Threat modelling is widely in use, whether knowingly or not, across every walk of life – and has been used since time immemorial to prioritise security defences. The only difference between the well-known risk assessments carried out by everyone and threat modelling in cyber security is the attempt to document and systemise it. I am hoping that this idea of formal threat modelling will be a useful tool for you to use in your future arsenal of available resources as a CP operator.
Ukrainian President Volodymyr Zelenskiy has refuted Russia’s claims that Ukraine was involved in a drone attack on the Kremlin, which was allegedly aimed at killing Russian President Vladimir Putin. Zelenskiy stated that Ukraine fights and defends its territory, not attacking Putin or Moscow. The Kremlin reported that two drones were used in the attack but were disabled by Russian defenses.
A bodyguard has been hailed as a hero for his quick-thinking actions during a suspected pipe-bomb attack on Japanese Prime Minister Fumio Kishida. Video footage captured the bodyguard kicking away a metal object as it landed near Kishida
before positioning himself between the Prime Minister and the device, shielding him with a collapsible, handheld ballistics shield.
A recent report by Black Kite analyzed 2,708 ransomware victims from April 2022 to March 2023, revealing a significant resurgence in ransomware attacks. The number of victims in March was nearly double that of last April and 1.6 times higher than the peak month in 2022.
Haitian politician & Bodyguard killed in apparent gang attack Eric Jean Baptiste, lottery business magnate, and a bodyguard were killed in Laboule 12, a leafy hillside area in Port-au-Prince, after attackers opened fire on their vehicle, officials said. Jean Baptiste, 52, headed the center-left Assembly of Progressive National Democrats Party and once sought Haiti’s presidency. […]
Trump Settles With Protesters Who Said His Bodyguards Attacked Them
Donald J. Trump on Wednesday reached a settlement in a civil case brought by protesters who said they were attacked by his bodyguards in 2015
The 21-foot rule has long been an established firearm training standard. Simply put, it means an average man can close 21feet in 1.5 seconds, as we look at the below data of attacks on law enforcement officers the previous standard far from reflects the reality of the dynamic encounters in both distance and timing in enhancing your ability to prevail in a violent close quarter firearm encounter.
Personal safety and security is something many take for granted especially in Europe and the US, but these days there are extremists on all political sides, from all religious backgrounds. So, if you or your client are voicing your opinions on any form of media, especially if you know your views may upset or offend others, then you need to think about your security as well as that of your family’s and colleagues.
My professional experience with firearms started when I was 17 years old, and I joined an Infantry Regiment in the British Army. After leaving the British Army five years later, I worked in an armed capacity in numerous countries while providing security services.
As Executive Protection professionals we are constantly caught between a rock and a hard place. We do our best to provide our clients with the best possible protection while dealing with resistance and objections from the boardroom, PAs or the client themselves. Now if there was an international guideline for a travel risk management standard that addressed everything from hotels to air travel and ground transportation, it would require compliance from organizations and simplify our task significantly. The good news is, there now is and it is planned for launch in the summer of 2021.
At some point you will have to reload your handgun and clear stoppages and misfires. If you are on a nice comfortable range doing some target practice, this is not a problem. But if you are involved in a serious hostile situation, your reload and stoppage drills need to be slick and well-rehearsed.
By now many of you have seen the photos and videos of the protestors turned rioters storming the US Capitol on the day of the Congressional Certification.
Intelligence is the information we obtain on a target or threat in order to locate them, gain information on their operations and to predict their future actions. Accurate intelligence is essential not only in security and counter-insurgency operations but also in the corporate world where companies need to know what their competitors are developing and planning.
As security professionals you may be an attack vector to your client if you do not maintain basic online security controls. At the very least you should be in a position to provide basic advice to your clients in order to help them stay secure.
Effective crisis management invariably involves social media, whether the organization is a large multi-national or a small hometown business. When a crisis erupts, the effective use of social media should be seen as a key priority to counteract the crisis.
Counter Surveillance is defined as the actions that a person (or team) carries out, in order to detect that a person (Principal) is under surveillance and to identify the composition and makeup of a hostile surveillance team.
In this article, Pete Jenkins talks through the key principles of a counter-surveillance operation.
Especially while many people are still remote, technology has become more and more central to people’s lives, and we are talking about ways that things will or will not return to normal. As we hear about more and more cyber security incidents, each supposedly carried out by ‘sophisticated threat actors with unprecedented capabilities’, it’s time to talk about the mystique of cyber security and the problem it has with public perception.
Most people are not aware of the real impact and threat of ransomware campaigns going on almost constantly. While I’m sure everyone knows of the ransomware attack on the Colonial pipeline and the more recent similar attack on JBS, these are only the latest and most visible in a continuous stream of attacks. These are just the tip of the iceberg. The true scale is hidden not only by the media but also by a reluctance to talk about the problem.
Is technology effective as a security solution or is it simply being misused? In this article, Ivor Terret shares his philosophy of the four pillars of effective and practical security and how they can only work together in conjunction – not as silos.