Circuit Magazine #52

Page 1

News • Opinion •

Reviews •

Exclusives •

Intel

52 PROTECTING THE PRINCIPAL IN A PANDEMIC

COVID19 How it Affects You

DETAINED Arrested Overseas

TECHNOLOGY Problem or Solution?

AMMUNITION Why the JHP? TSCM

///

CYBER SECURITY

1

///

EMOTIONAL INTELLIGENCE


CIRCUIT MAGAZINE ISSUE 52

CONTENTS 14

02 Contents 04 UK Foreword 07 US Foreword 08 Industry News 14 Technology In Security A Solution or Misused? 20 COVID-19 Just Another Threat?

26 36

26 Emotional Intelligence A Core Skill in EP 36 Detained Arrested Overseas 46 TSCM In the Workplace 54 What's in the Bag? And Which One?

64

64 Protecting the Principal in a Pandemic A Panel Discussion 72 Cybersecurity Intro to Steganography 78 Fit for Purpose More Than Just a Workout 86 Tactical Firearms Methods of Carry

2


CONTENTS

20 96 Ask the NABA Network 98 Securing Smart Home Devices Finding Vulnerabilities 106 Other Side of the Desk EP in the Classroom

114

114 Ammunition Why the JHP? 121 Foot Steps Mike Smith 126 Global Event Map

121

128

Keeping Your Edge Encore

135

Classifieds

3


EDITOR FOREWORDS

There is a strange eerie feeling writing this foreword. We are in times not seen before, certainly within our lifetimes.

As countries all across the world have implemented their various response plans to tackle the spread of COVID-19, there aren’t many of us who haven’t been affected in some way.

crisis of 2008, this crisis will come to an end. We will bounce back, so remain optimistic; times may be hard, but the whole world is in this together. I encourage anyone affected to keep a positive mindset and for all lucky enough to be in work, keep an eye on plan B, you may not have much warning for when you need to implement it!

For those working in the Security Industry, it is not business as usual, and nobody knows when normality will resume, if at all. One thing’s for sure though, when the dust settles there will be a requirement for new protocols and procedures to be in place to ensure the safety of our principals.

In this edition of the Circuit, we felt it was necessary to cover the pandemic, and so we have features focusing on the operator’s perspective during a pandemic. However, we also recognise most of you will appreciate some escape, and so we’ve got plenty of non-COVID features for you to enjoy too.

It has been heartening to see so many businesses coming up with innovative approaches to continue operating during the crisis. I have personally consumed a lot of webinars and have been impressed to see content that is usually only delivered in-person being broadcast in this way. I think it will lay the foundations of a new way of operating and one we may not revert from.

Finally, signing off, stay positive, stay safe and from us here at the Circuit we would like to thank you all again for your support of the Magazine. Stay in touch and let us know what subjects you would like us to cover. And, if during this period of isolation, you feel like trying your hand at writing, then drop us a line, there’s been no better time to start!

The last couple of months have been like no other, forcing many to have to take stock of where they are going.

Stay safe, Some of you may be facing hardships Shaun West right now, but it is important to remember, just like the global financial Editor

4


10 Mar – 22 Mar 2 Sept – 14 Sept

2

21 Apr - 3 May 30 Sept – 12 Oct

5


PERSONAL COUNTERING VEHICLE SECURITY ATTACKS SNIPERS IN HOTELS

COLORADO 2019

MAY 2020

6


CIRCUIT MAGAZINE ISSUE 52

Welcome to The New Normal. While the current outbreak-turned-pandemic has been around for a few months now, this is the first issue of the magazine living in the world I’ve now termed The New Normal. This world is kind of like an alternate reality to the one we used to live in. In one moment it might seem like things are much the same as they have always been, but blink twice and you will realize it wasn’t just a bad dream, yes you are in fact awake and yes the world has changed dramatically. The effects of the new normal are reverberating across the globe and they are being felt by the rich and the poor, then young and the old. All genders, races and locations have been hit either directly, or indirectly as a result of the health and socialeconomic impacts. Protectors unfortunately, are not exempt. The New Normal is such that many security professionals who would be thriving right now are facing lean times. Even those who work regularly with high net-worth individuals have found the phones silent, be it due to the VIP’s concern for

social distancing, or that their revenue streams having also been hit and they are mindful of outgoing expenditures. While in some areas we are considered, “essential workers,” in others we are just as affected by the Stay at Home and Shelter in Place orders as everyone else. It is during those times we wonder, when this will end? While I certainly do not know the answer to a topic that even scientist haven’t agreed upon, I can say this: Use this time to sharpen your swords and polish your tools. We may be limited in some of our movements, but even in downtime there are opportunities to educate and train to better ourselves. Be it an online course, or just a conversation with a mentor, we can enter The New Normal prepared for battle. Elijah Shaw Editor

7


CIRCUIT MAGAZINE ISSUE 52

Industry News At A Glance

We cast our eye over the main stories impacting the security industry. Here's what's appeared on the radar since the last issue.

French medics need bodyguards for 300 metre commute after spike in violent attacks 04 April Paris, France

“We don’t feel safe.” A bodyguard recently hired by the hospital said he took pride in his work to protect those treating patients during the nationwide coronavirus outbreak.

A PARIS hospital has resorted to hiring bodyguards to escort healthcare workers to their cars and the train station after work due to a spike in attempted muggings and attacks during the coronavirus outbreak.

He said: "They do not come to work to go through this kind of thing after a hard shift. "It's a pleasure for us to help others while they work to help the sick." A second nurse said: "I think it's kind of reassuring to have somebody with us.”

The capital’s iconic station is just 300 meters from the hospital, yet employees do not feel safe enough to make the journey on foot alone between the hours of 6pm and 10pm.

One person who claims to live near the hospital said the neighbourhood has quickly descended into a place of chaos and has fallen under the control of drug dealers.

France has 59,105 confirmed cases of the virus and 5,387 deaths have been reported. The epidemic has given way to a surge in violent incidents against hospital workers.

The coronavirus outbreak has put the country’s health system under significant pressure and overwhelmed hospitals in the Paris and eastern regions.

One hospital nurse told local media: “It’s true that we are often approached for money and things like that.

Source >

8


INDUSTRY NEWS Security Officers at Higher Risk of Death from COVID-19, Statistics Find 11 May London, UK

per 100,000,” the ONS said on Monday. “Compared with the rate among people of the same sex and age in England and Wales, men working in the lowest skilled occupations had the highest rate of death involving COVID-19, with 21.4 deaths per 100,000 males.”

Male security guards working in the United Kingdom are at significant risk of dying from COVID-19, according to the U.K. Office for National Statistics (ONS). “Men working as security guards had one of the highest rates, with 45.7 deaths

ONS figures from 5 May adjusted the coronavirus-related death toll in the United Kingdom to 32,313—signalling the serious possibility that the United Kingdom could end the pandemic as the worst-hit country in Europe. Source >

Family Dollar security guard killed after denying entry to woman without mask 05 May Detroit, MI, US

The video shows Sharmel Teague leave the store in a red GMC Envoy and return about 20 minutes later with two men, Larry Teague — her husband — and Bishop, her son.

Police were hunting on Monday for two men accused of killing Munerlyn because they felt he "disrespected" the women by insisting Teague's daughter wear a mask in the store as required by executive orders designed to combat the spread of COVID-19.

"Witnesses on the scene said they saw two black males enter the store wearing dark clothing," Leyton said. "One of them started yelling at Mr. Munerlyn about disrespecting his wife. The other black male walks up and shoots Mr. Munerlyn. ... Witnesses identified Bishop as the shooter."

"From all indications, Mr. Munerlyn was simply doing his job in upholding the governor's executive order related to the COVID-19 pandemic for the safety of store employees and customers," Leyton said.

When police arrived, they found Munerlyn lying in the store, bleeding from a gunshot wound in the head. Munerlyn, a married father of six who also had three stepchildren, was taken to the Hurley Medical Center in Flint, where he was pronounced dead. Source >

"There is surveillance video that confirms the altercation," Leyton said.

9


CIRCUIT MAGAZINE ISSUE 52

Document reveals Secret Service has 11 current virus cases 08 May Washington, DC, US

This report comes as a pair of cases among White House staffers close to Trump and Vice President Mike Pence have put the West Wing’s coronavirus security procedures in the spotlight.

Multiple members of the U.S. Secret Service have tested positive for COVID-19, the disease caused by the coronavirus, according to Department of Homeland Security documents reviewed by Yahoo News.

According to the DHS document, along with the 11 active cases there are 23 members of the Secret Service who have recovered from COVID-19 and an additional 60 employees who are self-quarantining.

In March, the Secret Service, which is responsible for the protection of President Trump and other leaders, acknowledged that a single employee tested positive in March. However the problem is currently far more widespread, with 11 active cases at the agency as of Thursday evening, according to a daily report compiled by the DHS.

No details have been provided about which members of the Secret Service are infected or if any have recently been on detail with the president or vice president. Source >

Licence-linked qualifications postponed 13 May London, UK

Hence the SIA says that its September 2020 launch date for the new qualifications is unachievable.

In a further example of how the Covid-19 pandemic is affecting public policy, the UK regulator the Security Industry Authority (SIA) says that it has decided to postpone the introduction of new licence-linked qualifications.

The regulator has set a revised target date of April 2021.​​As background, the SIA has worked on this subject for a couple of years, having consulted the sector. The regulator’s motive was to see whether its competency requirements for qualifying to apply for an SIA badge were ‘fit-for-purpose’, to quote Tony Holyland, the SIA’s head of quality and standards, pictured speaking at SIA’s March ‘skills summit’ in London in March.

The SIA – whose head offices in Canary Wharf in London Docklands are shut, meaning that staffers are working from home – says that it has spoken to industry, exam awarding bodies, and training providers who have outlined their difficulties during the pandemic.

Source >

10


INDUSTRY NEWS

EMINEM CONFRONTS HOME INTRUDER WHILE BODYGUARDS SLEEP 30 APRIL DETROIT, MI, US

and the guards came a-runnin' and grabbed the guy. Police were called and rushed to the home ... Hughes was taken into custody and booked on charges of first-degree home invasion and malicious destruction of a building -both felonies.

Eminem came face-to-face with a home intruder who slipped past his own security -- which was sound asleep -- and the guy made it into his living room.

It didn't appear the intruder was trying to steal anything ... seems he wanted a faceto-face with Em.

Police sources, as well as sources connected to Em, tell TMZ ... the break-in went down earlier this month at around 4 AM at Em's Detroit-area home in a gated community.

Hughes is still being held on a $50k bond at the Macomb County Jail.

According to law enforcement... the suspect, 26-year-old Matthew David Hughes, used a paving stone to smash a kitchen window and climbed inside the house. We're told an alarm went off and it woke Eminem. Em got up and found the intruder in his living room. The intruder was detained

11

After posting the story the source later clarified that when they said security was "sleeping" they meant figuratively. We're told his security team was on the front of the property, and the intruder snuck through the back.

Source >


CIRCUIT MAGAZINE ISSUE 52 Celebrity bodyguard Matt Fiddes' world record attempt on hold after breaking hand 24 April Devon, UK

record attempt and fundraiser for the NHS.

Matt Fiddes, who was once the bodyguard to stars including Michael Jackson, was hoping to host a virtual online Martial Arts session in an attempt to break a world record but Devon’s celebrity bodyguard has instead broken his hand. Matt Fiddes, who was once the bodyguard to stars including Michael Jackson, was hoping to host a virtual online Martial Arts session, and break the record for the largest of its kind ever held.

“I was training in the garden on a ‘beat me up Bob’ trying to stay in shape while in lockdown. Instead ‘Bob beat me up’. “For now, I just need to keep it in place and take painkillers until the COVID-19 virus is well out the way and hope it fuses back in some way, as it looks rather odd. “Thanks for your support and money raised via GoFund me for the NHS will be refunded back to you. I will keep you posted.”.

Source >

He had hoped the record would inspire everyone to stay positive and use their time wisely during isolation by raising funds to help key workers and the hardworking NHS staff. Matt Fiddes, a world leading Martial Artist was aiming to host the 30 minute class on May 2 from his Devon HQ with children and families coming together from the UK, USA, and even as far as Australia to highlight the work the NHS and health workers are doing. Posting on Instagram, Mr Fiddes said: “Sadly we have to postpone our world Economic Impact of COVID-19 on Global Cyber Security Market 11 May Dublin, Ireland The global cyber security market is forecast to grow at a slower average rate of 6.2% per year to 2023 due to the economic consequences of the coronavirus pandemic in 2020. The cybersecurity market grew strongly to 2019 due to strong underlying factors including the continued cyber threat and changing attitudes to risk driven by a combination of regulation and improved awareness. Additionally, the growing global economy provided the capital for organisations to invest in new digital processes and the security needed to improve resilience.

12

However, there will be consequences on cybersecurity budgets and reduced expenditure in 2020 even though cybersecurity has evolved significantly since the last recession in 2009. Today, regulation mandates tighter controls on data and privacy, approaches to risk have evolved in digital enterprises, and business models are transitioning to cloud-based or managed services. As a result, security has become an increasingly strategic issue and enterprises are less able to dispense with it when cost-cutting. Nevertheless, enterprises will struggle with cash flow and budget freezes in 2020 and project postponements are likely to be widespread, delaying investment in new cybersecurity projects.

Source >


13


CIRCUIT MAGAZINE ISSUE 52 By: Ivor Terret

Technology as a Security Solution or Misused? As a preamble to this mini-essay, I’d like to let the audience into a bit of my tech background. In my past I’ve worked at a hightech start-up, which was later acquired by one of the largest multinational tech companies at the time.

14


TECHNOLOGY AS A SECURITY SOLUTION OR MISUSED? I then opened Multi Tier Solutions, a company providing unique tech solutions for the security world. Yes, I used to code, and absolutely, I am a proud geek and ardent fan of technology and still occupy an advisory role to some very exciting tech companies. Technology is not only fun, it’s sexy! And it can be extremely powerful. It’s “power” however, that can also be its biggest weakness, when not used correctly by us as the most important factor: the human factor.

impact to prevent a crisis, to respond and manage a crisis, and to recover and to return to prevention after the crisis. The defined and desired impact of each is the result of understanding the risk or which hostile act or crisis event is of higher probability and criticality. Then mapping that threat event or risk to existing measures and vulnerabilities. In this way, each pillar plugs in gaps left open by weaknesses in other pillars.

CCTV Effect In our modern age, as To recap, my philosophy technology develops at of effective and practical warp speed, security security is based on the principle of four pillars. All leadership often places of the pillars work together a higher importance on using expensive to support the goal or technology without the “umbrella/ceiling” of security over the protected considering the operational cost. The “CCTV effect” assets, whether the asset is ever present when is people, property, or security solutions begin information. with “we’ll put a camera there” but without robust The pillars are: tactics to respond to what • Physical means is being witnessed on the • Technological means camera; i.e. no tactics to • Security and nonuse the camera to monitor security personnel a crisis. And perhaps, the • Procedures most prevalent culprit: These pillars are designed monitoring multiple cameras in search of an to function as a cohesive anomaly. whole meaning that individually they are not all equal or even. Each one Then What? Shortly after the shooting serves a unique function at the YouTube HQ in CA, that has an undulating

15


CIRCUIT MAGAZINE ISSUE 52 I was invited to multiple corporate campuses in multiple continents and came across very similar, and worrying phenomena: weapons detection systems. Some of these are very effective at what they’re designed to do, but were implemented as stand alone solutions. What I saw was great detection technology, with absolutely no thought given to what happens if indeed a weapon is detected. No robust physical barriers, no effective security personnel at key checkpoints, and no procedures to guide the incident management process. So, the system has detected a weapon, now what? What policies, procedures, and protocols are in place for security to categorize the person with the weapon as either innocent or dangerous? And, if deemed dangerous, then what?

and the entire campus was evacuated. There was clearly a skilled operator and quality equipment in place to identify contraband within mail. But was there a robust plan in place to identify what actions to take once an issue is identified? Perhaps there were… I was not there, but it’s something to consider – if there is a system in place to identify a threat, there must be a system in place to manage the threat right through the lifecycle until end of incident.

Texting Syndrome Now, to the catalyst for me writing this essay-the “texting syndrome.” I’m getting on in age. I’ve been doing this for a long time and shortly after I was appointed to my first management position back in 1993, I was issued a Motorola “brick” complete with leather shoulder bag. I look at how far communications technology has come since I get it the tendency is to have a knee jerk reaction to then and how powerful and “do something” and appease useful our smartphones are. Yet, conversely, how the C-Suite. And it goes they are making our field without saying that “Call 911/999” is not an effective protection professionals significantly over reliant on incident management plan. communications by text, Because an unbalanced and therefore, less effective and not thought through than they should be. This solution will not prevent, limit, or stop an attack by a manifests itself in various ways and is a result of a determined attacker. Recently there was a hazmat combination of a lack of streamlined communications scare at a large campus

16


TECHNOLOGY AS A SECURITY SOLUTION OR MISUSED? and a lack of self-confidence. And simply not knowing different.

There must be a system in place to manage the threat right through the lifecycle until end of incident. Call 911/999” is not an incident management plan.

• Lack of Streamlined Communications o Not knowing what to communicate results in a flood of information being transmitted by text. o On the ground security needs to know what to communicate and to whom. ▪ If a protectee is arriving at a venue, really the only people that need to know real time are the advance team waiting to receive; and even then, absolutely no text communications should take place at the time of arrival. o More details/ teams than not, are busy texting when their eyes should be looking for hindrances, threats and potential issues and much of this is driven by a need to “log” these comms. Logging is a tool, not an objective. o Have confidence in your teams and team members or change them. • Lack of Self Confidence o It’s a human trait

17


CIRCUIT MAGAZINE ISSUE 52

that crosses all cultures, that when we’re uncertain, or not confident, we look to peers and strangers (social media is built on this) for reassurance and positive feedback. o There’s usually no reason to communicate your every move, your every position and everything that the protectee is doing. o If you’re on it, it’s under control, not everyone needs to know and if they need to know, do they need to know real time (Ask yourself what will happen if you don’t

communicate that message)? ▪ If yes, why not make a call or use a radio? The Crutch Outside the purview of hostile acts, examining the majority of all other operational mishaps, the reasoning by the team will most often be the same and will somehow blame communications or other technology. “We didn’t have the information, we didn’t get the text, there were too many texts, so we ignore them” and “the scanner didn’t pick up on it” are all too common. If everyone does what they need to do and worries about doing their own job/task, they

18


TECHNOLOGY AS A SECURITY SOLUTION OR MISUSED? the human factor is most important. Humans make decisions. Humans respond to issues. And robust with procedures, humans are most effective at using technology. Technology as a solution is not a solution. Old School vs. Modern Sometimes if improperly Marvels used and deployed, it gives Cell phones have greatly a false sense of security. replaced radios during However, if correctly protective operations. This is a gross tactical error. Yes, implemented and combined there are apps to “simulate” with physical resources, a handheld radio, but these people/manpower, and the right procedures, don’t work well during technology is an effective, routine operations and will and often important part, certainly fail you during an of a holistic robust solution emergency. Therefore, my that will perform when put advice boils down to these to the test. key takeaways: • use actual radios to Think of pillars holding up communicate real time a roof during a storm. If information; one is weak, the roof will • only communicate what come off or it will collapse you need and when you on the people inside. need to; But either way, it won’t • keep your eyes up and keep your cell phone down weather the storm. In the same vein, take a similar within arm’s reach for approach to develop and phone calls, when and if maintain a security strategy needed. that is inclusive of all the pillars, takes into account Conclusion all security functions, and Colleagues, clients, and avoid the pitfall of “silo-ing.” friends, please remember: will be less concerned with everyone else and there’ll be less communicationrelated mishaps. Human factor is the most important.

This article was written by Ivor Terret from Enablement Advisors a boutique risk management business providing services to UHNW family offices, multinational corporations and governments. (www.enablement.biz)

19


CIRCUIT MAGAZINE ISSUE 52 By: David Dann

20


COVID -19 IS IT JUST ANOTHER THREAT?

