Issue 66 - AI Armageddon

Page 1

News

Reviews

Opinions

Intel

Exclusives

66

AI ARMAGEDDON THE RACE FOR DOMINACE IN A DIGITAL AGE

CHINESE CHATBOTS

Ι TRAVEL SAFETY Ι

HUMAN TRAFFICKING 1


contents ISSUE 66 04

UK FOREWORD

07

US FOREWORD

08

INDUSTRY NEWS

14

TRAINING SECURITY PROFESSIONALS IN COMBATING HUMAN TRAFFICKING.

22

CYBERSECURITY FUNDAMENTALS FUD FOR THOUGHT: AI ARMAGEDDON AND SECURITY

28

THE EVOLUTION OF THE ADVANCE TEAM

33

METHODS TO INCREASE YOUR MARKETABILITY IN PROTECTIVE OPERATIONS

40

TACTICAL MEDICINE WHEN DO YOU LET GO?

48

THE COMPLEXITIES OF SOLO OPERATOR: NAVIGATING THE CHALLENGES OF EXECUTIVE PROTECTION

54

SECURED TRANSPORTATION IT’S NOT ABOUT THE POSSESSION OF A FIREARM

62

CHINESE CHATBOTS AND THE RISE OF AI RISKS

70

GLOBAL SITUATION REPORT

76

TACTICAL FIREARMS IMMEDIATE ACTION: THE KEY TO STAYING ALIVE IN CLOSE COMBAT

82

BEYOND THE SURFACE DISTINGUISING BETWEEN LOOKING & SEEING

92

TRAVEL SAFETY: TO PAY PROTECTION MONEY OR NOT?

102

SECRETS TO A SUCCESSFUL TOUR

109

ACTION NEEDED: WHERE'S YOUR SECURITY JOURNEY HEADING?

112

INDUSTRY EVENTS

114

KEEPING YOUR EDGE: CLIENT CONFIDENTIALITY IN THE AGE OF SOCIAL MEDIA

2

48


82 14

22 3


EDITOR FOREWORDS

UK FOREWORD Welcome to the latest edition of the Circuit Magazine – we're thrilled to present issue number 66! As an Englishman, the number 66 always stirs excitement in me, reminiscent of England's triumphant World Cup victory.

As the sun begins to set earlier and the days gradually shorten, we stand on the threshold of yet another seasonal transition – bidding farewell to the bustling summer months that traditionally mark a dynamic period within the Protection industry. Beyond the shift in weather, this transition signifies more profound changes in our field. As our clients return from their vacations and resume their routines, I hope that many of you have secured longer-term assignments following the summer rush. For those already engaged in longer-term roles, I trust you've had a successful season safeguarding your Principals and ensuring their peace of mind. With this juncture of change before us, let's approach the days ahead with a fresh perspective. Autumn promises prospects for growth, adaptation, and new beginnings. Let's carry forward the lessons and camaraderie fostered during summer, reinforcing our dedication to excellence and collaboration in all our endeavours. On a personal note, I'm excited to embark on new ventures as I dive into the realm of coaching, aiming to assist Security Professionals in advancing their careers and businesses. After years of providing protection services and managing teams and companies, I can offer substantial value

4

to help individuals flourish. If coaching aligns with your aspirations, please don't hesitate to get in touch, as it would be great to speak. I want to extend heartfelt gratitude to our devoted Circuit readers and podcast listeners. To those who eagerly flip through these pages seeking insights, knowledge, and inspiration, we genuinely thank you. Your dedication to staying informed and evolving within this dynamic field motivates us to deliver valuable content that empowers your journey consistently. Likewise, we express our warmest appreciation to our podcast audience, who eagerly tune in to gain profound insights from industry experts. Your unwavering support fuels our passion for facilitating thought-provoking conversations and fostering a sense of community in the realm of executive protection. If you find value in the content provided, kindly show your support by liking, sharing, and subscribing. Your engagement contributes to expanding the magazine and podcast and enables us to bring meaningful, valuable content to the community consistently. Stay safe Shaun West Editor


THE APP THAT CONNECTS THE SECURITY INDUSTRY Download the app and sign up for a free account Available on:

Fully featured Member events Exclusive opportunities

Regular content Trusted information Learn & grow

Jobs Board

TRAINING

EVENTS

Join the BBA Network 5


6


EDITOR FOREWORDS

US FOREWORD Welcome to the latest issue of The Circuit Magazine – the definitive source of insights and expertise for the dynamic world of executive protection. And while the summer is almost over, we’re still spreading sunshine wherever we can, so It's with great anticipation and appreciation that we bring this publication to the stands. As I go through the pages of the preview copy, I'm reminded of the remarkable network that has grown around The Circuit Magazine. From the casual reader to full-fledged members of the North American & British Bodyguard Associations (NABA & BBA, respectively), we truly have a global readership and, more importantly, a global community. We try to service this community in various ways, from the magazine to the podcast, to the Apps, and more. So, to the seasoned professionals and newcomers alike, we sincerely thank you for your patronage, engagement, and support. You’ve empowered

us to continue delivering highquality content that addresses the evolving challenges and opportunities in the realm of executive protection and security. As proof, we’ve assembled a collection of articles, insights, and perspectives from industry experts and thought leaders that span the spectrum of our profession. From corporate to celebrity to dignitary, we try to tackle all slices of the pie to inform, inspire, and equip. Lastly, if you think we are doing a good job (which I really hope we are), allow me to make a special request: please tell your peers, colleagues, and friends within the industry about the magazine so that way they can experience what we offer, and allow the tribe to grow even larger. Elijah Shaw Editor 7


CIRCUIT MAGAZINE ISSUE 66

Industry News At A Glance

We cast our eye over the main stories impacting the security industry. Here's what's appeared on the radar since the last issue. Lionel Messi's Bodyguard Intercepts Pitch Invader: A Closer Look During Inter Miami's 3-1 victory against LAFC at BMO Stadium, Los Angeles, a fan, donning Barcelona colors, made a dash for football superstar Lionel Messi. However, before he could reach Messi, Yassine Chueko, Messi's bodyguard, intervened, forcefully removing the fan to ensure Messi's safety. Chueko's actions, particularly grabbing the fan by the neck, have drawn criticism. Yet, it's his claimed military background that has come under most scrutiny. While some sources, like Barstool Sports and the New York Post, suggest he's a former US Navy SEAL with service records in Iraq and Afghanistan, members of the SEAL community dispute this. DailyMail.com reported that current and former SEAL members couldn't recognize Chueko, and his name was absent from a SEAL veterans database. "Karma has a funny way of finding you

8

when you're publicly advertised as a former SEAL, but you never graduated from BUD/S or earned the Trident. This is either media misattribution or outright fraud. #stolenvalor," commented Christophe Freisenbruch, a former SEAL, on LinkedIn. The uncertainty is likely to continue as neither Chueko nor Inter Miami have commented on these claims. Additionally, there's no confirmation from the Navy about Chueko's alleged service. The incident at BMO Stadium underscores the importance of situationally aware protectors in ensuring the safety of high-profile individuals. While Chueko's military background remains contentious, his swift action in protecting Messi is commendable. However, it's crucial for security professionals to maintain transparency about their credentials to avoid controversies that can overshadow their primary duty – protection.


INDUSTRY NEWS

Apple’s Head of Security Faces Bribery Charges Over Concealed Carry Weapon Permits Thomas Moyer, Apple's head of global security, is back in the spotlight after a tribunal of judges from California's 6th District Court of Appeal reinstated a bribery charge against him. Moyer is accused of offering iPads, valued at over $50,000, to the Santa Clara County Sheriff’s Office. In return, he sought concealed carry weapon permits for Apple's executive security team, which safeguards top-tier company executives, including CEO Tim Cook. Despite the evident security concerns, obtaining a concealed carry weapon permit in California is a lengthy process. Apple's team applied for the permits in 2018, but it wasn't until January 2019 that Laurie Smith, the then-Santa Clara County Sheriff, approved them. The subsequent delay in paperwork seemingly led Moyer to consider bribing the Santa Clara police. Evidence suggests a meeting took place at Apple Park in Cupertino between Moyer, Smith, and Rick Sung, the sheriff’s office’s undersheriff. An email from Moyer with the subject "iPad Donation" and subsequent

communications indicate a quid pro quo arrangement. The initial offer of 50 iPads soon ballooned to 200 at the police's request. By late March 2019, Apple's protection team had their licenses. However, by the end of the year, Moyer rescinded the iPad donation offer. This decision came too late, as prosecutors were already investigating the sheriff’s office's permit distribution practices. A grand jury subsequently indicted Moyer, Sung, and James Jensen, a police captain. While a lower court dismissed Moyer's charges in 2021, the recent appeal has reignited the case. Former Sheriff Smith had previously been convicted in a 2022 civil suit for misusing her authority in granting gun permits. The case involving Moyer highlights the complexities and potential pitfalls companies face when navigating security concerns in stringent regulatory environments. While the safety of executives is paramount, ethical boundaries must remain intact. This incident serves as a cautionary tale for corporations, emphasizing the importance of adhering to legal processes, even when faced with pressing security challenges.

