• Skip to primary sidebar
  • Skip to content
  • Skip to footer
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

Circuit Magazine

For Security & Protection Specialists

Boston April 15, 2013 14:49 pm:
Chechen brothers Dzhokhar and Tamerlan Tsarnaev load two bombs into two separate backpacks; they each carry one and calmly walk into downtown Boston.

The brothers, self radicalized, motivated by extremist Islamic beliefs and the wars in Iraq and Afghanistan, strategically position the backpacks among the thousands who were in attendance to watch the Boston Marathon. At 14:49 the brothers, near-on simultaneously detonate the bombs, 21 seconds apart and 210 yards apart, killing 3 and wounding a further 264. After an intense manhunt and subsequent capture of one brother and the death of the other, authorities learned of a second plot involving the two, where they were planning to drive to New York  City’s Time Square and detonate a further batch of explosives.

Australia December 14, 2014 10:00 am:
While patrons of a quiet café’ enjoy their morning coffee,  gunmen and self proclaimed Muslim cleric, Man Haron Monis enter and take 17 people hostage and force them up against the windows or onto the ground. He demands to speak with the Prime Minister and local news agencies. Monis has been arrested almost a year earlier on charges (which he pleaded guilty to) of writing letters to Australian service members accusing them of being“ Hitler’s Soldiers”. The siege lasts almost a full day until Australian Special Forces tactically enter the café. The result of the raid, the gunmen and Monis are killed and 2 hostages dead.

France January 7, 2015 2:30 pm:
At the publication offices of Charlie Hebdo staffers meet for a production meeting to discuss the production of their latest issue. Outside, two brothers load assault rifles and calmly walk into the building and up to the room where the meeting is held. The brothers, who are upset and fueled with anger by the newspaper’s satire drawings depicting the profit Muhammad in a bad light, enter the office and open fire killing 11, and wounding a further 11. When leaving the building they encounter a police officer, chase him, and execute him on the street in cold blood.

Tunisia March 19, 2015 :
The cities Iconic and most visited museum is being enjoyed by many tourists. Three Tunisian Jihad extremists enter the museum and open fire. With no apparent motive other than to cause death and destruction, they kill 23 tourists. The tourists are from countries such as France, Poland, Italy and Columbia targeting all ethnicities. 20 people were arrested in relation to the attack, 10 of whom the authorities say were “ directly Involved”. It is estimated that more than 10,000 Tunisian nationals have joined extremist groups such as al Qaeda and ISIS in recent years.

Yemen March 20, 2015:
In the city of Sanas, Yemen during the afternoon call to prayer, Shite Muslims gather at their mosque to pray. A suicide bomber walks in and detonates a bomb worn under his clothing. This was the third in a string of bombings targeting local mosques in the country in the space of only a few days which kill 142 and injure 351 people who just wanted to pray. The Islamic state (ISIS) claims responsibility in all three cases. Yemen, while a fledgling democracy has unfortunately been a breeding ground for extremists and with its close proximity to Libya, Iraq, and Syria it’s being used as a springboard for extremists to launch attacks. Currently Yemen is starting to collapse under sectorial fighting and the further incursion of radical groups.

Let me state that in no way do I consider myself an expert on terrorism, nor do I aspire to being one, this is simply an expression of opinions and thoughts on a topic that we as protectors should pay close attention to.

Firstly, all the attacks I referred to took place in Democratic countries with the exception of Yemen. These countries all have a “normal” government structure and a level of expectation for societal inner workings. As democracies they have freedom of speech, religion, human rights and freedom of movement and travel. Secondly, the attacks that I highlighted appear to target no one group of people. Religion played little part except for the attackers own individual ideological beliefs. In the Yemen attacks a more perverse statement was the intention. However, in my opinion it was a soft target with a pre-conceived result(s). Lastly, and what I think is a pervasive thread occurring in them all is that none of the attacks were committed in war torn countries.

Even Yemen, on the brink of civil war once more, yet at the time of the attacks the country it was relatively stable.

