We live in a time where people’s opinions invade, dictate, and in some instances, ruin lives. Businesses opinions sell merchandise. Financial and political people tell you where to invest your money or who you should vote for. Opinions are very personal, varying from person to person, but they all have in common that they are nothing but a singular view of a singular event or action.
Behavioral Analysis Part 2
Following on from what was discussed, in order to deeply understand how these incidents occur, we need to understand the differences between the radicalization and recruitment processes that enlist Homegrown Violent Extremists and Active Killer incidents.
Security and Technical Debt Collection
Technical debt is what you are adding to every time you choose an easy or quick solution now, rather than looking at longer-term strategies. It is the technical expression of ‘failing to plan is planning to fail.’ And it has consequences.
Formations, Body Cover, & Professional Distance
The key words to remember when escorting a client on foot are flexibility and adaptability. You must be flexible enough to constantly adapt your formations to the environment you are working in, the threat level, and the manpower available. Whatever formation you are using will only be as good as the people you are using in your team. You must select your team carefully. Vet all potential members of your team before you employ them, even if you have known them for a while. Many people can talk the business, but when they get on operations, they are useless. When time allows, conduct rehearsals of all your team drills so in the event of an emergency, everyone knows what to do and what everyone else is doing.
Ways to See the Threat Before it Happens
Threat modelling is widely in use, whether knowingly or not, across every walk of life – and has been used since time immemorial to prioritise security defences. The only difference between the well-known risk assessments carried out by everyone and threat modelling in cyber security is the attempt to document and systemise it. I am hoping that this idea of formal threat modelling will be a useful tool for you to use in your future arsenal of available resources as a CP operator.
Zelenskiy Denies Ukraine’s Involvement in Alleged Kremlin Drone Attack
Ukrainian President Volodymyr Zelenskiy has refuted Russia’s claims that Ukraine was involved in a drone attack on the Kremlin, which was allegedly aimed at killing Russian President Vladimir Putin. Zelenskiy stated that Ukraine fights and defends its territory, not attacking Putin or Moscow. The Kremlin reported that two drones were used in the attack but were disabled by Russian defenses.
Bodyguard Saves Japanese PM from Pipe Bomb Attack
A bodyguard has been hailed as a hero for his quick-thinking actions during a suspected pipe-bomb attack on Japanese Prime Minister Fumio Kishida. Video footage captured the bodyguard kicking away a metal object as it landed near Kishida
before positioning himself between the Prime Minister and the device, shielding him with a collapsible, handheld ballistics shield.
U.S., U.K., and Germany Rank Top in Ransomware Attacks
A recent report by Black Kite analyzed 2,708 ransomware victims from April 2022 to March 2023, revealing a significant resurgence in ransomware attacks. The number of victims in March was nearly double that of last April and 1.6 times higher than the peak month in 2022.
Haitian politician & Bodyguard killed in apparent gang attack
Haitian politician & Bodyguard killed in apparent gang attack Eric Jean Baptiste, lottery business magnate, and a bodyguard were killed in Laboule 12, a leafy hillside area in Port-au-Prince, after attackers opened fire on their vehicle, officials said. Jean Baptiste, 52, headed the center-left Assembly of Progressive National Democrats Party and once sought Haiti’s presidency. […]
Trump Settles With Protesters Who Said His Bodyguards Attacked Them
Trump Settles With Protesters Who Said His Bodyguards Attacked Them
Donald J. Trump on Wednesday reached a settlement in a civil case brought by protesters who said they were attacked by his bodyguards in 2015
Training for When Time is Life
The 21-foot rule has long been an established firearm training standard. Simply put, it means an average man can close 21feet in 1.5 seconds, as we look at the below data of attacks on law enforcement officers the previous standard far from reflects the reality of the dynamic encounters in both distance and timing in enhancing your ability to prevail in a violent close quarter firearm encounter.
Protecting Journalists
Personal safety and security is something many take for granted especially in Europe and the US, but these days there are extremists on all political sides, from all religious backgrounds. So, if you or your client are voicing your opinions on any form of media, especially if you know your views may upset or offend others, then you need to think about your security as well as that of your family’s and colleagues.
BASIC RANGE CONSIDERATIONS
My professional experience with firearms started when I was 17 years old, and I joined an Infantry Regiment in the British Army. After leaving the British Army five years later, I worked in an armed capacity in numerous countries while providing security services.
A New Standard for Travel Security
As Executive Protection professionals we are constantly caught between a rock and a hard place. We do our best to provide our clients with the best possible protection while dealing with resistance and objections from the boardroom, PAs or the client themselves. Now if there was an international guideline for a travel risk management standard that addressed everything from hotels to air travel and ground transportation, it would require compliance from organizations and simplify our task significantly. The good news is, there now is and it is planned for launch in the summer of 2021.
Tactical Reloading & Stoppage Drills
At some point you will have to reload your handgun and clear stoppages and misfires. If you are on a nice comfortable range doing some target practice, this is not a problem. But if you are involved in a serious hostile situation, your reload and stoppage drills need to be slick and well-rehearsed.
In the Midst of Chaos
By now many of you have seen the photos and videos of the protestors turned rioters storming the US Capitol on the day of the Congressional Certification.
HUMAN INTELLIGENCE
Intelligence is the information we obtain on a target or threat in order to locate them, gain information on their operations and to predict their future actions. Accurate intelligence is essential not only in security and counter-insurgency operations but also in the corporate world where companies need to know what their competitors are developing and planning.
Online Health Check for Protectors
As security professionals you may be an attack vector to your client if you do not maintain basic online security controls. At the very least you should be in a position to provide basic advice to your clients in order to help them stay secure.
Crisis Management and Social Media
Effective crisis management invariably involves social media, whether the organization is a large multi-national or a small hometown business. When a crisis erupts, the effective use of social media should be seen as a key priority to counteract the crisis.