Circuit Magazine #34

Page 1

News

Reviews

Opinion

Exclusives

Intel

34 CHOOSING THE RIGHT SECURITY SYSTEM

PAY ATTENTION!

Avoid Slipping into Auto-Pilot

BREXIT

The Take Away For CPOs

TRAINING

Is it a Luxury or Necessity?

Power to Recover • Managing Safety • Protective Intelligence


CIRCUIT MAGAZINE ISSUE 34

Who’s protecting YOU, while you protect others? With our premium tier of membership, we’ve got you covered under the BBA Protect insurance policy, providing complete peace of mind while you work in addition to the standard BBA membership benefits. Designed for professionals looking to maximise their employability and demonstrate their commitment to industry standards, there are two levels of Protect membership available:

PROTECT

PROTECT+

Individual public and products liability insurance designed for UK Close Protection operators working in nonhostile regions.

Personal accident and health insurance designed for armed Close Protection and Maritime Security operators working in hostile regions.

FROM JUST £60 PER MONTH

As a trusted professional membership organisation, The BBA are dedicated to bringing our members the best possible resources and tools to enhance their standing and credibility as close protection operators within the industry.

IT’S EASY TO UPGRADE YOUR BBA MEMBERSHIP TO PROTECT YOU.

Visit our website at www.the-bba.org.uk to find out more. Lockton Companies LLP is a limited liability partnership incorporated in England and Wales, registration number OC353198. Authorised and regulated by the Financial Conduct Authority.

32


CIRCUIT MAGAZINE ISSUE 34

CONTENTS 04: Editor Forewords

06

06: Pink and Fluffy The Power to Recover 10: Training Luxury or Necessity 14: The Theme Park Managing Fun & Safety 19: Mobile Security Best Practices

36

26: Medical Paediatric Patient 30: The DEEP END The Evolution of Protection 36: Protective Intelligence Employing Modern Tools 47: Pay Attention! Maintaining Alertness on Task 52: Keeping Your Edge

47

55: Maritime Cyber Security The New Battlefield 59: Working a political Convention Lessons Learned 63: Brexit: What You Need to Know 66: Security Systems Choosing The Right One 72: Book Review

59

74: Bullet Proof Vests The Low Down 77: Classifieds

03


CIRCUIT MAGAZINE ISSUE 34

Uk Foreword The Circuit has changed a lot in the time that I’ve been involved in it. Both here within the pages of “The Circuit” magazine but also within the actual “Security Circuit” where we earn our daily bread.

The close protection industry, here in the United Kingdom has been approaching a level of high saturation for quite some time, as far as operators are concerned. Competition for work is high, and it is essential that those looking for work do everything they can stand out from the crowd. But how do you get noticed in such a talent-rich pool? Well, first-off by taking pride in your work, having confidence in your own ability and taking every opportunity that you can to demonstrate your suitability for the role. As an operator in these current conditions you have to invest in yourself by embarking on professional training and not looking for the cheapest option in order to just ‘tick the box’. In life you tend to get out of it what you put in and as the old saying goes “You get what you pay for”. This is certainly true within the arena of professional development and why we, here at the Circuit, are such advocates of CPD. We’ve been brining you expert opinion and advice on the subject for almost a decade and never has that message been more pertinent than today. Check out what Amy Burrell has to say on the question of Training in her latest article entitled: Training: Luxury or Necessity (Page 10). You should also be mindful of just how easy it is to get noticed for all the wrong reasons, especially if you are someone who frequents social media channels. It is perfectly fine to get involved and contribute as an active member of these outlets but always remember

before posting any comment that you are a professional first and foremost and that you should be presenting yourself in the utmost manner. Anything you write will be public and accessible to a huge audience, comprising both operator and employer alike so give careful consideration to everything you contribute. Review your comments dispassionately and from the point of view of the person you most respect and admire to ensure you’re presenting yourself in the best possible light. So in summary, always: Pause, think and reread all posts before you hit ‘send’. All industries evolve and experience periods of change and the CP sector has changed considerably over recent years. On the modern day circuit it’s people who are able to think on their feet who prosper, showing that you need to have brains, as well as brawn, to survive in this industry. Adaptability is key. As for the magazine, it’s evolved too! These pages that you’re reading now have just underwent a subtle revamp in order to stay fresh. We’ve tweaked the look and feel of the magazine to make it more enjoyable to read on electronic devices, we hope you like it. We’re always keen to hear your feedback so feel free to get in touch with us: info@ circuit-magazine.com

Shaun West Circuit Magazine

04


EDITOR FOREWORDS

US Foreword The seasons change and fall is upon us. Most of us, except for the lucky folks in California and Arizona are putting away the shorts and breaking out the sweaters.

Just like the seasons, Close Protection also changes, or should I say “shifts” from one thing to the other. There are times when it seems like the industry’s hot topic of discussion is focused on the Sandbox, high threat regions in the Middle East and the actions and consequences of PSD work. Currently the hot button is some of the high profile incidents that have occurred in the Celebrity Protection world. Just like any notable topic, everyone has an opinion about what went wrong with some of the incidents and what they would have done better had they been in the Protector or Detail’s shoes. While that’s human nature I do, I want to caution that the we should not use instances when something unfortunate happens to a fellow brother or sister of the craft, as a way to “thrown stones” and elevate our positon in the eyes of

others. There is a big difference between using a mishap like an AOP as a case study and discussing lessons learned (and mistakes made) versus pulling information from breaking news accounts and reports and presenting them as facts of what a person did or did not do, all the while saying “that would never happen if the client was using my services.” Don’t get me wrong, everyone has a personal option, but sometimes when and where we share that opinion counts. Our words carry a certain responsibility, particularly the written word as it last forever, and we should be mindful that the things we say could one day come back to haunt us. I try and keep that in mind not only as a magazine editor, but also as a Protector. Elijah Shaw Managing Editor

05


CIRCUIT MAGAZINE ISSUE 34

Pink & fluffy? Not at all!

By: Dr Liz Royle

There are many reactions that I encounter when I tell people what my profession is but the top three tend to be: • The person moves closer and starts telling me about their (clearly unresolved) experience of trauma • They run for the hills as they think I can read their minds and will discover deep, dark secrets • They roll their eyes, say “so,

you’re a counsellor?” before dismissing me as a pink and fluffy tree hugger I’m sure readers can relate to being stereotyped! What I enjoy is when someone has a genuine interest in the

06


PINK & FLUFFY? NOT AT ALL! human mind and we end up having a proper conversation. I’ll try not to get on my soapbox but really the field of trauma is endlessly fascinating! We’ve all encountered something that could be classed as traumatic, whether in our adult life or childhood, and the way we deal with it can shape our personality, and our life, both negatively and positively. In previous articles I’ve talked about our inbuilt surveillance system and the human survival response. We all have this incredibly sophisticated system and a brain that is constantly being shaped by our experiences. Everyone is unique in their background, skills, experience and beliefs so it’s impossible to get bored when you’re working with people.

chief inspector told me “don’t worry – they may be roughty toughty on the outside but inside they are marshmallow” to which I replied that I may be marshmallow on the outside but I was roughty toughty on the inside.

This is true of the majority of trauma professionals. To deal with the aftermath of trauma day in day out, you must have an inner strength especially if you do crisis work. To hear stories of horrific childhood abuse, hateful and mindless violence and lives being changed forever without crumbling requires a certain mindset. That doesn’t mean that we lack compassion and empathy. Far from it, but we need to be able to go into chaos and despair and provide structure, containment and I have no issue listening to people’s stories (within limits!) so safety. So how do we do that? I can help them make informed choices about what to do. Believe • By being focused and having a clear process for recovery: All me I can’t read your mind and trauma professionals should have no desire to do that with be clear about their way of everyone I meet. However, working and provide the the pink and fluffy stereotype rationale behind this. People is the one I particularly take should be active, informed issue with. It’s true that many participants in therapy. It counsellors and psychotherapists shouldn’t be something that have “a certain approach” and they don’t understand or have many clients respond to that but any control or say in. We work trauma is different and trauma hard but we expect you to work specialists are also different! hard too. Years ago when I began working • By giving psycho-education: Strategies for reducing with police firearms officers, a

07


CIRCUIT MAGAZINE ISSUE 34 symptoms and empowering people to be active in their own recovery is absolutely fundamental to the work. People should be able to ask questions and be given good explanations about things like the trauma response and why we advise the things we do. • By providing a safe, structured environment for working with traumatic memories: People should not feel overwhelmed by emotions as this can be detrimental to recovery. Trauma therapists should provide ways that the person can talk about what happened (although not just repeating the same story over and over again) in a tolerable manner. Crying is not mandatory – yes, emotions such as distress or anger may be naturally expressed but the therapist is not there to force it. • By seeing the strength in people: An experienced trauma therapist won’t judge their client as weak or having failed in some way. It can take a huge amount of strength and courage to live with a serious trauma reaction and even more so to ask for help. We see that. • By maintaining hope: We know that people can and do recover fully. Often the person cannot believe this will be possible and our job is to carry the hope. However we need to build trust and credibility first.

Choosing a therapist is a very personal matter. I doubt that there’s a therapist in the world, no matter how competent they are, that will be right for everybody. They are trained to make people feel comfortable and at ease so should be informed if this is not the case. In the UK, the National Institute for Health and Care Excellence (NICE) only recommends treatments for psychological trauma with emphasis on psychoeducation for all reactions along with trauma focused cognitive behavioural therapy and eye movement desensitisation and reprocessing (EMDR) for Post Traumatic Stress Disorder (PTSD). NICE suggests that there is no evidence for supportive counselling (what most people think of as the pink and fluffy kind) being effective. NICE goes so far as to suggest that requests for supportive counselling should be discouraged. Yet many people still end up with this type of support. This is one time when they really do need specialist support and because trauma therapy is focused and directive, it shouldn’t go on for months and months with no observable progress. Often, the hardest part is overcoming the fear of accessing help. Even though it has been shown that there are effective

08


PINK & FLUFFY? NOT AT ALL!

I take great pride and satisfaction in what I do so if ever we meet, please don’t ask me about trees!

impact on their career and lack of confidence in the effectiveness of treatment.

Although NICE highly recommends psycho-education for trauma reactions, very few people actually get sufficiently high standard of this. Removing the barriers that prevent someone from recovering was the driving force behind the treatments, even for PTSD, the pink and fluffy “counsellor” or the development of our Power to drug-dispensing medical “shrink” Recover® programme www. powertorecover.com. For many stereotypes will prevent many people who can’t or won’t access people from ever getting advice face to face therapy, it’s proved and treatment. a lifeline. When the first person Research has consistently shown described it as “life-changing” we felt incredibly and proud of what that those who are affected we’d achieved. the most are less likely to be receiving support, with stigma, It’s a real privilege to do the shame and attitudes towards work we do and be part of treatment being important someone’s recovery. I take great factors in this. Some people will pride and satisfaction in what find the decision to seek help I do so if ever we meet, please impossible. For them, there is don’t ask me about trees! too much shame in admitting a problem to themselves let alone Reference: in front of a stranger. Other National Institute of Clinical barriers to seeking help include Excellence (2005) Post Traumatic a lack of trust in mental health Stress Disorder (PTSD) The professionals, not knowing where to get help from, difficulty Management of PTSD in adults and children in primary and in accessing or scheduling secondary care. (Clinical appointments or getting time guideline 26) London: NICE. off work, concerns about the Dr. Liz Royle is an international speaker and author who specialises in providing psychological trauma consultancy and training for high risk organisations. She was a founder Board member for the UK Psychological Trauma Society and leads the Uniformed Services Task Force on behalf of the European Society for Traumatic Stress Studies.

09


CIRCUIT MAGAZINE ISSUE 34

Training: Is it a Luxury or Necessity In Today’s Job Market? By: Dr Amy Burrell

Picture the scene. There is a quiet period at work (ok, maybe not quiet but quieter than usual!) and you start to have some time to yourself. What should you do in this time? Maybe you take on a new project or start on one of those backburner tasks that has been on your to-do list forever? Or maybe you’d like to relax – perhaps you leave work on time (for once), build in extra breaks, and/or introduce “Cake Friday” (basically this is where everyone brings cake into the office on a Friday [only me? Ok, we’ll move on]). Sounding good? Well, job done then - For those of you who know me well enough to know I’m going to talk to you about teaching and learning so it will come as no surprise that I’m going to recommend you use your time to do some training.

Why should I? The petulant child in you has probably already said “why should I?” in your head before you reached the end of the last sentence (go on, admit it?!!). The short answer is, lots of reasons. For example: • There’s a gap in your CV • You want to expand your knowledge • You want to learn a new skill • You want to increase your confidence at work • You are ambitious (or, to put it in a more practical terms, you’d like to get promoted!) • To network with colleagues/ other professionals in your industry • And so on…

10


TRAINING: LUXURY OR NECESSITY

In fact in today’s competitive job market, having the right credentials and training under your belt is a required necessity not a luxury of choice. What do I need to think about? We’ve already decided undertaking a new training course is a good idea (don’t you remember? I’m sure you agreed to it a paragraph ago…!) What do you need to consider?

• How much time do I need to do the course? Will work give me dedicated time to complete the course? - It is important to find out how much time is needed to complete the course. Crucially, this is not just the time that you spend in the classroom but also the time needed to read around the topic and do the assignment(s). Speak to your training provider and be realistic about how much time you need to undertake the

11


CIRCUIT MAGAZINE ISSUE 34

Planning your time effectively will make the course much more manageable and significantly increase your chances of success. course. Failing to do this basic planning risks you not being able to complete the course successfully. This, in turn, will knock your confidence in future and reduce the chances of you doing any further training. Planning your time effectively will make the course much more manageable and significantly increase your chances of success. • Is there an assessment? What is it? – Most qualifications will mean an assessment. This might sound daunting but don’t worry. Lots of vocational courses strive to ensure their assessment methods match real world tasking so this might be easier to get your head around than you think. There should also be built in support into your training course. Have a chat with your chosen training provider for more information about what the assignment entails and what support you will receive. o When does it need to be handed in? – Ensure you build in time to complete the assignment.