9


CIRCUIT MAGAZINE ISSUE 66

U.S. Military Equipment in Afghanistan Allegedly Used by Militant Groups in Pakistan Pakistan raised concerns on Monday, alleging that U.S. military equipment left behind in Afghanistan has found its way into the hands of militant groups in other countries via the Taliban. Anwaarul-Haq Kakar, Pakistan's caretaker Prime Minister, stated that terror factions within Pakistan, including the Tehrik-e-Taliban Pakistan (TTP), are now utilizing American equipment such as night vision goggles and firearms in their operations. The TTP, in particular, has intensified its attacks on government forces recently. In the aftermath of President Biden's 2021 withdrawal from Afghanistan, the U.S. left behind an estimated $7 billion worth of military equipment. The rapid defeat of the Afghan government forces by the Taliban led to the handover of this American equipment, which encompassed guns, ammunition, helicopters, and more. Out of the 96,000 military vehicles provided to Afghan authorities, over 40,000 were abandoned, including 12,000 Humvees. Furthermore, nearly threequarters of the 427,300 weapons given to Afghan forces were left behind, along with less than 1,537,000 "specialty munitions" and small arms ammunition. Pakistani officials have highlighted that the TTP now claims to possess weapons

10

equipped with laser and thermal targeting systems. This has enabled the TTP to engage security forces from greater distances than before. This revelation from Pakistan coincides with the second anniversary of the U.S. withdrawal from Afghanistan. In a recent statement, President Biden described the operation as "one of the largest airlifts in history." He also took a moment to honor the sacrifices made by U.S. service members during the conflict. "Today, we pause to remember the selfless service of generations of brave women and men over the course of the conflict," Biden remarked. However, the hasty exit from Afghanistan left numerous Americans and Afghan allies stranded, with the Taliban quickly reclaiming control as U.S. forces finalized their departure. The situation underscores the unintended consequences of abrupt military decisions. While the U.S. aimed to end its prolonged involvement in Afghanistan, the repercussions of leaving behind vast amounts of military equipment are now becoming evident. It's a stark reminder for nations to consider the broader implications of their actions, especially in volatile regions where power vacuums can lead to unforeseen challenges.


INDUSTRY NEWS Broadcaster Considers Bodyguards for Pundits After Alleged Assault on Roy Keane

safeguard Australian pundits during The Ashes coverage. This recent episode might see a similar protective measure being implemented.

In the wake of an alleged 'headbutt' on former footballer and current pundit, Roy Keane, during Arsenal's 3-1 victory over Manchester United, Sky is contemplating bolstering its security measures. The incident occurred as Keane and fellow pundit Micah Richards were transitioning to the pitch's side for their postgame analysis. A video has since surfaced, depicting Richards restraining an unidentified individual who allegedly aimed a headbutt at Keane.

A statement from a Sky Sports representative post-incident read: "We understand the police are investigating an alleged assault by a member of the public immediately preceding the footage circulating on social media. In the footage seen, Micah Richards was acting to diffuse a situation."

An eye-witness reported seeing blood at the scene. Subsequently, the Metropolitan Police confirmed the arrest of a 42-year-old man on suspicion of assault [ABH]. This unsettling event, which took place in the Emirates Stadium's hospitality area, has prompted Sky to reassess their security protocols, as reported on TalkSport. Sky has previously enlisted bodyguards to Security Concerns Emerge as US President Biden's Convoy Faces Negligent Driving Incident at G20 Summit in Delhi During the G20 Summit in New Delhi, a concerning security incident unfolded within the convoy of U.S. President Joe Biden. A driver was apprehended on Saturday due to negligent driving, prompting heightened security concerns during the high-profile event. However, the driver was later released following a thorough interrogation. The incident occurred when one of the vehicles in President Biden's convoy mistakenly entered the Taj Hotel, where the President of the UAE, Mohammed bin Zayed Al Nahyan, was staying. This unusual turn of events raised suspicions among vigilant security officers at the Taj Hotel, as the convoy car bore numerous stickers indicating its affiliation. Upon closer inspection, it became evident that the driver had deviated from the designated route. When questioned about his actions, the driver explained that he had been scheduled to arrive at the ITC Maurya, where President Biden was staying, at 9:30 am. However, due to a passenger request, he had made an

The incident involving Roy Keane underscores the escalating demand for professional protection at high-profile events. As the lines between celebrities, athletes, and pundits blur, the need for enhanced security becomes paramount. It's essential for broadcasting networks to prioritize the safety of their personnel, ensuring that they can perform their roles without fear of potential harm. The proactive approach by Sky and TNT Sports illustrates the changing dynamics in the world of sports broadcasting.

unscheduled stop at the Taj Hotel to drop off a businessman he had picked up from the Lodhi Estate area. It was apparent that the driver was unaware of the established security protocol. Security personnel conducted a thorough inquiry into the incident, which ultimately led to the release of the driver from custody. Furthermore, his vehicle was promptly removed from the presidential convoy. This incident has prompted authorities to review and enhance the security measures surrounding President Biden's visit, underscoring the imperative of strict adherence to security protocols during high-profile diplomatic visits. tSecurity breaches within the convoy of a head of state are always a cause for concern. The incident highlights the constant need for stringent security measures during high-profile international events like the G20 Summit. It is imperative that security personnel remain vigilant and that protocols are strictly followed to ensure the safety of dignitaries and attendees.

11


CIRCUIT MAGAZINE ISSUE 66

Chinese Spy Exploits LinkedIn to Target UK Officials for State Secrets

classified information concerning the UK's relationship with China.

A Chinese spy has been employing fake LinkedIn profiles to entice thousands of British officials into divulging state secrets in exchange for financial incentives and ostentatious business prospects. This revelation has raised alarms regarding espionage activities within the UK.

Among those targeted were think tank researchers and academics, individuals potentially considered more susceptible to infiltration.

The covert Chinese operative, operating solo from Beijing, has adopted multiple pseudonyms and fabricated company profiles to target a wide range of individuals, including civil servants, scientists, and security personnel, all on the professional social media platform LinkedIn. An investigation conducted by The Times uncovered that the spy primarily operates under the alias "Robin Zhang" and is believed to be one of the most prolific spies operating in the UK in recent years, according to Western security officials. Some individuals unwittingly fell victim to the spy's tactics, sending their CVs with hopes of securing private-sector opportunities. Others reported the spy's unprofessional and persistent behavior, which escalated to offers of monetary compensation in exchange for

12

The spy's strategy involved fabricating security companies and websites to bolster their credibility when approaching potential targets. They even went to the extent of pretending to be associated with a London university. This case highlights the evolving nature of espionage in the digital age. The use of professional networking sites like LinkedIn provides spies with a platform to access a wide range of potential targets, from government officials to researchers and academics. It underscores the need for increased awareness and vigilance among users of such platforms, as well as the challenges faced by intelligence and security agencies in countering these covert activities. Maintaining cybersecurity and adhering to established security protocols remain crucial in safeguarding sensitive information.


