The psychology behind the misinformation was mostly covered last time, so we’re going to look more at the mechanics that enable them. We’ll take a look at fake social media accounts, botnets, and automated amplification to exploit social media algorithms.
Trunk Guns
One of the biggest ongoing phenomena is the firearms space is the concept of a trunk gun. Whether it is a handgun, shotgun, or a rifle, firearms are simply tools. When it comes to any tool, you first must ask what is your objective?
Let’s begin by considering the history or evolution of this phenomenon. The precursor to trunk guns were probably truck guns.
The Importance of Emotional Control in the Workplace
If you are a service provider, you must always have in mind that people you employ and place with clients are the people who represent your brand. Their mistakes will harm you more than it will harm them. Most companies are losing contracts due to the toxic or unprofessional behaviour of their operatives.
Keeping Your Edge: Listen in Totality
Someone said this quote to me a long time ago and it really resonated. It was one of those things where the more I thought about what it actually meant, the more insight I gained from just those few short words. The quote itself originated from the American poet, Maya Angeolu. And while it’s very unlikely social media was on her mind, or even a thing, when she drafted it, I think it’s very fitting on how it plays into society today.
Embracing The Unified Protector: A Holistic Approach to Risk Management
The integration of different security sectors under the role of the Unified Protector may at first seem daunting. However, does it offer the promise of a more effective, coordinated approach to managing complex risks? As businesses, organizations, and the threats they face continue to evolve, so too must the strategies and structures we use to protect them. The dynamic role of the Unified Protector may just be the next step. Are you ready to welcome this evolution?
Is Your Brain Working Against You?
Our brain is constantly processing information. From making our coffee in the morning to dreaming while we sleep, our neurons are always working to figure out what to do with the information they’re receiving. Every scenario is carefully calculated within our brains which then tells us how to respond to certain stimuli. In the field of Close Protection, it’s crucial that we train our brains to respond to stimuli in a quick and calculated way so that we are able to execute our responsibilities and keep people safe.
Behind the Veil
Behind any large delivery service are logistics personnel, without these individuals nothing would move and production would grind to a halt. Likewise, backing any police force, there are a group of emergency dispatchers that help send, coordinate, and give real time information to responding officers. With airline pilots, there are a team of air traffic controllers that convey critical information to the pilot for a safe flight. And in the same vein, behind Executive Protection Specialist, there may exist a caring spouse, or partner.
The One Percent
Cybersecurity provider NTT Security reports that five countries are the most common sources to 50 percent of global cyberattacks (Figure 2). Akamai states that two-thirds of Distributed Denial of Service (DDoS) cyberattacks originate in ten countries. Symantec, another provider, adds 13 more countries for a total of 23 countries, which are homes to the worst cyber offenders and who are responsible for two-thirds of all malicious internet activity.
Staying Grey
The truth is there aren’t many conventional radios that are commercially available, that are easy to conceal whilst still giving you the coverage and functionality you need to do the job. And with all conventional two-way radio, you still face the challenges of coverage and range, not to mention licensing and the issues of using the devices outside of UK jurisdiction.
Pistol Shooting
It amazes how many people attend supposed tactical firearms training classes and come away having never been shown or understand the importance of shooting one handed.
Yes, shooting a pistol with a two-handed grip is for most people more accurate and is better for competition shooting or passing range qualifications. But, in the real-world when your reactions need to be quick and you need to respond to attacks in all environments you may not have the space or time to get into your range perfect position.
Social Media Engineering
Take just one example the conspiracy theories around 5G were quickly re-tailored to incorporate Bill Gates and George Soros as targets, and were effective enough that there were arson attacks against 5G infrastructure. In other words, a few memes and videos, along with the use of these techniques (whether deliberate, or accidental, but there is strong evidence of deliberate action) were enough to cause homegrown domestic terrorism attacks on UK soil.
Selecting Firearms for Close Protection Details
I recently had some gun store commando in Europe trying to push the benefits of the 12 gauge Saiga shotguns on me over say a regular AK-47… Something to do with the kinetic energy of a 12 gauge slug at 100 meters… Saiga shotguns are very nice guns but I take it they were all this guy had used or could sell due to the restrictions on semi-auto rifles in his country. Some unwitting buyer could easily take this gun shop owner and firearms experts advice and end up buying firearms for use in hostile environments that were not suitable, overpriced and the ability of being able to buy effective ammunition, spare magazines and parts locally would be extremely difficult if not impossible.
Preparedness & Perseverance
. To prepare is to, make (something) ready for use or consideration, to persevere, is to continue in a course of action even in the face of difficulty or with little or no prospect of success. Among the many skill sets we must attain, practice, and master over time, preparedness and perseverance are two less talked about traits of a solid EP practitioner. There are many reasons why the focus on these skills are over shadowed by wrist locks, positioning, being the body man, fancy martial arts, and firearms. What’s a significant reason you ask? Well, in my opinion it’s because there is no immediate gratification, or “look at me” moment(s). There are plenty of instances where all of the before mentioned skills are useful, however, how and when they can be used start with being prepared.
The Great Divide – Keeping Your Edge
In many cases this occurs with such frequency that it not only paints a part of the picture of the individual, it becomes the entire painting. In fairness or not, the act of retransmitting news media can be interpreted as an endorsement of the totality of the views. Adding an additional layer, readers/viewers are allowed to engage and interact with the news in ways that far surpass the past. Gone are the days where you could agree or disagree with a newsperson and have to mail a letter into the editor in the hopes that it would be read, and in extremely small cases, reprinted.
Baselines of Behavior
The four major behaviors are dominant, submissive, comfortable and uncomfortable. These are the most prevalent and easiest to categorize most nonverbal communication into. Identifying the behaviors is not our main goal. Creating a baseline of the behaviors is first, then looking for clusters of anomalies is the goal. Seeing anomalies for what they are, changes within the individual’s emotional state around a specific topic.
COVID-19 and the Executive Protection
As practitioners, our responsibilities are many: protection of the client from physical harm, protection of the client from self-embarrassment, etc. Now, that the restrictions in the post COVID-19 era are starting to be lifted in some areas, Clients, and other high-net-worth individuals will be more aware of the area in which they are located, lodging, and traveling to.
Ways to See the Threat Before it Happens
Threat modelling is widely in use, whether knowingly or not, across every walk of life – and has been used since time immemorial to prioritise security defences. The only difference between the well-known risk assessments carried out by everyone and threat modelling in cyber security is the attempt to document and systemise it. I am hoping that this idea of formal threat modelling will be a useful tool for you to use in your future arsenal of available resources as a CP operator.
Keeping Your Edge: Building a Solid Foundation
Longevity, consistency and remaining relevant are some primary goals of all protectors. These factors are important when establishing a new contract and providing services for a new client. But what is equally important is the mindset that goes into those first days and weeks on the assignment. As such, I wanted to get the personal perspective of Vantrell Wilson, a close protection agent who I have trained with and worked alongside of for years now.
Leveraging Technology in Industry Hiring
Increased global connectedness through technology is fast becoming the norm these days. Video conferencing and “face to face” meetings are happening daily in real-time across the world. As an industry that prides itself on having the edge over our adversaries, we are falling below our own standards when it comes to utilizing the technological resources at our availability to their fullest potential.