If this is a portfolio type assignment, you might be able to develop this over time. Even with one-off essay-type assignments, you can divide the task up into smaller chunks to make this more manageable and ensure you meet the submission date. Again, I advise seeking advice from your training provider for how to approach the assignment and what barriers they find prevent students from handing in on time (in my experience, this is usually failure to plan sufficient time in to actually do the assignment but your training provider might have other words of wisdom for you). • Do I need to pay for the course? Can I get funding for this? – Internal training courses might not have a financial cost (although you might need approval from your line manager to sign up).Where funding is required, you will need to consider how to pay for the course. If you want to

12


TRAINING: LUXURY OR NECESSITY change of scene is as good as a break sometimes and a training course could just work for you to give you a break and learn a new skill along the way. There are lots of opportunities to enhance your skill set so have a look around and pick something useful. Failing that, pick something fun!

approach your employer for funding, be aware that you will need to present a business case for why this course is useful. I recommend emphasising the potential benefits for the business (e.g. improving efficiency) as well as your own personal development to boost your chances of getting a “yes”. • And, last but not least, which course? – This is, of course, very important. If you don’t do a course you are interested in, then your chances of success reduce. At the very least, even if you find it hard to get over-enthused about the topic at hand (which is sometimes difficult if you are doing what I call the “necessaryevil” courses (e.g. how to use computer software)), it needs to have clear links to your job role and/or career progression otherwise there will be little value in doing the training. Conclusion As tempting as it is to take a breather when you get a chance at work, it can be counterintuitive to take the foot off the pedal. A

Amy holds a BSc in Applied Psychology, an MSc in Forensic Behavioural Science, and a PhD in Psychology. Amy is a Lecturer in Forensic Psychology at Birmingham City University and can be contacted on amy.burrell@bcu. ac.uk. She was previously the Training Manager for Perpetuity Training who specialise in security training (see www.perpetuitytraining.com) and is also involved in the Crime Linkage International NetworK (C-LINK) (see www. crimelinkage.org).

13


CIRCUIT MAGAZINE ISSUE 34

Negotiating the Theme Park: Managing Fun and Safety

By: Mark “Six” James CPO, EPS, CAS

So you get a call from your highly recognizable high net worth client and he says, “It’s my daughter’s birthday and I want to do something special.”

Do you have an idea of what it is you would like to do? “Yes, I want to take her to The Amusement Park.” Does she know about the trip or is it a surprise? “He says it is a surprise.” I said great, thanks for giving me a heads up, so we can help make it special. One of the reasons I like to know if the participants know in advance if they are going or if it is a surprise, is because

while doing our Advance, if we find something that makes us uncomfortable, we have the ability to help choose another option without the individual or individuals being disappointed. The first thing I do, before I contact the venue is try to research the safety record of the theme park in general and any risks or hazards in particular (environmental,

14


NEGOTIATING THE THEME PARK

mechanical or situational). Whether malfunctioning rides, pick pockets, drainage suction concerns or undertow in a water park. I also assess the competency of the medical resources on property. Depending on the client, this may influence what type of medical kit, over the counter medications I may need to carry if any or impact the composition of the team. If I find something of concern, I then think about how do we mitigate the risks, whether through additional resources on our side or via the park assets?

If I feel the risks are still too great that is when I talk to the principal about considering another option. At this point I am ready to reach out to the theme park to preliminarily prepare for the visit. If this is a large theme park like Disney, SeaWorld or Six Flags etc., they often have a VIP Services Department which is use to handling high profile guests. If they don’t have a VIP Services Department, I then contact the General Manager of the property express our interest in visiting

15


CIRCUIT MAGAZINE ISSUE 34 their images.

Find out if your client or anyone in the party has any fear of heights their park and have him introduce me to the Director of Security. I start with the GM first as opposed to the DOS, so if we have to create or negotiate our own package the cost and revenue considerations are handled at the GM level not the DOS level. The GM often creates the budget parameters and staffing guidelines for the park personnel to follow not the other way around. Remember remaining cordial, professional and helping avoid disruptions to their operations will take you a long way. If you make it be about them and not try to throw your weight around most are more than willing to accommodate any special needs your client may have. Remember they like having high profile clients in their park, as it is great publicity for them. Be prepared the park will often ask can they take a publicity photo. Your client should not feel obligated either way as they know most public figures often get compensated for the use of

Find out what is included in their VIP Packages – most come with a guaranteed minimum of four (4) paid. It normally comes with a park ambassador (escort), one or two uniform park security officers, expedited back of the house fast lane/front of the line privileges and a food and beverage allowance. Some parks also have plain clothes law enforcement officers for ultrahigh profile clients like visiting foreign dignitaries. Usually there is no charge for the client’s private security if they are not riding. Find out if your client or anyone in the party has any fear of heights, a particular type of ride or if it is a waterpark how accomplished a swimmer they are. Don’t feel obligated to ride. That is often personal preference. Some feel riding allows you closer access to your client. I don’t necessary subscribe to that theory as you can maintain access control without riding, based on car selection and positioning. Most parks allow VIP clients to load first and I always ask the ambassador to leave an open car between my client and the next guest. That usually means your client will ride in the front or rear car. Now you could allow them to ride in a middle car but then that would

16


NEGOTIATING THE THEME PARK not be considerate of the park as they would then would have to sacrifice a car on both sides of the client. A best practice for me has been to walk right up to the car with the client then exit the ride station load area when they are preparing the all clear signal. I then wait right by the exit gate so when the ride returns I am standing in immediate proximity to where the client will depart the ride.

guard normally about 5-7 yards in front of us, and the rear guard approximately the same. This allows them to intercept potential guests before getting into relative contact distance of your principal. This allows the principal and their family to feel less intrusion. The bodyguards are usually approximately two arms lengths away from the client and expand and restrict based on need.

When planning the trip below is are standard park If this is a waterpark with water protocols: slides you need a minimum 1. Research the park to of two bodyguards. As most ascertain any risk, concerns water rides are slow up and fast or hazards. Mitigate as down. One bodyguard walks required, determine go or up the stairs with the client, the no-go. other waits at the bottom of 2. Contact Park VIP Services the slide/pool. Yes that means and the Director of Security that bodyguard may have to to facilitate arrangements. slide down and get wet because 3. At minimum conduct a virtual they can’t make it back down site advance of the theme the steps fast enough before park. Most parks have the client exits the pool. So schematics online so you can the slide down is often the gain some perspective before most efficient path back down ever arriving. with the client. That should 4. Conduct a site advance this be discussed on the front end allows you to meet key park when considering staffing for the personnel in advance (GM, detail. Waterparks are a heck DOVIP Services, DOS) of a lot more interactive for the and determine any potential bodyguard staff. safe havens in the event of an emergency during the When negotiating the theme park visit. The other thing about I generally have the uniformed an escorted trip is the staff park security officers walk in has keys and radios to allow the front and the rear escort them to lock down an area, positions in a very of loose open a locked door or contact formation. I have the front

17


CIRCUIT MAGAZINE ISSUE 34

I am sorry mam, I unfortunately won’t be able to make that happen, he is not being Joe Rockstar today, he is just being Dad. Bring mosquito repellent, sun additional resources as screen and hand sanitizer, required. IFAK. Towels if a waterpark. 5. Determine detail staff 8. Determine the appropriate (swimmers, riders, medical VIP package to handle client’s personnel etc.). needs. Determine package 6. Determine attire – relaxed allocated food and beverage seasonally appropriate budget. During warm days clothing, I recommend I have the VIP ambassador pants or shorts with large assigned to our group cargo pockets to store proactively use our budget items as most parks no to bring bottles of water to longer allow back packs. If the staff every hour. This your client is riding rides that keeps everyone hydrated and turn upside down understand doesn’t disrupt the flow of you will become storage the activities. When it is time central. Comfortable shoes, for lunch, I allow the and a hat. If you forget a hat ambassador to call ahead or your client forgets theirs to the restaurant of our you can secure one at the choice prior to our arrival and park. arrange a private room, 7. Recommended gear – phone upstairs or other secure charger your client is going location. This allows the to take pictures and videos client and their family or which means their battery is friends to relax and not be going to be taxed and they impacted by fans. will need a charge. Since 9. When negotiating the park you will be moving all day take advantage of the VIP with minimal opportunities back of the house/front line to charge your own phone the access to minimize the wait charger is standard and maximize the ride time. equipment so be prepared.

18


NEGOTIATING THE THEME PARK 10. Be sure to space the park security assets as needed as their normal tendency is to want to shrink the formation and move in closer to the client this also allows fans to get closer to the client before being intercepted. I let the park personnel do all the heavy lifting as it pertains to the other guests in the park. It limits the exposure and liability of the protective detail having to go hands on. 11. Like all details involving high profile clients keep the client. If you keep the client moving you minimize the potential for fans to attempt to interact. 12. Learn creative ways to tell clients no. Remember the goal is to keep the fans, fans while not granting them access (that is the art that goes with the science), but still allow your client and family to enjoy the theme park.

time in the park: “I am sorry mam, I unfortunately won’t be able to make that happen, he is not being Joe Rockstar today, he is just being Dad.” “Is that your family? (Response from fan – yes). Are you guys enjoying the park? (Response from fan – absolutely we are having a ball). He is just trying to have that same experience with his daughter.” “I apologize Miss, but unfortunately I won’t be able to accommodate your request. Today, he is just enjoying some Daddy/Daughter time today celebrating his daughter’s birthday. As I am sure you can appreciate today is all about his daughter.”

I usually conclude all the interactions with a light smile and light head bow of respect. That is the professional way of saying no. And if all of the above fail, you can always do what one of my brothers in arm’s client Below were my top three did, rent the entire park for responses to guests asking for pictures or autographs during our themselves for five hours. Mark “Six” James is Founder and Executive Director of Panther Protection Services, LLC. He is an internationally published author, keynote speaker, security consultant to educational institutions and frequent contributor to a number of print, broadcast and online media. Panther Protection Services is a full service protection agency focusing on Risk and Crisis Mitigation, Protective Services, Self-Defense Training, and Firearm Instruction. www.pantherprotectionservices.com

19


CIRCUIT MAGAZINE ISSUE 34

MOBILE SECURITYBEST PRACTICES FOR MINIMIZING EXPOSURES

By: Joseph M. LaSorsa

The majority of attacks on mobile devices in 2015 focused on human exploitation, as found in the Proofpoint Human Factor Report.

Basically, various messages, mainly emails, were sent with malicious attachments or links that relied on human actions or responses to initiate the breach, rather than technically infiltrating a system directly. This being the case, increasing your knowledge and awareness is going to be the best preventative action you can take to safeguarding your information. Mobile device attacks are an

increasing problem as hackers begin to target mobile devices over desktop computers. For most working people, your entire life is on your phone. Not only limited to financial data, but your professional information and your day to day life events. Because of this, attackers choose to attack mobile devices more than any other. “We see all major mobile OSs being impacted, from Android, Apple iOS,

19


MOBILE SECURITY Windows phone via BlackBerry to Symbian, with the ultimate aim being persistent remote control of the end user’s device.” – Simon Mullis, global technical lead at FireEye Below are some of the best practices for ensuring the security of your data on your mobile device. Physical Security & User Authentication The first line of defense of a technical device is the physical security of the hardware. Device loss and theft constitutes most common “breach” of mobile devices. For example, a trusted employee leaving a phone exposed on a bus and it gets grabbed in an instant. User authentication protocols and password protection help limit the risks and dangers of a lost device. Enabling data wiping for repeated false attempts to access and even a remote wiping capability is recommended, and naturally so is regular backing up of your data to reduce loss.

In short, don’t get lazy or complacent; ensure you use strong passwords and other user authentications to protect your device from simple intrusion. Do not Jailbreak/Root Your Device While jailbreaking your device can enable you to use almost anything you want, including unverified apps, many of said apps have security vulnerabilities. In fact, the number one indicator of your phone being compromised is the status of the OS and if it has been jailbroken. Additionally, the overwhelming majority of technical attacks on Apple’s iOS only affect jailbroken devices. In other words, avoid the urge to customize your device beyond what the designers intended; don’t overwind your toys. Use a Mobile Security Application to Reveal the Status of Your Device A properly researched and reputable mobile security app,

“The majority of attacks on mobile devices in 2015 focused on human exploitation. That means that an attack wouldn’t be possible without you actually doing something that causes it.” 20


CIRCUIT MAGAZINE ISSUE 34

NowSecure such as NowSecure Protect, should extend the built-in security features of the device’s operating system and mainly provide insight to the user as to the status of said OS. Legitimate security software providers such as Norton, Qihoo, Symantec and NowSecure offer mobile security apps for most devices. Update Your OS Regularly to Get the Latest Security Patches Although it may get tedious, update your OS and Apps whenever available to ensure any gaps in security are plugged by the newest updates. Along with software updates and added features, security updates are a

primary reason for such updates, take advantage of these to resolve emerging threats and limit exposures. Avoid Unknown Networks and Reduce Connectivity A very effective and simple way to minimize potential access by hackers is by limiting the amount of time you have with open connectivity, such as what is offered when you have your Wi-Fi or Bluetooth enabled. While this is a very technical and difficult approach, the ease in reducing this risk is worth it. The other danger is rogue Wi-Fi networks which may be hackers

22


MOBILE SECURITY intending to lure people in by logging on at public locations. The SSID (the name of the network) is easily cloned to read “Airport WiFi” or something else seemingly harmless, but don’t be fooled and only connect to known networks. Also, consider using encryption if any sensitive data is stored on the phone as well as for data in transit with more secure technologies, such as a Virtual Private Network (VPN). (Setting up a VPN for iPhone – Setting up a VPN for Android) Be Careful Not to Fall for Phishing Schemes Avoid potential phishing scams, virus schemes and malware threats by not clicking on unknown or unrequested links. Do not open e-mail attachments from ANY source that you have not identified or asked for attachments from. Additionally, verify the source of the attachment and do not trust the name as masquerading as an

Do not open e-mail attachments from ANY source that you have not identified

associate or legitimate company is easy and common. Carefully Select Which Apps you Download Mobile device users willingly downloaded over 2 billion mobile apps in 2015 that stole their personal information and corrupted their device. Malicious apps can be disguised as social media apps or mobile entertainment apps to trick users into choosing this version and infecting their own systems willfully. Ensure the app you choose to download is the legitimate version, from a legitimate provider. In a recent study by NowSecure, 24.7 percent of mobile apps include at least one high-risk security flaw, the average device connects to 160 unique IP addresses every day, 35 percent of communications sent by mobile devices are unencrypted, business apps are three times more likely to leak login credentials than the average app, and games are one-and-a-half times more likely to include a high risk vulnerability than the average app. Use Strong Passwords and use a Password Protector Passwords and pin codes are not the best way to secure data by

23


CIRCUIT MAGAZINE ISSUE 34

any means, but that is no reason to make it easy for attackers by using pin codes like ‘1234’ or passwords like ‘password.’ Simple things you can do go a long way, like using a password creator and storage stool. Passwords should also be changed regularly. A very simple password technique for both creating a strong password and ensuring this change is this: identify a date 30-90 days in

advance, creating a password from the dates combination, such as May31@)!^ (the month of May with a capital letter, the day in numbers and the year in special characters) with this method, you have a strong password that encourages you to update it when that date comes around, and alternate how you order and type in the month, day and year.

Joseph M. LaSorsa, CPP® is currently employed as a senior partner managing and conducting: Protective Operations Training Courses, Executive Protection & Bodyguard Services, Risk Management Consultations & Seminars, Workplace Violence Prevention Seminars & Intervention Services, Security Consultations & Seminars, Private Investigations and Technical Surveillance Counter-Measures with LaSorsa & Associates – an International Protection, Investigations & Consulting Firm. Web: www.linkedin.com/in/josephmlasorsa

24


STRESS:

CIRCUIT MAGAZINE ISSUE 34

THE SILENT ENEMY The security sector has one of the highest levels of exposure to acute stress and trauma. Our ability to cope increases when we know what to look for and how to effectively implement strategies for recovery. Power To Recover is a research backed online course teaching you preventative and recovery strategies to combat stress.

