Circuit Magazine #38

Page 1

News

Reviews

Opinion

Exclusives

Intel

38

Insider Threat

The Majority Of All Security Threats Come From Internal Sources

PTSD & The Battlefield

Covert Protection

How To Spot A Vehicle-borne IED

Residential Security Systems

Countering Snipers

The Science Behind Protection On The Move

Don’t Get Comfortable /// Church Security


CIRCUIT MAGAZINE ISSUE 38

Who’s protecting YOU, while you protect others? With our premium tier of membership, we’ve got you covered under the BBA Protect insurance policy, providing complete peace of mind while you work in addition to the standard BBA membership benefits. Designed for professionals looking to maximise their employability and demonstrate their commitment to industry standards, there are two levels of Protect membership available:

PROTECT

PROTECT+

Individual public and products liability insurance designed for UK Close Protection operators working in nonhostile regions.

Personal accident and health insurance designed for armed Close Protection and Maritime Security operators working in hostile regions.

FROM JUST £60 PER MONTH

As a trusted professional membership organisation, The BBA are dedicated to bringing our members the best possible resources and tools to enhance their standing and credibility as close protection operators within the industry.

IT’S EASY TO UPGRADE YOUR BBA MEMBERSHIP TO PROTECT YOU.

Visit our website at www.the-bba.org.uk to find out more. Lockton Companies LLP is a limited liability partnership incorporated in England and Wales, registration number OC353198. Authorised and regulated by the Financial Conduct Authority.

32


CIRCUIT MAGAZINE ISSUE 38

CONTENTS 04 Forewords

06

06 Covert Protective Details The Invisible shield 12 The Science Behind Protection: On The Move 20 Countering snipers Part 2

20 54

30 How to spot a VEHICLE-BORNE IED 36 I am a late developer 40 Church Security The New Frontier PT. 4 45 Keeping Your Edge Don’t Get Comfortable 48 The Silent Sniper PTSD & the battlefield 54 Insider Threat

12

68 The Placement Of Residential Security Systems What To Know Legally 75 Classifieds

03


EDITOR FOREWORDS

Uk Foreword

As another year is coming to a close, the team here at the Circuit would like to thank all of you for the support shown throughout 2017 and wish you a safe and prosperous 2018!

Christmas is a time that should be celebrated and spent with our families. Christmas has many meanings to a great many different people, but for me, it represents the spirit of giving without the thought of receiving. It brings happiness through the joy we see in others. It is the putting aside of one’s self and the finding time for others, and it is a pe-riod when we can leave the stresses of dayto-day life behind and embrace a simpler, more altruistic way of being. However, a career within the security industry means many of you who are reading this may well be working through the festive period. So, for those of us who have been lucky enough to celebrate the festivities away from work let’s raise a glass to those less fortunate. Christmas is also a time when we must remain vigilant as traditionally, for the last couple of years, it has been seen as an opportunity to attack the vulnerability of people who have lowered their guard in order to embrace the festivities. One hopes that there are no such terrorrelated incidents this year but let us not be complacent. Remain guarded against the hidden threats which have become a sad reality of our times. With the new year fast approaching what are the goals you hope to achieve in 2018? Put some time aside for introspection and consider what direction

you would like your life to head over the course of the coming year. At the start of each new year I take stock of what I’ve achieved during the previous 12 months and reevaluate my targets for the following year. These may be professional development, career aspirations, or personal growth. However, there is one particular area of growth, synonymous with this time of the year, which I will be working hard to reduce, and in the shortest time possible - that is the expansion of my waistline from all the turkey consumed over Christmas! As always, with each issue, we have some fantastic articles written by industry profes-sionals from both regular and new contributors. Maybe one of your New Year’s resolu-tions could be to share a selection of your industry experience or professional knowledge and submit it for inclusion within the Circuit? It’s you guys that have made the Circuit what it is today, something far more than we could have ever imagined when we released Issue 1 back in 2008. To be apart of the Circuit during our 10th year of publication, email your submissions to: info@circuit-magazine.com - until next time, stay safe and stay committed to development.

Shaun West Editor

04


CIRCUIT MAGAZINE ISSUE 38

US Foreword Wow, 2017 is taking its final curtain call, and it seems like just yesterday I was writing similar words about the previous year.

One thing I can certainly say about the past 12 months is that they have been really interesting in term of issues that affect the security community. Speaking from a UScentric view, those came in the form of assaults against public figures, political protest and unrest, and tragic mass shootings. Times change, the world changes, and we have to change with it -- that means evolving and adapting. I feel that The Circuit Magazine has been on the forefront of helping the industry evolve by presenting readers with an organ that offers news, information and commentary about not only the Close Protection community, but also how events across the globe impact what we do. From an editorial standpoint, one of the things on my wish list moving into 2018 is that we do more forecasting and trending. The industry has to stop chasing the same clients and broaden our reach. There are so many talented men and women who have the skillset and training and are just not putting it fully to use because they don’t know there the opportunities are. To address and counter that, I always encourage individuals to

“think outside the box.” In the next year, I’m going to give myself a taste of my own medicine and push the editorial staff of The Circuit to also, think outside the box, and come up with new and engaging materials that will make each issue not only a must read, but a must REread. However, this is a two-way relationship, so if there is something you want to see more of between these pages, by all means drop us a line. Not only would be love to hear from you, but we do take the comments and criticisms to heart. Remember, The Circuit is a magazine written and produced by individual’s active in the industry, that means, we might misspell a word or two, but at the end of the day, we are as committed to delivering the same type of quality product here that we would do on a protective assignment. So, in the meantime, take a look at the following pages, and ask yourself how relevant these articles are to the world we are living in. My hope is that you’ll say, very much. Elijah Shaw US Editor

05


CIRCUIT MAGAZINE ISSUE 38

Covert Protective Details “The Invisible shield’’

By: Denida Zinxhiria

For new Close Protection professionals entering this industry or those considering it, a protection detail can be overt, covert or both.

06


THE INVISIBLE SHIELD How the appropriate protection plan and team is chosen relies on the information known or gathered from interviews with the client as well as conditions affected by culture, political or business climate, the client’s mood, planned activity, local laws, and codes, and even weather. Many clients feel uncomfortable with highly visible or “overt” protective details. Some may even ask you to be so invisible that they don’t know you are there. Male clients may feel uneasy about a male CPO guarding their female companion or spouse and ask that the big guys maintain their distance and not interact with them. Large-framed protectors may not blend in well at the golf course or mall. A female protector may work better at a corporate function or business luncheon. Once the person is picked as a protector, the client’s wishes must be considered as part of their protection plan. Another challenge is communications with the client or even your own

teammates. Remember that earpieces and cute little coily-cords and bulky radios may not work in some environments. Think about Bourbon Street in New Orleans Louisiana during Mardi-Gras or in Rio Brazil during Carnival or Christmas Eve in Vatican City, Rome Italy. A noisy kids’ birthday party could be just as bad when coupled with nosy 8-year-olds asking who you are, so be ready. How do you blend in with the environment, (and culture), and remain capable of protecting your client? How do you provide full coverage around your client without the obvious “Diamond” or “Box” formations? “Blending in” requires knowing your client, environment, surrounding cultural challenges, traffic patterns, local laws, and rules, and yourself. You also need to master smooth, calm movements, relax the military posture and bearing and learn how to speak like a normal tourist and less like a Special

How do you provide full coverage around your client without the obvious “Diamond” or “Box” formations? 07


CIRCUIT MAGAZINE ISSUE 38

Wear what your client would wear. Cover tattoos, avoid excessive jewelry and bright colors, and black. Boring is best. client’s “associate”, a personal assistant, a personal trainer, or a personal shopper…. You can even have business Your appearance can also give cards that back up your story you away. Plaid shirts, goatees but have one, and stay in character. and plastic sunglasses may make you feel cool and get Now that you have your you noticed by the editor of backup story let’s address any popular military supply some movement issues. As catalog, but it will also get mentioned before, movements you noticed by everyone must be smooth and calm. A who has ever seen one of person who acts like they are those catalogs. Try to avoid stressed or hurried will draw tactical clothing, military or attention and just as serious police style haircuts, tactical can telegraph this uneasiness sunglasses and wristwatches to the client. Don’t mirror your and try to wear clothing client’s movements and unless and accessories that the you know or feel that their community you are in would risk exposure is increasing at wear. Wear what your client the present rate or direction would wear. Cover tattoos, of movement, don’t interfere avoid excessive jewelry and with the client. Unless you bright colors, and black. must hover over your client, Boring is best. don’t. If you can sit, do it. If What is your reason for being you must sit or stand, don’t do it like you are a normal near the client? If you are alert and aware security not a “bodyguard, who are professional. Stay in character. you? What is your backup You can pretend to stare at story? You can be a reporter your cell phone screen while doing a human-interest focusing on your peripheral story, an event planner, the Forces operator, all while remaining ready to react to a threat with “explosive ability”.

08


THE INVISIBLE SHIELD vision. You can use earbuds but have the volume down to hear surrounding noises or conversations that otherwise would be missed. You can still wear your sunglasses if everyone else would usually wear them and mask your eye movement, but your goal is to blend into your environment. Avoiding ‘’mirroring’’ your principal’s movements. You don’t have to sit or stand up as soon as they do. Waiting a few seconds to move is fine when no threat is present. If working on a team, coordinate with others to cover your client’s movement. Team

09

communications here will be critical. Hand, eye, or verbal signals are valuable and must be learned. Knowing your client’s mannerisms will also give you an advantage in reacting to them. Also, pay attention to the waiter or others who interact with your client. They will give you clues to what your client may do next. If you see the check coming, be ready to move. If the client gets up to go to the bathroom, be ahead of them. Finally, and maybe as critical, your attitude must blend in too, so forget about being the “authority” or the


CIRCUIT MAGAZINE ISSUE 38

convince someone with this mindset to remain “invisible” in the crowd is not always easy. Picking the right person for covert protection details is a rare skill set and should be left to an experienced mission planner. If you need to switch out with another CPO to maintain a low-key They purposely blow their own presence, bury your pride and trust your replacement choice. cover or even send photos to social media of them working If choices you make relative to your client’s safety are ever so they can brag about their about what is best for you, work. This is more common you are the wrong person for in the newer and unpolished the assignment and the wrong CPO’s but exists in all areas ego for this industry. of the profession. Trying to “security specialist’’, STAY IN CHARACTER. Be polite and don’t annoy others with your presence. Many people enter this industry to do something meaningful or significant and in their own way may even consciously or unconsciously seek recognition or notoriety.

Denida Zinxhiria is the Founder and CEO of Athena Worldwide LLC, Athena Academy and Nannyguards®. She is one of a few certified female Close Protection Operatives and Security Consultants in Greece. Denida holds a BSc in Counseling and Psychology, is trained in various martial arts and has also operated as a private investigator. For more information, please go to: Athena Worldwide LLC www.athenaworldwide.com Athena Academy: www.athenaacademy.com Nannyguards®: www.nannyguards.com

10


STRESS:

THE SILENT ENEMY The security sector has one of the highest levels of exposure to acute stress and trauma. Our ability to cope increases when we know what to look for and how to effectively implement strategies for recovery. Power To Recover is a research backed online course teaching you preventative and recovery strategies to combat stress.

Online training - learn from home, at your own pace 5 modules with audio recordings, written notes and exercises Learn direct from experts with your own dedicated trauma coach Support colleagues - through stress & trauma awareness training Help yourself - learn to handle your stress & trauma exposure more effectively

Combat the mental game. A vital piece of kit for psychological health. Call for a Power To Recover information pack:

0161 635 3522

SafeHaven Trauma Centre are licenced providers of the KRTS Power to Recover online programme

SafeHaven Trauma Centre, 34 Altrincham Road, Wilmslow, Cheshire SK9 5ND +44 (0) 161 635 3522 info@safehaventraumacentre.com safehaventraumacentre.com


CIRCUIT MAGAZINE ISSUE 38

The Science Behind Protection: On The Move

12

By: Tony Scotti


ON THE MOVE

The Science of Security Driving The researchers express driving skill as the percentage of the vehicle a driver can use before losing control of the vehicle. If a driver can use 50% of the vehicle, they define him/her as a 50% driver, if they can use 80% of the vehicle, they are an 80% driver. The same research also has found that the average driver can only use 40% of the vehicle’s capability.