I’ve had the privilege of protecting my HNW principal and his family for some time now, but the recent global COVID-19 crisis has thrown up a new security challenge, or has it? Is it not just another type of threat that the modern bodyguard must adapt to, or should we be covering this type of threat already? If the client would be susceptible to the virus due to the nature of their work, then how can we protect them without putting them into isolation? What emotional worries and stress will this have on the family? What new roles should we undertake? Or should we not? What about the Household staff, or any other external visitors and contractors? What is their risk to contamination and the possibility they could pass it on to the family? Perhaps we should already be doing this? First, we need to understand how the virus is transmitted, and what safety measures can we put in place to create a safe working environment and acceptable to the family

21

first. Don’t forget, while you may be employed to protect an individual, you also have your own family to think of! Scientists still do not know exactly what constitutes a safe distance between one person and another person. While the guidelines vary from region to region many people can’t seem to adhere to a simple 2-meter rule. So, in reality, what should we be doing? Are we doing it already? As protectors we’re currently faced with a lot of questions which we must take into consideration. Regardless of your current policies I’m sure many of you will be revisiting SOP’s in wake of COVID-19. In this article I’ll share some of the ways in which I am dealing with the threat in my working environment. My client is a worldfamous musician and a member of a


CIRCUIT MAGAZINE ISSUE 52 phenomenally successful band spanning over 40 years in the music industry. The cancellation of world tours and the complications created from reorganising dates and events has added to the emotional trauma that has evolved with this pandemic. The emotional impact is just as significant as the physical threat. This pandemic is stirring up a hornet’s nest of problems that need to be addressed to ensure a smooth running of daily life for the client’s family. Have I personally instigated new procedures? Yes, I have, and this has been made easier through the good relationship I have formed with the family. They have learned to trust me in my decision making, and they know their protection and safety is my no1 priority, even though they are having to make sacrifices through the restrictions I have suggested.

You cannot suddenly become a walking medical dictionary and you don’t have inside info on when the situation will change. Still, you can offer a sympathetic ear, rational theory, and be able to come up with compromise’s that are acceptable to the family.

Firstly, all estate staff undergo medical checks daily to see if they might be contaminated; if they show any symptoms, then they leave the estate immediately. No external visitors are allowed on the estate. External family members have been requested to stay away and are doing so. Deliveries to the estate are handled in a separate

22


COVID -19 IS IT JUST ANOTHER THREAT? location away from the family. PPE is worn at all times when dealing with visitors. Food deliveries are dealt with the same way. I go to supermarkets and other places to lower the chance of contamination with the public. In other words, I have established a safe perimeter around the property which I can control. I have undertaken new roles which would not typically be covered. This means my role as a bodyguard is everchanging. I must be able to adapt to the situation to

23

be able to control the risk. Saying ‘it’s not my job’ is no longer acceptable, you must be adaptable to change. In some ways, my role has morphed into that of a therapist. To prevent hysteria and panic, you must listen to the needs and worries of your client and family. You cannot suddenly become a walking medical dictionary and you don’t have inside info on when the situation will change. Still, you can offer a sympathetic ear, rational theory, and be able to come up with compromise’s that are acceptable to the family.


CIRCUIT MAGAZINE ISSUE 52 This can only be achieved if you have the right relationship with your principal. Remember, you work for the family; you are not family, so keeping a professional distance is more important than ever in stressful times.

which, in the past, may have been deemed ‘excessive’ but are now getting the green light.

My role as a family bodyguard will change as required and standard operating procedures must also adapt to these types Looking to the future, I of threats. The news is envision some things will that variants of this virus change, and some will not. will continue to surface for However, this situation has the foreseeable future. We allowed me to implement must demonstrate that some security changes, we can adapt too and that

24


COVID -19 IS IT JUST ANOTHER THREAT?

Isolation is a word that has been used often in conjunction with this Pandemic. The word itself is insular and threatening. we’re not an outdated and unnecessary, expensive add-on which no longer serves its function. Isolation is a word that has been used often in conjunction with this pandemic. The word itself is insular and threatening. Isolation should not be a threat but an opportunity to establish stronger ties with your client’s. If the client and their family see that you understand their concerns and have put procedures in place to benefit them, then it will lead to a better working relationship and job security. This will enable you to make changes as necessary to their security arrangements without the usual negative responses. Isolation can

seem to escalate a small problem into a seemingly large problem due to emotional worries. You, as a bodyguard, must be able to recognise these problems and act quickly to resolve them to keep the family in balance. To summarise; you must deal with this virus as a new threat. Take control of your working environment and any outside threats. Your role and SOP’s will need to change. You will become more involved with the family, and yes, you may need to start thinking about retraining as a psychiatrist! COVID-19 could cause your role to change permanently. Embrace it, it’s time for change!

David has over 30 years’ experience within the security industry and has filled various roles from escorting artists at music festivals to protecting HNW’s and celebrities, through to his current role where he manages the security interests of a well-known Musician and his family. David is also a qualified instructor and has taught CP, DS, CCTV, First Aid Level 3, paediatrics and Stewarding.

25


CIRCUIT MAGAZINE ISSUE 52 By: R.Savkov BA, MSyI, M.ISRM

In this short article, I intend to highlight the importance of emotional intelligence (EI) for professional executive protection (EP) operatives/bodyguards, by highlighting where, when, and how it can impact their career and professional development. In today’s lifestyle and business dynamics, solving emotion-related problems is equally crucial in both personal and professional settings. In a professional context, we deal with complex problems and must work as a team to provide the most efficient solutions for our principals or

clients. Our efficiency and professionalism will be not based on background, position or title, but rather on our level EI and ability to work in a team. What is Emotional Intelligence? There are many books and articles out there about this subject, but

26


EMOTIONAL INTELLIGENCE

27


CIRCUIT MAGAZINE ISSUE 52 I will give you a very brief description of EI. According to psychologist Daniel Goldman, a pioneer of this subject, EI is the quality or skill to understand your own emotions and to stay in control of them, as well as the ability to be aware, how different emotions can impact your relationship with colleagues, associates, superiors, business partners, and clients. According to Goldman, there are five core elements of EI. • Self-awareness. • Self-regulation. • Motivation. • Empathy. • Social skills. I will share my point of view, on how these five core elements of EI can make us better and more successful in our tradecraft. Self-awareness. As EP operatives, we all know situational awareness is one of the most important tools in our armoury. Many colleagues have written articles about the importance of this essential skill, but here

we will look at selfawareness, which is no less important for our development as professionals. Having a high level of self-awareness as a professional means that you have a clear vision of your strengths and weakness. This honest self-appraisal will help us to understand where we are at, where we want to be, and how to get there. Having a realistic vision about ourselves will enable us to use our strengths and to overcome our weaknesses. No one knows everything. Sometimes we need to ask for help and there is nothing wrong or embarrassing in that. The embarrassment comes when we pretend that we know everything and it becomes evident that we did not ask for help when we needed it. Finally, if we are selfaware, we will have a clear understanding of how our emotions and actions will impact the people around us, including (co-workers, clients, and principals).

28


EMOTIONAL INTELLIGENCE

No one knows everything, sometimes we need to ask for help, and there is nothing wrong or embarrassing in that. The embarrassment comes when we pretend that we know everything

This will help us to avoid any unwanted situations and build a good report with all involved parties in any operation. Self-regulation, or Self-control. As protection professionals, we should have a high level of selfcontrol, or as I like to say: if you cannot control yourself, you cannot be expected to control a situation. Because we work in a very dynamic environment with demanding clients and principals on many occasions, heated situations are not unusual. We must deal with such situations most diplomatically and rationally to achieve a positive and productive outcome. As professionals, we should avoid any verbal confrontations with members of the public, colleagues, or principals/ clients. From personal experience, I can ensure you falling short of selfregulation or self-control will not lead to anything productive in the longterm.

29


CIRCUIT MAGAZINE ISSUE 52 Unfortunate to say, that there is too much ego involved in our industry at times. If we do not manage to get in control of it, which on occasion can be incredibly challenging, we can find ourselves isolated and unwanted by the colleagues, principals, clients or business partners. Ego is the worst enemy of our professional and business development. Motivation. Self-motivated executive protection professionals work continuously towards their self-development, which is the shortest way to a successful career or business venture. According to Jack Canfield, a success coach, there are five

signs that you are a selfmotivated learner: • You learn because you WANT to, not because you think you “HAVE” to. • You are willing to admit that you do not know everything. • You are willing to take bigger risks – and get bigger results. • You are more likely to finish what you start. • You are always two steps ahead of the pack. Self-motivated professionals are not afraid to challenge themselves by going outside of their comfort zone. By doing this, we expand our knowledge, and we can increase our productivity and efficiency. We will have more confidence when

30


EMOTIONAL INTELLIGENCE dealing with unexpected, emergency situations. And we find it easier to push our boundaries and unlock our creativity. Every time we face a challenging situation or even failure, we must analyse and self-reflect to see what we can learn from it. Every failure provides a learning opportunity and acts like the best teacher. Empathy. As EP professionals, we should have a high level of empathy. This skill or quality gives us the opportunity to put ourselves in the shoes of our principals/ clients and have a better understanding of their needs, wishes and points of view. This will make it easier for us, as protectors, to manage and cover their expectations and requirements.

nothing wrong with that. The biggest mistake we can make is when we take their perspective in a defensive manner and personally. On so many occasions in my career, I have heard from operators “He/she needs to leave me to do my job. I am the professional here, and he/she is trying to teach me how to do my job.” Very often this statement is inspired not by lack of knowledge or experience, but by a lack of empathy and understanding of different perspectives.

As professionals, we should work towards developing a high level of empathy that will give us a better understanding of our client’s or principal’s point of view. Only then will we be able to fulfil their requirements and fulfil their expectations. This guarantees an outstanding service and satisfaction for our Having this understanding clients. will prove particularly The easiest thing for important because on all of us is to highlight many occasions, our the mistakes of other principals/clients may have completely different operators without trying to help them to develop. views from us on how Highlighting another EP the operation should operator’s shortcomings be run, and there is

31


CIRCUIT MAGAZINE ISSUE 52 or lack of professionalism can be a short-term win for some, but this is not professional conduct. In the long term, this kind of behaviour can negatively affect an EP operator’s reputation in the industry.

mainly in an executive environment, this skill set is vital for our efficiency and ability to build productive relationships with our colleagues, clients, and principals.

Operators who have mastered social skills Exercising empathy are usually remarkably towards our team successful in their career members and helping for multiple reasons. They them to overcome their weak points by mentoring are generally excellent and guidance will improve communicators and can handle good and bad their performance and situations alike. This confidence and benefit allows them to build a the overall performance of the whole team. In the good rapport with all long term, our empathetic involved parties and approach will establish us become natural leaders as influential professionals and influencers regardless of their role in the who will be welcome in company or operation, any team. as well as contributing in a constructive manner Social skills. towards the completion of Social skills are the skills any operation/task. They we use to communicate are good listeners, which and interact with each allows them to build a other, both verbally and good relationship with all non-verbally, through stakeholders and clients. gestures, body language They are exceptionally and our appearance. As good diplomats, which professionals working

Exercising empathy towards our team members and helping them to overcome their weak points by mentoring and guidance will improve their performance and confidence and benefit performance of the whole team. 32


EMOTIONAL INTELLIGENCE

author Ann Holland wrote that we can develop and improve our EI by practicing the following skills: • Be an active listener, including being aware of nonverbal cues. • Think before you speak; By listing all these continuously work on qualities of effective improving communicators, we can communication skills. agree that an EP operator • Be comfortable with with these skills would praising others. be a great asset to any company, team, or client. • Accept, value and appreciate others for their uniqueness. Practical tips to • Learn conflict resolution improve EI. skills. According to an article • Demonstrate patience published in the April and empathy. 2019 issue of Forbes, allows them to deal with challenging situations in a professional manner, minimizing any potential negative impacts on the reputation of the clients/ principal or company.

33


CIRCUIT MAGAZINE ISSUE 52 • Manage your own stress, slow down and calm down. • Get to know your employees and peers; know what challenges them and soothe them. • Identify and manage what triggers your own emotions. • Identify and manage what triggers your co-worker’s emotions. • Do not be shy about engaging with a mentor, coach or other resources for help. Developing and improving our EI is an ongoing process and not a one-off action that can be ticked off a list of skills. If we want to be at the top of our game, we must develop ourselves continuously emotionally, as well as professionally. Conclusion. As a freelance EP operative, mainly in high-end executive environments, I have had the opportunity to work with many different people, teams, and clients. Through this work,

I have realised that, in the long term, EI is the foundation of any successful EP operator. Understanding and developing our EI can have a constructive impact on our operational abilities as well as business efficiencies. Furthermore, if we aspire to develop as natural leaders and influencers, it is even more important to develop our EI. Our understanding of our own emotions and the ability to pick up on others’ emotional indications can naturally place us in this advantageous position. The higher you’re EI, the easier it will be to achieve your professional goals, be a highly efficient operator, or a successful business owner.

References.

Goleman, Daniel, 1995, Emotional Intelligence, Why it can matter more than the IQ. Stephen R. Covey, 1999, The 7 habits of highly effective people. Ann Holland PhD, Forbes, 17 April 2019, 07:00 am. The Emotional Intelligence Factor In Leadership Development

Radoslav is a freelance Personal Protection Specialist & Security and Business Consultant with over 17 years’ experience of serving international clients. Providing discreet and professional security services to many highprofile individuals, including Royalty, Governmental, Corporate, High Net Worth, and Celebrity clients. A member of the Security Institute UK; American Society of Industrial Security (ASIS) and The Institute of Strategic Risk Management (ISRM), with a strong commitment to ongoing training and professional development.

34


Connect your team with G6PTT. Radio without boundaries. G6 Push to Talk brings you the best from the communications world; the power of network radio using 3G, 4G, LTE & WiFi to give unparalleled global coverage. This system is the result of our successful collaboration with TASSTA; leading edge design and engineering for a changing world. Adaptable, scalable and flexible to fit any operational environment.

The functionality of two-way radio but with no coverage restrictions, and with advanced features that will transform the way you operate. Get in touch to see what we can do for you.

Communications simplified: delivering practical solutions to mission critical users SECURITY | SURVEILLANCE | MARITIME | DEFENCE | HUMANITARIAN EXPLORATION Communication connects everything that we |do. G6 Global exists to create the best communications system for your operational needs.

Web: www.g6-global.com Telephone: +44 (0)1454 610050 www.g6-global.com Email: g6@g6-global.com 35

+44 (0)1454 610050


CIRCUIT MAGAZINE ISSUE 52 By: Orlando “Andy� Wilson

I find it amusing that in the close protection and investigations industry these days everyone is trying to be the squeaky clean perfect little protectors and detectives. This is all well and good as long as nothing goes wrong and the clients are behaving. The issue is when things go wrong and things get heated, which they do often! This is when you need people around you that are streetwise and have a spine, not choir boys who are going to sing and cause more problems for everyone involved.

These days if you travel internationally or you are going to be working in the emerging markets, you are running the risk of being arrested for some reason. Criminals are not the only ones who can end up in handcuffs! It may come as a shock to some people, but many police forces are corrupt. And this is not just in the emerging markets.

36


JAILED ABROAD! I have experienced both police and state corruption in Western Europe and the U.S. Just because someone has a badge, it does not mean they are honest and trustworthy.

pictures of venues, you could be taken for a spy or a terrorist and arrested.

In many places if the local police find out you are providing close protection or investigation services Many people, particularly you’re going to get those who are not well hassled‌ identification, traveled, are suspicious licenses and weapons of strangers, especially if permits are checked to the stranger is a foreigner. start with. Why? Usually for If you are seen acting no other reason than the suspiciously, talking about cops are bored or jealous. security matters and taking And if you're providing

37


CIRCUIT MAGAZINE ISSUE 52 close protection services, they will mess with you in front of your client. Then the cops will drop their business cards to the client in the hope of getting some off-duty work. You can almost be assured that if they find the slightest reason to detain or arrest you, they will! And in developing, third-world countries things can be a lot worse!

killing someone, you will be arrested. If you are a foreigner, the chances will be that the local authorities will be against you to start with and they’ll want to make an example of you. Especially if they find out you’re a bodyguard, investigator, or security contractor.

You need to make plans for what to do in this situation. You certainly don’t want A simple example I can to end up in a third-world give is when I was once prison because you took traveling with a group of out a gun off and shot a people through Italy in the kidnapper, who turned out early 1990’s and we came to be a police officer. In upon a port on the Adriatic many countries, even in where several of the group the post-9/11 developed members decided to Western countries, the wander off and take some mere fact that you are a photos of some Italian navy foreigner will put you in the patrol boats. By the time I same league as a terrorist had located them, they had in many people’s minds. been taken on board one of Unfortunately, it will mean the vessels and were being nothing if you are a 100% spoken to by the military law-abiding citizen. police. They handed over their film and explained If nothing else, you must they were tourists. In this also remember this: the case, the police were very most dangerous time will professional and everyone be the first few minutes went on their way. But of your arrest. You can in some countries taking expect some level of photos of anything military violence, even from police related can get you into a in first-world countries. lot of trouble. For instance, in the US, most police officer’s first If you are ever involved response to an incident in a violent confrontation is to draw their guns. If and end up hurting or they see any possible

38


JAILED ABROAD!

threat, they shoot! So be very careful, especially when dealing with armed, nervous, and scared police. If you’re providing serious security or investigative services you must always keep a low profile, have an escape plan to a safe location, including having measures in place to get out of the country. Also, you must have protocols in place if you, your client, or team members are arrested or detained by the police, military or government agencies.

39

Being Arrested Below are some basic considerations on what to do if your detained, or arrested. What you say and do depends on where you are, the situation, and the attitude of the police. Just remember in many locations the local police are not paid that well and welcome donations to their welfare funds. • Protocols: You need to have a plan in place and all team members need to know it. At a basic level, everyone needs to know how to


CIRCUIT MAGAZINE ISSUE 52 alert other team members that they have a potential legal problem with the police. A simple coded text message to team members who are not at the arrest location alerting them there is a problem can be enough to get the ball rolling. Additional details such as the exact location of the arrest, details of the arresting police unit, a reason for the arrest can help with responding to the incident. • Being Arrested: When you are being detained or arrested remain calm and try to clarify why you are being detained or arrested, if it is not clear. Be very careful! One wrong word or aggressive statement can land you in a lot more trouble than where you started off. If you are being transported to a police station or jail, try to inform other team members who are not directly involved so they know where you are.

When you are being detained or arrested remain calm and try to clarify why you are being detained or arrested if it is not clear. Be very careful what you say as one wrong word or aggressive statement can land you in a lot more trouble.

• Know Your Rights: Part of your pre-planning needs to be researching the basic laws of the location you are visiting or staying in. You need to understand what your rights are if you are arrested such as: how long can you be detained for before being charged,

40


JAILED ABROAD! will you have access to a • Documents and lawyer, who will pay for the Translations: Never sign lawyer, will your embassy documents that you do not be informed, will you be understand! If possible, allowed to make phone calls, get your own trusted do you have the numbers of lawyer and translator. those you need to call if you Lawyers and translators don’t have access to your supplied by the local police phone? may not be working in your favor or translating • False Information: questions and documents You need to be very incorrectly. suspicious of any unverifiable information • Being Charged: If you given to you by the police, are formally charged and other inmates, and even given a court date, you lawyers. Any unverifiable will need a decent law information could be false yer who should try to get information that is being you released on bail or given to you to entrap you house arrest as soon as or to get you to sign a possible. confession.

41


CIRCUIT MAGAZINE ISSUE 52

• Questioned Under Duress: You can take it for granted the police will try to intimidate you into giving false statements, signing documents, and in many places, will ignore your legal rights. All you can do in these

situations is stick to your story and wait for those you are working with to arrange for lawyers and legal support. If you are assaulted or tortured, try to keep a record of your injuries, medical attention that you required, and any

42


JAILED ABROAD! hospital visits. • Documentation and Evidence: If you or your team have documentation, photos, videos, or other evidence you need to keep it secure. At the time of the arrest, do everything possible to share evidence with those not directly involved in the incident. If you have photos and videos on your smartphone and they are seized by the police, the evidence will be lost or the phones will disappear. Consider having all photos, videos, and documents on operational phones automatically synchronize and backed up to a cloud storage account that other team members and trusted associates have access to.

if you’re involved in any hostile situations! Take extra precautions to avoid inflicting any additional injuries than necessary to defend yourself against any opponents, as you could end up being charged with additional crimes. If possible, try to make friends with respected prisoners who could help you avoid potential issues with other prisoners or guards.