INDUSTRY NEWS Prince Andrew will KEEP his police bodyguards following review of his security detail in wake of Jeffrey Epstein scandal A federal investigation has determined that Professional Security Consultants Inc. – a Los Angeles-based security company that provides officers for shopping malls, schools, hotels, hospitals, office buildings and gated communities – repeatedly exposed its employees at the Boise Towne Square mall to workplace violence hazards and failed to follow its own procedures for interacting with armed individuals to enforce the mall’s code of conduct.

following the fatal shooting of an unarmed security officer on Oct. 25, 2021. OSHA cited the company for not instituting controls to protect security workers from hazards likely to cause death or serious physical harm. the agency proposed penalties totaling $14,502.

Who’s protecting Who’s protecting Who’s protecting YOU, while you YOU, while you YOU, while you protect others? protect others? protect others?

The U.S. Department of Labor’s Occupational Safety and Health Administration initiated an inspection

“Professional Security Consultants’ policies and procedures did not effectively address the risk of gun violence, a recognized hazard in the security services industry,” said OSHA Area Director David Kearns in Boise. “Every worker has the right to a safe and healthful workplace. This employer must provide enhanced safeguards and training to ensure workers have the knowledge and tools to better protect themselves against assault.”

Source >

With our premium tier of membership, we’ve got you covered under the BBA Protect insurance policy, providing complete peace of mind while With our premium tier of membership, we’ve got you covered under the you work in addition to the standard BBA membership benefits. BBA Protect insurance providing we’ve complete of mind whilethe With our premium tier policy, of membership, got peace you covered under Designed forin professionals looking toproviding maximiseBBA their employability and their you work addition the standard membership benefits. BBA Protect insuranceto policy, complete peace ofdemonstrate mind while commitment to industry standards, there are two levels of Protect membership available: you work addition to the standard benefits. Designed forin professionals looking to maximiseBBA theirmembership employability and demonstrate their commitment to industry standards, are two levels of Protect membership available: Designed for professionals looking tothere maximise their employability and demonstrate their PROTECT PROTECT+ commitment to industry standards, there are two levels of Protect membership available: Individual public and products liability Personal accident and health insurance PROTECT PROTECT+ insurance designed for UK Close designed for armed Close Protection and Individual public and working productsinliability Personal accident healthworking insurance Protection operators nonMaritime Security and operators in PROTECT PROTECT+ insurance designed UK Close designed for armed Close Protection and hostile regions. hostile regions. Individual public andfor products liability Personal accident and health insurance Protection operatorsfor working in nonMaritime Security working and in insurance designed UK Close designed for armedoperators Close Protection hostile regions. hostile regions. Protection operators in nonMaritime Security membership operatorsorganisation, working The in As a trusted professional FROM JUST £60working PER MONTH BBA are dedicated to bringing our members the best hostile regions. hostile regions. IT’S EASY TO UPGRADE YOUR BBA

FROM JUSTTO £60 PER MONTH MEMBERSHIP PROTECT YOU. IT’S EASY TO UPGRADE YOUR BBA FROM JUST £60 PER MONTH MEMBERSHIP TO PROTECT YOU. IT’S EASY TO UPGRADE YOUR BBA MEMBERSHIP TO PROTECT YOU.

possible resources and tools to enhance their standing and As a trusted professional membership organisation, The credibility as close protection operators within the industry. BBA are dedicated to bringing our members the best As a trusted professional membership organisation, Theand possible resources and tools to enhance their standing BBA are dedicated to bringingoperators our members thethe best credibility as close protection within industry. possible resources and tools to enhance their standing and credibility as close protection operators within the industry.

Visit our website at www.the-bba.org.uk to find out more. Visit our website at www.the-bba.org.uk to find out more. Visit our website at www.the-bba.org.uk to find out more. Lockton Companies LLP is a limited liability partnership incorporated in England and Wales, registration number OC353198. Authorised and regulated by the Financial Conduct Authority.

13

Lockton Companies LLP is a limited liability partnership incorporated in England and Wales,


CIRCUIT MAGAZINE ISSUE 66

By Michael J. Niner

Training Security Professionals in Combating Human Trafficking. In the last few months, we have heard a lot of talk about the plague of human trafficking due to the release of the “Sound of Freedom” movie, which brings a new level of awareness about the issue to the general public. Although many of us in the security industry have been aware of this horrible crime for quite some time, and some of us have even been involved in one way or another in combating human trafficking and assisting its victims, it brings a spark of hope to see that people outside the security industry, LE, and other similar organizations are finally recognizing that this type of crime not only exists but is affecting the lives of millions of 14

people (and so many of them are underage children). Human trafficking is a heinous crime involving the exploitation and enslavement of millions worldwide. It is a multi-billiondollar industry that thrives on the vulnerability of its victims, including adults, teenagers, and even extremely young children. There are many myths surrounding this issue, and many organizations


COMBATING HUMAN TRAFFICKING

15


CIRCUIT MAGAZINE ISSUE 66 have been working to educate people about the truths regarding it and how they can help. Although the leading public opinion is that victims are pressured into forced labor or sexual exploitation, human trafficking can take different forms aside from that, such as organ trafficking, illegal adoptions, trafficking for exploitative begging, forced marriage, and forced criminal activity. Here are some important findings to consider: • According to UNODC, Global Report on Tracking in Persons 2022, between 2017 and 2020 there were 187,915 victims reported. • The Global Estimates of Modern Slavery: Forced Labour and Forced Marriage report, 2022 by the International Labour Organization (ILO), shows that there are 27.6 million people in situations of forced labour and an estimated 22 million people living in situations of forced marriage on any given day in 2021. • According to the U.S. Department of Justice and the data published by the Bureau of Justice Statistics on the Human Trafficking Data Collection Activities, 2022 report, for the year 2020, we had 2,198 people referred to U.S. Attorneys 16

While it is estimated to be a multi-billiondollar industry with millions of victims worldwide, we cannot know the exact numbers because of the underreporting, logistical difficulties, and reporting complexities associated with this crime.


COMBATING HUMAN TRAFFICKING for human trafficking offenses. Of which 1,343 got prosecuted. • In its 2023 Trafficking in Persons Report: United States, the U.S. Department of State, mentions that ‘’human trafficking cases have been reported in all 50 states, the District of Columbia, and U.S. insular areas’’ and that ‘’Victims originate from almost every region of the world; the top three countries of origin of victims identified by federally funded providers in FY 2022 were the United States, Mexico, and Honduras.’’

deportation or that they may be charged with a crime. (According to UNODC, Global Report on Tracking in Persons 2022, victims rely mostly on ‘’self-rescue’’). This, along with the fact that identifying trafficking victims is a complex process, especially when victims may not self-identify as such, contributes to underreporting.

Another important issue is that human trafficking often intersects with other criminal activities, such as migrant smuggling and forced labor. For authorities to be able to distinguish between these crimes and accurately attribute cases solely to human trafficking, the But what is the real number of separation between them can be human trafficking victims, one tedious and accurate reporting can may ask? While it is estimated be difficult. The fact that trafficking to be a multi-billion-dollar is a transnational crime; there are industry with millions of victims no real boundaries, and it involves worldwide, we cannot know movement across borders, and the exact numbers because of victims are often moved through this crime's underreporting, logistical difficulties, and reporting numerous countries. Coordinating efforts and information-sharing complexities. Because human between countries can be very traffickers operate clandestinely challenging (especially between and go to great lengths to conceal countries that do not have the their activities, their victims are education and resources on the often kept in isolated locations, subject or where politics can be subjected to coercion, threats, strained), making it difficult to track and physical violence, making it challenging to locate them or even and quantify the global scope of for them to come forward and seek the issue. help. Many of these victims distrust Why should security professionals authorities, cannot speak the get involved in fighting this crime? language to ask for help, and fear 17


CIRCUIT MAGAZINE ISSUE 66

Because this issue concerns everyone, it can affect all of us, and it can happen to anyone. As frontline defenders, our expertise, unique positions within our societal structure, training, and excessive travel position us to play a crucial role in identifying, preventing, and assisting victims. Having already been trained to identify patterns, criminal activity, and threats/risks, we have the unique skills to identify the signs and indicators of unusual behavior, physical abuse, restricted movement, and fear exhibited by potential victims. 18

At Blue Raven Inc., we have always been interested in helping those in need and bringing all of our expertise together to do something positive and effective and give back to our communities. That is why, through our Blue Raven Criminal Justice Training Academy, we implemented additional training in combating human trafficking to our accredited Personal Protection Specialist and Security Officer courses. All our employees are not only trained and licensed to provide protective services in Maryland, Virginia, and the


