Issue 68 - Breaking the Iron Box

Page 1

News

Reviews

Opinions

Intel

Exclusives

68 BREAKING THE

IRON BOX REPUTATION

THE HIDDEN RISK

SECURING

MAJOR EVENTS TRUMP SHOOTING

FUELS POLITICAL UNREST

DUE DILLINGENCE

Ι

UNDERSTANDING BLOCKCHAIN

Ι

QUIET SUCCESS 1


contents ISSUE 68 04

UK Foreword

07

US Foreword

08

Industry News

18

Navigating the Executive Protection Landscape in the U.S.

32

Executive Protection Operations The Necessity of a Client Questionnaire

41

Cybersecurity Fundamentals Understanding Blockchain

46

From Iron Box to Invisible Shield Reevaluating Surveillance Strategies in Executive Protection

57

DUE DILIGENCE & WHY IT’S REQUIRED

64

Tactical Medicine Treat the Patient

72

Reputational Risk A critical concern for Ultra-High-Net-Worth Individuals and Executives.

80

Misleading Practices in Security Employment

90

Striving for Excellence

98

RANE Featured Asseessment Trump Assassination Attempt Portends Heightened Political Violence

104

Managing with Courage Don’t be afraid to manage with courage.

108

Global Situation Report

114

Industry Events

116

Keeping Your Edge The Art of Quiet Success

2

18


80

41 64 104

3


EDITOR FOREWORDS

UK FOREWORD Welcome to the latest issue of Circuit Magazine, where we continue to explore the evolving landscape of the security industry.

As professionals dedicated to the protection of individuals and assets, we know that staying ahead of emerging threats and technologies is critical. This issue, we delve into several key areas that are shaping our field today. Since our last issue, there have been several significant events in the world of executive protection, most notably the assassination attempt on former US President Donald Trump. Incidents like these, played out in the public eye, offer valuable lessons for our industry. Analysing these events allows us to glean insights and improve our practices, ensuring we are better prepared for the future. First and foremost, the importance of adaptability cannot be overstated. The rapid pace of technological advancements demands that we continuously update our skills and knowledge. In this edition, we examine the latest in surveillance technologies, cybersecurity threats, and the integration of AI in security protocols. Understanding these developments is essential for maintaining an edge in an increasingly digital world. Additionally, we focus on the human element of security. Effective communication, psychological resilience, and leadership skills are paramount in our line of work. Articles in this issue highlight strategies for improving team cohesion, managing stress in high-pressure environments, and developing the soft skills necessary for successful client interactions. Our cover story, "Breaking the Iron Box," delves into the evolution of executive protection strategies, moving from traditional methods to

4

more dynamic and effective approaches. We also explore the hidden risks associated with reputation management and the challenges of securing major events in today’s volatile climate. Moreover, we take a closer look at the implications of blockchain technology in our industry and how understanding this can help us stay ahead. We also discuss the importance of tactical medicine, going beyond the basics to ensure we are prepared for any situation. We also explore the global perspective, looking at security challenges and solutions from different parts of the world. From navigating geopolitical tensions to understanding cultural nuances, our international focus provides a comprehensive view of the global security landscape. Finally, we celebrate the community of professionals who make up the Circuit network. Your dedication, expertise, and commitment to continuous improvement are what drive this industry forward. We encourage you to engage with the content, share your insights, and contribute to the ongoing dialogue about best practices and innovations in security. Thank you for your continued support of Circuit Magazine. We hope this issue equips you with the knowledge and inspiration to excel in your role. Stay vigilant, stay informed, and stay connected. Stay safe Shaun West Editor


THE APP THAT CONNECTS THE SECURITY INDUSTRY Download the app and sign up for a free account Available on:

Fully featured Member events Exclusive opportunities

Regular content Trusted information Learn & grow

Jobs Board

TRAINING

EVENTS

Join the BBA Network 5


6


EDITOR FOREWORDS

US FOREWORD Greeting and salutations wherever you are located in this big world of ours. I'm excited to welcome you once again to the latest issue of The Circuit, the magazine of the Security Professional.

As I’ve said before the magazine is more than just a collection of articles—it's a testament to the resilience and adaptability of security professionals. It shows that we can come together as a collective and both receive and share information from nonbiased points of view. Speaking of views, our mission isn’t to farm In this forthcoming issue, we've curated a diverse range of insights engagement though outrage or be exploitive to members of the and expertise from experts profession, instead we believe around the globe. Drawing on steady growth is the best type. their collective wisdom, we'll explore the nuances of our craft from the corporate to the celebrity I’ll see you on the other side, and remember, if you find value in and everything in-between. what you read, share it with your Who understands our profession colleagues and invite them to join our community. Together, better than the men and women let's continue to raise the bar for working within it, and as such, excellence in our field. our contributors bring a wealth of experience to the table. Their Elijah Shaw real-world insights serve as invaluable guidance for navigating Editor the seasonal demands of our profession. With the summer season upon us, it's time to gear up for increased activity and the unique challenges that come with our profession. My hope is whenever you have a few minutes of downtime, you can exhale and catch up on the latest industry news, tips and tactics.

7


CIRCUIT MAGAZINE ISSUE 68

Industry News At A Glance

We cast our eye over the main stories impacting the security industry. Here's what's appeared on the radar since the last issue. Getty

Bodyguard Backhands Britney Britney Spears, the pop icon, was allegedly backhanded by a bodyguard of NBA star Victor Wembanyama in a dramatic incident on July 5th in Las Vegas. The encounter occurred when Spears, along with her husband and friends, attempted to congratulate the 19-year-old basketball prodigy at the Aria hotel. In a crowded, noisy setting, Spears tapped Wembanyama on the shoulder to ask for a photo. Suddenly, without a glance, his security guard struck her, knocking her to the ground. Spears’ glasses 8

flew off, leaving her stunned and embarrassed. The incident didn’t end there. According to TMZ, the security guard later approached Spears at her table to address what happened. Spears thanked the Las Vegas police for their response but criticized the bodyguard’s excessive force, noting, “My security team didn’t hit any of them,” referring to fans who had swarmed her earlier. Las Vegas police documented the incident but made no arrests. MORE>>


INDUSTRY NEWS Ronaldo Targeted by Pitch Invaders Chaos erupted at Euro 2024 as six pitch invaders targeted Cristiano Ronaldo during Portugal’s match, causing major disruptions. With Portugal leading 3-0, the first invader dashed onto the pitch to take a selfie with Ronaldo, evading stewards before being caught. Inspired by this, a second fan attempted to reach Ronaldo but was stopped, forcing the visibly annoyed star to remove the fan’s arm from his neck. As the game approached its aconclusion, two more fans invaded the pitch, trying to get

to Ronaldo. They were quickly apprehended, but the game was briefly halted. The frustration didn’t end there. After the final whistle, two additional invaders entered the field, adding to the chaos and frustration for Ronaldo and the other players. The repeated breaches highlighted significant security lapses, causing concern among fans and officials about the safety measures in place at major sporting events. Ronaldo and his teammates were left visibly frustrated by the disruptions, which overshadowed Portugal’s dominant performance. MORE>> Getty

9


CIRCUIT MAGAZINE ISSUE 68 Betting Blunder: Sunak's Bodyguard Arrested Why would a trusted bodyguard at the pinnacle of his career risk everything for a bet? In a shocking twist, one of Prime Minister Rishi Sunak's closest protectors has been arrested for allegedly betting on the UK's election date before it was public knowledge. This unexpected move has rocked the political and security circles. The Metropolitan Police swooped in after the Gambling Commission flagged suspicious activity. They detained the officer from the elite Royalty and Specialist Protection Command, suspecting misconduct in public office.

members were caught off guard, expecting a fall election. Gambling, which is commonplace in British culture, becomes a criminal act when inside information is misused. The unnamed officer, now out on bail, faces suspension pending further investigation. Meanwhile, Craig Williams, a close aide to Sunak, is also under scrutiny for a similar bet. He’s expressed regret, stating, “I should have thought about what this could mean.” This scandal highlights the delicate balance between trust and integrity in high-stakes political environments. What drove a trusted guard to gamble his career away? The investigation continues with the officers’ career in the balance.

The secrecy surrounding the election date, set for July 4, was breached. MORE>> Even Sunak's Conservative Party

Ronen Zvulun/Reuters

10


INDUSTRY NEWS

New Group Aims to Boost Maritime Cybersecurity A new initiative, the International Maritime Cyber Security Organisation (IMCSO), has launched to enhance cybersecurity standards in the maritime industry. Despite rising cyber threats, many cybersecurity professionals lack specialized maritime expertise. While no ships have been documented as commandeered via cyberattacks, shipping companies, port authorities, and the International Maritime Organization (IMO) have faced attacks. “Cybersecurity has been mandated by the International Maritime Organization (IMO), which requires shipping companies to implement measures to protect their onboard safety management systems and to regularly audit them,” says Campbell Murray, CEO of IMCSO. He adds that the new organization aims to standardize cybersecurity risk assessments across the maritime sector.

IMCSO plans to develop certification programs for security consultants, create a professional register, and validate audit reports to ensure consistency. The group aims to help captains and crew, who often lack cybersecurity expertise, by providing uniform and safe assessment methods. The organization will also maintain a risk register database with ship assessment results, aiding port authorities and insurance providers in evaluating vessel cyber risks. IMCSO’s efforts seek to address the current variability in cybersecurity approaches and requirements across the maritime industry. This initiative promises to provide much-needed expertise and standardized practices, ensuring better protection against the growing cyber threats facing the maritime sector.

MORE>>

11


CIRCUIT MAGAZINE ISSUE 68

CISA Conducts Groundbreaking AI Security Drill In a first, the Cybersecurity and Infrastructure Security Agency (CISA) held an AI security incident response drill, uniting over 50 AI experts at Microsoft’s Virginia offices. This exercise, part of CISA’s JCDC.AI initiative, aims to create an AI Security Incident Collaboration playbook. CISA Director Jen Easterly emphasized the priority of security in AI product development, saying, “We’re excited to work with our

12

partners to secure AI systems.” The event saw participation from major federal agencies and tech giants like OpenAI, Microsoft, and Amazon. Jonathan Dambrot of Cranium AI stressed the drill’s importance for immediate response strategies, while FBI’s Bryan Vorndran highlighted the power of coordinated efforts in tackling AI threats. This initiative marks a pivotal step in safeguarding AI applications against emerging cybersecurity threats. MORE>>


INDUSTRY NEWS World’s Most Expensive Cow Protected by Armed Bodyguard Meet Viatina-19, the most expensive cow in the world, valued at a staggering $4.3 million. This snowwhite Nelore beef cow, weighing over 1,100 kg, is twice the size of an average cow of her breed. Viatina19’s high value stems from her rapid muscle growth and exceptional fertility, traits she passes on to her offspring, making her a prized possession among breeders. To safeguard this invaluable animal,

Viatina-19 is constantly monitored by cameras and an armed guard. Her barn, located on a farm near Uberaba in Minas Gerais, Brazil, has become a popular attraction for visitors eager to see this remarkable cow. “She’s the closest to perfection,” says Lorrany Martins, the veterinarian caring for Viatina-19. “She has all the characteristics that breeders are looking for.” MORE>>

13


CIRCUIT MAGAZINE ISSUE 68 German Police Shoot Man Threatening Euro 2024 Fans with Pickaxe In a dramatic incident before the Euro 2024 match between Poland and the Netherlands, German police shot a man who threatened fans in Hamburg with a pickaxe and an incendiary device. The tense situation unfolded as supporters from both nations mingled in bars and restaurants ahead of the Group D encounter. The upbeat mood among fans quickly turned to panic when the individual began confronting them with the weapon. Police responded decisively, initially using pepper spray and issuing a warning before resorting to gunfire. Four loud bangs were heard as the

situation escalated. Hamburg Police confirmed the details in an official statement: “According to initial findings, a person threatened police officers with a pickaxe and an incendiary device. The police then used their firearms. The attacker was injured and is currently receiving medical treatment.” Following the incident, the Reeperbahn area near the fan zone was closed off to ensure safety. Thousands of Dutch supporters, hoping to see their team start strong in the European Championship, were in the vicinity at the time. MORE>> Reuters

14


INDUSTRY NEWS Two French Mercenaries Arrested in Central African Republic Two French citizens, suspected of being mercenaries, have been arrested in the Central African Republic (CAR). The men, Franco-Algerian nationals, were detained in Bangui, found with military weapons and large sums of money. Local media reports that during a search of their lodgings near the French ambassador’s residence, authorities discovered AK-47 rifles, grenades, ballistic helmets, and tens of millions of CFA francs. The men, residing in Bangui since 2017, were involved in the mining sector and had connections with high-profile Central African political figures.

the ongoing geopolitical tensions and the critical role of private security forces in the region’s security landscape. The French embassy is ensuring consular protection for the arrested individuals, highlighting the international implications of this case. Security professionals should note the increasing complexity and risks associated with mercenary activities in conflict zones. MORE>>

Pro-Russian sources claimed the men had frequent contact with leaders of armed groups and CAR military officers, suggesting deep involvement in local conflicts. This arrest follows a recent detention of a BelgianPortuguese consultant for alleged plotting against the state with rebel groups. The CAR, plagued by civil wars and instability, heavily relies on Russian mercenaries from the Wagner Group for support. This incident underscores World’s Most Expensive Cow Protected by Armed Bodyguard Meet Viatina-19, the most expensive cow in the world, valued at a staggering $4.3 million. This snowwhite Nelore beef cow, weighing over 1,100 kg, is twice the size of an average cow of her breed. Viatina19’s high value stems from her rapid muscle growth and exceptional fertility, traits she passes on to her offspring, making her a prized possession among breeders.

To safeguard this invaluable animal, Viatina-19 is constantly monitored by cameras and an armed guard. Her barn, located on a farm near Uberaba in Minas Gerais, Brazil, has become a popular attraction for visitors eager to see this remarkable cow. “She’s the closest to perfection,” says Lorrany Martins, the veterinarian caring for Viatina-19. “She has all the characteristics that breeders are looking for.” MORE>>

15


CIRCUIT MAGAZINE ISSUE 68 RFK Jr.’s Bodyguard Plays Key Role in Campaign Gavin de Becker, a renowned celebrity bodyguard, is playing a crucial role in Robert F. Kennedy Jr.‘s presidential campaign. De Becker, known for protecting high-profile clients like Jeff Bezos and Prince Harry, not only ensures Kennedy’s safety but is also one of his biggest donors and vendors. His security firm has received substantial payments from the campaign, making de Becker a pivotal figure in Kennedy’s bid for the White House. De Becker’s involvement goes beyond physical protection. He shares Kennedy’s skepticism of the medical establishment, particularly regarding vaccines, and has used his platform to voice these concerns. His support includes providing millions in “bridge funding” to Kennedy’s super PAC, Is This 4-Wheel Security Robot About to Replace Human Security Guards?

showcasing an unusual blend of personal commitment and financial backing. In light of past threats against Kennedy and his family, de Becker’s role underscores the importance of robust security measures for highprofile political figures. His presence highlights the intersection of celebrity security expertise and political campaigning, illustrating how personal protection strategies are adapted for the political arena. MORE>> high-speed capabilities make it an effective deterrent. While the Thalamus isn’t intended to replace human security guards entirely, it serves as a robust assistant, taking over monotonous and dangerous tasks. This allows human personnel to focus on complex decision-making and emergency situations. The robot also promises to reduce operating costs by optimizing resource allocation and enhancing efficiency.

The security industry is on the brink of transformation with the launch of the Thalamus 2024, an autonomous security robot from France. This 551-pound, 7.5-foot-long robot, equipped with advanced sensors and artificial intelligence, is designed to handle surveillance and patrol tasks. The Thalamus 2024 can autonomously navigate challenging terrains and harsh environments, reducing the need for human presence in hazardous As the Thalamus 2024 rolls out, areas. starting with shipments to the U.S. this summer, its potential to With four infrared cameras and a revolutionize security operations is PTZ camera, the Thalamus provides significant. However, it also raises a 360-degree view, analyzing realquestions about the balance between time footage to detect unauthorized human judgment and machine activity. It can trigger alarms and even efficiency in security roles. broadcast prerecorded messages to ensure swift response to potential threats. Its imposing presence and MORE>>

16


INDUSTRY NEWS Prince Andrew will KEEP his police bodyguards following review of his security detail in wake of Jeffrey Epstein scandal A federal investigation has determined that Professional Security Consultants Inc. – a Los Angeles-based security company that provides officers for shopping malls, schools, hotels, hospitals, office buildings and gated communities – repeatedly exposed its employees at the Boise Towne Square mall to workplace violence hazards and failed to follow its own procedures for interacting with armed individuals to enforce the mall’s code of conduct.

following the fatal shooting of an unarmed security officer on Oct. 25, 2021. OSHA cited the company for not instituting controls to protect security workers from hazards likely to cause death or serious physical harm. the agency proposed penalties totaling $14,502.

Who’s protecting Who’s protecting Who’s protecting YOU, while you YOU, while you YOU, while you protect others? protect others? protect others?

The U.S. Department of Labor’s Occupational Safety and Health Administration initiated an inspection

“Professional Security Consultants’ policies and procedures did not effectively address the risk of gun violence, a recognized hazard in the security services industry,” said OSHA Area Director David Kearns in Boise. “Every worker has the right to a safe and healthful workplace. This employer must provide enhanced safeguards and training to ensure workers have the knowledge and tools to better protect themselves against assault.”