• Support Groups: Alerting political contacts, charities, and community groups can raise awareness and support. In some cases, the intervention of local or foreign political representatives can speed up cases going to court and lead to the early release of prisoners. • Jail: Even in first-world countries jails are very • Media: The media is a dangerous places where double-edged blade as one can suffer intimidation, it can work for you and violence, and sexual against you. Trusted media assault. Personal security contacts can help raise and safety must be your awareness of your arrest, priority and everything which might prevent from hygiene to receiving you from disappearing proper food must be completely. But information considered. This is where and interviews given to support from team unreliable media outlets members is essential to can be edited and spun send you food and supplies against you! Try to ensue or money to purchase food that media reports that are and supplies. Even though given in your favor do not violence is common in criticize the police, judges, many jails, be very careful or government of the

43


CIRCUIT MAGAZINE ISSUE 52

country in which you were arrest and are detained in. From this short article you can see what a landmine of challenges there are. Hopefully, I have made it clear that you do not want to get arrested abroad! As part of your basic planning you should have worked out plans and protocols on what to do if involved in an incident that could

lead to a team member or the client’s arrest. If you listen to the advice from most embassies, they will tell you to contact and cooperate with the local police if you are involved in a confrontation. Well, my advice would be that it may make more sense and save a lot of trouble and money just to get the out of the area or country as quickly and discreetly as possible!

Orlando Wilson has worked in the security industry internationally for over 25 years. He has become accustomed to the types of complications that can occur, when dealing with international law enforcement agencies, organized criminal and Mafia groups. He is the chief consultant for Risks Inc. and based in Miami but spends much of his time traveling and providing a wide range of kidnapping prevention and tactical training services to private and government clients.

44


BRITISH BODYGUARD ASSOCIATION The dedicated association for dedicated professionals

Membership starting from £60

admin@the-bba.org.uk www.the-bba.org.uk 45


CIRCUIT MAGAZINE ISSUE 52

TSCM in the workplace By: Ben Gunn, Olchon & Associates Ltd

46


AN INTRODUCTION TO TSCM

A TSCM team can work in a variety of areas, and although the majority of requests are in buildings, commercial office space or domestic properties, the current trend of working from home (WFH) has seen a rise in requests for TSCM inspections to be carried out in converted office spaces at the homes of c-suite executives, members of the board, and personnel working on sensitive projects. It is not uncommon to be requested to carry out a TSCM inspection in vehicles, private jets, luxury maritime vessels, and even converted 40foot containers used as mobile or temporary office space; clearly, very similar environments to where CPO’s frequent, and provide their own unique protective services.

of the area, the number of seating/workspaces, the amount of electrical/ technical equipment in the areas, and of course, the threat or the reason for the TSCM request. Please refer to the previous article in The Circuit (Issue 51), where a list of reasons or triggers for requesting a TSCM inspection was produced.

The Quotation The ability to accurately quote for a TSCM inspection has many permutations, and each TSCM provider has its own formula for quoting. It would be remiss of me to comment on another company’s best practice, however, the following criteria should be taken into consideration. The size of the areas of interest (size does matter!!!), the importance

For buildings, even if a pre-inspection site visit or consultancy is carried out, it is good practice to request a copy of the floor plans. Client security protocols allowing, the floor plans will highlight the areas of interest providing all stakeholders, the client, the TSCM project management and most importantly, and if different to the strategic management of the task, the TSCM

47


CIRCUIT MAGAZINE ISSUE 52 team leader with a working platform, and to base the accurate quotation on. Some architects and designers are still providing floor plans in imperial (square footage), but to be current, and metric correct (square meters); for TSCM planning, it matters not. Other considerations taken into account are the construction type and design of the building, including the type of ceilings (high/low, solid, cavity), floors (permanently fixed, cavity), walls (stud partition, brick/solid, etc.) and if a multi-tenanted building, immediate neighbours to the left, right, above and below.

contained in and around the areas of interest is desired but not essential and should not change the price quoted, unless a client requires every telephone terminal and individual line tested. The technical inspection of a telephone line back to the Comms/Server Room can be time-consuming, therefore, we would suggest that an amount of telephone lines is agreed on the quotation, prioritising the most critical lines. Without stating all of the equipment in a commercial property, some notable deliberations include: • Any equipment that transmits data. A formula and guide that Telephony, VTC, smart can be used are; each speakers/displays, and room is assessed as a facsimile machines TSCM area, large, medium, • Any equipment that or small. For an opencontains a SIM card plan office space, internal including IoT (Internet offices, and meeting rooms, of Things) enabled 12 positions/workspaces appliances. There are equate to a medium-sized now vending machines TSCM area. For smaller that transmit data using areas, the workspaces are a SIM card merged to make a TSCM • Current, permanently area. For larger areas, installed, counter the space may be broken eavesdropping equipment down into several TSCM • The layers of security and areas. The floor plans of 1 installations in the Made-Up Place may explain building and areas of better, pictorially. interest Pre-deployment information It is not uncommon for of the technical equipment important meetings to take

48


AN INTRODUCTION TO TSCM A

B

1

a 2-person team

will inspect 8-10 TSCM areas in a 10-hr shift*

2

a 3-person team

10-15 TSCM areas in a 10-hr shift*

3

a 4-person team

15-20 TSCM areas in a 10-hr shift*

4

a 5-person team

15-20 TSCM areas in a 10-hr shift*

5

*supported with the appropriate equipment place in meeting rooms, and then the attendees continue their sensitive, proprietary conversations in break-out areas or a kitchen facility. Finally, sometimes overlooked by the client and TSCM companies is the Comms/ Server Room. As a rule, and if a client permits access to enter this critical area, it should have at least a physical search to check for third-party devices. The areas of interest are to be agreed, thus allowing for an accurate quotation and importantly, avoiding mission creep when the TSCM team turns up. I produce quotes based on a proven, calculation process. On average, one TSCM area with standard office furnishings will take approximately 1 hour to inspect by a 2-man team. Therefore, it is not

49

unreasonable to suggest a TSCM quote could be based on the contents shown in the above Table. The caveat I place on this calculation process is that some flexibility and lateral thinking is needed, especially when it comes to single areas, for example; a Board Room about to hold an AGM, vehicles, aircraft, and yachts, where other legal, technical, and equipment considerations are thrown into the equation. Before anyone raises the flaws in this ‘guide’, I am limited to space in ‘The Circuit’ magazine and will not keep the readers interested if I methodically attempt to explain every term or condition contained in a quote, or the methodology of a TSCM inspection. The lateral thinking is required when one TSCM


CIRCUIT MAGAZINE ISSUE 52 area on its own is asked to be inspected. One would expect a quotation for 1 TSCM area = 1 hour. Setting up the TSCM equipment, frequency searches, and crosschecking of frequency activity can be onerous and add to this, other search techniques, then the calculation of 1 hour would require tweaking. The offer to check the connected rooms, or at least, check the connecting walls of the Board Room, and of course, the Comms/Server Room should be made. I have recently heard of a two-person TSCM team conducting inspections in 40 meeting rooms in a 10-hour timeframe. Using the calculation process in Table 1, my professional conclusion is that 15 minutes to comprehensively inspect each room is unrealistic. The team in question, could have possibly overlooked, vital eavesdropping and InfoSec vulnerabilities. Furthermore, I draft this article based on commercial TSCM. In the public sector, TSCM teams are often requested to conduct ‘deep’ TSCM inspections where one room could take an inordinate amount of time compared to a commercial

TSCM inspection. Every terminal, socket, furniture and equipment is comprehensively stripped and/or searched, every cable run is systematically scrutinised, and every conceivable cavity is inspected. For the avoidance of doubt, the same threat groups and threat vectors are ubiquitous for the commercial and public sectors, but Statesponsored, nefarious eavesdropping, has a greater level of capability and intent. The Equipment As stated in The Circuit (Issue 51), the lack of legislation in the TSCM industry enables TSCM practitioners to turn up with whatever equipment they perceive appropriate. There is no official guide on what constitutes a TSCM team's equipment, so it would be inconceivable of me to propose an equipment list. Nor would I endanger any independence by suggesting a particular make or company supplier. However, adopting some reverse psychology, we can ascertain some of the common eavesdropping threats and then consider the baseline countermeasure equipment a team could, in theory, deploy with. The suggested

50


AN INTRODUCTION TO TSCM 1 Made-Up Place, Fiction, London, MU1 8FN Ground Floor Notes:

Comms Room

Area of Interest: TSCM area #

Kitchen

Meeting Room

1

x

2

Quiet Room

ยง ยง

Areas of Interest = 10 TSCM areas = 8

5

8

Quiet Room

3

Board Room

4 Conference Centre

Meeting Room

Meeting Room

7

6

Classification - Confidential

list provided is not exhaustive:

search equipment

Hard-Wired Microphones. GSM/SIM Card. Hard-wired microphones By utilising the ubiquitous may be pre-positioned GSM (mobile phone) within an area and network, a small, concealed could be connected to device with a SIM card a recording device or installed and a sensitive Listening Post microphone can eavesdrop Counter Measure: on a global capacity Microphone detection Counter Measure: GSM/ equipment and physical SIM card detection, search equipment physical search equipment, frequency search equipment Line Taps. Intercept equipment or Radio Frequency. recording equipment on Radio Frequency (RF) telecom lines leaving threats include the use of a building, lines within small, concealed devices to a building and cable or transmit audio over a short- wiring including audio, range data, and electrical cables Counter Measure: Counter Measure: Line Frequency search analysers and physical equipment and physical search equipment

51


CIRCUIT MAGAZINE ISSUE 52 Telephone Compromise. Telephone instruments are highly susceptible to technical compromise Counter Measure: Line analysers and physical search equipment

Covert Cameras. Long term or short term covert cameras installed with sensitive microphones Counter Measure: Lens detection and physical search equipment

Stand-Off Attacks. Several stand-off technical attacks are possible including lipreading, via telescope/binoculars, etc., use of directional, parabolic microphones towards open windows and apertures, and laser-based technology Counter Measure: Physical search equipment and a good knowledge of how these threats work

Physical Search Equipment. Supporting search equipment including but not restricted to, thermal imagery, hand tools (screwdrivers, etc.), IR torches, torches, a forensic capability, borescope/endoscope, extendable, handheld mirrors

Frequency Assessment. The ability to assess the current frequency activity will ascertain what is transmitting in and external of the areas of interest Counter Measure: A spectrum analyser or frequency search capability Electronic Component Inspection. Concealed passive, and active electronics within the furniture, walls, floors, ceilings, and objects Counter Measure: A non-linear junction detection (NLJD) and physical search equipment WLAN/Wi-Fi and Bluetooth. Insecure or suspicious WLAN’s/ Wi-Fi in range of the areas of interest and a scan to detect any Bluetooth enabled devices Counter Measure: Detection of Wi-Fi and Bluetooth devices

Evidence Gathering Equipment. In the event of a device find, the options for the client are to be offered. However, a TSCM team should travel with an evidencegathering capability TSCM LITE (Limited Inspection Technical Equipment) A concern for any TSCM provider is the time-gap between each TSCM inspection; in some cases, this could be a year. To plug this gap, additional measures may include, but are not restricted to: • A cultural change in the management of information • Employee InfoSec awareness programs • Cell phone vulnerability and advice • Secure communication options • Training the incumbent security team on physical search techniques • Installation of permanent, counter eavesdropping

52


AN INTRODUCTION TO TSCM

detection equipment. For example, SIM card detection From a TSCM perspective, an interim counter measure capability that enhances the physical search could be employed in-between a full TSCM inspection. The provision of a TSCM LITE (Limited Inspection Technical Equipment) capability; a low-cost compilation of equipment that a nontechnical or even a nonsecurity trained person could use: • User friendly – no TSCM or technical experience

• • • • • • • •

required Cabin sized walk-on case, fully deployable and transportable Thermal Imager (TI) RF and GSM detector Endoscope camera Covert camera lens detectors Physical search equipment No maintenance or servicing A suitable addition to any CPO service

Enquiries about TSCM LITE case provision and training on the equipment can be made with the author of this article, details below.

Ben is a former member of the British Army spending 29 years out of a 33-year military career in UK Special Forces – 19 years in the Regulars and a further 10 years in the Reserve. He had a unique military career; initially expeditionary and latterly, 4 years seconded to Intelligence and a further 4 years in a Counter Terrorism liaison role. Ben is a businessman, incorporating a UK Special Forces tenet into his business planning; ‘the unrelenting pursuit of excellence’ and as such, has established under his directorship, a truly global company based in London, offering a multi-service approach to the security of any asset; protecting People, Property (including Intellectual Property), and Possessions. E: ben.gunn@olchon.co.uk T: +44 (0)203 1903030 W: www.olchon.co.uk

53


CIRCUIT MAGAZINE ISSUE 52 By: Mark “Six” James CPO, EPS, CAS

What’s in the bag, and which One? I have always said, “protective services is often dynamic, but it should never be random.” I take that same approach when it comes to my gear. For me, situation always determines the tactics and the tools.

54


WHAT’S IN THE BAG, AND WHICH ONE? Stick around the world of private security, law enforcement, military, preppers or survivalist, and no doubt you have heard terms like “go bags, bug out bags, medical bag, and survival bags.” The problem has been depending on who you talk to those terms have often been used interchangeably. However, from my experiences those bags have quite different meanings and functionality or maybe that is just my Virgo OCD talking. Ask yourself, do you desire your bag to be overt or covert? If this is a go bag, I often prefer for them to be covert, so it does not elevate my profile. Prevention is the ultimate goal of protection, so anything that enhances our situational fluency that allows my client and me to blend into the environment and not be viewed as a target is a win. I generally prefer to stay away from the mole-type bags, so it does not scream, law enforcement, military or security, particularly if I am traveling abroad. When it comes to fighting bags or survival bags, stealth can also be valuable but usually

55

is a little less of a concern as the environment is already deteriorating around you, and the cards may have already been dealt. Regardless of the function of the bag, my experiences have taught me, if you can compartmentalize your bag, it helps enhance your efficiency. When time is life, efficiency comes at a premium. You can buy a bag that is set up that way or create it through inserts or easily identifiable pouches. When I think about bags to include trunk or hatch carry, I think about the environment, duration, and the assets I am charged with protecting. Before we get into the functional types of bags, lets first review some critical risk mitigation terms which help me determine the formula for how I build a bag. The Terminology Threat is the potential harm that can come to an asset (the thing you are trying to protect). That could be any range and number of things including: rain, cold, bear, heart attack, lack of clean water, starvation, political/religious or racist extremists.


CIRCUIT MAGAZINE ISSUE 52 Risk is the likelihood that the harm will be realized. Vulnerability is the weakness by which the harm can reach the asset. The Formula Are all the water sources contaminated? Is this a stronghold for an extremist group? Is this the dead of

winter? How vulnerable are you to the threat or do you have a plan to address it? If so then the risk becomes low. The most important thing to calculate and assess is risk. Not threat. Threat + Vulnerability = Risk to Asset

Bug Out Bag

A bug out bag is a fighting bag. It is minimalistic in its approach it is highly focused, yet versatile. B.U.G. stands for Back Up Gun. It is designed to support any long gun I decide to defend with whether carbine or shotgun, or it may stand alone in defense. Components • Handgun • Handgun Magazines • Carbine Magazines • Shotgun Shells • Flashlight • Knife

• Individual First Aid Kit (IFAK) • Batteries to support the flashlight and any optics on the long guns • Rope or flex cuffs for restraining an intruder or combatant.

56


WHAT’S IN THE BAG, AND WHICH ONE? Go Bag

A go bag is a primary working bag. It is designed to support the objectives of the mission or help enhance operator or team efficiency, client convenience, or medical challenges. It is 70% standard and 30% client-centric, based on how we construct our protective strategies..

Components • Back up charger (Brick) • (2) Chargers (Electric and/or solar) • Batteries • Comms (Smart phone and/or 2 Way Radio) • (2) Flashlights • Glass break tool/seatbelt cutter • IFAK • iPad or Android tablet • Markers (Light and dark) • Multi-tool • Tire pressure gauge • OTC Meds

• • • • • • • •

Roll of Tape Tide Pen Bottle of water Protein Bars Underwear Wedge it Windbreaker Client related items (Convenience or Medical)

For some clients, their greatest threat is their blood sugar being out of balance, so carrying a few candy bars in my go bag may be more beneficial than my driving skills or my firearm.

57


CIRCUIT MAGAZINE ISSUE 52 Traditional IFAK • • • • • • • • • • •

Personal Protection Equipment (PPE) - Surgical Mask and Gloves CAT Tourniquet Chest seal Emergency Trauma Dressings 4” Elastic Bandage 4” x 4” Gauze Sponges 1 Roll Adhesive Tape (4) 1” x 3” Adhesive Bandages Nasopharyngeal Airway (NPA) Trauma Shears OTC Meds (Aspirin, Benadryl, Ibuprofen, Imodium AD, PeptoBismol, Tylenol)

This is the formula I use to determine what equipment is required whether planning a detail or a wilderness trip. Medical Bags/Kits I have several medical bags and the situation dictates which one I may carry. If I am in a formal setting carrying a large medical kit or smaller tactical IFAK one may be not practical with a tuxedo.

For those engagements I carry a modified IFAK with a CAT Tourniquet, chest seal, compression bandage, and gauze shrink-wrapped to fit in my suit or tuxedo jacket pocket. My brother and fellow protector Eric Konohia designed one that he calls the Tuxedo IFAK. When working in urban and suburban environments with malls and formal

58


offices, I may also scale back the size of the medical bag, as those environments are required by law to have first aid kits to include AEDs on property. If I am doing celebrity protection at a concert, the municipalities often dictate that EMS are required to be on site for emergency crowd support, so I know I have the full support of advanced life support tools, staff, and training to support the protective strategy. If I am working with one of my legislators in the rural parts of their district, I will travel with a very comprehensive medical bag, as the EMS response time in the rural parts of the district may be 30 – 45 minutes. If we are responsible for providing large-scale event security, I recommend the full medical bag complete with AED. Tuxedo Individual First Aid Kit (IFAK) • CAT Tourniquet • Chest seal • Emergency Trauma Dressing 4” • 4 x 4 Gauze Sponges Squad Bags like the one pictured below are a bridge between a traditional IFAK and a complete comprehensive medical bag. complete comprehensive medical \bag.

Executive Protection Lifestyle Podcast

"To be good at what we do you must know that it's more than just a job." Byron Rodgers

59


CIRCUIT MAGAZINE ISSUE 52 Squad Bags

Comprehensive Medical Bag

A comprehensive medical bag is typically carried by the team paramedic. The working environment, space, training, budget and legal considerations ultimately dictate the pack out.