Online training - learn from home, at your own pace 5 modules with audio recordings, written notes and exercises Learn direct from experts with your own dedicated trauma coach Support colleagues - through stress & trauma awareness training Help yourself - learn to handle your stress & trauma exposure more effectively

Combat the mental game. A vital piece of kit for psychological health. Call for a Power To Recover information pack:

0161 635 3522

SafeHaven Trauma Centre are licenced providers of the KRTS Power to Recover online programme

SafeHaven Trauma Centre, 34 Altrincham Road, Wilmslow, Cheshire SK9 5ND +44 (0) 161 635 3522 info@safehaventraumacentre.com safehaventraumacentre.com

17


CIRCUIT MAGAZINE ISSUE 34

The Paediatric Patient By: Kate Owen

As a medical training company, we often get asked to provide paediatric-focused trauma training for CP teams who are required to look after children. If your responsibilities include children, this guide will help you to recognise the key differences between the adult and paediatric patient and how to overcome some of the challenges they may present.

Are children just little adults? We are now well rehearsed in the management and treatment of adults, but there are several things that we must consider when dealing with children. In many reference books, a child is

26


THE PAEDIATRIC PATIENT classed as under 12 years of age, under careful direct vision. although size, weight and age Breathing of puberty of children can differ Young children have a flexible, greatly. softer ribcage, providing less Anatomical and physiological protection to underlying organs. There may be no visible sign differences of damage to the chest, but In proportion, a child has the child could have damaged a considerably larger head the lungs or heart behind. The compared to its body. Children also generally have a small body ribcage in adults also helps protect the upper abdominal frame with a large body surface area. Both of these are important organs, but in children they are more exposed, meaning to remember in the initial organs like the spleen are more assessment. susceptible to injury. Airway When children have a breathing With the head being so large, particularly at the back (occiput), problem there are usually visible signs. Their breathing the ‘in line’ position to maintain rate increases from the normal an open airway needs to be value (Table 1). In severe cases considered. In young children the chest wall and sternum and infants it may be necessary (breastbone) will show recession to put something under their – visible in-drawing between shoulders to prevent the airway the ribs. They often position from blocking with head flexion themselves to optimise the air (tilting forward). The tongue they breathe in (tripod position), and tonsils are large and the windpipe (trachea) is softer than with the accessory muscles around their neck working hard in adults. to raise the head to increase the capacity for air intake. The Careful positioning is crucial to nostrils also flare to optimise maintaining an open airway. air intake. Any of these signs Be careful when using suction should give you an indication devices on small children. Their of significant respiratory mouths are very delicate and distress. pushing a large suction catheter inside could cause you more Circulation problems. Think of the basics Potential circulatory failure first, such as postural drainage (shock) in children can be (tilting to the side). If suction is needed, it should always be done difficult to assess. Children have

27


CIRCUIT MAGAZINE ISSUE 34

a greater blood volume to weight ratio (approx. 25% more than adults), so quantifying blood loss is more difficult to initially establish. Children compensate very well to start with and then deteriorate rapidly. It is important to look at the heart rate (Table 1) and the pulse volume; this indicates how hard the body is compensating – how strong does the pulse feel and what is the skin colour? Using the capillary refill time can often be more useful then the pulse. Gently push the skin over the centre of the sternum for 10s and then let go. The blanched area should return to pink in less than 2 seconds. Every second longer indicates an increasing amount of shock. A fast heart rate indicates a loss of blood volume. If there is no blood seen from an external wound, then there must be an internal bleed. A slow heart rate would indicate that either there is a breathing problem that needs attending to straight away, or that the child heart is about to fail and resuscitation would be required.

The pulse of a child becomes weaker and disappears as shock advances; their skin becomes colder, pale and mottled (Figure 1) then starts to appear cyanosed (bluish colouring around mouth, nose and ears). Cyanosis is a very late sign and pre-terminal. Disability Figure 1 also highlights the how we assess the appearance of the child. This helps to indicate the seriousness of the illness/injury. The level of consciousness asks are they alert and orientated as normal or are they floppy and lifeless? Do they interact appropriately and can they be consoled, which also can determine if they are in pain. Does their gaze look different? As with adults, pupil size and reactivity can identify injury or swelling to the brain. Exposure As mentioned earlier, children have a large body surface area so they lose heat very quickly. Children’s bodies metabolise glucose to generate heat. The important factor to remember

28


THE PAEDIATRIC PATIENT

Figure 1: Paediatric Assessment Triangle is that they need to be kept at normal body temperature – warm them up when they are cold and shivering (particularly after traumatic injury) or cool them down if they have a fever (nontraumatic emergencies). This will help to reduce the body’s glucose consumption. If the glucose consumption is great then the child may show signs of diminished conscious level. Summary It is important to remember that children differ anatomically and physiologically to adults. If you

are able to remember to position correctly, keep a strict eye on the vital signs, look for key changes and remain calm. Key Points • Position the airway appropriately • Look for key signs of respiratory distress • Assess for potential circulatory failure (shock) • Identify conscious level • Keep the child warm if required • Remain calm • Get help early

Kate Owen is one of Prometheus Medical’s Senior Instructors and has over 16 years’ experience of working with the UK ambulance service. She currently works as a HEMS Paramedic. If you would be interested in undertaking further training in paediatric first aid and trauma management, please contact the team at Prometheus, who would be delighted to assist (Tel: +44 (0)1568 613942).

29


CIRCUIT MAGAZINE ISSUE 34 By: Mark Roche EPS

The D.E.E.P End

Ladies and Gentlemen welcome to the Deep End, the (Dynamic Evolution Of Executive Protection) can you swim? Since the beginning of time, everything from man to nature has or is evolving; the protection theater is no different. Gone are the days of the typical over zealous fans, the quiet introvert that longs for menial recognition from their beloved star, or the harmless groupies. Advantages are swinging in a not so palatable way, away from the protector and towards our

adversaries. With the rise of the internet, tracking apps, real time broadcasts, the increase of firearms in the public domain, the mentally Ill, ideological beliefs, and terror incidents the re-set button has to be pushed by today’s specialist(s).

30


THE D.E.E.P END There’s a quote that I keep with me, it’s a quote that I refer to prior to a detail, and it states the following; “The art of war teaches us to rely not on the likelihood of the enemy’s not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.” Sun Tzu In my opinion, no statement could be articulated better to form the mindset needed to conduct our jobs as protectors. ‘The likelihood of the enemy’s not coming?” they will come. “Our readiness to receive them” is Paramount to the protection of our client(s) everyday. Don’t chance of his not attacking, but harden your position(s) unassailable. The reality today is nothing is sacred, no one, or nothing is free from a potential threat or attack. A school, a house of worship, a restaurant, a sporting venue, a dance club, and your place of employment to name a few. The threats have become compounded by the attacker’s ability to hide and remain anonymous. ■ 9/11 – 2,977 people killed ■ Sandy hook elementary – 20 children 6 adults killed

■ Boston Marathon – 3 killed 260 wounded ■ AME church – 9 killed in bible study ■ Paris France – 130 people killed ■ Christina Grimmie 22yr. old up and coming singer shot dead signing autographs ■ Pulse nightclub – 49 dead 53 wounded All of these recent attacks had multiple things in common, and the worst one of all is, they never saw the attacks coming even by protectors! This is not a judgment of fault, rather a conformation that the dynamics of protection and the ability to protect has changed. Lets take a look from the inside out, rather then armchair quarterback these events, and see what makes up the anatomy of an attack. Let’s see if we can take a comprehensive approach to the biggest question there is, “How do you protect someone or something from an enemy you can’t see”? Unlike our notable, yet thankfully small, percentage of super ninja’s and tough guys, I like to take an approach of digesting the situation with as many facts as I can obtain, to create a time line of precursors to an event. Through those facts, obtain and study the indicators, things missed, and reasons the attack took place. I oppose racing onto

31


CIRCUIT MAGAZINE ISSUE 34 1. The death of Christina Grimmie: Her attacker listen carefully, “met” her online, which was all in his mind, he “followed” her on YouTube. He decided again in his mind, that she was interested in him. He then decided that if they were to be together, he would have to improve his appearance. So, he did that by getting hair plugs/implants even though he was a young man, and lost weight by becoming a vegan (as she was). He continued to follow her on social media and longed for the day that they would be together. Again, Deception is a part of in his mind he had done the human nature, especially things necessary to win her when no strong opposing affection and in someway morals are found. unknown to me, let her know. While I don’t affirm being a When his affection for her was psychologist, every one of the not answered, he waited till individuals that perpetrated these she was close enough to him attacks, surely lacked a normal (at a concert she was giving moral compass. They are almost 2hrs. away from his home) he all deceitful to there selves, went to the show armed with family, friends, and co-workers two handguns and as she did at times to further their agenda. her normal meet and greet Let’s take a couple of these and signing autographs, he attacks and dissect them a little approached her and shot her further to understand the best we killing her instantly, before can with the facts since I/we are killing himself. Security was not professional psychologists. social media to proclaim what should have, could have, been done by me (if I was there) to end an attack and be a hero like some of the before mentioned. As with any day, there comes night. With every ending, there is a beginning. It’s the beginning that is important, while in everyone of the tragic events listed above is sad and at times, incomprehensible they all have a beginning, a launch of attack if you will. In my opinion, the attack starts long before the actual physical attack.

A fatal blow you can deliver to the enemy is to show them you understand their intentions


THE D.E.E.P. END scarce at best and she didn’t have close protection assigned to her, which we will get into later. 2. The Pulse nightclub attack: The attacker had identity issues; he had interactions with the LBGT community both online and in person. He had limited friendships with his co-workers, at times causing alarm to some of them at the SECURITY firm to which he worked for. These alarms went as far as the FBI to launch an investigation of his statements (which were of terrorist sympathies). He was a bit of a recluse, staying to himself most of the time and having little interaction(s) with his peers. Although married and having a child, he battled with his identity issues and continued (as we are aware now) with his terrorist sympathizing. He frequented the establishment he would later attack. And with his advanced knowledge of the establishment, layout, security, hours of operation, crowd capacity, ownership, and knowledge that he wouldn’t be suspicious, he launched his attack. At 2am armed with a semi-automatic rifle and a handgun he killed 49 and injured 53 before being killed himself. I firmly believe that in both

instances if not all, there were warning signs hell, in the Pulse attack the FBI investigated him and cleared him, and his wife drove him to case the nightclub a day(s) before the attack. Here is the problem we face as protectors; we are not always privy to all of this information or pre-cursers ahead of time. This fact is what leads us back to the question, “ how do you fight an enemy you can’t see?” Here is the answer, you must force the enemy to do the things you want them to do, not what they want to do! In my opinion, a fatal blow you can deliver to the enemy is to show them you understand their intentions, which some of us lack. As we all know or are aware of, there is no one right way but if I can make a few suggestions, they would be these. Know your client, it’s imperative to be aware of your client’s habits, likes and dis-likes, who follows your client, what their fan base consists of, the business affairs of your client, friends, family, inner circle, outer circle, what they eat, drink, where they live, allergies, medical issues, how they interact with the public at large etc. Create a security bubble for your client(s), I don’t mean hiring 10 specialists and placing

33


CIRCUIT MAGAZINE ISSUE 34 them on your client. I mean create a bubble of your own by monitoring constantly, their movements, their public social media, adversaries in business, adversaries in their personal dealings (if any) the competition and their public social media, stay in lined with their management, always have an open door policy when it comes to concerns others may have, secure their residences, be cognizant of any staff members and their movements when around your client, augment the clients movements and monitor the social media of persons close to your client. Sound like a lot? Not yet. Learn, understand, and execute a proper advance, in my opinion, in order to fight the unknown, you must force the unknown to become known. You must force the enemy to reveal themselves to you, how? Harden the target. In order to monitor or make a potential enemy/ attacker reveal themselves you must know which way they’re coming to start. One of the first lines of defense is access, providing or limiting access is key. An adversary acting behind the veil of anonymity whether on the phone, computer, or written correspondences must WALK through your access point at some point. Here, you or additional staff can

monitor an individual even if they are unknown to you. You can look for attitude, firearms, bladed instruments, powders, backpacks, type of dress, anxiety, distress, could be familiar to you from social media alerts you may have, is this person at EVERY show and why? You can watch people’s movements or lack there of, wheel chairs, canes, and most of all announce to the potential attacker by show that this will not be easy for him or her. Additionally if you have a publicly known client, that all shows or appearances are NEVER the same which forces them to re-evaluate there plan(s). Have bag checks; pat downs, and metal detectors where available and a specialist monitoring those checks as well, when circumstances provide for them. Additionally, know your environment, your hardened area’s, soft areas, seating, stage (if applicable), dressing or meeting rooms, arrival and departure points, alternative points of arrival and departure, medical facilities and some type of first aid/first responder knowledge. In the case of Christina Grimmie, had any one of the before mentioned precautions had taken place, she may still be with us today. First, she had no security, secondly, she ALWAYS did a meet and greet instead of alternating with some shows having no meet and

34


THE D.E.E.P. END

How do you protect someone or something from an enemy you can’t see”? greets, and having them with no semblance of order, just a horseshoe shaped line of fan’s who ALL loved her, just one supposedly more than all the others who ended her life. “ A man surprised, needs a instant to collect his thoughts and defend himself; during this instant he is killed, if he does not run away” Ardant du Picq There is no time to be surprised; surprise is for the attacker to deal with and for him to understand that you the protector, are aware and prepared. Finally let me say this, violence has no color, terrorism has no religion, bullets have no sympathy, and morality is sometimes a fleeting thought. Anytime, any place, by any hand, it can happen unlike law enforcement and their 3-7 minute response time, when the attack happens you’ll be there, the question is are you prepared? The days of a 3,5,28, day course, suit, a pigtail in your

ear, sunglasses on your face, and your prepared, are over ladies and gentlemen. The dynamics of protection are vastly changing to meet the new threats of today, and should you disregard them you will come up short. Nobody cares about your social media pages that show, your semi automatic pistols, how many pics you have with your client or celebrities, how many pics with your client’s private jet, or the hotel your staying at. This industry is bigger than that, more importantly, our clients deserve the best. It has never been about you/us it’s about the safety of those we are entrusted to protect. This is chess not checkers friends, I implore you all to study this CRAFT, immerse yourself in it’s principals and devote yourself to be as smart, physically and mentally prepared as you can be to do the very serious work we have ahead of us. Welcome to the deep end…. Sink or swim? It’s all up to you!

35


CIRCUIT MAGAZINE ISSUE 34

Protective Intelligence: Modern Tools for a Traditional Task By: Joseph M. LaSorsa

Many protective service providers and law enforcement agencies have protective intelligence units that conduct investigations, manage threat assessments and provide tactical, operational and strategic analysis of the information they uncover.