COMBATING HUMAN TRAFFICKING appropriate support and care Washington DC area but are also until authorities arrive. trained in identifying and helping human trafficking victims. We • Efficient Reporting: believe that all of us should be Specialized training equips helping to fight this crime, and this security professionals with type of training, specifically aimed the necessary skills and at security professionals to combat knowledge to gather evidence human trafficking, is paramount for and report through the proper several reasons: channels. They will know how to collaborate better with • Enhanced Awareness: law enforcement agencies, Specialized training raises NGOs, and other international awareness among security organizations to share professionals about the signs intelligence and resources, and indicators of trafficking. strengthening the overall Protection personnel are taught response to human trafficking. the places where victims are commonly trafficked, enabling • Prevention and Disruption: them to identify victims and Trained security professionals trafficking operations more can act as a deterrent and effectively. Trained personnel implement proactive measures are better equipped to recognize to prevent human trafficking signs of trafficking victims, such activities, disrupting trafficking as physical abuse, restricted networks and protecting movement, fear, and lack of potential victims. personal identification. Once identified, they can inform When it comes to training, it is authorities to provide initial assistance and link victims to the important to make sure your security personnel receive proper agencies/organizations comprehensive training that, at the that will assist them best. very least, covers the following: • Improved Victim-Centered a. Understanding Human Approach: Trafficking: Educating Training empowers security professionals about the different professionals to handle victims forms of trafficking, its root causes, with sensitivity and empathy, and the global and local impact understanding the trauma they may have endured and providing of this crime. You cannot fight 19


CIRCUIT MAGAZINE ISSUE 66 something you know nothing about. Learning the methodology that these traffickers utilize is critical to accurately recognize signs. Ignorance, in particular, is why it is such a profitable crime and has easily created a global presence with transnational movements.

Promotion of collaboration between security b. Victim Identification and Protection: Training on recognizing agencies, law physical signs of trafficking, specific venues and other locations that enforcement, have a tendency for victims to be present, and how to establish NGOs, and other a victim-centered approach and ensure their safety and stakeholders confidentiality. If the victims are not handled properly and with empathy will foster a and care, they will not be able to come forward or give information to coordinated assist your efforts. response to c. Interagency Cooperation: trafficking cases. Promoting collaboration between security agencies, law enforcement, NGOs, and other stakeholders will foster a coordinated response to trafficking cases. This is not a fight that any one of us can fight by ourselves. The nature of the crime requires a good understanding of how to cooperate with different agencies, vendors, or other professionals. Only through cooperation and coordination can this be overcome. d. Cultural Sensitivity: Cultivating 20


COMBATING HUMAN TRAFFICKING that this crucial topic should be incorporated into the educational curriculum of the DCJS Private Security Services training program and across the entire security industry. While serving on the DCJS Private Security Services Advisory Board as the Personal Protection Specialist Representative, Blue Raven CEO Michael Niner developed and spearheaded a Human Trafficking training report recommending these training e. Dealing with Emotional additions be a requirement of all Burn Out: The emotional toll registrants, and it was unanimously of confronting the horrors of approved by their board. We human trafficking, witnessing believe that the role of trained victims' suffering, engaging with security professionals in the traumatic circumstances, and fight against human trafficking sometimes failing to be able to help the victims can lead to severe cannot be emphasized enough. Their expertise, competencies, psychological and emotional and unwavering commitment are strain for security professionals who are supporting anti-trafficking pivotal in identifying and assisting victims, apprehending traffickers, operations. and dismantling trafficking networks. By investing in proper At Blue Raven Inc., we strongly training programs, we aim to advocate for the mandatory training of all security professionals empower security professionals to actively combat this heinous crime to combat human trafficking. We and significantly contribute to the are proud to claim our employees global efforts to eradicate human receive additional training to trafficking. this end, and we firmly believe an understanding of diverse cultural norms and practices to effectively interact with potential victims from various backgrounds. Because human trafficking is a transnational crime, you will most likely have to deal with victims brought in from other countries. Being able to understand cultural differences will help your approach in assisting them.

Michael J. Niner, CEO, Blue Raven Inc - www.blueravenintelligence.com For more information about our Human Trafficking Training for Security Professionals please contact: 703-722-8677 or e-mail: director@blueravenintelligence.com 21


CIRCUIT MAGAZINE ISSUE 66

22


CYBERSECURITY FUNDAMENTALS By James Bore

cybersecurity fundamentals

FUD for Thought:

AI Armageddon and Security

FUD stands for Fear, Uncertainty, and Doubt and is the dark reflection of hype. Given all the marketing and tech utopian hype about AI, the amount of FUD going around these days is unsurprisingly high. I'm not a futurist (studies show that they're often less accurate than flipping a coin in any case, despite their own claims), so it's worth taking any predictions I make here with a good handful of salt. I will try to cut through the hype, talk about where the technology really is, and why, while it may be attracting a lot of investment, it's not the world-changing threat that it gets presented as. Let's start with the big ones, ChatGPT and LLMs (Large Language Models). These tools have been around for a while now, longer than they've been hitting the headlines, and I even used one before ChatGPT was launched to part-write an article and challenge people to spot what

was human-written and what was a machine. Manufactured Mediocrity and ChatGPT These generative models, whether language or imagery, such as Midjourney, make for some impressive gimmickry. There's a writer's strike over their use in media, and there are fears of them replacing writers, artists, and creators of all types. These are not entirely unfounded - AI-generated content is multiplying by leaps and bounds every day. The biggest challenge it has isn't that these generative models don't truly create anything new (although they don't, more a lowest common 23


CIRCUIT MAGAZINE ISSUE 66 denominator of the input fed to them) or that they're currently suffering constant degradation from ingesting more and more AIcreated content (which leads to a beautifully named condition called model collapse). It's that they have no understanding of their output.

We're all going to have to get Take ChatGPT - it's great at creating better at critically reams of very plausible-sounding text which supports whatever it's evaluating the been asked to create. Already, we've had lawyers reprimanded media we ingest, for relying on non-existent legal precedent because they relied on AI but that's not a to do their research. Those reams of text are also, well, utterly mediocre. new problem. So what does this mean for the security industry? Not much, honestly. Generative models create bargain-basement content and are likely to devalue skilled content creation - you can look at the translation industry for parallels, as machine translation has been around for decades. Yet human translation still hangs on because people who care about their content have seen what happens with poor-quality machine translations without at least some error-checking by skilled individuals. Expect a lot of security awareness content being machine-generated to appear, along with a lot more plausible-sounding misinformation and disinformation. We'll all have 24


CYBERSECURITY FUNDAMENTALS to get better at critically evaluating the media we ingest, but that's not a new problem. Ultimately, though, for most of the industry, generating content isn't the bread and butter - and that's all that generative models do despite claims of being able to solve all the world's ills or cause them. What About Decision-Making? Different AI models are used for different purposes, and more likely to have an impact are the decisionmaking AIs. The best example of this, and its flaws, is AI being used to evaluate risk in parole board hearings in the US. I've covered this [before](https:// circuit-magazine.com/cybersecurityseries-artificial-intelligencemachine-learning-and-bias/), so I'll only touch on it lightly here. Without careful evaluation and dealing with biases in the data, these risk evaluation systems suffer from exactly the same problems and biases as humans - and can even reinforce them. Worse, the models can't be questioned to explain their reasoning. They're a black box into which you can pour data and get an answer, without knowing how one led to the other. Humans here have a huge advantage in any risk evaluation - they can be held accountable for mistakes, explain their reasoning, and be more likely

to be questioned on their decisions where AI is often implicitly trusted. Anything Positive? There will likely be some disruption as people place too much trust in technology and abdicate responsibility. There will also be companies trying desperately to replace people with AI. To sum this up, a common joke in technology circles is that a piece of code that would take a programmer a day to write can be written in seconds with AI. The same programmer then has to spend a week debugging and fixing it to get it to work. Hardly labour-saving. Where AI can be used well is in assistance functions. Recognition algorithms are already used to highlight features of interest in CCTV surveillance, helping guide that all-important human assessment to places where it's effective. Environmental monitoring can proactively alert for dangers, instead of waiting for someone to check sensors, reducing the burden on human operators so that they can spend effort where it's most useful. Even in risk intelligence, AI can be useful (though maybe not ChatGPT) in highlighting information of interest and worthy of attention for specific issues as our feed of information grows ever more unmanageable. Again, this only 25