Source >

With our premium tier of membership, we’ve got you covered under the BBA Protect insurance policy, providing complete peace of mind while With our premium tier of membership, we’ve got you covered under the you work in addition to the standard BBA membership benefits. BBA Protect insurance providing we’ve complete of mind whilethe With our premium tier policy, of membership, got peace you covered under Designed forin professionals looking toproviding maximiseBBA their employability and their you work addition the standard membership benefits. BBA Protect insuranceto policy, complete peace ofdemonstrate mind while commitment to industry standards, there are two levels of Protect membership available: you work addition to the standard benefits. Designed forin professionals looking to maximiseBBA theirmembership employability and demonstrate their commitment to industry standards, are two levels of Protect membership available: Designed for professionals looking tothere maximise their employability and demonstrate their PROTECT PROTECT+ commitment to industry standards, there are two levels of Protect membership available: Individual public and products liability Personal accident and health insurance PROTECT PROTECT+ insurance designed for UK Close designed for armed Close Protection and Individual public and working productsinliability Personal accident healthworking insurance Protection operators nonMaritime Security and operators in PROTECT PROTECT+ insurance designed UK Close designed for armed Close Protection and hostile regions. hostile regions. Individual public andfor products liability Personal accident and health insurance Protection operatorsfor working in nonMaritime Security working and in insurance designed UK Close designed for armedoperators Close Protection hostile regions. hostile regions. Protection operators in nonMaritime Security membership operatorsorganisation, working The in As a trusted professional FROM JUST £60working PER MONTH BBA are dedicated to bringing our members the best hostile regions. hostile regions. IT’S EASY TO UPGRADE YOUR BBA

FROM JUSTTO £60 PER MONTH MEMBERSHIP PROTECT YOU. IT’S EASY TO UPGRADE YOUR BBA FROM JUST £60 PER MONTH MEMBERSHIP TO PROTECT YOU. IT’S EASY TO UPGRADE YOUR BBA MEMBERSHIP TO PROTECT YOU.

possible resources and tools to enhance their standing and As a trusted professional membership organisation, The credibility as close protection operators within the industry. BBA are dedicated to bringing our members the best As a trusted professional membership organisation, Theand possible resources and tools to enhance their standing BBA are dedicated to bringingoperators our members thethe best credibility as close protection within industry. possible resources and tools to enhance their standing and credibility as close protection operators within the industry.

Visit our website at www.the-bba.org.uk to find out more. Visit our website at www.the-bba.org.uk to find out more. Visit our website at www.the-bba.org.uk to find out more. Lockton Companies LLP is a limited liability partnership incorporated in England and Wales, registration number OC353198. Authorised and regulated by the Financial Conduct Authority.

17

Lockton Companies LLP is a limited liability partnership incorporated in England and Wales,


CIRCUIT MAGAZINE ISSUE 68 By Joe Autera & Kevin Dye

Navigating the Executive Protection Landscape in the U.S.

Among the many career paths that have emerged within the private security sector across the United States in the past few decades, few, if any, are as dynamic and rapidly growing as those in the executive protection domain. That said, few careers in the broad spectrum of private security are as overhyped, misperceived, or glamorized to the point of being unrecognizable 18

from the day-to-day reality of the work completed. With over 11,000 registered security service businesses in the United States (and an untold


NAVIGATING THE EXECUTIVE PROTECTION

number of unlicensed providers, trainers and companies), the professional landscape within EP is very diverse, offering a variety of career paths for aspiring protectors, none of which are without hurdles and obstacles that must be considered (or, at the very least, anticipated and planned for). For newcomers, up-and-comers, and even some experienced Executive Protection practitioners and managers, navigating your way onto a viable path to career success can be challenging. The goal of the authors in putting “pen to paper”, or more accurately, fingers to keyboard,

is to shed light on the intricacies and quirks of the U.S. Executive Protection (EP) marketplace. We thought that the fastest, most direct route for doing so is by sharing the observations and lessons learned while transitioning personally from, in one instance, federal law enforcement to the private sector EP realm within the last decade and, in the other, transitioning from military service to the private sector EP profession more than three decades ago. We sincerely hope those interested in entering the EP profession find value in this article and, perhaps for some, realise that their interests and 19


CIRCUIT MAGAZINE ISSUE 68 strengths lie in some other sector within the private security ecosystem. The Importance of Quality Training (Don’t Prove P.T. Barnum Right). In most circumstances, embarking on a successful career in Executive Protection requires more than just a law enforcement or military background. While every career field has unicorns, being a onetrick pony doesn't help you in EP. In this respect, EP is similar to other more specialized aspects of private sector security, like Technical Surveillance Counter Measures (TSCM), K9 operations, Security Driving, and Critical Infrastructure/Key Resource (CI/ KR) protection. In each of these specialities, quality training is paramount, and organizations like the United States Secret Service and the U.S. State Department Diplomatic Security Service are recognized for providing world-class training in protective operations. These operations must meet the operational requirements of protecting some of the most notable and recognizable public figures in the world. The same 20

United States Secret Service and the U.S. State Department Diplomatic Security Service are recognized for providing worldclass training in protective operations that comport with the operational requirements of protecting some of the most notable and recognizable public figures in the world.


NAVIGATING THE EXECUTIVE PROTECTION holds true for the U.S. Army Military Police Protective Services and Antiterrorism Evasive Driving Branches, both of which are the Department of Defense's 'go-to' training providers for personnel from all branches of the military assigned to close protection duties for General Officers and key staff. For those not inclined towards government service, reputable industry-recognized EP training programs are crucial for building the necessary skills to secure and maintain employment. Choosing a training provider and a specific course that covers a comprehensive curriculum, including planning, managing, and conducting protective operations, defensive/ control tactics, emergency medicine, firearms training, and more is essential.

“may.” Regardless of prevailing State or local regulations, employers may and often do require more stringent training requirements to be considered for employment. Keep in mind that this is the first opportunity for someone to prove Mr. Barnum, who is widely credited with uttering the phrase "there's a sucker born every minute", right or wrong. Remember that right or wrong, the choice for professional EP training belongs to you. Researching training academies and talking to graduates in the industry is your responsibility. Choose wisely, and Mr. Barnum plays the part of the fool; choose unwisely, and you may find yourself playing that same role.

Training and Certification or Is that Piece of Paper Even Even for experienced Worth the Paper It's Printed On? practitioners, making the Despite the importance of transition to the private sector requires satisfying State licensing quality training, the private sector EP profession has, for and training requirements, decades, dating back to the regardless of "where you came 1970s when professional from.” In some instances, training first emerged, continued prior formal training and/or to face challenges regarding professional experience may lead to an exemption from some training methodologies and standardization. While it is easy state-level requirements; the to blame “the States" or even the operative word, of course, is 21


CIRCUIT MAGAZINE ISSUE 68 Federal government for failing to develop universal regulatory requirements for EP training and licensing, these are just two factors that have contributed to the absence of a professional standard over the past several decades. When it comes to establishing a minimum level of proficiency and qualification in the critical aspects of protection planning, protective operations and administration, the reasons cited by those who resist developing and implementing such standards continue to grow weaker and weaker, particularly in today’s litigious environment. Another factor, which for decades has contributed to the glaring absence of a professional standard in such a potentially high-risk line of work, is the hesitancy (or, in some cases, staunch resistance) on the part of some working on both the operational and training side of the profession to acknowledge the need for a framework of professional standards, and to support their development. There are several theories as to why one might resist a process that would elevate and advance the profession, most of which (but certainly not all) 22

revolve around revenue and profit. Compliance with any standard will cost time and money. Yet, other professions have thrived once a professional standard has been introduced because the perceived value of a legitimately certified professional may be higher than one that isn’t. Another consideration is the reduced professional insurance costs that accompany documented compliance with independently sanctioned and accepted professional standards. Currently, in the absence of professional standards, most private sector training companies, the vast majority of which are “for profit” entities, develop their curricula based strictly on their perception of what topics or subjects should be covered, the market needs and the depth with which they feel the subjects should be covered. Other training provider’s curricula are based on somewhat minimal and often outdated, State requirements for licensure, with little to no thought given to the reality (and demands) of providing protection in various locations, environments, and situations. This begs the question of whether the training is


NAVIGATING THE EXECUTIVE PROTECTION of schools offering outdated, irrelevant, or substandard education for profit. With that in mind, deciding what courses to attend should not be made in a vacuum. In other words, educate yourself by researching current With no clear EP career and recent job postings for EP standards, aspiring protectors must be cautious when selecting positions to better understand a training program, steering clear what hiring managers have to relevant to the roles one will be filling in this dynamic, diverse career field and whether this training certificate is even worth the paper it was printed on.

23


CIRCUIT MAGAZINE ISSUE 68 Industrial Security International (ASIS) and others such as the International Protective Security Board (IPSB), and the industry newcomer, The Board of Executive Protection Professionals (BEPP), can play a crucial role in making entry and gaining traction in one’s career, in the EP profession. The value these professional organizations Other sources of information and informed opinions regarding provide comes in the form of: selecting the training that will prove valuable include seasoned 1. Providing opportunities to network with others in the professionals working in the profession profession for many years, particularly those who have 2. Providing access to relevant attended a wide variety of career information and training courses provided by an resources and equally wide range of training providers. Why spend money on 3. Providing access to specialized an untested program when you educational resources and can just as easily ask a graduate? certifications In these instances, it’s wise to avoid the person who has a) only Even though these organizations ever been to one course (but swears it’s the “best course ever”) all serve the EP profession in one fashion or another, they differ or b) only attended courses significantly in strategy and focus. designed, developed, and delivered by the same training Despite the EP domain being provider. exceedingly small compared to other security domains here in The Role of Professional the U.S., ASIS, the grandfather Organizations (No, Really… I of all professional security Know a Guy) organizations, has taken a Professional organizations broad, multi-faceted approach to like the American Society for say regarding the training they want prospective candidates to walk through the door with. You'll likely find their thoughts under "Qualifications" in their job posting, but talking to those managers and people already holding positions you seek can also give you valuable insight.

24


NAVIGATING THE EXECUTIVE PROTECTION

Why spend money on an untested program when you can just as easily ask a former graduate.

supporting and being inclusive of those interested or working in the EP profession. And while most of their efforts are focused on the larger security domains represented by its membership, the organization continues to oversee and administer an online EP Community network. ASIS relies heavily on communications with members and holds the largest national conference in the security industry, the Global Security Exchange (GSX). While not specifically an EP organization, ASIS has made recent strides to address the growing EP market. The IPSB, though far younger than ASIS, is most widely known within the EP profession for its annual Close Protection Conference, which reflects its roots. The IPSB was formed in 2016, a few years after two of the most widely recognized EP training schools in the U.S. decided it was in their financial best interests to combine the annual conferences they hosted separately and exclusively for their training alumni. Interestingly enough, the conversation that led those organizations down the path to the formation of the IPSB took 25


CIRCUIT MAGAZINE ISSUE 68 place at the annual Protective Security Council (PSC) conference in Baltimore, MD, in the mid2000s. There have also been several other professional organizations related to security, particularly the executive protection domain, including the Corporate Executive Protection

26

Leadership Council (formerly the CPLC), the Protective Security Council (PSC) and many others too numerous to list. As it was known, the PSC was active for approximately 3 years and only recently was disbanded after remaining dormant for a decade.


NAVIGATING THE EXECUTIVE PROTECTION an understanding of how to leverage organizational benefits towards one's career goals. In addition to the industryaccepted professional organizations listed, EP professionals are also frequently exposed to pseudoorganizational “clubs” and networks, which are cleverly marketed by some trainers and contract hiring teams. Memberships in these networking groups, leagues or clubs require a "small fee" or registration in a course the organisation offers. They give members perceived private access to knowledge and networking unavailable elsewhere. As mentioned earlier, Though each of these prominent do your homework and fully organizations has a track record understand any group you affiliate with or spend money to of bringing value to various participate in. There's a reason segments in the executive the term "smoke and mirrors" protection industry, it is incumbent upon the practitioner exists in this industry, and most to recognize that there could very access and information is free well be a difference between the if you know where to look. Your goal is to make money in an EP perceived and actual value you profession, and plenty of people receive through membership in ahead of you know how to take these organizations. Ultimately, the value proposition is primarily yours. driven by how much time One last thought on professional and energy one is willing to organizations and conferences: commit, the return on personal despite what you may have investment, and developing Most recently, the BEPP, the newest of the formalized EP professional organizations, was created two years ago to develop an ANSI-sanctioned professional standard for executive protection. While that remains the organization's primary focus in developing the means to finance the costly standards development process, the nonprofit BEPP has found ways to accomplish that goal while providing educational value for all EP practitioners while offering significant networking opportunities through the organization’s Executive Security Operations Conference (ESOC) held in June.

27


CIRCUIT MAGAZINE ISSUE 68 been told, simply handing out resumes and scanning QR codes found on business cards isn’t actual networking. Networking is effectively introducing yourself and becoming familiar with (and to) those whose careers you wish to emulate or whose experience may be helpful to you in enhancing or advancing your career. Before investing hundreds of dollars in headshots, professional resumes, and shiny new business cards, invest appropriately in your verbal communication skills and your personal appearance because while it absolutely is cliché, you don’t get a second chance to make a first impression. On a personal note, lose the black shirt as well; people in corporate positions wear white dress shirts. Emulate where you want to go. Career Paths in Executive Protection (You Have to Walk Before You Can Run) Upon completing your baseline EP training, and despite what unscrupulous promoters may have told you of EP schools, graduates often face a very competitive job market. It's common for a new protector to be employed in a full-time security-related position while 28

Just because you don’t yet “check all the boxes” for that dream position doesn’t necessarily mean your hopes of being the next “world’s best protector” will be dashed to pieces on the rocky shoreline of reality.


NAVIGATING THE EXECUTIVE PROTECTION developing working knowledge and field experience in EP on a part-time basis. That is "the nature of the beast", as they say, and while it's always good to aim high, it's important to be realistic about the opportunities available to you once the adrenaline high of training wears off (and it wears off quickly). For instance, many consider fulltime corporate EP positions to be the pinnacle of the profession. However, these coveted positions are highly sought after and are some of the most competitive in terms of qualifications and the hiring process. If landing such a position is your goal, at a minimum, you are likely to need multiple years of verifiable professional experience, a college degree (or even more verifiable experience instead of a degree), and perhaps, depending upon the hiring entity or even the location, prior law enforcement experience. While one can complain about such prerequisites, this is just one of many aspects of the EP profession where "the golden rule of professional life" (i.e. the party with all the gold gets to make all the rules) holds. If a full-

time corporate position is what you seek, make sure your career development plan accounts for the education and experience you will likely need to achieve that goal. But just because you don’t yet “check all the boxes” for that dream position doesn’t necessarily mean your hopes of being the next “world’s best protector” will be dashed to pieces on the rocky shoreline of reality. Perhaps it simply means that, as many who have entered the profession have done, you’ll have to work through a series of “stepping stone" positions that will provide you with the needed experience. While each of those positions may not be that dream job you want, one would be well served to focus your time and energy at each step along the way by learning how to do that job to the best of your ability, as opposed to worrying about how soon you can move onward and upward. If you remain sharply focused on doing your best and learning the best you can in each position or assignment, you might be surprised at how quickly you reach your goals. As a hiring manager looking at a career on a resume, it is not 29


CIRCUIT MAGAZINE ISSUE 68

uncommon to see progressively more challenging roles leading up to the interview. As a manager, you become concerned when you see the same role in numerous positions for short periods. Having worked 50 clients or contracts in 5 years may be a claim to fame for some; it screams incompetence to those who know better. 30

In Conclusion (Take THAT ChatGPT) Entering the Executive Protection field requires dedication, quality training, and a keen understanding of the industry's working culture. Achieving sustained success in EP requires a willingness and ability to continually learn, maintain personal integrity and


NAVIGATING THE EXECUTIVE PROTECTION profession in the United States. For more than three decades, the EP industry has been largely without direction, resulting in industry division, broad disparities in training and consumer misunderstanding. The future of Executive Aspiring protectors should Protection is reliant on prioritize reputable training knowledgeable and wellprograms, be cautious of misleading advertisements, and trained protectors seeking to consider professionalism through professionalize the industry industry standards development. and themselves. Whether you choose quality training, Collaboration between existing organizational membership, or professional organizations and career specialization to progress the development of universally in your career, understanding the recognized best practices and existing EP landscape and culture standards will further elevate is a necessary step toward the credibility and effectiveness success. of the Executive Protection professionalism, communicate effectively, establish relationships by collaborating effectively with others, and exercise good judgment by making sound career decisions.

Joe Autera is the President & CEO of Vehicle Dynamics Institute (VDI), where for the past 20 years he has designed, developed, and delivered highly advanced security driving and secure transportation-related training programs to private and public sector protection practitioners in more than 36 countries on 6 continents. Mr. Autera is also the author of the highly acclaimed, international bestselling book “The Professional’s Guide to Planning, Managing, and Providing Secure Transportation”. Additionally, like his co-author, he is also a Founding Member of the Board of Executive Protection Professionals, and formerly served as Vice Chairman of the Board, as well as the Chair of the Executive Security Operations Conference Sub-committee. Kevin Dye is a retired U.S. Secret Service supervisor and Presidential Protective Division alumnus with more than 30 years of experience providing international executive protection. Currently serving as the Senior Manager of Executive Protection for a Fortune 50 company, Kevin is responsible for planning, managing, and personally providing a wide range of protective services to this organization’s senior leadership. Mr. Dye is also a member ASIS, the Board of Executive Protection Professionals (BEPP) and co-author of the highly regarded Executive Protection Advance and Logistics Guidebook. 31


CIRCUIT MAGAZINE ISSUE 68 By Denida Zinxhiria Grow

The Necessity of a Client Questionnaire for Executive Protection Operations

One of the most important and basic functions that a majority of the companies who provide executive protection services are failing miserably to obtain, is the client questionnaire.