The Results The vehicle used in the experiment was capable of .9 G’s braking and .78 G’s cornering, which means the vehicle could absorb 90% of its weight braking (.9 G’s) and 78% (.78 G’s) of its weight cornering. Keep in mind that the average driver can only use 40% of the capability of the vehicle.

As we drove up to a stop sign and applied the brakes, coming to a leisurely stop, the G Meter indicated that we used 27.8% of the vehicles Using 80% or above of the capability to stop. When vehicle’s capability would driving around a corner, we more than likely only happen used an average of 28% of during an emergency the vehicle’s capability. The (accident or ambush). But end result is; when driving what percentage of the vehicle through the day to day does a Security Driver use routine, a Security Driver while maneuvering through uses very little of the vehicle’s the day to day mundane chore capability. of moving the boss from Point A to Point B, such as driving A Society of Automotive up to an intersection and Engineers paper has indicated slowing down – stopping at that using 30% to 35% of a red light – driving on an off the capability of the vehicle is ramp or around a corner? the ‘Comfort Zone’ for most drivers. If they use more of To answer that question, ISDA the vehicle (apply more G’s conducted an experiment, on the vehicle), the research using a G-Meter, measuring notes that the driver gets how much of the vehicle’s “anxious” (The engineering capability is used during way of saying scared). But if normal driving routine, one an emergency popped up a absent of an emergency. driver would instantaneously What we found interesting have to go well beyond was how little of the vehicle’s their Comfort Zone and use braking and cornering capacity a minimum of .8 to .9 G’s, result during the daily driving braking or cornering to avoid routine. the emergency.

13


CIRCUIT MAGAZINE ISSUE 38

The driver of the follow vehicle needs to be cautious of their speed. Lots of consideration needs to be given to who is driving the vehicle; putting a driver with little or no experience driving an SUV in a motorcade is problematic. That’s what training is about, training students to use a minimum of 80% of the vehicle and to accomplish that in a time frame measured in tenths of seconds. Basically to get drivers past their comfort zone, and (as defined by the SAE) become 80% drivers. To put this in the context of Security Driving, a Security Driver could drive for weeks, months years and never need to drive past the comfort zone of using 40% of the vehicle. But when confronted with an emergency, accident or vehicle violence, and in the blink of an eye, the driver will need to have the ability to go past their comfort zone and use a minimum of 80% of the vehicle. But isn’t that part of the Security Drivers job description; have the measured ability to use the vehicle’s capability.

The Science of a Two Vehicle Scenario The ISDA 2015 and preliminary data from the 2017 Executive/Security

Vehicle Survey indicate a dramatic increase in the use of SUVs for Executive Transportation. The 2015 Survey also indicated that there had been a significant increase in the use of two car scenarios for Secure Transportation. If you couple the Survey data with the number of motorcade incidents that have occurred it points to a problem in the making. The following is an explanation of why a two car scenario can create a risk to the principal and some suggestions on how to mitigate that risk. The risk starts with what scientists call “driver’s eye height.” The Driver’s Eye Height A study was conducted to assess drivers’ chosen speeds when operating a simulated vehicle, doing so while viewing the road from a low eye height (if a sedan would be the lead vehicle) and a high eye height (if a SUV would be the follow vehicle). Participants were instructed to drive, without reference to a speedometer, at a highway

14


ON THE MOVE

driving speed at which they felt comfortable and safe. Drivers seated at a high eye height (the follow vehicle) drove faster than when they were seated at a low eye height (the lead vehicle). Consider that the majority of follow vehicles are SUV’s and that the seat in a typical SUV is about 1.6 feet higher than in a car. Apply this theory to a two car scenario where the principal is in a sedan, (the driver sitting at normal eye height) and the follow car is an SUV with the driver sitting at an elevated eye height. If both drivers perceive that they are moving at the same speed – for example, they both feel they are driving at 40 MPH – due to the eye height of the driver in the follow car he/she will be driving faster than the driver in the principal car. According

15

to the study, the follow car’s speed can be off by as much as 15%. So if the driver in the follow car thinks they are driving 40 MPH, they are more than likely driving 46 MPH. If the driver in the follow car thinks they are driving at 60 MPH, they are probably going 69 MPH. And the higher you sit in the vehicle, the higher the speed differential. To carry this one step further, an increase in speed of 15% would represent an increase of 30% in the energy the driver will need to manage in an emergency manoeuvre and an increase in 30% in the distance required to stop in the event of an emergency. All this leads to the fact that driving the follow car is not easy; following distance will vary and require the driver’s constant attention.


CIRCUIT MAGAZINE ISSUE 38 Some thoughts on the two vehicle scenario: 1 The driver of the follow vehicle needs to be cautious of their speed. Lots of consideration needs to be given to who is driving the vehicle; putting a driver with little or no experience driving an SUV in a motorcade is problematic.

by advancing the route.

4 Be cautious of the difference in stopping distance between a sedan and an SUV. Scenario: the lead vehicle is a Mercedes S 550 which can stop from 60 MPH in 128 feet. The followvehicle is a Suburban LTZ which can stop from 60 MPH in 138 feet. The Mercedes comes to a quick stop. At the elevated eye height, the 2 Preliminary data from the Suburban driver could be 2017 Executive/Security moving at 69 MPH and take Vehicle Survey also indicates 30% more distance to stop that when traveling the most often rented vehicle is an SUV, the vehicle, so not accounting for reaction time the Suburban driven by a subcontracted would need about 179 feet to security driver. We suggest that the driver has experience stop the vehicle. If the driver driving SUV’s, and is aware of of the follow vehicle is reacting to the brake lights of the lead the misconception of speed vehicle, and considering an that an SUV creates. average reaction time of .75 Seconds, there would be an 3 There is a substantial additional 76 feet added to difference between the the stopping distance, which handling capability of the would make the total stopping lead vehicle (if a sedan), and distance 255 feet – which the handling capability of the would present a problem. follow vehicle (if an SUV). The difference in handling capability, when coupled with the misconception of speed created by the follow driver’s eye height, can create a significant risk. The driver of the lead vehicle must be aware of their An attack on the principal is cornering speed. They need a time, distance relationship. to understand that the follow car may not be able to corner Moving the principal, driving or walking is managing at the same speed as the time and distance. If there lead vehicle. They need to is an attack on the principal coordinate their movements. (AOP), driving or walking, This can be accomplished

The Science of Walking or Driving the Principal – Time and Distance

16


ON THE MOVE

We suggest that the driver has experience driving SUV’s, and is aware of the misconception of speed that an SUV creates.

17


CIRCUIT MAGAZINE ISSUE 38 any delay in the decisionmaking process will equate to less time and distance. No matter what level of skill the practitioners possesses if there is not enough time and distance to use the skill, bad things will happen. An understanding of the basic principles of managing time and distance can be lifesaving knowledge. Driving the Principal While driving, our frame of reference for measuring time and distance is attached to a speedometer, which supplies information in units of miles and hours – MPH. Whether you are driving (or walking) you do not have an hour or a mile to make decisions; in a vehicle emergency (accident or ambush), Miles Per Hour is an irrelevant unit of measurement.

As mentioned above, any delay in the decision-making process adds exponentially to the level of difficulty needed to survive the AOP. In a vehicle, delays are not measured in seconds, but in tenths of seconds. As an example; at 40 mph (58.8 Feet Per Second), in .2 seconds, the driver travels 11.76 feet, at 60 MPH (88.2 Feet Per Second) in .2 seconds the driver would travel 17.6 feet. Why two-tenths of a second? Because that is how much time it takes to blink your eyes. When you are driving 60 mph, literally in a blink of an eye, you are 17.6 feet closer to the problem, in a half a second you would be 44 feet closer and in a second 88 feet closer to the problem. Any training that can speed up the decision-making process

18


ON THE MOVE

While driving, our frame of reference for measuring time and distance is attached to a speedometer, which supplies information in units of miles and hours – MPH. – by as little as a blink of an eye dramatically increase the chances of surviving the emergency. Walking with the principal Also, this concept of time and distance applies to all types of movements, including walking with the principal or standing in close proximity to the principal. Consider that the “average” leisure walking speed is 3.1 MPH, and walking at a faster pace would bring the speed up to 5.6 MPH. Using these walking speeds, walking at 3.1 MPH is equivalent to walking 4.6 Feet Per Second, and walking at 5.6 MPH is equivalent to walking 8.2 Feet Per Second. Unlike moving the principal in a vehicle where the speeds are high and decision time is measured in tenths of seconds, when walking with the principal the speed is

low and time is measured in seconds, as an example, using the 3.1 MPH walking speed, a delay in perception of the problem of one second would mean the threat is 4.6 feet closer to the principal. In two seconds (count to two slowly), given the 3.1-mile example, if there is a delay in perception, the threat is approximately 9 feet closer to the principal. Whatever the attack scenario, moving in a vehicle or walking, there is a time and a distance that will mitigate the problem. Consider the concept of time and distance in the context of training. While training if the provider allows 5 seconds to solve a problem that needs to be mitigated in 2 seconds they create a false sense of security that can be exploited by those who wish to do you and your principal harm.

Tony Scotti - International Security Driver Association (ISDA) ISDA is your essential resource for continuing education, benchmark research, and online learning programs, all designed to improve your skill set and advance your business. For more information go to: https://isdacenter.org or http://securitydriver.com or email

tonyscotti@isdacenter.org

19


CIRCUIT MAGAZINE ISSUE 38

Countering snipers Part 2

By: Orlando Wilson

20


COUNTERING SNIPERS Countering Sniper Operations The first step in countering snipers is for everyone to be aware of the threat. This is where a threat assessment needs to be compiled and the realist threats need to be identified, if potential snipers are a threat then procedures need to be put in place.

When compiling your threat assessment check media reports and talk with locals and those with knowledge of your area of operations. You need to determine what the threat level could be; are there trained personnel, what weapons are available and what’s their motivation and objectives.

In general, operational planning for a sniper threat should always be considered to some extent. Not only should counter sniper procedures be planned for but they need to be practiced, your people need to be trained at least in the basic reactions to fire and the use of cover, preferably before they are exposed to the sniper threat.

When planning counter sniper operations, you need to answer four basic questions that will help you to assemble effective procedures that are relevant to your situation. • What is your task and objective? • What equipment and weapons do you have? • What does your opposition want to accomplish and have?

21


CIRCUIT MAGAZINE ISSUE 38 • What are the rules of engagement? Rules of engagement are a very important consideration and can vary greatly, for example if you are caught up in an active sniper situation in an urban area in the US and you have a legal weapon on you, you cannot go blindly firing into potential sniper locations without positively identifying your target. Also, this puts you at risk of being mistaken for the active shooter and shot by police or other armed citizens. In a hostile or combat environment, your rules of engagement could be a lot freer but the limits of appropriate use of force need to be understood by everyone. In many parts of the world people openly carry firearms and just because someone has a firearm it does not make them a threat. Also, just because someone is shooting, it does not mean they are shooting at you or being hostile. There is a big difference between someone

in your vicinity shooting in the air and you being shot at with accurate and effective fire. You need to be able to determine the difference and plan your reactions accordingly. Counter sniper procedures are mainly common sense and should be ingrained in most former military personnel with any hostile environment experience. Basically if you can’t be seen, you can’t be shot, so limit your exposure, always make maximum use of cover, and move tactically. Remember, the sniper always has the initiative unless detected and is trained to wait for hours for a target or the time when your guard is down. • Use concealed routes • Avoid open plazas and intersections • Stay away from and don’t linger in doorways and windows • Move along the side of streets, not down the center • Stay in the shadows. • When moving with others stay spread out and use

22


COUNTERING SNIPERS

If you can’t be seen, you can’t be shot, so limit your exposure, always make maximum use of cover, and move tactically. bounding over watch • Go around well-lit areas at night • Never be silhouetted against lights, skyline or light backgrounds • Move quickly and quietly across open areas that cannot be avoided. • Make maximum use of cover and concealment • Do not gather with others in large groups in the open • Conduct all meetings, gatherings of personnel undercover • Do not wear anything that could draw attention to you • Do not establish routines After your threat assessment has been compiled you need to survey the area around your location for potential firing positions that a threat sniper could use and routes in and out of those locations. Once identified those locations need to be monitored where possible, occupied with friendly forces, booby trapped or made unusable for a threat sniper. Clear any bushes or obstructions etc. that could be

