After successfully gaining ACS (Door Supervision and Manned Guarding) along

with ISO 9000, we here at ASM have a dedicated management team with hundreds of years combined experience in the security industry. W: www.asmsecurity.co.uk E: scott@asmsecurity.com T: 08458335750 Amber Security and Protection United Kingdom At Amber Security and Protection Ltd we pride ourselves on providing a bespoke and tailored Close Protection, Residential Security, World Class Travel Security and Risk Management service to all our National and International clients. The Directors and Senior Operators are former military, law enforcement or special forces personnel who are fully operational SIA licensed close protection operatives who have over 40 years experience in both the military and civilian private security sectors. E: info@ambersecurityandprotection. com T: 07425868014 (07540392093) W: https://ambersecurityandprotection. com Ark Personal and Asset Protection Ark, 2b Crow Lane, Rochester, Kent, ME11RF, GBR A small, efficient, highly descrete company employing ex special forces and detectives for all civil and corporate covert needs. E: Office@arkprotect.com T: +0044 01634 845526 Argus Europe County Durham Argus Europe has been providing specialist training for high-net worth clients and their families for close to 20 years, worldwide. Argus Europe now offer accredited training for CPO’s, Surveillance Operators and Private detectives. Argus Europe is an operational company working globally with an extensive variety of contracts. W: www.arguseurope.co.uk T: +44 (0) 8456 123 843 Atlantian Business Solutions Group Rutland, LE15 6SD, GBR

125


CIRCUIT MAGAZINE ISSUE 62 Atlantian Business Solutions has been designed to help both individuals and New Companies build for the future as well as support others with training needs. T: 07725970954 W: www.atlantianbsgroup.com E: info@atlantianbsgroup.com Briareus Security Our aim is to give a complete, discreet and professional service to all of our clients, be they large corporations, small businesses, local authorities or private individuals, all tailored to meet their individual needs. W: www.briareussecurity.com E: info@briareussecurity.com Mark Corder - Chief Executive of Carmdale Ltd Suite 3 219 Bow Road London E3 2SJ Mark is a former Senior Police Officer specialising in counter-terrorism; firearms; public order; training and also physical, Critical National Infrastructure and nuclear security, having had responsibility for the security of the UK’s nuclear deterrent. A former Head of Operations, Operational Support and Training, Mark has been involved in a number large-scale incidents (including 7/7) and has also worked at the Office for Security and Counter Terrorism (OSCT) at the Home Office as part of a review into Critical National Infrastructure security. Mark has an MBA via the OU. E: mark.corder@carmdale.co.uk T: +44 (0)844 995 9900 W: www.carmdale.co.uk Alastair Christie Advice on site security, perimeter fencing, lighting, CCTV and manning requirements. Monitor and advise on guard force setting up site procedures and guard SOP’s. T : +44 (0)7736 328112 E : ally.c9496@yahoo.co.uk Callum Barrie Experienced Dog Handler since July 2020 and Security Industry experience of over 6 years. I have 2 working dogs, 1 Belgian Malinois (3 years) and 1 German Shepherd (1 year) available to work immediately. I have a current Close Protection Badge and Door Supervisor Badge. I am NASDU Level 2 Qualified. I have Public Liability Insurance and my own vehicle. Seeking employment immediately in Wales M: 07580405745 Control Risk Management Solutions - CRMS - Ireland Executive Close Protection Operations & Training (B Tec Level 3 Diploma Edexcel) Threat & Risk Assessments, Consultancy Services. W: www.crmsinternational.com E: martin@crmsinternational.com

126

Crest Security & Surveillance Ltd 51 The Crest, West Heath, Birmingham, West Mids, B31 3QA, GBR Highly experienced Security Consultant with a proven record of accomplishment in the field of protective security. Skilled in all phases of risk assessment, operational planning, logistical organisation, implementation of security measures, security team leadership, project coordination, and delivery of security advice to a high profile clientele. E: info@stephencahill.co.uk T: 447977071427 CSI Protection Ltd International, GBR A well established security consultant and personal protection operative providing high or low Key protection to high risk and prestigious clientele. Specialising in the maritime industry as a consultant for private vessel protection on super yachts world wide. W: www.csi-protection.co.uk E: gary@csi-protection.co.uk Custodia Custodia is an independent client focused Specialist Security & Risk Management Company, specialising in Risk consultancy and Security project management. Providing a comprehensive portfolio of Risk mitigation solutions to assist Businesses and individuals to plan for, manage and mitigate risk. T: 01432 277693 W: www.custodia.co.uk Daniel Gentry Close Protection Operative I am a former RAF Regiment Gunner with 8 years experience, including various command roles and operational tours of Iraq and Afghanistan. My previous role as a behaviour specialist saw me de-escalating potentially dangerous situations on a daily basis. These two jobs combined have put me in a position where I am now very effective at managing not only a variety of situations but also a variety of different people, often from very diverse cultures. E: dangentry@hotmail.co.uk T: 07445181281 DF Risk Management Solutions DF Risk Management Solutions N.I. is a modern, professional risk management company, with a diverse range of global strategic experiences and a team of executives who possess dynamic but complementary backgrounds. T: +44 (0)7837642686 +44 (0)7758743918 W: www.dfriskmanagementsolutionsni.com Executive Protection Officer Worldwide CP services W: www.executiveprotectionofficer.com First Class Executive Security Nottingham, UK, Nottingham based, full-service company


