We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.
How anonymous are your conversations, really?
Maybe you’re a close protection officer, trying to arrange a safe route through a dangerous location, or a surveillance specialist trying to communicate with others in your team.
Perhaps you just don’t trust the local government. Whatever the situation, it’ll almost certainly be easier to focus on the task at hand if you aren’t worrying about whether your messages were possibly subject to being intercepted.
Insecure Smart Houses
They are only of limited relevance today, but as the technologies involved become more widespread and implemented into every facet of life they will only become more prevalent. While it sounds like the stuff of science fiction, these threats exist now and are not going to go away.
For simplicity, we’ll say that a ‘smart’ device is anything which connects to the internet (or a network) and is not intended to be a computer interface. Intended is the key word there, as many of these devices are insecure for the simple reason that they are a computer. The problem is that it is now cheaper and easier to put a general purpose computer into a device and run some software to, for example, turn lights on and off than it is to design a single-purpose lightbulb which also connects to a network.
What is Executive Protection?
In the past, I viewed Executive Protection (EP) as persons who provided corporate level protection. This was the guy who only walked with the CEO, politician, or other important corporate executives and dignitaries. With my limited understanding, I didn’t think of those who drive these same individuals as being considered Executive Protection agents as well. As an EP specialist, I now understand and have experienced some of the vast role’s EP work will encompass.
How modern technology is advancing our craft
Some readers may have guessed at the participants in the above scenario or even been a part of such a detail in the past. No matter what, it’s plain to see that helicopters are an amazing tool to have at your disposal for your motorcade movements. They can advance the route in real time from a bird’s eye view, which is a great way to go from the known to the known with a good idea of the terrain you will be encountering.
However, the truth is, the simulated communications you just read were not with a helicopter, but instead were between an Executive Protection team, and it’s FAA (Federal Aviation Administration) Licensed and experienced UAV (Unmanned Aerial Vehicle) Pilot. Executive Protection is evolving every day, and one of the areas out front is technology. Developing are new forms of detection, tactical hearing and visual aids, vehicle security and transport, radio systems, and now UAV’S.
Industry News October 2020
We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.
The Impact of Street Crime on the Security Professional
Did you know: Historically, street crime increases, proportionately, with population growth? Crime in England is accelerating, and according to police figures, the London murder rate has now surpassed that of New York for the first time in modern history. Not only does this place the general public at risk but arguably, it exposes the front-line security operator to even greater danger.
Commercial Security Courses
Having dug around in the last year to see what’s going on with security training courses at home and overseas, it would appear that there is a gap between what’s acceptable, to what’s a complete rip off, and that gap is as wide as the Grand Canyon.
The Future of Self Defence Training
Consider this, when broken down to its most basic components, the vast majority of traditional self-defence courses only teach defensive responses to an attack once it has begun.
I am of the opinion that’s not only a bit late, it’s also certainly not enough to survive a Mass Casualty Event in these days and times. In light of that, I have found that Reality-Based Self Defence (RBSD) systems take things a bit further by teaching pre-fight tactics such as: creating safe distance; using non-aggressive body language; reading pre-fight indicators; and applying verbal de-escalation techniques. Yet all of that is still not enough to effectively survive a terrorist attack in a public space, especially if you’re with family or friends.
Tiger Kidnapping
Over the years there have been many articles in Circuit Magazine about the kidnapping threat, and rightly so.
As we know, the danger of kidnapping is always a concern amongst high-level executives, especially when operating and traveling to some regions where kidnapping occurrences are more common. In this article, however, the topic is focused on one particular method of kidnapping, and that is what’s known as tiger kidnapping.
Counter-Ambush Tactics for Security Professionals – Part 2
The first two of these tenets involve soft skills which are sometimes referred to as Protective Intelligence (PI) and include situational and tactical awareness skills (route analysis and surveillance detection). The third tenet, Defend, requires hard skills such as the use of firearms and security driving. These hard skills may be required if we were unable to prevent or avoid an attack, and we end up in a situation where we have to survive an ambush. Continuing where we left off in Part One, we will finish covering some of the soft skills involved in Protective Intelligence and then move on to discuss the hard skills.
