Each issue our global geopolitical partner, Stratfor, provides an in-depth analysis of global incidents via in-house experts, cutting edge technology, and through a comprehensive globally sourced network. Here is your summary for the last 30 days. West Africa: Al Qaeda Is Expanding Operations in Benin and Ivory Coast Feb 2, 2021 France’s intelligence chief, Bernard […]
Insecure Smart Houses
They are only of limited relevance today, but as the technologies involved become more widespread and implemented into every facet of life they will only become more prevalent. While it sounds like the stuff of science fiction, these threats exist now and are not going to go away.
For simplicity, we’ll say that a ‘smart’ device is anything which connects to the internet (or a network) and is not intended to be a computer interface. Intended is the key word there, as many of these devices are insecure for the simple reason that they are a computer. The problem is that it is now cheaper and easier to put a general purpose computer into a device and run some software to, for example, turn lights on and off than it is to design a single-purpose lightbulb which also connects to a network.
What is Executive Protection?
In the past, I viewed Executive Protection (EP) as persons who provided corporate level protection. This was the guy who only walked with the CEO, politician, or other important corporate executives and dignitaries. With my limited understanding, I didn’t think of those who drive these same individuals as being considered Executive Protection agents as well. As an EP specialist, I now understand and have experienced some of the vast role’s EP work will encompass.
Industry News December 2020
We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.
Freedom or Security?
According to Paine, if twenty persons, all strangers to each other, found themselves in a previously uninhabited country, each individual’s will was his natural right. He had the freedom and liberty to do as he pleased, even invading the sovereignty of his neighbors. It would then occur to each sovereign individual that if he united with his neighbor for mutual protection he would increase his personal security. But to do that he would have to sacrifice certain degrees of his natural rights. The compromising of individual rights resulted in rights of “compact” or as our legislative laws were defined as “civil rights”.
Shifting the Paradigm
Well, there really isn’t anything fundamentally wrong with this approach, after all, as the saying goes, “if it ain’t broke, don’t fix it.” The trouble is if we continue to do the same thing in the same way we’re in danger of missing opportunities to improve, and surely that’s what we all want to do, become better, more efficient and smarter at what we do.
That’s undoubtedly the maxim I’ve always tried to apply to communications. We embraced digital radio enthusiastically when it first came on the scene 15+ years ago, even though doing so was detrimental to us in the short term, it paid off in the long-run. Many saw it as ‘revolution’ rather than ‘evolution,’ but eventually, it eclipsed its analogue forbear, and those naysayers had no choice but to evolve.
War in Venezuela
On the morning of April 30th, 2019 Venezuela’s opposition leader Juan Guaidó seemed to attempt a coup d’état against the communist government of Nicolás Maduro.
I use the word ‘seemed’ as what occurred can be best described as a publicity stunt more than an actual coup d’état. For the remainder of the day, even those that thought they knew what was going on in Venezuela, really, had no idea what was going on. While social media and the news channels were touting a revolution in Caracas, life went on as normal on the military bases and for the rest of Venezuela. Guaidó’s attempted overthrow was mostly just another demonstration that is all too common in Caracas.
At the Point of Crisis
By now many of you have seen the recent photo of the Dallas shooter outside of the Federal Building. Ask yourself if this was your Office, School, or House of Worship how prepared would your company or institution be to recognize the signs of trouble as those Federal Officers did and deny access and ultimately defeat the shooter?
A Mantra to Operate By
Think that sounds a bit cynical? Well, perhaps you’re right, but having been in the industry for over 30 years, and with a ‘Rock Star family’ as my current employers, it’s incredible how many times I’m reminded of this mantra and the virtues of following it. Maybe it’s just being in and around the music business, but I think everyone can take something away from this approach.
Cybersecurity Series – Artificial Intelligence, Machine Learning, and Bias
In this article, I’ll take a look at artificial intelligence, particularly the machine learning area, a basic overview of how it works, and the dangers of over-reliance on an algorithmic approach to analysis.
Industry News October 2020
We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.
Global Situation Report October, 2020
Having informed insight in today’s increasingly complex international environment is more important than ever. That’s why we’ve partnered with Stratfor, the worlds leading geopolitical intelligence platform, to bring readers regular analysis and accurate forecasting of global trends from someone you can trust.
US Presidential Security Support
One memorable occasion was the visit by President George W. Bush to Manila, the Philippines, in October 2003, when he on his way to Thailand, where he was to attend the Asia-Pacific Economic Cooperation summit. This visit served as a great example of how much of an asset you can be for the protective elements if you know and apply protective operations principles.
Stratfor Global Situation Report
Having informed insight in today’s increasingly complex international environment is more important than ever. That’s why we’ve partnered with Stratfor, the worlds leading geopolitical intelligence platform, to bring readers regular analysis and accurate forecasting of global trends from someone you can trust.
Stalkers and Super Fans – When Does Being A Fan Go Too Far?
Have you ever noticed how we throw around words nonchalantly, without a giving a second thought as to their perceived meaning?
How many of us use the word “fan” on a daily basis, possibly without realizing that the word is derived from the word “fanatic”. Webster’s Dictionary defines a fanatic as a person who is extremely enthusiastic about, and devoted to, some interest or activity. In the entertainment world, fans are a necessity, because if there are no fans, there is no one to buy the tickets, the music, the books, movies, or the merchandise. In essence, without fans, there is no celebrity. Fans are however, not limited to the typical entertainment realm of musicians and actors, politicians, company executives, news personalities, and even private citizens can also attract their own set of fans in today’s society.
Managing Your Digital Footprint
In the world of protective services, we are often charged with the responsibility of having to manage and reconcile between safety and access for our protectees.
As business owners, employees, independent contractors or just private citizens we too are challenged with the dichotomy of managing our personal and professional lives on social media.
Training for Tactical Shooting
Handguns are meant for close-quarter shooting. Think about it; if someone is going to attack, kidnap or rob you on the street, they are going to be close, within conversational range. Now, look around your home or business and see what the maximum distance is that you would have a clear shot at a criminal or terrorist, for most this will be less than 10 yards/meters. This places emphasis on close quarter instinctive shooting over precision target shooting. As part of your training practice for long distance shoots (for handguns, this means over 25 yards), you should try hitting targets out to and over 100 yards. This will improve your handgun skills and show you your capabilities and limitations, but the emphasis should be on close quarter instinctive shooting.
Counter-Ambush Tactics for Security Professionals – Part 2
The first two of these tenets involve soft skills which are sometimes referred to as Protective Intelligence (PI) and include situational and tactical awareness skills (route analysis and surveillance detection). The third tenet, Defend, requires hard skills such as the use of firearms and security driving. These hard skills may be required if we were unable to prevent or avoid an attack, and we end up in a situation where we have to survive an ambush. Continuing where we left off in Part One, we will finish covering some of the soft skills involved in Protective Intelligence and then move on to discuss the hard skills.
Hiding from OSINT
It often comes as a surprise just how much is available, and the nefarious uses it can be put to. OSINT can be applied towards defensive purposes, but we will be looking only at malicious purposes. One of the biggest challenges of OSINT is not merely recognising it as a threat, but encouraging the behavioural change needed to protect against it widely enough. It is not enough simply for a principal to stop posting Instagram pictures of their travels in order to hide them – their colleagues, friends, family, and employees also need to be aware of the need to take care with information which could be misused.
Industry News
We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.