CLASSIFIEDS specializing in Bodyguards and Security Consulting services. Extensive experience in VIP security, also caters for public and private sectors. W: www.firstclasssecurity.co.uk T: 0115 9266466 G6 Global G6 are specialists in all types of radio, telephony and satellite communications for both voice and data with particular emphasis on covert communications installations in both vehicles and fixed locations. In addition, our range of personal covert radios and bespoke accessories is extensive. W: info@g6-global.com T: +44 (0)1454 610050 Gordon Russell Highly trained frontline Close Protection Operatives available for UK and International contracts. Our experienced CPO’s can offer bespoke packages to meet all clients needs, including a variety of language skills. All SIA licenced, BBA member E: Bodyguard-cpo@Email.cz T: +44 (0)7917 281 004 Gareth Evans - CPO, MSO Reliable dedicated hard-working security professional, with outstanding communication skills. Strategic approach to problem solving combined with exceptional interpersonal skills, quick to grasp new concepts and information. Highly motivated, results-driven and thrives under pressure. Strong leadership and management skills with proven experience committed to continuous personal and professional development. E : evansgareth1979@yahoo.co.uk T : +44 (0)7900058603 James Izett All close protection task undertaken, including training tasks. Medic (Registered with the HPCSA, Registered FAAW instructor and Assessor E : J.Izett@gmail.com T : +971 (0)505 574 350 Janice Gurney Proficient and diligent Security Professional gaining extensive knowledge and experience within the security sector. Proactive individual who has a logical, flexible and conscientious approach to all challenges undertaken, ability to work as a member of a team or as an individual willing to work anywhere. T : +44 (0)7885 793061 E : janice382006@gmail.com King Cobra Security Ltd King Cobra Security are a Milton Keynes based company, incorporating Certificated Enforcement Agents, Security and Surveillance officers carrying services for the Domestic & Corporate Sector. Being one of Milton Keynes leading and vibrant companies not scared by trying new technologies sets us out from the rest. We are capable of tasking agents throughout the UK & Internationally when required. E : info@kingcobrasecurity.co.uk T: 0330 223 5099

W: www.kingcobrasecurity.co.uk International Centre of Special Training International Centre of Special Training is an international training and security company based in the United Kingdom. Its priority objective is to provide services to the highest level. W: www.icost-team.com T: +44 796 736 55 65 IPSS Security Northfield, Aberdeen, AB16 7EX Security and protection services - UK and overseas. BBA Member. T: + 44 (0) 1224 69455 W: www.ippssecurity.co.uk ISS Training Ltd Riverside Cottages, Nidd Walk, Pateley Bridge, Harrogate, HG3 5NA ISS Training Limited are providers of specialist covert surveillance training courses and publications to the security and investigative industries, enforcement agencies and specialist military units. Formed in 1990, we are the longest established surveillance training ompany in the United Kingdom. Our credibility and reputation is widespread and we offer nationally recognised qualifications. BBA Member. T: + 44 (0) 1423 712265 W: www.intelsecurity.co.uk Jason Morris Security Hertfordshire, UK Providing a wide range of Door supervision/security for V.I.P and prestige venues, Concerts, Functions, Corporate and Personal Security, Weddings, Private Parties, Gala Dinners, Business Awards & School Proms, Close Protection and Body Guarding Static Guarding and Stewards. T: 01462 478900 W: www.jasonmorrissecurity.co.uk E: agosselin@jasonmorrissecurity.co.uk John Featherstone Security professional with operational experience gained in a variety of theatres. Main specialities close protection and surveillance. T: 24hrs : +44 (0)7702 740722 E: john@johnfeatherstone.co.uk W: www.johnfeatherstone.co.uk K9 Support Services Ltd K9 Support Services UK Ltd is a supplier of specialist drugs and explosives dog/ handler detection service (which includes arms & ammunition) to individuals, businesses, and the public sector. T: 0845 643 6393 E: info@k9support.org.uk Logas International Tyne & Wear, SR1, GBR Front line SIA, International CPO. Private Investigation and Surveillance operator. E: wscarr@logasinternational.com