23

used as cover by snipers or inhibit your view of potential sniper positions. Now in many urban and rural locations the potential positions for threat snipers will be endless, so your only option will be to limit exposure; if you can’t be seen you can’t be shot! Board up windows or put up screens to block the lines of sight for threat snipers. Canvas or plastic sheets can be used to make a dangerous alleyway or street crossing safer. In the long term, fixed positions, more solid barriers and defenses can be put in place such as sand bags or earth filled 55 gallon drums etc. Here are some basic military considerations for counter sniper procedures that can be adapted to the civilian world. Not everything will apply to everyone and all situations • Cameras: These days’ surveillance cameras are widely available and can be


CIRCUIT MAGAZINE ISSUE 38

used to monitor potential sniper positions. Hunters trail cameras can be placed in potential sniper positions and along the routes to those positions to help identify any potentially hostile activity in your area. Also, after a shooting incident to help identify the shooter. In hostile environments, special care needs to be taken when checking or retrieving cameras as they could have been booby trapped or the sniper could be waiting for you. Placing

semi-camouflaged cameras around a property will let any potential threats know the area is monitored and can be a deterrent. • Drones: Where weather conditions and budget allow, drones fitted with surveillance or preferably thermal imaging cameras are ideal for spotting potential threats especially in rural areas. • Observation: Potential sniper firing positions should be constantly under surveillance and where manpower allows observers

24


COUNTERING SNIPERS should be employed to monitor these positions for suspicious activity. • Patrols: Random patrols should be employed to gather intelligence, identify hostile movements in your area and deny snipers access to firing positions. • Dogs: Trained dogs can quickly search large areas and buildings for snipers who are trying to remain undetected. • Protective Clothing: Ballistic vest and helmets will not always stop a sniper bullet, especially from large caliber weapons, but can significantly reduce the severity of wounds. • Armored Vehicles: Whenever possible try to use armored vehicles. Reaction to fire Over the years, I have spoken to many security contractors, police and military personnel and find it amazing that when talking about their reaction to fire drills most of them just say they would draw their weapon and return fire etc. That’s ok on a gun range but you need to take a few other things into consideration if someone is shooting at you! You also need to remember that if you are being targeted by a competent marksman unless you have detected them before they pull the trigger, chances are you’re going to be dead or seriously

25

injured. Basics, moving targets are harder to shoot than stationary targets. It’s a fact, it’s harder to shoot a target that is moving than one that is stationary. So, if someone is shooting at you, do not stand still, run, and get into cover. Smaller targets are harder to shoot than large targets! If there is no cover for you, make yourself a smaller target and drop to a kneeling or prone position. Following is an adaptation of the British Army individual reaction to fire drill. Some of this may apply to you and some might not- use this as a basic format. If you are serious about your personal security, you must put together a plan that is specifically designed for your situation and then practice it until it is second nature. Preparation: If you have a firearm it must be clean, serviceable, and well-oiled. Ammunition must be of good quality, clean and your magazines full. You must be properly trained and ready to deal with a shooting incident. Reacting to fire: The immediate reaction to fire is to move to cover as you are deploying your weapon and returning fire, if available use a smoke grenade or


CIRCUIT MAGAZINE ISSUE 38 1) Dash- a moving target is harder to hit than a stationary target. 2) Down- keep low and present a smaller target. 3) Get into cover from fire. 4) Observe where the threat is. 5) If armed return fire. • Winning the fire-fight: If armed as soon as the threat has been firmly located, you must bring down sufficient accurate fire on the threat to incapacitate them or force them into cover so you can extract yourself from the kill zone. • Re-organizing: As soon as you have incapacitated the opposition or are in a safe area, you must reorganize yourself as quickly as possible to be ready for other possible threats. You need to re-load your weapon, make sure that you or anyone with you is not injured and inform law enforcement, emergency, or support services immediately.

cause ricochets and flying debris, such as brick, plastered or concrete walls. Also, you need to be aware of injuries from ricochets and debris when being shot at! In hostile environments and combat zones maximum use should be made of what light, medium and heavy weapons available. Make maximum use of smoke dischargers where available and use the smoke to cover your movement. Commercially smoke signals are available from maritime stores as they are used for emergency signals on boats, also various smoke bombs are used for paintball and airsoft games. In a major city chances are you cannot carry firearms but can legally carry a couple of smoke bombs, if an active shooter situation develops drop smoke and bugout!

It is very important that you understand the difference between cover from view and cover from fire; you always want to locate the latter where possible. You need to consider Where the rules of engagement allow, suppressing which type of rounds will be stopped by the cover you’re fire can be directed at the using. A table might be able general area of the sniper’s to stop a .32 fired from a location to force them into handgun, but a .50 round from or keep them behind cover, a M82 will go through it and so you can move to a safer you. cover or extract from the sniper’s kill zone. Look for and If planning the defense for a shoot at objects close to the building you need to consider sniper’s position that would

26


COUNTERING SNIPERS what caliber of rounds the inner and outer walls can stop. Also, where large caliber rounds can penetrate walls you can expect bricks and plaster to splinter within the rooms and cause injuries. You also need to take note of any surfaces that would cause incoming rounds to ricochet within the building.

• Thick trees • Various areas of a car • Curb stones • Re-enforced barriers

When you get into cover, you should always try to have an escape route and try not to get pinned down. When using cover as a shield, always keep low and fire or look around cover- not over it. When you Cover from view means you are in cover and need to move, first select the next piece of can’t be seen but can be cover that you will move to shot and includes: • Cardboard boxes and empty and move fast and keep low. Keep the distances between rubbish bins cover positions short. When • Bushes you get behind the cover, • Thin walls and fences assess your situation, where • Thin tabletops the threat is, etc. Keep moving • Doors this way until you are out of • Shadows danger. Cover from fire means, Hunting the hunters depending on the firearm When a sniper threat has been used, you can’t be seen or identified and you have the shot and includes: trained personnel, weapons • Thick tabletops and are within your rules of • Heavy furniture engagement, you should take • Stone and concrete walls • Dead ground

27


CIRCUIT MAGAZINE ISSUE 38

active measure to eliminate or capture the sniper. Potential indicators that threat snipers are in your area could be: • Personnel seen wearing camouflage uniforms • Individuals in possession of binoculars, range-finders, and well-maintained scoped rifles • Hearing single-shot fire. • A lack of locals in an area before a shooting incident • Reflections spotted from optical lenses • Small groups of (one to three) local personnel wandering around or observing your location for no apparent reason. To capture or eliminate a threat sniper you need to identify a pattern in their modus operandi such as: • Time of day of sightings or shooting • Direction of incoming sniper fire • Location of threat sniper sightings • Patrols would need to look

for material evidence of threat snipers being in a location such as broken foliage, hide positions, cigarette butts, food, body waste, empty rounds casings or discarded equipment Once a pattern in the sniper’s routine has been identified, be it the location of a potential firing position, a route in or out of that position a covert ambush would need to be set and the sniper killed or captured. Note: Kill or capture operations need to be kept on a need to know basis, regular routines need to be maintained as not to alert the threat sniper or surveillance that they are being targeted. Conclusion Hopefully this article has given you an insight into countersniper operations and will enable you to draw up some plans and procedures to fit your needs and circumstances. Sadly, we all need to keep the threat from active sniper shooting in mind and be prepared to deal with worse case scenarios.

Orlando Wilson has worked in the security industry internationally for over 25 years. He has become accustomed to the types of complications that can occur, when dealing with international law enforcement agencies, organized criminal and Mafia groups. He is the chief consultant for Risks Inc. and based in Miami but spends much of his time traveling and providing a wide range of kidnapping prevention and tactical training services to private and government clients.

28


PERSONAL COUNTERING SECURITY SNIPERS IN HOTELS

59 37


CIRCUIT MAGAZINE ISSUE 38

How to spot a

By: Wille Heino

VEHICLE-BORNE IED

This article is going to focus on vehicleborne IED attacks, but we will rule out the targeting of individuals with car bombs as this falls more into the category of targetted assassination. Instead, this article will focus on the use of VBIED’s as a means to kill and injure indiscriminately.

30


VEHICLE-BORNE IED

31


CIRCUIT MAGAZINE ISSUE 38 The real subject matter experts in this field come from the military. Soldiers deployed to war & conflict zones are dealing with this threat on a daily basis. However, for the purpose of this article, let’s view the subject from the point view of an executive protection team. The knowledge gained through the examination of this threat will be particularly useful to RST teams (Residential Security Team), those charged with the guarding of critical infrastructure, and event security personnel. Typically, I find myself engaged in the process I’m about to describe whenever I’m patrolling the premises of a principal’s house or deployed upon a task involving the protection of critical infrastructure. Before we dig deeper into this subject, let’s look at the terminology and understand a few key terms. IED: Improvised Explosive Device. An improvised explosive device (IED) is essentially a bomb, constructed and deployed in ways that differ to conventional military

exploding devices. Simply put, it’s a homemade bomb. The parts required to build one and the methods in which it is deployed can vary, though the most common types tend to be roadside bombs. VBIED: Vehicle-Borne Improvised Explosive Device. The term VBIED specifies the delivery method used to transport the exploding device to its intended target, in this case, a vehicle. PBIED: Person-Borne Improvised Explosive Device The most commonly encountered PBIED would be an explosive vest worn by a suicide attacker. Now that we’ve got the terminology in order let’s consider what you should be looking for when tasked with protecting a client or securing a venue. Indicators Indicators to look for include: Cars that look heavy, a chassis sitting low on the axle and especially those with a greater amount of weight at the rear.

32


VEHICLE-BORNE IED

Be alert to any visible wires, antennas, and batteries outside or inside the vehicle that are not normal. Vehicles that are parked illegally or parked in a noparking zone, especially when located near to exits or where there is a heavy flow of pedestrian traffic. Cars with tinted or covered windows, particularly when this is not in keeping with the make and model. Vehicles that have had their license plates removed or visibly altered. Vehicles with large containers inside, such as boxes, barrels, tanks, and large bags. Be suspicious of loads that are concealing their cargo with blankets or other materials. If there is an unusually strong smell of gasoline, propane, or other similar chemicals. Be alert to any visible wires, antennas, and batteries outside or inside the vehicle

33

that are not normal. You should be cautious of vehicles which seem abandoned, or those that have appeared during the hours of darkness. A driver who is wearing some form of disguise or is trying to avoid being recognized. Drivers who refuse to answer your questions when challenged or seeming overly aloof. If you encounter a situation with two or more of the factors described above, then you may want to be extra cautious in approaching or searching the vehicle. Entering the kill zone There are several different methods in which the VBIED can be brought to the kill zone, here are some examples.


CIRCUIT MAGAZINE ISSUE 38 Passive penetration meaning it comes without permission but doesn’t use force to enter, for example, tailgating.

bombs in 2007. Two cars loaded with explosives were intended to kill people coming out of a popular nightclub. You can do a google search for more in-depth information, but the Aggressive penetration point I want to highlight is where a vehicle enters the that the bombs were found area by force, breaching by accident by an ambulance barriers, gates or buildings crew that came to the scene in the process. Deception where the attackers use fake to handle another incident. They came across a few of id’s and/or permits to gain the indicators listed above, entry to a restricted area. reacted accordingly, and fortunately discovered the device. Proxy - where the person driving the VBIED is not the Norway, which is considered attacker but delivering it to be one of the most on their behalf. An example peaceful countries in the of this would be where the world, suffered tragic events driver is under duress due in 2011 when a massacre to extortion or kidnapping was initiated after a parked of a family member. This vehicle full of explosives is a very effective way of detonated in front of the launching a VBIED attack prime minister’s office, into a restricted area. killing eight people and destroying nearby buildings. History Attacks using vehicle-borne The future IED’S are not a new thing. Unfortunately, we are going They are currently being to continue seeing these used in war and conflict types of attacks again and zones all around the world. again. Why? The answer We have become used to lies in their simplicity, not hearing news about car bombs detonating in hostile to mention, it is relatively cheap and easy to make regions like Iraq or Syria, VBIED’s. The materials but, historically they were commonplace in Europe too. required to make improvised explosives aren’t particularly Remember the London car

34


VEHICLE-BORNE IED difficult to acquire, though intelligence agencies and the police monitor the flow of such materials. The allimportant vehicle, which serves as the delivery platform can be stolen, loaned or rented with considerable ease and there is a surprisingly low risk of actually being caught. Large quantities of bombmaking material, loaded into vehicles, can easily avoid detection, especially in nonwar zones like in the Nordic countries. Here, security personnel don’t routinely face these types of threat, and consequently, they are not practiced or instructed in threat detection and mitigation. Combatting the threat So how do we better protect

against this threat? One basic, yet essential thing we can do is to ensure that the relevant people receive regular training on how to spot a VBIED threat. Next, we need to start implementing specific access control procedures in venues we are tasked to protect. We can reinforce buildings, so they are better prepared to withstand a blast and enforce a minimum standoff distance between parked cars and buildings. Additionally, the strategic placement of vehicle barriers will add another layer of defence. These are just a few things, to begin with, and while VBIED’s may not be your top priority threat in an executive protection setting, it is still vital that you know how to spot one.

