regret that comes from knowing that you could have done more to support a person in life, even if just by offering a kind word or two. Some might think a topic like this has no place in an Alpha industry like Close Protection but consider that a large part of our ranks are pulled from both law enforcement and the military. We can all see how helpful positive reinforcement has been for those stressful careers.
We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.
About Drum Cussac, a GardaWorld company
Because we put your people first, we’ve built cutting-edge risk and security which keeps up with the pace of change. The only risk and security platform to feature monthly updates, GlobalRiskManager is purpose built to be future-proof and can seamlessly integrate with your own systems. This, combined with over 20 years’ of industry knowledge and a team of in-house security experts, provides you with a comprehensive end-to-end risk and security solution – done your way.
As security professionals, we must not allow ourselves to be caught up in either politics or hysteria. Our approach must reflect what we have been trained to do: dispassionately apply sound security principles to this security threat.
After every such event, the blame begins. Some blame the National Rifle Association (NRA), gun owners in general, and Donald Trump in particular, and call for banning firearms, or at least banning AR-15-type rifles. Others blame video games, violent movies, the culture, or the Kardashians. And the political games continue.
We now see companies capitalizing on this idea, by making different lines of equipment and bags that tout themselves as being “covert” or “discrete”. I am of the belief that if you are wearing clothing that advertises itself as either of these things, it’s anything but.
Truly experienced law enforcement, military and security professionals can spot each other a mile away. Often the giveaways are in the clothing and personal accessories that we choose. Watches, shoes and belts are accessories that are often over looked by those attempting to be “Gray”. Wearing Soloman’s or Merrel’s, a Suunto/Garmin/Pathfinder watch and an Ares Gear/511, or another tactical belt is not being gray. Each of those accessories, gives up information about you, that you say you are trying to conceal.
Over 30 years ago, when I left a failing white-Collar industry in a failing economy in Texas, I did what many in my predicament did. I entered the contract security industry at near minimum wage. What I did that many others did not, was survive in the industry long enough to out earn annually what I was earning in my previous profession.
We all hear about this OSINT malarkey but searching the Internet for information is much much more than just dropping a couple of search terms into Google.
There are many different search engines out there and using these various systems, combined with how you actually search for phrases, should bring you the results you are after.
An estimated 5.9 million CCTV cameras were in operation throughout the UK in 2016, making the British public one of the most surveilled in the world. Only Beijing has more CCTV cameras than London, where the average person will be recorded on camera 300 times in one day.
From the time we are indoctrinated into this Industry, we hear the phrase “Head on a Swivel”! This ancillary movement of moving one’s head 180 degrees side to side is taught to familiarize the specialist with scanning areas or crowds for suspicious activity or persons. At first, it’s over exaggerated, you appear to be nervous, very bobble head like, anxious, your adrenalin surges through your veins, but WHAT DO YOU SEE? If you see something, WHAT IS IT? Do you UNDERSTAND what it is you’re seeing? If so, now can you now PROJECT? And if so, can you now RESPOND? Oh, and can you do it in mili-seconds? For many, the answer is NO and for the many that can’t in truth say yes, I offer this article.
Welcome to a third article in the series looking at introductions to cyber security. We’ll be looking at a type of attack which most people will be familiar with in principle, if not in technical practice.
The basic idea is simple – an attacker sits between two trusting parties, intercepting their communication and impersonating each to the other. Obviously this is somewhat harder in practice where people are, for example, sitting in a room together, but even a phone call gives potential for an eavesdropper or impersonator.