As the President-Elect wrapped up his speech, now joined onstage by his extended family, my attention was on the members of the United States Secret Service who were close by. I thought of these men and the job that they were tasked to do. Not knowing them personally, I wasn’t aware of their political affiliations, were they a Democratic like Biden, or a Republican, rooting for the current President, Trump? They, like every other citizen of the country, were allowed to cast their votes, and could have picked either, or none. However, at that moment, on that stage, I don’t think it mattered. These agents, surely knowing the risk associated with the occasion, were focused on the task at hand: The safety of their protective charges, no matter their personal political affiliation.
Tactical Firearms: The Basics
What most people don’t realize is that most civilian, non-government close protection jobs are unarmed due to the legal restrictions on firearms in most countries. Part of your threat assessment for any assignment needs to take into account laws on the use of force and weapons in the locations you are going to be working in. Being caught with an illegal weapon, especially a firearm, will get you thrown in jail very quickly, no matter how important you think you are!
Communication Planning – Hardware & Technology
It is inevitable if you work within the security sector that at some point, you will have has a radio thrust in your direction for you to use as your primary form of communication.
Yet many of you will not have received any significant training on it, yet this one tool that may just save your life.
In this article, we’re covering some of the things you might have missed.
Lose the Fear, Love a Process!
But of course, the students who flood off to colleges and universities in their late teens and twenties are rarely bedevilled by such thoughts! So why, when it comes to learning later in life, to undertaking vocational-related training and – of course – distance-learning, do we find it so difficult to succeed?
Cyber Security Hiring
Whether you’re a seasoned cybersecurity professional or are looking to transition into the industry, it’s hard to know how to grab the attention of hiring managers and ultimately improve your chances of making it to the next stage.
Here are eight top tips from Renana Friedlich-Barsky, Director and Global Head of Cybersecurity Operations at PayPal, a proven leader in this space who’s reviewed more than her fair share of applications over the years.
Crisis Management and Social Media
Effective crisis management invariably involves social media, whether the organization is a large multi-national or a small hometown business. When a crisis erupts, the effective use of social media should be seen as a key priority to counteract the crisis.
The Key Elements of Counter Surveillance
Counter Surveillance is defined as the actions that a person (or team) carries out, in order to detect that a person (Principal) is under surveillance and to identify the composition and makeup of a hostile surveillance team.
In this article, Pete Jenkins talks through the key principles of a counter-surveillance operation.
Clients Should You Trust them?
There needs to be a healthy relationship with your clients, you don’t want to let them dominate you, and you don’t want to try to dominate and control them.
Boundaries must always be made clear as this works to protect you and your client’s interests. Clients are not your friends, they are clients paying you to provide them with a service, and if boundaries are ignored, it can undermine any respect in the business relationship.
Cyber Security
Especially while many people are still remote, technology has become more and more central to people’s lives, and we are talking about ways that things will or will not return to normal. As we hear about more and more cyber security incidents, each supposedly carried out by ‘sophisticated threat actors with unprecedented capabilities’, it’s time to talk about the mystique of cyber security and the problem it has with public perception.
Global Situation Report – September 2021
As the battle for control of Afghanistan unfolds following the withdrawal of foreign troops, Pakistan will aim to consolidate its influence in the country.
Pakistan has historically relied on its good relationship with the Afghan Taliban to keep TTP fighters in check. As it awaits the rise of the ultimate power bearer amid the turmoil in Afghanistan, Islamabad will focus on preventing violence in its western provinces that poses a serious threat to CPEC-related Chinese investments.
Industry News – August 2021
England’s Euro 2020 heroes hired security and bodyguards to protect them on holiday after Harry Maguire incident Players were aware of the problems Harry Maguire found himself in when arrested in Mykonos last year. So a large number went away with security, who spent their evenings sat at the back of restaurants and bars sipping […]
Ransomware, Insurance, and Backups
Most people are not aware of the real impact and threat of ransomware campaigns going on almost constantly. While I’m sure everyone knows of the ransomware attack on the Colonial pipeline and the more recent similar attack on JBS, these are only the latest and most visible in a continuous stream of attacks. These are just the tip of the iceberg. The true scale is hidden not only by the media but also by a reluctance to talk about the problem.
Industry News – At A Glance
We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue. Including, attack in Afghanistan, Boko Haram Leader dead, severed heads in Mexico and Kevin Durant’s Bodyguard charged.
Technology as a Standalone Security Solution – Are We Fooling Ourselves?
Is technology effective as a security solution or is it simply being misused? In this article, Ivor Terret shares his philosophy of the four pillars of effective and practical security and how they can only work together in conjunction – not as silos.
Emotional intelligence
In today’s lifestyle and business dynamics, solving emotion-related problems is equally crucial in both personal and professional settings. In a professional context, we deal with complex problems and must work as a team to provide the most efficient solutions for our principals or clients.
COVID-19 Is it Just another threat?
Is it not just another type of threat that the modern bodyguard must adapt to, or should we be covering this type of threat already? If the client would be susceptible to the virus due to the nature of their work, then how can we protect them without putting them into isolation? What emotional worries and stress will this have on the family? What new roles should we undertake? Or should we not?
Jailed Abroad! Avoiding Crime and Corruption When Travelling
These days if you travel internationally or work in emerging markets, you are running the risk of being arrested for some reason. Criminals are not the only ones who can end up in handcuffs! It may come as a shock to some people, but many police forces are corrupt. And this is not just in the emerging markets.
TSCM in the Workplace – How to Provide an Accurate Quote For Services
Planning and considerations to take into account when putting together a quote for providing TSCM services. The ability to accurately quote for a TSCM inspection has many permutations, and each TSCM provider has its own formula for quoting. This article looks at the main criteria you need to take into consideration.
Introduction to Steganography
All the techniques of steganography share one core concept, trying to hide a message. When children draw stick figures as secret messages to each other, they are practicing steganography. Modern steganography is usually a lot more malicious. It is used in malware command and control and the exchange of illicit information and material. If you do not know where to look it is frighteningly hard to detect.