Many of you will have seen the photo of the Dallas shooter outside of the Federal Building. Now ask yourself if this was your Office, School, or House of Worship how prepared would your company or institution be to recognize the signs of trouble as those Federal Officers did and deny access and ultimately defeat the shooter?
Evacuating and Moving Through Buildings Tactically
If you find yourself in a scenario where you need to evacuate a building with a real threat or danger posed to your safety, then you need to do so tactically. We are not interested in conventional SWAT tactics as it is not our job to apprehend, or even nullify, the threat; your job is to look after yourself, your family, or your client. follow these basic, lifesaving, procedures.
US Presidential Security Support
One memorable occasion was the visit by President George W. Bush to Manila, the Philippines, in October 2003, when he on his way to Thailand, where he was to attend the Asia-Pacific Economic Cooperation summit. This visit served as a great example of how much of an asset you can be for the protective elements if you know and apply protective operations principles.
Tiger Kidnapping
Over the years there have been many articles in Circuit Magazine about the kidnapping threat, and rightly so.
As we know, the danger of kidnapping is always a concern amongst high-level executives, especially when operating and traveling to some regions where kidnapping occurrences are more common. In this article, however, the topic is focused on one particular method of kidnapping, and that is what’s known as tiger kidnapping.
Counter-Ambush Tactics for Security Professionals – Part 1
By far the best method to accomplish this goal is to adopt a predictive, preventative strategy for protecting clients based on the tenets of Detect, Deter, and Defend. To effectively employ these tenets, we need some very specific soft and hard skills. In the protective operations world, the “soft” skills are sometimes referred to as Protective Intelligence (PI) while in other security disciplines they are referred to as situational and tactical awareness skills. If we are unable to prevent or avoid an attack, we need to have some expertise in specific “hard” skills such as use of firearms and security driving so that we can survive an ambush.
Keeping Your Edge – Measured Responses in Tour Security (Part I)
Spend any significant amount of time providing protection for entertainers involved with stage performances, and you will likely encounter one of this segment of the industry’s biggest headaches, the stage crasher.
The motivation for these individuals comes in various forms, some are “super fans” who see getting on the stage with the celebrity as the ultimate form of expression of their loyalty and support. They often refer to it as a once-in-a-lifetime opportunity, and despite common sense, the threat of ejection, arrest, or sometimes worse, they still needed to make the attempt.
How to be Cyber Safe When on Public WiFi
Connecting your device to the World Wide Web isn’t an issue when you’re at your place. It’s relatively safe, simple to do, and free of crowded traffic. When you leave the safety of your home to a public area, the story changes. When you connect to public Wi-Fi in different places, making certain you can still connect with people, read online news, and work remotely, are you aware of the risks?
Head on a Swivel
Catchphrases are good to identify an action; they’re not good in obtaining the Skill of that action. The foundation of the proverbial “head on a swivel” is Situational Awareness.
And just like Head on a swivel, “situational awareness” is a widely used phrase but not a widely understood Skill. It takes time for one to master and understand two phrases, and two actions
Hero bodyguard throws himself in front of client after motorbike hitman opens fire
A man on a motorbike cruises into the hotel grounds and pulls up close behind the SUV when the bodyguard places himself between the woman and the attacker.
Insider Threat
The insider threat of crime to organisations is always present and can manifest itself in many ways. This has become more apparent because of the recent social-economic climate change within the UK.
Protecting Politicians
As recently as January of this year a man was jailed for a string of threating abuses against Mark Prisk, the MP for Hertford and Stortford. Perhaps the most worrying aspect of the story around this attack is that Prisk was so fearful that he failed to attending a hustings. He is not the only MP who has had to change his course of action due to threats. In February last year Diane Abbott, who was suffering cyber-attacks claimed she was fearful of walking the streets of her own constituency.
Intelligence 2.0
Although the underlying principle of understanding ‘capability and intention’ and the objective of ‘forewarned is forearmed’ have not dramatically altered overtime, the sheer scale of intelligence available in the Open Source environment means that the greatest risk today is information overload rather than information scarcity.
It is in this context that in order to acquire and analyse asymmetric and potentially outcome-defining intelligence, analysts are required to think more laterally than ever and be able to draw both strategic and tactical conclusions from intelligence which may be independent and accurate as much as it may be deliberately misleading or presented through an emotional prism. SOCial Media INTelligence (SOCMINT) is one such instance of lateral thinking. FINancial INTelligence is another.
Introduction to Cybersecurity
Cybersecurity is often seen as a niche area which requires a lot of specialist knowledge to apply. This is partly true – in order to configure a web application firewall someone needs to understand how to work with the technology at a very low level. What is often missed, as the technologists take over, is that cyber is still security and the same fundamental principles apply to designing and building effective protections.
Global Incident Report – May 2019
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks, here is your summary of the last 30 days. Including: 40 dead in armed attack in Mali, 13 killed in Hostage situation in Mexico, Multiple Islamic State Militants killed in Iraq and explosion on a bus in Sweden.
Protective Surveillance
With each client, the situation and threat level will vary, as will their requirements and appetite. When it comes to security there are a myriad of options available, often (and hopefully) with multiple, complementary components working together in harmony. One weapon in the personal protection armory is Protective Surveillance. This article attempts to provide a comprehensive overview of a service that has multiple benefits, quite a few limitations and several misrepresentations.
Countering snipers Part 1
One thing I find amusing and annoying is that whenever there is a terrorist attack with an attacker using a long gun the media tends to immediately label the shooter as a sniper. There is a very big difference between a trained sniper and some idiot with a rifle and just because someone served in the military to some extent it does not make them a sniper. But, with modern weapons and a little knowledge the wannabe jihadist or anarchist are still a serious threat.
Zero Days, How Do You Stop a Threat You Can’t See Coming?
This past March, WikiLeaks dumped 8,761 CIA documents collectively known as “Vault 7.” These documents contained information about what was essentially the government agency’s armory of cyber threats.
They included malware, viruses and Trojans used for espionage purposes. More importantly, they had information about zero day vulnerabilities the CIA had been using to hack computers, tablets, smartphones and other devices for intelligence gathering purposes.
Task, Threat and Environment
Task, Threat and Environment, The Mindset of Protective Services Professional. This is a mindset that goes beyond situational awareness, knowledge, or even foresight but rather a collection of them all into a cycle which must be constantly in rotation. The items listed are the most paramount on the task list of a security professional engaged in protective services.
Global Risk Roundup – October 2018
Our Intelligence and Analysis Partner, Drum Cussac provides in-depth analysis of global risks via in-house experts, cutting edge technology and a comprehensive global source network. Global Risk Roundup, October 2018 Edition.
Russia World Cup 2018 – Threat Analysis
With so many people heading to the World Cup, it’s important to have a situational awareness of the state of play in Russia. This can help you to plan ahead and mitigate potential threats.