CIRCUIT MAGAZINE ISSUE 66

works if that information is then fed deployed more widely, thanks to human analysts, who can turn it to the manufacturer's heavy marketing, but after years, there's into intelligence. little to indicate they've had any significant impact. A few years ago, one of the first 'security' robots called Steve was Just like Tesla's accident-prone 'selfbeing used to patrol a shopping driving' cars, we shouldn't expect centre. It missed a patch of loose robots to replace human security surface and promptly drove itself professionals any time soon. into a fountain. Others have been

James Bore is an independent cybersecurity consultant, speaker, and author with over a decade of experience in the domain. He has worked to secure national mobile networks, financial institutions, start-ups, and one of the largest attractions’ companies in the world, among others. If you would like to get in touch for help with any of the above, please reach out at james@bores.com 26


27


CIRCUIT MAGAZINE ISSUE 66

By: Michael Brown Jr., EPS, CAS

The evolution of the advance team

28


THE EVOLUTION OF THE ADVANCE TEAM

The point of human evolution is adapting to circumstances, not letting go of the old, but adapting it is necessary. This quote by Sonali Bendre illustrates the transformation of executive protection, more specifically, the role of an advance specialist. Bodyguarding is one of the oldest professions and has evolved and modernized with new technologies and methodologies. One major change is shifting from being reactive to proactive. Over time, we have witnessed the shift from musclebound men to more functionally fit individuals and have even seen the profession become more inclusive to females. History has taught us it takes more than muscles or firepower to stop an attack. Years of case studies and analysis have proven that an individual's survivability chances decrease during an initial attack. The best course of action is to avoid the attack. We have lost countless lives learning this lesson and

have now begun accepting the role of an advance specialist. The major difference between the stereotypical bodyguard and an executive protection specialist is protective advance work, which shifts the scale to a proactive response versus a reactive one. What is protective advance work? Protective advance work is when a specialist advances all known locations and routes of the protectee's itinerary before the visit. A full protective advance includes an itinerary, site survey, route mapping, and emergency planning. The protective advance is field gathering protective intelligence. It establishes baselines of the environment to help determine anomalies. Identifying anomalies in real-time gives you a tactical advantage over the attacker, which is crucial in staying "left of bang." Through the evolution of executive protection, protective advance work has become more critical to the success and failures of a protective detail. 29


CIRCUIT MAGAZINE ISSUE 66 In executive protection, details are smaller than ever due to budget constraints. Now, two to four men details are typical in all protection sectors. However, reducing the size of your protective footprint leaves holes in your security apparatus, leaving your protectee vulnerable. With threat matrixes always shifting, how does one stay acquainted? One of the most significant positions on the protective team is a protective advance specialist, as part of the overt security team. This individual pushes ahead days or hours before the arranged visit to conduct the protective advance, operating as a single or 2-man team to generate the protective advance documents to share with the team. With proper training and experience, we could take a small security footprint and make it more impactful. Over the last two years, I have been a part of a global advanced team with expanded capabilities, supporting one to four men protective details internationally in semi or non30

One of the most significant positions on the protective team, a protective advance specialist, being part of the overt security team.


THE EVOLUTION OF THE ADVANCE TEAM permissive environments. I function like a regular protective advanced specialist with additional responsibilities in this role. I'm tasked with performing covert protection (CovPro), technical countersurveillance measures (TCSM) and surveillance detection (SD). Having a protective advance team that can perform multiple functions without sacrificing the integrity and safety of the protectee. The protective advance specialist will deploy three days early, conducting a full protective advance site survey of all known locations, route mapping, and emergency planning. During this time, they will run all routes with assigned drivers. They will conduct area familiarization mapping of the environment, learning the baseline and atmospherics to spot anomalies upon the protectee's arrival. The protective advance specialists would assist, supervise, and

secure all TCSM sweeps of all private locations. The security posture will be determined depending on the protective intelligence data and threat assessment information. The protective advance specialist will either fall into a covert protection role or a surveillance detection position, expanding the capabilities of the security apparatus. These are just examples of the evolution and application of the protective advance specialist. The days of sending one person to construct a Word document or PDF file are over. A protective advance should be a living document, not a static paper. With the security threat landscape changing across all platforms, we have to take advantage of utilizing the protective advance specialist or team, with their capabilities being dynamic like the world we live in.

Michael Brown, CAS, is a certified anti-terrorism specialists and executive protection specialist primarily focused on global protection missions for multi-national corporations and organizations. Prior to entering this protective space, Michael has spent extensive time operating in the High-Profile Celebrity Protection segment of the marketplace. 31


32


INCREASE YOUR MARKETABILITY By Tom Pecora

Methods to Increase Your Marketability in Protective Operations

A person can increase their marketability in the protective operations/executive protection field in several ways. I am not talking about the obvious training required to be employed in protective operations – training from schools or organizations that provide classes directly relating to the profession. 33


CIRCUIT MAGAZINE ISSUE 66 Training you can receive from various government entities like the US Secret Service, Dept. of State Diplomatic Security, CIA Protective Operations, US Marshals, State Police, or other government organizations to include military elements. Outside of government and military programs, no worldwide, standardized and approved executive protection certification will make you an "authorized EP specialist". Nevertheless, there are some non-government, non-military, reputable private sector schools that offer credible, complete courses for students to gain extensive training and development (ESI, ESS, ISA, BSR, Kobetz, etc.). These companies provide training in protective operations, firearms and combatives, advanced driving tactics, as well as surveillance and intelligence gathering. This article is focused on securing additional quality training on the peripheral of acknowledged protective operations training which can increase a person’s value in the protective operations world. Having been in the security arena for more than 30 years, including 24 years in the CIA, I was lucky enough to receive some 34

very specific skills training and opportunities to use these skills in the real world. As a Multi-Discipline Security Officer (MDSO) and a Counterterrorism Surveillance Team member, I know the value of additional training – that is, quality training – that can add value and, more importantly, skills and knowledge to your "Protective Operation's toolbox"! So, what are some of the skills we are advocating? Specifically, I am talking about advanced protective operations concepts and skills (Advances, Threat Analysis, All Source Intelligence Analysis) as well as physical skills such as advanced first aid, surveillance, advanced driver training, and situational awareness training. Training is useful, but actual experience using these skills should be our goal. ADVANCES Advances in support of protective operations are considered a premier skill set and clearly differentiate the "average" protective agent from the seasoned professional. The knowledge and experience necessary to complete timely and exhaustive (or at least proficient) advances is a level of expertise that all protective agents should strive for as the US Secret Service advocates, “No protective


INCREASE YOUR MARKETABILITY

No protective operations will surpass the level of competence of the Advance”. In other words, the advance makes or breaks the protection effort – crappy advance means crappy protection!

operations will surpass the level of competence of the Advance”. In other words, the advance makes or breaks the protection effort – crappy advance means crappy protection! ADVANCED FIRST AID Advanced first aid, or at least first aid directly suited to protective operations type incidents (vehicle accident, gunshot wounds, explosives and shrapnel, etc.), is readily available to anyone willing to take the time and pay the money. Excellent training in this area is easily acquired, but many do not take the time or effort to advance their skills. At a minimum, Stop the Bleed and, ideally, Tactical Combat Casualty Care (TCCC) training. Ask any security organization or protection team member if they would like an advanced First Aid/EMT/PA on their team and they will unequivocally say yes. SURVEILLANCE Surveillance and countersurveillance training and experience are underrated and critical skills for any securityrelated field, especially protective operations. In almost all cases, an aggressor will do some form of surveillance in preparation before conducting a hostile action. This 35


CIRCUIT MAGAZINE ISSUE 66 applies to active attackers, criminal elements, and direct threats to a protectee. Unfortunately, there are few competent surveillance/ countersurveillance training schools/elements in the private sector, leaving this training mainly to government, law enforcement or the military. But some training companies offer this, and this type of training is money well spent as it will certainly raise your standing above almost all other privately schooled protective agents and put you on a more level playing field with the government and military personnel in the profession. PROTECTIVE DRIVING Protective operations driving expertise is an acquired skill, not one we are born with (contrary to many people's opinion). It is an extremely important perishable skill, especially since statistics clearly show that most attacks on a principal occur in or around the vehicle. Protective operations driving is a specialized skill, and the driving duties are often relegated/delegated to anyone on the protection team rather than someone with the specialized skills.

in protective operations – one that is mostly ignored. It enhances all the other protective operations skill sets (Advances, Surveillance, Driving, etc.). Unfortunately, there are very few places where real SA training is available. It receives lipserviced 15-minute lectures during basic executive protection or security training, if it is taught at all. Professionals need a deep dive into the basic concepts, principles and skill sets required to be truly “aware of your surroundings” and to be able to use this information to enhance protective operations. The Arcuri group has three courses that specifically address knowledge and skill building for protective operations personnel: the Situation Awareness Specialist® (SAS) course, the Applied Verbal De-Escalation Course, and the Advanced Practitioner (SA-AP) course.