36


PROTECTIVE INTELLIGENCE However, they may fail to utilize the contemporary collection and analysis methods used by today’s intelligence professionals but rather lean on the standard criminal investigation processes they have always performed. The primary causes for this would be the biases ingrained from their backgrounds and the majority of the training providers in this industry do not impart the contemporary methods and sources of protective intelligence investigations, largely due to their lacking association with today’s technological trends. While some of the dated methodologies are still valid, this article will include a review of the basic intelligence cycle, intelligence domains and discuss the purpose, sources and modern techniques that are particularly relevant to the task of protective intelligence investigations in today’s age of ‘information on demand.’

…the most dangerous risk may be the one you did not foresee. The intelligence cycle is an important process to understand

for all investigators or anyone who collects information for assessment or analysis. The FBI defines the intelligence cycle as “the process of developing unrefined data into polished intelligence for the use of policymakers.” This six step cycle is a fluid progression which produces an end result greater than the sum of its parts; however, with each new step new information may develop, requiring the cycle to move backwards again before advancing. The first step is to identify the requirements in which the information is to satisfy. This step will assist with the filtering of data down to critical pieces of information by relevance. The second step is to create a plan and provide direction for the intelligence that is to come. Collection and gathering of information is the third step, which includes researching online databases, physical surveillance, conducting interviews, etc. After the information is collected comes the fourth step where the information must be processed and exploited. This means filtering the data into useable bits for the decision making processes defined by the requirements in the first step; the bits can be referred to as the “dots.” The fifth step is to analyze and convert those bits of data in order to produce raw

37


CIRCUIT MAGAZINE ISSUE 34

Web: www.fbi.gov/about-us/intelligence/intelligence-cycle intelligence, or “connecting the dots� if you will. The final step is to disseminate the intelligence to those who will use it for tactical, operational and/or strategic decision making. The Necessity of Protective Intelligence With global security issues like workplace violence, celebrity stalking and assassinations

being a growing concern, the need for protective intelligence is increasing as well. To put it simply, you cannot mitigate a risk that you have not anticipated, therefore the most dangerous risk may be the one you did not foresee. Unfortunately, bureaucracy is unforgivingly reactive and only recently have organizations begun to seek training and implement proactive

38


PROTECTIVE INTELLIGENCE measures for such incidents on a wide scale. Maintaining a preventative, proactive methodology to these issues has proven to be more beneficial and cost effective than a reactive approach. Take workplace violence for instance, in which as many as two million workers report having experienced workplace violence each year according to BLS within their Census of Fatal Occupational Injuries; of the 4547 fatal workplace injuries reported in 2010, 506 of them were workplace homicides. With U.S. companies spending more than $36 billion in direct and indirect costs of those incidents alone, the argument for how a proactive approach is advantageous to any organization is clearly legitimized.

with a stalking case, knowing the whereabouts and activities of the threatening individual could potentially restore normalcy and freedom to the life of the victim who would otherwise be locked in their own home. “Studies of incidents have revealed that when proactive measures were not taken to protect a client, the reactive measures taken by the bodyguards failed almost every time.” – The New Executive Protection Bible, M.J. Braunig 2000

Let us define protective intelligence investigations as well as discuss the processes involved. Protective intelligence investigations differ from other kinds of investigative services primarily in how the goal is to prevent violence or a loss event, Proactive measures taken in not simply reveal evidence. The such cases are much more individual, group or organization effective than response or reactive measures. For example, must collect information which will develop into the critical if given a workplace violence intelligence required in order threat in which the terminated to take preventative measures employee may be seeking through decisive actions. This is retribution through an attack on the company’s headquarters, the defined by the US Secret Service as “gathering and assessing typical solution would be to add extra physical security measures information about persons who may have the interest, motive, in and around the facility. However, a much more proactive intention and capability of approach would be to compliment mounting attacks against public officials and figures.” those measures with proactive and preventative surveillance on Another important aspect of the potential attacker. Similarly,

39


CIRCUIT MAGAZINE ISSUE 34 protective intelligence is the source of data/information. Although most would believe ‘intelligence’ is gathered solely from secret or covert sources, the largest collection of information available to private investigators is opensource intelligence, or OSINT, which is intelligence collected from publicly available mediums. Within the intelligence community, the term “open” refers to overt, publicly available sources (as opposed to covert or clandestine sources), drawn from publicly available material, including: Internet, media, photos, geospatial information, etc. With the wealth of information available to protective intelligence investigators, a strong common sense effort should be made to focus on the information that will help answer the fundamental question of ‘does this subject present a threat to protected individual(s), group or organization?’ With the overwhelming prevalence of OSINT, there is no authority ensuring the accuracy of any information available through this domain, therefore this collection method includes a responsibility to verify, or at least corroborate, its validity. Additional to OSINT, there are other intelligence collection domains, such as Human

Intelligence (HUMINT), Signals Intelligence (SIGINT), Imagery Intelligence (IMINT) and Measurement and Signatures Intelligence (MASINT). HUMINT is the collection of data from human sources, such as interviewing witnesses or known cohorts of the suspects while SIGINT includes collection from electronic transmissions typically only done by the National Reconnaissance Office, CIA, FBI and NSA. IMINT can be a very broad domain, however for the purpose of this article we will focus on the study of imagery from sources such as Google Maps, Google images and so on. MASINT is a complex collection domain which refers to the study of weapons capabilities and industrial activities which produce measurable physiognomies, which is also primarily conducted by the NRO, CIA, FBI and NSA. What is SOSINT? Perhaps one of the largest and broadest fields of OSINT is the integrated technology that allows users to generate and integrate content online for collaboration and interaction for little to no cost, known as social media. The preceding explanation was to offer insight into how effective this ever increasing treasuretrove of information is to the investigator. Much broader than just Facebook and Twitter, examples of social media sites

40


PROTECTIVE INTELLIGENCE

Across the myriad of social media sites, there are many methods and mediums for potential subjects to distribute thoughts or request tactical assistance, likewise there are many ways to gather information. include blogs and microblogging sites, media-sharing portals, mashups, RSS feeds and podcasts. This collective source of information is growing so large within the intelligence community it is even gaining its own acronym, SOSINT for Social Open Source Intelligence. SOSINT is a content rich goldmine and a very valuable investigative tool when seeking corroborating information about individuals or groups, such as behavioral changes, interests and emulations, gang activity and general life circumstances. Additionally, a vast amount of information about criminal activities and attack methodologies for specific geographical areas is attainable through this research. Among the popularity and proliferation of SOSINT, this domain is particularly effective to the investigator for several other reasons. The first is the immediacy in which content is not only created, but

disseminated. The ‘newsfeed’ is the epitome of a media outlet for such content as there is no delay in publication and almost no restriction in its ability to spread virally. Across the myriad of social media sites, there are many methods and mediums for potential subjects to distribute thoughts or request tactical assistance, likewise there are many ways to gather information. Fortunately, the urge for most attackers to share some inclination of their plan is too great to miss; this is a process termed ‘leakage’ in which the subject may not declare his/her intentions but will share ideas, seek tactical advice, etc. Second is the facilitated interactivity and unlimited span of the audience. Never before has there been a medium in which content can be shared and banded upon by viewers as broadly and as inexpensively as it can on social media websites. The effectiveness of social

41


CIRCUIT MAGAZINE ISSUE 34

media and how it can enhance the assessment and threat management process is clearly identifiable in publications such as LexisNexis’ Social Media Use In Law Enforcement in which “survey respondents indicated several real world examples in which they prevented or thwarted pending crime, including: stopping an active shooter, mitigating threats toward school students, executing outstanding arrest warrants and actively tracking gang behavior.” For the private investigator seeking information on the behavioral circumstances of a subject, something as quick and easy as analyzing status updates, check-ins and posted photos by the subject and their friends may provide the information

necessary to conclude if a legitimate threat exists. With the billions of people registered on dozens of social media sites, it is easy to comprehend the amount of available data for anyone who knows where to look. Social media sites are so popular that you have likely conducted an investigation of some sort yourself, having sought information and assessed a tactical or even a strategic objective from that data. When your objective is a specific piece of information, sorting through all of that content can be an exceptionally hefty and time consuming burden. In order to be effective at this task, you must be able to combine resources

42


PROTECTIVE INTELLIGENCE surveillance out-shines other sources, such as opinions of those who are purported to know the subject. The causality is identified in the study of previous attacks, namely the attacker’s behavior prior to committing the attack. Surveillance is particularly effective in protective intelligence investigations for three main reasons. First, fewer than one-tenth of attackers have made direct threats, Real-Time Development Through Physical Surveillance increasing the difficulty of validating or legitimizing the Mostly used as a tool for threat through other sources. developing factual evidence to Utilizing information from sources prove or disprove circumstance, such as SOSINT will reveal the physical surveillance provides aforementioned ‘leakage,’ which information that is critical to are the general ideas, interests the decision making processes and emulations of the subject but for a much broader spectrum is typically lacking in specificity. of investigations than most Second, research, planning and private detectives are used coordinating the attack is critical to. Surveillance is one of the to the attacker’s success. The oldest and most common steps required in developing their practices within investigative plan will reveal their intentions, services, yet it remains the either in what they are doing, best option in cases when realwho they are meeting, or places time information is required. In conducting protective intelligence they visit. Real-time information gathered in surveillance can investigations, surveillance is a lead to making preventative viable option in order to gather decisions sooner and more the necessary information on a reliably than other methods of subject in order to develop the investigation. As an example, if appropriate intelligence. a subject who has no historical interest in firearms obtains Each of the processes of weapons and ammunition over information gathering offer the course of the investigation distinct advantages. Factual and then proceeds to the data that can be corroborated protected individual’s location or should be the focus of the collection effort and this is where the headquarters building of the by not only directly researching on social media sites, but using the many search engines which can do the task for you as well. With this methodology, you can easily start to connect the dots and identify the potential wheat from the chaff, enabling analytical confidence, particularly when dealing with the concern of targeted violence.

43


CIRCUIT MAGAZINE ISSUE 34

It is safer to take more notes and photographs than less in most cases organization, the investigator may involve authorities immediately, hopefully mitigating the attacker’s plan before it is too late. Third, the analytical confidence from deriving conclusions based on direct observations versus assessing the quality and quantity of third party information is an important power factor. This provides the investigator and analyst a more profound confidence and less uncertainty often seen with other forensic options. The primary objective of a protective intelligence surveillance is collecting information helpful in determining if an individual demonstrates the intent and extent (capability) to formulate and execute a violent plan of action. Once the subject is identified and background information has been collected, the main factors in which to be concentrated on during the surveillance are the current living characteristics and context of the subject’s daily routine. Areas of surveillance focus should be: factors in the subject’s life and/ or environment which might increase the probability of an

outburst or attack, such as living arrangements and environment; actions and behavior; daily activities and social interactions, particularly compared to possible known historical circumstances and behavior of the subject. This focus provides valuable information which will assist in the assessment of the subject’s stability. For example, if the subject does not currently have the means to satisfy the basic needs of food, clothing, shelter, social interaction, etc., then the subject may be in desperate crisis with no option left but to act out. Examples of behaviors which may indicate coordination or planning of an attack could be: visiting others who share the same ideas and interest, visiting a site linked to the principal or protected organization, obtaining supplies or purchasing weapons. In order to be effective at surveillance, the actions of the subject must be anticipated. To that end, the investigator should make an effort to develop a list of locations and activities which may be part of the subject’s target selection or planning

44


PROTECTIVE INTELLIGENCE processes. It is important to consider the subject’s motive and mindset; where would he have to be? What would he have to obtain? Who would he have to meet with? Etc. For violent attackers, the chances of success and escape are the predominant factors in determining the location in which to attack. Therefore, research and planning efforts intended on site selection and even tactical decisions pertaining to that site are particularly revealing during a physical surveillance. The offender will want to gain familiarity of the location, how to get there, how to escape and perhaps even take pictures of the location for reference later on in his planning process. He may even attempt to discover what the security response might be during a crisis or how effective access control is regulated, therefore performing rehearsals.

‘connect the dots’ and make the final decision. Similarly, it is critical to record all of the subject’s activity in painstaking detail. Singular events may not be of great interest to the investigator who may have limited awareness of the larger picture; however, the totality of the subject’s actions may indicate the strategic intentions of their intended plan or perhaps tie into something not disclosed to the investigator. It is safer to take more notes and photographs than less in most cases, so bring extra memory cards and have ample note taking equipment.

As with most investigative efforts, the investigator must remain unbiased and avoid complacency. Specifically, with protective intelligence, most cases will be closed with the conclusion that an individual does not pose a significant and immediate risk to a protected person and this common Recording and Report Writing ending can eventually lead to the formative bias and/or When compiling a report for a complacency. The majority of case as critical as a protective these cases are closed following intelligence investigation, the the investigation, unless a investigator should include criminal violation has occurred in all information discovered or observed within the investigation. which the case may be brought to a prosecutor or otherwise used The information could be to press charges. compiled into categories or by relevance, however it is To maintain effectiveness and important to include all of the relevance of the report, the information as the decision following points should be makers are the ones who will

45


CIRCUIT MAGAZINE ISSUE 34 addressed: whether or not the subject has demonstrated an interest in weapons, if he has done anything which would indicate the planning of an attack and if the subject has engaged in ominous, aggressive or stalking behaviors. In addition, the investigator’s report should address any troubling or unresolved issues such as missing or undeveloped information, or perhaps information that might clarify the subject’s lack of motives and interest in planning an attack by factual deviations from behavior that is normally associated with an attacker. Minimum data included usually includes a description of a subject’s identifiers, behaviors, interests along with current location and circumstances of their lifestyle. Ensure that you include a document and photo log that contains the following: all documents discovered, identification photos of the target and vehicles, photos of every location the target visits along with the address of those locations and include

any photos pertinent to the intent of the investigation. In most cases, your report should be written in the third person. “The investigator arrived… the investigator observed…” etc. and remember, many people will never see you but will know you and judge you by how you write and how you have conducted the surveillance. Conclusion For investigators, protectors and those who conduct threat assessments and evaluations, protective intelligence programs are a critical aspect of their professional life. However, when it comes to reducing violence and potential terrorist activity, we all share the responsibility of identifying, assessing and even intervening potential attackers as early as we can. The process may not be as analytical or specialized, however, in today’s world of information at your finger tips, as every person is empowered with incredibly effective tools for early recognition of potentially violent behavior and prompt preventative actions.

Joseph M. LaSorsa, CPP® currently employed as a senior partner managing and conducting: Protective Operations Training Courses, Executive Protection & Bodyguard Services, Risk Management Consultations & Seminars, Workplace Violence Prevention Seminars & Intervention Services, Security Consultations & Seminars, Private Investigations and Technical Surveillance Counter-Measures with LaSorsa & Associates – an International Protection, Investigations & Consulting Firm. Web: www.linkedin.com/in/josephmlasorsa

46


PAT ATTENTION! By: Matt Adey BSc (Hons) Psych.

PAY ATTENTION!

The study of attention continues to produce a vast amount of research and theory within the study of psychology. Attention can be seen to operate like a thread, which weaves perception, memory and conscious awareness together.

