Now, here me out. If you’re managing security projects it’s only a matter of time before you’ll have to deal and work with security personnel, bodyguards, and drivers that are not part of your team or company. Dealing with unknown personnel can be very problematic due to their potential lack of professionalism and egos.
Now, someone may think, and an alarming number of people do, since John X is not networking from the company’s Y social media account but from his own, there is nothing wrong and no harm done. WRONG. Anyone who works for you and has his work title/position linked to your company, represent your brand and is responsible for your reputation and can also be a liability for you and considered as the weak link of your company or someone who’s online activities are such that your competitors can use it against you. A bad security operative working for you shows the public how low your standards may or may not be and degrade the standards you appear to have when hiring people and how, apparently, you do not care about ethical considerations and personality traits.
As the President-Elect wrapped up his speech, now joined onstage by his extended family, my attention was on the members of the United States Secret Service who were close by. I thought of these men and the job that they were tasked to do. Not knowing them personally, I wasn’t aware of their political affiliations, were they a Democratic like Biden, or a Republican, rooting for the current President, Trump? They, like every other citizen of the country, were allowed to cast their votes, and could have picked either, or none. However, at that moment, on that stage, I don’t think it mattered. These agents, surely knowing the risk associated with the occasion, were focused on the task at hand: The safety of their protective charges, no matter their personal political affiliation.
What most people don’t realize is that most civilian, non-government close protection jobs are unarmed due to the legal restrictions on firearms in most countries. Part of your threat assessment for any assignment needs to take into account laws on the use of force and weapons in the locations you are going to be working in. Being caught with an illegal weapon, especially a firearm, will get you thrown in jail very quickly, no matter how important you think you are!
It is inevitable if you work within the security sector that at some point, you will have has a radio thrust in your direction for you to use as your primary form of communication.
Yet many of you will not have received any significant training on it, yet this one tool that may just save your life.
In this article, we’re covering some of the things you might have missed.
There needs to be a healthy relationship with your clients, you don’t want to let them dominate you, and you don’t want to try to dominate and control them.
Boundaries must always be made clear as this works to protect you and your client’s interests. Clients are not your friends, they are clients paying you to provide them with a service, and if boundaries are ignored, it can undermine any respect in the business relationship.
Especially while many people are still remote, technology has become more and more central to people’s lives, and we are talking about ways that things will or will not return to normal. As we hear about more and more cyber security incidents, each supposedly carried out by ‘sophisticated threat actors with unprecedented capabilities’, it’s time to talk about the mystique of cyber security and the problem it has with public perception.
As the battle for control of Afghanistan unfolds following the withdrawal of foreign troops, Pakistan will aim to consolidate its influence in the country.
Pakistan has historically relied on its good relationship with the Afghan Taliban to keep TTP fighters in check. As it awaits the rise of the ultimate power bearer amid the turmoil in Afghanistan, Islamabad will focus on preventing violence in its western provinces that poses a serious threat to CPEC-related Chinese investments.
England’s Euro 2020 heroes hired security and bodyguards to protect them on holiday after Harry Maguire incident Players were aware of the problems Harry Maguire found himself in when arrested in Mykonos last year. So a large number went away with security, who spent their evenings sat at the back of restaurants and bars sipping […]
Most people are not aware of the real impact and threat of ransomware campaigns going on almost constantly. While I’m sure everyone knows of the ransomware attack on the Colonial pipeline and the more recent similar attack on JBS, these are only the latest and most visible in a continuous stream of attacks. These are just the tip of the iceberg. The true scale is hidden not only by the media but also by a reluctance to talk about the problem.
What to Make of Belarus’s Brazen Arrest of a Journalist In Belarus, the controversial arrest of a prominent opposition activist will force a Western reaction, but the beleaguered opposition still faces major challenges, likely enabling the Belarusian regime to sustain its power. On May 23, Belarusian authorities arrested the wanted opposition journalist Roman Protasevich after […]
We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue. Including, attack in Afghanistan, Boko Haram Leader dead, severed heads in Mexico and Kevin Durant’s Bodyguard charged.
Is technology effective as a security solution or is it simply being misused? In this article, Ivor Terret shares his philosophy of the four pillars of effective and practical security and how they can only work together in conjunction – not as silos.
In today’s lifestyle and business dynamics, solving emotion-related problems is equally crucial in both personal and professional settings. In a professional context, we deal with complex problems and must work as a team to provide the most efficient solutions for our principals or clients.
Is it not just another type of threat that the modern bodyguard must adapt to, or should we be covering this type of threat already? If the client would be susceptible to the virus due to the nature of their work, then how can we protect them without putting them into isolation? What emotional worries and stress will this have on the family? What new roles should we undertake? Or should we not?
These days if you travel internationally or work in emerging markets, you are running the risk of being arrested for some reason. Criminals are not the only ones who can end up in handcuffs! It may come as a shock to some people, but many police forces are corrupt. And this is not just in the emerging markets.
Planning and considerations to take into account when putting together a quote for providing TSCM services. The ability to accurately quote for a TSCM inspection has many permutations, and each TSCM provider has its own formula for quoting. This article looks at the main criteria you need to take into consideration.
Cryptography, which includes steganography, is a particular interest of mine. While nowadays most of the introductory codes are useful for understanding fundamentals, the mathematics involved for modern cryptography lend it more towards advanced courses and specialists.
Bullets are bullets and ammunition is just ammunition, right? The reality is, that statement couldn’t be further from the truth. As outlined in my last article, bullets (or projectiles) come in many different forms and these forms have their intended purpose. In this installment, I want to dive deeper into the application of the Jacketed Hollow Point (JHP). The reason this projectile is going to get its own article is due to the importance of it and how it applies to self-defense and in the industry of close protection.
Smart home technology is a rapidly growing consumer and business product. Here are some figures that show projections for the growth of these devices, as well as current numbers