Over 2020 cyber security and technology have only soared in terms of profile and importance, with talk about threats to remote working from technology, difficulties, and some dramatic outages. Logistics, enabled largely by technology, have been essential to keep things moving and give people support and normality.
Designed by an audiologist, earHero’s speakers are so tiny they will never block your ear canal giving you the ability to literally talk on a separate phone without removing the earHero tactical earpiece from either ear.
You can literally hear whisper level sounds from yards away, while identifying the sounds’ precise location. The earHero tactical headsets have wires so thin and clear, they are virtually undetectable, and the design is so comfortable, you’ll barely know the earpiece is there.
They are only of limited relevance today, but as the technologies involved become more widespread and implemented into every facet of life they will only become more prevalent. While it sounds like the stuff of science fiction, these threats exist now and are not going to go away.
For simplicity, we’ll say that a ‘smart’ device is anything which connects to the internet (or a network) and is not intended to be a computer interface. Intended is the key word there, as many of these devices are insecure for the simple reason that they are a computer. The problem is that it is now cheaper and easier to put a general purpose computer into a device and run some software to, for example, turn lights on and off than it is to design a single-purpose lightbulb which also connects to a network.
According to Paine, if twenty persons, all strangers to each other, found themselves in a previously uninhabited country, each individual’s will was his natural right. He had the freedom and liberty to do as he pleased, even invading the sovereignty of his neighbors. It would then occur to each sovereign individual that if he united with his neighbor for mutual protection he would increase his personal security. But to do that he would have to sacrifice certain degrees of his natural rights. The compromising of individual rights resulted in rights of “compact” or as our legislative laws were defined as “civil rights”.
Well, there really isn’t anything fundamentally wrong with this approach, after all, as the saying goes, “if it ain’t broke, don’t fix it.” The trouble is if we continue to do the same thing in the same way we’re in danger of missing opportunities to improve, and surely that’s what we all want to do, become better, more efficient and smarter at what we do.
That’s undoubtedly the maxim I’ve always tried to apply to communications. We embraced digital radio enthusiastically when it first came on the scene 15+ years ago, even though doing so was detrimental to us in the short term, it paid off in the long-run. Many saw it as ‘revolution’ rather than ‘evolution,’ but eventually, it eclipsed its analogue forbear, and those naysayers had no choice but to evolve.
Some readers may have guessed at the participants in the above scenario or even been a part of such a detail in the past. No matter what, it’s plain to see that helicopters are an amazing tool to have at your disposal for your motorcade movements. They can advance the route in real time from a bird’s eye view, which is a great way to go from the known to the known with a good idea of the terrain you will be encountering.
However, the truth is, the simulated communications you just read were not with a helicopter, but instead were between an Executive Protection team, and it’s FAA (Federal Aviation Administration) Licensed and experienced UAV (Unmanned Aerial Vehicle) Pilot. Executive Protection is evolving every day, and one of the areas out front is technology. Developing are new forms of detection, tactical hearing and visual aids, vehicle security and transport, radio systems, and now UAV’S.
In this article, we’re going to pick back up on the Adventure series, which we started in Issue 51 (Mindset, Ideas, and Planning). In that article, I laid out a formula for introducing more adventure into our lives. We looked at exploring the local, natural environment, discussed the Ancient Greek Stoic philosophy in assisting the mindset and dealing with mental blocks. We also addressed some simple strategies for preparing and taking action to make adventure a reality.
Now, in Part 2 of the Adventure Series, I’m going to show how putting together a kit list and packing for an adventure is a relatively simple process when a logical system is followed, and all the fundamentals are covered.
We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.
As is common with us all, we love our gear and we can’t get enough. A common discussion in our Facebook group, The Protective Security Group, is travel gear and equipment.
While not meant to be a comprehensive or ‘cookie-cutter’ list, below I share a typical packing of my ‘go-bag’ which I hope you all find useful; at least as a good baseline to add/subtract from for your travel needs.
regret that comes from knowing that you could have done more to support a person in life, even if just by offering a kind word or two. Some might think a topic like this has no place in an Alpha industry like Close Protection but consider that a large part of our ranks are pulled from both law enforcement and the military. We can all see how helpful positive reinforcement has been for those stressful careers.
We’ll be looking at a collection of tactics used by attackers to bypass security technology by targeting the weakest link – the human in the chain.
Social engineering is really just an overly technical term for knowing how to persuade people to do something against their best interests or against their better judgment.
The insider threat of crime to organisations is always present and can manifest itself in many ways. This has become more apparent because of the recent social-economic climate change within the UK.
Cybersecurity is often seen as a niche area which requires a lot of specialist knowledge to apply. This is partly true – in order to configure a web application firewall someone needs to understand how to work with the technology at a very low level. What is often missed, as the technologists take over, is that cyber is still security and the same fundamental principles apply to designing and building effective protections.
“Carving is easy, you just go down to the skin and stop.” Michelangelo Michelangelo like most of the polymath heroes of my past has always had a unique way of stating the very complicated, in the simplest of terms. When we apply his advice and knowledge of “carving is easy, you just go down to […]
Mobile Telephone monitoring software (spyware), its effectiveness as an espionage tool and its cost vs potential rewards.