It would be almost impossible for me to cover this topic in-depth within a single article. However, I will try to cover some basic aspects and present prominent research within this particular field of cognitive psychology. Historically, researchers have asked the following questions; how much stimuli can we attend to at once? What happens when attention fails and unwanted information is processed? Is attention an evolved function? What are the links between perception, memory and conciseness?

In 1890 William James produced a famous quote that continues to echo around psychology lecture halls to date. The quote is as follows “Everybody knows what attention is. It is the taking possession of the mind, in clear and vivid form, of one out of several simultaneously possible objects or trains of thought. Focalization, concentration, of consciousness, of its essence. […] It implies withdrawal from some things in order to deal effectively with others […]”. A more modern and simplified definition would be;

47


CIRCUIT MAGAZINE ISSUE 34 to selectively concentrate on one aspect of the perceptual field or internal thoughts, at the cost of ignoring others.

predators. A daily activity of our ancestors would have been to pick berries or search for game. This requires controlled attention and the correct identification of food As you read this article, you can sources. However, should a black/ selectively shift your attention from yellow striped shape catch the the visual stimuli (words) in this eye of a weary hunter, they must sentence to the sound of a passing react quickly or face the potential car outside or a conversation within consequences. This example your vicinity. As you shift your illustrates how both attentional attention to process these sounds, processes (controlled & automatic) you can maintain visual focus may operate at the same time. on the words, however, you will However, the extent to which rapidly become unable to process attentional processes run in parallel them. This example shows us that is hotly debated. attention has a limited capacity within day-to-day brain function. What about stimuli that is under direct visual focus? Broadbent and Auditory stimuli can require Gathercole (1990) conducted a greater conscious efforts to achieve study named the ‘Flanker effect’, attentional focus, as we can rarely which demonstrated an attentional control the sounds waves that capacity of stimuli receiving direct hit our eardrums. However, we visual focus. Participants were are consciously able to block out asked to focus on a central word these sounds in order to attend flanked by a word above and to a specific stimuli. Visual stimuli below it. can be more direct as we scan the GRASS TABLE visual field and focus on selected CHAIR STOOL targets. Additionally, attention GRASS TABLE can be both automatic (ducking to avoid an object passing your They were then asked to make head) and intentionally controlled a category judgment i.e. does (actively searching for target the word belong to the furniture stimuli) category and respond by pressing a yes or no button. Broadbent Evolutionary psychology adopts found that target words flanked the Darwinian model based on by related categories received the passage of adaptive functions faster reaction times. This finding to ensure a species genealogical showed stimuli, which falls within success. The hunter-gather model an attentional spotlight could of human evolutionary psychology receive parallel processing as has produced some compatible semantic information is utilised insights into human cognition in relation to the target words and behaviour. It may be that category. In this instance, the attention has evolved to both make brain can process not only the humans more successful huntermultiple strings of complex gathers and protect us from large shapes (letters) but also

48


PAT ATTENTION! extract their meaning without the participant’s conscious awareness. However, this may be limited to specific visual angles and stimuli proximity.

place around the room. You are engaged in a conversation with a friend, and then suddenly, you hear your name being mentioned by another person across the room. This shows evidence Lets go back to our hunter-gather that despite being engaged who is about to be devoured by in a conversation, therefore, a large cat. In order for him to consciously blocking out the see the yellow and black stripes background noise, you were within a sea of vegetation, actually processing (to a degree) all stimuli within his field of all auditory stimuli in parallel. vision is likely to be receiving a certain level of attentional We have seen how attention processing. However, due to the can run through conscious vast amount of visual stimuli awareness, memory (yellow and the brain is likely to operate a black stripes mean danger) and filter system that selects and perceptual stimuli. The brain rejects relevant stimuli. This seems to have a limited attention phenomenon can also be seen capacity system that relies on using auditory stimuli by a classic a filter for the maintenance of example termed ‘The Cocktail cognitive economy. In modern party effect’. Imagine you are day urban life, the perceptual standing in a cocktail party with field is filled with fluid, rich and multiple conversations taking diverse stimuli. How much of this

49


CIRCUIT MAGAZINE ISSUE 34 do we process during day-today interaction? A famous study conducted by Daniel Simons and Daniel Levins, involved a field study consisting of an experimenter who asked for directions from a stranger in a park. Two other experimenters were close by, carrying a painting.

role for attention, proposing that it ultimately guides our actions.

As the painting passed in between the stranger and experimenter, the experimenter swapped places with the painting carrier behind the cover of the painting. The results show that 8 out of 15 direction givers (stranger) failed to notice the experimenter had changed. This shows that during our day-today activities, we often coast in autopilot. Critiques to this study include the social context to which the experiment took place. Nonetheless, It may be that the human brain has not evolved to deal with a multifaceted, diverse perceptual field that we encounter in cities and when driving in cars etc. It may be that we have an innate tendency to slip into autopilot to maintain cognitive economy. We have seen that attention helps the brain manage the abundance of stimuli encountered during our daily activities. Without parallel processing, we would only attend to individual features of objects and move from one stimulus to another. This hypothetical situation would be debilitating and counter productive to human evolution. Allport (1987) suggested another

Recounting my own personal experience I can quickly recall a scenario that draws together all aspects of attention covered in this article. While conducting a mobile CP tasks in Baghdad and providing covert back-up to a principal car, I would be routinely scanning the area for threats using my visual attention. During this period of intense vigilance I would also be using auditory attention to listen for updates on the operations radio and monitor noises from the surrounding area. On one occasion, when driving through a police checkpoint I glanced across to see what seemed like a suspiciously parked, unmarked car very close to the checkpoint. Within an instant my attentional system had activated my semantic memory resources which activated a threat warning. However, right at that moment the radio crackled into life and my attention was diverted from the car to sending a locations report to HQ. This took place within an instant and as some research suggests, in parallel. In the moments while this was occurring the vehicle I was in drove a further 50 meters, beyond the checkpoint before: BOOM! A massive explosion erupted behind me. My auditory attention was overwhelmed and a pressure wave hit my body. Again within an instant, my attentional processes activated my memory and before confirming with my

50


PAT ATTENTION!

visual attention, I was sure what had caused this explosion. On turning to view the situation, I discovered my attentional processes had operated effectively. The car, which had been laden with explosives, detonated killing at least 5 police officers and wounding many more. That was my lucky day, not only did I survive the incident but I was also given a full and effective display of the brains attentional processes at work. So, how can the research stated in this article help us heighten our awareness during close protection and security related duties? Firstly, being aware that all humans have the tendency to slip into auto-pilot during tasks, despite our best efforts, can help us become aware of the potential dangers when coasting on auto-

pilot. Also, committing contextual threats to memory (just as our hunter-gather ancestors learned that yellow & black stripes equate to danger) will help the attentional filter system select vital information for further processing and action. Finally, we have seen that during times of attentional focus, we can absorb a great deal of information without awareness. This should give operators confidence in the brains ability to process information and react to dangerous stimuli. We have seen that attention is multi-layered and efforts to provide a single definition would do an injustice to this topic. Research into attention continues to produce both new insights and raise further questions on this remarkable function of the human mind.

51


CIRCUIT MAGAZINE ISSUE 34

Keeping Your Edge: Careful what you wish for… but wishing is not enough

By: Elijah Shaw

This profession has allowed me the ability to travel the world and it’s taken a lot of blood sweat and tears. 52


KEEPING YOUR EDGE

Elijah, I’m glad you choose me for the assignment, just so you know I have to be home on the 15th as my son has his little league try-outs.” I have had to make financial and personal sacrifices to get where I am at in my career, and throughout my travels, I continue to run into people who inevitably say they want to do what I do, or one step further, be me. The problem is they see the end result and not the hard work it took to get there. They picture themselves going right from their current situation to my end result just by a chance meeting in a night club, red carpet or worst yet, social media interaction.

careers are defined by longevity, if not then it is simply a job.

So you WANT it, but now do you have the discipline that it takes to get it, and most importantly, to keep it. Remember that blood, sweat and tears I mentioned earlier? That’s not a slogan, each and every word in that statement I experienced multiple times in my quest to follow my career path. Are you ok with missing a spouse’s birthday? How about your child’s? The reality is if you make this a career (not a job), the likelihood of that happening Whenever possible, I try and is high. You are gong to make be understanding of what they sacrifices and you are going to are really saying, but when the lose friends. I know many that situation allows for a longer will say yes in the abstract but discussion, I have no problem when reality catches up and it’s telling someone that they are GO time, sometimes their tune asking for something that they changes. “Elijah, I’m glad you have not put the time in to choose me for the assignment, warrant. Sure some people get just so you know I have to be it “easy” they luck into a choice home on the 15th as my son assignment or “fake it until they has his little league try-outs.” make it” but I have always said, you should measure your success I’ll have to be honest and say, if the assignment extends past in the executive protection the 15th, I’m likely going to use industry by way of longevity. Measuring YOUR success by what someone else from the outset. current status your client has, or Why? Because VIP clients the number of zeros in his or her appreciate familiarity, and the rotation of security personnel, bank account is an illusion, it’s temporary. If the plan is to make does not project stability, but rather just the opposite. Close Protection a career, then

53


CIRCUIT MAGAZINE ISSUE 34 And then there are those that profess being ready with their mouths, but have none of their ducks in a row. For example, you are not ready to work with clients that travel internationally if you do not have a passport. That might sound like a nobrainer, but I would swear on any holy book you put in front of me that I have had individuals who have done just that. Yes, there are ways to obtain a last minute passport, but that’s not going to inspire confidence in me as a decision maker, and it’s just an invitation for Murphy’s Law to strike. Oh you have your passport, so what I’m saying doesn’t apply to you? Here’s a question, same scenario, for US based agents, do you have your Global Entry Card? The client does, and upon their return to the US they are going to bypass the long lines, whisk right through Customs and Immigration using Global Entry, grab bags and depart the terminal. You on the other hand are going to be number 87 in the regular line watching the client walk out, because it’s unlikely they are going to wait on you. These are just a sliver of the things you have to do to “Stay Ready” in this profession. Then there’s the “fanboy” mistakes. No, you cannot get a photo or an autography for

the VIP, don’t ask. First of all, it does not inspire confidence, and it makes me question, what your true intentions are. Are you working or trying to be popular with your friends? Don’t be the agent that ends up getting unselected, for a detail because his Facebook page has several photos of him with his arm around (insert celebrity here). In all likelihood this person is not even on the VIP’s Close Protection Detail, but rather was involved with event security in some from and then asked for the photo. However, if you can’t keep it 100% professional then, why would I want to take the risk that you would do it when it is just you and the Protectee alone? I want everyone to achieve their professional goals, and I take great satisfaction in, “paying it forward,” having helped quite a few men and women along that path. With that said, not everyone is ready to move from the minor leagues to the majors, and there are quite a few players who having been drafted, yet still sit on the bench for multiple seasons. To be on the starting team you have to be at the top of your game and minimize errors when it’s your time to step to the plate. Once there, you are expected to produce, each and every time. I mean it’s what you wished for, right?

Elijah Shaw is the National Director of the North American Bodyguard Association and an international security consultant.

54


CYBER SECURITY OFFSHORE

International Cyber Security Offshore; The New Virtual Battlefield?

By: Jordan Wylie

Our reliance on Information & Communications Technology (ICT) is stemmed deep in our everyday lives in the modern world and the Maritime and Offshore Oil & Gas industries are no different at all. Whether it’s the internet (for business or pleasure), dynamic positioning, navigation, GPS or crew welfare terminals, all these come with vulnerabilities that can be exploited by cyber criminal’s intent on causing operational disruption, financial loss, reputational damage or worse still potentially loss of life. Over the past few years we have seen many incidents of cyber-attacks in the maritime and offshore oil and gas sectors including the tilting of oil rigs, malware riddled platforms and even port facilities industrial

controls systems being hacked. Despite these incidents there seems to be a distinct lack of awareness throughout organisations. From the research JWC have conducted over the last 12 months for a study with the Company Security Officers (CSO) Alliance and Coventry University, entitled ‘Cyber Security; The Unknown Threat at Sea?’, we had the pleasure of speaking to security and risk professionals from across the maritime and offshore industries. The purpose of the investigations, which were part of an overall assessment

55


CIRCUIT MAGAZINE ISSUE 34

80% of identified cyber security and information security breaches and related incidents offshore are as a direct result of human error of offshore risk management were to identify how shipping companies and major offshore oil and gas producers managed the cyber threat and how well they understood the risks associated with a cyber-attack.

interconnectivity, cyber security is a threat that needs to be taken more seriously and management need to take responsibility sooner rather than later. At a recent conference I attended in London, it was highlighted that more than 80% of identified The findings were somewhat cyber security and information surprising for me as I made security breaches and related the mistake of assuming that incidents offshore, are as a direct most HSSE managers would be result of human error, this tells taking an orthodox risk based us we need to start getting the approach to managing the cyber basics right before we invest threat (and many were) but on advanced (and expensive) more than 50% of the personnel technical mitigation measures. questioned did not believe cyber Training and awareness for was a security or safety issue personnel is one of the biggest and referred me directly to vulnerabilities right now and with their IT departments for further the clear deficiencies that do not discussion and investigation. necessarily require significant Many organisations I visited investments, the offshore oil did not implement cyber or ICT and gas sectors are high profile, usage policies or procedures, lucrative and attractive targets although this was more prevalent for criminals and ‘hack-tivists’. in the shipping industry and less so in the offshore oil and gas When you combine the absence sectors, the findings were still of training for personnel, the significant. lack of clear and understood policy, with the current economic It occurred to me that the climate and add some fierce maritime and offshore sectors are competition for business, it playing a dangerous game and creates a natural increase in the stakes are extremely high. the risk appetite that security In a world of globalisation and and safety managers may not

56


CYBER SECURITY OFFSHORE may not be fully aware of. We are seeing many energy firms combining Industrial Control Systems (ICS) with much wider networks for the purpose of quicker information exchanges across the operational environment.

beginning to see an increase in Information Technology ( I.T.) and Operational Technology (O.T.) networks being connected together at sea which are also connected to the Internet. It is no secret that many ships and nearly all offshore oil and gas process plants are online 24/7 Although this may be more cost these days and protecting vital effective and offer speed and digital infrastructure against efficiency, it also creates more cyber-threats is paramount vulnerable junctions within the in ensuring a safe and secure system, that can leave operations operational workplace and also significantly exposed to the optimal productivity at all times. outside world. If systems are It is often said that complacency attacked or compromised this is simply a lack of awareness could quickly lead to operational and training and the offshore shut down, which would be and maritime industries need to catastrophic for all stakeholders do more to ensure they are not concerned. the next victims on the cyber battlefield! As more companies continue to increase internet access Top 5 Cyber Security offshore for operational and also Vulnerabilities at Sea welfare purposes, it comes with 1. Cyber Security Training & an increased risk of suffering a Awareness cyber-attack at sea. The Offshore 2. Highly Vulnerable & Outdated Sector and International Shipping Industrial Control Systems and Logistics environments, 3. Lack of Information Security including port facilities too are Policies becoming more complex with 4. Insufficient Separation of less dependency on manual Data Exchange Networks systems by advancing to more 5. Poor Network Protection automated technology. For Between Onshore & Offshore a multitude of reasons and Operations as highlighted earlier, we are Jordan Wylie has spent the last 7 years Jordan has spent the last 7 years as a maritime security advisor to governments, international shipping companies and offshore oil and gas majors worldwide. Jordan holds a Bachelor’s Degree in Security & Risk Management and a Masters in Maritime Security Operations. He is the Principal Consultant at JWC International and the Managing Director of Sovereign Global. Jordan pioneered the global ‘Be Cyber Aware At Sea’ campaign, which is a non-profit initiative to raise awareness of increasing cyber threats to ship-owners and seafarers.