Defining Professionalism in the Personal Protection Industry
Not because there is less work out there, in fact, the opposite is probably true. With global threat levels at an all-time high, there is more work in the security industry now than there ever has been and the security industry is booming, but it’s harder to find work because there are now thousands more so-called ‘qualified’ CPOs chasing after every position. It is a fact that most licensed operators have never actually done a day’s close protection work in their lives. At the time of writing this article, there are over 14,000 valid, UK, CP licences. Yes, over fourteen thousand people in the UK currently have a license to operate as a Close Protection Officer.
Counter-Ambush Tactics for Security Professionals – Part 1
By far the best method to accomplish this goal is to adopt a predictive, preventative strategy for protecting clients based on the tenets of Detect, Deter, and Defend. To effectively employ these tenets, we need some very specific soft and hard skills. In the protective operations world, the “soft” skills are sometimes referred to as Protective Intelligence (PI) while in other security disciplines they are referred to as situational and tactical awareness skills. If we are unable to prevent or avoid an attack, we need to have some expertise in specific “hard” skills such as use of firearms and security driving so that we can survive an ambush.
The Gray Man Concept. Are You Getting it Wrong?
We now see companies capitalizing on this idea, by making different lines of equipment and bags that tout themselves as being “covert” or “discrete”. I am of the belief that if you are wearing clothing that advertises itself as either of these things, it’s anything but.
Truly experienced law enforcement, military and security professionals can spot each other a mile away. Often the giveaways are in the clothing and personal accessories that we choose. Watches, shoes and belts are accessories that are often over looked by those attempting to be “Gray”. Wearing Soloman’s or Merrel’s, a Suunto/Garmin/Pathfinder watch and an Ares Gear/511, or another tactical belt is not being gray. Each of those accessories, gives up information about you, that you say you are trying to conceal.
The Rise in the Use of CCTV in Court Proceedings
An estimated 5.9 million CCTV cameras were in operation throughout the UK in 2016, making the British public one of the most surveilled in the world. Only Beijing has more CCTV cameras than London, where the average person will be recorded on camera 300 times in one day.
Anti-Surveillance Part 2
In part two of this article on anti-surveillance we shall look at anti-surveillance measures carried out when mobile in a vehicle or on public transport. We shall also look at the various times that a target or person will conduct anti-surveillance measures or drills in order to detect surveillance
Remember that anti-surveillance is defined as the actions that a person would take or do, in order to detect if surveillance is present. The person is aiming to draw the surveillance in by generating two things; multiple sightings and unnatural behaviour. As with our foot anti surveillance drills, when mobile in a vehicle, these drills can also be covert and subtle or overt where it obvious to the followers what you are doing. Again, a number of drills have to be carried out in order to identify surveillance. Just looking behind you does not identify surveillance – it identifies those who are behind you.
7 Tips to Improve Surveillance Results
Over the course of my career (17+ years), I have heard my fair share of complaints from potential clients indicating that their current surveillance/investigative partner was not achieving the desired results with the budgets provided. The activities and behaviors of people are constantly changing and that forces us as investigators to change our approach and evaluate our practices in order to achieve optimal results.
Protective Surveillance
With each client, the situation and threat level will vary, as will their requirements and appetite. When it comes to security there are a myriad of options available, often (and hopefully) with multiple, complementary components working together in harmony. One weapon in the personal protection armory is Protective Surveillance. This article attempts to provide a comprehensive overview of a service that has multiple benefits, quite a few limitations and several misrepresentations.
How Surveillance Can Help Prevent Acid Attacks
The recent surge in acid attacks in London and surrounding areas has filled the headlines in recent weeks and months, understandably causing a great deal of concern for the general public and those responsible for their safety.
Security Systems For Businesses
Whatever the size of the business, whether it is small or large, retail or commercial, it is guaranteed to have a range of valuable assets like computer systems, data and other expensive items that are at risk of theft.