127


CIRCUIT MAGAZINE ISSUE 62 Adam McErlane Close Protection & Client Management A qualified/licenced close protection operative and live events technician from the UK. • 12+ years of experience operating within the live events sector as on operational technician/engineer (Touring & In-House) • Extensive knowledge of the operational procedures, security protocols & logistical processes of large tours and venues. • Personal protection/client management experience (unlicensed) for a high net-worth individuals. Personal Qualities - • Determined, motivated & hard working. • Punctual and reliable. • Able to work independently & as part of a team • High ethical & moral standing. • Act quickly and decisively when required. • Working knowledge of defensive tactics in hostile situations. • Patient & Tolerant in stressful situations with others. • Rudimentary understanding of the Spanish languages. • Effective communicator with a diplomatic approach. • Very resourceful & able to find solutions to complex problems. • Possess good foresight & vigilance. • Years of experience working long & unsociable hours. • Physically fit & Healthy E: adammcerlane1989@outlook.com T: +44 7751953009 Michael Boreland Close Protection Officer Since leaving the British Army in 2006 I have been working in hostile environments for private security companies in various roles ranging from Training & Close protection. I have successfully managed a training wing in Afghanistan providing security operations training for local nationals & Expats conducting operations in the region I believe with my skills and experience of the employment I have done in the past I would be an asset to any organisation taking myself on as an employee. mike.boreland@gmail.com Marcin Gebler Close Protection Officer I have experience with work as an armed security officer, an armed security guard at army unit and army airport, an armed officer responsible for searching and identifying explosive devices, an armed CP in Poland. I have experience with work as a mobile patrol security officer and static security guard in UK. I have experience with work as a security officer at hotels, production sites, private households in UK. I am SIA CP and DS licensed. First Aid at Work Level 3 completed in 2020. Firearms Training Course Combat Pistol 1 for CPOs Shockfire in Poland 2020. E: p.i.gebler@gmail.com T: + 44 07799907528 MLK Security and Protection Services Swindon, UK Close Protection Officer and Door Supervisor E: mattleekane@hotmail.com T: 07917654978

128

LJE Security Services North Yorkshire, HG1, GBR Close Protection, Residential Security, Asset Protection, VIP red carpet Security and Private Investigation. E: leanneedmondson@yahoo.co.uk Oliver Mike Close Protection Operative I came from Hungary and live in the Uk in London since 2014. I was a Police Officer for 23 years as a CounterTerrorism Specialist. Next to the police I became a Close Protection Operative and self-defense instructor (Krav Maga). I was a member of the International Krav Maga Federation (IKMF). During my service I have been protecting Hungarian Prime Ministers, Interior Ministers, Foreign Ministers, Ambassador of Israel and other politicians of other countries. E: info@formerpol.com T: +447413190349 W: www.formerpol.com One Events Grantham One Events offers you a stress free solution in the organisation, putting together and running of an event. Thisis accomplished by having a group of specialised companies from different industries working together for a more complete service for you. TEL: 0870 974 6779 W: www.oneevents.info Paul Lovatt – CPO After serving 15 year in the Army a move to the Security Industry was a natural step, during the last 10 years I have worked in almost every role in the industry from Door Supervisor and loss prevention to Operations Manager and Director. I have been responsible for the creation and implementation of highly successful crime reduction schemes across Yorkshire working closely with other agencies in the areas of responsibility. Currently I am responsible for the overall running of large events security teams from stewards to Close Protection Officers. Operational planning, contingency planning and flexibility are I feel among my key strengths. E : paul@deltasecurity-eventmanagement.co.uk T : +44 (0)7506726336 Paul Tyler – VIP Protection & Concierge Specialist in discreet personal protection & surveillance. A good current working knowledge of London & its challenges gained through ongoing high risk security operations. Experienced in dealing with high net worth clients with all matters security & concierge striving go the extra mile to exceed expectations through thorough planning & interaction with all involved parties. A strong communicator with a smart appearance who remains synonymous with the principals lifestyle, whilst discretely ensuring a safe environment is maintained at all times, physically capable of adopting a higher profile when required to do so. Demonstrates sound judgement and capability to operate with great levels of