Gambeson is a security training & consulting company specialized in countering modern day threats. Wille Heino, Security Specialist gambeson wille.heino@gambeson.fi

35


CIRCUIT MAGAZINE ISSUE 38 By: David Hammond

I am a late developer.

I left school at the age of sixteen with just three, very poor, O levels. Following that I floundered around doing various blue collar jobs: I’ve been a postman, a railway guard and a warehouseman, just to name three of the 20-odd occupations I have had. I went to college and became a qualified secretary at the age of 30(ish) and after a prosperous career as a sports journalist, I went to University to get a degree in psychology at the ripe old age of 50.

into security work, being trained by a psychiatric department to look after hospital personnel, patients and visitors. I enjoyed it and found out I was good at it.

During the intervening years I had done a little pre-SIA security: I’ve done the raw, basic static site security, looked after a band and even done some dubious debt-collecting, but when I went to University I found myself thrown properly

For me, it was a relatively short hop to go on and get my Close Protection badge. I was fully aware that my age was against me reaching the top of the tree, but I was also aware that my lack of contacts in that field would slow me down as

36


I AM A LATE DEVELOPER

The elephant in the room at this stage, however, is the ability or lack thereof of someone of my age being able to keep up physically with the demands of close protection work.

well, not to mention my lack of military experience. But I spoke with many people whose opinion I valued and, all things considered, my life experience, my martial arts expertise and my general demeanour suggested that CP was something that I would be able to do and do well, despite my lack of experience and my age.

37

On reflexion, however, it is precisely my experiences and age that makes me ideal for certain aspects of close protection work. For many years, probably dating back to my secretarial days I have considered that the biggest word in the English language is ‘communication.’ It’s understanding was integral to my career as a journalist,


CIRCUIT MAGAZINE ISSUE 38 but fully understanding its ramifications comes with age and experience. The nuances of it, including body language, facial expression, tone of voice and distance are all things that you learn through life: I went a step further, studying them from a psychological aspect.

going to be a shrinking violet, either. S/he will see that I know who is the Boss without my disappearing into insignificance, or worse still being sycophantic.

Perhaps that understanding came from my being a trades union rep. Experience, of course, is no Communications is obviously guarantee of understanding. a key element of close It is said that Napoleon’s protection work as well. donkey went everywhere It’s not just about talking, with Napoleon, but learnt its listening, watching and understanding; it is working nothing of tactics and strategy. I have learned how in partnership with clients, to tell somebody something principals and the public; they don’t want to hear it is liaison with other without having my head agencies and yes it is the taken off; I know through utility of violence too. All training and experience these things I brought with when to speak, when to me to my new role, at a level that, with due respect, be silent, when to move backwards and when to many young men simply move forward. do not have. I know how not to overstep the mark These sort of skills have in terms of familiarity with been put to the test for me my principal, but I am not

It is said that Napoleon’s donkey went everywhere with Napoleon, but learnt nothing of tactics and strategy. 38


I AM A LATE DEVELOPER in more environments that I can think of. I have acted as an agent for others, I have negotiated my way out of hostile situations and I have planned large events, taking into account everything from accommodation, liaison with police and councils, schedules and travel. The elephant in the room at this stage, however, is the ability or lack thereof of someone of my age being able to keep up physically with the demands of close protection work. It was remarked recently that perhaps the company that trained me should not have taken my money because I was unlikely to get work due to my age. That is a very short sighted view, and thankfully wrong. I suspect that the person that made the remark was unaware of my history. Not just the stuff I have already alluded to, but my physical capabilities. Being a martial artists is a seriously useful advantage in this field and I am a serious martial artist: I

have taught transferable skills to professional rugby players: I understand body management and I know what violence does to the body in physiological terms. On a weekly basis I get my heart rate up and I sweat to improve my physical condition, my reactions and my general health. I still work the sort of doors where I have to take physical intervention somewhat more seriously that the SIA seem to. Since I gained my CP badge I have looked after a number of well-known people and I have looked after court witnesses: I have worked in teams and I have worked as an Individual Bodyguard. I have enjoyed my work and my client feedback has been good. I know I have a shelf life in this industry, as do we all, but I would like to think that my potential clients understand that when they get a CP of my age they get experience and knowledge, not an old has been or Napoleon’s Donkey.

David Hammond is judo and self-defence instructor who also works as a Close Protection Officer and Door Supervisor. His experience includes working with bands, television and court witnesses and he specialises in Individual Bodyguarding (IBG). He can be contacted at david@dthprotection.com

39


CIRCUIT MAGAZINE ISSUE 38

CHURCH SECURITY: THE NEW FRONTIER PT. IV By: DR. ANDREW P SURACE

I have many happy memories as a child going to church regularly being with my friends and family. One day however sticks out in my mind above all others. On this day, a man keeled over in the pew in front of me and the havoc that ensued is still clear in my memory‌ Emergency. Since there are no guarantees that you will never be involved in an emergency, this article will help you to understand some of the things necessary to properly handle, or ideally help prevent, a crisis situation in a house of worship.

someone breaks all the laws, proper behavior patterns, policies and finally the peace of a church meeting to bring about a bad or negative result.

Whose emergency is it? The simple answer is that a church emergency What constitutes an belongs to everyone. Most emergency? emergencies in a church will Well that might be the first question that should be asked. affect every member, visitor and sometimes the entire Just like a miracle breaks all community, in attendance the laws of nature to bring or not. Most recently in a about some super-natural small town in Texas where outcome, an emergency in the unthinkable happened, church is when something or

40


CHURCH SECURITY

The first thing necessary in all church safety is having people know that if you see something say something to the proper authorities.

41


CIRCUIT MAGAZINE ISSUE 38 and changed. One of the main causes that bring about emergencies in a church is that the very people that are there to get help are dealing with toxic relationships in their lives. The number one crime when church is in session is domestics. Very often angry husbands who The idea of church security, think their significant other is like any type of security, is being unfaithful, perhaps with to stop intentional harm, someone in the church, even unintentional harm and the Pastor. Domestics can embarrassment. Security be very dangerous because is not a clean up crew, it is of the passions they enflame more a overt or covert team in a person. Even police that stands ready to spot a departments are cautious potential problem before it becomes an actual one. Much when dealing with domestic situations. like a fire spotter in a tower looking for a small brush fire The Person before it becomes a major The first question about an forest fire, that is the picture of your church security team. emergency is who determines whether or not we will interrupt the entire service The People to say something is wrong? Every day millions of people Whether it is an assistant all over America sit in church Pastor, the Pastor’s wife, the buildings trusting that they will leave encouraged, blessed head usher or the head of not only were the church members profoundly affected, but the effects rippled through the town, the state and even nation. So while no one owns an emergency some are more ready than others to deal with.

42


CHURCH SECURITY

Having trust in those people given the responsibility to call out an emergency is vital to both the Pastor and the congregation. security, someone has to have the ability to totally change the atmosphere in a church service. It won’t be the Pastor because he will usually be preaching, involved at the altar or possibly be the target. Having trust in those people given the responsibility to call out an emergency is vital to both the Pastor and the congregation. Once the person determines there is an emergency he must communicate to the right people ready to deal with that situation. Another thing to think about is if the Pastor for some reason cannot function, who steps in to take his place and speak peace to the congregation. The Plan Once you have decided there is an emergency taking place do you have a plan to deal with that particular type of emergency? If it is a medical emergency, do you know where your Doctors, Nurses or EMT’s are seated? Many churches have special seating for medically trained people so in the case of a medical

43

emergency they know where to find them. If for some reason you need to lock down the building; perhaps an active shooter or a domestic situation with a child involved, again is there a process to isolate an area or the entire building until the situation is under control? Is someone responsible to call the police, fire or rescue squad? When adrenalin is flowing and lives are at stake, simple things like this sometimes don’t get done quickly enough or maybe not at all. Preparation You start saving for retirement when you are young and healthy. You tune your instrument before the concert, and yes the time to prepare for emergencies are before they happen. Whether your emergency is medical in nature, a fire, or criminal act, there are things you can do to mitigate the damages. First Aid kits, fire extinguishers, flashlights, emergency lights and door hardware are all great tools to get a jump on an emergency situation.


CIRCUIT MAGAZINE ISSUE 38

However, your greatest weapon is an alert and trained team of people who have gone over various scenarios on a regular basis and have knowledge and desire to see it come to a quick and painless end. This team will not only help bring peace to your congregation it is a great tool for men and women who want to serve the church in a way that is a little different than teaching a class or singing in the choir. Policies At times you can avoid an emergency just by having good policies in place. Policies are powerful tools not only to prevent problems but also to eliminate people from feeling profiled or not given a fair chance. For instance, if a church has a policy that

any Sunday School Teacher must go through a careful Background check before teaching, there is a very good chance a pedophile will not apply for the job. Policies are especially good to let visitors know there are safety measures in place to protect both them and their children. Finally, good policies can keep your people from having to make quick judgments in areas they are neither qualified nor have the authority to do so. In closing, while emergencies can be anything from a little nerve-wracking to deadly, preparation, training and a mindset that is always looking for a problem before it becomes one will make your church a much safer place.

Dr. Surace is a seasoned Pastor with over 35 years of ministry. He is a trained EMT and executive protection specialist. He along with co-Author Eric Konohia are authors of a book on the subject of church security entitled “Securing the Sacred�. It is available on Amazon as well as bookstores around the world.

44


KEEPING YOUR EDGE

Keeping Your Edge: Don’t Get Comfortable

Every Protector yearns for the point in their career when they can lock in their dream client: One that will respect their work both professionally and financially. That is the brass ring in our business, AKA the sacred cow, however, on the road to eating Filet Mignon, there are bound to be several Big Mac’s along the route. So, as we proceed on this journey to success, we have to make sure we navigate the potholes, namely, doing the job as required without becoming too comfortable in

45

By: Elijah Shaw our role, leading to potentially disastrous results. Throughout my career, I’ve seen an unfortunate occurrence happen time and time again. An agent works hard to reach an established position with a client and after a length of time, sometimes months, sometimes years, they do something that gets them removed from the Detail.


CIRCUIT MAGAZINE ISSUE 38 Now there is absolutely no doubt about it, some VIP’s are just temperamental, and their need for security, or the removal of their current team could change based off of a number of different factors, none of which could have anything to do with job performance. It could be financial, coming in the form of a phone call from the business manager who advises the Protectee that he has been overspending for the past 12 months and there have to be some budget cuts. When faced with paying for their 2nd Lamborghini or paying for security services that perceptually they may or may not need, some clients will choose the wheels with little hesitation. In other cases, the separation of services is justified, say the Protectee had a specific threat

against them and they were utilizing your services until that threat was mitigated (i.e., a stalker that was jailed) they may then scale back security or suspend it all together, such is life in the business world, and as I always say, even high net worth individuals count their dollars – about certain things. However, another example leading to separation of services it the worst simply because it could have been avoided, and that’s the dreaded monster of complacency that seems to strike some in our profession. It’s like after a while we forget how badly we initially wanted the assignment, not to mention all of our promises that, if given the opportunity, we would be the hardest working, most diligent agent ever. Instead, we start of

Paying for their 2nd Lamborghini or paying for security services that perceptually they may or may not need, some clients will choose the wheels with little hesitation.

