Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks, here is your summary of the last 30 days. Including: 40 dead in armed attack in Mali, 13 killed in Hostage situation in Mexico, Multiple Islamic State Militants killed in Iraq and explosion on a bus in Sweden.
With each client, the situation and threat level will vary, as will their requirements and appetite. When it comes to security there are a myriad of options available, often (and hopefully) with multiple, complementary components working together in harmony. One weapon in the personal protection armory is Protective Surveillance. This article attempts to provide a comprehensive overview of a service that has multiple benefits, quite a few limitations and several misrepresentations.
This past March, WikiLeaks dumped 8,761 CIA documents collectively known as “Vault 7.” These documents contained information about what was essentially the government agency’s armory of cyber threats.
They included malware, viruses and Trojans used for espionage purposes. More importantly, they had information about zero day vulnerabilities the CIA had been using to hack computers, tablets, smartphones and other devices for intelligence gathering purposes.
the Deep End, the (Dynamic Evolution Of Executive Protection) can you swim? Since the beginning of time, everything from man to nature has or is evolving; the protection theater is no different.
We are not immune to attack and we owe it to our clients to be well versed on terrorism, and international conflicts, which could have domestic consequences. Ignore what’s going on overseas, and ignore terrorism and we face losing at home.
A brief look at MACE Pepper Gel for Protection Specialists. Pepper Gel is a great option for confrontations that may not warrant a lethal force response.
You need to be aware of how criminals and terrorists operate and what they look for in their victims; if you know this, you can hopefully avoid becoming a victim yourself.
Over the past few years we have seen many incidents of cyber-attacks in the maritime and offshore oil and gas sectors including the tilting of oil rigs, malware riddled platforms and even port facilities industrial controls systems being hacked. Despite these incidents there seems to be a distinct lack of awareness throughout organisations.