CLASSIFIEDS autonomy. Exceptional interpersonal skills with the ability to understand, interact & connect with a diverse range of people. E : paul@apparitio.co.uk T : +44 (0)7552515604 W : www.apparitio.co.uk Peter Jenkins Peter Jenkins is the director of surveillance training company ISS Training Ltd. He has been managing his own commercial and corporate investigation business in Yorkshire for the past 25 years. Previous to this, Peter spent 12 years in the Royal Marines where he specialised in various roles which included reconnaissance, intelligence, counter terrorism and instructing. He continues to carry out surveillance work on a regular basis and regularly instructs on surveillance training courses internationally. E: info@intelsecurity.co.uk W: www.intelsecurity.co.uk Roystan Powell Security Consultant/Close Protection Operative I have been in the security industry for 20yrs, my first experience being in the HM Forces back in 2002, during my time in the industry I have gained vast experience, professionalism, integrity, values and work ethic. I have been involved in many details and conducted TL duties, risk assessments, risk management, management and consultancy. I hope my brief introduction is of interest. Kind regards Roy E: roystanlcp@gmail.com Plymouth Close Protection Highly versatile, physically fit and accomplished security professional with cumulative experience in the areas of security management, close protection, crisis management, risk assessment, emergency management, asset protection and security training. E : chris@plymouthcp.co.uk W : www.plymouthcp.co.uk T : +44 (0)1752 500807 PPSS Group Body armour and stab vests provide a functional solution to individuals who require extra protection in their chosen vocation. All PPSS (formerly ASEO) body armour and stab vests are certified by the UK’s Home Office (HOSDB) and offer unrivalled protection from blunt trauma caused by a punch, blow or kick. Based on our professional frontline experience and extensive research we can confirm that an impact based assault is a more likely event than an attack involving an edged weapon or firearm. T: +44 (0) 845 5193 953 F: +44 (0) 1765 603 512 E: info@ppss-group.com W: www.ppss-group.com Presence Security Presence Security (“ PS ”) is a bespoke security company providing protection for private individuals and VIPs, as well

as security services for businesses and organizations. T: 0800 002 9734 E: info@presencesecurity.co.uk Prestige Risks LTD 27 Old Gloucester Street, London, WC1N, 3AX, GBR. Close Protection Secure Chauffeurs Surveillance Residential Security Executive Protection Security Guards Asset T : +44 (0)207 5588182 E : info@prestigerisks.com W : www.prestigerisks.com Prometheus Medical Ltd Prometheus deliver unrivalled bespoke emergency medical support in the form of specialist equipment, training, strategic advice and deployed clinical care. T: (+44) 1568 613942 W: www.prometheusmedical.co.uk Prosec Consultancy Ltd 10 Oakfield business park Westbury, BA13 4WF. Prosec Consultancy Limited are dedicated in providing a professional service, which covers a whole range of security services throughout the security industry. T: 01373 228055 W: www.prosec-ltd.co E: info@prosec-ltd.com ProTouch Security ProTouch Security is one of the UK’s key providers of event safety, event security, crowd management, door supervisors, stewards, event management and health and safety. T: 01724 279 522 W: www.protouchsecurity.co.uk Python Security and Protection Ltd Providing Close Protection Officers and Door Supervisors for Events and Venue Security. E : mattleekane@hotmail.com Radoslav Savkov - CPO / Security Consultant Oxford - United Kingdom I would introduce myself as a high calibre Security professional with strong customer oriented skills and managerial experience in the Security Industry, interested in a challenging position, which would fully utilize competences gained and provides opportunities for professional and personal development. With 15 + years of international experience in the sector at all levels and a military background (National Service) as well as a practical Close Protection experience in an executive environment, corporate intelligence and investigations. As a Security professional, I never consider my training and development as a complete, therefore I always look to update further my skills and knowledge. In personal plan I am very loyal, discreet , independent and willing to

129


CIRCUIT MAGAZINE ISSUE 62 embrace challenges. E: r.savkov@gmail.com T: +44 (0)7886591525

E: sw@shaunwest.co.uk T: +44 (0)7830 109 601 W: www.shaunwest.co.uk

RSM Security UK Ltd London, UK RSM Security UK Ltd offers the experience and expertise necessary to provide security personnel of the highest calibre when you need them. T: 07850091979 or 07792948523 W: www.rsmsecurity.co.uk E: info@rsmsecurity.co.uk RWSSI Rob W is a professional security consultant with world wide experience and capabilities in Security, Surveillance and Investigation; I can support you to overcome any problems and enable you to achieve your goals E: rob@rwssi.co.uk T: +44 (0)7818 220985