Sample Components • (6) Nitrile Gloves – Large • (2) N95 Masks • (6) Surgical Masks • (1) Anti-Bacterial Hand Sanitizer – 4 oz. Bottle • (2) NPAs • (2) CAT Tourniquets • (2) SWATT-T Tourniquets

(great for buddy-aid for use on small framed adults, kids or K9s, however it is a little more challenging when it comes to administering self-aid) • (2) Chest seals • (2) Emergency Trauma Dressings 4” • (2) 5” x 9” ABD Pads

60


WHAT’S IN THE BAG, AND WHICH ONE? • • • • • • • • • • • • • • •

(6) Knuckle Bandages (6) Fingertip Bandages (2) Adhesive Tape Rolls 2” (3) 2” x 4” Oval Adhesive (1) Quikclot (1) Celox Homestatic Gauze (8) 4” x 4” Gauze Sponges (2) Water Jel Burn Dressings 4” x 4” (1) Eye Wash (2) Oval Eye Pads (2) Eye Shields (6) 1” x 3” Adhesive Bandages (8) Alcohol Prep Pads (1) Tube Liquid Skin (1) Emergency Mylar Blanket

• • • • • • • • • • •

(1) SAM Splint 36” (1) SAM Finger Splint (3 Pack) (2) 4” Elastic Bandages (2) Triangle Bandages (1) BVM (Bag Valve Mask) (1) CPR Pocket Mask (2) Cold Pack (1) AED Trauma Shears 7.5” Light and Dark Markers EpiPen (Epinephrine AutoInjector) • OTC Meds (Anti Itch Cream Aspirin, Benadryl, Dramamine, Ibuprofen, Imodium AD, Pepto-Bismol, Tylenol)

Survival – The Rules of 3

When it comes to survival, most people are not planning/building traditional outdoor wilderness type survival bags, but may find themselves building get home bags designed to protect/service them during unplanned extended emergencies (i.e. icy roads or downed trees where the roads are not passable, digging a car tire out of snow, or mechanical car failures). Or instances where they are possibly forced to shelter in place for days or consider hiking to safety. The time of the year you are traveling or the environment you may be traveling through may also greatly impact your preparation, i.e. whether you are preparing for heat or cold related challenges or two or four legged predators. Harshness of the environment, duration and condition of the assets, in conjunction with space dictates and personal conditioning help determine the ultimate pack out. Sample Components • (1) NPA • (1) CAT Tourniquet • (1) SWATT-T Tourniquet (great for buddy-aid for use on small framed adults, kids or K9s, however it is a little more challenging when it comes to administering self-aid) • (1) Chest seal • (1) Emergency Trauma Dressing • (1) Celox Homestatic Gauze • (2) 4” x 4” Gauze Pads

61


CIRCUIT MAGAZINE ISSUE 52 • (1) Water Jel Burn Dressings 4” x 4” • (1) Eye Wash • (2) Oval Eye Pads • (6) 1” x 3” Adhesive Bandages • (4) Alcohol Prep Pads • (1) Tube Liquid Skin • (1) Rolls of Gauze • (1) Elastic Bandage • (1) Roll Adhesive Tape • Disposable Lighter • Firestarter • Box of Waterproof Matches • (1) Emergency Candle • Rope • Tarp or Emergency Tent • (1) Durable Survival Knife • (1) Roll of Duct Tape • (2) Emergency Blankets • (2) Emergency Sleeping Bags • (1) Multi-tool Shovel • Survival Whistle • (2) Flashlights • Batteries • (2) Light Sticks • (1) Life Straw • Water Purification Tablets • (1) Portable Stove • Cooking Utensils • Meals Ready to Eat (MREs for your desired duration recommended 3 days minimum) • Communication Equipment (Smart phone, 2 way radios and AM/FM radio)

62


WHAT’S IN THE BAG, AND WHICH ONE?

The time of the year you are traveling or the environment you may be traveling through may also greatly impact your preparation When it comes to survival most people are not planning/building traditional outdoor wilderness type survival bags, but may find themselves building get home bags designed to protect/service them during unplanned extended emergencies (i.e. icy roads or downed trees where the roads are not passable, digging a car tire out of snow, or mechanical car failures) where they are possibly forced to shelter in place

for days or consider hiking to safety. The time of the year you are traveling or the environment you may be traveling through may also greatly impact your preparation whether you are preparing for heat or cold related challenges or two or four legged predators. Stay prepared and stay safe! Special thanks to Hugh Maxwell, Sylvester Piercel and Eugene Youngl for their professional feedback.

Mark “Six” James is Founder and Executive Director of Panther Protection Services, LLC. He is an internationally published author, keynote speaker, security consultant to educational institutions and frequent contributor to several print, broadcast and online media. Panther Protection Services is a full-service protection agency focusing on Risk and Crisis Mitigation, Protective Services, Self-Defense Training, and Firearm Instruction.

63


CIRCUIT MAGAZINE ISSUE 52 By: Jon Moss

Protecting the Principal in a Pandemic CTG Intelligence recently hosted an online conference on Protecting the Principal During COVID 19, which focused on how to operate effectively as a protection specialist during the highly unpredictable and unprecedented pandemic environment. The event was part of a special series of online seminars designed to provide security professionals with actionable information during the COVID crisis. The events were cosponsored by the British Bodyguard Association (BBA) and all BBA members received free access to attend the seminars as part of their membership.

During the conference speakers and attendees shared opinions, thoughts, and suggestions for how to operate as a close protection specialist in the current pandemic situation. They also gave insights on how the security industry would be impacted by the Corona virus going forward and what changes to expect in

64


PROTECTING THE PRINCIPAL

How the security industry would be impacted by the Corona virus going forward and what changes to expect

65


CIRCUIT MAGAZINE ISSUE 52 the operational landscape. Phelim Rowe, Director of CTG Intelligence, was on hand to open as the host of the conference. The panelists had a wealth of knowledge and skillsets and came from varying backgrounds and experience in the security industry. Each

had years of realworld experience in the protection and/ or medical space and provided valuable insights for attendees of the conference. Among them were: ▪ Krisztian Zerkowitz, Head of Protective Operations, Auriex Global ▪ Paul Steward, Close Protection Paramedic,

66


PROTECTING THE PRINCIPAL

Good security managers should conduct a medical history and screening on everyone who comes in to find out if they’ve suffered from any symptoms in the past few weeks

Medical and Mental Health Trainer, Platinum Oak ▪ Dr. Christopher Sidford, Founder and Medical Director, Black Bag ▪ Kris Coleman, CEO, Red 5 Security Each speaker had years of real-world experience in the protection space and provided valuable insights for attendees of the conference. The experts engaged in lively discussions and provided perspectives on a variety of topics such as: ▪ Current gap in medical skills in the industry; ▪ Contagion medical planning & prevention; ▪ Conducting risk assessments & operational planning for a Principal in lockdown/ quarantine; ▪ Whether there will be a increased need for medically qualified or trained CPs; and ▪ Whether CPs should now rush to get tactical medical training as a result of the pandemic? Conference attendees walked away with actionable insights on how to conduct themselves in the

67


CIRCUIT MAGAZINE ISSUE 52 current close protection operating environment. Some takeaways and key lessons learned on protecting the principal during a pandemic were: Conducting Risk Assessments From an operational perspective, CPs need to go back to fundamentals and apply the golden rules of protection planning and risk assessments to medical scenarios. For instance, from a strategy perspective, many HNW bought ventilators only to later discover that they would never be delivered due to shortage. So, it’s important to think how do we improve our planning and strategy from the outset to account for the unexpected? Scenarios and risks should be assessed as always in a well thought out threat

matrix. Going out and buying ventilators is like “going out to buy a gun. There has to be some intelligence and expertise behind it with the training and proper use, otherwise it’s futile,” explained Krizstian Zerkowitz. Also keep in mind that the entire threat assessment changes during lockdown or quarantine. For example, risk of threats from the outside world will go down, such as crime. However, internal threats such domestic violence, exposure to contaminated staff, or privacy breaches goes up. Quarantine & Contagion Prevention CPs should adopt an ethos that says “everyone is sick” so as not to underestimate people who look well because of lag time in contagion. Dr

It’s not all about crime, terrorism, or IT/Cyber. Security managers must include medical and health risks, including assessing the decision of whether to include an embedded medic within the team 68


PROTECTING THE PRINCIPAL

Christopher Sidford advocates that “Some obvious common sense goes a long way.” Good hand washing, surface cleaning, in and outflow to the residence must be considered a medical risk. For instance, good security managers should conduct a medical history and screening on everyone who comes in to find out if they’ve suffered from any symptoms in the past few weeks. For those who are allowed in the parameter, everyone should be screened

69

multiple times for fevers, i.e. twice a day. It also helps to be meticulous to document this daily. Another thing to consider is how do you bring more operators on in an instance where selfisolation is order of the day? In such a scenario, it would benefit everyone if movements are limited as much as possible. Where movements occur, clear protocols and consistent standards need to be put in place for entry and exit into the residence. And these


CIRCUIT MAGAZINE ISSUE 52 guidelines need to be widely communicated to the entire staff and team. Finally, consider putting other safeguards in place like spreading the team around the perimeter to ensure no gaps and where necessary rotating bodies (i.e. every 2 weeks) for continuity of ops.

In terms of additional medical training, getting additional skills is always a good thing and sometimes even necessary in the case of protecting a Principal with serious health condition such as heart attack. But, in general, and as Paul Steward reminds us, CPs should keep in mind that there Medical Skills Gap & is a limit to the efficacy Training of virtual, online training Principals and clients now in the medical context see the need, more than because learning medical they ever have, for some skills requires practical, kind of medical setup hands on experience. within the protection team. For instance, it Preparation Always may be hard to access Eases Panic reliable medical facilities For the agile and in various locations. The adequately prepared facilities in Manhattan CP, the number one will be very different factor is preparation than those that are and intelligence is key. available in Cape Town. Anticipate where you So, this has heightened are going, what you are the need and awareness doing, and know how of proper medical to advise the Principal arrangements. Therefore, in various locales and medical and health risk situations. Kris Coleman must be embedded into issues the warning that a holistic overall risk for Principals who are assessment. It’s not all not traditionally bound about crime, terrorism, to borders, this can be or IT/Cyber. Security challenging. For this managers must include reason, CPs must speak medical and health risks, up even when it’s tough including assessing the and give sound advice. decision of whether to The more you are include an embedded prepared, the better you medic within the team. can advise your Principal.

70


PROTECTING THE PRINCIPAL

Enhance your own understanding and skills. The more you know, the more you can share with your Principal. Always cite reputable sources to back up any recommendations you make, like the Centers for Disease Control, the World Health Organization or other European bodies. Be diligent in staying knowledgeable with the latest developments so that your suggestions are well-informed

and credible to your Principal. Bottom-line is this: Pandemic or not, being prepared means being trained, having the right resources, and planning for the eventualities and likelihoods from the start to ease panic. These are only a few of the gems the speakers covered. You can access the entire discussion here > Watch Now

Jon fills dual roles as part of the team that runs the British Bodyguard Association, the leading organisation for protection specialists, and is the Managing Editor of the Circuit Magazine. For more information go to: www.the-bba.org.uk

71


CIRCUIT MAGAZINE ISSUE 52

By: James Bore

72


CYBERSECURITY SERIES

Introduction to Steganography

Cryptography, which includes steganography, is a particular interest of mine. While nowadays most of the introductory codes are useful for understanding fundamentals, the mathematics involved for modern cryptography lend it more towards advanced courses and specialists. I didn’t think it was worthwhile going into the Caesar Cipher, or mechanics of the Enigma code, in this article, but there steganography is still very relevant today and is the hardest form of cryptography to computationally detect and crack. What is steganography? Cryptography derives from kryptos (hidden, or secret) and graphein (writing). It includes a whole host of techniques, and one which standards out is steganography which comes from steganos, or covered. What makes steganography unique is that it is a technique of making information hard to

73

find, not hard to read once found. There’s a common phrase in cyber security – ‘security by obscurity is no security at all’, and the concept goes back to 1851. Steganography challenges that idea by providing security only through obscurity. Steganography is not so much a single technique, as a family of them, with new ones being added all the time. All of the techniques share one core concept, trying to hide a message. I’ve heard compelling arguments that Renaissance artists using symbolism in their works were practicing a form of steganography, and ideas like the language of flowers


CIRCUIT MAGAZINE ISSUE 52 go back centuries. When children draw stick figures using semaphore as secret messages to each other, they are practicing steganography. Modern steganography is dramatically more practical, and usually a lot more malicious, and comes in a few fundamental forms. It is used in malware command and control, data exfiltration, and exchange of illicit information and material. If you do not know where to look, or what to look at it is frighteningly hard to

detect. When the hidden message is effectively encrypted, there is very little that can be done. Steganographic messages can be hidden in audio, video, or images with simple, free tools that can be downloaded and run on a mobile phone by anyone. While it is an inefficient method, as the carrier message must be significantly larger than the hidden message, in today’s high-bandwidth world of social media that inefficiency is not an issue. A steganographic message for exfiltration

74


CYBERSECURITY SERIES of data can also be hidden through tunnelling different protocols – a popular method being the use of the domain name system (DNS) queries, allowed through almost all firewalls, to exfiltrate data or infiltrate command and control messages into an existing infection. As the internet as we know it relies almost completely on DNS to work, blocking this is challenging. Methods do exist to detect and protect against this vector, but they are hardly ever deployed. First we’ll look at the more human side, with embedding messages into media files.

smartphone-based systems.

While steganography does have a sinister side, the difficulty of detecting it does make it highly suitable for a lot of benevolent purposes. Any time someone is under electronic surveillance, if they have a pattern of activity including social media postings and a previously established protocol, uploading a selfie with a steganographically encoded message is a simple, fairly secure, and quick way to communicate. This has been used in practice across the world, Steganography Tools including for journalistic One of the best ways to reporting from areas understand the human with surveillance-heavy side of steganography authorities. In fact is to try out some Pixelknot, the Android steganography tools. steganography tool, was Steghide is one open developed as part of the source tool which will Guardian project as part encode a message of their mission to support into almost any media activists, journalists, file you care to name, and humanitarian protected by a passphrase organisations. and an additional layer of encryption. At the Malware and recipient end, or on your Steganography own system, you can One of the biggest extract the data equally problems for easily. Pixelknot for sophisticated malware Android, and Pictography is communications – it for iPhone, are similar is when reaching out to,

75


CIRCUIT MAGAZINE ISSUE 52 or receiving messages from, Command and Control (C2) systems that malware infections are easiest to detect and at their most vulnerable to disruption. Many of the largest botnets taken down have been disrupted in exactly this way, with white hats detecting the method for contacting their C2 infrastructure and either compromising it in turn (then sending out a selfdestruct message, which is not as cinematic as it sounds), or breaking it through other means. The most sophisticated modern malware makes heavy use of steganography not just for C2 purposes, it is also used to exfiltrate bulk data. The C2 side can vary from social media postings (twitter is fairly popular for this, and I suspect there will be campaigns picked up on Instagram before long), through tunnelling protocols. It’s the tunnelling protocols we’ll take a brief look at now.

The most sophisticated modern malware makes heavy use of steganography not just for C2 purposes, it is also used to exfiltrate bulk data.

Tunnelling Protocols At a basic level a tunnelling protocol allows data to be sent from one network to another. That data can in turn be a tunnelling protocol. There are some

76


CYBERSECURITY SERIES amusing implementations of this, for example the underlying protocol that provides most modern networking, TCP/IP, has been implemented using Facebook chat (which gave it very high latency and low reliability), and carrier pigeon (high latency, medium reliability, huge bandwidth).

The server receiving the query will then reply with a return message – and any networking protocol can be encoded through this. Tools are available for DNS tunnelling not only for data exfiltration, but instant messaging, video conferencing, and almost any other protocol that is available normally.

DNS tunnelling is the most common and well known steganographic tunnelling method used by threat actors. DNS works through queries sent up a hierarchy of servers to resolve domain names to server or service addresses, and these queries are forwarded as needed. To use DNS tunnelling an attacker does not need any special relays inside a network, these are all provided as part of the legitimate network infrastructure. All that is needed is a malicious authoritative server for a domain or domains – queries are then sent for that domain, carrying the data as part of the query.

In 2016 Infoblox found 40% of malicious software they tested made some use of DNS tunnelling – in the years since this will likely have grown as open source and off-the-shelf toolkits have become available. Highly sophisticated attacks, including ones suspected to be sponsored by nation states, use DNS tunnelling for data exfiltration and C2. It is perfectly possible to detect and/or prevent DNS tunnelling, but it is part of the suite of cyber security hygiene measures that are very rarely implemented due to lack of resource, lack of funds, lack of awareness, or a combination of the three.

James Bore is an independent cybersecurity consultant, speaker, and author with over a decade of experience in the domain. He has worked to secure national mobile networks, financial institutions, start-ups, and one of the largest attractions’ companies in the world, among others. If you would like to get in touch for help with any of the above, please reach out at james@bores.com

77


CIRCUIT MAGAZINE ISSUE 52

Fit for Purpose By: Ryan Naish

More than just a Workout It’s lockdown, you’ve done the mandatory 20-minute social media HIIT workout, finished in a pool of sweat all chuffed...but what about the rest of the day? The “workout” is only a part of the overall Physical Fitness picture. Give or take 8 hours a day for sleeping, that leaves 16 waking hours that require physical activity. I use the word “require” because if we want to stay active for the long game, then it really isn’t an

option and it must be a priority. This is where I feel the missing link is for most people, a basic understanding of true Physical Fitness and how to apply it to everyday living without just viewing it as a workout period. Distinguishing the differences between training for sport or competition and exercising for health and longevity is of prime importance because they are entirely different practices. When an

78


FIT FOR PURPOSE individual trains for competitive success in an arduous sport, they are consistently walking a tightrope of high performance, burnout and injury. If an individual is going to perform to a high standard in ultra-running, the CrossFit Games, or a boxing match, for example, their training will need to replicate the stressors involved in that activity, this being

79

accepted as a necessary risk/reward. Exercising for health differs dramatically in so much as the desired result is not competitive success in the short term but general physical capability in the long run. Most of the important information is already out there, and it came long before the internet was made available. I’ve spent hours reading


CIRCUIT MAGAZINE ISSUE 52 old physical training manuals and used the protocols in my practice. This has helped me put together a breakdown of, what I believe, Physical Fitness is and how it can be practically applied. Of course, this is open to interpretation, and anyone with an open mind will have their ideas and form their own opinion. The time spent on each foundation in a given day will be entirely individual and based on personal

circumstances, recovery abilities and motivations. THE FOUNDATIONS OF PHYSICAL FITNESS Exercise Physical activity that is aimed at a desired physiological outcome i) - Using less complicated or already competent physical skills for a specific aim, e.g. training for maximal strength, improving cardiorespiratory function, work capacity etc.Â

80


FIT FOR PURPOSE ii) - Learning or practicing a skill that contains a level of complexity, e.g. balancing at height, jumping with a precision landing, skipping, mobility etc iii) - General movement that combats sedentary periods and improves the functioning of the body, e.g. walks, posture exercises etc Assessment Physical and mental aptitude that is assessed in a range of environments and conditions could involve a multitude of activities and competent skills, e.g. testing the length of a broad jump, running a set distance for a time, an arduous expedition in the mountains, or a competitive sports match etc Play Physical activity that is conducted for pure enjoyment without a physiological outcome aim or a premeditated desire to improve a skill. Play can be

81

spontaneous and undertaken entirely without script, e.g. play fighting or balancing on a log while out for a walk. It can also contain a structured framework that facilitates spontaneity like a pair or group game, e.g. shoulder tag sparring or British bulldog Practical Application Physical activity that is task orientated and not conducted for a desired physiological outcome to learn a new skill or for pure enjoyment, e.g. lifting and carrying at work, gardening, descending a mountain etc DAILY BREAKDOWN To improve or maintain the physical qualities: Strength, Mobility, Coordination, Balance and Cardio-respiratory function, there needs to be a daily format and one which focuses on enhancing the body and mind, not intentionally breaking it down further. This focuses on the Exercise foundation, as the others are relevant to


CIRCUIT MAGAZINE ISSUE 52 personal circumstances dependant on how and won’t always I’m feeling that day or require structure. how much time I have available. Morning Routine A morning routine 1) Checking in doesn’t need to be a Slow and controlled lengthy process, much movements aiming can be achieved in to wake up the 10-20 minutes, and musculature, recognise it’s an excellent way and address areas of to start on the right tension footing, preparing body and mind for the 2) Limbering up day ahead. Aim for Rhythmical movements slow, nasal breathing aiming to promote throughout and work blood flow, lubricate on focussing the the joints and explore mind on the task in the range in the joint hand. If you decide to complexes conduct the workout period first thing, the 3) Posture morning routine series Reinforcement can be accomplished Specific exercises as a precursor. It aiming to reinforce serves as an excellent correct alignment and preparation period for posture, stimulate any vigorous activity, full-body muscular and with a small contraction and amount of specific integrate a balance prep added on, it will dynamic enhance any physical activity that follows. 4) Heart and lungs We’re aiming to The following are raise the heart and headings and brief respiration rate, descriptions of how maintain bone density I break my morning and tendon elasticity. A routine down and I will brisk walk outdoors is spend differing periods a great option or nonon each section strenuous, rhythmical

82


FIT FOR PURPOSE calisthenics exercises. This shouldn’t be a “workout” but enough to get the blood moving and elevate the heart rate Movement Breaks As I sit at the computer writing this article, I become aware of my body getting stiff and misaligned. As the time ticks on, idleness kicks in, and I naturally start to slip into a less than ideal postural position. Other common, compromising positions like the craned neck mobile phone pose, standing for long periods shifting the weight from one hip to another and the “hurry up and wait” sofa slump all take their toll. The longer we stay in a position, the better our body becomes at adapting to it, so it is vital that we take regular movement breaks throughout the day. To counter these positions, a cue can be taken from the morning routine headings. It may mean just standing up, checking in briefly and resetting the posture. If more time is available,

83


CIRCUIT MAGAZINE ISSUE 52

go through the sequence and get out for a brisk walk to get the blood moving again, your productivity output will thank you for it. Workout With the article entitled “Physical Fitness...more than just a workout” the focus is on the other elements of the day.

to vegetate is in the evenings. Now there’s nothing wrong with chilling out, we all enjoy it, but again it’s the amount of time spent in one position that does the damage. Getting out of the chair and onto the floor is a good start; finding other ways to rest while watching TV and moving between them.