The Advanced Practitioner course is specifically tailored for protective operations personnel as it covers the concepts, knowledge, and skill building of the SAS course combined with some core concepts of protective operations SITUATIONAL AWARENESS – specifically, an understanding I would include Situational of assailant methodology and Awareness (SA) training as a must- the role surveillance plays in the have as it is a foundational element attack cycle. The AP course helps 36


INCREASE YOUR MARKETABILITY

protective officers use their SA skills TRAINING AND EXPERIENCE to look for, recognize, and react to A colleague of mine, Michael Trott, a former CIA Protective Operations hostile surveillance. Officer and international security professional who specialized The SAS and the AP courses are in protecting High Net Worth being taught in universities in Individuals (HNWI) in the private Canada and the US, and the SAS sector, said, "Mention training to training course is currently listed anyone, and you'll get various types as approved training in 7 US States of feedback on the frequency, for law enforcement continuing proposes and benefits of training. education credits. Many times, the additional 37


CIRCUIT MAGAZINE ISSUE 66 consequence of training is how much more it can make you marketable for other opportunities in your career. In the world of close protection, very few positions or programs will allow you to use all the tangible skill sets of this profession.

As the world and adversaries around us get more complicated, so must our knowledge, skills, and proficiency levels to keep up with it all. Therefore, challenging yourself by learning and mastering new skills is critical, and this often means getting outside of your comfort zone. When you do, it For example, suppose your position benefits you, your team, and or responsibility doesn't include your principal. It might also give firearms, protective intelligence, you a competitive edge next time surveillance or driving. In that you're competing for that new case, you should still become opportunity. " proficient in these areas and find opportunities to use them in realThere are several ways that world environments to polish those a person can enhance their new and/or often unused skill sets. protective operations-related Even if working part-time for other skills by taking additional training Executive Protection (EP) programs in protective operations subjects (and approved by your employer) and on related skill sets like or as a contractor to gain better surveillance, advanced medical/ proficiency in other skills, expand first aid, and situational awareness. your skill sets, and make you a Engaging in continuous personal more marketable EP operator. education is not easy, but the While training is important, having evidence shows this will add value a wall full of framed training and make you more marketable certificates with no real-world in the protective operations field. experience is not the goal either. But don't forget the need for realNew skills learned through training world experience, cementing your must be applied and practiced to standing and making you stand out become proficient. in the crowd. Thomas (Tom) Pecora is a former CIA Senior Security Officer who retired after 24 years of service protecting Agency personnel. Experienced in protective operations, crisis management, personnel/physical security, and counterterrorism, Tom is currently the curriculum specialist and chief trainer for Arcuri Group LLC (https://arcurigroupllc.us/index.html) as well as an Adjunct Professor for Wright State University where he provides Situation Awareness training. 38


39


CIRCUIT MAGAZINE ISSUE 66

tactical medicine

When do you let go?

The psychological struggle when your mission is saving lives when things have gone wrong!

So, this article is less of a technical topic about tactical medicine, but, for sure, it is a topic that should be discussed far more than it currently is. This is why I would like to share this with you and have you think about your own experiences and maybe start implementing this specific issue in your training and operational settings. Disclaimer: everything described below is based on my own experiences and feelings. None of it is described in the literature, or at least, none of it is proven. But, sometimes, things are not in the literature and still live very vividly in all our minds and thoughts we don’t necessarily share. 40

As an introduction to the issue, below is a story that lives very vividly in my mind, taking up space that I didn't know had so much impact on my daily activities. In September 2022, I started training as a volunteer lifeguard at my home beach. A rough beach on the shores of the North Sea that knows some of the more dangerous currents, tides, and weather conditions. The training, education, and the mandatory minimum 120 hours you have to work as a trainee during the summer season are well on their way (by the time you read this, hopefully, the exams


TACTICAL MEDICINE By Krisztian Zerkowitz

have passed, and I am a certified lifeguard).

tube behind me, the head of the drowning victim was visible every time a wave picked me up and “8711 for 8812, multiple disappeared as a new wave built swimmers in trouble South in front of me. The swimmer was of breaker 32, priority one further than initially thought, assistance required, over!” and the chest crawl went into "8712 for 8811, responding, three an urgent breaststroke. The lifeguards in the water, standby extended swim and buildup of for update, over!" exhaustion gave me plenty of time to review the medical issues Swimming through a very rough that would need to be solved current, dragging the rescue as we exited the surf once I 41


CIRCUIT MAGAZINE ISSUE 66 reached the swimmer. Maybe an unconscious patient, an injury, or water in the lungs? What would be the first thing to do once on land? Would my fellow lifeguards see if the swimmer was unconscious and have the AED and ambulance on standby?

holding on to the patient, but as the wave starts its role, I feel she is being pulled away from me, rolling over me and pulling my arm along my buddy beside my head in an upward/backward motion until it reaches the point where I can hold on no longer. At this point, I have no idea what Arriving at the swimmer, she was state my patient is in. We are conscious, exhausted and had underwater, just had a wall of a dislocated shoulder. Okay, the water crush us both, and now, swim will be different, and the I am on the verge of letting go, rescue tube won't work the same in the washing machine motion way. There is a lot to consider of this rough sea, where I am with such a patient. But doable. not sure where the patient will end up. I hold on for dear life, Starting the swim back once the not ready to let go, but nature patient is calmed and somewhat laughs, pulls a little harder, and on the rescue tube. And there makes the decision for me. comes the surf; swimming through it sucks as waves of Just before I let go, I am 2 to 3 meters pounded down reminded by a sharp tug on on us, and right now, I am just the rescue tube's rope that the considering keeping the patient's patient is attached to me, so I let airway free of the salty water go and try to find a place with smashing down. oxygen in this whirlwind of water, foam and sand called the North We both look up as a wall of Sea. water builds up and is about to crash down hard on top of So, let’s get back to tactical us both. I scream at my patient medicine and how this story to close her mouth and take a might help when working in the deep breath; I do the same, and Executive Protection (EP) world we take the wave full on, being as a medic. When do you let go? pushed/pulled to the bottom, And how do you mitigate having hitting it hard, and my lungs to let go? expelling all the air I had tanked before the wave landed. I am still First of all, as a medic in the EP 42


TACTICAL MEDICINE industry, you will be called upon many, many times, mainly for Paracetamol and blister care. The day someone calls upon the skills you trained for so hard (all the pre-hospital trauma or Advanced Life Support skills), something has gone terribly wrong, and you, the medic, become the last line of defense. Let’s put this into perspective for a moment. When we say last line of defense, we don't mean the last pew-pew that will fend off the bad guys, but the last line of defense between the positive outcome of the mission and total failure. Total failure because some believe that the mission has failed when things

go bad at this point. Yes, maybe your mission as protectors is to AVOID such incidents at all costs. But this is a great discussion in itself: when is a mission truly lost? Now, back to the topic. As the team medic, you are suddenly called upon to perform the function of your role, and there you go; all eyes are on you, and the mission is in your hands. Nature and everything else involved in maintaining life is against you, and there you are, working on that patient, trying to make sure that the ABCs are within the parameters that your

43


CIRCUIT MAGAZINE ISSUE 66 guidelines dictate. Much like swimming in the North Sea, the parameters are NOT to let go, so you keep holding on, fighting forces that are much more powerful than the guides, training or even your will to survive. Sometimes, however, things are NOT in your favor, and you might have to let go. You might have to abandon and say, 'I can't do anymore!' A lack of equipment or skills, or simply because the situation dictated that the patient would die. Not all patients can be saved - a universal truth. However, this comes with two side notes that you must consider before being caught in the water, under the wave, and struggling for air. There's also a third element that comes into play, which I'll cover, just for good measure! ELEMENT 1: Sometimes you will be faced with a situation that you know you can solve but you don’t have access to the basic equipment you would require to do so. You don’t have the equipment because you didn’t plan correctly, because you didn’t plan on where the equipment should be, or for this one time, you decided you won’t need the equipment, 44

You don’t have the equipment because you didn’t plan correctly, because you didn’t plan on where the equipment should be, or for this one time, you decided you won’t need the equipment, because “it’s going to be ok for this one time..