Steve Pittman - Security Manager of Operations I have been active in the security industry for over 25 years in various roles including close protection where I have been responsiblefor the the welfare of high net worth individuals in low and high risk situations . I have also a vast amount of experience in many other areas of there security industry including Door Supervision, Security Management, Event Security, and Residential Security. I have recently finished a diploma in Private Investigations and am a member of UKPIN. E: steve@covert protection.com T: 07818800778 W: Company Website: https://covertprotection.com

SDS Solutions SDS solutions provide our clients with protective solutions that are second to none, our consultants will discuss every aspect of the problems that you are facing that dictate the need for a protective solution, we promise our clients a tailor made service to meet individual requirements. Whether based in the UK or abroad our protective service T: 01453 887815 E: info@sds-solutions.org Stephen OCallaghan Founder & Managing Director Strategically oriented Close Protection Security Specialist with a proven track record for providing effective leadership and exceeding performance objectives. Has been responsible for implementation of security standards in hostile and non-hostile job roles, security awareness and education, coordination of sensitive investigations, analysis of emerging industry trends and threats and the evaluation of overall team effectiveness. Ability to develop and maintain effective working relationships within a team, whilst at all times keeping the main objective and security needs at the fore front. E: enquiries@protegimusprotection.com T: +44 7306395194 W: www.protegimusprotection.com Shadow Close Protection A leading company specializing in Executive Protection as a professional sector, with participation in high and low risk missions, providing global security solutions and consultancy to individuals, corporations and national agencies worldwide. W: www.shadowcp.gr E: info@shadowcp.gr T: + 30 6948539664 Shaun West United Kingdom SIA licensed, Highly Experienced Frontline CPO. Ronin SA trained. Providing security for both corporate and hostile environments.

130

Mark Claydon-Smith – CP Team Leader and Medic I have spent 13 years in the Royal Navy Culminating in the rank of SNCO Petty Officer. In 2004 I started my security career and have worked in Hostile environments. I have held several positions including Operations Manager, Team Leader and Rig Site Manager. I have worked in Kurdistan, Afghanistan and Iraq as well as the UK and Europe. E : mark@claydon-smith.com T : +964 (0)7815 970433 Philip Shearman MSyl – CPO, Risk Manager A professionally Qualified Close Protection and Surveillance Operator and Team Leader with over twenty two years of experience gained in the Military Police, the last fifteen of which were spent with the Military Police Close Protection Unit, working in various hostile countries throughout the world. Since leaving the Army in Nov 06 I have worked in the Private Security sector. I have gained valuable experience in demanding and challenging operational environments, where I have proved to be a self motivated and resourceful individual, performing well under pressure, communicating effectively at all levels whilst exercising tact, diplomacy and integrity. E : benshearman10@hotmail.com T : +44 (0)7930 277586 Spotllght Protection Services Essex based business which provides a broad and growing range of security services to businesses and organisations large and small. T: 07870560208 E: info@spotlightprotectionservices.co.uk W: www.spotlightprotectionservices.co.uk Vas Sotiropoulos London, UK I am a security operator with over nineteen years of experience in close protection, counter-surveillance, diplomatic protection, door supervision, and CCTV monitoring in the United Kingdom and Greece. Second Lieutenant in the elite of the Hellenic Army, the Special Forces. Undertaken a number of close protection courses run by the Greek Ministry of Defence, the VIP Protection Unit