Evening Restoratives Another point in the day where we tend

The evening is also a good time to work on mobility (read my

84


FIT FOR PURPOSE

Now there’s nothing wrong with chilling out, we all enjoy it, but again it’s the amount of time spent in one position that does the damage. article in issue 40 about the differences between Mobility and Flexibility). Flexibility refers to “The ability of soft tissues (muscles) to stretch passively through a range of motion (ROM)”. In contrast, mobility is the “ability of a joint to move actively through a ROM”, a big difference. Developing a nice flow of mobility exercises is a good start or focussing on specific joints and working through several exercises that challenge and improve the range.

Remote Physical Fitness has always been my main focus, and the recent lockdown period has shown that a shift in mindset is required by the majority with how they approach it. Soon, I’ll be launching a series of tutorials to demonstrate how these principles can be practically applied and will contain a full breakdown with explanations. Details will be on my Instagram account with a website to follow shortly for those that are interested.

Ryan is a former physical training instructor in the Parachute Regiment and now specialises as a movement and outdoor skills coach. He is active in the security industry and also runs seminars and workshops, where he shares his passion for cultivating an active lifestyle that’s fit for purpose. Follow him on Instagram, @fitforpurpose.ffp, for practical tips and advice.

85


CIRCUIT MAGAZINE ISSUE 52

86


TACTICAL FIREARMS By: Orlando Wilson

Methods of Carry!

If you are carrying a handgun for defensive purposes, you need to be able to get to it when you need it.

On the market today, there is a wide variety of holsters to choose from that vary in price from a few bucks to a few hundred; some are worth it, many are not. What most people forget when considering carry techniques for a handgun or any weapons for that matter is that they are going to have to be able to access the weapon in all environments with both strong and weak hands.

a hostile situation. If the criminals have you held at gun or knifepoint at close quarters, and they are serious people, the chances are if you are seen trying to deploy your weapon you are going to get shot or cut. This is why you must be aware of your surrounding at all times and never caught off guard.

You need to be able to access and use your weapon with both your The criminals or terrorists strong and weak hands will always try to set you from whatever position up to ensure they have the you are in. It would be advantage. This is where very easy for your strong you need to have a strategy hand or arm to become already worked out for injured in a confrontation, deploying your weapon in so think about how you

87


CIRCUIT MAGAZINE ISSUE 52 would access your handgun with your weak hand and put multiple rounds into a target 5 yards/meters away. If you can’t or have not even though about it, you need to re-think your personal protection program quickly as your working at 50% capacity. When buying a holster and deciding on how you’ll be carrying your handgun, you should take into consideration in what environment and climate you’ll be operating in, the size of the gun and what type of clothing you’ll be wearing. Inside or outside the pants holsters The best method of concealing a handgun is to carry it inside your pants. This gives the gun a very low profile and is as close to the body as it can be. The primary problem with carrying a handgun, especially a full-size handgun, inside the pants is that it can be uncomfortable. If you are considering carrying this way, I recommend buying a holster made of soft leather or material that will not cut or rub you when worn

for an extended period. The most favored method of carry is to wear the holster outside of the pants, on the belt, or a holster fitted with a paddle. Most quality holsters will keep the handgun close to the body and will afford you a good grip on the gun. A disadvantage with holsters that sit outside of the pants is that they can be difficult to conceal in hot climates, but we’ll discuss this later. I recommend that holsters for defensive purposes do not have any thumb breaks or retention devices apart from tension screws. Most quality holsters will hold the handgun firmly without a thumb break, allowing you to draw the gun quickly and smoothly. Such accessories will do little to stop anyone with half a brain from taking a holstered handgun from you and will only give you a false sense of security. Strong side or crossdraw The most favored method or carry is to carry the handgun

88


TACTICAL FIREARMS on the same side as the dominant/strong hand (strong side). It is believed that this is the safest method of carry, because, when the handgun is drawn from the holster, it points in a straight line directly at the target. Cross-draw is where the gun is on the opposite side of the body to the dominant hand, so you have to reach across the body to draw the handgun. Personally, I see no problem with cross-draw; many people claim that cross draw is dangerous, as the handgun sweeps through a 180-degree arc to get from the holster to pointing at the target, which could mean the handgun pointing at bystanders, as is it sweeps through the arc. For many, this is a major safety violation; for me, it’s what you must do in reality. If you cannot draw your weapon without fear of shooting yourself, you should not be carrying it! However, it must be remembered that whatever method of carry you use, before you go on the street, you should practice, practice and practice. As I have said before; If you do not think you can draw your handgun without it going off by accident, you should not be carrying it.

89


CIRCUIT MAGAZINE ISSUE 52 It is easier to take a handgun from someone carrying on the strong side than cross draw. To take a gun off someone carrying strong side, you can come up behind them and take it, thumb break or not. To take a handgun from someone carrying cross-draw, you will need to come at them from the front or possibly the side. This means they will see you going for their handgun and can then take evasive measures or use unarmed techniques if they let you get that close in the first place. If the gun is carried cross draw, you have easy access to it with both your left and right hand, and you have better access to the handgun when seated, especially in highsided chairs and when in vehicles. Small of the back carry The small of your back is an excellent location for concealing a weapon and enables most people to reach the weapon with both strong and weak hands with ease. I would not carry small of the back if I knew I was going to be moving through crowds or bumping into people because of weapon retention issues. If this is not an issue for you, it can be a good carry technique.

90


TACTICAL FIREARMS I have heard people state that carrying a handgun in the small of the back is dangerous because you can injure yourself if you fall etc. To me, this is more overprotective nanny-state bulls##t; you can hurt yourself if you fall anyway and get killed if you can’t access your weapon when you need it. Plenty of military personnel, me included, have carried this way and those serving still carry belt pouches in the small of the back, what’s the problem? Alternative methods of carry There are many other ways to carry your handguns. However, I would not recommend accessories such as ankle holsters, because it is difficult to get to the gun while holstered on your ankle and takes a lot of body movement. It is also difficult to run with an ankle holster on, and even a light gun needs to be very well strapped into the holster, so it doesn’t fall out. One method of carry for your compact or sub-compact firearm is in your pocket. There are pocket holsters available, which disguise the outline of the gun in

91

your pocket and keep it secure. Reaching for a gun in your pocket is a natural body movement; we often reach into our pockets daily for coins, keys and wallets, so the muscle memory is already there. If you are carrying a handgun for professional reasons, you should be comfortable drawing from both cross draw and strong side and any other methods you use. If you choose to carry two handguns and keep your primary or backup gun strong side, make sure that it is well concealed and be wary of people getting close to you. Fanny packs I am in favor of fanny packs for a method of carry and own several. I have heard fanny packs referred to many times as suicide packs by gun store commandos as they claim it takes too much time to get to the weapon. In reality, if you are in a situation where a criminal has you at gunpoint, you will have to rely on your strategies; it’s a lot quicker for a criminal to pull a trigger than for you to draw a gun, period! Fanny


CIRCUIT MAGAZINE ISSUE 52 packs are not slow to draw from as long as people know what they are doing and practice. You must always be aware of your surroundings and be looking for potential threats; the wise and knowledgeable criminal with a rock can be far more deadly than the unaware person with the tricked out 911 and Gucci holster! For me fanny packs allow me to carry a handgun in hot climates and when I am not wearing a belt, for example, wearing a tracksuit or sports clothing. Also, when I am driving, I can have my handgun concealed (check your local laws) on the center console or seat next to me. If I’m driving through a high crime area, I can just unzip the pack and if required have direct access to my handgun or have it ready to go in my hand but still concealed within the fanny pack. Clothing If you live in a temperate climate where you can wear heavy shirts, sports coats and jackets and so forth, you should have no problem concealing all but the largest handguns. If you live in a hot climate where wearing a coat in

25+ degree heat is not practical, it is an option to wear an untucked shirt over a t-shirt with an inside the pants holster. It is also an option to carry a compact handgun: .38 special or .357 snub nose revolvers, Makarov, Sig 232, CZ82/83, Walther PPK, Glock 26 or similar guns. It is not that hard to conceal such guns under a t-shirt with an inside the pants holster. It is also an option to wear a vest/waistcoat but as everyone knows that only people wearing vests are usually FBI wannabes concealing handguns. If you live in a cold climate, there could be problems getting quick access to your handgun, if it is under your sports coat which is under your overcoat. Therefore, it is an option, to carry a gun in the pocket of your overcoat; a snub nose revolver is ideal for this rather than a semiautomatic. The revolver has the advantage of being able to be fired while still in the pocket, while the slide on a semi-automatic would have trouble cycling in such a small area. If the pockets on your coats are too small, you can get them tailored. I have had females in my classes who have asked

92


TACTICAL FIREARMS

If you're in a potentially hostile situation you can have your hand on you weapon while it’s concealed in your bag, and if you have to shoot to defend yourself you can point shoot through the bag. about carrying guns in their handbags, well there are positives and negatives like everything. The negatives are, if the bag is stolen, you lose the gun, also, if you’re in a confrontation and the bad guys grab the bag you may end up fighting over the bag without being able to access your weapon. The positive, like having a hammerless revolver in your coat pocket, is that if you’re in a potentially hostile situation you can have your hand on your weapon. At the same time, it’s concealed in your bag, and if you have to shoot to defend yourself you can point shoot through the bag.

were security cameras, but people forget these are just a deterrent, only good for seeing who beat you to death after the fact. The mall had unarmed security guards, who, no disrespect intended, would get on an emergency as quickly as their golf carts would get them there, but an unarmed 300 pound or 70-year-old security guard would be no match for a fit street kid with even a knife. The cops would have got to an incident, I am sure a bit after the security guards and would have written up the reports, viewed the security cameras and done their best to catch the criminal. Real-world fact, your personal safety and I remember one lady came security is your issue, no through my classes who one else’s! worked in a very highend shopping mall where Back to the lady who there had been several worked at this mall, she attacks on females in the had a hammerless S&W mall’s parking lot. There stainless steel snub .38

93


CIRCUIT MAGAZINE ISSUE 52 (nice gun), and we worked out the best thing for her was as she left her car in the morning and walked to her car in the evening was to keep one hand in her handbag on the .38. If she was attacked, she would be ready to react and could point shoot thorough her bag or deploy the weapon if she had time. Combine this with parking away from other cars so she could see anyone lurking around her vehicle, always walking in the middle of the isles away from the parked cars and having her keys ready she had a decent and simple security plan for that situation. As a general rule, you want to buy clothes used to conceal handguns on the large side to avoid any conspicuous lumps. Patterned shirts, tweed sports coats and pinstriped suits are better than plain colors for breaking up the silhouette of anything you may be carrying under them. Indications that someone

may be carrying weapons include: • Untucked Shirts, • Unbuttoned jackets/ coats, especially in cold weather, • Excessive clothing in hot weather, • Long cut suit jackets/ sports coats, • Baggy oversized clothing, • Lumps around the waist, pockets or under the arm, Another give away is if the person constantly touches the gun to make sure the weapon is still there or adjusting its position. If you know what to look for in others, you will know what others are looking for in you. As I said, concealed means concealed, and if you have to deploy your weapon in a hostile situation, you want to do so with the element of surprise! If the bad guys know you are armed, they will just use and indirect strategy or come at you harder with more weapons!

Orlando Wilson has worked in the security industry internationally for over 25 years. He has become accustomed to the types of complications that can occur, when dealing with international law enforcement agencies, organized criminal and Mafia groups. He is the chief consultant for Risks Inc. and based in Miami but spends much of his time traveling and providing a wide range of kidnapping prevention and tactical training services to private and government clients.

94


THE INDUSTRY AND THE UGLY TRUTH

Who’s protecting Who’s protecting Who’s protecting YOU, while you YOU, while you YOU, while you protect others? protect others? protect others?

With our premium tier of membership, we’ve got you covered under the BBA Protect insurance policy, providing complete peace of mind while With our premium tier of membership, we’ve got you covered under the you work in addition to the standard BBA membership benefits. BBA Protect insurance providing we’ve complete of mind whilethe With our premium tier policy, of membership, got peace you covered under Designed forin professionals looking toproviding maximiseBBA their employability and their you work addition the standard membership benefits. BBA Protect insuranceto policy, complete peace ofdemonstrate mind while commitment to industry standards, there are two levels of Protect membership available: you work addition to the standard benefits. Designed forin professionals looking to maximiseBBA theirmembership employability and demonstrate their commitment to industry standards, are two levels of Protect membership available: Designed for professionals looking tothere maximise their employability and demonstrate their PROTECT PROTECT+ commitment to industry standards, there are two levels of Protect membership available: Individual public and products liability Personal accident and health insurance PROTECT PROTECT+ insurance designed for UK Close designed for armed Close Protection and Individual public and working productsinliability Personal accident healthworking insurance Protection operators nonMaritime Security and operators in PROTECT PROTECT+ insurance designed UK Close designed for armed Close Protection and hostile regions. hostile regions. Individual public andfor products liability Personal accident and health insurance Protection operatorsfor working in nonMaritime Security working and in insurance designed UK Close designed for armedoperators Close Protection hostile regions. hostile regions. Protection operators in nonMaritime Security membership operatorsorganisation, working The in As a trusted professional FROM JUST £60working PER MONTH BBA are dedicated to bringing our members the best hostile regions. hostile regions. IT’S EASY TO UPGRADE YOUR BBA

possible resources and tools to enhance their standing and As a trusted professional membership organisation, The credibility as close protection operators within the industry. BBA are dedicated to bringing our members the best As a trusted professional membership organisation, Theand possible resources and tools to enhance their standing BBA are dedicated to bringingoperators our members thethe best credibility as close protection within industry. possible resources and tools to enhance their standing and credibility as close protection operators within the industry.

FROM JUSTTO £60 PER MONTH MEMBERSHIP PROTECT YOU. IT’S EASY TO UPGRADE YOUR BBA FROM JUST £60 PER MONTH MEMBERSHIP TO PROTECT YOU. IT’S EASY TO UPGRADE YOUR BBA MEMBERSHIP TO PROTECT YOU.

Visit our website at www.the-bba.org.uk to find out more. Visit our website at www.the-bba.org.uk to find out more. Visit our website at www.the-bba.org.uk to find out more. Lockton Companies LLP is a limited liability partnership incorporated in England and Wales, registration number OC353198. Authorised and regulated by the Financial Conduct Authority.

33 95

Lockton Companies LLP is a limited liability partnership incorporated in England and Wales,


ASK THE NABA NETWORK Elijah Shaw asked the Network:

You have a long-time client who does not take no for an answer when it comes to holiday gifts for their entire staff. Knowing your profession, their assistant asks you to choose between 1 of 2 gifts: 1. Twelve, 2 hours lessons of the martial arts of your choice with a top-ranked instructor. Or 2. 1-year free membership at a nice firearm range that includes 6 private sessions with a notable instructor. Which do you choose, and why?

Option 1 Responders

Dale June I would go for the martial arts - though it would be too expensive - My wing chun instructor charges $500.00 for one hour of personal training - --but I never took private lessons! I know several other just as good sifus who are a lot cheaper.

Alan Cain 1. Because I work and live in the United Kingdom.

Ken Haase Martial arts, because it will help you in varied ways, physical conditioning, mental and physical preparedness, defensive tactics and discipline. You'll use fist to cuffs techniques in this job a lot more than you'll use your firearm.

Jason Poston Option one. For the obvious, that the ability to carry firearms is often limited, plus it’s easier to find a range to train on your own. Martial arts can be more useful and finding an instructor at that level on your own may be much more difficult.

Vincent Van Sciver Martial arts instruction for sure. It not only teaches close-quarters self-defense, but stress management techniques and possibly help manage do-or-don’t strategies. Going hands on may not even be necessary. Ray Buford 1. Contrary to popular belief, EP is a thinking person’s game. Knowing a martial art can be both a hard tool and soft tool. Even though the P will pay, the return is priceless.

96


Option 2 Responders

Einar Myklebust Option 2, but it has nothing to do with the job. I just want some long distance shooting classes :) (800 yards and beyond)

Devon Taitt I’m going with option two. I’ve been in the martial arts all my life starting at age 4. But I often neglect consistent firearms training and shy away from most courses because of the price. I already have in mind the instructor I would want private training from. I’m carrying a gun on all the details I’m working, so it’s just as important as my hand to hand training. Kevin Jenkins I would choose firearms training because I already have several years of Close Quarter Combat training.

Jim Garrett Option 2. After going to some classes it is not difficult to practice what you learned firearms wise at the range. However, martial arts instruction takes continuous learning, critique, and class time.

Dudley Green I would take # 2 I'm a firm believer in martial arts as I have been an instructor for many years and have trained many professionals from various law enforcement areas. I think it's very important to keep those skills sharp. However, it’s imperative if you’re going to be travelling with a client and you may come under live fire. Your firearm skillset would be very crucial. So, depending on what level of security your client needs both are valuable but when under pressure a highly trained operative should be skilled to deal with deadly force of either kind. Unfortunately, the world we live in doesn't give the luxury to not be prepared. I always prepare for the worst case scenario and I like to be as ready as I possibly can to deal with a threat with the appropriate response.

Neither

Wayne Perry I'd ask him respectfully if this gift can be donated to a victim of domestic violence either directly or through a non-profit org.

Pierre Martin Neither!. I would prefer to use the money to learn a foreign language.

Bryce Potvin The answer should be based on a self-assessment of what you need to work on.

Dudley Green Very interesting question and post ok let me share a little from personal experience here. If the greatest threat to your Principal is their pre-existing health conditions, then use this training gift opportunity to show your level of professionalism and dedication to keeping the P safe by recommending an advance medical emergency training. My guess is it will be accepted and you will be on that detail for a long time if you are thinking more of your principals benefit with the training gifts. Remember no law says you can't defend yourself with the riffle or weapons of your attacker but to accomplish this confidently and proficiently you must be well trained in weapons handling even if you are living in a country where you aren't legally allowed to carry firearms. I always believe it's a safe position to assume that these training gifts offered by the principals are a disguised method they deploy for reassuring themselves of their protective details competence and readiness to keep them safe. Meaning if they are offering me weapons and martial arts training it means they see the need based on their fears which is why I am there.

The NABA network is a fantastic community for getting help and advice on all matter’s security related. https://www.facebook.com/groups/TheNABA/

97


CIRCUIT MAGAZINE ISSUE 52 By: Walter Hardy Spence, Jr

Securing Smart Home Devices

Smart home technology is a rapidly growing consumer and business product. Here are some figures that show projections for the growth of these devices, as well as current numbers: • The U.S. is the largest • Revenue in the Smart consumer of smart home Home market amounts technology with a market to US$23.5 billion in volume of $23.5 billion 2019 (up 15.4% from in 2019 (followed by 2018). China with $12.9 billion • The most popular and Japan with $4.19 products in billion).

98


SECURING SMART HOME DEVICES 2019 are video entertainment (43%) followed by smart speakers (17.3%) and home monitoring and security (16.8%) while lighting and thermostat were lower on the list with 6.8% and 2.3% respectively.