32


EXECUTIVE PROTECTION OPERATIONS How many of you have been called by a company to provide services and you found yourself with not enough information about the client, besides a name and a location, and you had to literally fight to get more information from the project manager or the person in charge for the specific client? Don’t worry, we already know the answer and most of you have found yourselves in this situation. The most important part in an executive protection detail is not to get the client or the contract, but to deliver great services and to excel. In a profession where excellence is directly connected not only with professionalism but also with the level of protection, it is vital for the industry to make sure basic steps are constantly applied. However, no matter how vital it is, many colleagues fail to maintain a questionnaire out of pure laziness, or because they do not know what to ask the client or are too afraid of the client to ask the important questions. A client questionnaire is the first

thing you must provide from the moment you secure that client/contract. You can either send the document to the client or the POC, or you can fill it yourself with the information you gather as you speak with the client or the POC. It is a very crucial document for executive protection professionals as it enables them to gather vital information, conduct risk assessments, customize security measures, establish client expectations, and facilitate effective collaboration. It serves as a valuable tool for developing comprehensive security plans and ensuring the safety and well-being, not only of the client but also your personnel. Client questionnaires can help your operation in several ways: It can help you gather essential operational information about the client and their specific needs. This includes details such as the client's personal and professional background, their routines and schedules, travel plans, known threats or risks, and any specific concerns they may have. This information helps the protection team tailor 33


CIRCUIT MAGAZINE ISSUE 68 their services and develop a comprehensive security plan that addresses the client's unique requirements. It will be a helpful tool for your risk assessment and threat analysis. Although some companies believe that one should perform a risk and threat assessment ONLY if they charge the client for it, so if the client isn’t paying, they won’t provide one. Crazy? Yeah! And it happens more often than one may think. But this topic is for another time to discuss. Just keep in mind, you don’t run a risk and threat assessment because the client is buying the ‘’product”, you run one because IT IS part of your functions, and it will undoubtedly benefit your team on the ground. So, when you run a client questionnaire by collecting information about the client, their activities, and their environment, the information gathered enables you to conduct an initial risk assessment and threat analysis. It will help you identify potential risks, vulnerabilities, and areas of concern that need to be addressed to ensure the client's safety and security. It 34

You don’t run a risk and threat assessment because the client is buying the ‘’product”, you run one because IT IS part of your functions, and it will undoubtedly benefit your team on the ground.


EXECUTIVE PROTECTION OPERATIONS allows your protection team to develop effective strategies and countermeasures to mitigate these risks. As we all know, each client and each operation have its own needs that can vary significantly depending on factors such as their professional background, public visibility, lifestyle, specific circumstances, and geographic location. The information obtained through a client questionnaire enables you to customize your security measures to suit the client's specific protective needs. This may involve determining the level of security personnel required, implementing access control measures, arranging secure transportation, establishing secure communication protocols, or any other necessary precautions. By knowing your client’s needs, you will also be able to establish clear expectations between you, your protective team, and them. By utilizing a client questionnaire, you enable your clients to have the opportunity to communicate their concerns, preferences, and any specific requirements they may have

(Remember, in our industry, what the client wants matters as well). By understanding your client's expectations upfront, you and the protective team can align your services, accordingly, ensuring a satisfactory and effective security operation. As a project manager or company owner, you also have a duty toward the people you are hiring. Since you are the one who makes that first contact (services sales as well) with the client, you must be sure you require specific information to pass on to your team on the ground. There is nothing more unprofessional, unhelpful, and inconsiderate than to send your team unprepared and expect them to do a great job. Unfortunately, as we mentioned earlier, it happens way too often. Some people are just lazy to do what it needs to be done, others are terrified of the client and believe if they ask questions (which are necessary for a protective operation) will make the clients angry, and some do not know what to ask! Now we can’t do anything about those who are just lazy, however for those who fear 35


CIRCUIT MAGAZINE ISSUE 68 the client, let us assure you that, nothing else shows more • Personal Information, professionalism and that you including full name, DOB, know your field, than when you nationality, religion, home show interest and make the address, contact information, necessary questions that will and person in charge (if not enable a smooth and successful the client). protective operation. Consider the fact that, for the majority of • Professional Information, the time, you won’t be dealing including current occupation with the client himself/herself, or business, employer/ but with their PA, security company name, job title, and manager, agency, etc. Those business address. people will be able to provide this information to you because • Lifestyle and Routine, they already know most of the including daily routines answers, and for those they do and schedule, locations not know, they already have frequently visited (home, communication, trust, and the office, public places), confidence of the client. So don’t regular activities (sports, be afraid to do what your job social events, hobbies), any may dictate. upcoming special events or engagements, associations Now for those who do not know (social, professional, religious, what to ask. political), travel frequency and destinations, public exposure, Think of the client questionnaire or visibility. as a mini and first risk and threat assessment. Ask yourself, what • Known Threats and Concerns, would I need to know if I was including any previous the agent on the ground hired security incidents or threats, for this specific client to provide specific concerns or risks professional and successful identified by the client or protective services? Divide the his immediate environment, questionnaire into sections such information about any as: stalkers, disgruntled 36


EXECUTIVE PROTECTION OPERATIONS individuals, or potential adversaries, any information about the client or anyone in their immediate sphere of influence (SOI) to have been involved in controversial activity (public speech, professional decision, etc.)

Consider the fact that, for the majority of the time, you • Travel Information, including won’t be dealing planned or anticipated travel destinations, travel dates, with the client and duration, purpose of travel, mode of transportation himself/herself, (private jet, commercial but with their PA, airline, etc.), accommodation preferences (hotels, rental security manager, properties, etc.) agency, etc. • Support Personnel, including names and contact information of personal assistants, drivers, or other personnel involved in the client's daily activities.

• Security Measures, including any current security arrangements, if any (i.e., RST, security systems, surveillance cameras, alarm systems, etc.), details of any existing security personnel or teams involved in the client's protection, how many people are to be protected, any family members 37


CIRCUIT MAGAZINE ISSUE 68 traveling with the client (what, • Likes and dislikes regarding if any family members are NOT his/her EP detail – Additional included in this assignment), Information, including the and length of assignment client’s preference about the (days, hours per day). security team, if they have ever hired any EP services • Communication Preferences, before, why they are not using including preferred methods that firm anymore, and any of communication (phone, other specific requirements or email, text), emergency contact concerns the client or the POC information (family members, wants to address. close associates), Bear in mind that the questions • Medical Information, including in a client questionnaire may any pre-existing medical vary based on the unique needs conditions or allergies, details and circumstances of the client, of any required medications and it may need to be tailored or medical treatments, with additional questions or emergency medical contact sections. The preferable option is information, and any dietary to have a document sent to the restrictions, or intolerances. client, their PA, or POC for the specific detail and ask them to fill • Legal Considerations, it out for you. That way you can including any legal issues or have an extra layer of protection ongoing litigation that could (even a legal one) if anything impact security measures or happens due to information not confidentiality. given to you. Denida Zinxhiria Grow is the Founder and CEO of Athena Worldwide, Athena Academy and Nannyguards. She uses her personal experience as an Executive Protection Operative and Security Consultant to help others learn what it takes to master the ins and outs of the Security Industry and empower women in the security industry. Chris Grow is an Executive Protection Specialist with 30 years of experience in a wide range of operational theaters. Through progressive exposure to national and international security, Chris has designed and executed successful risk and threat assessments and implemented security plans and strategies to mitigate risk and enhance security for multi-cultural clientele across many different industries. 38


EXECUTIVE PROTECTION OPERATIONS

CONNECTING THE GLOBAL SECURITY COMMUNITY Where the world’s security leaders & end users come together to discover the latest innovations, learn from leading global industry experts, network and meet with Government.

10,000+

300+

HIGH-LEVEL

IMMERSIVE

SECURITY DECISIONMAKERS

SUMMIT & CONFERENCE

INTERNATIONAL EXHIBITORS

LIVE DEMONSTRATIONS SCAN TO REGISTER

SECURE YOUR FREE PASS TODAY

internationalsecurityexpo.com 39


CIRCUIT MAGAZINE ISSUE 68

AHNA CONSULTING GROUP

The difference between feeling safe

AND BEING SAFE HOTEL & HOSPITALITY CONSULTING

CYBER/IT SECURITY

CORPORATE SECURITY PROGRAMME AUDITING & DESIGN

TRAINING

RISK ASSESSMENTS

We are ready to listen to you ahnagroup.com

40

+373 79 557736

info@ahnagroup.com


CYBERSECURITY FUNDAMENTALS

By James Bore

cybersecurity fundamentals

Understanding Blockchain After years of writing for the Circuit Magazine, it’s surprising I’ve never covered blockchain technologies in any real depth. This article is going to rebalance the scales. We’ll cover the technology itself and how it works, then the various applications it’s put to – the benefits (if there are any) and the negatives compared to existing technologies that fill the same gap.

under the control of one party. Instead, a distributed group of entities vote on whether or not a transaction is genuine and therefore should be added to the ledger.

The ledger itself is theoretically distributed, so that all participants in the network have access to an What is it? identical copy at any one time Often referred to as a trustless and can see the details of any public ledger, blockchain transaction that occurred. This is technologies are cryptographic protocols that provide a way to have where the trustless part comes in, as it refers to the lack (in theory, we’ll a verifiable record of transactions get to that) of a central authority (financial or otherwise) that is not 41


CIRCUIT MAGAZINE ISSUE 68 able to modify the ledger at will. Banking is the most common use that gets brought up, with cryptocurrencies being blockchainenabled electronic currencies being the way that most money is made from the technology. As a comparison, instead of a traditional bank maintaining a database of accounts and transactions on behalf of their customers – who have to then trust that they won’t take advantage – every stakeholder gets an identical copy of the database, and the opportunity to vote on whether or not the entries are accurate before they’re written.

only be spent by the owner (again, in theory) so they’re the only one who can spend money. What are the problems? The reason this is in theory is because, while different approaches deal with the voting in different ways, there are weaknesses. Large stakeholders who control significant portions of the technology that runs a blockchain database can decide to reject genuine transactions, or accept fraudulent ones, with no checks on their activities. Since this is based in many cases on having possession of the hardware, and there are few to no regulatory restrictions, it’s an excellent opportunity for market manipulation or outright fraud.

Of course these transactions can be anything, there are different ‘wallets’ Next there’s the anonymity issue. created for different parties. These One of the major selling points wallets will carry a balance, as well as any metadata chosen, which can of cryptocurrencies is the idea of

42


CYBERSECURITY FUNDAMENTALS

The use of cryptocurrency for everyday purchases has reduced over time, with everyone from pizza companies to Tesla having dropped options to buy with bitcoin.

anonymity. The problem is that it is only as anonymous as the individual’s personal security – if someone can be tied to a blockchain wallet, every transaction they’ve ever made can immediately be linked to them. Inefficiency is another problem. While newer cryptocurrency setups have much lower energy use, they are still massively wasteful. A single bitcoin transaction, for example, uses over 700kWh of electricity – or about as much energy as an average household for three months. More efficient currencies exist, such as Ethereum which uses only around 7Wh (or 0.007kWh), but for comparison a Mastercard transaction uses a tenth of that. There’s an estimate that if bitcoin were to become the universal currency system, we would need to increase the energy production of the entire planet by a factor of ten purely to handle transactions. Then, there are the questions around usage. Currencies Cryptocurrencies exist largely as investment vehicles, not for any practical purpose. In fact the use of cryptocurrency for everyday purchases has reduced over time, with everyone from pizza companies to Tesla having dropped options to buy with bitcoin. Instead, investors 43


CIRCUIT MAGAZINE ISSUE 68 purchase (or start) cryptocurrencies in the hopes that the market will improve, demand will go up, and they can sell them to people who only watch the upwards trend and haven’t learned from history.

address than owning the house. And the tokens provide no actual protection for the content, with the majority of NFTs within days of the concept launching being fraudulent copies of ‘genuine’ ones.

Aside from their use as investment vehicles, cryptocurrencies are great for money laundering, and providing ways for organised ransomware gangs to collect payments.

Then with physical assets, ultimately there is no advantage over any other database – ultimately there is still trust that the person entering the data not only has good intentions, but makes no mistakes.

Non-Fungible Tokens (NFTs) NFTs were a brief flash in the pan, with some very expensive digital ‘art’ such as the seemingly neverending Bored Ape Yacht Club. The theory was that NFTs were digital assets where you could prove their ownership and authenticity by following transactions on the relevant blockchain database back to the creator. For a while there was excitement about using the same approach to authenticate physical assets, and a lot of investment money went that way. There were two problems. The data the tokens point to were fungible, more akin to owning a street

Databases The same problems exist with any other use of blockchain for databases – in most cases existing solutions are simply superior for their use case because it’s better to trust an individual authority than to try and set up a massively distributed network which is susceptible to manipulation, and in which no one can ultimately be held to account. Ultimately, the blockchain is a solution looking for a problem – which is largely used for crime until that problem comes along.

James Bore is an independent cybersecurity consultant, speaker, and author with over a decade of experience in the domain. He has worked to secure national mobile networks, financial institutions, start-ups, and one of the largest attractions’ companies in the world, among others. If you would like to get in touch for help with any of the above, please reach out at james@bores.com 44


45


CIRCUIT MAGAZINE ISSUE 68 By: Thomas “Tom” Pecora

From Iron Box to Invisible Shield Reevaluating Surveillance Strategies in Executive Protection

When it comes to surveillance, surveillance detection, and countersurveillance, we need to clearly understand what these terms mean in relation to executive protection operations. They are critical aspects of this mission, and there appears 46

to be some confusion over what they mean and how they are executed. To put this into perspective, we need to look back a few years and examine an event that forever changed how the world looks at protective operations.


FROM IRON BOX TO INVISIBLE SHIELD Demise of the “Iron Box’ Tactic Alfred Herrhausen, Chairman of the Deutsche Bank, was assassinated on 30 November 1989 in Frankfurt, Germany, by the Red Army Faction (RAF), also known as the Baader-Meinhof

reevaluation of the strategies and tactics being used by Executive Protection (EP) personnel. At the time, the most common strategy/ tactic in EP operations was called the “Iron Box” method. This was based on the idea of using

Group, a West German radical leftist terrorist group. The RAF detonated a small explosive device attached to the back of a bicycle as Herrhausen drove by in his armored limousine. The platter charge propelled by the explosives ripped through the armored vehicle and killed Herrhausen.

trained and armed protective operations personnel and armored vehicles to deter and defend against attacks on the protectee. Unfortunately, the assassination of Herrhausen via a small explosive device showed that a determined foe would be able to negate the "guys, guns, and cars" with technology and appropriate tactics.

The Herrhausen assassination was a catalyst for a change in counterterrorism and protective operations methodology. This attack caused a massive

Terrorist Attack Cycle The determination that the Iron Box was insufficient to address a sophisticated attacker left the EP 47


CIRCUIT MAGAZINE ISSUE 68 world no choice but to analyze the attack strategies used by criminals and terrorist groups and adjust. The conclusion was that EP personnel and counterterrorism units needed to exploit the vulnerabilities in the Terrorist Attack Cycle specifically, the surveillance requirements and stages of the attack cycle. Surveillance is involved in almost all criminal acts, sometimes for a few seconds before hitting a target of opportunity or months of observation in preparation for an attack, robbery, kidnapping or murder.

48


FROM IRON BOX TO INVISIBLE SHIELD Surveillance Surveillance has become a critical element in the success or failure of attacks on persons with EP teams. By incorporating surveillance detection and countersurveillance strategies and activities, EP teams can exploit terrorist surveillance vulnerabilities. This is why understanding the nuances of surveillance activities and strategy should be an essential part of the education of EP personnel.

time, countersurveillance (CS) is a specific skill set used to identify unwanted surveillance (particularly hostile surveillance) by an individual or team looking for surveillance on another individual or team (EP detail, etc.).

CS teams are a more advanced and efficient method of detecting surveillance. Countersurveillance is a more passive, defensive activity not directly involved in countering threats before they manifest. Ideally, CS is not overt and will not deter or directly Unfortunately, most EP courses neutralize a potential threat. do not adequately cover the In the civilian world, EP teams importance of detecting hostile have no arrest powers, nor do surveillance and how surveillance they want the unwanted (or can be detected - either by the unwarranted) attention that individuals under surveillance a direct confrontation with or by a team that is separately surveillance would bring. looking for surveillance activities directed at a specific individual or CIA Directors Protective Detail detail. CS Team I was part of what was, if not Surveillance Detection vs the first, most definitely one of Countersurveillance the first CS teams employed We are very specific about by the US Federal government the difference between when there was credible threat "surveillance detection" and reporting about specific terrorist "countersurveillance" in the groups targeting CIA leadership. Intelligence Community. The final straw was when there Surveillance Detection (SD) was a possible terrorist element is done by the individuals sighted near the residences of who are possibly under one of our senior CIA leadership. surveillance. At the same CIA then created a CS team that 49


CIRCUIT MAGAZINE ISSUE 68 would work within the CIA's Directors Protective Staff (DPS). Using vehicles from a stockpile of old operational vehicles (sedans, pickup trucks, decommissioned taxi cabs, etc.), we were able to move about the Northern Virginia area doing route reconnaissance, advances, and site surveillance. We would set up in specific positions along the DPS' routes, looking for surveillance signatures; we would sweep the residential neighborhoods near the Director's, Deputy Director's and a former Director's houses. We would merge into the background in the area near any

50

Surveillance is involved in almost all criminal acts, sometimes for a few seconds before hitting a target of opportunity or months of observation in preparation for an attack, robbery, kidnapping or murder.


FROM IRON BOX TO INVISIBLE SHIELD planned or published meetings or presentations (college campuses were tough). We specifically noted and regularly observed key locations: good surveillance points/ observation points, potential ambush sites, and chokepoints (near residences, offices, and along routes that were required travel areas). Our unofficial motto was "We can see you – but you can't CS". CS/Force Protection – Tuzla, Bosnia I was also part of one of a unique collaborative CS and Force Protection efforts when I deployed to Tuzla, Bosnia, to provide counterterrorism and countersurveillance support to General Nash's US Army elements at Eagle Base. Specifically, our CS team was looking for terrorist surveillance of our troops and conducting operations to detect surveillance for both static base elements (the base proper and entrances/ exit areas of the base) as well as for mounted and foot patrols. I wrote about my experiences in Tuzla and this CS team in my book, "GUARDIAN - Life in the Crosshairs of the CIA’s War on Terror”.