CLASSIFIEDS of the Hellenic Police, and the Surveillance Department of the US Embassy in Athens. Highly motivated and confident relocated to the UK for further career progression and to install my own footprint in the private security sector. Fully licensed Close Protection Officer by the British Security Industry Authority. E: info@spartanelitesecurity.co.uk T 02038882020 W: https://spartanelitesecurity.co.uk VIPA Tactical Training A specialist training academy dealing with four specific areas of combat: VIPA Civilian Self Protection Program, VIPA Close Protection Combat System, VIPA Police Defence Tactics and VIPA Military Close Quarter Combat. BBA Member. W: www.VIPAtacticaltraining.com Wagtail UK Wales, UK Wagtail UK are international specialists in detection dogs and dog handler training. Established in 2003, Wagtail UK provides detection dogs and related services for government agencies such as UK Border Force, HM Revenue & Customs, Police, Trading Standards and Armed Forces. Wagtail International School of Excellence in North Wales is a fully approved training centre endorsed by Highfield Awarding Body for Certification. T: +44(0)1745 561166 E: info@wagtailuk.com W: http://www.wagtailuk.com Westminster Security Ltd London, UK Westminster Security Ltd are an independent, industry leading private security company in London; providing security and investigation services throughout the UK, EU and worldwide for our clients. We specialise in close protection services; providing ex-military and police bodyguards to many national and international companies, heads of state, royalty, high-profile personalities, CEO's, private individuals and families. T: +44 (0)207 123 4544 E: Info@westminstersecurity.co.uk W: www.westminstersecurity.co.uk Yoji Security We established Yoji Security in response to our perception of declining professional standards across the security industry. We strive to provide first class customer service in everything we do, drawing on our extensive experience in the fields of special operations, intelligence, counter terrorism and close protection. T : +44 7903231076 E : enquries@yojisecurity.com Europe & Africa International Security Academy P.O.Box 5833, Herzeliya, 46000, ISRAEL. zOur graduates are more recognized, respected and sought after by Distinguish Protection service “consumers” and by

most of the “Providers” of Protection services worldwide. Organisers of the 2008 International Summit of Protection Officers. BBA Member. T: + 972 9 950 0969 W: www.SecurityAcademy.org.il Javier Galan Spain - Security specialist available for operations around the world. E: oejju@hotmail.com T: 34.637080771 Military Grade Encryption Phones PO Box 52310, Limassol, CYPRUS Built-in encryption software which converts your voice to encrypted data using a constantly changing mathematical formula. It uses a dual layered RSA/AES combination and a changing session key which modifies the encryption algorithm every second. € 1,398.00 + VAT. All prices include new Nokia N73 phone. BBA Member. T: + 357 7777 7276 W: www.protechcy.com/new Nemesis Protection Ruma, Serbia Nemesis Protection is a Risk Management Company specialized in providing viable, bespoke, optimal, feasible and cost-effective security and training solutions for corporations, government institutions, and private clients worldwide. Nemesis Protection offers a full spectrum of services including Risk Advisory, Close Protection, Asset Protection, Security Driving, Surveillance & Private Investigation, Information Security, Transport Security, Staffing, and Specialist Security Training. T: 00381644679650 E: contact@nemesisprotection.com W: www.nemesisprotection.com TPT Firearms Training Bratislava , Slovakia and Rome , Italy We know from our extensive experience within the industry that it can be daunting when initially carrying a firearm and being responsible for protecting a clients life, but learning the proper techniques and having the ability to understand the weapon will make the job a lot easier and more enjoyable. Hopefully you will never have to use the weapons you carry, but should this prove necessary you will be confident and knowledgeable enough to handle the situation professionally and effectively. T : +44 (0) 7734101910 E : info@tacticalprotectionteam.co.uk W : www.tacticalprotectionteam.co.uk Security Concierge Group SCG Special Projects Ltd, Avenida, Bartolome Vicente Ramon No 10, B16, Ibiza, 07800, ESP Security Concierge Group is a privately owned and fully independent provider of exceptional security services to an interesting and varied range of clients. T: 00 34 600 665 275 W: www.securityconciergegroup.com E: joe.buckle@securityconciergegroup.com

131


CIRCUIT MAGAZINE ISSUE 62 Wille Heino, Security Specialist, Owner Finland Gambeson is a security training & Consulting Company specialized in countering modern day threats. - Security & safety planning for different events. - Security training: Active shooter/Terrorism awareness/Surveillance detection/Other. Security consulting. We are specialized in executive protection related services. Local knowledge, trained and licensed close protection offers, mission support, other. E: wille.heino@gambeson.fi W: www.gambeson.fi Zero Click Limited For Risk Solutions First European training company for situational awareness training in Arabic & English For media crew, embassy staff, Journalists, VIP, sports teams and more. T: +48 513 757 201 W: www.zclick.pl E: info@zclick.pl Zika Rakita Managing Director Ruma 22400, Serbia Accomplished, result-driven, and highly motivated Close Protection Operative, conducting protective operations internationally. A background encompassing planning, organizing, leading, and undertaking Close Protection operations in both corporate fields and hostile environments. Proven in achieving results and completing tasks on time, discreetly, and to the highest standards. A confident communicator with the ability to sensitively solve a range of clients’ and colleagues’ problems and inquiries. With the ability to use sound judgment and understanding the operational balance and needs. E: contact@nemesisprotection.com T: 00381644679650 Americas Bodyguard Careers Bodyguard Careers is an informational site with the purpose of providing bodyguards with all the information and tools necessary to succeed in the Close Protection Industry Info@BodyguardCareers.com www.BodyguardCareers.com Canadian Use of Force Systems 7975 Yonge St. # 7124, Innisfil, ON, L9S 1L0, CANADA A professional Use of Force and Defensive. Tactics organization teaching a full range of controlled response options for Self-Protection and Use of Force considerations in public and professional environments. BBA Associate Member. T: + 1 705 456 4333 W: www.canadianuseofforce.com Contact Front Photography Contact Front Photography is the world’s 1st photography