• Overall the smart home

criminals, while a modern home has to deal with sophisticated and tech savvy attackers who know how to find vulnerabilities and manipulate the security devices to gain access or cause distress to the inhabitants.” (Jose, A. C., & Malekian, R. (2017))

IoT devices market is expected to The devices in a smart grow from $76.6 billion in home are known as 2018 to $151.4 billion by Internet of Things (IoT) 2024, at a CAGR of 12%. devices and the common factor among them is that • Predictions suggest there they have some sort of will be 70.6 million smart connected communication. home households by 2023 The IoT devices aren’t only (nearly double from 34.8 used in private consumer million in 2018). environments, but in public enterprise and industrial • By 2020, more than 152 settings as well. There million cars will connect to are many examples of IoT the internet compared to devices. At the consumer 23 million in 2014. level, it might include (Alt, K. (2019, October garage door openers, 16)) smart hubs, thermostats, multimedia devices, lights, With this growth in smart appliances, and door home technology, it is locks. In an enterprise increasingly more important application, one may think that these items are of an auditorium where secured against cyberwhen you press a button, attacks. Specifically, this the screen comes down, quote from IEEE Sensors the audio system starts up, Journal explains the a PowerPoint begins, and challenges of modern you are ready to present homes: with the once click of the button. In the industrial “In the past, an average environment, the sensors home had to deal with used for manufacturing common slash and grab all talk to each other

99


CIRCUIT MAGAZINE ISSUE 52 on an assembly line and can help with precision manufacturing. This is the epitome of true automation with all of these devices connected and communicating with each other instantaneously. You wake up in the morning and tell your smart speaker “good morning” and the lights turn, the coffee pot starts, the thermostat gets set in the bathroom for a shower, and you are given the weather forecast of the day. While IoT devices are being connected and used at an increasing rate, the safeguards to keep them secure have lagged behind. Some devices may be concerning if a hacker takes control unknowingly to you. For example, if someone knows when your smart lights turn off every morning, they know you leave the house every day at the same time. Once they know that, they can then plan to break in. The FBI in 2015 gave out a Public Service Announcement to warn about the risks of IoT devices. The Alert Number I-091015-PSA gave some examples of devices that hackers have compromised. These devices include medical devices, such as pacemakers and insulin dispensers, as well as security systems with indoor

cameras. Each of these devices can cause injury if controlled or used by criminals. Securing IoT Securing the devices has been a challenge. Due to high demand, manufacturers introduced many IoT devices in short time frame. A 2017 article entitled Secure Smart Homes: Opportunities and Challenges, aptly summarized the challenges: “In the last years, two more worrisome (from the point of view of security achievement) tendencies have appeared while building smart homes. The first one is the multiple connectivity to the Internet. This is caused by the cloudbased management of IoT systems as well as by the use of the cloud systems as collaborators of IoT, i.e., many IoT systems make use of the cloud for data analysis and storage. The second tendency is the behavior of end users, who are becoming responsible for configuration of Smart Home functions including setting access passwords, granting access to devices or services (i.e., electronic door locks). This may cause security holes and instability in the Smart Home environment.” (Batalla, J. M., Vasilakos, A.,

100


SECURING SMART HOME DEVICES & Gajewski, M. (2017))

well-known manufacturers. For example, Phillips and Lutron both use gateways Most IoT devices are for their devices to consumer based therefore connect to and the end making them easy to user to connect through. operate and access while Many companies also use providing security is where Z-Wave as a gateway into most challenges come in. their devices. Z-Wave is a As with any device security, gateway that provides a protecting devices needs wireless signal that only to be done by both the other Z-Wave devices can consumer as well as the connect to. Manufacturers manufacturer. also need to undertake frequent updates to There are a number of address security concerns. ways that manufacturers There are vulnerabilities can secure their devices. coming out all the time, These include gateway so companies need to control, updates, protect against them notifications, and pushing regularly. Companies secure access for the end that provide notifications user. Gateway control is back to the end user can commonly used by the provide a way to secure

101


CIRCUIT MAGAZINE ISSUE 52 their devices. When events are triggered, the end user gets notifications, such as attempted logins, etc. Finally, the company needs to push best practices to the end user. This can include complex passwords, password changes, allowing the notifications, and twofactor authentication, as a minimum. The consumer also has a number of things that should be done to secure their IoT devices. The aforementioned PSA by the FBI suggests doing the following specifically: • Isolate IoT devices on their own protected networks; • Disable UPnP on routers; • Consider whether IoT devices are ideal for their intended purpose; • Purchase IoT devices from manufacturers with a track record of providing secure devices; • When available, update IoT devices with security patches; • Consumers should be aware of the capabilities of the devices and appliances installed in their homes and businesses. If a device comes with a default password or an open Wi-Fi connection, consumers should change the password and only allow it operate on a home network with a secured

Many default passwords can be easily located on the Internet. Do not use common words and simple phrases or passwords containing easily obtainable personal information

102


SECURING SMART HOME DEVICES

Wi-Fi router; • Use current best practices when connecting IoT devices to wireless networks, and when connecting remotely to an IoT device; • Patients should be informed about the capabilities of any medical devices prescribed for athome use. If the device is capable of remote operation or transmission of data, it could be a target for a malicious actor; • Ensure all default

103

passwords are changed to strong passwords. Do not use the default password determined by the device manufacturer. Many default passwords can be easily located on the Internet. Do not use common words and simple phrases or passwords containing easily obtainable personal information, such as important dates or names of children or pets. If the device does not allow the capability to change the access password, ensure the device providing wireless


CIRCUIT MAGAZINE ISSUE 52

Batalla, J. M., Vasilakos, A., & Gajewski, M. (2017)

Internet service has a strong password and uses strong encryption. (INTERNET OF THINGS POSES OPPORTUNITIES FOR CYBER CRIME) To take this a step further, there are other recommendations from an article from Wirecutter. It suggests making sure your Wi-Fi is secure. A part of that is buying a good branded router. They will help you setup and secure your router. The abovementioned UPnP also should be turned off on a well-known router brand.

Device security uses a layered approach to making sure it is secured. The image below shows how a device might be logged into from the internet. The devices will have a bottom to top approach with IoT physical devices sitting at the bottom and IoT services (login access) sitting at the top. Let’s say you have a light bulb it will sit on the perceptual layer. It may connect to a gateway that allows it to connect to the Network and Internet at the Network Layer. The Gateway, as well as the

104


SECURING SMART HOME DEVICES router it connects to, will handle opening ports, authentication into the network, and keeping it working. Next is support Layer, this is the actual communication that the devices manufacturer may setup to communicate into the device gateway of the device. Finally, there is the application layer, which may be an app on a smart phone or website. It will communicate with the support layer. The application should provide management and training to let end users understand the best practices. Conclusion To conclude, having

a smart home isn’t something that we even thought of 10 or 15 years ago. Now, however we can connect just about any device. Many IoT devices are a luxury, and you must weight the pros and cons for each one connected. For anyone connected to the internet, it’s not a matter “if” you will be hacked, it is “when.” It may be simply having a credit card stolen, but with a smart home it may be something much more invasive. Therefore, protecting yourself with good security measures for your accounts and all devices can help mitigate an attack if it were to occur to your smart home. References Alt, K. (2019, October 16). 16 Smart Home Statistics & Predictions. Retrieved from https://www. safesmartliving.com/smart-home/ statistics-and-predictions/ Batalla, J. M., Vasilakos, A., & Gajewski, M. (2017). Secure Smart Homes. ACM Computing Surveys, 50(5), 1–32. doi: 10.1145/3122816 Cericola, R. (2019, April 1). How to Protect Your Smart Home from Hackers. Retrieved from https:// thewirecutter.com/blog/how-toprotect-your-smart-home-fromhackers/ INTERNET OF THINGS POSES OPPORTUNITIES FOR CYBER CRIME, INTERNET OF THINGS POSES OPPORTUNITIES FOR CYBER CRIME (2015). Retrieved from https://www. ic3.gov/media/2015/150910.aspx Jose, A. C., & Malekian, R. (2017). Improving Smart Home Security: Integrating Logical Sensing Into Smart Home. IEEE Sensors Journal, 17(13), 4269–4286. doi: 10.1109/ jsen.2017.2705045

105


OTHER SIDE OF THE DESK CIRCUIT MAGAZINE ISSUE 52

There are many facets to executive protection and each with its own pulse. While foundationally, there’s no difference on the fundamentals, the “beat” can be different.

106


OTHER SIDE OF THE DESK By: Mark Roche

How is close protection viewed when it comes to halls of education? How does the staff feel about an armed EP professional on the school ground or even in class?

The nuances of each detail vary, and the protection packages are tailored to fit them. For instance, each and every day, educational institutions are presented with their own unique set of security challenges. Unfortunately, the US, as well as other countries, has experienced too many tragic incidents on school campuses. While these incidents are usually carried out against individuals without personal protection, what happens when there is a Protective Detail in the area? If we looked at the differences between school security personnel (also known as “resource officers�) and executive protection, would there be a clear distinction from the perspective of teachers and faculty of the educational institutions? How is close protection viewed when it comes to halls of education? How does the staff feel about an armed EP professional on the school ground or even in class? To examine the scope and offer some insight into the mindset of school administration, I had the privilege to interview an experienced educator

107


CIRCUIT MAGAZINE ISSUE 52 and faculty member at the campus where I have performed protection services for a client. For operational security reasons, we will omit the name of the school and refer to the educator as Ms. H.

instead of proactive to try and fix their problem in a positive, successful way.

As an educator, what are some of the feelings or emotions that an educator goes through when they either hear of, or witness a Mark: Ms. H, in your shooting in school? opinion, are schools that Thank the Lord I have provide education to/for the never personally witnessed privileged safer to work at? a school shooting before. If so why? But no matter where Ms. H: Yes, I believe the situation happens, it that schools that provide always hits very close to education for the privileged home. After hearing about are safer to work at. There a school shooting, feelings is an extra sense of security of worry and anxiety flood knowing that someone who my mind. As an educator, is highly trained is always I become confident and there watching for any go into protection mode unsafe activity while I am where I want to reassure focusing on teaching and my students that I would going about my day. do anything I needed to do to protect them if anything Unfortunately, we have far happened at our school. too many school shootings Deep down inside, I am in this country, what do you scared. think are some of the main causes as you see them? Are teachers trained or is Professionally, I believe that there training available to some of the main causes teachers to spot behavioral of school shootings in this issues with a student country are bullying, mental that could potentially be health problems, and either detrimental to the school or experiencing or witnessing others? some type of abuse at We are not trained home. These things lead to professionally, but we are depression and anxiety on required to make note of many different levels where specific behaviors and keep students tend to become in constant communication reactive to try and fix their with administration about problem in a negative way, any student that we find

108


OTHER SIDE OF THE DESK displaying any negative behavior that could be detrimental to others. I would love if my school offered training on this though.

As you know, I’m a protection specialist for my client that attends this campus. How are the specialists that work here perceived? Keeping in mind your How do you think as a purpose for being on whole, that this school is campus, my colleagues and prepared for a catastrophic I still find comfort knowing event? And do you feel safe? that you are highly trained I do feel safe. The security and present, constantly plans and procedures watching for any unsafe we have in place are the activity. We do know and best we can do, given a are fully aware that if situation like this and I something were to ever think that as long as we happen, your client comes abide by our plans we will first, and we respect that. be okay. But we also know that your

109


CIRCUIT MAGAZINE ISSUE 52 job is to keep the campus safe for your client and therefore we are safer because of it. Do you think that teachers should carry guns in class? I do believe that with proper training and a mental health assessment teachers should have a gun locked away in the classroom. I do not believe we should carry it around campus though. We have an armed campus security officer here that works independently from us, what are some of the notable differences you see in us, as opposed to campus security? Aside from different purposes of being there, I do not see any major notable differences in what you do as far as keeping our campus safe. You both take your positions very seriously and it shows. One difference that is noticeable however, is your overall appearance as a highly trained professional compared to a school resource officer. You carry yourself differently than him in ways. For Instance, the way you associate with

This was a very scary day for many reasons. We didn’t know if it was an unscheduled Code Red practice, or if it was real. We only inferred it was real by the sound of my administrator’s voice over the walkie talkies. We treated it as a practice so our students would not be worried.

110


OTHER SIDE OF THE DESK your client and your client’s family, to the way you approach and speak to faculty, down to the way you dress. You can tell that you are a no-nonsense kind of guy that takes his job very seriously. This shows that your level of training and professionalism is at a higher level than his.

didn’t know if it was an unscheduled Code Red practice or if it was real. We only inferred it was real by the sound of my administrator’s voice over the walkie-talkies. We treated it as a practice so our students would not be worried. There was limited conversation through text message as Have you found in your we were advised to not experience over the years use our phones and to that faculties respond wait for an all clear from better to Executive administration. So, not Protection Specialists than knowing what was going the school resource officer? on and if we were safe I do find that faculty or not was very scary responds better to EPS as a teacher! On top of than the school resource that, I had to contain my officers. Keeping in mind emotions and put my that the EPS is there game face on so that my specifically for a handful of students would continue students, the presence of to think it was a practice. a higher trained individual Students were antsy from does make the staff have being in one place for too a better sense of security long and some became regardless of his purpose worried as they caught for being there. on that it may be real. I continued to remind my As you are aware, a students that we had couple of months ago we security on campus and we had a security breach of were in good hands and this campus. We placed safe. I told them that you the school into a full lock were trained for moments down and a lot of law like this and we had enforcement responded. nothing to worry about. What was that agonizing I felt confident in saying two and a half hours like that. for you and your students while on lockdown? What’s it like in the This was a very scary day aftermath of an incident for many reasons. We where a lockdown is

111


CIRCUIT MAGAZINE ISSUE 52 ordered? What counsel, if any, is given to your students to help with their security preparedness? After a lockdown is ordered, we try not to talk in detail about the situation. Really? Yes, we remind them of our safety procedures and that they are safe and protected and there is nothing to worry about. We go about our day and continue teaching. We leave the details of the situation for administration to handle appropriately. We never want to say something to our students to scare them and make them feel unsafe. In your opinion, is having both an educational

portion and a religious portion, on the same campus, better or worse for safety? Does having a religious sanctuary for staff and students to attend lessen tensions on campus and provide for better overall harmony/ security? This is a question I struggle with. I believe that having an educational portion along with a religious portion is better for safety as there have been far less school shootings found in private schools versus public schools. I’d like to believe that this is because we are ultimately protected by God. After a real lockdown or a practice lockdown, we as teachers comfort each other with reminders of God’s presence on our

112


OTHER SIDE OF THE DESK

We leave the details of the situation for administration to handle appropriately. We never want to say something to our students to scare them and make them feel unsafe. campus. Some things that do go through my mind are the fact that some people may look at our school and disagree with our religious beliefs and take it upon themselves to show their disagreement through harmful acts. Ms. H, while it isn’t over yet, what has this pandemic shown you about education, that you never realized before? Has this pandemic challenged you to be a better educator for your students, in a less secure and less cohesive environment? This pandemic has shown me that educators are underappreciated and underestimated as to how far we will go to make sure our students are still learning and growing

academically. I worry about my students’ overall wellbeing. I also find that I am working longer hours now just to make sure they are engaged and on track for next year. I miss being in my classroom and pray we can get back to normal as soon as possible. Executive protection is expanding, and as it becomes even more expansive, we as an industry must be prepared, trained, and willing. Schools are sanctuaries, supposed safe environments, but they will only remain that way if we, all of us, answer the call. Conversations like this reinforce that others take notice as well.

Mark Roche is a US Based, full-time Executive Protection Specialist who works full time with a HNW Family. He is also a FAA Licensed Drone Pilot, specializing in EP related uses, and a graduate of multiple close protection programs.

113


CIRCUIT MAGAZINE ISSUE 52 By: Justin L. Johnson

“They say God made man, but Sam Colt made them equal.” Charles Martin

114


AMMUNITION – WHY THE JHP? Bullets are bullets and ammunition is just ammunition, right? The reality is, that statement couldn’t be further from the truth. As outlined in my last article, bullets (or projectiles) come in many different forms and these forms have their intended purpose. In this installment, I want to dive deeper into the application of the Jacketed Hollow Point (JHP). The reason this projectile is going to get its own article is due to the importance of it and how it applies to selfdefense and in the industry of close protection. Design & Function I want to start out by discussing the design and intended function of the projectile itself. The name “Jacketed Hollow Point” implies a void in the nose of the bullet, often giving it a flat profile with a concave “divot” up front. This shape and profile serve a dual purpose: The divot aids in expansion and the weight of the bullet being further back in the projectile gives it much better accuracy potential. This is why JHPs have a tendency to be more accurate than their FMJ counterparts. Let’s be honest, who doesn’t want a little bit more accuracy when it comes to a life or death encounter?

115

When looking at a JHP, you will often see various things going on. Some, if not most, have what is called a cannelure. A cannelure is the knurling or groove around the middle of the exterior of the projectile. This often serves a couple of purposes, mainly aiding in stopping what is called jacket core separation. Jacket core separation happens when the core and the jacket separate upon impact with a target. Beneficial, as you don’t want your bullet coming apart. Because when it does energy is lost and the effectiveness of the JHP goes down, which translates to the potential failure to stop the threat. Another thing you may notice is something else inside the cavity of the bullet. Some manufactures use a polymer to fill the gap, while others use lead in the shape of a post or spike. And despite this, yes, they are still considered JHPs. The reason behind this is that these materials show the potential to stop clogging of the hollow point and aid in expansion. With a standard hollow point, if it becomes clogged with clothing or wallboard, it will start to act like a full metaljacketed bullet (meaning over penetration and decreased terminal effect).


CIRCUIT MAGAZINE ISSUE 52 The meat and potatoes of all of this is that when you draw your firearm to defend yourself or your Protectee, you want to be able to stop the threat as fast and as accurately as possible. The hollow point will help with that as it is designed to be a terminally effective projectile. What I mean by that is the bullet itself is designed to expand beyond its original size when there is an introduction of fluid to the cavity of the bullet. Expansion is one of a few other variables that we will discuss here. The Science of Bullets/ Projectiles I would be remiss if I didn’t discuss the advancements in projectiles and the science that goes into what we have today. Hours and hours of development and testing go into the rounds that make it onto the shelves of your local sporting goods store. They have been designed to penetrate and expand at a given velocity out of a given barrel length (usually 4 inches). That is why you are starting to see more and more rounds designed with specific firearms in mind. The best example of that is the surge of “short barreled” self-defense

ammo from the major manufactures. As guns get smaller, ammunition has to be tailored as well. On the topic of expansion, when the bullet gets bigger, the wound channel gets bigger as well. This where the lethality of this whole things begins (something which I will dive into in more depth in my final installment). I mentioned it before, but penetration is a key consideration when trying to decide on the right ammo to use. If you are in a crowded scenario, you don’t want bullets plowing right through the intended target. On the other side of that coin, you don’t want a projectile to under penetrate, failing to reach that vital, fight stopping “off switch.” Penetration is a balancing act of epic proportion. You want the projectile to dump all of its energy on target, expand, and go deep enough to reach vital organs and tissue. And this is all controlled by the bullet design itself. Most JHPs are designed to open up with the lead and copper in a pealing back effect like a banana. How big the pedals get and whether they stay attached will play a role in penetration. Even the

116


AMMUNITION – WHY THE JHP?

cannelure and its placement have something to do with how the projectile will perform. Needless to say, there is a ton of science and engineering that goes into each round that comes off the line and each is designed with a purpose.

117

Construction Matters Lastly, I want to talk about JHP construction and the different types to look for. With the shape of the projectile being equal, the construction of the bullet can come in a few different forms. The first is just the


CIRCUIT MAGAZINE ISSUE 52 standard cup and core design. This is where you take a copper jacket, add a lead core, and then form it into a finished product. Some companies may add a cannelure or two and call it a “mechanically bonded” bullet. And in the most literal terms, this is correct. The cannelure mechanically combines the copper jacket and lead together to help in jacket/ core separation. Some do this better than others, so do your research. The other main type of construction is the bonded round. This is where a secondary process is introduced to adhere the copper to the lead, making them almost inseparable.

your local law enforcement agencies are using, as this usually tells the tale of what works effectively in the field. There is a reason, that all over the world, the jacketed hollow point is one of the most commonly used projectiles for duty and selfdefense. Take the time to look at what’s out there in the marketplace, shoot the different offerings, find out what works with your gun, and what works for you. Until next time… stay safe!