46


KEEPING YOUR EDGE sharp as a sword, and slowly over time we become duller and duller until we have about as much value as a Toys-R-Us prop in the real Trojan War.

overly accommodating, and the agent takes advantage of that to their long-term determent. While there are some “buddyguards” who have survived in this business, Particularly in the most, have found themselves entertainment sector, I can see unemployed once their client a direct correlation between came to the realization that this type of complacency and if they are paying someone a the status of the Protectee. professional wage they need a Meaning, if we are working professional service, not a new with the next big thing since friend. When that agent then sliced bread and the artist gets the rug pulled out from demands, from private jets to under them, their response is 5 star accommodations, are often shock, disbelief and even immediately taken care of, anger. However, if they were sometimes the trickledown to look objectively back on effect makes us feel like the situation, they might see we too are a star. If that’s that they might have painted the mindset, consciously or themselves into a corner by subconsciously, then it will allowing the VIP to view them start to affect how we go and how they carry themselves about our days. I mean, if the in a different light. artist is always 15 mins late, why can’t we be? If the artist Don’t get me wrong, I am not gets free clothes and other saying there is only one way merchandise gifted to them, to interact with clients. In what harm can it be to ask fact, I am a firm believer that for some for ourselves? The you have to have different slippery slope then becomes approaches to different client easier and easier to slide types if you want long term down and everything is great… success in this industry. With all the way until the client or that said, it’s vitally important their senior handlers notice that whatever your approach, that you are enjoying yourself you always present yourself a bit too much, especially as in a professional manner that they are paying you to be can’t be picked apart. That there. does not mean you can’t have a personality, or enjoy some The other group I see it with of the fringe benefits that in entertainment, is Protectors sometimes come with the working with new artist who job, but we do need to makes themselves don’t know how sure we do not sacrifice long they are supposed to interact term stability for short term with security. The client is comforts. Elijah Shaw is the National Director of the North American Bodyguard Association and an international security consultant.

47


CIRCUIT MAGAZINE ISSUE 38

Platinum Sponsor

Organised by

Supported by

The 6th annual Duty of Care - Protecting Workers and Expats overseas conference will recap on the basics of duty of care, corporate liability and the risks which travellers and expats may face overseas. • Are you simply putting in the measures to protect your company legally or are you proactively protecting your travelling workforce? What is the difference? • Who is the risk owner? – The challenges around identifying key stakeholders who are responsible for developing and implementing a travel security policy. Sessions will explore how you go about evidencing informed consent, how you create or update existing policies which will still resonate and satisfy the demands of today’s travellers yet be sufficiently robust to protect the employer in court. As connectivity continues to be a vital component for our travellers, the conference will discuss the latest advice on travelling with devices and why the old rules no longer apply. Through case studies and scenarios, delegates will be able to assess how their own corporate culture and policies compare with those of their peers – and where they could be exposed.

www.dutyofcareconference.com Book online at www.regonline.com/dutyofcare2018 www.contego-events.com


THE SILENT SNIPER

THE SILENT SNIPER: PTSD & THE BATTLEFIELD

By: Garry Curtis

Like most people, I’m readying myself for Christmas. Which is strange, to me at least. Because this will be one the first years that I’ll be at home and not in a warzone. As a hostile environment consultant, I’ve spent countless Christmas Days in battlezones, often behind enemy lines, and almost always with one or more VIPs to protect. You might be forgiven for thinking that a life on the frontline is exciting, even glamorous. And on occasion, it is. But for the most part, my job is nothing of the sort. It’s dangerous, it’s far from

48

well paid, and it’s stressful. And I mean, stressful. Nothing focuses the mind more than the sight and sound of a guerrilla army and its arsenal of fullyautomatic weapons. And nothing destroys the mind more than the sight of women, children and innocent civilians lying dead or dying at one’s feet. Some men/women cope – just. I have seen others turn to alcohol, drugs – and sometimes violence – to drown up the screams, smells and


CIRCUIT MAGAZINE ISSUE 38

ongoing flashbacks. Still others, me included, break down. The icing on the cake is that these issues can then, in turn, lead to relationship problems and financial difficulties from loss of work. It’s what happened to me and it’s a vicious circle that can prove impossible to escape on your own. I don’t scare easily. I was a Royal Marine Commando with tours in Northern Ireland. And I’ve worked variously as a fireman and boxer. I’ve been in countless firefights and

countless more fist fights with worse-than-lousy chances. But nothing hits as hard as depression, a kidney punch of a condition that can fell even the strongest, bravest men and women without warning. I’d always prided myself on my inner strength; on being the man who others could depend on with their lives. Unfortunately, that same pride contributed to my fall. In 2012 I suffered life-threatening injuries while working in Afghanistan. I was off

50


THE SILENT SNIPER

my feet for the best part of 18 months and, being self-employed, there was no cash coming in from sick leave. The stress I was under, compounded by having no money, was a perfect storm, but one I didn’t recognize until it was almost too late. I was diagnosed with depression and with posttraumatic stress disorder (PTSD) in 2016. In many ways, it came as a relief. For the first time in years, I was able to blame something – anything – for the way I was feeling.

51

Until then, I’d struggled to cope with increasingly dark thoughts that made me feel like I’d had enough. I’d avoided counselling, too. Me, Garry Curtis – the Garry ‘Gazza’ Curtis, known for his fearlessness and iron chin – would have rather died than sit in a shrink’s chair. At my lowest, I attempted to commit suicide. I’d always considered it a coward’s way out, but I’m not ashamed to admit that PTSD brought me to my knees. But I was pulled from the abyss into which


CIRCUIT MAGAZINE ISSUE 38

This selfless dedication, support and care has got me to the place I’m at today I’d fallen by two former Royal Marine Commandos with whom I’d served. They introduced me to Rock2Recovery, a charity that helps servicemen and women with mental health illness. I came to realise that ‘mental health’ is not a dirty word.

Here’s what a former special services operative, who wishes to remain anonymous, said about the charity when I first met her: “I had twice attempted suicide and on the day of speaking to Rock2Recovery, had every intention of making it third time lucky. But

52


THE SILENT SNIPER

Rock2Recovery saved – and changed – my life. I went from experiencing three flashbacks each day to just two in 11 months. I have a personal coach, someone I can speak to at literally any time of the day or night, 365 days-a-year. This selfless dedication, support and care has got me to the place I’m at today – happy again, at last.” Garry Curtis is a former Royal Marine Commando and one of the UK’s most respected hostile environment consultants, whose clients have included the BBC war correspondent, John Simpson. Here Curtis, 49, lifts the lid on the hardest enemy of them all – PTSD. His book, Incoming! hits the UK shelves this week, available on Amazon UK as a paperback or eBook, with proceeds going towards mental health charity, Rock2Recovery. Incoming! by Garry Curtis(FastPrint Publishing) is out now in paperback priced £10.57 or available on Amazon UK.

53


CIRCUIT MAGAZINE ISSUE 38 By: Stephen Langley

Insider Threat

The insider threat of crime to organisations is always present and can manifest itself in many ways. This has become more apparent because of the recent socialeconomic climate change within the UK.

54


INSIDER THREAT

55


CIRCUIT MAGAZINE ISSUE 38 Experience has shown over the years that an overreliance on technology without consideration of other factors can have disastrous results for managing the insider threats. One of the main concerns in relation to this area is that of an individual or individuals that would be aligned to cause illegal activities within the organisation. This has resulted in a large emphasis being placed on the identification of any potential harmful individuals.

Infrastructure Advisory Council (NIAC) which provides the United States of America’s President with advice on the security of the critical infrastructure sectors and their information systems produced a primary goal of to address the assigned tasks to develop policy recommendations to improve their security posture of the Nation’s critical infrastructure. NIAC produced a report during which they stated; ‘The insider threat….. is one or more individuals with the access and/or inside knowledge of a company, organization or enterprise that would allow them to exploit the vulnerabilities of that entity’s security, systems, services, products or facilities with the intent to cause harm’ (NIAC, 2008, p. 12).

Cappelli et al 2006 identifies insider threats as “current or former employees or contractors who targeted a specific individual or affected the security of the organisation’s data, systems and/or daily business operation”. There is an emerging risk presented by insiders within organisations. From research that was conducted during 2010 within the United States of Insider threats exist for all America, Catranzos stated organisations, essentially, “All a hostile insider needs this threat lies in the to carry out an attack are potential that a trusted access to a worthy target, employee may betray their an open door, and a dark obligations and allegiance. It is thought that the threat corner from which to study and strike”. posed by insiders is one most organisations neither Insiders are not just understand nor appreciate. employees; they can include During 2008, The National

56


INSIDER THREAT

Insider threats cannot only destroy the infrastructure of an organisation but can also instil a sense of trepidation.

contractors, business partners, auditors or individuals that work within the same locations (these present what can be called third party risks). Employees, contractors and even temporary staff are usually provided with the same if not similar access within organisations (NIAC, 2008, p. 12). This access is usually legitimately required to conduct their work that they are being employed to do, but can be taken advantage of to commit ‘insider’ attacks. There are also individuals whose ambitions are to be employed within an organisation and have the sole purpose of conducting industrial espionage. Insider threats cannot only destroy the infrastructure of an organisation but can also instil a sense of trepidation. It is an adversary that can provide assurance to the nearest competitor or ally, not only showing any flaws but more importantly highlighting their vulnerabilities. Catranzos deemed it more important since the tragic events of 9/11 and the continuing aftermath during

57


CIRCUIT MAGAZINE ISSUE 38

security company conducted surveillance whilst carrying out his legitimate role within the depot to facilitate a large scale robbery and kidnap utilising his ‘insider knowledge’ (BBC News Online, 21st February 2006 Securitas robbery). Also it was reported that an employee of the Northern Bank based in Belfast, Northern Ireland helped to plan the largest bank robbery within the UK of £26.5 million which was carried out on 20th Such high profile insider acts December 2004. The alleged individual changed the staff as those at Barings, Worldduty rota to allow him to be Com and Enron provide on duty and have access to examples of what damage can be done. During 2006 an the vault key. It was stated that during the case the employee of Securitas the which it has been identified that risk and vulnerability assessments have propelled, with the federal subsidies promoting them, the security focus centred largely on the vulnerability of large populations to attack. Adversaries’ have typically been characterised as traditional attackers working as outsiders who generally approach their targets with the determination of succeeding in their objectives.

58


INSIDER THREAT facts could be established to properly infer the robbers had “a high degree of inside knowledge,” and that it could only have come from a member of staff (Northern Bank robbery, 20th December 2004).

of insider threat, however most research conducted had failed to precisely define what is an insider threat- instead, it has been assumed that the end user inherently understand their own version of a definition.

In a report titled ‘Human factors in information security; The insider threat – Who can you trust these days?’ written by Carl Colwill, (2010) identifies that organisations may not have the effective risk management regimes to deal with the speed and scale of change. Also he states that the lethal consequences of armed insiders turning against their colleagues was demonstrated in November 2009 to UK forces in Afghanistan and US forces at Fort Hood USA, both of these were reported upon by the BBC News in 2009.

In 2005, whilst Bishop was employed by British Telecom (BT) to enhance their security package he defined insider threat as “a trusted entity that is given the power to violate one or more rules in a given security policy… the insider threat occurs when a trusted entity abuses that power.” (Bishop, 2005). This definition identifies that there is a specific need to recognise that an insider must be determined with reference to some set of rules that are part of a security policy.

Defining the insider threat It can be argued that the lack of a consistent definition of an insider hinders research in the detection of threats from insiders. Many researchers have investigated the area surrounding the problem

59

Hanley et al (2011, p. 1) stated that it is hard to give a definition of the insider threat, and that there is debate around whether contractors should be included into the definition as possible insider. Cappelli et al (2006) identifies insider threats as “current or former employees or contractors who targeted a specific individual or affected the


CIRCUIT MAGAZINE ISSUE 38 security of the organisation’s data, systems and/or daily business operation”. Hanley et al also include debate around someone who may start as an ‘outsider’ but through gaining access by unauthorised means would then be deemed an ‘insider’, for example through hacking into a company network (2011, p. 1). There have been numerous attempts to offer a definition of the term ‘insider’, with the majority providing various similarities with re-occurring themes.

p.1) stated ‘the risk that a trusted or authorized person will participate in a behaviour that causes damage to his or her employee’, this can be included and found within acts of fraud, terrorism, sabotage, theft, cyber-crime and espionage and also more importantly whether or not the acts where deliberate or accidental.