132

studio dedicated to the Close Protection Professional. Stop putting generic or pirated photos on your website; instead commission custom shots to best represent you or your agency. T: +1 (612) 369-6134 E: Info@ContractFrontPhotography.com W: www.ContactFrontPhotography.com Decisiones Estratégicas Buenos Aires – Argentina Executive protection specialists we have experienced in all Latin America, for multinationals companies, also providing support in project throughout Latin America to consulting first the US. and UK. We have a team of specialists and psychologists in assistance and crisis negotiation. T: +54(911) 6415 1941 E: jbenitez@d–estrategicas.com W: www.d–estrategicas.com Detective Lacerda P.O.BOX 25996, São Paulo, 05513-970, BRAZIL Providing the full range of security and investigation services throughout Latin America. BBA Member. T: + 55 (11) 3452 4388 W: www.detectivelacerda.cjb.net Giovanni Rossi South Africa Doctorates in Criminology, Vessel Security Officer, ASP Instructor, ISSPC Member, BBA Member, IAPPA Member, American Bodyguard and Protection Instructors Association Lifetime Member E: rossi1@mweb.co.za T: +2783 415 9205 Fernando Mata Mexico I started in the Protection of Officials as an infantryman in the Presidential Guards Corps, in the Mexican Army. Later, as a civilian, I certified in executive protection and took a diplomaed in personal protection. I have also taken intelligence, terrorism and counterterrorism courses and some refresher courses. I am currently participating in an Academy project for the professional training of Protection agents with international standards. E: matamfer@hotmail.com T: + 55 2126 6994 W: www.afeeg.mx USA Global Bear Protection PO Box 11488, Jackson, Wyoming, 83002, USA Provision of British and US Ex Special forces security/medical specialists. T: 307 413 3619 W: www.globalbearprotection.com E: bear@globalbearprotection.com


CLASSIFIEDS Icon Services Corporation 1043 Grand Ave. #312, St. Paul, MN 55105, USA A full service security and investigative agency specializing in providing high-level security and bodyguards to international celebrities, public figures and corporations. Licensed, bonded and insured, our diverse roster of clients reads as a virtual who’s who in the corporate, motion picture, fashion and recording industry. Icon has been the hand picked choice to provide Executive Protection to everyone from Superintendents to Supermodels. BBA Member. T: + 1 651 695 8778 W: www.Industry-Icon.com Imperial Protective Service, LLC 15849 N. 71st Street, Suite 100, Scottsdale , Arizona, 85254, USA Imperial Protective Service’ (IPS) is a security consulting and services firm founded in 1978. IPS provides both national and international corporate, executive and celebrity protective services. BBA Member. T: + 1 480 281 1588 W: www.executiveprotect.com Panther Protection Services 3695F Cascade Road, Suite 2207, Atlanta, GA 30331 Panther Protection Services is a full service protection agency offering such services as threat assessment, executive protection, self-defense training, firearms instruction, and high risk tactical protection. Our executive protection specialists have over 75 years of experience. Panther can handle your protection needs whether around the corner or around the world. Member: BBA and NABA T: (404) 349-9117 W: www.pantherprotectionservices.com Rouven Rohler - Security Consultant / HSE liaison - Romania I am a very fit and mentally robust Security Specialist with quality experience gained in the security (Military, Maritime and Commercial Operational Security (Oil& Gas). I have improved the effectiveness of protection teams and significantly enhanced clients’ awareness. My career commenced in the Australian Army, which included hostile environment deployments to Iraq and the Solomon Islands and I have since been operating on various contracts throughout Afghanistan and Iraq. E: rouven@y7mail.com T: +40 (0)746 642 739 SILVER STAR PROTECTION Executive protection, site and event security with global experience. Serving southern Minnesota with integrity and professionalism. Former USSS, ICON Alumni. available for domestic and international travel. Robert E. Jones Manager/CEO W: www.silver-star-protection.com E: rejones@silver-star-protection.com TSICS (T6) Miami, Florida, USA TSICS (T6) provides the following services in Central America: Executive Protection, Individual Bodyguard, Close Protection Training, Corporate Invest.