These types of projectiles rarely come apart and maintain, most if not all, their weight after being shot into a target. This type of bonding can be done with chemicals or electroplating. The construction of bonded bullets is second to none, albeit, a tad more expensive. At the end of the day, look towards what Justin started his journey in the military and has grown his passion for firearms and training ever since. He has a resume that covers just about every segment of the security industry from armed and unarmed static security, investigations, close protection, highrisk protection, sports and entertainment venue security management, risk assessment, and consulting. He has spent the last 5 years managing ammunition product portfolios for major ammunition and firearms manufactures in the industry. He is also an avid competitive shooting, crossing multiple disciplines.

118


119


An Introduction to Celebrity Protection and Touring WORKING WITH THE MEDIA

by Elijah Shaw & Dale June

This is a "Real World" look at the business of VIP Protection and a MUST READ for anyone wanting to learn more about the job, written by those who know it best. I cannot recommend it highly enough.

available now on amazon 120

Miguel DeCoste


FOOT STEPS By: Jose Casillas

Episode 5: Mike Smith Q: Can you briefly describe your personal history with firearms training? I trained with Investigator Mitchell who is a Recon Marine, Robert Wilson who's

121

featured in Glock Magazine, and Mark “SIX� James of Panther Protective Services. My Skill level increased with Mark James as he was a perfectionist and so was I. We discovered we had


CIRCUIT MAGAZINE ISSUE 52 likeminded goals, and as a result we trained a lot together and we became very good friends. This evolved into us working together in Executive Protection. I consistently trained with instructors at the range and have been in 2 shootouts while off duty doing security work. While unfortunate, that has helped me with my instructing, and the ability to give real world advice when it comes to thought processing in a crisis. Describe your professional journey? I played on the Georgia State Patrols basketball league then joined the reserve sheriffs, I then did freelance security with 2 Georgia state troopers that started a company. I took a hiatus and actually became a barber while still doing security work on the side. While cutting hair I ran into someone who gave me a window of opportunity which led me to land a 6 figure contract. My company SS consulting specialized in threat assessments and advances but I didn't just limit myself to that. I would land other contracts doing different types of security.

122


FOOT STEPS

The reality is, it's who you know vs what you know.

of what they have to practice and what to seek from an instructor.

I like to inspire people Why do you think to get the training people are drawn to you? When it comes to they need to be better prepared and not just firearms training. have a gun to "get I focus on real world them up off you" but scenarios. Practical have accountability and vs tactical. I practice responsibility on firearms situations so people safety. watching get an idea

123


CIRCUIT MAGAZINE ISSUE 52 I notice you are active on social media with a high viewership, specifically Instagram, why did you start your IG page and what was the reasoning behind it? I wanted to inspire people to get the firearms training they need, and to also train their families. You can't change people’s morality, but you can defend yourself given our second amendment constitutional rights. I don't advocate violence, I advocate protection. Which is why I give visual tactics which gives people more to think about. Most firearms instructor don't show as much as I do because "they don't want to give everything away," but I just want people to learn and get training from whomever. Not everyone has money for gun courses, and that's okay. Having people telling me that my training has helped them is the most satisfying moment. I also advocate that everyone [in the US] should get a Concealed Weapons permit as soon as they become of age. If you use the IG platform you can find me @7mikesmith_ trainingwithbigmike.

You can't change people’s morality, but you can defend yourself given our second amendment constitutional rights.

124


FOOT STEPS What type of clients did you have when you did Executive Protection Full Time? Did you have any tense moments? I did EP for Athletes, High end executives, musical artist and celebrities. Younger celebrities bring a different element and you have to navigate around that. I've never gotten into trouble with my clients. My clients have never been arrested or attacked, however some situations could have ended real bad. In my experience verbal judo is crucial. You have to calm them down while at the same time, don’t make them look weak. In what unconventional ways did your past experiences help you with your EP career? My time spent playing basketball league for the Georgia State

Patrol helped me with my firearms training. It helped me with my athleticism. Being a big guy i still move fast and that's because of my muscle memory. My hand/eye coordination also helped my firearm drills. My firearms training really helps speed up my thought process. And in EP thought processing really helps. I'm able to de-esclate situations with a clear mind and that really helps out a lot. Finally, any tips on home defense? Having a gun light attached helps keep one hand free. Don't move from your position unless you have to get your children etc. Don't clear rooms unless you have to. Protect your loved ones, then hold an angle in which you have a good vantagepoint and call 911. Have a plan with your family so you all know what to do.

Jose Casillas is a Los Angles based Executive Protection Agent who specializes in red carpet events, movie premiers & estate security. He also teaches martial arts and works as an Emergency Medical Technician (EMT).

125


CIRCUIT MAGAZINE ISSUE 52

VIRTUAL EVENTS LIST

This issue, due to the uncertainty on the events circuit, we’re bringing you a round up of all the best online events, forums and workshops. Many are free to attend and all are great value. Communication, Complexity and the Benefit of Effective Information Management Host: ISRM

CYBER PHYSICAL CONVERGENCE FORUM LONDON 2020 Host: CTGIntelligence

May 19-21, 2021

11 June 2020

Level 5 Award in Corporate Risk and Crisis Management Host: ISRM

Preparing for, Detecting, and Managing a Critical Data Breach Host: DarkReading

May 25 – 29 2020

17 June 2020

Risk 2 Recovery - Thriving In The New Normal Host: Risk 2 Solution

MSS MUNICH 2020 Host: CTGIntelligence

27 May 2020

17 June 2020

MANAGED SECURITY SERVICES FORUM Host: CTGIntelligence

MANAGED SECURITY SERVICES FORUM LOS ANGELES COUNTY Host: CTGIntelligence

28 May 2020

30 June 2020

Do you have a security event that is not listed here that you would like our readers to know about? Contact us: info@circuit-magazine.com

126


INTRODUCTION TO CYBERSECURITY

● NEW FREE APP ● FREE ISSUE ● SUBSCRIBE DIRECTLY ● EVERY SINGLE ISSUE

E B I R C S SUB & Y A D O T SAVE

Get The Circuit Security Magazine with immediate electronic downloads to read on your PC, laptop or smart 127 39 device.


CIRCUIT MAGAZINE ISSUE 52

Keeping Your Edge:

Encore By the time you read this the word Pandemic would have been etched into the vocabulary of most men, women and children. The Novel Coronavirus Covid-19 has swept the planet and literally changed the way we conduct both business and professional life.

Keeping Your Edge: Action vs. Reaction

Handshakes with strangers are a thing of the past, and in some places, even being seen out in public without a facemask could me met with public scorn, fines, and even state sanctioned beatings.

By: Elijah Shaw

The security industry has also felt the bite of the Coronavirus, and one area specifically has been decimated, that is the protection of artist and entertainers who make live appearances and tour. By its very nature, both

128


KEEPING YOUR EDGE is produced by a long time client -- one in which I oversee the overall security plan and provide staffing, had been forced to first reschedule, and then cancel until next year. To drill down, the 19 members of my staff who would have been playing vital roles, along We also need to be with the hundreds who honest, It’s not just a made up the contracted concern for the public front of house safety safety that is causing and security staff, all a near cessation of the have holes in there touring sector, it’s also schedules where once the risk of liability. If a verified work would significant outbreak of the virus could be linked have been. to an entertainer, venue or promoter, there could So what is the solution? Already plans are in be significant damage motion and either out of both financially and to necessity or innovation brand reputation. This some show creators has led to major acts such as Dave Matthews, are trying to make live appearances possible Santana, Justin Bieber, while trying to keep Bad Bunny, Bob Dylan, the risk of transmission Kenny Chesney, and low. For example in Snoop Dogg to cancel Arkansas, a venue that their upcoming tours. normally has a 1,100 Festival wise, England’s person capacity will have the amount of iconic, Reading and people allowed into Leeds, Burning Man, the show reduced by The Montreux Jazz 80 percent to attend Festival, Coachella, an upcoming show. SXSW, Pitchfork, and Just 229 fans will be on a personal note, the number allowed even the festival that of the above involve celebrities appearing before crowds of people, and in a Pandemic era, where the transmission of this virus seems to be spread by the healthy as well as the sick, caution has outweighed capitalism.

129


CIRCUIT MAGAZINE ISSUE 52 onto the site, and the crowds will not be able to mingle as concertgoers have in the past. Instead to accomplish social distancing, the attendees will be separated into small areas, called “fan pods.� A review of the posted safety precautions for the event, outlined by the ticket distributor are as follows: 1. The balcony will be only accessible by stairs, not by elevator. 2. The venue will be sanitized by an independent third party prior to the event via fog sprayers.

If a significant outbreak of the virus could be linked to an entertainer, venue or promoter, there could be significant damage both financially and to brand reputation.

3. Masks will be required for both fans and employees. 4. Fans arriving without masks will be able to purchase them at the venue. 5. The theater will use one-way walkways, as per Center for Disease Control guidelines, which will be supervised by employees.

130


KEEPING YOUR EDGE 6. Fan “pods” (i.e. groups) must be separated by at least six feet at all times.

8. Fans’ temperatures will be taken at entry points.

9. Only prepackaged beverages, or ones 7. There is a 10-person with lids, will be limit in the restrooms, served. which will use notouch soap/towel 10. Staff will be wiping dispensers. Some down “touch points.” “bathroom fixtures” will be closed to help The show is scheduled ensure proper social to happen as we go to distancing.

131


CIRCUIT MAGAZINE ISSUE 52 press, so we can only hope that the results end up being favorable. If not, and we end up with a scenario in which concertgoers get sick and then take that back to their respective communities, we could see the larger plans to restart stall for quite some time.

is, even high net worth individuals are conscious of their expenditures, and in a drought one of the first things they look at is reducing security spending. My advice? 1. Take active steps to diversity your portfolio. Don’t put all your eggs in one basket, even a lucrative one. Very few could have predicted a pandemic, but we do know that in this business, tomorrow is not promised.

For example, Live Nation, the global giant in the touring space, has announced that all its major tours will be postponed until 2021, and because the majority of its concert business takes place in America and Europe, -- two parts of the world hit hard by 2. On a brighter note, Know that if you can weather Covid, the promoter has seen the storm, when touring its revenues drop 25% in the portfolios do get back into first quarter alone. regular business, they will be full steam and nonAdditionally they anno stop. It will then be up unced they would be to you to make sure you furloughing about 80% of are prepared to reenter their work force. What does what will surely be a more this mean for Protectors? competitive market, and I Well without the touring, the would recommend doing it clients that spends a lot of armed with an exceptional days on the road from that understanding of this performing may not have a current crisis. need for us. The dirty secret Elijah Shaw is the National Director of the North American Bodyguard Association and the CEO of ICON Global, and International Executive Protection Consulting Firm. Elijah, who has been featured in international publications such as Inc. Magazine, Entrepreneur, and Portfolio, runs the ICON Academy, an EP Training Program specializing in Celebrity & VIP Protection. He also currently sits on the Board of Directors of Executive Security International (ESI), the United States oldest Executive Protection Training School. His book, An Introduction to Executive Protection & Touring: A Guide to Mastering the Business of VIP Security, hit the Amazon best sellers list, and is available now worldwide.

132


ROBINBARRATT@YAHOO.COM 133


CIRCUIT MAGAZINE ISSUE 52

134


CLASSIFIEDS

Email: info@circuit-magazine.com United Kingdom 3D Security Ltd Taunton, Somerset, TA1 1TG Based in Taunton 3D Security provides security services for a wide range of clients. Whether you need a security guard in Somerset, event security in Leeds or Close Protection in London we will provide a solution for your needs. T: +44 (0)1823 253 001 W - www.3dsecurity.org E - enquiries@3dsecurity.org.uk A.B.I. Solutions A.B.I Solutions is a dynamic, forward thinking company, specialising in surveillance, security and investigations with local, national and internationalexperience. A.B.I provides a wide range of services to the corporate sector and individuals alike. W - www.abisolutions.co.uk Amanda Campbell A highly motivated and experienced female operative both CP and Surveillence training T – 07596542249 W - www.amandacampbell.org.uk E - ac@amandacampbell.org.uk Alex Morgan - Close Protection Officer I am a hardworking, enthusiastic and committed person. Adaptable and driven, I have great attention to detail and high standards. I am honest, reliable, friendly and work well as part of a team as well as on my own initiative. I am also a good listener who has the ability to communicate with people at all levels. I am comfortable, both taking and issuing direction. I am looking for the opportunity to apply and expand my skills. E: adsmorgan74@gmail.com T: 07775 636964 Ambassador Security Management ASM MK Lions Arena, Grafton Court, Snowden Drive, Winterhill, Milton Keynes, MK6 1AJ, GBR. After successfully gaining ACS (Door Supervision and Manned Guarding) along with ISO 9000, we here at ASM have a dedicated management team with hundreds of years combined experience in the security industry. W: www.asmsecurity.co.uk E: scott@asmsecurity.com T: 08458335750 Ark Personal and Asset Protection Ark, 2b Crow Lane, Rochester, Kent, ME11RF, GBR A small, efficient, highly descrete company employing ex special forces and detectives for all civil and corporate covert needs. E: Office@arkprotect.com T: +0044 01634 845526 Argus Europe County Durham Argus Europe has been providing specialist training for high-net worth clients and their families for close to 20 years, worldwide. Argus Europe now offer accredited training for CPO’s,

Surveillance Operators and Private detectives. Argus Europe is an operational company working globally with an extensive variety of contracts. W: www.arguseurope.co.uk T: +44 (0) 8456 123 843 Atlantian Business Solutions Group Rutland, LE15 6SD, GBR Atlantian Business Solutions has been designed to help both individuals and New Companies build for the future as well as support others with training needs. T: 07725970954 W: www.atlantianbsgroup.com E: info@atlantianbsgroup.com Briareus Security Our aim is to give a complete, discreet and professional service to all of our clients, be they large corporations, small businesses, local authorities or private individuals, all tailored to meet their individual needs. W: www.briareussecurity.com E: info@briareussecurity.com Mark Corder - Chief Executive of Carmdale Ltd Suite 3 219 Bow Road London E3 2SJ Mark is a former Senior Police Officer specialising in counter-terrorism; firearms; public order; training and also physical, Critical National Infrastructure and nuclear security, having had responsibility for the security of the UK’s nuclear deterrent. A former Head of Operations, Operational Support and Training, Mark has been involved in a number large-scale incidents (including 7/7) and has also worked at the Office for Security and Counter Terrorism (OSCT) at the Home Office as part of a review into Critical National Infrastructure security. Mark has an MBA via the OU. E: mark.corder@carmdale.co.uk T: +44 (0)844 995 9900 W: www.carmdale.co.uk Alastair Christie Advice on site security, perimeter fencing, lighting, CCTV and manning requirements. Monitor and advise on guard force setting up site procedures and guard SOP’s. T : +44 (0)7736 328112 E : ally.c9496@yahoo.co.uk Control Risk Management Solutions - CRMS Ireland Executive Close Protection Operations & Training (B Tec Level 3 Diploma Edexcel) Threat & Risk Assessments, Consultancy Services. W: www.crmsinternational.com E: martin@crmsinternational.com Crest Security & Surveillance Ltd 51 The Crest, West Heath, Birmingham, West Mids, B31 3QA, GBR Highly experienced Security Consultant with a proven record of accomplishment in the field of protective security. Skilled in all phases of risk assessment, operational planning, logistical organisation, implementation of security measures,

135


CIRCUIT MAGAZINE ISSUE 52 Gareth Evans - CPO, MSO Reliable dedicated hard-working security professional, with outstanding communication skills. Strategic approach to problem solving combined with exceptional interpersonal skills, quick to grasp new concepts and information. Highly motivated, results-driven and thrives under pressure. Strong leadership and management skills with proven experience committed to continuous personal and professional development. E : evansgareth1979@yahoo.co.uk T : +44 (0)7900058603 James Izett All close protection task undertaken, including training tasks. Medic (Registered with the HPCSA, Registered FAAW instructor and Assessor E : J.Izett@gmail.com T : +971 (0)505 574 350 Janice Gurney Proficient and diligent Security Professional gaining extensive knowledge and experience within the security sector. Proactive individual who has a logical, flexible and conscientious approach to all challenges undertaken, ability to work as a member of a team or as an individual willing to work anywhere. T : +44 (0)7885 793061 E : janice382006@gmail.com International Centre of Special Training International Centre of Special Training is an international training and security company based in the United Kingdom. Its priority objective is to provide services to the highest level. W: www.icost-team.com T: +44 796 736 55 65

Michael Boreland Close Protection Officer Since leaving the British Army in 2006 I have been working in hostile environments for private security companies in various roles ranging from Training & Close protection. I have successfully managed a training wing in Afghanistan providing security operations training for local nationals & Expats conducting operations in the region I believe with my skills and experience of the employment I have done in the past I would be an asset to any organisation taking myself on as an employee. mike.boreland@gmail.com MLK Security and Protection Services Swindon, UK Close Protection Officer and Door Supervisor E: mattleekane@hotmail.com T: 07917654978 LJE Security Services North Yorkshire, HG1, GBR Close Protection, Residential Security, Asset Protection, VIP red carpet Security and Private Investigation. E: leanneedmondson@yahoo.co.uk Oliver Mike Close Protection Operative I came from Hungary and live in the Uk in London since 2014. I was a Police Officer for 23 years as a Counter-Terrorism Specialist. Next to the police I became a Close Protection Operative and self-defense instructor (Krav Maga). I was a member of the International Krav Maga Federation (IKMF). During my service I have been protecting Hungarian Prime Ministers, Interior Ministers, Foreign Ministers, Ambassador of Israel and other politicians of other countries. E: info@formerpol.com T: +447413190349 W: www.formerpol.com

IPSS Security Northfield, Aberdeen, AB16 7EX Security and protection services - UK and overseas. BBA Member. T: + 44 (0) 1224 69455 W: www.ippssecurity.co.uk ISS Training Ltd Riverside Cottages, Nidd Walk, Pateley Bridge, Harrogate, HG3 5NA ISS Training Limited are providers of specialist covert surveillance training courses and publications to the security and investigative industries, enforcement agencies and specialist military units. Formed in 1990, we are the longest established surveillance training ompany in the United Kingdom. Our credibility and reputation is widespread and we offer nationally recognised qualifications. BBA Member. T: + 44 (0) 1423 712265 W: www.intelsecurity.co.uk

One Events Grantham One Events offers you a stress free solution in the organisation, putting together and running of an event. Thisis accomplished by having a group of specialised companies from different industries working together for a more complete service for you. TEL: 0870 974 6779 W: www.oneevents.info

Jason Morris Security Hertfordshire, UK Providing a wide range of Door supervision/security for V.I.P and prestige venues, Concerts, Functions, Corporate and Personal Security, Weddings, Private Parties, Gala Dinners, Business Awards & School Proms, Close Protection and Body Guarding Static Guarding and Stewards. T: 01462 478900 W: www.jasonmorrissecurity.co.uk E: agosselin@jasonmorrissecurity.co.uk John Featherstone Security professional with operational experience gained in a variety of theatres. Main specialities close protection and surveillance. T: 24hrs : +44 (0)7702 740722 E: john@johnfeatherstone.co.uk W: www.johnfeatherstone.co.uk K9 Support Services Ltd K9 Support Services UK Ltd is a supplier of specialist drugs and explosives dog/ handler detection service (which includes arms & ammunition) to individuals, businesses, and the public sector. T: 0845 643 6393 E: info@k9support.org.uk

Logas International Tyne & Wear, SR1, GBR Front line SIA, International CPO. Private Investigation and Surveillance operator. E: wscarr@logasinternational.com

Paul Lovatt – CPO After serving 15 year in the Army a move to the Security Industry was a natural step, during the last 10 years I have worked in almost every role in the industry from Door Supervisor and loss prevention to Operations Manager and Director. I have been responsible for the creation and implementation of highly successful crime reduction schemes across Yorkshire working closely with other agencies in the areas of responsibility. Currently I am responsible for the overall running of large events security teams from stewards to Close Protection Officers. Operational planning, contingency planning and flexibility are I feel among my key strengths. E : paul@deltasecurity-eventmanagement.co.uk T : +44 (0)7506726336 Paul Tyler – VIP Protection & Concierge Specialist in discreet personal protection & surveillance. A good current working knowledge of London & its challenges gained through ongoing high risk security operations. Experienced in dealing with high net worth clients with all matters security & concierge striving go the extra mile to exceed expectations through thorough planning & interaction with all involved parties. A strong communicator with a smart appearance who remains synonymous with the principals lifestyle, whilst discretely ensuring a safe environment is maintained at all times, physically capable of adopting a higher profile when required to do so. Demonstrates sound

