Each issue our global geopolitical partner, Stratfor, provides an in-depth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.
Industry News – November 2021
Formula One commentator Brundle slams Megan Thee Stallion’s bodyguards after Texas tussle
Retired Formula One driver Martin Brundle thinks Megan Thee Stallion’s bodyguards need to “learn some manners” after an unpleasant interaction at Sunday’s U.S. Grand Prix in Texas.
Online Health Check for Protectors
As security professionals you may be an attack vector to your client if you do not maintain basic online security controls. At the very least you should be in a position to provide basic advice to your clients in order to help them stay secure.
Drivers & Bodyguards
Now, here me out. If you’re managing security projects it’s only a matter of time before you’ll have to deal and work with security personnel, bodyguards, and drivers that are not part of your team or company. Dealing with unknown personnel can be very problematic due to their potential lack of professionalism and egos.
Social Media Policies
Anyone who works for you and has their work title/position linked to your company represents your brand and is responsible for your reputation. They can also be a liability for you and may become the weak link of your company and their online activities are such that your competitors can use it against you.
Keeping Your Edge: Is Unity In Our Profession Dead?
As the President-Elect wrapped up his speech, now joined onstage by his extended family, my attention was on the members of the United States Secret Service who were close by. I thought of these men and the job that they were tasked to do. Not knowing them personally, I wasn’t aware of their political affiliations, were they a Democratic like Biden, or a Republican, rooting for the current President, Trump? They, like every other citizen of the country, were allowed to cast their votes, and could have picked either, or none. However, at that moment, on that stage, I don’t think it mattered. These agents, surely knowing the risk associated with the occasion, were focused on the task at hand: The safety of their protective charges, no matter their personal political affiliation.
Tactical Firearms: The Basics
What most people don’t realize is that most civilian, non-government close protection jobs are unarmed due to the legal restrictions on firearms in most countries. Part of your threat assessment for any assignment needs to take into account laws on the use of force and weapons in the locations you are going to be working in. Being caught with an illegal weapon, especially a firearm, will get you thrown in jail very quickly, no matter how important you think you are!
Communication Planning – Hardware & Technology
It is inevitable if you work within the security sector that at some point, you will have has a radio thrust in your direction for you to use as your primary form of communication.
Yet many of you will not have received any significant training on it, yet this one tool that may just save your life.
In this article, we’re covering some of the things you might have missed.
Lose the Fear, Love a Process!
But of course, the students who flood off to colleges and universities in their late teens and twenties are rarely bedevilled by such thoughts! So why, when it comes to learning later in life, to undertaking vocational-related training and – of course – distance-learning, do we find it so difficult to succeed?
Cyber Security Hiring
Whether you’re a seasoned cybersecurity professional or are looking to transition into the industry, it’s hard to know how to grab the attention of hiring managers and ultimately improve your chances of making it to the next stage.
Here are eight top tips from Renana Friedlich-Barsky, Director and Global Head of Cybersecurity Operations at PayPal, a proven leader in this space who’s reviewed more than her fair share of applications over the years.
Crisis Management and Social Media
Effective crisis management invariably involves social media, whether the organization is a large multi-national or a small hometown business. When a crisis erupts, the effective use of social media should be seen as a key priority to counteract the crisis.
The Key Elements of Counter Surveillance
Counter Surveillance is defined as the actions that a person (or team) carries out, in order to detect that a person (Principal) is under surveillance and to identify the composition and makeup of a hostile surveillance team.
In this article, Pete Jenkins talks through the key principles of a counter-surveillance operation.
Clients Should You Trust them?
There needs to be a healthy relationship with your clients, you don’t want to let them dominate you, and you don’t want to try to dominate and control them.
Boundaries must always be made clear as this works to protect you and your client’s interests. Clients are not your friends, they are clients paying you to provide them with a service, and if boundaries are ignored, it can undermine any respect in the business relationship.
Cyber Security
Especially while many people are still remote, technology has become more and more central to people’s lives, and we are talking about ways that things will or will not return to normal. As we hear about more and more cyber security incidents, each supposedly carried out by ‘sophisticated threat actors with unprecedented capabilities’, it’s time to talk about the mystique of cyber security and the problem it has with public perception.
Global Situation Report – September 2021
As the battle for control of Afghanistan unfolds following the withdrawal of foreign troops, Pakistan will aim to consolidate its influence in the country.
Pakistan has historically relied on its good relationship with the Afghan Taliban to keep TTP fighters in check. As it awaits the rise of the ultimate power bearer amid the turmoil in Afghanistan, Islamabad will focus on preventing violence in its western provinces that poses a serious threat to CPEC-related Chinese investments.
Ransomware, Insurance, and Backups
Most people are not aware of the real impact and threat of ransomware campaigns going on almost constantly. While I’m sure everyone knows of the ransomware attack on the Colonial pipeline and the more recent similar attack on JBS, these are only the latest and most visible in a continuous stream of attacks. These are just the tip of the iceberg. The true scale is hidden not only by the media but also by a reluctance to talk about the problem.
Industry News – At A Glance
We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue. Including, attack in Afghanistan, Boko Haram Leader dead, severed heads in Mexico and Kevin Durant’s Bodyguard charged.
Technology as a Standalone Security Solution – Are We Fooling Ourselves?
Is technology effective as a security solution or is it simply being misused? In this article, Ivor Terret shares his philosophy of the four pillars of effective and practical security and how they can only work together in conjunction – not as silos.
Emotional intelligence
In today’s lifestyle and business dynamics, solving emotion-related problems is equally crucial in both personal and professional settings. In a professional context, we deal with complex problems and must work as a team to provide the most efficient solutions for our principals or clients.