TACTICAL MEDICINE because “it’s going to be ok for this one time...” Statistically, every time something went well, the ”something will go wrong” comes one step closer. This is why, if you are a medic, plan for the worst at all times and make sure, no matter what the situation, clothing you are forced to where or protocol you have to deal with, you have your equipment.

didn't plan correctly, because you didn't plan on where the equipment should be, or for this one time, you decided you wouldn't need the equipment because "it's going to be okay for this one time..." Statistically, every time something went well, the ”something will go wrong" comes one step closer. This is why if you are a medic, plan for the worst at all times and make There will never be a valid excuse sure you have your equipment, for you not having your gear no matter what situation you're that you need. As a medic, you facing, clothing you are forced have so much time off, or call to wear or protocol you have to it “dead” time, that you can test deal with. There will never be a equipment availability, how to valid excuse for not having the deal with resources, where to gear you need. As a medic, you keep these resources etc. that have so much time off, or call it you can truly be prepped. Push "dead" time, that you can test your gear to the limits and have equipment availability, how to your colleagues help you to push deal with resources, where to you and your set up into the keep them, etc., that you can worst possible places and see truly be prepped. Push your if it still all works. You will never gear to the limits and have your achieve 100% success, for sure. colleagues help you to push you That’s fine, but each percentage and your set-up into the worst you do put on your side, you are possible places and see if it still coming closer to the point where all works. You will never achieve you don’t need to let go. 100% success, for sure. That's fine, but with each percentage ELEMENT 2: you put on your side, you are Sometimes, you will be faced coming closer to the point where with a situation you know you you don't need to let go. can solve, but you don't have access to the basic equipment By the way, the 5 H’s and T’s are: you would require. You don't Hypoxia, Hypovolemia, Hydrogen have the equipment because you ions (acidosis), Hyper/Hypo45


CIRCUIT MAGAZINE ISSUE 66 kalemia, Hypothermia; Tension pneumothorax, Tamponadecardiac, Toxins, Thrombosiscoronary (MI), Thrombosispulmonary (PE) ELEMENT 3: Last but not least, you might have to let go. You might have to choose to fight your battles another day. Emotionally, this is not going to be easy, and you need to ensure that someone can help you. Someone who

understands what this means when you're forced to let go. Preparing to let go is not making letting go an option; it is about learning to accept that you have done everything in your power to eliminate that as an option, but the forces you are fighting are always stronger than you. Remember this: “You will win plenty of battles, but you will never win the war!”

Krisztian was raised as a Diplomatic Close Protection Officer, working mainly for diplomatic missions, including assignments to the Middle East and Africa. Recently certified as a Tactical Paramedic, Krisztian spent the last 10 years of his protective career specialising in tactical medicine in high-risk environments and close protection. Two passions combined where enough remains to learn and experience. 46


THE THEORY OF COVERT SURVEILLANCE • • • • • • • • •

Surveillance Operators Bodyguards Surveillance Instructors Professional Investigators Enforcement Officers Intelligence Officers Police & Military Security Consultants INVESTIGATIVE JOURNALISTS

Zap It...

E V I CT

Surveillance Training Course Handbook A R TE

The

IN

By Peter Jenkins ISS TRAINING LTD

www.Surveillance-theory.co.uk

47


CIRCUIT MAGAZINE ISSUE 66 By Kevin Ghee

The Complexities of the Solo Operator:

Navigating the Challenges of Executive Protection What do executives, celebrities, and dignitaries all have in common? In this ever-changing world, the need for security would be the answer. They are all exposed to various risks, from physical threats to reputational damage. Many see Executive Protection (EP) as they see the Secret Service working as a team. While this is true for dignitaries, some executives, and even some celebrities, there are times when the solo operator is the formation. This is sometimes, 48

jokingly, called the "witness formation", as you will be very limited in your response to an all-out assault on principle (AOP). That's unless your name is John Creasy or Jack Reacher. I’ve seen some make working as a solo operator as simple as where you walk when with the


THE COMPLEXITIES OF THE SOLO OPERATOR

49


CIRCUIT MAGAZINE ISSUE 66 client. Some may try to convince you that taking the latest gun course or jujitsu class will prepare you for the moment you work as a solo operator. While these things come in handy, they don't give you the scope of work that the solo operator has upon them. I aim to give you a comprehensive understanding of the complexities involved in solo operation within

As a solo operator, the responsibilities increase Executive Protection. exponentially Executive Protection is the level of specialized security service that and you must involves safeguarding individuals whose wealth, prominence, or take on multiple influence elevates their levels of risk. EP professionals employ roles that are various strategies and tactics to ensure their clients' personal safety usually covered and security. Threat assessment, risk management, intelligence when working as gathering, physical security measures, and close protection a team. are all included in what an EP professional provides.

Creating environments where clients can carry out their daily activities without disruption is the primary goal of EP. Agents are trained in various disciplines, including defensive driving, tactical firearms handling, crisis management, and first aid 50


THE COMPLEXITIES OF THE SOLO OPERATOR to mitigate and respond to emergencies effectively. Teams are usually associated with EP, but there are times when being a solo operator is necessary. This can be due to budget cuts, logistical limitations, or the nature of the assignment. A solo operator must possess a diverse set of skills, including acute situational awareness, adaptability, and being able to pivot swiftly if needed.

1. Mentally and emotionally resilient. You will often find yourself in high-pressure, high-stress environments without support. This pressure requires mental and emotional fortitude to maintain focus and to make sound decisions amid challenging situations.

2. Adaptable and Versatile. Things change quickly in the real world, and this requires the EP agent to be able to As a solo operator, the adapt to the changes quickly. responsibilities increase As a solo operator, the exponentially, and you must take needs and demands fall on on multiple roles that are usually to you, so you must be able covered when working as a team. to seamlessly switch from Developing the security plans, driver to personal assistant threat assessments, medical to security professional and emergencies, route planning, and maybe even medic for a the protective advance are all successful operation. done by you single-handedly. For this, you must be dialed in on all 3. Accountable. Being a solo aspects. operator, you assume all responsibility for the EP teams provide the safety and safety of the client. Errors luxury of shared responsibility. are unacceptable, as the In contrast, a solo operator must consequences of any missteps have a specialized mindset and can cost the client severely. skill set to deal with the unique The only time you will pass the challenges of being solo. A solo buck is literally when you are operator must be: paying for something. 51


CIRCUIT MAGAZINE ISSUE 66

4. Decision Maker. As the solo operator, you are responsible for conducting a comprehensive risk assessment, which includes the protective advance. Based on all of your intelligence gathering, you must be able to make crucial decisions. Analyzing threats, evaluating potential vulnerabilities, and devising an effective security plan is crucial in mitigating risk. 52

5. Effective Communicator. You are required to maintain effective communications with the internal and external stakeholders. This includes local law enforcement and venue security. For shows and movies, you'll need to communicate with the producers. One thing I cannot express enough is when you are doing or at a televised show, connect with the producers to get a "run


THE COMPLEXITIES OF THE SOLO OPERATOR of show". The "run of show" is a detailed to the second sequence of the show. By having this, you can assure that your client is aware of the times they can move without causing a distraction or understanding when they have to move if they are a part of the show itself. 6. Another key thing to do when taking your client to a concert is to get a list of the songs. In some cases where the client will not stick around to greet the artist after the show, you will know which songs are ending the show. That will allow you to suggest a good time to exit to your client, mitigating the risk of exiting with the crowd. 7. Self-Care and Stress Self-Care and Stress Management. The demanding nature of being a solo operator can and will take a toll on your physical and mental well-being.

