Haitian politician & Bodyguard killed in apparent gang attack Eric Jean Baptiste, lottery business magnate, and a bodyguard were killed in Laboule 12, a leafy hillside area in Port-au-Prince, after attackers opened fire on their vehicle, officials said. Jean Baptiste, 52, headed the center-left Assembly of Progressive National Democrats Party and once sought Haiti’s presidency. […]
Trump Settles With Protesters Who Said His Bodyguards Attacked Them
Trump Settles With Protesters Who Said His Bodyguards Attacked Them
Donald J. Trump on Wednesday reached a settlement in a civil case brought by protesters who said they were attacked by his bodyguards in 2015
Training for When Time is Life
The 21-foot rule has long been an established firearm training standard. Simply put, it means an average man can close 21feet in 1.5 seconds, as we look at the below data of attacks on law enforcement officers the previous standard far from reflects the reality of the dynamic encounters in both distance and timing in enhancing your ability to prevail in a violent close quarter firearm encounter.
Personal safety and security is something many take for granted especially in Europe and the US, but these days there are extremists on all political sides, from all religious backgrounds. So, if you or your client are voicing your opinions on any form of media, especially if you know your views may upset or offend others, then you need to think about your security as well as that of your family’s and colleagues.
BASIC RANGE CONSIDERATIONS
My professional experience with firearms started when I was 17 years old, and I joined an Infantry Regiment in the British Army. After leaving the British Army five years later, I worked in an armed capacity in numerous countries while providing security services.
A New Standard for Travel Security
As Executive Protection professionals we are constantly caught between a rock and a hard place. We do our best to provide our clients with the best possible protection while dealing with resistance and objections from the boardroom, PAs or the client themselves. Now if there was an international guideline for a travel risk management standard that addressed everything from hotels to air travel and ground transportation, it would require compliance from organizations and simplify our task significantly. The good news is, there now is and it is planned for launch in the summer of 2021.
Tactical Reloading & Stoppage Drills
At some point you will have to reload your handgun and clear stoppages and misfires. If you are on a nice comfortable range doing some target practice, this is not a problem. But if you are involved in a serious hostile situation, your reload and stoppage drills need to be slick and well-rehearsed.
In the Midst of Chaos
By now many of you have seen the photos and videos of the protestors turned rioters storming the US Capitol on the day of the Congressional Certification.
Intelligence is the information we obtain on a target or threat in order to locate them, gain information on their operations and to predict their future actions. Accurate intelligence is essential not only in security and counter-insurgency operations but also in the corporate world where companies need to know what their competitors are developing and planning.
Online Health Check for Protectors
As security professionals you may be an attack vector to your client if you do not maintain basic online security controls. At the very least you should be in a position to provide basic advice to your clients in order to help them stay secure.
Crisis Management and Social Media
Effective crisis management invariably involves social media, whether the organization is a large multi-national or a small hometown business. When a crisis erupts, the effective use of social media should be seen as a key priority to counteract the crisis.
The Key Elements of Counter Surveillance
Counter Surveillance is defined as the actions that a person (or team) carries out, in order to detect that a person (Principal) is under surveillance and to identify the composition and makeup of a hostile surveillance team.
In this article, Pete Jenkins talks through the key principles of a counter-surveillance operation.
Especially while many people are still remote, technology has become more and more central to people’s lives, and we are talking about ways that things will or will not return to normal. As we hear about more and more cyber security incidents, each supposedly carried out by ‘sophisticated threat actors with unprecedented capabilities’, it’s time to talk about the mystique of cyber security and the problem it has with public perception.
Ransomware, Insurance, and Backups
Most people are not aware of the real impact and threat of ransomware campaigns going on almost constantly. While I’m sure everyone knows of the ransomware attack on the Colonial pipeline and the more recent similar attack on JBS, these are only the latest and most visible in a continuous stream of attacks. These are just the tip of the iceberg. The true scale is hidden not only by the media but also by a reluctance to talk about the problem.
Technology as a Standalone Security Solution – Are We Fooling Ourselves?
Is technology effective as a security solution or is it simply being misused? In this article, Ivor Terret shares his philosophy of the four pillars of effective and practical security and how they can only work together in conjunction – not as silos.
Introduction to Steganography
All the techniques of steganography share one core concept, trying to hide a message. When children draw stick figures as secret messages to each other, they are practicing steganography. Modern steganography is usually a lot more malicious. It is used in malware command and control and the exchange of illicit information and material. If you do not know where to look it is frighteningly hard to detect.
Tactical Firearms – Methods of Carry!
If you are carrying a handgun for defensive purposes, you need to be able to get to it when you need it.
On the market today, there is a wide variety of holsters to choose from that vary in price from a few bucks to a few hundred; some are worth it, many are not. What most people forget when considering carry techniques for a handgun or any weapons for that matter is that they are going to have to be able to access the weapon in all environments with both strong and weak hands.
Global Situation Report April 2021
Each issue our global geopolitical partner, Stratfor, provides an in-depth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.
How anonymous are your conversations, really?
Maybe you’re a close protection officer, trying to arrange a safe route through a dangerous location, or a surveillance specialist trying to communicate with others in your team.
Perhaps you just don’t trust the local government. Whatever the situation, it’ll almost certainly be easier to focus on the task at hand if you aren’t worrying about whether your messages were possibly subject to being intercepted.