Understanding the nature of the insider threat Hanley et all further noted that ‘insider cases are underreported’ (2011, p. 4) and cited the Cybersecurity Whilst conducting the review Watch Survey (by Deloitte, the US SS, CSO Magazine for established definitions the author identified his own and CERT) which stated that version of an insider threat: during their research 72 per cent of reported events “as anything that is were investigated internally done to jeopardise the without any legal or law proper functioning of an enforcement involvement, organisation’s business (CSO 2010 cited in Hanley whether deliberate or et al, 2011 p. 4). Cappelli accidental by employees”. et al (1991) stated within For a generalised term, Shaw, Fischer & Rose (2009, the insider IT misuse their

Nearly 60% of all security threats come from internal sources (Gupta, 2003). 60


INSIDER THREAT

security of the organisation’s data, systems and/or daily business operation”. Hanley et al also include debate around someone who may start as an ‘outsider’ but through gaining access by unauthorised means would then be deemed an ‘insider’, for example through hacking into a company A 2003 survey by the network (2011, p. 1). As FBI’s Computer Security identified earlier by Bishop Institute and Ernst and (2005), an insider must be Young showed that nearly determined with reference 60% of all security threats to some set of rules that come from internal sources is part of a security policy (Gupta, 2003). Cappelli et and this is primarily al (2006) identifies insider threats as “current or former represented by the access control rules employed by employees or contractors an organisation. An insider who targeted a specific can therefore be defined individual or affected the needs to be clarification that separates an IT misuser from a person that uses the available resources in an acceptable way and for an approved purpose. Insider threat mitigation begins with a complete understanding of potential insider threats.

61


CIRCUIT MAGAZINE ISSUE 38 with regard to two primitive actions: • Violation of a security policy using legitimate access • Violation of an access control policy by obtaining unauthorised access. In Queensland in 2000, a wireless laptop was used to release untreated sewage by a previous employee who ‘was apparently taking revenge against former employer’s’ (Evans, 2005, p.76). It has been reported (Raywood, 2008) that the placing of moles by criminal gangs, especially in financial institutions is becoming more common. The Department for

Business Enterprise and Regulatory Reform (BERR, 2008) concluded that after researching in the UK many organisations are still inapt at protecting themselves and their customers’ information: 52% do not carry out any formal security risk assessment; 67% do nothing to prevent confidential data leaving on USB sticks, etc; 78% of companies had computers with unencrypted hard discs stolen. Why and how the threat is perceived The National Infrastructure Advisory Council (NIAC) stated ‘preventing all insider threat is neither possible nor

62


INSIDER THREAT economically feasible’ (NIAC, 2008, p.13). Companies or organisations that are at the receiving ends on such insider attacks are rarely confident in discussing the attacks because these acts can weaken or destroy public trust, share price value, and financial solvency, all of which are necessary for a company to operate (NIAC, 2008, p.14). In 2008, Cole stated “The insider threat is like a tumor. If you realise there is a problem and address it, you will have short-term suffering but a good chance of recovery. If you ignore it, it will keep getting worse and while you might have short-term enjoyment, it will most likely kill you”. NIAC also stated: ‘awareness of the insider threat varies greatly among the critical infrastructure sectors. Strong examples include the Banking and Finance as well as Nuclear sectors, which have an excellent awareness of the threat and have a robust risk mitigation approaches to insider sabotage insider fraud. Other sectors have varying levels of awareness and risk mitigation

63

If you realise there is a problem and address it, you will have short-term suffering but a good chance of recovery. .


CIRCUIT MAGAZINE ISSUE 38

64


INSIDER THREAT programs’. (NIAC, 2008, p.18).

million, and sold them to a Taiwanese competitor.

In 2007, the Computer Security Institute conducted a Computer Crime and Security Survey which recorded that corporate leadership understands that insider incidents occur, but it appears corporate leadership neither completely appreciates the risk nor realises the potential consequences. As a result, most companies do not actively manage their insider risks. (NIAC, 2008, p.18). Currently companies that have experienced insider incidents are reluctant to share this information because of the costs involved; insider incidents can cause lost credibility with shareholders, employees and customers, and negatively effect to shareholder values.

‘Human factors in information security; The insider threat – Who can you trust these days?’ written by Carl Colwill, (2010). Colwill further stated that security policies, controls, guidelines and training are lagging behind changes. Also he states that the lethal consequences of armed insiders turning against their colleagues was demonstrated in November 2009 to UK forces in Afghanistan and US forces at Fort Hood USA, both of these were reported upon by the BBC News in 2009.

The 2007 E-Crime Watch Survey found that in cases where respondents could identify the perpetrator of an electronic crime, 31% were committed by insiders. These impacts can be devastating to the point where one employee working for a manufacturer stole blueprints containing trade secrets worth $100

65

What control measures are available to prevent this? Why is it so hard to intervene and prevent an insider attack? There are several reasons why this can appear to be difficult. There are various whys development and deployment of approaches to addressing insider threats, particularly proactive approaches, are so challenging: The lack of sufficient real- world data that has some real truth enabling subsequent verification


CIRCUIT MAGAZINE ISSUE 38 and validation of proposed solutions; The difficulty in distinguishing between malicious insider behaviour and what can be described as normal or legitimate behaviour; The potential quantity of data, and the resultant number of ‘associations’ or relationships that may emerge produce enormous scalability challenges; Despite ample evidence suggesting that in a preponderance of cases, the perpetrator exhibited observable ‘concerning behaviours’ in advance of the exploit. (Greitzer and Hohimer, p.27)

Education and awareness is needed to, not only generate necessary security investment by all parties but it is also important to create awareness and vigilance among the workforce.

Within Colwill’s report he stated that in his experience the best course of action is to develop information sharing relations via a trusted ‘broker’, this has many beneficial results to create new security standards and raise overall levels of protection. Also it is highlighted by Colwill that insider risks need to be moved up in importance and discussed in boardrooms prior to attacks, not just after the compromise. Many forms of technology are available to protect

66


INSIDER THREAT Inadequate computer and network ethics education and training;

information but this is generally applied to identify and restrict outsider access with ‘off-theshelf’ products such as firewalls and intrusion detection systems. Outside threat attacks can be easier to detect and defend against, but the tools utilised to protect this are seldom scalable or cost-effective to apply to every employee who require access to the information or assets.

Prevailing attitudes about management involvement in workers’ personal lives; Suspicion for anything that looks like ‘big brother is watching’ –type monitoring programs;

Education and awareness is needed to, not only generate necessary security investment by all parties but it is also important to create awareness and vigilance among the workforce. Education and awareness programs are a key component that can be utilised to generate an organisational shift needed to change the cultural obstacles that exist to insider threat mitigation. Awareness amongst all senior management of their employees is also beneficial to allow them to understand institutional forces, NIAC recommend that organisations should consider the following preconceptions: Unquestioned and unverified trust of employees, after granting employment, especially for longtime employees; Poor operator-workforce union relationships; Employee expectations of rights and privileges versus obligations;

Attitudes about corporate sensitivity information. (NIAC, 2008, p.22). Due to the emergence of newer technology on such a large scale the threat of ‘Cyber Threat: State, Radical, Local, Mad Sad’, increases in the use of ‘smartphones’ mobile telephones with the email capability to the issuing of personal laptops. This is a key area to be considered with the growing number of individuals that could potentially lose unsecured laptops or more importantly by losing memory sticks/storage devices whether encrypted or not. If this did happen, it could lead to negative media attention. So therefore, when considering the best course of action in dealing with insider threat concerns and/ or actions to assist organisations the best non-technical measures to aid in a preventative action various departments will need to establish and implement a comprehensive set of non-technical measures to combat insider threat including: policies, awareness, legal, HR and whistleblowing. (NIAC, 2008, p.6).

67


CIRCUIT MAGAZINE ISSUE 38

The Placement Of Residential Security Systems What To Know Legally

By: Michael Lawson

Say that you’re responsible for implementing the residential security systems for your principal, and you have already contacted your security camera provider for the installation, but you’re confronted with the notion that your set-up is illegal. 68


RESIDENTIAL SECURITY SYSTEMS

It is essential to safeguard your principal, their family and even their business from criminal acts and other anti-social behaviors. Yes, you heard it right! Placing up security cameras can be a legal battlefield if you’re proven to be violating the law. So, below are the things you need to know, legally, when placing security systems around a property. The Need For Security Systems Around Your Client’s Property If you’re responsible for the protection of your client’s house or place of business, having dedicated security systems in place can be a necessity. An example of this is the CCTV system. It is essential to safeguard your principal, their family and even their business from criminal acts and other anti-social behaviors. However, these security measures could raise objection by some because of the presumption that these cameras are being used to spy on neighbors

69

or those merely passing by the property. In cases like these, it is imperative that you stop to consider the relevant factors regarding the need of the security system, the places you are going to use it and other alternative ways to protect the property from criminals. Legal Considerations To Know When Setting Up Security Systems Once you have determined the necessity of having a security system around a property, the next step is to consider it from a legal perspective. Installing a security system can be embroiled with legal issues. So, let’s check the things you need to know about these security schemes. Putting Up A Security System Can Invade Privacy Security systems such as CCTV cameras can actually be considered to be illegal,


CIRCUIT MAGAZINE ISSUE 38

You cannot just install your CCTV cameras for no good and justifiable reason and without adequately considering customers’ and workers’ sense of privacy. especially when there is a concern that they are being used to invade one’s privacy. As cited by law, you are not supposed to monitor someone without his or her express consent – and by doing so, you’re violating another’s right to a reasonable expectation of privacy. This applies to bedrooms, changing rooms, hotel rooms, bathrooms and other relevant locations. You cannot just set up a video surveillance camera without considering another’s privacy rights. It is in the law, and you’re expected to follow it. Not only that! The legal restrictions on setting up security systems around a property can also extend to commercial establishments. Although businesses are more public in essence, you cannot just install your CCTV cameras for no good

and justifiable reason and without adequately considering customers’ and workers’ sense of privacy. Furthermore, the recording of videos or audio in public places is also perceived as illegal. That is because it is considered as a violation of the wiretap law. Nobody is permitted to record any conversation or activities without the permission of the parties involved. At this point, it still best to say that one’s privacy enjoys supremacy over the freedom to safeguard possessions and property. Informing People About Your CCTV System Is Essential When you’re about to put up your security systems, it is always good if you are transparent with the people around you. Take time to inform them about these security measures and consider their

70


RESIDENTIAL SECURITY SYSTEMS concerns and suggestions. A good example of this are the owners of neighboring properties. Let them understand the need of having CCTV cameras around the property and the protection it can offer both parties in the long run. Another option is to make a notice informing people that video recording is taking place.

71

Being Responsible For The CCTV Security System Is Crucial When you’re finished with the installation of the security system, the next step is to check the following: • Ensure that the system is set up properly. • Study how it works when it comes to recording.


CIRCUIT MAGAZINE ISSUE 38 • Make sure that you’re responsible for all the recordings of the CCTV cameras. • Be sure to take care of all the information recorded and ensure that this information is not used for purposes other than for the security of the property. • Examine the system regularly to see if it’s working, and observe any unusual activities that are happening around it. • Check the positions of your cameras – and if it’s pointing in the

neighbor’s vicinity, take proper steps to reposition it to avoid complaints regarding privacy invasion afterwards. The Recordings Of The CCTV Cameras Can Be Used As Evidence Many people consider the primary uses of security systems to be for protection, but they are also a useful asset in the collection of evidence? The CCTV cameras, for instance, can be utilized as evidence when they capture information which

72


RESIDENTIAL SECURITY SYSTEMS

consequences of the security systems and any potential violations. In many cases your client Consult The Local will have legal advisors on Authorities Or An the payroll, so utilize this Attorney First When you are considering valuable asset. Doing so installing security systems will protect your principal and their family, but at a residence, you may be unintentionally violating moreover, it will protect and safeguard you, legally the surveillance laws in your area. If that happens, and professionally. you’ll be possibly facing Final Thoughts complaints and other If you’re thinking about legal matters along the the protection of a venue, way. So, if you want to above are the things ensure the authorized you have to know legally and safe applications of when placing up security your security systems, systems. In situations do the smart thing. You like these, it is good to can go and consult the local authorities in the city know your rights and the legal rights of others. The about questions involving bottom line is, ensure the legality of your security measures. If they your principal and their are not available, you can property is protected, also seek advice from your but do so without putting them, or yourself at risk of legal counsel regarding the protocols and probable prosecution. is helpful in a police investigation.