Surveillance Detection Routes As Intelligence community members, we use Surveillance Detection Routes (SDR) - specific tradecraft activities that help us determine if we are under hostile surveillance from foreign intelligence services (counterintelligence). The routes and actions along these SDRs help the individuals who think they may be under surveillance determine if there is surveillance – ideally without the surveillance recognizing that they have been detected. SDRs, while effective, are generally not appropriate for 51


CIRCUIT MAGAZINE ISSUE 68 EP teams as they require very specific movements into and out of buildings and variations in transport.

own personal movements to and from work.

Protective Intelligence Formal threat assessments, In general, terrorist groups continuous monitoring and criminals do not engage and analysis of the threat in sophisticated surveillance environment, and significant operations like governments liaison with law enforcement are and law enforcement. just some of the responsibilities Counterintelligence (CI) of a good EP team. However, surveillance has different countering threats is an entirely goals and prioritizes more of different aspect of protection the “target’s” activities - much operations. This threat different than that of the hostiles assessment action is part of the who are after traditional EP Protective Intelligence area in clients. The closest an EP team the US Secret Service. It covers gets to more traditional CI a wide range of activities and surveillance threats is in the area intelligence-gathering actions of privacy and cybersecurity taken by the organization to (embarrassment, blackmail, and recognize and mitigate risks to industrial espionage). their protectees with serious emphasis on avoiding threats. Unlike Intelligence personnel, EP teams, even with CS teams, Suppose there are no real do not generally conduct intelligence indicators (or other formal versions of SDRs unless reasons for expending the they have specific intelligence significant effort involved in indicators pointing to possible SDRs). In that case, EP teams will surveillance on the "Protectee." use less intensive surveillance However, every member of detection activities, such as an EP team should practice having every protection team surveillance detection—the act member carefully log any of looking for, recognizing, and activities in specific locations appropriately reacting to possible along routinely traveled routes surveillance. This should be (Chokepoints, Observation/ done on every movement, and Surveillance Points, Ambush in serious threat situations, it Sites, and any areas that could should be incorporated into their cause the protectee to slow or 52


FROM IRON BOX TO INVISIBLE SHIELD stop during a vehicle or walking movement).

In the US Secret Service, this threat assessment action is part of the Protective Intelligence area, and covers a wide range of activities and intelligence gathering actions.

To be effective EP and CS Team members, they must understand the basics of hostile surveillance and the above general aspects. Understanding does not mean being an expert in surveillance. Anyone who has actually conducted surveillance against real targets knows that this is an extremely challenging activity with huge logistical and tactical aspects. While it would be ideal to have an EP team with accomplished surveillant members, it is not necessary or even practical to spend the time and money necessary to develop this skill level. On the other hand, CS teams require more tradecraft training as they are effectively a "surveillance team"; thus, they have to avoid the mistakes and other behaviors associated with surveillance teams. If the hostile surveillance observes and recognizes the CS team, they may react in various ways, almost none of which will benefit the protectee. The EP team members need to understand the core surveillance concepts and tactics, followed by 53


CIRCUIT MAGAZINE ISSUE 68

focusing on the attack cycle and the weaknesses associated with surveillance. This will provide EP team members with sufficient information to apply their surveillance detection skills and focus on several key concepts. These key concepts include knowing the locations where surveillance is likely to occur (Observation or Surveillance Points, Chokepoints, potential ambush sites, and time and place predictable routes), actions by the surveillants (TEDD: time, environment, distance, and demeanor) combined with a significant understanding of the behaviors associated with surveillants (Cover For Action/ Cover For Status discrepancies, mistakes, and correlation).

sector. EP teams seldom have enough personnel and resources to staff, train, and deploy a CS team. Our adversaries also lack resources and will mostly likely use untrained or less trained individuals, causing them to choose less resource-intensive surveillance methods such as static surveillance. The real risk to EP clients is not being followed from one documented location to another (office to home, home to office, etc.).

The real risk to EP teams is when hostile surveillance is able to find vulnerable points along predictable routes (chokepoints, good ambush sites, etc.) and vulnerabilities at fixed locations (near home, office, etc.) that I have found numerous allow the surveillants time to examples where the term analyze patterns of life and countersurveillance is used security protocols (strengths interchangeably with Surveillance and weaknesses) and determine Detection. Unfortunately, real actionable tactics that will meet countersurveillance conducted their goals. by Countersurveillance Teams is a rare commodity in the private CIA personnel working in 54


FROM IRON BOX TO INVISIBLE SHIELD dangerous areas are in more of an "attack prevention" oriented mode than they are in Moscow, where they are focused on the CI threat to their operations. Due to limited resources and the fact that they face similar threats, corporate EP teams must concentrate less on CI "foot and vehicle surveillance" and more on surveillance points. With the typical threats facing EP teams, they are better off focusing on the surveillance vulnerabilities exposed in the attack cycle, which are hypersensitive to the locations surveillants must use to gather their info to formulate an attack plan.

points so that when they are advancing routes or moving the protectee, they know where to look for possible surveillance. Each EP team member should look at surveillance detection as an integral part of their daily activities and, if possible, receive advanced training on surveillance.

In a nutshell, corporate EP teams need to understand the difference between surveillance detection and countersurveillance and focus on standard Protective Intelligence analysis (to learn potential threats and their characteristics), Route Planning (for determining vulnerable surveillance and This is why EP professionals need attack sites), Surveillance to spend so much of their time Detection (to determine when doing "Protective Intelligence" hostiles are in the area), and analysis – threat assessment, Emergency Action Drills if they route planning, being time and miss the surveillance activity place unpredictable, and plotting and can only react to the actual viable surveillance/observation attack. Thomas “Tom” Pecora is a security professional with more than 34 years’ experience protecting people. A retired former CIA Senior Security Officer, he spent 24 years protecting and training CIA personnel. He managed complex security programs in multiple war zones (Iraq, Pakistan, and Afghanistan) and he specialized in crisis management, personnel and physical security, and counterterrorism operations. He served in different locations including the US, Middle East, Northern Africa, Europe, Latin America, and Asia. Tom received numerous commendations during his career at the CIA to include the Intelligence Star—CIA’s second highest award for Valor. Today, he is the Director of Pecora Consulting Services, providing leadership consulting, security vulnerability and threat assessments as well as providing situational awareness and personal safety training. 55


56


DUE DILIGENCE & WHY IT’S REQUIRED By Orlando Wilson

DUE DILIGENCE & WHY IT’S REQUIRED The vast majority of problems people have with business deals, investments, and their personal lives could be avoided if they bothered to do even the most basic due diligence and background checks on those they are dealing with or getting into relationships with.

57


CIRCUIT MAGAZINE ISSUE 68 From a corporate perspective, due diligence not only provides a sense of security but also ensures that the people you're dealing with are not scammers and the asset you're going to buy or invest in does exist and is not owned by a 3rd party, giving you a reassurance and confidence in your decisions. The Ego Barrier to Due Diligence One of the biggest blocks that prevent people from carrying out due diligence is their egos, as they feel they are wise enough to spot a scammer; also, they don't want to offend those they are dealing with by seeming not to trust them. These are things that scammers and manipulators exploit to the maximum. I forget how many times I have heard people who have been scammed or victimized say they thought the perpetrator was a decent person because they were introduced to them by a friend; my reply to this usually is, "Define a friend". The sad reality is most individuals that people class as "friends" don't have their best interests at heart and would happily gossip about or profit from them having personal or business issues. 58

The Importance of Comprehensive Preparation It's not just about doing due diligence, it's about doing it comprehensively and thoroughly. This level of preparation is crucial in avoiding potential risks and ensuring the success of your business deals and investments, making you feel diligent and thorough in your approach. Before I give you some examples, think about this: if you were going to submit a proposal for a €1 million contract, how much work would you put into it? Months, right? Well, you can be assured that scammers and criminals will work harder if they are targeting you for a crime of the same amount. This underscores the need for caution and vigilance in business transactions, keeping you alert and prepared for any potential risks. Historical Lessons in Due Diligence When the wall between the Soviet Union and the West decreased in the 1990s, Eastern Europe was open for business with high risk and high reward. Many foreign investors lost


DUE DILIGENCE & WHY IT’S REQUIRED

The problem was the local attorney that the company had hired to oversee the project, who was your typical sleaze bag wannabe big shot attorney.

big bucks and were lucky to walk away in one piece. Due diligence was possible, but many investors did not have trustworthy local advisers and lawyers, who were often part of the scams. These local professionals play a crucial role in due diligence, as they are the ones who can provide insights into the local business environment and potential risks. However, in some cases, they may be complicit in fraudulent activities, so vetting them thoroughly is essential. One prominent case I remember was of an oil exploration company based in the Republic of Ireland, working in far eastern Russia, which had found oil and set up the drilling wells. This is when their problems began. When the project was on the brink of making a profit, several people turned up with deeds to the land this exploration company was working and drilling on and accused them of trespassing, stealing their resources, etc. A big legal mess in a corrupt court system ensued, and the exploration company lost. I expect they had been set up from the beginning. Why not let a foreign company come in and 59


CIRCUIT MAGAZINE ISSUE 68 do all the work, and if they strike The problem was the local attorney the company had hired it rich, take them to court and to oversee the project, who was kick them out? It's easy, right? your typical sleaze bag wannabe big-shot attorney. After making Due Diligence in International some enquiries of our own, we discovered that no one had Investments Now that Russia was in its crazy heard of the guy; he had no offices in the capital, and people days let's move ahead 12 years or so to the Dominican Republic were surprised he landed such a big client. (DR) in 2007. I was asked to check out a large development The Consequences of project in the Luperon area Neglected Due Diligence of DR for potential security I have nothing against small issues and provide an overall companies or players hitting it threat assessment. I had a big as long as they can play at the knowledgeable local contact with me, and to cut a long story required level. This clown was telling the client's representatives short, the project stank, which was not what the clients wanted what they wanted to hear. to hear. This is just one of many Instead of answering our questions regarding land examples where due diligence can uncover potential risks and rights and ownership at the meetings, he continually diverted save investors from significant questions towards the client's losses. representatives. He would The company behind this project change the subject to things like architects, interior design, and had already set up a big prefurniture suppliers, which was sales office in Santo Domingo, more to the rep's liking than the the capital of DR, and paid for nitty-gritty of the business. They land rights, etc. The physical were "beautiful people"; this security for the project was project would make everyone nothing special; it would have millions, but what could go been the same as any luxury wrong? About six months after development with the added requirements for basic maritime I put in my report, and they had just started to develop the land, security and cooperation with local customs and immigration. the lawyers of two very well60


DUE DILIGENCE & WHY IT’S REQUIRED

connected local families wanted to know what they were doing on their land, and the project crashed. This is just one example of the potential consequences of neglected due diligence, including financial losses, legal battles, and damage to reputation. In such scams, the scammers will wait until the investors have invested a decent sum of money and assets, thus gaining some leverage to get a deal out of the investors; if not, then they have still benefited from the work the investors have done and what assets they have left behind or have been seized in legal proceedings. Lawyers are another source of problems

as many people think they are honest and working in their interests; sadly, this is usually not the case; attorneys tend to work in their interests. I saw this clearly in the U.S. while living there for 18 years. Before moving there, my main dealings were with lawyers working in Eastern Europe, who, for the most part, knew if they screwed over their client, they would not be getting sued but more likely would get a bullet in the back of their heads. Hitmen are cheaper than lawyers. Legal Professionals and Trust When dealing with lawyers, remember that, for the most part, their main goal is to make 61


CIRCUIT MAGAZINE ISSUE 68 as much money out of you as possible, not to solve your problems quickly, more billing hours, more money for them. When dealing with your typical sleaze bag lawyer, and I have witnessed this many times, things will go like this: they will say you have big problems, and they will solve all of them just to get a retainer out of you, they will find more problems and issues that will cost you more money, and they will do the minimum required of them legally to solve your problems, what do they care, you've already paid. The Imperative of Vigilance Even if people come from what you believe to be trusted sources, check them out; your source could have been misled or scammed themselves. Just because someone seems respectable, it does not mean they are; perfect people are usually the ones hiding the most shit! Years ago, in the late 90s, I was dealing with a gentleman

who got scammed out of close to $2 Million U.S. with an investment project, and there was nothing he could do about it. The scammer was introduced to him by associates who, as far as he knew, could have been in on the scam. So, hopefully, this article will help you see that you need to be very careful if you're doing business with someone, be it for €10.00 or a few million Euros. The money and time spent on due diligence can save you untold headaches and legal fees in the future. Sadly, trust is not something we can afford these days, and even people trusted last week can turn on you and stab you in the back this week. I think you will agree that it's common sense to incorporate due diligence, client, and internal monitoring into your business practices. This will protect your interests and provide the foresight for success!

Orlando Wilson has worked in the security industry internationally for over 25 years. He has become accustomed to the types of complications that can occur, when dealing with international law enforcement agencies, organized criminal and Mafia groups. He is the chief consultant for Risks Inc. and based in Miami but spends much of his time traveling and providing a wide range of kidnapping prevention and tactical training services to private and government clients. 62


63


CIRCUIT MAGAZINE ISSUE 68

tactical medicine

TREAT THE PATIENT…

This principle is logical to seasoned professionals who have seen numerous patients. By Krisztian Zerkowitz

64


TACTICAL MEDICINE It applies across our industry— whether in close protection, security, medicine, or secure driving. Although we all acknowledge it as a given, it is often overlooked and frequently done incorrectly. When provided with tools that give us raw data, data that we are grateful for because without it, our task would be so much more complicated and, on some occasions, even impossible, we tend to look at this data, try to analyze it and find a solution to that what seems to be wrong. But is this the right approach? And why do so many of us fall into the trap of raw data and missing the big picture, ending up with a situation we could have dealt with but screwed up in the end?

pulse and respiration rates and even trying to put the numbers into detail for other relevant data, such as pulse frequency and location to a presumed blood pressure ratio and how this can be used in a pre-hospital setting. (new studies seem to debunk this and go against the PHTLS guidelines). So, why the data? Well, because the data will provide you with information you can not gather in any other way, it will give you information you can only see, feel or evaluate with the tools. So, is it useful? For sure, it is, But NOT JUST THE DATA.

WHY NOT JUST THE DATA? When you look at a decent ECG monitor that gives you more than just the heart rhythm but allows you to hook up things like BP, HR, SP02, C02, and RR, looking at the monitor becomes something that makes you look WHY THE DATA? either VERY smart and good at Yes, you will never hear me say your job, as it might make you that data is not important. The more you know in medicine, the look VERY lost and confused. The data will give you the NOW about more data you want. The more the patient, and as explained you want to understand the above, this is very valuable, inner workings of the patient's body, the more you will discover especially if you can READ the data. But it also makes you feel what is wrong with them. The lost because it does not tell you more you know, the more you can do, provided you can gather anything about the patient's HOW, WHY, WHEN, or WHO. It is data that only YOU can read BECAUSE you know more. This is easy to get distracted by the raw valid. Even in basic courses these data if the patient doesn't tell you much as they are unconscious or days, I see people asking for 65


CIRCUIT MAGAZINE ISSUE 68 a member of the non-speaking trauma patient society. AN EXAMPLE: Authors note: this is an example I went through and managed to kill the patient on multiple occasions due to my inability to separate data from current, past and future events. Imagine you are taking care of your principal, who is swimming. He is doing his laps in the morning at an outside lake. You are there, doing your job as a protector. You catch him waving his arms as you look onto the lake before he goes under. You dive in, swim as fast as you can and manage to drag him out of the water. Unconscious, not breathing. You know exactly what to do. As you call the emergency services, which will take a while due to your remote location, you are already alerting colleagues, who are running up with your gear (you are the designated paramedic on the scene). Now, if you always do codes because you are a practising paramedic at an emergency service, this is a breeze. Still, if you are a full-time protector, You are doing this in training; only your nerves tighten up, and you are somewhere hoping for the best. 66

As you look onto the lake, you just catch him waving his arms before he goes under. You dive in, swim as fast as you can and manage to drag him out of the water. Unconscious, not breathing.


TACTICAL MEDICINE

You attach your monitor, CPR is on its way, and the heart won't get better. Rhythms are all over the place; you are struggling to identify, and you break out your meds, start up the ACLS procedure, and for some reason, nothing seems to work. You are looking at the reversible causes of your patient, and you

can't find it. Your principal is healthy and has no underlying causes, so why and how? He does not have diabetes; you know that the monitor is telling you only bad news, and you focus on the lines, the raw data, that is giving you brain spasms. As you identify death, you keep focusing on it, and it just won't make sense. 67


CIRCUIT MAGAZINE ISSUE 68 As you read this, it is probably easy to understand what is going on and the reversible cause. Because you are not looking at that monitor, you are not distracted by numbers. You are reading the scenario again, identifying what could be wrong, and now, without looking at the monitor, prepping what is needed. HOW THE BIG DATA BECOMES VALUABLE: Look at your patient, the

68

situation, and what you can see, hear, feel, and learn about the patient. Look at the scene, the circumstances, and your experience, and put this all together. Make that the foreground of your thought process. Correlate this with some of the data you find on the machine, and try to confirm your findings of the assessments you make with what the monitor gives. Don't try to do the opposite because the machine ONLY knows the now… not the


TACTICAL MEDICINE BEFORE. Remember, the human factor is crucial in decision-making. It's not just about the data, it's about your experience, your intuition, and your understanding of the situation.

