Is technology effective as a security solution or is it simply being misused? In this article, Ivor Terret shares his philosophy of the four pillars of effective and practical security and how they can only work together in conjunction – not as silos.
Each issue our global geopolitical partner, Stratfor, provides an in-depth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.
These days many shooters and those in the armed security business shy away from revolvers. I have heard quite a few people brush them off as being old-fashioned, obviously not tacticool enough to post on their social media. But in the real world of protection, there are a lot of revolvers in use for personal self-defense and security duties.
If you are a security professional with significant high-threat worldwide protective services experience, you know that depending on the client, it may not be a matter of if your client or a family member is kidnapped, but when. You also understand that it is likely that you may not even be directly providing protection for the client at the time it happens and unable to prevent it, especially when they are alone and most vulnerable.
Maybe you’re a close protection officer, trying to arrange a safe route through a dangerous location, or a surveillance specialist trying to communicate with others in your team.
Perhaps you just don’t trust the local government. Whatever the situation, it’ll almost certainly be easier to focus on the task at hand if you aren’t worrying about whether your messages were possibly subject to being intercepted.
What happens when there is more than one primary client? What happens when the “primary” becomes two, three, four, or more? What happens when your client instructs you that their two-year-old, is the primary “client” on a particular day or outing?
Over 2020 cyber security and technology have only soared in terms of profile and importance, with talk about threats to remote working from technology, difficulties, and some dramatic outages. Logistics, enabled largely by technology, have been essential to keep things moving and give people support and normality.
It often comes as a surprise just how much is available and the nefarious uses it can be put to. OSINT can be applied towards defensive purposes, but this article will only be covering the malicious purposes (i.e. how a bad guy might get access to your client’s sensitive information and data).
One of the biggest challenges of OSINT is not merely recognising it as a threat, but encouraging the behavioural change needed to protect against it widely enough. It is not simply enough for a principal to stop posting Instagram pictures of their travels in order to hide them. Their colleagues, friends, family, and employees also need to be aware and cautious with information which could be misused.
It’s not unusual for practitioners of our craft to find themselves operating as a “solo specialists” alongside their respective clients. The question is, are these days slowly coming to an end? If they are, how will we be able to convey this to our clients?
By now many of you have seen the recent photo of the Dallas shooter outside of the Federal Building. Ask yourself if this was your Office, School, or House of Worship how prepared would your company or institution be to recognize the signs of trouble as those Federal Officers did and deny access and ultimately defeat the shooter?
Many newcomers in the protection business have a completely different idea of what the profession is, based on what they have heard or what Hollywood tells them it is. This lack of “truth” either leaves them disappointed or leaves them vulnerable to making mistakes while on duty.
It is common in our industry to see many of our colleagues posting pictures on the internet social media sites of “selfies” taken in first-class airline seats or the client’s private jet. More selfies show them with their feet up on a suitcase claiming ‘’another flight”, or posting from 5 and 6-star hotel rooms, or fine-dining restaurants, or next to a limousine parked in front of a private jet.
In this article, I’ll take a look at artificial intelligence, particularly the machine learning area, a basic overview of how it works, and the dangers of over-reliance on an algorithmic approach to analysis.
The Circuit Magazine held a Virtual Learning and Development Forum on September 4, 2020, that was attended by Executive Protection specialists and experts from around the globe, including the UK, US, Europe, Latin America, Middle East and West Africa.
Before you build your company’s or personal brand lets first take a moment to reconcile what branding is and how it differs from marketing. Branding is the process involved in creating a unique name and/or image for a product or service in the mind of the consumer. The goal of “Branding” is to establish a significant and differentiated presence in the market that attracts and retains loyal customers. What differentiated message have you created in the mind of your desired clientele?
The tabloid said it had evidence that Bezos has been “whisking his mistress off to exotic destinations on his $65 million private jet.
“Jeff Bezos is the founder of the online retailer Amazon and one of the richest people in the world. He has just made public that he will be getting divorced from his wife of 25 years after an extra marital affair was made public, that’s his personal business… The divorce could cost him 50% of his wealth including his stocks in Amazon, which could lead to control issues for the company and shareholders, this is company business… Again, someone’s personal life has gotten them and their company into big trouble!
The “workout” is only a part of the overall Physical Fitness picture. Give or take 8 hours a day for sleeping, that leaves 16 waking hours that require physical activity. I use the word “require” because if we want to stay active for the long game, then it really isn’t an option and it must be a priority. This is where I feel the missing link is for most people, a basic understanding of true Physical Fitness and how to apply it to everyday living without just viewing it as a workout period.
Have you ever noticed how we throw around words nonchalantly, without a giving a second thought as to their perceived meaning?
How many of us use the word “fan” on a daily basis, possibly without realizing that the word is derived from the word “fanatic”. Webster’s Dictionary defines a fanatic as a person who is extremely enthusiastic about, and devoted to, some interest or activity. In the entertainment world, fans are a necessity, because if there are no fans, there is no one to buy the tickets, the music, the books, movies, or the merchandise. In essence, without fans, there is no celebrity. Fans are however, not limited to the typical entertainment realm of musicians and actors, politicians, company executives, news personalities, and even private citizens can also attract their own set of fans in today’s society.
In the world of protective services, we are often charged with the responsibility of having to manage and reconcile between safety and access for our protectees.
As business owners, employees, independent contractors or just private citizens we too are challenged with the dichotomy of managing our personal and professional lives on social media.
As is common with us all, we love our gear and we can’t get enough. A common discussion in our Facebook group, The Protective Security Group, is travel gear and equipment.
While not meant to be a comprehensive or ‘cookie-cutter’ list, below I share a typical packing of my ‘go-bag’ which I hope you all find useful; at least as a good baseline to add/subtract from for your travel needs.
It often comes as a surprise just how much is available, and the nefarious uses it can be put to. OSINT can be applied towards defensive purposes, but we will be looking only at malicious purposes. One of the biggest challenges of OSINT is not merely recognising it as a threat, but encouraging the behavioural change needed to protect against it widely enough. It is not enough simply for a principal to stop posting Instagram pictures of their travels in order to hide them – their colleagues, friends, family, and employees also need to be aware of the need to take care with information which could be misused.