57


CIRCUIT MAGAZINE ISSUE 34

58


WORKING A POLITICAL CONVENTION

Working A Political Convention: Lessons Learned

By: Jason Poston

I recently had the opportunity to play a security role with a large corporate client directly involved with the 2016 Democratic & Republican National Conventions.

The conventions only occur once every four years but it’s scale and magnitude are pretty staggering, involving everything from the United States Secret Service to State and Local Law Enforcement. While at this point everyone knows who the won the nominations, at that time all we knew was this political season would be one for the history books.

Be Flexible This one goes without saying for anyone in this business, but the importance of being flexible cannot be stressed enough. Last minute schedule changes (days off that aren’t!), venue changes, staff changes, and client needs are all fluid and often change with very little notice. You may find yourself conducting bag checks

59


CIRCUIT MAGAZINE ISSUE 34 at a receiving line or entry point, securing an area for the arrival of a VIP, and preforming protective advances and escorting a client, all in the same time fame.

minute and half of that number the next.

Use People Skills As we have all heard stated many times, this is technically a service industry, and that was definitely evident during the political convention. At any given event you may find yourself having to interact or liaison with members of the local law enforcement, agents from the United States Secret Service, U.S. Capital Police, FBI, and various members of other individual protective details. At the same event you will interact with members of the public, caterers, hotel staff, invited guests, politicians, and VIPs from many different arenas. You also have to manage interactions with your own team, all of whom have their own individual personalities. Think on your Feet As mentioned above, plans change, often at the last minute. Things come up, problems are sometimes unavoidable, but things rarely slow down or stop so you can regroup. Learn to assess and solve problems on the move. Teams change, and you may be working with a full team one

Rest when you can Hours are long, schedules are hectic, and the pace is often fast. There can also be bursts of excitement followed by hours of monotony, but every post is important. In order to stay at peak performance, it’s important to take breaks when you can, and sleep when it’s your turn. If in a supervisory role, taking care of the team provides a significant moral boost. Leave politics at home Politics is a touchy subject (especially in the current climate) and debates can get heated. Everyone has an opinion and that’s great, you don’t have to agree with everyone, but let’s be honest, while working a political event, no one cares or needs to know. Leave the politics at the door. In fact, I know some that did not make the final selection process because they were too vocal of their political taste on social media. Expect Problems Murphy’s Law – if something can go wrong at the worst possible time, it will. I’m not talking about security concerns necessarily, I’m also referring to logistics. Don’t assume something that should be

Always have an understanding of what your assignment is, even if it changes five minutes later. 60


WORKING A POLITICAL CONVENTION

common knowledge is common knowledge. Transportation, packing, lodging, departure/ arrival. There will always be that one person who runs late, misunderstands the briefing, or gets confused on the route, and that could negatively affect the entire assignment. Have a plan and know what you are doing Always have an understanding of what your assignment is, even if it changes five minutes later. If you don’t understand, don’t be afraid to ask for clarification. Every role being played is an important one, and every detail is important. Standing post at an out-of-the-way access point may not seem as glamorous as working a VIP escort, but if someone is looking to cause harm or disrupt the event, they will be looking for that weak link the chain like an unguarded door.

Don’t take things personally This far-reaching advice. You will not get along with everyone, your best laid plan will need some tweaking, not everyone will agree with you, and you may find yourself in need of guidance along the way. Do not be offended by helpful suggestions and do not take it personally if someone doesn’t get along with you. Learn to accept feedback – good or bad – and learn from it. Do not let your ego get in the way of a good learning experience. Soak it up Not everyone gets opportunities like being a part of a major political event. Use every opportunity to observe those around you, absorb a much as you can, and use the experiences to make yourself a better EP Practitioner.

Jason Poston is an Executive Protection Professional who was tasked with a Detail Leader role for a corporate account heavily integrated with the 2016 Democratic & Republican National Conventions.

61



WORKING GIRL BY: JACQUIE DAVIS WWW.OPTIMALRISK.COM

working girl

I am going to talk about the two things we are taught we should never mention when at work. doing that would be outside a lot of operators and small businesses budgets. I was on a social media site recently when a well known American documentary maker If you think about recent events in made a comment about all Muslims Paris and Brussels we as companies wanting to take over Europe even quoting Hitler to make his point, were able to have people on the ground in a couple of hours. How? I was extremely surprised that a man who is supposedly educated Because by being a member of and worldly wise was given the air the EU we had no border controls time on television be allowed to to stop at, no paperwork to fill out make such a racist and ill informed and get stamped just an easy ride statement. by car, euro star or plane. Open borders works both ways, yes Another incident on social media involving a Middle East Prince who lots of people can travel to the UK but equally we can travel with ease commented on what is happening in his country was flamed down to Europe, we can sell our goods by yet another so called intelligent and services without being caught operator from our industry. I for up in red tape and high costs. If one was thrilled to be able to ask we leave Europe would that mean this Prince questions and to be we would have to be licensed in each country to be able to operate able to see his perspective on the world from a country that doesn’t legally? The cost and time of Politics and religion, what will Brexit mean for the security operators who operate in Europe? Will leaving the European Union have an effect on the security Industry in the UK?

63


CIRCUIT MAGAZINE ISSUE 34 often give out information. I immediately thought and checked to see if we had this operators CV on our database and if so to delete it. Think before you write comments, as soon as you post it is out there on the Internet for all to read and silly throw away comments can cost you £££’s in work. On a more positive note I recorded a BBC world service radio show to called “The conversation”, the other person was Denidra from Greece although originally from Albania we discussed what it was like to be a female CPO from different parts of the world. Denidra talked about her childhood in Albania and how she would be on the street and hear gun fire at the next corner, as a small child that must have been terrifying I could only relate to us being bombed by the IRA. Hers was an every day occurrence, luckily on the British mainland ours was not.

assessments, team talks and briefings occur no matter where you are in the world. Sadly the same prejudices also occur, we did concur that these were now not so many. As we continue to work remember who it is that pays your wages, you don’t have to agree with their Politics or Religion but have the courtesy to remember you are a service provider, if in doubt talk about the weather.

As Female CPO’s we didn’t have any differences, the same risk

Will leaving the European Union have an effect on the security Industry in the UK? 64


CIRCUIT MAGAZINE ISSUE 34

33


CIRCUIT MAGAZINE ISSUE 34

Security Systems For Businesses

By: Simon Parker

As a business owner, your mind can only be put fully at ease when you are certain that your business assets are secure from potential thefts.

Whatever the size of the business, whether it is small or large, retail or commercial, it is guaranteed to have a range of

valuable assets like computer systems, data and other expensive items that are at risk of theft.

66


HOW TO CHOOSE According to statistics, the cost of retail theft in the UK rose to £613 million in 2015, which is three times higher of that in 2008. But it’s not just a potential break-in or burglar that is your enemy in a situation like this, it could also be your customers, employees and even your management that are remotely going behind your back. In that case, it is best to consider a security system if you don’t have one installed already. Whilst larger businesses tend to spend around 50 times more than smaller businesses do on security, small businesses should be just as prepared to protect their assets too. Because at the end of the day nobody wants to be dealing with stolen goods and dramatic insurance claims.

employees for safety purposes? It is important to sit down and document your needs for the systems, even if it means bringing security experts in to help you. Once you have set your goals, you’ll begin to have an idea of what the appropriate security systems are for your company and what types of security systems you are going to install.

The different types of Security Systems CCTV Surveillance Systems CCTV systems are very beneficial for all businesses, whether you run an office or own a small convenience store. I suppose you’re probably asking yourself, aren’t they expensive? Well technically yes, CCTV systems Here are a few things to take into are a lot to install, but can help you save money on insurance consideration when installing a and can also prevent a burglar security system for a business. or even a member of staff from stealing company goods or data. Choosing the appropriate In fact, it is said that property security systems which is monitored by CCTV What are your needs for the surveillance is 300 times less Security systems? likely to experience a break-in or Before thinking about anything theft. else, you need to discover what your needs are for the security There are things to consider system and what you want to when installing a CCTV system achieve from your installation. alone. If you would rather have a Is it that you want to keep CCTV system which is out in the an eye on your employees to open rather than discrete, then ensure they’re not stealing? Do the system will act as a deterrent you want to prevent intruders to scare off potential burglars from entering? Or do you who wouldn’t go ahead with want to protect customers and

67


CIRCUIT MAGAZINE ISSUE 34

In addition to the other types of security systems, another extremely important security device which a business should install is fire safety equipment. an act if they knew they were being watched. CCTV cameras which are out in the open are also a great way to increase your employees efficiency and productivity because their behaviour will change if they realise they’re being monitored at work.

system. An access control system would enable your business to control access to certain areas in the building. If your business stores a lot of valuables which are left unmonitored when the office is shut, then an access control system would be seen as a necessity to prevent theft.

The type of lens for your CCTV system is something to consider when installing one. The distance you want your camera to cover at a time can help you discover if you want a lens with great quality and distance to help you discover an intruder’s face. You should also consider how large of an area you wish to capture and you can do this by drawing a blueprint of the area floor to determine the section you want to cover. This will then give you an idea of the appropriate CCTV camera for you.

An access control system can work by either a keypad, key card or even a fingerprint. If you have a small business then several key cards could be an idea, however if you have a larger business, than a fingerprint control system would be more convenient because all members of staff can obtain their own fingerprint access to the building or office. Another thing to take into consideration is the fact that keycards can be cloned or could get lost or stolen, whereas you can’t clone a fingerprint.

Access Control Systems Another type of security system which you could install in your business is an access control

Not only does this system prevent theft, but it can also help improve health and safety

68


HOW TO CHOOSE as intruders are denied access to entering the building, which as a whole keeps employees especially safe and secure in their place of work.

of the day, you want to keep your data, softwares and other assets as secure as possible. Fire Safety Equipment In addition to the other types of security systems, another extremely important security device which a business should install is fire safety equipment. This one piece of equipment is an absolute must, simply to ensure health and safety of employees.

Intruder Alarm Systems Similarly, to prevent potential break-ins from occurring you may choose to install an intruder alarm system as well as access control systems. This alarm system will work alongside the access control system and will If your business doesn’t already send a signal to your telephone or a control centre as soon as the have fire safety equipment installed, then you should really alarm has been triggered. re-evaluate your overall security. If your business has a lot of If you are keen on having a fire hazards, then installing fire reliable source to make you immediately aware of any break- alarms and other fire prevention systems can instantly help you to ins, then an intruder alarm eliminate the chance of a huge system is also a necessity for your business to have. At the end fire breakout.

69


CIRCUIT MAGAZINE ISSUE 34 How do these Security systems integrate together? The whole point of you installing a security system in your business would ultimately be to protect your employees and customers as well as your company’s assets. Although installing one type of security system can hugely benefit your business, installing the whole range of security systems can secure your business to the max. Each system works in tandem with one another to provide your business with guaranteed safety and security. This is one of the ultimate things you need to consider when thinking about installing security for your business. Do you just want to keep an eye on activity with CCTV cameras? Or do you want

the correct intruder restriction system alongside the alarm system to completely narrow down the possibility of a potential burglar even getting into your workplace? On top of that, do you want to have the correct fire safety so that these burglardriven-items neither get stolen nor burnt out? Are the security systems legal? One final thing to look out for when installing the most appropriate security system for your business is if the security company is legally licensed in your state. The last thing you want to do is purchase a security system for your business that is a legal issue.

The whole point of you installing a security system in your business would ultimately be to protect your employees and customers as well as your company’s assets. Simon Parker is the Director of Minerva Security. Minerva is an integrated security and fire service provider. The company operates throughout London and the south east of England. Minerva specialises in CCTV security camera systems, Intruder alarm systems, Physical access control systems and fire protection systems all for commercial businesses.

70


CIRCUIT MAGAZINE ISSUE 34

WAGTAIL

INTERNATIONAL SCHOOL OF EXCELLENCE

Explosive Detection Dog Courses - Drug Detection Dog Courses - Security/Patrol Dog Courses

National Framework, Fully Accredited Dog Training Courses For New, Developing And Experienced Dog Handlers. 

 Open to UK and Overseas based students Open to serving & ex-forces personnel eligible for Enhanced Learning Credits  Residential Accommodation provided on site

All our instructors are highly experienced ex-military trainers who have experience in UK and overseas operations Apply now for more details and to secure a place on our courses HOME OFFICE SUPPLIER OF THE YEAR 2011 EXCLUSIVE PARTNERS AND SUPPLIERS OF DETECTION DOG SERVICES TO THE UK BORDER FORCE AND HM REVENUE AND CUSTOMS

Wagtail UK Tel: +44(0)1745 561166 www.wagtailuk.com info@wagtailuk.com

Other Services: Full Project Management Handler Training And Assessment Kennel Design And Set Up Consultancy For Search Operations Handler Training Courses Specialists In Hostile Environments

33


CIRCUIT MAGAZINE ISSUE 34

BOOK REVIEW Power to Recover: A Complete Guide to Managing Psychological Trauma at Work

Have you ever heard a news report where someone trapped in a burning office building tragically died because they wasted precious seconds grabbing their coat or turning off their workstation computer? Or how about when people say, “if I was ever attacked in a dark parking lot, I would…” But when they are actually confronted with that or a similar traumatic event, they freeze up? Our normal response to hearing these stories is “What a fool! Why or how could anyone do

that?” But when you read this illuminating little book by Liz Royle, PhD and Catherine Kerr, CPsychol, you will understand why human beings react the way they do to these and other types of traumatic life events. The authors have years of

72


BOOK REVIEW

We’ve all heard of post traumatic stress disorder, but rarely does anyone talk about the flip side of the coin… post-traumatic recovery. expertise and knowledge in the field of trauma education and it shows through the powerful examples and practical activities that are provided throughout the book. When you read the concepts and ideas surrounding trauma recovery, it definitely helps to have real-life examples and scenarios to drive the points home. If your work involves management of traumatic incidents, whether you are a first-responder, consulting or advising an organization, facilitating the recovery of those affected by trauma, or simply interested in the psychology of human reactions, then is just the book for you. It provides incredibly useful information on the dynamics of human response, methods of effective trauma recovery for groups, dealing with deaths in the workplace, and provides a wealth of resources for strategic management through proactive policies and training options managers and supervisors. One thing that was

especially illuminating was the section on post traumatic growth and expectancy recovery. We’ve all heard of post traumatic stress disorder, but rarely does anyone talk about the flip side of the coin, especially since there is a tendency in popular culture to focus the incurable soldier whose life is “permanently damaged” and who cannot be “cured” of his trauma. However, the authors reveal research and clinical data supporting post traumatic growth that is uplifting and should be discussed as opportunity to rebuild life that is stronger and more resilient after suffering the distressing effects of trauma. While its size makes it ideal for in-flight reading material or light holiday packing, don’t mistake it by its size because Power to Recover packs a power punch! You might be surprised at how much you will takeaway from this powerful read. So grab yourself a copy and you’ll be amazed at the valuable tools and information you’ll have on effective trauma recovery.