Look at the scene, the circumstances, This is true not only for medicine the experience but also for many aspects of our you have, and put job as protectors. We can use as many advanced tools as we want this all together. to give us raw data, but if we are not able to correlate the raw data Make that be the with the human factor of the several things can go foreground of your operation, wrong: 1. Assumptions based on just the thought process. data

2. Communications that are not based on facts are confusing for those who have no access to the data YOU are looking at 3. The vantage point changes when you only look at data and forget about the human factor. 4. Decisions are made based on data that does not consider factors that can not be quantified into data. 5. And much more. THEN HOW? It would help if you had 69


CIRCUIT MAGAZINE ISSUE 68 experience using raw data. This is why, in medicine as well as in our close protection operations, you need to make sure you have a good understanding of the human factor, and you are to couple the data that you gather to this human factor. Numbers make no sense without history; this is even true for human history! Now, I realize that I have not written out the answer to the issue described in the example above. However, in accordance with the great people of this magazine, we have agreed that the person who sends me the most accurate solution for this person's issue gets a free tourniquet. Please send your evaluation to: k.zerkowitz@gmail.com and do this within 15 days of the publication of this article. Be the first to get that free tourniquet. As a recap, what you know: A 52-year-old male is swimming

in open water at 0630h in the morning. He is swimming hard. You notice him struggling to stay afloat and go under. You get him out of the water, unconscious and not breathing. You attach the leads and see the following: PEA (Pulseless Electrical Activity). Send me: • Next step you take • What are you doing? • What could the cause be? • As equipment, you have a Paramedic kit. Yes, I know. This looks easy, and you will probably find it, but if you do, imagine yourself on the side of that lake as a sole Paramedic, with support at least three hours out, and your principal side of the lake. It is up to you; nobody else is coming!

Krisztian was raised as a Diplomatic Close Protection Officer, working mainly for diplomatic missions, including assignments to the Middle East and Africa. Recently certified as a Tactical Paramedic, Krisztian spent the last 10 years of his protective career specialising in tactical medicine in high-risk environments and close protection. Two passions combined where enough remains to learn and experience. 70


THE THEORY OF COVERT SURVEILLANCE • • • • • • • • •

Surveillance Operators Bodyguards Surveillance Instructors Professional Investigators Enforcement Officers Intelligence Officers Police & Military Security Consultants INVESTIGATIVE JOURNALISTS

Zap It...

E V I CT

Surveillance Training Course Handbook A R TE

The

IN

By Peter Jenkins ISS TRAINING LTD

www.Surveillance-theory.co.uk

71


CIRCUIT MAGAZINE ISSUE 68 By R.Savkov

Reputational Risk. A critical concern for Ultra-High-NetWorth Individuals and Executives. In today's interconnected society, we acknowledge the status of high net-worth individuals (UHNWI) and executives who possess significant wealth and public recognition. With the increasing visibility of these individuals, safeguarding their reputation becomes a priority for executive protection professionals and security consultants. While often overlooked in risk assessments, reputational risk is vital for UHNWI and executives as its consequences can profoundly impact their professional and personal lives. This article explores the scope of risk, shedding light on why 72

it poses a significant concern for influential individuals in the public eye and how we, as proactive executive protection professionals, can play a crucial role in minimising and mitigating this risk. Understanding Reputational Risk: Reputational risk relates to the harm inflicted upon an individual's reputation due to negative media coverage, public perception, social media


REPUTATIONAL RISK

influence, ethical misconduct, legal troubles or associations with controversial entities. A ruined reputation can result in a loss of trustworthiness, missed business opportunities, and strained personal relationships. To comprehend risk concerning UHNWI and executives, we, as executive protection professionals, must adopt a proactive and holistic perspective that considers the interconnected nature of their personal and professional lives. This comprehensive approach

is crucial for safeguarding and improving one's position in an ever-changing and interconnected world. Factors that Contribute to Reputational Risk: Media Scrutiny: In today's era of the clock news cycles and social media dominance, highly affluent individuals who hold positions are particularly vulnerable to media scrutiny. Negative coverage, whether accurate or not, can swiftly damage their reputation, impacting their personal lives and business interests. 73


CIRCUIT MAGAZINE ISSUE 68 Digital Presence: The pervasive nature of platforms has significantly amplified the significance of managing one's presence. Social media, in particular, can quickly spread inaccurate information, breaches of privacy, or unfavourable content, thereby increasing the risk of reputational damage.

Social Responsibility: UHNW Individuals and Executives are expected to participate actively in social responsibility initiatives. Failure to align with expectations or being perceived as neglecting environmental concerns can result in reputational harm. Legal Matters: Issues, even baseless ones, have the potential to generate negative publicity. Legal battles involving UHNWIs and Executives often face media scrutiny that may cause lasting damage to their reputations.

Business Engagements: Some ultra-high-net individuals and executives are involved in diverse business ventures. Any setbacks, controversies or lapses in practices associated with these ventures can directly affect their Understanding and navigating reputation. these factors contributing

74


REPUTATIONAL RISK to reputational risk is crucial for executive protection professionals, security consultants, and advisors to anticipate and mitigate potential threats to their clients. This approach will allow proactive management of the image of the individual or organisation by building resilience and maintaining reputation and trust.

Tesla as a company faced consequences regarding reputation and finances. Musk had to step down Let's explore more realscenarios where UHNW as Teslas chairman life individuals and influential professionals encountered while he and the reputational risks. These company agreed to examples will provide a broader understanding of the various pay fines to settle forms of reputational risk. the charges brought Elon Musk. Tesla and Space X Background: Elon Musk, the by the SEC.

CEO of Tesla and SpaceX, is widely recognised as one of the world's most successful executives. His actions and public statements, including those made in the media, have occasionally generated controversy and impacted Tesla's stock value. The challenge: One incident that challenged Musk's reputation occurred in 2018 when he tweeted about taking Tesla with "funding secured" at $420 per share. This tweet initially caused 75


CIRCUIT MAGAZINE ISSUE 68 an increase in Tesla's stock price. However, it was later revealed that the funding wasn't firmly established as implied. Musk's communication through media channels raised concerns about market manipulation, leading to investigations by the Securities and Exchange Commission (SEC). Impact: Musk personally and Tesla as a company faced consequences regarding reputation and finances. Musk had to step down as Teslas chairman while he and the company agreed to pay fines to settle the charges brought by the SEC. This incident damaged Musk's personal reputation and led to a significant drop in Tesla's stock value, highlighting the financial implications of reputational risk.

reputation of The Weinstein Company. As a result of their association with him, the company faced issues, loss of business partnerships and damage to its brand image. Impact: The scandal surrounding Weinstein had far-reaching consequences, leading to bankruptcy for The Weinstein Company and resulting in charges against Harvey Weinstein himself. This case exemplifies how individuals' personal actions and misconduct can profoundly impact the reputation and sustainability of their associated organisations.

Managing Reputational Risk; Effective risk management is crucial for high-networth individuals (UHNWIs) and executives; it involves Harvey Weinstein. The determining and safeguarding Weinstein Company. families' or organisations' Background: Harvey Weinstein, perceptions regarding a known Hollywood producer trustworthiness and integrity. and one of the co-founders of Many UHNW families and The Weinstein Company, faced Executives require processes for allegations of harassment and reputation management due assault in 2017. These allegations to their desire for privacy and played a role in igniting the discretion. These procedures and #MeToo movement. strategies can be introduced by either a security consultant or The Challenge: The accusations executive protection professional against Weinstein did lead to in compliance with the standards his downfall. It also hurt the and culture of the family or 76


REPUTATIONAL RISK

company. Here are some of the strategies. • Taking an approach to relations: Engaging in proactive public relations efforts can help manage and improve an individual's public image. Building relationships with the media and employing communication can mitigate the impact of adverse events.

• Managing reputation: Monitoring and controlling one's online presence is crucial. Privacy measures, such as addressing information and promoting content, are effective ways to shape the narrative. • Upholding conduct: Adhering to standards in both personal and professional endeavours 77


CIRCUIT MAGAZINE ISSUE 68 is of utmost importance. Demonstrating integrity and transparency fosters trust, reducing the likelihood of harm.

By implementing these strategies, both individuals and organisations can proactively By implementing these strategies, manage risks individuals and organisations while building can proactively manage risks while building resilience against resilience potential challenges. Maintaining against potential a reputation in today's fastpaced and interconnected challenges. business world requires a strong • Developing crisis management plans: Creating plans for crisis management is essential when dealing with events. Having a thought-out strategy in place can minimise the impact of crises on an individual's reputation.

emphasis on transparency, ethical behaviour, and effective communication.

To ensure their reputations remain intact, individuals with wealth and influence must proactively manage the risks associated with their image. In a connected society where information spreads rapidly, protecting one's image, businesses, philanthropic endeavours, and even family legacies has become essential. Ultra-high-net-worth individuals and executives can safeguard 78


REPUTATIONAL RISK

their reputations and maintain their respected societal position by being vigilant, upholding standards, and seeking professional advice when needed. It is crucial to take a proactive and comprehensive approach to reputation management. This includes hiring professionals to conduct risk assessments,

preparing crisis and contingency management plans, maintaining communication practices using PRs, and demonstrating a commitment to ethical conduct. UHNW individuals and executives should actively engage with their presence, monitor media narratives closely, and align themselves with expectations to protect their reputations.

A freelance Personal Protection Specialist & Security and Business Consultant with over 17 years’ experience of serving international clients. Providing discreet and professional security services to many high-profile individuals, including Royalty, Governmental, Corporate, High Net Worth, and Celebrity clients. A member of the Security Institute UK; American Society of Industrial Security (ASIS) and The Institute of Strategic Risk Management (ISRM), with a strong commitment to ongoing training and professional development. For more information:

W: www.oxfordprotectionservices.com E: r.savkov@oxfordprotectionservices.com 79


CIRCUIT MAGAZINE ISSUE 68

80


MISLEADING PRACTICES IN SECURITY EMPLOYMENT

Misleading Practices in Security Employment By Michael J. Niner

Integrity, a cornerstone of the security industry, is often spoken about but rarely upheld. Its significance cannot be overstated, especially in a field where trust and reliability are paramount. The Cambridge Dictionary defines integrity as “the quality of honesty and strong moral principles". Within the functions of the security industry, integrity is vital because it builds trust and reliability, which are essential for professionals tasked with protecting people, assets, and information. It

ensures adherence to legal and ethical standards, fostering a reputation of dependability and professionalism. Integrity also guards against the abuse of power and corruption, which is crucial in a field where ethical conduct is paramount. As you can imagine, integrity 81


CIRCUIT MAGAZINE ISSUE 68 in security employment is not just a buzzword – but the backbone of trust and reliability in a sector where the stakes are always high. However, we all have experienced hiring companies or managers who use deceptive practices, misleading job postings, inconsistent payment practices, or blur, on purpose, the lines between different employment roles and responsibilities.

To clarify, this isn’t about nitpicking job titles or saying EP is more “important” than uniformed security jobs, it's Misleading Job Postings about ensuring Imagine having paid thousands of dollars and having spent that individuals are hundreds of training hours adequately prepared preparing for a career in Executive Protection (EP), only and trained for the to find yourself stationed as responsibilities they a static, plain clothes guard. Individuals have been hired to will undertake. provide Residential Security (RST) services only to find themselves tasked with chasing homeless people or drug addicts from the client's neighborhood. Unfortunately, misleading job posts, commonly called bait-andswitch tactics, are common in our industry. Not only are they disappointing for the applicant, but they can have many negative results. Misalignments between advertised job descriptions and actual role functions are not just misleading; they waste applicants’ time and resources 82


MISLEADING PRACTICES IN SECURITY EMPLOYMENT responsibilities, they risk their spent preparing for a different reputation and expose their type of job, and they can be employees to a myriad of potentially dangerous. Another legal complications. Employee example of such practices that misclassification, unmet labor we see far too often is when standards, and blurred lines of it comes to event security personnel claiming their function accountability can lead to both is EP, dressed in black polos and civil and criminal liabilities. It is a khaki pants to maintain a tactical legal minefield that no company should bet their employees’ look even when all they are offering is basic security services safety upon. for a political rally or suit and tie gala event. Sadly, these services The Payment Puzzle are often sold as "Protection Another issue worth discussing detail" or "Security Project". The is the payment options and payments are made as 1099 timeframe. We have found for “EP” work, while the actual ourselves having to wait 30, functions fall under Security 45, or even 60 days. Quite a Guard and require W2, an issue few stories exist of individuals we will cover later on. waiting even months for their pay. Some have to make To clarify, this isn’t about multiple inquiries or request nitpicking job titles or saying to be paid for their time EP is more "important" than worked. There is something uniformed security jobs; it's fundamentally wrong when about ensuring that individuals those tasked with protecting are adequately prepared and assets and people are left trained for the responsibilities unprotected in financial they will undertake. The uncertainty and have to wait consequences of such months or beg for their money misrepresentations can range to be paid. Late or inconsistent from personal dissatisfaction payments are more than to employee turnover to severe just inconveniences; they're operational inefficiencies. Role breaches of trust that strain Misrepresentation is much more the livelihoods of hardworking than a mismatch. individuals. As security professionals, we know timely When companies play fast and reliable compensation and loose with job roles and isn't just expected; it's a right. 83


CIRCUIT MAGAZINE ISSUE 68 So, if you are hiring people to work for you, ask yourself, do you make sure they are paid on time and do not have to wait for the client to pay you so you can pay them? As a business owner, do you have the budget to cover payments on time until you receive that check from your client? Have you done your work in securing a line of credit if necessary? If you see yourself failing on these points, then maybe you should reconsider the subject of owning a company. Misrepresenting Employment Status Some companies misclassify employees as independent contractors (1099) to avoid providing benefits and protections normally afforded to regular employees (W2). This can lead to employees missing out on health benefits, workers' compensation, and job security. There seems to be a lot of ignorance regarding the use and the differences between W2s and 1099s. Sometimes, those who know the difference knowingly mislead those who are unaware. Differentiating between being an employee (W2) and an independent contractor (1099) is critical in our industry, and you should 84

know what each one can offer you and what limitations each one has. Misclassification affects more than just your tax forms; it impacts your employee rights, benefits, and job safety. It's a distinction that every security professional should be clear about for their protection and peace of mind. Did you know that, unless otherwise specified and agreed upon in a contract or on an SOW, if you work as a 1099, they can pay you whenever they want? However, as a W2 employee, companies have to adhere to payment policies specified by their State for their employees. Overstating Career Advancement Opportunities – How often have you seen a job post promising career advancement opportunities only to discover it was a lie? Companies present a job as having a high potential for professional growth, skill development, and promotion opportunities when, in actuality, these opportunities are completely absent or seem to disappear when you have spent some time with said company. In the security world, it is pretty common (and some companies will suggest it as a way for growth) for applicants to


MISLEADING PRACTICES IN SECURITY EMPLOYMENT

accept positions with lower initial effectiveness of the security personnel. When employees salaries in the hope of rapid are left without the promised advancement and subsequent (and needed) training, they pay increases or to add that may lack the crucial skills to company's name to their handle complex or dangerous resume. situations, putting themselves False Promises of Training and and others at risk. In addition, the absence of support, Support equipment, and resources Similar to overstating career can lead to a stressful work advancement opportunities, this misleading practice involves environment where employees feel undervalued and illclaims to provide additional equipped to perform their duties training, equipment, and support to new hires. This issue efficiently. The gap between promised and actual support goes beyond just employee can also lead to legal liabilities disappointment, as it can for the company, especially if the directly impact the safety and 85


CIRCUIT MAGAZINE ISSUE 68 lack of proper training leads to accidents or security breaches. Unrealistic Workload Expectations Burnout in our industry is a very prevalent problem. Unrealistic workload expectations in the security industry are another form of misleading practice. The discrepancy between expected and actual job requirements can have severe consequences. Employees who are constantly overworked without adequate rest or support are at a higher risk of burnout and physical, emotional, and mental exhaustion. This affects their well-being and job satisfaction and compromises their ability to perform critical security functions effectively. In an industry where alertness and quick decision-making are paramount, fatigue and stress can lead to errors, impacting the safety and security of the people and assets they are meant to protect. Burnout can be deadly in our line of work; your attention to detail will suffer dramatically, and your reaction time will be slower than usual if this is not addressed. Lack of a Contract or the lack of Transparency in Contract Terms 86

Would you believe us if we told you that many colleagues go to work for someone without having signed a contract? It happens more often than you can imagine. We do not have to explain why a contract is needed in the first place, but we will discuss the complications when you have a contract that lacks transparency in the contract terms. Something like this within the security industry can be a significant issue, leading to serious misunderstandings and disputes between employers and employees. When key elements of employment, such as pay rates, working hours, payment schedules, specific job responsibilities, and overall conditions of employment, are not clearly defined or are deliberately obscured in contractual agreements, it creates grounds for confusion and frustration. Employees may find themselves agreeing to terms vastly different from their expectations, leading to feelings of being misled or exploited. Unclear contract terms can lead to legal disputes, agents’ pay being seriously delayed, agents not paid at all, personnel being overworked, or requested to perform duties outside of the


MISLEADING PRACTICES IN SECURITY EMPLOYMENT role they were first hired for, etc.

Employees may find themselves agreeing to terms that are vastly different from their expectations, leading to feelings of being misled or exploited.

Another important issue we see falling under the contract section is the exploitative terms in employment. Contracts that include clauses or terms that are unfair or overly restrictive, such as noncompete clauses that are overly broad in scope or duration, limit an employee's future employment opportunities. Or restricting your W2 or 1099 agents for working with other organizations or claiming them as your ''guys/gals’’, and if someone wants to hire them, they have to come through you. Non-compliance with Legal Standards/Licensing Non-compliance with legal standards in the security industry is a grave concern as it puts employees at risk and exposes them to significant legal complications. When security firms fail to adhere to labor laws, health and safety regulations, and industry standards, they jeopardize the well-being and rights of their employees. When they operate without proper licensing or if they employ unlicensed individuals, they 87


CIRCUIT MAGAZINE ISSUE 68

not only engage in illegal activities but also undermine the professionalism and credibility of the industry. This can have severe legal and financial consequences for security personnel operating without the required licenses. Some may find themselves unknowingly working in a legal grey area, potentially facing personal legal consequences. Some will deliberately leave off the Security Guard registration category due to how it appears and open themselves up to unlicensed activity (It is less impressive, according to them). For employees aware of the licensing issues, it can create a moral dilemma and contribute to a workplace environment

where legality and ethics are compromised. In this industry, we are all responsible, company owners, security employees, and contractors, for upholding the values of honesty and transparency in our industry. This isn't about better job descriptions or timely payments; it's about creating and maintaining a culture of respect and integrity while protecting ourselves from liability. Those affected by these issues should speak up and know they are not alone. Change is possible, and it starts with us – one honest job posting, one timely payment, and one correctly classified employee at a time.