Michael Lawson is a US attorney, specializing in bankruptcy. He currently writes for BLC Law Center, for more information go to: www.blclawcenter.com

73


Leading international specialists in detection dogs and dog handler training

Explosives Detection Dog Handler Course NASDU Level 4 – £3995 (Module 1 & 2) This is an intensive, hands-on course, designed to teach individuals the necessary skills, understanding and knowledge to carry out explosive detection dog searches in an operational environment. Takes place at our Highfield approved Training Centre in North Wales. Self-catering accommodation available at discounted rates. 160 hours guided learning split over 2 modules. Module 1 10 Jan – 21 Jan 25 Apr – 6 May 5 Sep – 16 Sep

Module 2 7 Feb – 18 Feb 30 May – 10 Jun 17 Oct – 28 Oct

For further details or to book: Wagtail UK Ltd T: 01745 561166 info@wagtailuk.com www.wagtailuk.com


CLASSIFIEDS

Classifieds

United Kingdom 3D Security Ltd Taunton, Somerset, TA1 1TG Based in Taunton 3D Security provides security services for a wide range of clients. Whether you need a security guard in Somerset, event security in Leeds or Close Protection in London we will provide a solution for your needs. T: +44 (0)1823 253 001 W - www.3dsecurity.org E - enquiries@3dsecurity.org.uk

A.B.I. Solutions A.B.I Solutions is a dynamic, forward thinking company, specialising in surveillance, security and investigations with local, national and internationalexperience. A.B.I provides a wide range of services to the corporate sector and individuals alike. W - www.abisolutions.co.uk Amanda Campbell A highly motivated and experienced female operative both CP and Surveillence training T – 07596542249 W - www.amandacampbell.org.uk E - ac@amandacampbell.org.uk Ambassador Security Management ASM MK Lions Arena, Grafton Court, Snowden Drive, Winterhill, Milton Keynes, MK6 1AJ, GBR. After successfully gaining ACS (Door Supervision and Manned Guarding) along with ISO 9000, we here at ASM have a dedicated management team with hundreds of years combined experience in the security industry. W: www.asmsecurity.co.uk E: scott@asmsecurity.com T: 08458335750

designed to help both individuals and New Companies build for the future as well as support others with training needs. T: 07725970954 W: www.atlantianbsgroup.com E: info@atlantianbsgroup.com Briareus Security Our aim is to give a complete, discreet and professional service to all of our clients, be they large corporations, small businesses, local authorities or private individuals, all tailored to meet their individual needs. W: www.briareussecurity.com E: info@briareussecurity.com

Mark Corder - Chief Executive of Carmdale Ltd Suite 3 219 Bow Road London E3 2SJ Mark is a former Senior Police Officer specialising in counter-terrorism; firearms; public order; training and also physical, Critical National Infrastructure and nuclear security, having had responsibility for the security of the UK’s nuclear deterrent. A former Head of Operations, Operational Support and Training, Mark has been involved in a number large-scale incidents (including 7/7) and has also worked at the Office for Security and Counter Terrorism (OSCT) at the Home Office as part of a review into Critical National Infrastructure security. Mark has an MBA via the OU. E: mark.corder@carmdale.co.uk T: +44 (0)844 995 9900 W: www.carmdale.co.uk Alastair Christie Advice on site security, perimeter fencing, lighting, CCTV and manning requirements. Monitor and advise on guard force setting up site procedures and guard SOP’s. T : +44 (0)7736 328112 E : ally.c9496@yahoo.co.uk

Ark Personal and Asset Protection Ark, 2b Crow Lane, Rochester, Kent, ME11RF, GBR A small, efficient, highly descrete company employing ex special forces and detectives for all civil and corporate covert needs. E: Office@arkprotect.com T: +0044 01634 845526

Control Risk Management Solutions CRMS - Ireland Executive Close Protection Operations & Training (B Tec Level 3 Diploma Edexcel) Threat & Risk Assessments, Consultancy Services. W: www.crmsinternational.com E: martin@crmsinternational.com

Argus Europe County Durham Argus Europe has been providing specialist training for high-net worth clients and their families for close to 20 years, worldwide. Argus Europe now offer accredited training for CPO’s, Surveillance Operators and Private detectives. Argus Europe is an operational company working globally with an extensive variety of contracts. W: www.arguseurope.co.uk T: +44 (0) 8456 123 843

Crest Security & Surveillance Ltd 51 The Crest, West Heath, Birmingham, West Mids, B31 3QA, GBR Highly experienced Security Consultant with a proven record of accomplishment in the field of protective security. Skilled in all phases of risk assessment, operational planning, logistical organisation, implementation of security measures, security team leadership, project coordination, and delivery of security advice to a high profile clientele. E: info@stephencahill.co.uk T: 447977071427

Atlantian Business Solutions Group Rutland, LE15 6SD, GBR Atlantian Business Solutions has been

75

CSI Protection Ltd International, GBR A well established security consultant and personal protection operative providing high or low Key protection to high risk and prestigious clientele. Specialising in the maritime industry as a consultant for private vessel protection on super yachts world wide. W: www.csi-protection.co.uk E: gary@csi-protection.co.uk Custodia Custodia is an independent client focused Specialist Security & Risk Management Company, specialising in Risk consultancy and Security project management. Providing a comprehensive portfolio of Risk mitigation solutions to assist Businesses and individuals to plan for, manage and mitigate risk. T: 01432 277693 W: www.custodia.co.uk DF Risk Management Solutions DF Risk Management Solutions N.I. is a modern, professional risk management company, with a diverse range of global strategic experiences and a team of executives who possess dynamic but complementary backgrounds. T: +44 (0)7837642686 +44 (0)7758743918 W: www.dfriskmanagementsolutionsni. com Executive Protection Officer Worldwide CP services W: www.executiveprotectionofficer.com First Class Executive Security Nottingham, UK, Nottingham based, fullservice company specializing in Bodyguards and Security Consulting services. Extensive experience in VIP security, also caters for public and private sectors. W: www.firstclasssecurity.co.uk T: 0115 9266466 G6 Global G6 are specialists in all types of radio, telephony and satellite communications for both voice and data with particular emphasis on covert communications installations in both vehicles and fixed locations. In addition, our range of personal covert radios and bespoke accessories is extensive. W: info@g6-global.com T: +44 (0)1454 610050 Gordon Russell Highly trained frontline Close Protection Operatives available for UK and International contracts. Our experienced CPO’s can offer bespoke packages to meet all clients needs, including a variety of language skills. All SIA licenced, BBA member E: Bodyguard-cpo@Email.cz T: +44 (0)7917 281 004 Gareth Evans - CPO, MSO Reliable dedicated hard-working


CIRCUIT MAGAZINE ISSUE 38 security professional, with outstanding communication skills. Strategic approach to problem solving combined with exceptional interpersonal skills, quick to grasp new concepts and information. Highly motivated, results-driven and thrives under pressure. Strong leadership and management skills with proven experience committed to continuous personal and professional development. E : evansgareth1979@yahoo.co.uk T : +44 (0)7900058603 James Izett All close protection task undertaken, including training tasks. Medic (Registered with the HPCSA, Registered FAAW instructor and Assessor E : J.Izett@gmail.com T : +971 (0)505 574 350 Janice Gurney Proficient and diligent Security Professional gaining extensive knowledge and experience within the security sector. Proactive individual who has a logical, flexible and conscientious approach to all challenges undertaken, ability to work as a member of a team or as an individual willing to work anywhere. T : +44 (0)7885 793061 E : janice382006@gmail.com International Centre of Special Training International Centre of Special Training is an international training and security company based in the United Kingdom. Its priority objective is to provide services to the highest level. W: www.icost-team.com T: +44 796 736 55 65 IPSS Security Northfield, Aberdeen, AB16 7EX Security and protection services - UK and overseas. BBA Member. T: + 44 (0) 1224 69455 W: www.ippssecurity.co.uk ISS Training Ltd Riverside Cottages, Nidd Walk, Pateley Bridge, Harrogate, HG3 5NA ISS Training Limited are providers of specialist covert surveillance training courses and publications to the security and investigative industries, enforcement agencies and specialist military units. Formed in 1990, we are the longest established surveillance training ompany in the United Kingdom. Our credibility and reputation is widespread and we offer nationally recognised qualifications. BBA Member. T: + 44 (0) 1423 712265 W: www.intelsecurity.co.uk Jason Morris Security Hertfordshire, UK Providing a wide range of Door supervision/ security for V.I.P and prestige venues, Concerts, Functions, Corporate and Personal Security, Weddings, Private Parties, Gala Dinners, Business Awards & School Proms, Close Protection and Body Guarding Static Guarding and Stewards. T: 01462 478900 W: www.jasonmorrissecurity.co.uk E: agosselin@jasonmorrissecurity.co.uk

John Featherstone Security professional with operational experience gained in a variety of theatres. Main specialities close protection and surveillance. T: 24hrs : +44 (0)7702 740722 E: john@johnfeatherstone.co.uk W: www.johnfeatherstone.co.uk K9 Support Services Ltd K9 Support Services UK Ltd is a supplier of specialist drugs and explosives dog/ handler detection service (which includes arms & ammunition) to individuals, businesses, and the public sector. T: 0845 643 6393 E: info@k9support.org.uk Logas International Tyne & Wear, SR1, GBR Front line SIA, International CPO. Private Investigation and Surveillance operator. E: wscarr@logasinternational.com MLK Security and Protection Services Swindon, UK Close Protection Officer and Door Supervisor E: mattleekane@hotmail.com T: 07917654978 LJE Security Services North Yorkshire, HG1, GBR Close Protection, Residential Security, Asset Protection, VIP red carpet Security and Private Investigation. E: leanneedmondson@yahoo.co.uk One Events Grantham One Events offers you a stress free solution in the organisation, putting together and running of an event. Thisis accomplished by having a group of specialised companies from different industries working together for a more complete service for you. TEL: 0870 974 6779 W: www.oneevents.info Paul Lovatt – CPO After serving 15 year in the Army a move to the Security Industry was a natural step, during the last 10 years I have worked in almost every role in the industry from Door Supervisor and loss prevention to Operations Manager and Director. I have been responsible for the creation and implementation of highly successful crime reduction schemes across Yorkshire working closely with other agencies in the areas of responsibility. Currently I am responsible for the overall running of large events security teams from stewards to Close Protection Officers. Operational planning, contingency planning and flexibility are I feel among my key strengths. E : paul@deltasecurity-eventmanagement. co.uk T : +44 (0)7506726336 Paul Tyler – VIP Protection & Concierge Specialist in discreet personal protection & surveillance. A good current working knowledge of London & its challenges gained through ongoing high risk security operations. Experienced in dealing with high net worth clients with all matters security & concierge striving go the extra mile to exceed expectations through

76

thorough planning & interaction with all involved parties. A strong communicator with a smart appearance who remains synonymous with the principals lifestyle, whilst discretely ensuring a safe environment is maintained at all times, physically capable of adopting a higher profile when required to do so. Demonstrates sound judgement and capability to operate with great levels of autonomy. Exceptional interpersonal skills with the ability to understand, interact & connect with a diverse range of people. E : paul@apparitio.co.uk T : +44 (0)7552515604 W : www.apparitio.co.uk Plymouth Close Protection Highly versatile, physically fit and accomplished security professional with cumulative experience in the areas of security management, close protection, crisis management, risk assessment, emergency management, asset protection and security training. E : chris@plymouthcp.co.uk W : www.plymouthcp.co.uk T : +44 (0)1752 500807 PPSS Group Body armour and stab vests provide a functional solution to individuals who require extra protection in their chosen vocation. All PPSS (formerly ASEO) body armour and stab vests are certified by the UK’s Home Office (HOSDB) and offer unrivalled protection from blunt trauma caused by a punch, blow or kick. Based on our professional frontline experience and extensive research we can confirm that an impact based assault is a more likely event than an attack involving an edged weapon or firearm. T: +44 (0) 845 5193 953 F: +44 (0) 1765 603 512 E: info@ppss-group.com W: www.ppss-group.com Presence Security Presence Security (“ PS ”) is a bespoke security company providing protection for private individuals and VIPs, as well as security services for businesses and organizations. T: 0800 002 9734 E: info@presencesecurity.co.uk Prestige Risks LTD 27 Old Gloucester Street, London, WC1N, 3AX, GBR. Close Protection Secure Chauffeurs Surveillance Residential Security Executive Protection Security Guards Asset Protection T : +44 (0)207 5588182 E : info@prestigerisks.com W : www.prestigerisks.com Prometheus Medical Ltd Prometheus deliver unrivalled bespoke emergency medical support in the form of specialist equipment, training, strategic advice and deployed clinical care. T: (+44) 1568 613942 W: www.prometheusmedical.co.uk Prosec Consultancy Ltd 10 Oakfield business park Westbury, BA13 4WF.