Power to Recover by Dr Liz Royle PhD and Cath Kerr CPsychol can be purchased directly from Amazon by going to: www.amazon.co.uk/gp/product/0995556407

73


CIRCUIT MAGAZINE ISSUE 34 By: SafeGuard Armour

Bullet Proof Vests How Protected Are You? Bullet proof vests are incredibly useful pieces of equipment for Security Personnel. Not only are they available in a variety of models and designs, they can protect against a wide range of ammunition. However, far too few people understood exactly what protection a bulletproof vest can provide. For example, many Security Operatives do not realise that a bullet proof vest cannot protect against weapons like

knives and needles. Moreover, a bullet proof vest may not be able to protect you against certain rounds. So what can your vest protect you against? Body armour is available in different levels of protection

74


BULLET PROOF VESTS HOW PROTECTED ARE YOU? according to the ammunition if can protect you against. The levels available in a bullet resistant vest are governed by the US National Institute of Justice, which is widely recognized as being the world leader in ballistics testing. The testing standards outlined by the NIJ allows for these levels- NIJ Levels- to be assigned to bullet proof vests according to the size, strength, and speed of the ammunition it can protect you against. Below are some of the most common rounds, the most popular rounds, and the most famous rounds available, and what level of body armor you will need to protect against each. 9mm Parabellum The 9x19 mm Parabellum, commonly known as simply the ‘9mm’, was developed at the beginning of the 20th Century for German manufacturer DWM. The 9mm is credited as being the most widely used handgun ammunition in the world, and is commonly used by Police Officers across the globe. The 9mm is often cited as the reason semiautomatic pistols became more popular than revolvers. At higher velocities a Level II vest is needed, but at lower velocities a 9mm will be stopped by a Level IIa vest. .45 ACP The .45 ACP, or .45 Auto, was created for the prototype Colt semi-automatic .45 pistol

developed by John Browning. It was first released in 1904, but only gained popularity in 1911 when it was adopted by the US Army for use in its M1911 pistol. Following this it became far more popular, thanks in part to its moderate recoil and high velocity. The .45 ACP also benefits from a low muzzle flash, but is heavy and costly to produce. Protecting against this round requires a vest at Level IIa. 10mm Auto The 10mm Auto, usually shortened to simply ‘10mm’, was a joint design between the United States and Sweden and first introduced in 1983. Despite boasting superior stopping power, the 10mm never gained the popularity of its shorter counterpart (the .40 S&W). It did, however, gain popularity among certain branches of Law Enforcement, most notably the rescue and SWAT teams of the FBI. The 10mm was designed to be used in semi-automatic pistols, but suffers from high recoil. To stop the 10mm Auto you will need a Level IIa vest. .40 S&W The .40 S&W is named for its manufacturer, Smith & Wesson, and was originally designed to be used by Law Enforcement Agencies. This rimless cartridge did gain popularity among Officers after its introduction in 1990, partly due to its

75


CIRCUIT MAGAZINE ISSUE 34

The .44 Magnum is one of the most famous rounds in the world, featured most famously in the film Dirty Harry. performance against similar rounds, offering both superior power and improved recoil. The .40 S&W was created as a shorter alternative to the 10mm Auto. Protecting against the .40 S&W will require a Level IIa bullet resistant vest. .357 SIG Introduced in 1994, the .357 SIG was designed by its namesake, Swiss manufacturer Sig Sauer. Apart from its reduced recoil, the .357 SIG is practically identical to the .357 Magnum in terms of performance, yet is known for being more reliable. For example, one of the benefits of the .357 SIG is its compatibility with autoloader platforms. However, the .357 SIG never gained the popularity of other similar rounds, perhaps because of its lack of adoption by Law Enforcement organisations. A Level IIa bullet proof vest is needed against this calibre of ammunition. .357 Magnum The .357 Magnum, or simply .357, is credited with beginning

the ‘Magnum era’ of handgun ammunition after its introduction in 1934, and has found popularity worldwide. This round was developed in the 1930s by Smith & Wesson in an effort to re-establish themselves as the leading law-enforcement armament provider. The .357 is well-known for its stopping power, and is largely fired from revolvers, although it can be fired from certain semi-automatics, notably the Desert Eagle. A vest at Level II will protect against this ammunition. .44 Magnum The .44 Magnum is one of the most famous rounds in the world, featured most famously in the film Dirty Harry. The film is often attributed with the rise in popularity of the bullet, as it had remained relatively unknown for the 16 years previous. The .44 Magnum is famous for its stopping power, which naturally causes muzzle flash and high recoil. The .44 Magnum will need a Level IIIa bullet proof vest.

76


CLASSIFIEDS

Classifieds

United Kingdom 3D Security Ltd Taunton, Somerset, TA1 1TG Based in Taunton 3D Security provides security services for a wide range of clients. Whether you need a security guard in Somerset, event security in Leeds or Close Protection in London we will provide a solution for your needs. T: +44 (0)1823 253 001 W - www.3dsecurity.org E - enquiries@3dsecurity.org.uk

A.B.I. Solutions A.B.I Solutions is a dynamic, forward thinking company, specialising in surveillance, security and investigations with local, national and internationalexperience. A.B.I provides a wide range of services to the corporate sector and individuals alike. W - www.abisolutions.co.uk Amanda Campbell A highly motivated and experienced female operative both CP and Surveillence training T – 07596542249 W - www.amandacampbell.org.uk E - ac@amandacampbell.org.uk Ambassador Security Management ASM MK Lions Arena, Grafton Court, Snowden Drive, Winterhill, Milton Keynes, MK6 1AJ, GBR. After successfully gaining ACS (Door Supervision and Manned Guarding) along with ISO 9000, we here at ASM have a dedicated management team with hundreds of years combined experience in the security industry. W: www.asmsecurity.co.uk E: scott@asmsecurity.com T: 08458335750

designed to help both individuals and New Companies build for the future as well as support others with training needs. T: 07725970954 W: www.atlantianbsgroup.com E: info@atlantianbsgroup.com Briareus Security Our aim is to give a complete, discreet and professional service to all of our clients, be they large corporations, small businesses, local authorities or private individuals, all tailored to meet their individual needs. W: www.briareussecurity.com E: info@briareussecurity.com

Mark Corder - Chief Executive of Carmdale Ltd Suite 3 219 Bow Road London E3 2SJ Mark is a former Senior Police Officer specialising in counter-terrorism; firearms; public order; training and also physical, Critical National Infrastructure and nuclear security, having had responsibility for the security of the UK’s nuclear deterrent. A former Head of Operations, Operational Support and Training, Mark has been involved in a number large-scale incidents (including 7/7) and has also worked at the Office for Security and Counter Terrorism (OSCT) at the Home Office as part of a review into Critical National Infrastructure security. Mark has an MBA via the OU. E: mark.corder@carmdale.co.uk T: +44 (0)844 995 9900 W: www.carmdale.co.uk Alastair Christie Advice on site security, perimeter fencing, lighting, CCTV and manning requirements. Monitor and advise on guard force setting up site procedures and guard SOP’s. T : +44 (0)7736 328112 E : ally.c9496@yahoo.co.uk

Ark Personal and Asset Protection Ark, 2b Crow Lane, Rochester, Kent, ME11RF, GBR A small, efficient, highly descrete company employing ex special forces and detectives for all civil and corporate covert needs. E: Office@arkprotect.com T: +0044 01634 845526

Control Risk Management Solutions CRMS - Ireland Executive Close Protection Operations & Training (B Tec Level 3 Diploma Edexcel) Threat & Risk Assessments, Consultancy Services. W: www.crmsinternational.com E: martin@crmsinternational.com

Argus Europe County Durham Argus Europe has been providing specialist training for high-net worth clients and their families for close to 20 years, worldwide. Argus Europe now offer accredited training for CPO’s, Surveillance Operators and Private detectives. Argus Europe is an operational company working globally with an extensive variety of contracts. W: www.arguseurope.co.uk T: +44 (0) 8456 123 843

Crest Security & Surveillance Ltd 51 The Crest, West Heath, Birmingham, West Mids, B31 3QA, GBR Highly experienced Security Consultant with a proven record of accomplishment in the field of protective security. Skilled in all phases of risk assessment, operational planning, logistical organisation, implementation of security measures, security team leadership, project coordination, and delivery of security advice to a high profile clientele. E: info@stephencahill.co.uk T: 447977071427

Atlantian Business Solutions Group Rutland, LE15 6SD, GBR Atlantian Business Solutions has been

77

CSI Protection Ltd International, GBR A well established security consultant and personal protection operative providing high or low Key protection to high risk and prestigious clientele. Specialising in the maritime industry as a consultant for private vessel protection on super yachts world wide. W: www.csi-protection.co.uk E: gary@csi-protection.co.uk Custodia Custodia is an independent client focused Specialist Security & Risk Management Company, specialising in Risk consultancy and Security project management. Providing a comprehensive portfolio of Risk mitigation solutions to assist Businesses and individuals to plan for, manage and mitigate risk. T: 01432 277693 W: www.custodia.co.uk DF Risk Management Solutions DF Risk Management Solutions N.I. is a modern, professional risk management company, with a diverse range of global strategic experiences and a team of executives who possess dynamic but complementary backgrounds. T: +44 (0)7837642686 +44 (0)7758743918 W: www.dfriskmanagementsolutionsni. com Executive Protection Officer Worldwide CP services W: www.executiveprotectionofficer.com First Class Executive Security Nottingham, UK, Nottingham based, fullservice company specializing in Bodyguards and Security Consulting services. Extensive experience in VIP security, also caters for public and private sectors. W: www.firstclasssecurity.co.uk T: 0115 9266466 G6 Global G6 are specialists in all types of radio, telephony and satellite communications for both voice and data with particular emphasis on covert communications installations in both vehicles and fixed locations. In addition, our range of personal covert radios and bespoke accessories is extensive. W: info@g6-global.com T: +44 (0)1454 610050 Gordon Russell Highly trained frontline Close Protection Operatives available for UK and International contracts. Our experienced CPO’s can offer bespoke packages to meet all clients needs, including a variety of language skills. All SIA licenced, BBA member E: Bodyguard-cpo@Email.cz T: +44 (0)7917 281 004 Gareth Evans - CPO, MSO Reliable dedicated hard-working


CIRCUIT MAGAZINE ISSUE 34 security professional, with outstanding communication skills. Strategic approach to problem solving combined with exceptional interpersonal skills, quick to grasp new concepts and information. Highly motivated, results-driven and thrives under pressure. Strong leadership and management skills with proven experience committed to continuous personal and professional development. E : evansgareth1979@yahoo.co.uk T : +44 (0)7900058603 James Izett All close protection task undertaken, including training tasks. Medic (Registered with the HPCSA, Registered FAAW instructor and Assessor E : J.Izett@gmail.com T : +971 (0)505 574 350 Janice Gurney Proficient and diligent Security Professional gaining extensive knowledge and experience within the security sector. Proactive individual who has a logical, flexible and conscientious approach to all challenges undertaken, ability to work as a member of a team or as an individual willing to work anywhere. T : +44 (0)7885 793061 E : janice382006@gmail.com International Centre of Special Training International Centre of Special Training is an international training and security company based in the United Kingdom. Its priority objective is to provide services to the highest level. W: www.icost-team.com T: +44 796 736 55 65 IPSS Security Northfield, Aberdeen, AB16 7EX Security and protection services - UK and overseas. BBA Member. T: + 44 (0) 1224 69455 W: www.ippssecurity.co.uk ISS Training Ltd Riverside Cottages, Nidd Walk, Pateley Bridge, Harrogate, HG3 5NA ISS Training Limited are providers of specialist covert surveillance training courses and publications to the security and investigative industries, enforcement agencies and specialist military units. Formed in 1990, we are the longest established surveillance training ompany in the United Kingdom. Our credibility and reputation is widespread and we offer nationally recognised qualifications. BBA Member. T: + 44 (0) 1423 712265 W: www.intelsecurity.co.uk Jason Morris Security Hertfordshire, UK Providing a wide range of Door supervision/ security for V.I.P and prestige venues, Concerts, Functions, Corporate and Personal Security, Weddings, Private Parties, Gala Dinners, Business Awards & School Proms, Close Protection and Body Guarding Static Guarding and Stewards. T: 01462 478900 W: www.jasonmorrissecurity.co.uk E: agosselin@jasonmorrissecurity.co.uk

John Featherstone Security professional with operational experience gained in a variety of theatres. Main specialities close protection and surveillance. T: 24hrs : +44 (0)7702 740722 E: john@johnfeatherstone.co.uk W: www.johnfeatherstone.co.uk K9 Support Services Ltd K9 Support Services UK Ltd is a supplier of specialist drugs and explosives dog/ handler detection service (which includes arms & ammunition) to individuals, businesses, and the public sector. T: 0845 643 6393 E: info@k9support.org.uk Logas International Tyne & Wear, SR1, GBR Front line SIA, International CPO. Private Investigation and Surveillance operator. E: wscarr@logasinternational.com MLK Security and Protection Services Swindon, UK Close Protection Officer and Door Supervisor E: mattleekane@hotmail.com T: 07917654978 LJE Security Services North Yorkshire, HG1, GBR Close Protection, Residential Security, Asset Protection, VIP red carpet Security and Private Investigation. E: leanneedmondson@yahoo.co.uk One Events Grantham One Events offers you a stress free solution in the organisation, putting together and running of an event. Thisis accomplished by having a group of specialised companies from different industries working together for a more complete service for you. TEL: 0870 974 6779 W: www.oneevents.info Paul Lovatt – CPO After serving 15 year in the Army a move to the Security Industry was a natural step, during the last 10 years I have worked in almost every role in the industry from Door Supervisor and loss prevention to Operations Manager and Director. I have been responsible for the creation and implementation of highly successful crime reduction schemes across Yorkshire working closely with other agencies in the areas of responsibility. Currently I am responsible for the overall running of large events security teams from stewards to Close Protection Officers. Operational planning, contingency planning and flexibility are I feel among my key strengths. E : paul@deltasecurity-eventmanagement. co.uk T : +44 (0)7506726336 Paul Tyler – VIP Protection & Concierge Specialist in discreet personal protection & surveillance. A good current working knowledge of London & its challenges gained through ongoing high risk security operations. Experienced in dealing with high net worth clients with all matters security & concierge striving go the extra mile to exceed expectations through

78

thorough planning & interaction with all involved parties. A strong communicator with a smart appearance who remains synonymous with the principals lifestyle, whilst discretely ensuring a safe environment is maintained at all times, physically capable of adopting a higher profile when required to do so. Demonstrates sound judgement and capability to operate with great levels of autonomy. Exceptional interpersonal skills with the ability to understand, interact & connect with a diverse range of people. E : paul@apparitio.co.uk T : +44 (0)7552515604 W : www.apparitio.co.uk Plymouth Close Protection Highly versatile, physically fit and accomplished security professional with cumulative experience in the areas of security management, close protection, crisis management, risk assessment, emergency management, asset protection and security training. E : chris@plymouthcp.co.uk W : www.plymouthcp.co.uk T : +44 (0)1752 500807 PPSS Group Body armour and stab vests provide a functional solution to individuals who require extra protection in their chosen vocation. All PPSS (formerly ASEO) body armour and stab vests are certified by the UK’s Home Office (HOSDB) and offer unrivalled protection from blunt trauma caused by a punch, blow or kick. Based on our professional frontline experience and extensive research we can confirm that an impact based assault is a more likely event than an attack involving an edged weapon or firearm. T: +44 (0) 845 5193 953 F: +44 (0) 1765 603 512 E: info@ppss-group.com W: www.ppss-group.com Presence Security Presence Security (“ PS ”) is a bespoke security company providing protection for private individuals and VIPs, as well as security services for businesses and organizations. T: 0800 002 9734 E: info@presencesecurity.co.uk Prestige Risks LTD 27 Old Gloucester Street, London, WC1N, 3AX, GBR. Close Protection Secure Chauffeurs Surveillance Residential Security Executive Protection Security Guards Asset Protection T : +44 (0)207 5588182 E : info@prestigerisks.com W : www.prestigerisks.com Prometheus Medical Ltd Prometheus deliver unrivalled bespoke emergency medical support in the form of specialist equipment, training, strategic advice and deployed clinical care. T: (+44) 1568 613942 W: www.prometheusmedical.co.uk Prosec Consultancy Ltd 10 Oakfield business park Westbury, BA13 4WF.