Michael Niner, CEO and Founder of Blue Raven Inc., has over 15 years in Protective Services and Investigations. An NVCC and Eastern Kentucky University graduate, he excels in Executive Protection, Armed Security, and Emergency Response. As a Personal Protection Specialist for Virginia, he developed a human trafficking training program. Michael’s leadership and innovative approach make him a trusted figure in security services across Virginia, Maryland, and Washington D.C. 88


MISLEADING PRACTICES IN SECURITY EMPLOYMENT

Connect your team with G6PTT. Radio without boundaries. G6 Push to Talk brings you the best from the communications world; the power of network radio using 3G, 4G, LTE & WiFi to give unparalleled global coverage. This system is the result of our successful collaboration with TASSTA; leading edge design and engineering for a changing world. Adaptable, scalable and flexible to fit any operational environment.

The functionality of two-way radio but with no coverage restrictions, and with advanced features that will transform the way you operate. Get in touch to see what we can do for you.

Communication connects everything that we do. G6 Global exists to create the best communications system for your operational needs.

www.g6-global.com +44 (0)1454 610050

89


CIRCUIT MAGAZINE ISSUE 68 By Sandra Adiarte

Striving for Excellence Clients expect to get the best service for their money. Expectations and stakes are high as our services revolve around their security.

90


STRIVING FOR EXCELLENCE That means that the client does not only need to be kept safe, but they need to feel safe, too. Meeting these expectations as a service provider by putting efficient plans into action that are well suited for the outlined circumstances and meeting the unspoken expectations of the clients can sometimes be challenging. Providing excellent professional services does not only mean delivering best practices on the spot; it also includes efficient team management, strong leadership, goal-oriented communication on and off sight, and ongoing self-evaluation on the providers' side to improve the needed skill set whilst always striving for excellence. In short, this means Doing what needs to be done to provide an excellent service to the customer. While most client requirements remain constant, settings, scenarios, and sometimes a shift in our client's personal needs may require changing the approach to managing their security. This can happen, for example, because continuous risk assessment requires it or due to the individual needs of the client and the people of their party. Several personal aspects can influence the chemistry

between the team and the client. One aspect often underestimated is the client's emotional state, which can sabotage the previously agreed plan should things go sideways because the stress level prevents it. Protection undoubtedly involves ensuring physical safety and security; in contrast, caregiving encompasses the provision of emotional support, nurturing, and guidance. Although the latter is not the main focus within the protector's role, failing to meet the demands and apply this multifaceted approach can have a problematic influence on all aspects of security management, with the risk of failure rising. Noticing problematic developments, remaining ahead of the curve, and adjusting approaches where needed while staying within the given professional and legal boundaries is key. Simple miscommunication, for example, often leads to misunderstandings, as individuals may interpret messages differently than intended, leading to confusion and uncertainty. These misunderstandings can escalate into conflict when parties fail to clarify or address the underlying 91


CIRCUIT MAGAZINE ISSUE 68 issues, resulting in strained relationships and increased tension, which can translate beyond the family lines. The resulting conflict contributes to stress as individuals grapple with frustration, resentment, and uncertainty about resolving the situation. Over time, chronic miscommunication can erode trust and cooperation, creating an environment that undermines productivity and morale within teams or relationships. Effective communication strategies, such as active listening, clarity, and transparency, mitigate misunderstandings and foster healthy, collaborative interactions and relationships. When aiming to provide excellence, this task is in the hands of the serviceproviding protector. The team of protectors needs to balance proactive prevention with responsive intervention, as protectors must anticipate and mitigate potential risks while managing crises effectively as they arise.

employees feel tremendously embarrassed when losing a job, even though it might not have been their fault for causing this loss. While being unable to work and generate a steady income can be worrisome for individuals within the security business sector, economic restraints can impact a family's overall stability. Especially families with children have an acute need to feel safe and secure in light of increasing concerns about personal safety, cyber threats, and their perception of societal instability.

Personal emotional issues can cause problems in protection by impairing judgment, reducing situational awareness, and, therefore, response time whilst compromising decision-making abilities. Individuals grappling with psychological challenges may struggle to effectively assess and respond to potential threats, leading to lapses in security protocols or inappropriate reactions in high-pressure situations. It can wreak havoc The aftermath of the pandemic across various facets of life, has demonstrated an increase including work, relationships, in patients needing treatment and daily routines. In the general related to anxiety or emotional workspace, heightened stress distress across age groups. This levels can impair concentration, fact, of course, can affect both productivity, and decision-making sides of this equation: the client's abilities, ultimately hindering and protectors ' sides. Some performance and jeopardizing 92


STRIVING FOR EXCELLENCE career advancement.

Personal emotional issues can cause problems in protection by impairing judgment, reducing situational awareness, and therefore response time, whilst compromising decision-making abilities.

Interpersonal relationships often bear the brunt of emotional stress, as heightened emotions may lead to misunderstandings, arguments, and conflicts with loved ones, colleagues, and friends. Trust and communication can erode, deepening rifts and straining connections, affecting communication between security providers and clients. Individual clients grappling with psychological challenges may struggle to effectively assess and respond to potential threats, leading to lapses in security protocols or inappropriate reactions in high-pressure situations, hindering proceedings on a daily basis. Daily life can become a battleground when emotional stress overwhelms; even simple tasks can feel burdensome or unattainable. Stability becomes elusive as anxiety and uncertainty cloud judgment, leading to impulsive or irrational actions that further exacerbate problems, which increase risk levels of unexpected flaws affecting the management within the protection sphere of the client. Additionally, untreated psychological issues 93


CIRCUIT MAGAZINE ISSUE 68 can undermine trust and communication within protection teams, hindering collaboration and coordination efforts for optimal security management. While one side is seemingly not careful enough, the other struggles to adjust on the go and fails to deliver services up to their usual standards. In both cases, maintaining a sense of hope can prove challenging amidst such turmoil, as despair and pessimism may dominate one's outlook. Cultivating self-reflection and mindfulness can offer a lifeline amidst the chaos, helping

94

individuals ground themselves in the present moment and gain perspective on their emotions and reactions. This way, individuals can develop resilience in the face of adversity, fostering a sense of calm and clarity that enables them to navigate challenges gracefully and professionally. In both personal and professional spheres, this approach can promote healthier relationships, improved decisionmaking, and a greater sense of fulfilment, even amidst the trials of emotional stress. Ultimately, by prioritizing self-care and emotional well-being, individuals can mitigate the adverse effects


STRIVING FOR EXCELLENCE of stress and reclaim stability, hope, and joy in their lives. On both ends, it is crucial to monitor and understand personal stress triggers by recognizing the potential impact of stress on communication and mental and physical health and actively building resilience by prioritizing self-care, continuous training and skills enhancement, and seeking professional support and care where needed. It enables open and direct communication channels with colleagues and supervisors about stressors and concerns while keeping healthy boundaries between work and personal life. For protectors, this means that seeking out resources and training programs specifically tailored to the needs of security professionals is essential. As well as consulting with mental health professionals who understand this profession and can offer personalized support and guidance. They are maintaining a sense of purpose by connecting with the larger mission of security work and its role in protecting others, finding fulfillment in serving the community and making a positive impact via professional

security management and reflecting on past experiences to identify effective coping strategies and areas for growth and remaining open to learning and adapting to new challenges in the security profession. These coping strategies can help security professionals effectively manage stress, maintain wellbeing, and thrive in their roles as protectors. When providing security management around families and children, mastering the complex skill set required demands a multifaceted approach, combining technical expertise with a deep understanding of human behaviour and psychology. Protectors in this field must possess a diverse skill set, including risk assessment, crisis management, conflict resolution, first aid, and strong interpersonal and communication skills. Individually, they need to be emotionally ready to navigate issues with families while remaining empathetic to the family's needs and detached within the boundaries of their professional sphere. Their mindset should be characterized by a deep sense of responsibility, empathy, and unwavering 95


CIRCUIT MAGAZINE ISSUE 68 dedication to ensuring the safety and well-being of vulnerable individuals. Specialized training in security management around families and children provides protectors with the knowledge, skills, and confidence to address these concerns effectively, empowering them to create a protective environment where families can thrive. Empathy, open-mindedness, and flexibility are essential qualities for protectors working with families and children, enabling them to understand the unique needs and challenges of each individual and, of course, adapt their approach accordingly.

96

Specialized training in security management around families and children provides protectors with the knowledge, skills, and confidence


STRIVING FOR EXCELLENCE

In conclusion, mastering security management around families and children requires a holistic approach that integrates technical expertise with interpersonal skills, a deep understanding of human development, individual coping strategies, and exceptional professionalism. By prioritizing proactive prevention, responsive

intervention, and employing an empathetic eye with caregiving, protectors can contribute immensely towards supporting a safe and nurturing environment where families and children can thrive because they feel safe based on the excellent professional services of the protectors.

Sandra Adiarte, SAS, CMA, and PhD candidate, lectures on Laban/Bartenieff Movement Studies and psychology. Through her company, Apollo Synergetics, she provides training in communication, intercultural interaction, security management, and leadership. Sandra advises criminal investigators using structured movement analysis and offers a unique SMAC© training program focused on child security management. She is actively involved in international research projects and expanding her global network until the end of 2025. 97


CIRCUIT MAGAZINE ISSUE 68

By RANE Worldview

Trump Assassination Attempt Portends Heightened Political Violence A gunman fired shots at former President Donald Trump during a campaign rally on July 13 in Butler, Pennsylvania, with one bullet hitting Trump's ear.

The attacker fired an estimated five to seven shots before Secret 98

Service agents blocked Trump and led him off the stage and into an armed escort. According to the Butler County district attorney, a Secret Service member shot and killed an individual believed to be the shooter, who was positioned on the rooftop of a manufacturing


TRUMP ASSASSINATION ATTEMPT facility over 130 yards from the rally and located out of the perimeter of the venue where attendees were checked for weapons. The attacker killed an audience member and critically injured two others. Footage showed blood on the former president's face as left the rally facilities, though a campaign spokesperson later issued a statement that Trump was "fine" and was being checked at a local medical facility.

The shooting came two days before the start of the Republican National Convention on July 1518, during which Trump is set to officially become the Republican Party nominee for president. The attack on Trump came amid elevated political tensions ahead of the Nov. 5 U.S. presidential election, which have included violent rhetoric, albeit few actual incidents of violence so far this year.

Political tensions are elevated across the United States ahead of the November elections amid right-wing frustration with the Biden administration and legal cases against Trump plus left-wing opposition to Trump's possible return to office. Tensions recently increased following Trump's May 31 Little is known about the shooter. conviction on 34 felony charges in the New York hush money Pennsylvania voter records trial and the July 1 Supreme indicate that he was registered Court ruling that the president to vote as a Republican, but federal campaign finance reports is immune from prosecution for actions exercising the "core indicate he donated $15 to a powers" of the presidency. liberal voter turnout group in 2021, and images indicate he was Misinformation and wearing a T-shirt for a YouTube channel called Demolition Ranch, disinformation have further contributed to political tensions, which showcases firearms. In the hours after the shooting, the FBI identified the shooter as 20-year-old Thomas Matthew Crooks of Bethel Park, Pennsylvania; as of July 14, the motive for the attack remained unclear, though authorities have said they are investigating it as an assassination attempt.

99


CIRCUIT MAGAZINE ISSUE 68 with conspiracy theories surrounding both Trump and President Joe Biden circulating on social media. Some of the escalatory rhetoric has come from the candidates themselves, with Trump previously calling on supporters to "guard the vote" in a December 2023 statement and Biden saying that Trump poses a threat to U.S. democracy. Some prominent Republicans, including possible Trump vice presidential pick J.D. Vance, have blamed the assassination attempt on Biden. Despite these elevated tensions, few instances of political violence have occurred in the first half of 2024; over the last decade, violent incidents targeting political figures have occurred occasionally. • In the past two weeks, focus on Project 2025, a package of controversial right-wing policy proposals, has also received increased attention and backlash and has resulted in Trump trying to distance himself from the package. • Recent politically motivated violent incidents include an incident in August 2022 in which an armed man 100

attempted to breach the FBI's field office in Cincinnati before police officers shot and killed him; the attack appeared to be in response to the FBI raid on Trump's Mara-Lago Club in Palm Beach, Florida, a few days before. In October of that same year, a far-right conspiracy theorist attacked the husband of thenHouse Speaker Nancy Pelosi at the couple's home in San Francisco, seriously injuring him. The assassination attempt will increase the risk of demonstrations and politically motivated attacks in the near term, particularly amid spreading conspiracy theories regarding the incident, with threats likely to persist through the election cycle. Regardless of the motive for the shooting, the assassination attempt will contribute to already-elevated political tensions and create the risk of demonstrations over the next few weeks. In particular, rightwing groups will likely organize demonstrations in support of former President Trump, especially in the vicinity of the


TRUMP ASSASSINATION ATTEMPT RNC at the Fiserv Forum arena in downtown Milwaukee.

Left-wing groups could also organize counterprotests, though this risk is significantly lower in the immediate future given that most leftwing groups will be hesitant to organize anti-Trump events in the immediate aftermath of the attack.

Right-wing demonstrations may also occur in major cities over the next week, including Los Angeles, New York and Washington. If events draw hundreds or thousands of people, they will create localized transportation disruptions and travel delays. Left-wing groups could also organize counterprotests, though this risk is significantly lower in the immediate future given that most left-wing groups will be hesitant to organize antiTrump events in the immediate aftermath of the attack. If counterprotests do occur, they will risk triggering clashes and pose safety risks to protest participants and bystanders. In addition, there is the risk that the assassination attempt will incite attacks by actors on both sides of the political spectrum. Likely attack targets include political events (including demonstrations and campaign rallies), government buildings, entertainment venues, and popular public areas such as squares and major thoroughfares. Attacks could include shootings, vehicle 101


CIRCUIT MAGAZINE ISSUE 68 rammings, or bombings, creating further safety risks. Meanwhile, misinformation or disinformation surrounding the assassination attempt is already spreading, and uncertainty regarding the shooter's political views will likely fuel conspiracy theories on both sides of the political spectrum. Demonstrating this concern, individuals have already speculated on social media that the shooting was a false flag operation intended to boost support for Trump, while others have speculated that the so-called Deep State attempted to assassinate Trump. Such conspiracy theories will risk exacerbating the threat of targeted politically motivated attacks in the next week. Though these risks are likely to be particularly pronounced over the coming days, they will likely remain elevated over the coming months ahead of the presidential election. • Risks of violence are likely to escalate in the immediate run-up to the vote, on Election Day (including toward election facilities) and following the announcement of the election results. 102

• Demonstrating efforts to lower tensions following the attack, virtually all prominent Democrats condemned the attack and political violence more broadly shortly after reports of the event emerged, and the Biden campaign also quickly paused communications and took down its ads. • Since the 2021 attack on the U.S. Capitol, right-wing groups have typically been unable to attract high participation for demonstrations, but the assassination attempt may draw higher attendance. • Authorities will likely increase security at the RNC, political rallies and other demonstrations in the coming weeks, creating additional transportation disruptions and other logistical challenges in the vicinity of events. The New York Police Department has already bolstered security at Trump Tower and other prominent locations around New York following the attack. For more articles like this go to : Stratfor Worldview >


ECUADOR DECLARES 'INTERNAL ARMED CONFLICT'

CLICK TO BOOK NOW! Cosain Media Safety Advisors Training Course Price: £300 inc VAT

103


CIRCUIT MAGAZINE ISSUE 68 65 By Mark “Six” James

Managing with

Courage

Don’t be afraid to manage with courage.

104


MANAGING WITH COURAGE

One of the clearest signs of a highperforming organization is how it manages underperformance. Managing with courage does not mean managing by intimidation. It means managing with clarity, honesty, and objectivity. The focus is on performance and performance enhancement, not personality. Unlike antiquated management models, where excessive amounts of time were spent with non-performers, today, most high-performing organizations represent up-or-out cultures. They attempt to hire to the required profile, focus on total compensation, and expect employees and contractors to perform as advertised. They then focus their time on those who are having a positive impact on the business. Best of breed, however, also find ways to trim the fat of underperforming employees. They focus on correcting skill issues; they don’t waste time with will issues. Training fixes skill issues. Only honest, candid feedback and performance improvement plans can address these issues. The acid test is if I threatened you with severe bodily harm if you didn't perform the task and you can do it; then it is not a skill issue. It is a will issue. 105


CIRCUIT MAGAZINE ISSUE 68 65 Now, the question has to center on why the employee, vendor, or contractor is not choosing to engage in the desired behavior. Sometimes, good performance is punishing. Whenever I do a good job, you put more stuff on my plate instead of addressing the underperformer, which causes a disproportionate distribution of work without additional compensation or other incentives. If underperformance is attributed to a lack of skill, that is a training issue, and we address that immediately. The employee has the will and desire; they just don't have the requisite skill.