I think the most profound take away from all of these attacks is that they can happen ANYWHERE at ANYTIME.  Many of us have clients that travel regularly to some of the exact locations of recent terror attacks.  What steps have you taken to understand (as best as you can) the situational position that a particular country or region is in, to be able to protect the client effectively? There are 250,000 churches in the U.S. according to ARIS (American religious Identification survey) and with ISIS’s war on Christianity, are our churches vulnerable on any given Sunday, possibly where our clients worship? There are 1,209 mosques in the U.S. the biggest being in Dearborn Michigan, and it is a Shiite mosque, which is the same sect that was attacked in Yemen. There are 31 full time football stadiums in the U.S. that hold up to 80,000 people at a time and 30 fulltime baseball stadiums that hold between 35-50,000 people, if someone wanted to make a statement, would that be a prime target?

Some of us will have clients that perform concerts for tens of thousands of people, offering maximum destruction and death toll for a would-be terrorist. It’s not enough to expect security coverage from event staff or local law enforcement, it’s up to us because they don’t get paid to protect our client solely, this is our job. Our clients all have certain opinions, certain beliefs, they make certain statements publicly and that’s all it takes, people are being killed for their opinions and if you have a client in the public eye, some extremists will try and put you in the public eye for all the wrong reasons.

As recent as March 22, 2015 100 service members from various branches of our armed forces had their names, addresses, and pictures posted to an ISIS hit list that they gained through ISIS hackers.  The enemy is equipped, organized and dangerous. The reality is we are not immune to attack but I/we owe it to our clients to be well versed on terrorism, and international conflicts, which could have domestic consequences.

I am not a fear monger but in my opinion, we are charged with anticipating the thoughts and actions of our adversaries, we do this professionally every day, what’s the difference between a local adversary and a terrorist or extremist? Ignore what’s going on overseas, and ignore terrorism and we face losing at home. 

By: Mark Roche EPS

Tweet
Share
Pin
Share394
394 Shares

Buy The Latest Issue

Sign Up For News and Updates

We respect your privacy and will not share your information with anyone.
We will only message you when we have something relevant and of value to share with you.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

Buy Now

Latest Newsletter

Newsletter Sign Up

What you don't know CAN hurt you!

SUBSCRIBE

Latest Industry News

Ugandan Minister Killed by Bodyguard in Apparent Wage Dispute

A Ugandan government minister, Charles Engola, was shot and killed by his bodyguard early Tuesday in an apparent private dispute over wages, according to the army and local media. Engola, a retired army colonel, served as the junior minister in charge of labor in President Yoweri Museveni’s government.

Event

News - Circuit Magazine

Zelenskiy Denies Ukraine’s Involvement in Alleged Kremlin Drone Attack

Ukrainian President Volodymyr Zelenskiy has refuted Russia’s claims that Ukraine was involved in a drone attack on the Kremlin, which was allegedly aimed at killing Russian President Vladimir Putin. Zelenskiy stated that Ukraine fights and defends its territory, not attacking Putin or Moscow. The Kremlin reported that two drones were used in the attack but were disabled by Russian defenses.

News taken from Issue 65 of the Circuit Magazine

Bodyguard Saves Japanese PM from Pipe Bomb Attack

A bodyguard has been hailed as a hero for his quick-thinking actions during a suspected pipe-bomb attack on Japanese Prime Minister Fumio Kishida. Video footage captured the bodyguard kicking away a metal object as it landed near Kishida
before positioning himself between the Prime Minister and the device, shielding him with a collapsible, handheld ballistics shield.

News from Issue 65 of the Circuit Magazine

AlertEnterprise Reveals First-Ever Guardian AI Chatbot Powered by OpenAI ChatGPT

AlertEnterprise has unveiled its first-ever Guardian AI Chatbot powered by OpenAI ChatGPT. The chatbot will make its global debut at the ASIS Europe and ISC West trade events. Built on OpenAI’s GPT-3 platform, the Guardian AI Chatbot aims to provide security operators with instant access to critical physical access and security insights through quick questions and prompts.