CLASSIFIEDS Prosec Consultancy Limited are dedicated in providing a professional service, which covers a whole range of security services throughout the security industry. T: 01373 228055 W: www.prosec-ltd.co E: info@prosec-ltd.com ProTouch Security ProTouch Security is one of the UK’s key providers of event safety, event security, crowd management, door supervisors, stewards, event management and health and safety. T: 01724 279 522 W: www.protouchsecurity.co.uk Python Security and Protection Ltd Providing Close Protection Officers and Door Supervisors for Events and Venue Security. E : mattleekane@hotmail.com Radoslav Savkov - CPO / Security Consultant Oxford - United Kingdom I would introduce myself as a high calibre Security professional with strong customer oriented skills and managerial experience in the Security Industry, interested in a challenging position, which would fully utilize competences gained and provides opportunities for professional and personal development. With 15 + years of international experience in the sector at all levels and a military background (National Service) as well as a practical Close Protection experience in an executive environment, corporate intelligence and investigations. As a Security professional, I never consider my training and development as a complete, therefore I always look to update further my skills and knowledge. In personal plan I am very loyal, discreet , independent and willing to embrace challenges. E: r.savkov@gmail.com T: +44 (0)7886591525 RSM Security UK Ltd London, UK RSM Security UK Ltd offers the experience and expertise necessary to provide security personnel of the highest calibre when you need them. T: 07850091979 or 07792948523 W: www.rsmsecurity.co.uk E: info@rsmsecurity.co.uk RWSSI Rob W is a professional security consultant with world wide experience and capabilities in Security, Surveillance and Investigation; I can support you to overcome any problems and enable you to achieve your goals E: rob@rwssi.co.uk T: +44 (0)7818 220985 SDS Solutions SDS solutions provide our clients with protective solutions that are second to none, our consultants will discuss every aspect of the problems that you are facing that dictate the need for a protective solution, we promise our clients a tailor made service to meet individual requirements. Whether based in the UK or abroad our protective service T: 01453 887815 E: info@sds-solutions.org

Shadow Close Protection A leading company specializing in Executive Protection as a professional sector, with participation in high and low risk missions, providing global security solutions and consultancy to individuals, corporations and national agencies worldwide. W: www.shadowcp.gr E: info@shadowcp.gr T: + 30 6948539664 Shaun West United Kingdom SIA licensed, Highly Experienced Frontline CPO. Ronin SA trained. Providing security for both corporate and hostile environments. E: sw@shaunwest.co.uk T: +44 (0)7830 109 601 W: www.shaunwest.co.uk Mark Claydon-Smith – CP Team Leader and Medic I have spent 13 years in the Royal Navy Culminating in the rank of SNCO Petty Officer. In 2004 I started my security career and have worked in Hostile environments. I have held several positions including Operations Manager, Team Leader and Rig Site Manager. I have worked in Kurdistan, Afghanistan and Iraq as well as the UK and Europe. E : mark@claydon-smith.com T : +964 (0)7815 970433 Philip Shearman MSyl – CPO, Risk Manager A professionally Qualified Close Protection and Surveillance Operator and Team Leader with over twenty two years of experience gained in the Military Police, the last fifteen of which were spent with the Military Police Close Protection Unit, working in various hostile countries throughout the world. Since leaving the Army in Nov 06 I have worked in the Private Security sector. I have gained valuable experience in demanding and challenging operational environments, where I have proved to be a self motivated and resourceful individual, performing well under pressure, communicating effectively at all levels whilst exercising tact, diplomacy and integrity. E : benshearman10@hotmail.com T : +44 (0)7930 277586 Spotllght Protection Services Essex based business which provides a broad and growing range of security services to businesses and organisations large and small. T: 07870560208 E: info@spotlightprotectionservices.co.uk W: www.spotlightprotectionservices.co.uk VIPA Tactical Training A specialist training academy dealing with four specific areas of combat: VIPA Civilian Self Protection Program, VIPA Close Protection Combat System, VIPA Police Defence Tactics and VIPA Military Close Quarter Combat. BBA Member. W: www.VIPAtacticaltraining.com Yoji Security We established Yoji Security in response to our perception of declining professional standards across the security industry. We strive to provide first class customer service in everything we do, drawing on our

79

extensive experience in the fields of special operations, intelligence, counter terrorism and close protection. T : +44 7903231076 E : enquries@yojisecurity.com Europe & Africa International Security Academy P.O.Box 5833, Herzeliya, 46000, ISRAEL. Our graduates are more recognized, respected and sought after by Distinguish Protection service “consumers” and by most of the “Providers” of Protection services worldwide. Organisers of the 2008 International Summit of Protection Officers. BBA Member. T: + 972 9 950 0969 W: www.SecurityAcademy.org.il Javier Galan Spain Security specialist available for operations around the world. E: oejju@hotmail.com T: 34.637080771 Military Grade Encryption Phones PO Box 52310, Limassol, CYPRUS Built-in encryption software which converts your voice to encrypted data using a constantly changing mathematical formula. It uses a dual layered RSA/AES combination and a changing session key which modifies the encryption algorithm every second. € 1,398.00 + VAT. All prices include new Nokia N73 phone. BBA Member. T: + 357 7777 7276 W: www.protechcy.com/new TPT Firearms Training Bratislava , Slovakia and Rome , Italy We know from our extensive experience within the industry that it can be daunting when initially carrying a firearm and being responsible for protecting a clients life, but learning the proper techniques and having the ability to understand the weapon will make the job a lot easier and more enjoyable. Hopefully you will never have to use the weapons you carry, but should this prove necessary you will be confident and knowledgeable enough to handle the situation professionally and effectively. T : +44 (0) 7734101910 E : info@tacticalprotectionteam.co.uk W : www.tacticalprotectionteam.co.uk Security Concierge Group SCG Special Projects Ltd, Avenida, Bartolome Vicente Ramon No 10, B16, Ibiza, 07800, ESP Security Concierge Group is a privately owned and fully independent provider of exceptional security services to an interesting and varied range of clients. T: 00 34 600 665 275 W: www.securityconciergegroup.com E: joe.buckle@securityconciergegroup.com Americas Bodyguard Careers Bodyguard Careers is an informational site with the purpose of providing bodyguards with all the information and tools necessary to succeed in the Close Protection Industry Info@BodyguardCareers.com www.BodyguardCareers.com Canadian Use of Force Systems


CIRCUIT MAGAZINE ISSUE 34 7975 Yonge St. # 7124, Innisfil, ON, L9S 1L0, CANADA A professional Use of Force and Defensive. Tactics organization teaching a full range of controlled response options for SelfProtection and Use of Force considerations in public and professional environments. BBA Associate Member. T: + 1 705 456 4333 W: www.canadianuseofforce.com Contact Front Photography Contact Front Photography is the world’s 1st photography studio dedicated to the Close Protection Professional. Stop putting generic or pirated photos on your website; instead commission custom shots to best represent you or your agency. T: +1 (612) 369-6134 E: Info@ContractFrontPhotography.com W: www.ContactFrontPhotography.com Decisiones Estratégicas Buenos Aires – Argentina Executive protection specialists we have experienced in all Latin America, for multinationals companies, also providing support in project throughout Latin America to consulting first the US. and UK. We have a team of specialists and psychologists in assistance and crisis negotiation. T: +54(911) 6415 1941 E: jbenitez@d–estrategicas.com W: www.d–estrategicas.com Detective Lacerda P.O.BOX 25996, São Paulo, 05513-970, BRAZIL Providing the full range of security and investigation services throughout Latin America. BBA Member. T: + 55 (11) 3452 4388 W: www.detectivelacerda.cjb.net Giovanni Rossi South Africa Doctorates in Criminology, Vessel Security Officer, ASP Instructor, ISSPC Member, BBA Member, IAPPA Member, American Bodyguard and Protection Instructors Association - Lifetime Member E: rossi1@mweb.co.za T: +2783 415 9205 USA Global Bear Protection PO Box 11488, Jackson, Wyoming, 83002, USA Provision of British and US Ex Special forces security/medical specialists. T: 307 413 3619 W: www.globalbearprotection.com E: bear@globalbearprotection.com

The Team: Editor Managing Editor International Editor Art Direction

Shaun West Jon Moss Elijah Shaw Peter Falkous

Contributors: Mark “Six” James Joseph M LaSorsa Miguel DeCoste Dr Liz Royle Dr Amy Burrell Joseph M LaSorsa Orlando Wilson Jacquie Davis Einar Myklebust Joseph M LaSorsa Kate Owen Jon Moss

Icon Services Corporation 1043 Grand Ave. #312, St. Paul, MN 55105, USA A full service security and investigative agency specializing in providing high-level security and bodyguards to international celebrities, public figures and corporations. Licensed, bonded and insured, our diverse roster of clients reads as a virtual who’s who in the corporate, motion picture, fashion and recording industry. Entering into our 10th year, Icon has been the hand picked choice to provide Executive Protection to everyone from Superintendents to Supermodels. BBA Member. T: + 1 651 695 8778 W: www.Industry-Icon.com Imperial Protective Service, LLC 15849 N. 71st Street, Suite 100, Scottsdale , Arizona, 85254, USA Imperial Protective Service’ (IPS) is a security consulting and services firm founded in 1978. IPS provides both national and international corporate, executive and celebrity protective services. BBA Member. T: + 1 480 281 1588 W: www.executiveprotect.com Panther Protection Services 3695F Cascade Road, Suite 2207, Atlanta, GA 30331 Panther Protection Services is a full service protection agency offering such services as threat assessment, executive protection, self-defense training, firearms instruction, and high risk tactical protection. Our executive protection specialists have over 75 years of experience. Panther can handle your protection needs whether around the corner or around the world. Member: BBA and NABA T: (404) 349-9117 W: www.pantherprotectionservices.com Rouven Rohler - Security Consultant / HSE liaison Romania I am a very fit and mentally robust Security Specialist with quality experience gained in the security (Military, Maritime and Commercial Operational Security (Oil& Gas). I have improved the effectiveness of protection teams and significantly enhanced clients’ awareness. My career commenced in the Australian Army, which included hostile environment deployments to Iraq and the Solomon Islands and I have since been operating on various contracts throughout Afghanistan and Iraq. I am now looking to make a continued significant contribution within similar High Risk contracts. E: rouven@y7mail.com T: +40 (0)746 642 739 Our Sincere Thanks to all those that continue to contribute their wisdom and experience for the enjoyment of others The Circuit is compiled, edited and published in the UK and US bi-monthly. W: www.circuit-magazine.com E: info@circuit-magazine.com T: +44 0191 645 0865

80

SILVER STAR PROTECTION Executive protection, site and event security with global experience. Serving southern Minnesota with integrity and professionalism. Former USSS, ICON Alumni. available for domestic and international travel. Robert E. Jones Manager/CEO W: www.silver-star-protection.com E: rejones@silver-star-protection.com TSICS (T6) Miami, Florida, USA TSICS (T6) provides the following services in Central America: Executive Protection, Individual Bodyguard, Close Protection Training, Corporate Invest. W: www.security-professionals.org/ members/saldrix E: tsics.t6@gmail.com T: +502 6645 6822 Tony Scotti’s Vehicle Dynamics Institute 1162 St. Georges Ave, Suite 277 , Avenel, NJ 07001, USA The first name in advanced driver training, offering our highly acclaimed Protective/ Evasive Driving Programs. Designed specifically for today’s executive chauffeurs, executive protection professionals and others who are responsible for providing safe and secure transportation services. BBA Member. T: + 1 732 738 5221 W: www.vehicledynamics.net Vindex Personal Protection & Investigation Inc. 497 Hooksett Rd #365 Manchester NH 03104 603.289.3161 / Full service Private Investigations & Executive Protection. 10 years combined Law Enforcement, Private security, close protection work, & security contracting. NY Mayors, U.S. President’s, NFL owners, and VIP’s are some of the protection work I’ve gained experience with. ICON alumni, NABA member. T: + 1 732 738 5221 E: vindexinc@aol.com W: www.vindexinc.com Asia Pacific Asia Protective Group Ltd Asia Protective Group (APG) is a Hong Kong based risk management company, specializing in executive protection, overseas travel security and security consultancy services. APG has an extensive network of security specialists operating throughout the Asia Pacific region. W: www.asia-pg.com E: jim@asia-pg.com E: yvonne@asia-pg.com DISCLAIMER While every care has been taken to ensure that the information contained in this magazine is both accurate and up-to-date, The Circuit accepts no liability in any part for loss or damage incurred by reliance on information contained in this magazine through omissions, errors, howsoever caused. ©COPYRIGHT Copyright remains with the authors and contributors at all times. No part of this publication can be copied or reproduced in any way whatsoever without permission from the publisher AND the author / contributor.


CIRCUIT MAGAZINE ISSUE 34

33



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.