Your goal is to help place the employee or contractor in a position where they can best add value consistent with their If, after the initial training, we have an employee who previously competencies added value but cannot step and personal up to the new requirements of the job, we then look to identify interest. where their skills are best utilized in the organization and focus on reassignment versus outplacement. Maybe they aren’t best at walking next to the client, or that particular client or a family situation requires them to spend more time closer to home, so a residential security assignment may serve them and the client better. Based on a prior life of commercial driving, perhaps transitioning to a security driver may be a better fit. Does their attention to detail better serve the 106


MANAGING WITH COURAGE client and the organization in an advance agent position?

have passed, the grass will never grow gain.”

Suppose there is a reorganization or you are bringing in new management, and you know there are current employees who need to be separated. In that case, that process should occur with the prior manager, shift leader, detail leader or senior leader.

Managing with courage, however, is the truest form of compassion, as your goal is to help place the employee or contractor in a position where they can best add value consistent with their competencies and personal interests, for some that may be outside of the company.

Don't make a forced separation the first act of the new leader. It is not that they don't have the ability to conduct the separation discussion. They often will not have witnessed the pinpointed, observable behaviors that were the separation's root causes. Also, for the existing employees, they have inherited, it will represent a time of uneasiness and potential discomfort as you will create a culture of compliance versus acceptance. As Attila the Hun was once quoted as saying, “There, where I

If outplacement eventually becomes the best option, always do it with compassion. Always allow the individual to save face during the discussion and transition process. Whether that is reflected in their severance arrangement (compensation), access to outplacement services or leaving their voicemail on for an additional 30 days while they conduct their employment search, separation with respect should be your goal. If you don't effectively address the performance challenges, the client and the team are at risk.

Mark “Six” James is the Founder and Executive Director of Panther Protection Services, LLC. He is an internationally published author, keynote speaker, security consultant to educational institutions and frequent contributor to print, broadcast and online media. Panther Protection Services is a full-service protection agency focusing on risk and crisis mitigation, protective services, self-defense training and firearm instruction. www.pantherprotectionservices.com 107


CIRCUIT MAGAZINE ISSUE 68

Global Situation Report ANALYSIS

Each issue our global geopolitical partner, Stratfor, provides an indepth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.

Saudi Arabia: Crown Prince Preps Formal Cuts To Vision 2030 Projects What Happened: A committee led by Saudi Arabia's Crown Prince Mohammed bin Salman is close to formalizing budget cuts to the country's Vision 2030 economic transformation model. Mega-project spending reductions will total tens of billions of dollars, but other projects, especially in Riydah, are expected to continue and even increase, partially offsetting the cuts. Why It Matters: Most notably, the committee has proposed a 20% reduction in funding for Neom, the mega-city being constructed in the northwest, as well as the cancellation of an airline for Neom.The mega-city is now closer to a symbol of ambition than a fully functioning city, with many of its greatest aspirations, from skiing to hosting hundreds of thousands of residents, being sidelined.The cuts will 108


GLOBAL SITUATION REPORT cool enthusiasm for doing business in Saudi Arabia among some investors, while others will see the cuts as responsible spending.>>> U.S., Iraq: Two Drones Attack Ain al-Asad Air Base in Western Iraq What Happened: Two drones targeted the Ain al-Asad air base in Western Iraq that houses U.S. and other international forces, though there were reportedly no casualties. Why It Matters: Iraqi militias will likely increase attacks on military installations with a U.S. presence if the U.S.-led coalition does not demonstrate progress toward a withdrawal after an Iraqi delegation's forthcoming visit to Washington, D.C. However, Washington and Baghdad will not agree to a U.S. withdrawal in the absence of an adequate framework to maintain security in Iraq, and Baghdad will also require the maintenance of its supply chain for U.S. military parts. As a result, Iraqi militias are likely to escalate attacks against U.S. targets to pressure a withdrawal, although the tempo is unlikely to escalate to the pace of attacks seen in the first several months of the Israel-Hamas war. >>>

109


CIRCUIT MAGAZINE ISSUE 68

Mozambique French oil major TotalEnergies hired security guards from Isco Seguranca, a company linked to Rwanda's ruling Rwandan Patriotic Front party, or RPF, to protect the site of its Mozambique LNG. China China and the Philippines are working out the final details of an agreement establishing a new multivector hotline mechanism to manage unplanned encounters and crises in the disputed South China Sea. US The United States told Japan and the Netherlands that it is considering tightening export restrictions on semiconductor manufacturing equipment produced abroad that uses U.S. technology via a foreign direct product rule, or FDPR, if Tokyo and The Hague do not tighten restrictions on Tokyo Electron and ASML Holding, respectively. Bolivia The Bolivian government announced the discovery of a ''megawell'' with 1.7 trillion cubic feet of natural gas in the western department of La Paz. This is the largest gas discovery in Bolivia since 2005 and will be the country's third-best producing field, generating $6.8 billion in revenue, according to official estimates. Bangladesh Police used tear gas and batons to disperse clashes between a

110

Rwanda: President Kagame Wins Reelection in Landslide, Extending 24-year Rule What Happened: Rwandan President Paul Kagame is poised to extend his 24-year rule by another five years after securing 99.15% of the vote in preliminary results from the country's July 15 presidential election, with 79% of the votes tallied. While key opposition candidates were barred from contesting in the election, Kagame ran against two challengers, Frank Habineza and Philippe Mpayimana, who have so far received 0.53% and 0.32% of the vote, respectively. Why It Matters: Kagame enjoys significant domestic support for stabilizing Rwanda following the 1994 genocide against the Tutsi. Over the past 30 years, he has overseen new economic initiatives that have recently focused on boosting manufacturing and innovation to address unemployment in the country — initiatives that likely continue over his next term. However, Kagame will also retake office amid ongoing regional tensions, particularly with the Democratic Republic of the Congo over Rwanda's alleged backing of the M23 rebels in Congo's neighboring eastern region. >>> Oman: Rare Shooting Near Shiite Mosque in Muscat Signals Growing Terrorist Risks What Happened: A rare shooting attack


GLOBAL SITUATION REPORT occurred near a Shiite mosque on the outskirts of Oman's capital, Muscat, on July 15, resulting in at least six deaths and dozens of injuries.The incident occurred in the Wadi Kabir neighborhood, where police forces killed the three gunmen in a shootout, according to an official statement. Why It Matters: Though no group has claimed responsibility, the attack highlights the growing risks of terrorist and lone-actor attacks, even in countries without many previous incidents. There will be a heightened short-term risk of similar follow-up attacks in Oman or other Gulf Cooperation Council countries such as Qatar or the United Arab Emirates.This attack could also be the beginning of a new threat by terrorist cells and groups against Oman that could spread to other countries in the region.>>> France: Country 'Dangerously Exposed' to Economic Shock Amid Growing Deficits What Happened: France is "dangerously exposed" to a new economic shock due to its growing budget deficit amid an ongoing political crisis, citing the country's national auditor. France's public deficit stood at 5.5% of gross domestic product in 2023, up from 0.7% in 2022 and 0.6% higher than government targets in 2023, while government debt reached 110.6% of GDP in 2023 and is expected to increase to 112.4% in 2024 and

student group supporting the ruling Awami League party and students protesting the country's quota system for government jobs at a public university near Dhaka, Bangladesh's capital, resulting in numerous injuries. Sudan Lt. Gen. Yasser al-Atta of the Sudanese Armed Forces reiterated the SAF's opposition to peace negotiations with the paramilitary Rapid Support Forces. This comes despite U.N. efforts to hold indirect talks between the two sides in Switzerland, to tackle the country's deteriorating humanitarian situation. Ethiopia Vice President of Tigray's interim administration announced that the region had reached an agreement with Ethiopia's federal government and the Amhara regional government regarding the return of Tigrayan internally displaced persons to western Tigray. Pakistan The federal government will file a high treason case against former Prime Minister Imran Khan and pursue legal measures to ban his Pakistan Tehreek-e-Insaf party. Meanwhile, a Pakistani court acquitted Khan and his third wife on charges of unlawful marriage on July 13, but they remain in custody due to the issuance of fresh orders to arrest Khan in connection with violence against the military and other state institutions that occurred after his arrest in May 2023.

111


CIRCUIT MAGAZINE ISSUE 68 113.8% in 2025. Why It Matters: The warning comes amid heightened political uncertainty following indecisive early parliamentary elections, which resulted in a hung Parliament with three blocs largely equal in size, none of which is close to an outright majority or particularly willing to cooperate with the others. As a result, the next French government will likely lack the support in Parliament and internal cohesiveness to implement the expansionary fiscal policies promised by the far left and the far right, reducing the likelihood of Paris pursuing deficit-financed spending increases that would put it on a collision course with Brussels, spook investors and further roil markets. >>> Israel, Gaza: Airstrike Targets Hamas Leaders in Khan Younis What Happened: An Israeli airstrike on a reported gathering of Hamas commanders and fighters killed scores of people in Gaza's southern city of Khan Younis on July 13. Israel claimed the strike killed Khan Younis Brigade head Rafa Salama but was unclear about military chief Mohammed Deif, Hamas' second in command in Gaza; meanwhile, Hamas did not confirm Salama's death and claimed Deif was still alive. Why It Matters: Israel will likely continue opportunistically striking senior Hamas leaders since these attacks limit risk to Israeli troops and could push Hamas to offer concessions in cease-fire talks. However, Israeli airstrikes will inevitably cause civilian casualties and spur further international outrage. Additionally, Israeli citizens are growing impatient with the lack of progress against Hamas and toward a cease-fire, fueling the anti-government protest movement. >>> Burkina Faso: Junta Adopts Draft Law To Criminalize Homosexuality What Happened: Burkina Faso's military junta adopted an amended family code that prohibits and punishes homosexuality.The legislation awaits parliamentary approval and promulgation by interim military leader Ibrahim Traore. 112


GLOBAL SITUATION REPORT Why It Matters: The code will likely pass due to the perception of homosexuality as a Western concept amid heightened anti-Western sentiments; Sahelian juntas are leveraging these sentiments to maintain public support.The draft law is expected to heighten concerns among corporations already reassessing their operations or investments due to the reputational risks associated with the junta. >>> Russia: Government Commences Slowdown of YouTube What Happened: Russia's state-controlled telecoms operator Rostelecom issued a statement warning users that video hosting platform YouTube may experience outages due to possible "technical problems with equipment owned by Google,". However, sources in the Russian telecommunications industry and Russia's presidential administration, as well as outside analysts, said the outages were the start of a campaign to slow, and eventually block, YouTube. Why It Matters: The slowing and eventual blockage of YouTube will cut Russians off from the largest source of uncensored content in Russia. While this change will push more Russians to circumvent blockages by using virtual private network services, or VPNs, Moscow's strategy will still reduce the number of Russians regularly engaging with independent media, which will facilitate Russia's descent into totalitarianism in the coming years. >>>

113


CIRCUIT MAGAZINE ISSUE 68

Cyber Security & Cloud Expo North America 2024 September 25-26, 2024 Santa Clara, USA

GSX (Global Security Exchange) 2024 September 23-25, 2024 Orlando, USA

DSEI 12-15 Sept 2024 London, United Kingdom

Security Canada Central 2024 Oct 23-24, 2024 Toronto, Canada

Black Hat USA 2024 August 3-8, 2024 Las Vegas, USA

DEF CON 32 August 8-11, 2024 Las Vegas, USA ISC East 2024 Nov 19-21, 2024 New York City, USA

RSA Conference 2025 April 14-17, 2025 San Francisco, USA

SANS Cyber Security Summit 2024 October 7-14, 2024 Orlando, USA

114

Cyber Security Summit: Boston 2024 September 18, 2024 Boston, USA

SECUREXPO – East Africa 15 – 17 Oct 2024 Nairobi, Kenya


INDUSTRY EVENTS International Security Expo 2024 September 24-25, 2024, London, UK

IFSEC International 2024 December 2-4, 2024 London, UK

ASIS Europe 2025 April 15-17, 2025 Vienna, Austria

Security – Essen 17-20 Sept, 2024 Essen, Germany

Cyber Security & Cloud Expo Europe 2024 November 26-27, 2024 Amsterdam, Netherlands

SANS London 2024 November 25 December 7, 2024 London, UK

Australian Cyber Conference 2024 October 15-17, 2024 Melbourne, Australia

CISO Forum 2024 September 18-20, 2024 Sydney, Australia

Intersec 16 – 18 Jan, 2024 Dubai, UAE

Do you have a security event that is not listed here that you would like our readers to know about? Contact us: info@circuit-magazine.com 115


CIRCUIT MAGAZINE ISSUE 68

Keeping Your Edge: The Art of Quiet Success

By Elijah Shaw

In an era dominated by social media, where the temptation to broadcast every success can be overwhelming, security professionals need to resist the urge to measure their success by public accolades, 116

“views,” or ‘likes.” This challenge is particularly important to be mindful of in the executive protection industry, where much of our work is conducted behind the scenes and with a respect for Operational Security.


KEEPING YOUR EDGE While the phrase has become a bit cliché, it is true we operate in the shadows, ensuring the safety and security of our clients without drawing attention to ourselves. This confidentiality is not just a professional necessity but a hallmark of effectiveness. The very nature of our work also means that many of our successes go unnoticed by the wider world. Unlike other professions where achievements are celebrated often, openly, and to as wide a circle as possible, our victories often remain hidden, known only to those within core groups. Imagine an agent who successfully defuses a potentially dangerous situation without any fanfare. The threat is neutralized, and the client continues their day, blissfully unaware of the potential danger they faced. There are no news reports, no social media posts, and no public recognition. This is actually the norm in our field, not the exception. Given this context, it becomes clear that comparing

one's success to that of others in a public space is impractical. How can we compare what we do in private achievements with the public displays of success seen on social media? It's like comparing apples to oranges, as the metrics are different. In the executive protection industry, our true measure of success lies not in public recognition but in the quality of service and peace of mind we deliver to our clients. It’s about the short, but sincere “thank you,” from the Protectee. It’s about the nods of appreciation from another Agent in the same area who understand the demands of the assignment. It’s about the personal satisfaction of a job well done. As each day presents an opportunity to improve, refine skills, and to enhance the service we provide, it’s evident that the competition is not with others but with ourselves. This focus on personal growth and professional development is what sets true professionals apart in our industry, and it's essential to set personal goals 117


CIRCUIT MAGAZINE ISSUE 68

and benchmarks for success. even, safety. These might include mastering The best way to measure new techniques, expanding our success in the executive our knowledge base, or protection industry is not improving our physical and by comparing ourselves to mental fitness. others, especially in the public arena of social media. Instead In spite of the above, a new set personal goals, and when trend seeks to discard these you reach them reward norms, by highlighting the yourself in big or small ways. Protectors achievements, by By that same token, when you the protector himself, while can give words of affirmation they are on assignment. or praise to a Protector, even This is the lure of social media one who is not in the spotlight, or might be on a less than where ego and the need for glamourous do so. Much attention is hidden behind can be said about the value the terms “branding,” and of peer recognition and in a “marketing.” Look at me for fraternal brotherhood like likes, is not a brand strategy Protective Services, no one it is just another way to understands the challenges service the algorithm while like the men and women who compromising your client’s confidentiality, and sometimes do it. Elijah Shaw is the National Director of the North American Bodyguard Association and the CEO of ICON Global, and International Executive Protection Consulting Firm. Elijah, who has been featured in international publications such as Inc. Magazine, Entrepreneur, and Portfolio, runs the ICON Academy, an EP Training Program specializing in Celebrity & VIP Protection. He also currently sits on the Board of Directors of Executive Security International (ESI), the United States oldest Executive Protection Training School. He is the co-author of two books, An Introduction to Executive Protection & Touring: A Guide to Mastering the Business of VIP Security, and, Introduction to Executive Protection, available now in print, paperback and audiobook.