CLASSIFIEDS Prosec Consultancy Limited are dedicated in providing a professional service, which covers a whole range of security services throughout the security industry. T: 01373 228055 W: www.prosec-ltd.co E: info@prosec-ltd.com ProTouch Security ProTouch Security is one of the UK’s key providers of event safety, event security, crowd management, door supervisors, stewards, event management and health and safety. T: 01724 279 522 W: www.protouchsecurity.co.uk Python Security and Protection Ltd Providing Close Protection Officers and Door Supervisors for Events and Venue Security. E : mattleekane@hotmail.com Radoslav Savkov - CPO / Security Consultant Oxford - United Kingdom I would introduce myself as a high calibre Security professional with strong customer oriented skills and managerial experience in the Security Industry, interested in a challenging position, which would fully utilize competences gained and provides opportunities for professional and personal development. With 15 + years of international experience in the sector at all levels and a military background (National Service) as well as a practical Close Protection experience in an executive environment, corporate intelligence and investigations. As a Security professional, I never consider my training and development as a complete, therefore I always look to update further my skills and knowledge. In personal plan I am very loyal, discreet , independent and willing to embrace challenges. E: r.savkov@gmail.com T: +44 (0)7886591525 RSM Security UK Ltd London, UK RSM Security UK Ltd offers the experience and expertise necessary to provide security personnel of the highest calibre when you need them. T: 07850091979 or 07792948523 W: www.rsmsecurity.co.uk E: info@rsmsecurity.co.uk RWSSI Rob W is a professional security consultant with world wide experience and capabilities in Security, Surveillance and Investigation; I can support you to overcome any problems and enable you to achieve your goals E: rob@rwssi.co.uk T: +44 (0)7818 220985 SDS Solutions SDS solutions provide our clients with protective solutions that are second to none, our consultants will discuss every aspect of the problems that you are facing that dictate the need for a protective solution, we promise our clients a tailor made service to meet individual requirements. Whether based in the UK or abroad our protective service T: 01453 887815 E: info@sds-solutions.org

Shadow Close Protection A leading company specializing in Executive Protection as a professional sector, with participation in high and low risk missions, providing global security solutions and consultancy to individuals, corporations and national agencies worldwide. W: www.shadowcp.gr E: info@shadowcp.gr T: + 30 6948539664 Shaun West United Kingdom SIA licensed, Highly Experienced Frontline CPO. Ronin SA trained. Providing security for both corporate and hostile environments. E: sw@shaunwest.co.uk T: +44 (0)7830 109 601 W: www.shaunwest.co.uk Mark Claydon-Smith – CP Team Leader and Medic I have spent 13 years in the Royal Navy Culminating in the rank of SNCO Petty Officer. In 2004 I started my security career and have worked in Hostile environments. I have held several positions including Operations Manager, Team Leader and Rig Site Manager. I have worked in Kurdistan, Afghanistan and Iraq as well as the UK and Europe. E : mark@claydon-smith.com T : +964 (0)7815 970433 Philip Shearman MSyl – CPO, Risk Manager A professionally Qualified Close Protection and Surveillance Operator and Team Leader with over twenty two years of experience gained in the Military Police, the last fifteen of which were spent with the Military Police Close Protection Unit, working in various hostile countries throughout the world. Since leaving the Army in Nov 06 I have worked in the Private Security sector. I have gained valuable experience in demanding and challenging operational environments, where I have proved to be a self motivated and resourceful individual, performing well under pressure, communicating effectively at all levels whilst exercising tact, diplomacy and integrity. E : benshearman10@hotmail.com T : +44 (0)7930 277586 Spotllght Protection Services Essex based business which provides a broad and growing range of security services to businesses and organisations large and small. T: 07870560208 E: info@spotlightprotectionservices.co.uk W: www.spotlightprotectionservices.co.uk VIPA Tactical Training A specialist training academy dealing with four specific areas of combat: VIPA Civilian Self Protection Program, VIPA Close Protection Combat System, VIPA Police Defence Tactics and VIPA Military Close Quarter Combat. BBA Member. W: www.VIPAtacticaltraining.com Yoji Security We established Yoji Security in response to our perception of declining professional standards across the security industry. We strive to provide first class customer service in everything we do, drawing on our

77

extensive experience in the fields of special operations, intelligence, counter terrorism and close protection. T : +44 7903231076 E : enquries@yojisecurity.com Europe & Africa International Security Academy P.O.Box 5833, Herzeliya, 46000, ISRAEL. Our graduates are more recognized, respected and sought after by Distinguish Protection service “consumers” and by most of the “Providers” of Protection services worldwide. Organisers of the 2008 International Summit of Protection Officers. BBA Member. T: + 972 9 950 0969 W: www.SecurityAcademy.org.il Javier Galan Spain Security specialist available for operations around the world. E: oejju@hotmail.com T: 34.637080771 Military Grade Encryption Phones PO Box 52310, Limassol, CYPRUS Built-in encryption software which converts your voice to encrypted data using a constantly changing mathematical formula. It uses a dual layered RSA/AES combination and a changing session key which modifies the encryption algorithm every second. € 1,398.00 + VAT. All prices include new Nokia N73 phone. BBA Member. T: + 357 7777 7276 W: www.protechcy.com/new TPT Firearms Training Bratislava , Slovakia and Rome , Italy We know from our extensive experience within the industry that it can be daunting when initially carrying a firearm and being responsible for protecting a clients life, but learning the proper techniques and having the ability to understand the weapon will make the job a lot easier and more enjoyable. Hopefully you will never have to use the weapons you carry, but should this prove necessary you will be confident and knowledgeable enough to handle the situation professionally and effectively. T : +44 (0) 7734101910 E : info@tacticalprotectionteam.co.uk W : www.tacticalprotectionteam.co.uk Security Concierge Group SCG Special Projects Ltd, Avenida, Bartolome Vicente Ramon No 10, B16, Ibiza, 07800, ESP Security Concierge Group is a privately owned and fully independent provider of exceptional security services to an interesting and varied range of clients. T: 00 34 600 665 275 W: www.securityconciergegroup.com E: joe.buckle@securityconciergegroup.com Americas Bodyguard Careers Bodyguard Careers is an informational site with the purpose of providing bodyguards with all the information and tools necessary to succeed in the Close Protection Industry Info@BodyguardCareers.com www.BodyguardCareers.com Canadian Use of Force Systems


CIRCUIT MAGAZINE ISSUE 38 7975 Yonge St. # 7124, Innisfil, ON, L9S 1L0, CANADA A professional Use of Force and Defensive. Tactics organization teaching a full range of controlled response options for SelfProtection and Use of Force considerations in public and professional environments. BBA Associate Member. T: + 1 705 456 4333 W: www.canadianuseofforce.com Contact Front Photography Contact Front Photography is the world’s 1st photography studio dedicated to the Close Protection Professional. Stop putting generic or pirated photos on your website; instead commission custom shots to best represent you or your agency. T: +1 (612) 369-6134 E: Info@ContractFrontPhotography.com W: www.ContactFrontPhotography.com Decisiones Estratégicas Buenos Aires – Argentina Executive protection specialists we have experienced in all Latin America, for multinationals companies, also providing support in project throughout Latin America to consulting first the US. and UK. We have a team of specialists and psychologists in assistance and crisis negotiation. T: +54(911) 6415 1941 E: jbenitez@d–estrategicas.com W: www.d–estrategicas.com Detective Lacerda P.O.BOX 25996, São Paulo, 05513-970, BRAZIL Providing the full range of security and investigation services throughout Latin America. BBA Member. T: + 55 (11) 3452 4388 W: www.detectivelacerda.cjb.net Giovanni Rossi South Africa Doctorates in Criminology, Vessel Security Officer, ASP Instructor, ISSPC Member, BBA Member, IAPPA Member, American Bodyguard and Protection Instructors Association - Lifetime Member E: rossi1@mweb.co.za T: +2783 415 9205 USA Global Bear Protection PO Box 11488, Jackson, Wyoming, 83002, USA Provision of British and US Ex Special forces security/medical specialists. T: 307 413 3619 W: www.globalbearprotection.com E: bear@globalbearprotection.com

The Team: Editor Managing Editor International Editor Art Direction

Shaun West Jon Moss Elijah Shaw Peter Falkous

Contributors: Denida Zinxhiria Elijah Shaw Tony Scotti Dr. Andrew P Surace Orlando Wilson Garry Curtis Wille Heino Stephen Langley David Hammond Jon Moss

Icon Services Corporation 1043 Grand Ave. #312, St. Paul, MN 55105, USA A full service security and investigative agency specializing in providing high-level security and bodyguards to international celebrities, public figures and corporations. Licensed, bonded and insured, our diverse roster of clients reads as a virtual who’s who in the corporate, motion picture, fashion and recording industry. Entering into our 10th year, Icon has been the hand picked choice to provide Executive Protection to everyone from Superintendents to Supermodels. BBA Member. T: + 1 651 695 8778 W: www.Industry-Icon.com Imperial Protective Service, LLC 15849 N. 71st Street, Suite 100, Scottsdale , Arizona, 85254, USA Imperial Protective Service’ (IPS) is a security consulting and services firm founded in 1978. IPS provides both national and international corporate, executive and celebrity protective services. BBA Member. T: + 1 480 281 1588 W: www.executiveprotect.com Panther Protection Services 3695F Cascade Road, Suite 2207, Atlanta, GA 30331 Panther Protection Services is a full service protection agency offering such services as threat assessment, executive protection, self-defense training, firearms instruction, and high risk tactical protection. Our executive protection specialists have over 75 years of experience. Panther can handle your protection needs whether around the corner or around the world. Member: BBA and NABA T: (404) 349-9117 W: www.pantherprotectionservices.com Rouven Rohler - Security Consultant / HSE liaison Romania I am a very fit and mentally robust Security Specialist with quality experience gained in the security (Military, Maritime and Commercial Operational Security (Oil& Gas). I have improved the effectiveness of protection teams and significantly enhanced clients’ awareness. My career commenced in the Australian Army, which included hostile environment deployments to Iraq and the Solomon Islands and I have since been operating on various contracts throughout Afghanistan and Iraq. I am now looking to make a continued significant contribution within similar High Risk contracts. E: rouven@y7mail.com T: +40 (0)746 642 739 Our Sincere Thanks to all those that continue to contribute their wisdom and experience for the enjoyment of others The Circuit is compiled, edited and published in the UK and US bi-monthly. W: www.circuit-magazine.com E: info@circuit-magazine.com T: +44 0191 645 0865

78

SILVER STAR PROTECTION Executive protection, site and event security with global experience. Serving southern Minnesota with integrity and professionalism. Former USSS, ICON Alumni. available for domestic and international travel. Robert E. Jones Manager/CEO W: www.silver-star-protection.com E: rejones@silver-star-protection.com TSICS (T6) Miami, Florida, USA TSICS (T6) provides the following services in Central America: Executive Protection, Individual Bodyguard, Close Protection Training, Corporate Invest. W: www.security-professionals.org/ members/saldrix E: tsics.t6@gmail.com T: +502 6645 6822 Tony Scotti’s Vehicle Dynamics Institute 1162 St. Georges Ave, Suite 277 , Avenel, NJ 07001, USA The first name in advanced driver training, offering our highly acclaimed Protective/ Evasive Driving Programs. Designed specifically for today’s executive chauffeurs, executive protection professionals and others who are responsible for providing safe and secure transportation services. BBA Member. T: + 1 732 738 5221 W: www.vehicledynamics.net Vindex Personal Protection & Investigation Inc. 497 Hooksett Rd #365 Manchester NH 03104 603.289.3161 / Full service Private Investigations & Executive Protection. 10 years combined Law Enforcement, Private security, close protection work, & security contracting. NY Mayors, U.S. President’s, NFL owners, and VIP’s are some of the protection work I’ve gained experience with. ICON alumni, NABA member. T: + 1 732 738 5221 E: vindexinc@aol.com W: www.vindexinc.com Asia Pacific Asia Protective Group Ltd Asia Protective Group (APG) is a Hong Kong based risk management company, specializing in executive protection, overseas travel security and security consultancy services. APG has an extensive network of security specialists operating throughout the Asia Pacific region. W: www.asia-pg.com E: jim@asia-pg.com E: yvonne@asia-pg.com DISCLAIMER While every care has been taken to ensure that the information contained in this magazine is both accurate and up-to-date, The Circuit accepts no liability in any part for loss or damage incurred by reliance on information contained in this magazine through omissions, errors, howsoever caused. ©COPYRIGHT Copyright remains with the authors and contributors at all times. No part of this publication can be copied or reproduced in any way whatsoever without permission from the publisher AND the author / contributor.


CIRCUIT MAGAZINE ISSUE 38

33



Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.