James Bore's Cyber Security

Ways to See the Threat Before it Happens

Threat modelling is widely in use, whether knowingly or not, across every walk of life – and has been used since time immemorial to prioritise security defences. The only difference between the well-known risk assessments carried out by everyone and threat modelling in cyber security is the attempt to document and systemise it. I am hoping that this idea of formal threat modelling will be a useful tool for you to use in your future arsenal of available resources as a CP operator.

Close Protection advice

Keeping Your Edge: Building a Solid Foundation

Longevity, consistency and remaining relevant are some primary goals of all protectors. These factors are important when establishing a new contract and providing services for a new client. But what is equally important is the mindset that goes into those first days and weeks on the assignment. As such, I wanted to get the personal perspective of Vantrell Wilson, a close protection agent who I have trained with and worked alongside of for years now.

Technology in the security industry

Leveraging Technology in Industry Hiring

Increased global connectedness through technology is fast becoming the norm these days. Video conferencing and “face to face” meetings are happening daily in real-time across the world. As an industry that prides itself on having the edge over our adversaries, we are falling below our own standards when it comes to utilizing the technological resources at our availability to their fullest potential.

Global Risk Updates

Global Situation Report - November 2021

Global Situation Report – November 2021

Each issue our global geopolitical partner, Stratfor, provides an in-depth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.

Popular Tags

armed attack Bodyguard business Celebrity client clients Close Protection Communication cp Crime Elijah Shaw EP Executive Executive Protection firearm firearms government gun Intelligence Law Enforcement Media Medical military News online police Prevention professional protect protection Risk Safety Security SIA Social Media Surveillance Technology terror Terrorism terrorist Threat Training VIP weapon

On The Frontline

Industry News At A Glance March 2020

We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.

Foot Steps

Foot Steps Episode 5: Mike Smith

Describe your professional journey?
I played on the Georgia State Patrols basketball league then joined the reserve sheriffs, I then did freelance security with 2 Georgia state troopers that started a company. I took a hiatus and actually became a barber while still doing security work on the side. While cutting hair I ran into someone who gave me a window of opportunity which led me to land a 6 figure contract. My company SS consulting specialized in threat assessments and advances but I didn’t just limit myself to that. I would land other contracts doing different types of security. The reality is, it’s who you know vs what you know.

A View of Cyber Risk Security

Cyber risk security is becoming more common due to the advanced technology which daily continues to improve our already comfortable lives. We are undoubtedly living in a new era of constantly-evolving threats, which force us to re-think our defence plan. The old idea of being able to protect your data behind a wall, and block all ‘bad’ influences, is over.

Follow us

  • Email
  • Facebook
  • Twitter

From The Archives

Does Fitness Matter Anymore?

I want to start this edition of Keeping Your Edge by giving you a glimpse into how my …

Continue Reading about Does Fitness Matter Anymore?

Online Data Security Concept Illustration with Padlock Icons, Cyber Background and Circuit Board Elements. Internet Security Technologies.

Cyber-Security Offshore

The New Virtual Battlefield? Our reliance on Information & Communications Technology (ICT) is …

Continue Reading about Cyber-Security Offshore

HOW TO SURVIVE A MASS SHOOTING

  INTRODUCTION Given the recent atrocities that we’ve all seen covered by the world’s media. Mass …

Continue Reading about HOW TO SURVIVE A MASS SHOOTING

Tactical Firearms - Cross-Draw

Tactical Firearms – Cross-Draw

The most favoured method is to carry the handgun on the same side as the dominant/strong hand …

Continue Reading about Tactical Firearms – Cross-Draw

Promoted Event

International Security Expo

Latest Podcast Episode

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

As AI armageddon comes closer, the global challenge is discerning the line between innovation and oversight, particularly concerning decision-making biases and security implications.

Buy Now

Follow us

  • Email
  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

© 2023 Circuit Magazine · Rainmaker Platform

This website or its third-party tools use cookies which are necessary to its functioning and required to improve your experience. By clicking the consent button, you agree to allow the site to use, collect and/or store cookies.
I accept