Surprisingly, many people who took part in the thread commented, saying that they don’t find anything wrong with it. Some of them even named their own old clients. Others tried to justify the practice of name-dropping by saying it was a former client, or that they didn’t reveal anything personal about the client, or that they had the client’s approval to post that picture or to name the client. And finally, some said their client is already pretty well-known and paparazzi are always getting pictures of them together so why hide it? Essentially, they are good guys, and how dare we criticize people we don’t know. These were a number of the comments from individuals who either work in the security industry as operatives or own companies and hire agents to represent them.
By now many of you have seen the recent photo of the Dallas shooter outside of the Federal Building. Ask yourself if this was your Office, School, or House of Worship how prepared would your company or institution be to recognize the signs of trouble as those Federal Officers did and deny access and ultimately defeat the shooter?
For the purpose of this article, we are not interested in conventional SWAT tactics as it is not our job to apprehend, or even nullify, the threat; your job is to look after yourself, your family, or your client. It’s a fact that law enforcement SWAT tactics don’t work against criminals and terrorists who know how to defend buildings, so conventional law enforcement SWAT training is something you can forget in this scenario.
If you have to evacuate your home, office, hotel, or shopping mall, for whatever reason, it needs to be done quickly, quietly and with the minimum of fuss. You should always know where your escape routes and exits are but never use obvious ones as the criminals or terrorists will have thought of these and may have blocked, booby-trapped, or prepared ambushes on them. If there is an incident going on get as much information as possible as to where the threat is, and what is happening, and then start moving away from it using cover.
One memorable occasion was the visit by President George W. Bush to Manila, the Philippines, in October 2003, when he on his way to Thailand, where he was to attend the Asia-Pacific Economic Cooperation summit. This visit served as a great example of how much of an asset you can be for the protective elements if you know and apply protective operations principles.
Over the years there have been many articles in Circuit Magazine about the kidnapping threat, and rightly so.
As we know, the danger of kidnapping is always a concern amongst high-level executives, especially when operating and traveling to some regions where kidnapping occurrences are more common. In this article, however, the topic is focused on one particular method of kidnapping, and that is what’s known as tiger kidnapping.
By far the best method to accomplish this goal is to adopt a predictive, preventative strategy for protecting clients based on the tenets of Detect, Deter, and Defend. To effectively employ these tenets, we need some very specific soft and hard skills. In the protective operations world, the “soft” skills are sometimes referred to as Protective Intelligence (PI) while in other security disciplines they are referred to as situational and tactical awareness skills. If we are unable to prevent or avoid an attack, we need to have some expertise in specific “hard” skills such as use of firearms and security driving so that we can survive an ambush.
Spend any significant amount of time providing protection for entertainers involved with stage performances, and you will likely encounter one of this segment of the industry’s biggest headaches, the stage crasher.
The motivation for these individuals comes in various forms, some are “super fans” who see getting on the stage with the celebrity as the ultimate form of expression of their loyalty and support. They often refer to it as a once-in-a-lifetime opportunity, and despite common sense, the threat of ejection, arrest, or sometimes worse, they still needed to make the attempt.
Connecting your device to the World Wide Web isn’t an issue when you’re at your place. It’s relatively safe, simple to do, and free of crowded traffic. When you leave the safety of your home to a public area, the story changes. When you connect to public Wi-Fi in different places, making certain you can still connect with people, read online news, and work remotely, are you aware of the risks?
From the time we are indoctrinated into this Industry, we hear the phrase “Head on a Swivel”! This ancillary movement of moving one’s head 180 degrees side to side is taught to familiarize the specialist with scanning areas or crowds for suspicious activity or persons. At first, it’s over exaggerated, you appear to be nervous, very bobble head like, anxious, your adrenalin surges through your veins, but WHAT DO YOU SEE? If you see something, WHAT IS IT? Do you UNDERSTAND what it is you’re seeing? If so, now can you now PROJECT? And if so, can you now RESPOND? Oh, and can you do it in mili-seconds? For many, the answer is NO and for the many that can’t in truth say yes, I offer this article.
A man on a motorbike cruises into the hotel grounds and pulls up close behind the SUV when the bodyguard places himself between the woman and the attacker.
The insider threat of crime to organisations is always present and can manifest itself in many ways. This has become more apparent because of the recent social-economic climate change within the UK.
As recently as January of this year a man was jailed for a string of threating abuses against Mark Prisk, the MP for Hertford and Stortford. Perhaps the most worrying aspect of the story around this attack is that Prisk was so fearful that he failed to attending a hustings. He is not the only MP who has had to change his course of action due to threats. In February last year Diane Abbott, who was suffering cyber-attacks claimed she was fearful of walking the streets of her own constituency.
Although the underlying principle of understanding ‘capability and intention’ and the objective of ‘forewarned is forearmed’ have not dramatically altered overtime, the sheer scale of intelligence available in the Open Source environment means that the greatest risk today is information overload rather than information scarcity.
It is in this context that in order to acquire and analyse asymmetric and potentially outcome-defining intelligence, analysts are required to think more laterally than ever and be able to draw both strategic and tactical conclusions from intelligence which may be independent and accurate as much as it may be deliberately misleading or presented through an emotional prism. SOCial Media INTelligence (SOCMINT) is one such instance of lateral thinking. FINancial INTelligence is another.
Cybersecurity is often seen as a niche area which requires a lot of specialist knowledge to apply. This is partly true – in order to configure a web application firewall someone needs to understand how to work with the technology at a very low level. What is often missed, as the technologists take over, is that cyber is still security and the same fundamental principles apply to designing and building effective protections.
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks, here is your summary of the last 30 days. Including: 40 dead in armed attack in Mali, 13 killed in Hostage situation in Mexico, Multiple Islamic State Militants killed in Iraq and explosion on a bus in Sweden.
With each client, the situation and threat level will vary, as will their requirements and appetite. When it comes to security there are a myriad of options available, often (and hopefully) with multiple, complementary components working together in harmony. One weapon in the personal protection armory is Protective Surveillance. This article attempts to provide a comprehensive overview of a service that has multiple benefits, quite a few limitations and several misrepresentations.
One thing I find amusing and annoying is that whenever there is a terrorist attack with an attacker using a long gun the media tends to immediately label the shooter as a sniper. There is a very big difference between a trained sniper and some idiot with a rifle and just because someone served in the military to some extent it does not make them a sniper. But, with modern weapons and a little knowledge the wannabe jihadist or anarchist are still a serious threat.
This past March, WikiLeaks dumped 8,761 CIA documents collectively known as “Vault 7.” These documents contained information about what was essentially the government agency’s armory of cyber threats.
They included malware, viruses and Trojans used for espionage purposes. More importantly, they had information about zero day vulnerabilities the CIA had been using to hack computers, tablets, smartphones and other devices for intelligence gathering purposes.
Task, Threat and Environment, The Mindset of Protective Services Professional. This is a mindset that goes beyond situational awareness, knowledge, or even foresight but rather a collection of them all into a cycle which must be constantly in rotation. The items listed are the most paramount on the task list of a security professional engaged in protective services.
Our Intelligence and Analysis Partner, Drum Cussac provides in-depth analysis of global risks via in-house experts, cutting edge technology and a comprehensive global source network. Global Risk Roundup, October 2018 Edition.