118


Membership starting from £5

admin@the-bba.org.uk www.the-bba.org.uk 119


CIRCUIT MAGAZINE ISSUE 68

120


CLASSIFIEDS

Email: info@circuit-magazine.com United Kingdom 242 Security 242 Security offer a discrete, sophisticated but uncompromising approach that uses special forces principles gained through decades of experience in high-threat and high-risk environments. Because of this knowledge, we can disrupt conventional threats by providing next-generation services suited for today’s discerning clients. T : +44 (0)7498 990788 E : enquiries@242security.co.uk W : www.242security.co.uk 3D Security Ltd Taunton, Somerset, TA1 1TG Based in Taunton 3D Security provides security services for a wide range of clients. Whether you need a security guard in Somerset, event security in Leeds or Close Protection in London we will provide a solution for your needs. T: +44 (0)1823 253 001 W - www.3dsecurity.org E - enquiries@3dsecurity.org.uk A.B.I. Solutions A.B.I Solutions is a dynamic, forward thinking company, specialising in surveillance, security and investigations with local, national and internationalexperience. A.B.I provides a wide range of services to the corporate sector and individuals alike. W - www.abisolutions.co.uk Alex Morgan - Close Protection Officer I am a hardworking, enthusiastic and committed person. Adaptable and driven, I have great attention to detail and high standards. I am honest, reliable, friendly and work well as part of a team as well as on my own initiative. I am also a good listener who has the ability to communicate with people at all levels. I am comfortable, both taking and issuing direction. I am looking for the opportunity to apply and expand my skills. E: adsmorgan74@gmail.com T: 07775 636964 Argus Europe County Durham

Argus Europe has been providing specialist training for high-net worth clients and their families for close to 20 years, worldwide. Argus Europe now offer accredited training for CPO’s, Surveillance Operators and Private detectives. Argus Europe is an operational company working globally with an extensive variety of contracts. W: www.arguseurope.co.uk T: +44 (0) 8456 123 843 Briareus Security Our aim is to give a complete, discreet and professional service to all of our clients, be they large corporations, small businesses, local authorities or private individuals, all tailored to meet their individual needs. W: www.briareussecurity.com E: info@briareussecurity.com Callum Barrie Experienced Dog Handler since July 2020 and Security Industry experience of over 6 years. I have 2 working dogs, 1 Belgian Malinois (3 years) and 1 German Shepherd (1 year) available to work immediately. I have a current Close Protection Badge and Door Supervisor Badge. I am NASDU Level 2 Qualified. I have Public Liability Insurance and my own vehicle. Seeking employment immediately in Wales M: 07580405745 Cosain Consultancy Ltd Cosain has over 25 years of experience within the media safety and executive protection industry and has a network of trusted relationships with global media companies across the globe. Our services include crisis management, risk assessment, ground truth, rapid deployment and bespoke training for our clients. We deliver the only Media Safety Advisor Training course available today that is based on extensive, operational experience, preparing the attendees for the varied and challenging demands of media safety. W: www.cosainconsultancy.com E: info@cosainconsultancy.com T: +44 7859 040 807

121


CIRCUIT MAGAZINE ISSUE 68 Bespoke Britannia Bespoke Britannia draws experience from a specialist group of individuals who banded together in 2015 – 20 years of British Royal Family, over 30 years with the Security Intelligence Services as well as the British Police Force and Armed Forces. T : +44 (0) 207 692 5714 W : www.bespokebritannia.co.uk British Training Board The British Training Board are very proud to be a Community Interest Company (CIC) this means that we are company that helps a specific community to achieve a specific target or goal. T : 01792 709 287 E : admin@britishtrainingboard.org.uk W : www.thebtb.co.uk Creative Protection Services Our aim is to work with our customers to develop and improve how security is managed, keeping you and your business safe. We are passionate about utilising proven, cost-effective, and innovative tech – but we passionately believe in traditional time-honored methods when they are appropriate. We will listen to your needs and will always be happy to provide a fast and competitive quotation, completely free and with no-hidden-extras. T : 0333 224 1777 E : cps@creativeprotectionservices.com W : www.creativeprotectionservices.com Elysium Security Elysium employees are drawn from the military, police, and civilians at the top of their profession, and have to go through our personal company training insuring they are at the high competent standard required by Elysium Security, which provides the company with a unique balance of experience and knowledge to which the client benefits with bespoke security solutions. T : 01803 298 989 E : info@elysium-security.uk W : www.elysium-security.uk Exclusively Private Exclusively Private is an independent private security and household staffing company based in the UK. We pride ourselves in providing outstanding security and staffing services for high-net-worth individuals, families, and businesses based in the UK, Beijing, Hong Kong, Singapore, and Tokyo. T : +44 (0) 7928 744344 E : info@exclusivelyprivate.co.uk W : www.exclusivelyprivate.co.uk G6 Global G6 are specialists in all types of radio, telephony and satellite communications for both voice and data with particular emphasis on covert communications installations in both vehicles and fixed

122

locations. In addition, our range of personal covert radios and bespoke accessories is extensive. W: info@g6-global.com T: +44 (0)1454 610050 Horizon Horizon is an internationally renowned and accredited security and medical company founded in response to the growing need for bespoke solutions for individuals and corporate clients offering a comprehensive range of services in the provision of security consultancy, security management, manned guarding services, training and manpower solutions. T : 01389 755551 E : info@horizon.uk.com W : www.horizon.uk.com Intelligent Protection International Intelligent Protection International Limited provides Close Protection Bodyguards and Executive Protection Services to meet our clients’ requirements, whether it is in a hostile environment, or a capital city. We operate with an amalgamation of professional standards, great management and highly experienced personnel. T : +44 207 4566740 E : info@intelligent-protection.co.uk W : www.intelligent-protection.co.uk Janus Protection Solutions Janus Protection Solutions have a track record of excellence, commitment to customer service and loyalty to our clients. Our employees have positive attitudes, professional demeanour and care genuinely about providing excellence in security services. T : +44 (0)161 706 0857 E : info@janusprotectionsolutions.com W : www.janusprotectionsolutions.com King Cobra Security Ltd King Cobra Security are a Milton Keynes based company, incorporating Certificated Enforcement Agents, Security and Surveillance officers carrying services for the Domestic & Corporate Sector. Being one of Milton Keynes leading and vibrant companies not scared by trying new technologies sets us out from the rest. We are capable of tasking agents throughout the UK & Internationally when required. E : info@kingcobrasecurity.co.uk T: 0330 223 5099 W: www.kingcobrasecurity.co.uk Adam McErlane Close Protection & Client Management A qualified/licenced close protection operative and live events technician from the UK. • 12+ years of experience operating within the live events sector as on operational technician/engineer (Touring & In-House) • Extensive knowledge of the operational procedures, security protocols & logistical processes of large tours and venues. • Personal


CLASSIFIEDS protection/client management experience (unlicensed) for a high net-worth individuals. Personal Qualities - • Determined, motivated & hard working. • Punctual and reliable. • Able to work independently & as part of a team • High ethical & moral standing. • Act quickly and decisively when required. • Working knowledge of defensive tactics in hostile situations. • Patient & Tolerant in stressful situations with others. • Rudimentary understanding of the Spanish languages. • Effective communicator with a diplomatic approach. • Very resourceful & able to find solutions to complex problems. • Possess good foresight & vigilance. • Years of experience working long & unsociable hours. • Physically fit & Healthy E: adammcerlane1989@outlook.com T: +44 7751953009 Marcin Gebler Close Protection Officer I have experience with work as an armed security officer, an armed security guard at army unit and army airport, an armed officer responsible for searching and identifying explosive devices, an armed CP in Poland. I have experience with work as a mobile patrol security officer and static security guard in UK. I have experience with work as a security officer at hotels, production sites, private households in UK. I am SIA CP and DS licensed. First Aid at Work Level 3 completed in 2020. Firearms Training Course Combat Pistol 1 for CPOs Shockfire in Poland 2020. E: p.i.gebler@gmail.com T: + 44 07799907528 Minerva Elite Minerva Elite is a highly professional and effective risk management and resilience consultancy formed to provide clients with competitive advantage and bespoke solutions to their security needs. Formed by a former United Kingdom Special Forces (UKSF) officer, we have a core value of the ‘Unrelenting pursuit of excellence’ in all tasks we undertake and bring world-class experience to bear for our clients. E : hello@minervaelite.com W : www.minervaelite.com Optimal Risk Optimal Risk provide integrated multi-domain support for physical and cyber risk, and lead the field in converged risk services. From protective services, to security and contingency planning, security exercises, preventative measures, and crisis management solutions for complex environments. T : +44 (0)20 7118 8870 E : info@optimalrisk.com W : www.optimalrisk.com Pinnacle Risk Consultancy Pinnacle Risk Consultancy are a veteran owned company based in the United Kingdom, with offices in Yorkshire, Manchester and London. This affords an excellent coverage of all major cities, towns and counties within the UK.

T : +44 (0) 20 7971 1990 E : info@pinnacle-risk.com W : www.pinnacle-risk.com Polaris Operations Polaris Operations are a premier provider of turnkey specialist services worldwide. We provide a full security service to care for all of our client requirements a dedicated complete package for all their needs or we dovetail into existing structures, working with external agencies to national levels. We provide a high-quality bespoke personal security service for discerning clients. We do not provide a one-size-fits-all security solution. T : 0208 100 6071 E : projects@polaris-operations.co.uk W : www.polaris-operations.co.uk Protegimus Protection Protegimus Protection is a leading specialist and licensed bodyguard, executive protection and security consulting company that ensures all your security requirements are met. We have expertise in executing, adding and improving to your security. As security experts we offer a complete range of security services and a multitude of bespoke security services to the highest of standards. T : +44 (0)7306 395194 E : enquiries@protegimusprotection.com W : www.protegimusprotection.com RWSSI Rob W is a professional security consultant with world wide experience and capabilities in Security, Surveillance and Investigation; I can support you to overcome any problems and enable you to achieve your goals E: rob@rwssi.co.uk T: +44 (0)7818 220985 Samaritan Protection Services Samaritan Protection Services are an industry leading risk management firm specializing in Protection, Intelligence, Crisis Management and Security Consulting. We provide professional and comprehensive strategies to reduce risk for public and private entities worldwide. T : +44 (0)203 137 7380 E : info.uk@samaritanps.com W : www.samaritanps.com Securitatatem Group Our mission is to provide unrivaled security services and tradecraft worldwide. Our ethos and culture are to deliver the highest of public service standards and values tailored to private sector clients. T : 0203 746 2214 E : enquiries@securitatemgroup.com W : www.securitatemgroup.com Safe Crowds As one of the UK’s leading security service providers

123


CIRCUIT MAGAZINE ISSUE 68 SafeCrowds is driven to deliver and maintain a standard that exceeds the expectations of both existing and future clients. T : 020 4511 0100 E : info@safecrowds.co.uk W : www.safecrowds.co.uk Shaun West Associates Shaun West Associates is an integrated partner operating within the global security market. Based in the North East of England, delivering solutions across a wide range of security requirements. With the highest calibre of experience, alongside a passion for the industry, we provide discreet and effective solutions to your security requirements, whether that be looking after yourself, your loved ones, property and assets or your business. T : +44 (0) 191 300 4500 E : info@shaunwest.co.uk W : www.shaunwest.co.uk Shaun West – Business | Mindset Coaching An internationally accredited coach, with a background steeped in military discipline, security expertise, and entrepreneurial success. Using Elite Mindset coaching techniques, empowering individuals and organisations in the security industry to overcome their obstacles and achieve exponential growth. E : sw@shaunwest.co W : www.shaunwest.co Stephen OCallaghan Founder & Managing Director Strategically oriented Close Protection Security Specialist with a proven track record for providing effective leadership and exceeding performance objectives. Has been responsible for implementation of security standards in hostile and non-hostile job roles, security awareness and education, coordination of sensitive investigations, analysis of emerging industry trends and threats and the evaluation of overall team effectiveness. Ability to develop and maintain effective working relationships within a team, whilst at all times keeping the main objective and security needs at the fore front. E: enquiries@protegimusprotection.com T: +44 7306395194 W: www.protegimusprotection.com Vas Sotiropoulos London, UK I am a security operator with over nineteen years of experience in close protection, counter-surveillance, diplomatic protection, door supervision, and CCTV monitoring in the United Kingdom and Greece. Second Lieutenant in the elite of the Hellenic Army, the Special Forces. Undertaken a number of close protection courses run by the Greek Ministry of Defence, the VIP Protection Unit of the Hellenic Police, and the Surveillance Department of the US Embassy in Athens. Highly

124

motivated and confident relocated to the UK for further career progression and to install my own footprint in the private security sector. Fully licensed Close Protection Officer by the British Security Industry Authority. E: info@spartanelitesecurity.co.uk T 02038882020 W: https://spartanelitesecurity.co.uk Wagtail UK Wales, UK Wagtail UK are international specialists in detection dogs and dog handler training. Established in 2003, Wagtail UK provides detection dogs and related services for government agencies such as UK Border Force, HM Revenue & Customs, Police, Trading Standards and Armed Forces. Wagtail International School of Excellence in North Wales is a fully approved training centre endorsed by Highfield Awarding Body for Certification. T: +44(0)1745 561166 E: info@wagtailuk.com W: http://www.wagtailuk.com Westminster Security Ltd London, UK Westminster Security Ltd are an independent, industry leading private security company in London; providing security and investigation services throughout the UK, EU and worldwide for our clients. We specialise in close protection services; providing ex-military and police bodyguards to many national and international companies, heads of state, royalty, high-profile personalities, CEO's, private individuals and families. T: +44 (0)207 123 4544 E: Info@westminstersecurity.co.uk W: www.westminstersecurity.co.uk Europe & Africa Wille Heino, Security Specialist, Owner Finland Gambeson is a security training & Consulting Company specialized in countering modern day threats. - Security & safety planning for different events. - Security training: Active shooter/Terrorism awareness/Surveillance detection/ Other. - Security consulting. We are specialized in executive protection related services. Local knowledge, trained and licensed close protection offers, mission support, other. E: wille.heino@gambeson.fi W: www.gambeson.fi Americas Bodyguard Careers Bodyguard Careers is an informational site with the purpose of providing bodyguards with all the information and tools necessary to succeed in the Close Protection Industry Info@BodyguardCareers.com www.BodyguardCareers.com


CLASSIFIEDS Decisiones Estratégicas Buenos Aires – Argentina Executive protection specialists we have experienced in all Latin America, for multinationals companies, also providing support in project throughout Latin America to consulting first the US. and UK. We have a team of specialists and psychologists in assistance and crisis negotiation. T: +54(911) 6415 1941 E: jbenitez@d–estrategicas.com W: www.d–estrategicas.com Fernando Mata Mexico I started in the Protection of Officials as an infantryman in the Presidential Guards Corps, in the Mexican Army. Later, as a civilian, I certified in executive protection and took a diplomaed in personal protection. I have also taken intelligence, terrorism and counterterrorism courses and some refresher courses. I am currently participating in an Academy project for the professional training of Protection agents with international standards. E: matamfer@hotmail.com T: + 55 2126 6994 W: www.afeeg.mx USA Icon Services Corporation 1043 Grand Ave. #312, St. Paul, MN 55105, USA A full service security and investigative agency specializing in providing high-level security and bodyguards to international celebrities, public figures and corporations. Licensed, bonded and insured, our diverse roster of clients reads as a virtual who’s who in the corporate, motion picture, fashion and recording industry. Icon has been the hand picked choice to provide Executive Protection to everyone from Superintendents to Supermodels. BBA Member. T: + 1 651 695 8778 W: www.Industry-Icon.com Imperial Protective Service, LLC 15849 N. 71st Street, Suite 100, Scottsdale , Arizona, 85254, USA Imperial Protective Service’ (IPS) is a security consulting and services firm founded in 1978. IPS provides both national and international corporate, executive and celebrity protective services. BBA Member. T: + 1 480 281 1588 W: www.executiveprotect.com Panther Protection Services 3695F Cascade Road, Suite 2207, Atlanta, GA 30331 Panther Protection Services is a full service protection agency offering such services as threat assessment, executive protection, self-defense training, firearms instruction, and high risk tactical protection. Our executive protection specialists have over 75 years of experience.

Panther can handle your protection needs whether around the corner or around the world. Member: BBA and NABA T: (404) 349-9117 W: www.pantherprotectionservices.com Tony Scotti’s Vehicle Dynamics Institute 1162 St. Georges Ave, Suite 277 , Avenel, NJ 07001, USA The first name in advanced driver training, offering our highly acclaimed Protective/Evasive Driving Programs. Designed specifically for today’s executive chauffeurs, executive protection professionals and others who are responsible for providing safe and secure transportation services. BBA Member. T: + 1 732 738 5221 W: www.vehicledynamics.net New Zealand Security Investigations & Risk Solutions LTD We are dedicated to providing professional and effective security solutions for your personal or business security requirements. S.I.R.S is one of the only security companies in New Zealand with ISO 9001 and ISO 18788 Running the most advanced security management system TrackForce to help S.I.R.S security operations with real-time reporting and lone worker technology. With a combination of Military and Security industry experienced staff. We offer high-quality security services and industry recognised training programs with international qualifications in Close Protection, Bodyguards, Maritime Security, Hostile Environment, Firearms Training, Door Supervision, Private Investigations, Surveillance, CCTV Operations, Event Security, Mobile Patrols and Static Guards. S.I.R.S has the expertise and flexibility to meet a wide variety of client needs. E: lee@sirs.org.nz T: 02040787549 W: www.sirs.org.nz Asia - Middle East - UAE Health Safety Emirates Health Safety Emirates are proud to be the number 1 Film Production Safety and Security Consultancy in the UAE and Middle East T : +971501001946 E : info@healthsafety.ae W : www.healthsafety.ae Krav Maga Middle East DMCC First established training company for the military selfdefense and fighting system developed by the Israel Defense Forces (IDF) and Israeli security forces in UAE since 2018. T: +971 50 343 1832 W: www.kravmagamiddleast.com E: info@kravmagamiddleast.com

125


Life can be testing, no matter what you fight. - Keep Fighting.

FOP is for you, whether you wear uniform, a suit, or gym kit. 126


ISSUE 68

Subscrib e today & save

THE TEAM: UK Editor: Shaun West US Editor: Elijah Shaw

Subscription means you’ll never miss an issue of the Circuit Magazine again. Subscribers get: • Every issue of the Circuit • Full access to the Circuit website. • Priority delivery of each magazine. • Access to all back issues. • Subscriber only content and offers.

Managing Editor: Jon Moss Director of Events Phelim Rowe Art Direction: Pete Falkous

Contributors: BJoe Autera Kevin Dye Denida Zinxhiria Grow James Bore Thomas “Tom” Pecora Orlando Wilson Krisztian Zerkowitz R.Savkov Michael J. Niner Sandra Adiarte Mark “Six” James Elijah Shaw

Our Sincere Thanks to all those that continue to contribute their wisdom and experience for the enjoyment of others The Circuit is compiled, edited and published in the UK and US bi-monthly. W: www.circuit-magazine.com E: info@circuit-magazine.com T: +44 0191 645 0865

TO ADVERTISE: IF YOUR BUSINESS OPERATORS IN, OR SERVES THE PROTECTION INDUSTRY THEN YOU NEED TO SPEAK DIRECT TO YOUR AUDIENCE THROUGH A TRUSTED CHANNEL. GET IN TOUCH TO FIND OUT ABOUT THE GREAT OPPORTUNITIES THE CIRCUIT CAN PROVIDE TO IMPROVE YOUR BUSINESS SALES AND GROWTH. Email: info@circuit-magazine.com

New app with more features Get The Circuit Security Magazine with immediate electronic downloads to read on your PC, laptop or smart device.

DISCLAIMER While every care has been taken to ensure that the information contained in this magazine is both accurate and up-to-date, The Circuit accepts no liability in any part for loss or damage incurred by reliance on information contained in this magazine through omissions, errors, howsoever caused. ©COPYRIGHT Copyright remains with the authors and contributors at all times. No part of this publication can be copied or reproduced in anyway whatsoever without permission from the publisher AND the author / contributor.

127


128

facebook.com/groups/TheNABA/


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.