136


CLASSIFIEDS judgement and capability to operate with great levels of autonomy. Exceptional interpersonal skills with the ability to understand, interact & connect with a diverse range of people. E : paul@apparitio.co.uk T : +44 (0)7552515604 W : www.apparitio.co.uk Plymouth Close Protection Highly versatile, physically fit and accomplished security professional with cumulative experience in the areas of security management, close protection, crisis management, risk assessment, emergency management, asset protection and security training. E : chris@plymouthcp.co.uk W : www.plymouthcp.co.uk T : +44 (0)1752 500807 PPSS Group Body armour and stab vests provide a functional solution to individuals who require extra protection in their chosen vocation. All PPSS (formerly ASEO) body armour and stab vests are certified by the UK’s Home Office (HOSDB) and offer unrivalled protection from blunt trauma caused by a punch, blow or kick. Based on our professional frontline experience and extensive research we can confirm that an impact based assault is a more likely event than an attack involving an edged weapon or firearm. T: +44 (0) 845 5193 953 F: +44 (0) 1765 603 512 E: info@ppss-group.com W: www.ppss-group.com Presence Security Presence Security (“ PS ”) is a bespoke security company providing protection for private individuals and VIPs, as well as security services for businesses and organizations. T: 0800 002 9734 E: info@presencesecurity.co.uk

Radoslav Savkov - CPO / Security Consultant Oxford - United Kingdom I would introduce myself as a high calibre Security professional with strong customer oriented skills and managerial experience in the Security Industry, interested in a challenging position, which would fully utilize competences gained and provides opportunities for professional and personal development. With 15 + years of international experience in the sector at all levels and a military background (National Service) as well as a practical Close Protection experience in an executive environment, corporate intelligence and investigations. As a Security professional, I never consider my training and development as a complete, therefore I always look to update further my skills and knowledge. In personal plan I am very loyal, discreet , independent and willing to embrace challenges. E: r.savkov@gmail.com T: +44 (0)7886591525 RSM Security UK Ltd London, UK RSM Security UK Ltd offers the experience and expertise necessary to provide security personnel of the highest calibre when you need them. T: 07850091979 or 07792948523 W: www.rsmsecurity.co.uk E: info@rsmsecurity.co.uk RWSSI Rob W is a professional security consultant with world wide experience and capabilities in Security, Surveillance and Investigation; I can support you to overcome any problems and enable you to achieve your goals E: rob@rwssi.co.uk T: +44 (0)7818 220985 SDS Solutions SDS solutions provide our clients with protective solutions that are second to none, our consultants will discuss every aspect of the problems that you are facing that dictate the need for a protective solution, we promise our clients a tailor made service to meet individual requirements. Whether based in the UK or abroad our protective service T: 01453 887815 E: info@sds-solutions.org

Prestige Risks LTD 27 Old Gloucester Street, London, WC1N, 3AX, GBR. Close Protection Secure Chauffeurs Surveillance Residential Security Executive Protection Security Guards Asset Protection T : +44 (0)207 5588182 E : info@prestigerisks.com W : www.prestigerisks.com Prometheus Medical Ltd Prometheus deliver unrivalled bespoke emergency medical support in the form of specialist equipment, training, strategic advice and deployed clinical care. T: (+44) 1568 613942 W: www.prometheusmedical.co.uk Prosec Consultancy Ltd 10 Oakfield business park Westbury, BA13 4WF. Prosec Consultancy Limited are dedicated in providing a professional service, which covers a whole range of security services throughout the security industry. T: 01373 228055 W: www.prosec-ltd.co E: info@prosec-ltd.com ProTouch Security ProTouch Security is one of the UK’s key providers of event safety, event security, crowd management, door supervisors, stewards, event management and health and safety. T: 01724 279 522 W: www.protouchsecurity.co.uk Python Security and Protection Ltd Providing Close Protection Officers and Door Supervisors for Events and Venue Security. E : mattleekane@hotmail.com

Shadow Close Protection A leading company specializing in Executive Protection as a professional sector, with participation in high and low risk missions, providing global security solutions and consultancy to individuals, corporations and national agencies worldwide. W: www.shadowcp.gr E: info@shadowcp.gr T: + 30 6948539664 Shaun West United Kingdom SIA licensed, Highly Experienced Frontline CPO. Ronin SA trained. Providing security for both corporate and hostile environments. E: sw@shaunwest.co.uk T: +44 (0)7830 109 601 W: www.shaunwest.co.uk Steve Pittman - Security Manager of Operations I have been active in the security industry for over 25 years in various roles including close protection where I have been responsiblefor the the welfare of high net worth individuals in low and high risk situations . I have also a vast amount of experience in many other areas of there security industry including Door Supervision, Security Management, Event Security, and Residential Security. E: steve@covert protection.com T: 07818800778 Mark Claydon-Smith – CP Team Leader and Medic I have spent 13 years in the Royal Navy Culminating in the rank of SNCO Petty Officer. In 2004 I started my security career and have worked in Hostile environments. I have held several positions including Operations Manager, Team Leader and Rig Site Manager. I have worked in Kurdistan, Afghanistan and Iraq as well as the UK and Europe. E : mark@claydon-smith.com T : +964 (0)7815 970433

137


CIRCUIT MAGAZINE ISSUE 52 Philip Shearman MSyl – CPO, Risk Manager A professionally Qualified Close Protection and Surveillance Operator and Team Leader with over twenty two years of experience gained in the Military Police, the last fifteen of which were spent with the Military Police Close Protection Unit, working in various hostile countries throughout the world. Since leaving the Army in Nov 06 I have worked in the Private Security sector. I have gained valuable experience in demanding and challenging operational environments, where I have proved to be a self motivated and resourceful individual, performing well under pressure, communicating effectively at all levels whilst exercising tact, diplomacy and integrity. E : benshearman10@hotmail.com T : +44 (0)7930 277586

using a constantly changing mathematical formula. It uses a dual layered RSA/AES combination and a changing session key which modifies the encryption algorithm every second. € 1,398.00 + VAT. All prices include new Nokia N73 phone. BBA Member. T: + 357 7777 7276 W: www.protechcy.com/new

Spotllght Protection Services Essex based business which provides a broad and growing range of security services to businesses and organisations large and small. T: 07870560208 E: info@spotlightprotectionservices.co.uk W: www.spotlightprotectionservices.co.uk

Nemesis Protection offers a full spectrum of services including Risk Advisory, Close Protection, Asset Protection, Security Driving, Surveillance & Private Investigation, Information Security, Transport Security, Staffing, and Specialist Security Training. T: 00381644679650 E: contact@nemesisprotection.com W: www.nemesisprotection.com

VIPA Tactical Training A specialist training academy dealing with four specific areas of combat: VIPA Civilian Self Protection Program, VIPA Close Protection Combat System, VIPA Police Defence Tactics and VIPA Military Close Quarter Combat. BBA Member. W: www.VIPAtacticaltraining.com Wagtail UK Wales, UK Wagtail UK are international specialists in detection dogs and dog handler training. Established in 2003, Wagtail UK provides detection dogs and related services for government agencies such as UK Border Force, HM Revenue & Customs, Police, Trading Standards and Armed Forces. Wagtail International School of Excellence in North Wales is a fully approved training centre endorsed by Highfield Awarding Body for Certification. T: +44(0)1745 561166 E: info@wagtailuk.com W: http://www.wagtailuk.com Westminster Security Ltd London, UK Westminster Security Ltd are an independent, industry leading private security company in London; providing security and investigation services throughout the UK, EU and worldwide for our clients. We specialise in close protection services; providing ex-military and police bodyguards to many national and international companies, heads of state, royalty, high-profile personalities, CEO's, private individuals and families. T: +44 (0)207 123 4544 E: Info@westminstersecurity.co.uk W: www.westminstersecurity.co.uk Yoji Security We established Yoji Security in response to our perception of declining professional standards across the security industry. We strive to provide first class customer service in everything we do, drawing on our extensive experience in the fields of special operations, intelligence, counter terrorism and close protection. T : +44 7903231076 E : enquries@yojisecurity.com Europe & Africa International Security Academy P.O.Box 5833, Herzeliya, 46000, ISRAEL. zOur graduates are more recognized, respected and sought after by Distinguish Protection service “consumers” and by most of the “Providers” of Protection services worldwide. Organisers of the 2008 International Summit of Protection Officers. BBA Member. T: + 972 9 950 0969 W: www.SecurityAcademy.org.il Javier Galan Spain - Security specialist available for operations around the world. E: oejju@hotmail.com T: 34.637080771 Military Grade Encryption Phones PO Box 52310, Limassol, CYPRUS Built-in encryption software which converts your voice to encrypted data

Nemesis Protection Ruma, Serbia Nemesis Protection is a Risk Management Company specialized in providing viable, bespoke, optimal, feasible and cost-effective security and training solutions for corporations, government institutions, and private clients worldwide.

TPT Firearms Training Bratislava , Slovakia and Rome , Italy We know from our extensive experience within the industry that it can be daunting when initially carrying a firearm and being responsible for protecting a clients life, but learning the proper techniques and having the ability to understand the weapon will make the job a lot easier and more enjoyable. Hopefully you will never have to use the weapons you carry, but should this prove necessary you will be confident and knowledgeable enough to handle the situation professionally and effectively. T : +44 (0) 7734101910 E : info@tacticalprotectionteam.co.uk W : www.tacticalprotectionteam.co.uk Security Concierge Group SCG Special Projects Ltd, Avenida, Bartolome Vicente Ramon No 10, B16, Ibiza, 07800, ESP Security Concierge Group is a privately owned and fully independent provider of exceptional security services to an interesting and varied range of clients. T: 00 34 600 665 275 W: www.securityconciergegroup.com E: joe.buckle@securityconciergegroup.com Wille Heino Security Specialist, Owner Finland Gambeson is a security training & Consulting Company specialized in countering modern day threats. - Security & safety planning for different events. - Security training: Active shooter/Terrorism awareness/Surveillance detection/Other. - Security consulting. We are specialized in executive protection related services. Local knowledge, trained and licensed close protection offers, mission support, other. E: wille.heino@gambeson.fi W: www.gambeson.fi Zika Rakita Managing Director Ruma 22400, Serbia Accomplished, result-driven, and highly motivated Close Protection Operative, conducting protective operations internationally. A background encompassing planning, organizing, leading, and undertaking Close Protection operations in both corporate fields and hostile environments. Proven in achieving results and completing tasks on time, discreetly, and to the highest standards. A confident communicator with the ability to sensitively solve a range of clients’ and colleagues’ problems and inquiries. With the ability to use sound judgment and understanding the operational balance and needs. E: contact@nemesisprotection.com T: 00381644679650 Americas Bodyguard Careers Bodyguard Careers is an informational site with the purpose of providing bodyguards with all the information and tools necessary to succeed in the Close Protection Industry Info@BodyguardCareers.com www.BodyguardCareers.com

138


CLASSIFIEDS Canadian Use of Force Systems 7975 Yonge St. # 7124, Innisfil, ON, L9S 1L0, CANADA A professional Use of Force and Defensive. Tactics organization teaching a full range of controlled response options for Self-Protection and Use of Force considerations in public and professional environments. BBA Associate Member. T: + 1 705 456 4333 W: www.canadianuseofforce.com Contact Front Photography Contact Front Photography is the world’s 1st photography studio dedicated to the Close Protection Professional. Stop putting generic or pirated photos on your website; instead commission custom shots to best represent you or your agency. T: +1 (612) 369-6134 E: Info@ContractFrontPhotography.com W: www.ContactFrontPhotography.com Decisiones Estratégicas Buenos Aires – Argentina Executive protection specialists we have experienced in all Latin America, for multinationals companies, also providing support in project throughout Latin America to consulting first the US. and UK. We have a team of specialists and psychologists in assistance and crisis negotiation. T: +54(911) 6415 1941 E: jbenitez@d–estrategicas.com W: www.d–estrategicas.com Detective Lacerda P.O.BOX 25996, São Paulo, 05513-970, BRAZIL Providing the full range of security and investigation services throughout Latin America. BBA Member. T: + 55 (11) 3452 4388 W: www.detectivelacerda.cjb.net Giovanni Rossi South Africa Doctorates in Criminology, Vessel Security Officer, ASP Instructor, ISSPC Member, BBA Member, IAPPA Member, American Bodyguard and Protection Instructors Association - Lifetime Member E: rossi1@mweb.co.za T: +2783 415 9205 USA Global Bear Protection PO Box 11488, Jackson, Wyoming, 83002, USA Provision of British and US Ex Special forces security/medical specialists. T: 307 413 3619 W: www.globalbearprotection.com E: bear@globalbearprotection.com Icon Services Corporation 1043 Grand Ave. #312, St. Paul, MN 55105, USA A full service security and investigative agency specializing in providing high-level security and bodyguards to international celebrities, public figures and corporations. Licensed, bonded and insured, our diverse roster of clients reads as a virtual who’s who in the corporate, motion picture, fashion and recording industry. Icon has been the hand picked choice to provide Executive Protection to everyone from Superintendents to Supermodels. BBA Member. T: + 1 651 695 8778 W: www.Industry-Icon.com Imperial Protective Service, LLC 15849 N. 71st Street, Suite 100, Scottsdale , Arizona, 85254, USA Imperial Protective Service’ (IPS) is a security consulting and services firm founded in 1978. IPS provides both national and international corporate, executive and celebrity protective services. BBA Member. T: + 1 480 281 1588 W: www.executiveprotect.com Panther Protection Services 3695F Cascade Road, Suite 2207, Atlanta, GA 30331 Panther Protection Services is a full service protection agency offering such services as threat assessment, executive protection, self-defense training, firearms instruction, and high risk tactical protection. Our executive protection specialists have over 75 years of experience. Panther can handle your protection needs whether around the corner or around the world. Member: BBA and NABA

139

T: (404) 349-9117 W: www.pantherprotectionservices.com Rouven Rohler - Security Consultant / HSE liaison - Romania I am a very fit and mentally robust Security Specialist with quality experience gained in the security (Military, Maritime and Commercial Operational Security (Oil& Gas). I have improved the effectiveness of protection teams and significantly enhanced clients’ awareness. My career commenced in the Australian Army, which included hostile environment deployments to Iraq and the Solomon Islands and I have since been operating on various contracts throughout Afghanistan and Iraq. E: rouven@y7mail.com T: +40 (0)746 642 739 SILVER STAR PROTECTION Executive protection, site and event security with global experience. Serving southern Minnesota with integrity and professionalism. Former USSS, ICON Alumni. available for domestic and international travel. Robert E. Jones Manager/CEO W: www.silver-star-protection.com E: rejones@silver-star-protection.com TSICS (T6) Miami, Florida, USA TSICS (T6) provides the following services in Central America: Executive Protection, Individual Bodyguard, Close Protection Training, Corporate Invest. W: www.security-professionals.org/members/saldrix E: tsics.t6@gmail.com T: +502 6645 6822 Tony Scotti’s Vehicle Dynamics Institute 1162 St. Georges Ave, Suite 277 , Avenel, NJ 07001, USA The first name in advanced driver training, offering our highly acclaimed Protective/Evasive Driving Programs. Designed specifically for today’s executive chauffeurs, executive protection professionals and others who are responsible for providing safe and secure transportation services. BBA Member. T: + 1 732 738 5221 W: www.vehicledynamics.net Vindex Personal Protection & Investigation Inc. 497 Hooksett Rd #365 Manchester NH 03104 603.289.3161 / Full service Private Investigations & Executive Protection. 10 years combined Law Enforcement, Private security, close protection work, & security contracting. NY Mayors, U.S. President’s, NFL owners, and VIP’s are some of the protection work I’ve gained experience with. ICON alumni, NABA member. T: + 1 732 738 5221 E: vindexinc@aol.com W: www.vindexinc.com Asia Pacific Asia Protective Group Ltd Asia Protective Group (APG) is a Hong Kong based risk management company, specializing in executive protection, overseas travel security and security consultancy services. APG has an extensive network of security specialists operating throughout the Asia Pacific region. W: www.asia-pg.com E: jim@asia-pg.com E: yvonne@asia-pg.com New Zealand Security Investigations & Risk Solutions LTD We are dedicated to providing professional and effective security solutions for your personal or business security requirements. S.I.R.S is one of the only security companies in New Zealand with ISO 9001 and ISO 18788 Running the most advanced security management system Track-Force to help S.I.R.S security operations with real-time reporting and lone worker technology. With a combination of Military and Security industry experienced staff. We offer high-quality security services and industry recognised training programs with international qualifications in Close Protection, Bodyguards, Maritime Security, Hostile Environment, Firearms Training, Door Supervision, Private Investigations, Surveillance, CCTV Operations, Event Security, Mobile Patrols and Static Guards. S.I.R.S has the expertise and flexibility to meet a wide variety of client needs. E: lee@sirs.org.nz T: 02040787549 W: www.sirs.org.nz


Life can be testing, no matter what you fight. - Keep Fighting.

FOP is for you, whether you wear uniform, a suit, or gym kit.

140


Subscrib e today & save

THE TEAM: UK Editor: Shaun West US Editor: Elijah Shaw Managing Editor: Jon Moss

Subscription means you’ll never miss an issue of the Circuit Magazine again. Subscribers get:

Art Direction: Pete Falkous

• Every issue of the Circuit • Full access to the Circuit website. • Priority delivery of each magazine. • Access to all back issues. • Subscriber only content and offers.

CONTRIBUTORS: Ivor Terret David Dann R.Savkov Orlando Wilson Ben Gunn Mark “Six” James James Bore Ryan Naish Walter Hardy Spence, Jr Mark Roche Justin L. Johnson Jose Casillas

Our Sincere Thanks to all those that continue to contribute their wisdom and experience for the enjoyment of others The Circuit is compiled, edited and published in the UK and US bi-monthly. W: www.circuit-magazine.com E: info@circuit-magazine.com T: +44 0191 645 0865

TO ADVERTISE: IF YOUR BUSINESS OPERATORS IN, OR SERVES THE PROTECTION INDUSTRY THEN YOU NEED TO SPEAK DIRECT TO YOUR AUDIENCE THROUGH A TRUSTED CHANNEL. GET IN TOUCH TO FIND OUT ABOUT THE GREAT OPPORTUNITIES THE CIRCUIT CAN PROVIDE TO IMPROVE YOUR BUSINESS SALES AND GROWTH. Email: info@circuit-magazine.com DISCLAIMER While every care has been taken to ensure that the information contained in this magazine is both accurate and up-to-date, The Circuit accepts no liability in any part for loss or damage incurred by reliance on information contained in this magazine through omissions, errors, howsoever caused.

New app with more features Get The Circuit Security Magazine with immediate electronic downloads to read on your PC, laptop or smart device.

141

©COPYRIGHT Copyright remains with the authors and contributors at all times. No part of this publication can be copied or reproduced in anyway whatsoever without permission from the publisher AND the author / contributor.


facebook.com/groups/TheNABA/ 142


Articles inside

Classifieds

22min
pages 135-142

Keeping Your Edge Encore

5min
pages 128-134

Foot Steps Mike Smith

4min
pages 121-125

Ammunition Why the JHP?

7min
pages 114-120

Other Side of the Desk EP in the Classroom

9min
pages 106-113

Tactical Firearms Methods of Carry

14min
pages 86-95

Ask the NABA Network

4min
pages 96-97

Securing Smart Home Devices Finding Vulnerabilities

9min
pages 98-105

Fit for Purpose More Than Just a Workout

7min
pages 78-85

Protecting the Principal in a Pandemic A Panel Discussion

6min
pages 64-71

What's in the Bag? And Which One?

10min
pages 54-63

Cybersecurity Intro to Steganography

6min
pages 72-77

Emotional Intelligence A Core Skill in EP

10min
pages 26-35

TSCM In the Workplace

10min
pages 46-53

Detained Arrested Overseas

10min
pages 36-45

UK Foreword

2min
pages 4-6

COVID-19 Just Another Threat?

5min
pages 20-25

US Foreword

1min
page 7

Technology In Security A Solution or Misused?

7min
pages 14-19

Industry News

9min
pages 8-13
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.