W: www.security-professionals.org/members/saldrix E: tsics.t6@gmail.com T: +502 6645 6822 Tony Scotti’s Vehicle Dynamics Institute 1162 St. Georges Ave, Suite 277 , Avenel, NJ 07001, USA The first name in advanced driver training, offering our highly acclaimed Protective/Evasive Driving Programs. Designed specifically for today’s executive chauffeurs, executive protection professionals and others who are responsible for providing safe and secure transportation services. BBA Member. T: + 1 732 738 5221 W: www.vehicledynamics.net Vindex Personal Protection & Investigation Inc. 497 Hooksett Rd #365 Manchester NH 03104 603.289.3161 / Full service Private Investigations & Executive Protection. 10 years combined Law Enforcement, Private security, close protection work, & security contracting. NY Mayors, U.S. President’s, NFL owners, and VIP’s are some of the protection work I’ve gained experience with. ICON alumni, NABA member. T: + 1 732 738 5221 E: vindexinc@aol.com W: www.vindexinc.com New Zealand Security Investigations & Risk Solutions LTD We are dedicated to providing professional and effective security solutions for your personal or business security requirements. S.I.R.S is one of the only security companies in New Zealand with ISO 9001 and ISO 18788 Running the most advanced security management system Track-Force to help S.I.R.S security operations with real-time reporting and lone worker technology. With a combination of Military and Security industry experienced staff. We offer high-quality security services and industry recognised training programs with international qualifications in Close Protection, Bodyguards, Maritime Security, Hostile Environment, Firearms Training, Door Supervision, Private Investigations, Surveillance, CCTV Operations, Event Security, Mobile Patrols and Static Guards. S.I.R.S has the expertise and flexibility to meet a wide variety of client needs. E: lee@sirs.org.nz T: 02040787549 W: www.sirs.org.nz Asia - Middle East - UAE Krav Maga Middle East DMCC First established training company for the military self-defense and fighting system developed by the Israel Defense Forces (IDF) and Israeli security forces in UAE since 2018. T: +971 50 343 1832 W: www.kravmagamiddleast.com E: info@kravmagamiddleast.com

133


Life can be testing, no matter what you fight. - Keep Fighting.

FOP is for you, whether you wear uniform, a suit, or gym kit. 134


ISSUE 62

Subscrib e today & save

THE TEAM: UK Editor: Shaun West US Editor: Elijah Shaw

Subscription means you’ll never miss an issue of the Circuit Magazine again. Subscribers get: • Every issue of the Circuit • Full access to the Circuit website. • Priority delivery of each magazine. • Access to all back issues. • Subscriber only content and offers.

Managing Editor: Jon Moss Art Direction: Pete Falkous

CONTRIBUTORS:

Dale L. June Orlando Wilson Luke Daniel Krisztian Zerkowitz Denida Grow Chris Grow Westminster Security Ben Kunde, CFE Mark “Six” James

Our Sincere Thanks to all those that continue to contribute their wisdom and experience for the enjoyment of others The Circuit is compiled, edited and published in the UK and US bi-monthly. W: www.circuit-magazine.com E: info@circuit-magazine.com T: +44 0191 645 0865

TO ADVERTISE: IF YOUR BUSINESS OPERATORS IN, OR SERVES THE PROTECTION INDUSTRY THEN YOU NEED TO SPEAK DIRECT TO YOUR AUDIENCE THROUGH A TRUSTED CHANNEL. GET IN TOUCH TO FIND OUT ABOUT THE GREAT OPPORTUNITIES THE CIRCUIT CAN PROVIDE TO IMPROVE YOUR BUSINESS SALES AND GROWTH. Email: info@circuit-magazine.com

New app with more features Get The Circuit Security Magazine with immediate electronic downloads to read on your PC, laptop or smart device.

DISCLAIMER While every care has been taken to ensure that the information contained in this magazine is both accurate and up-to-date, The Circuit accepts no liability in any part for loss or damage incurred by reliance on information contained in this magazine through omissions, errors, howsoever caused. ©COPYRIGHT Copyright remains with the authors and contributors at all times. No part of this publication can be copied or reproduced in anyway whatsoever without permission from the publisher AND the author / contributor.

135


136

facebook.com/groups/TheNABA/


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.