Self-care is vital and must be prioritized. You can find tips in my article From Burnout to Success: Tips for Sustaining Your Edge in the Security Field. Being a solo operator can be a very rewarding position to hold. The advantage is the increase in responsibilities (a disadvantage for some), as it will build your skill set in all aspects of EP that a team-based approach may not unless, within that team, you can rotate in your role and responsibility. Also, the direct relationship you will develop with the client, understanding their needs and preferences while building trust, will ultimately help you design a personalized protection plan. The challenges of limited resources, increased workload, and the need for specialized expertise are crucial to understanding you, the EP agent, your client, and the client's team or organization to address the security needs..

Kevin Ghee, a former member of law enforcement, is a senior executive protection agent who specializes in providing services to a number of very recognizable public figures in the corporate, sports, and entertainment sectors. 53


CIRCUIT MAGAZINE ISSUE 66 By Donald Sadler

Secured Transportation:

It’s not about the possession of a firearm Recently, I have received a lot of inquiries from associates concerning the new craze of advertising armed security drivers. The need to advertise these services is likely rooted in fear created by the mainstream news media, and now, some are using it to sell the product of secured ground transportation. The media pushing these fears boosts their ratings, but this can also cloud the judgement of those in the actual secure transportation business and affect the quality of the product being delivered. When society is flooded with reports and images which target the population's emotions, those who aren’t 54

careful can react inappropriately. I believe this is how some in the secured transportation industry are responding. If you’re constantly inundated with negative news stories, you will naturally begin to see only the undesirable aspects, which can block sensible thinking. Those of us working in this marketplace sector usually pride ourselves on being protectors, so naturally, our companies want to respond with solutions. We want to be pioneers that provide


SECURED TRANSPORTATION

the best innovative solution. Social media platforms or an online presence are considered advertising giants these days and are tools many use to retrieve information to get their desired truth. Marketing online is easier and more cost-effective to get our message out. Still, considerable risks exist, such as too much exposure or releasing bad information to a larger audience. This has the potential to bring more scrutiny to the industry as well as give up “need to know” information to potential

threats and the bad guys lurking. Of course, known dangers impact the secured transportation business and the client. However, we don't believe announcing security protocols makes clients any safer. We believe in assessing every situation on a case-by-case basis, and every assignment should be evaluated with extreme care. If we view every client situation the same, we can end up overstaffing and/ or overcharging. Selling services that aren’t properly accessed 55


CIRCUIT MAGAZINE ISSUE 66 is a disservice to our clients. In addition, an over-saturation of business for a company is dangerous as it may hurt their level of performance. For example, if they aren’t ready for the heavy influx of requests, it could backfire as we never want to bite off more than we can chew, therefore losing focus on doing our best work.

Reliance on a firearm as your first safety measure in a Secured transportation is a comprehensive approach to half-ton vehicle is protecting any valuable asset during transport. In this business, a setup for failure it’s placing security intelligence behind the wheel. Contrary to and advertising what many might believe, the number one piece of equipment for secured ground transportation being armed is not a firearm. I believe that possessing information and good makes you an knowledge of each client and easier target. the present situation in the area of operations is foremost in my experience. The more you know, the smoother your movements can be, which leads to the best possible outcome.

Firearms aren’t even mentioned in our selling of service. If the first thing a chauffeur wants to discuss is firearms, then it's likely they've never been trained in secured ground transportation and do not understand the true expectations of a security chauffeur. 56


SECURED TRANSPORTATION When hiring, a trained chauffeur will always be the first choice over the vehicle. With my confidence in training, I trust they will perform even when not driving the latest or greatest equipment. The training and experience of a chauffeur are far more valuable if circumstances put them in a less-than-desirable vehicle or situation. That being said, as a provider, we strive to offer well-maintained, late-model vehicles for all our clients.

untrained chauffeurs could make the same mistake, namely that there was unwarranted fear when no threat existed.

Recently, I read an article about a young lady visiting El Paso, Texas, who, while in an UBER, saw signs for Juárez Mexico and thought she was being kidnapped. This unwarranted fear arose while sitting in the rear passenger seat of her hired vehicle. Her perception, without investigation or follow-up, led to her shooting and killing the UBER driver. Reasonable thinking would have told her to cross into Mexico via car from El Paso, Texas; they would have to go through a secure border checkpoint. I believe the fear instilled in her from news stories, or likely friends and family, caused her to react unreasonably, causing the death of an innocent driver. Relying solely on a gun for problem-solving resulted in disaster. Unfortunately,

As a company, we are often asked if we provide armed services. My answer is always the same: safety, comfort, and privacy are always our priorities with every client. Each client’s needs differ, and we tailor our services to meet those individual needs.

Reliance on a firearm as your first safety measure in a half-ton vehicle is a setup for failure, and advertising being armed makes you an easier target. It’s like the open-carry guys who get their guns snatched while standing next to a concealed-carry guy who was never targeted.

We feel a secured transportation company that begins a pitch or sale of service that speaks of armed chauffeurs as its principal offering has missed the mark. When advertising armed services as the basis for your business, one should consider such things as 1) the client who doesn’t want firearms around because of children, 2) the chauffeur traveling multi-state where there’s no reciprocity 3) entering specific venues where firearms 57


CIRCUIT MAGAZINE ISSUE 66

aren’t allowed 4) understanding that armed protection is illegal in many areas without a licensed and insured security company as the provider of these services.

and training of the chauffeur, knowledge of routes traveled, the present social situation of areas being traveled, the condition of the vehicle, and constant situational awareness are vital and must be considered.

The safety of the client must be addressed from multiple aspects. Please note I am not opposed The level of knowledge of each client’s personal needs, the skills to gun ownership or using them 58


SECURED TRANSPORTATION What to look for in a trained security chauffeur 1. A certification from a respected security driving course. (Re-certification at least every two years). 2. Trauma and wound care with onboard equipment. (Recertification at least every two years). 3. Knowledge of areas of operation, routes, and route planning. Knowledge of the best ingress and egress. 4. Great attention to situational awareness. While going to, when the client is onboard, standby waiting, at drops, and assessment upon departure from the drop. 5. Knowledge of Trauma 1 and other emergency facilities in the area of operation.

in service. I firmly believe that using them as a selling point is not the smartest approach to 6. Knowledge of planned and this service niche. As I evaluate ongoing activities in areas the protection industry and of travel that may affect the now secured transportation, I principal movement. (ex. find gun worship problematic. “I protest and road closures) don’t work without my gun" is a statement that has been shouted 7. The ability to multi-task and more than I care to remember. communicate with, the client, 59


CIRCUIT MAGAZINE ISSUE 66 a bodyguard (while in the front right seat), a personal assistant, a dispatcher from our home base as well as a broker’s dispatcher, and potentially family members of the client. Some, a few, or sometimes all of the above on the same assignment. With these practices, the chances of needing to make a firearm your selling point for business are slim to none. Being prepared to move and spending less time at any given stop makes the likelihood of interruptions from an adversary less desirable or impossible. Keeping an itinerary private, on a need-to-know basis, is the sweet spot of movements. Sometimes, you won’t get the itinerary until arrival at

pick-up or as point-to-point instructions. On rare occasions, I’ve had to directly speak with a client and change their plans. When this happened, I communicated the need to do so clearly, calmly, and without causing fear. None of those times was because of a physical threat directed at the client, but simply because of things like incoming storms, traffic that was not visible at the point of informing the client of a route change, and at a time when we had protests on what seemed to be a daily occurrence. The goal is to ensure our clients' safe and secure movement while minimizing the risk of harm to them or a delay to their itinerary. Someone once said, “It’s better to prevent a problem rather than having to solve a problem.”

Donald Sadler is the CEO of Dauntless Transportation Group (DTG). After 30 years of professional driving experience in New York City, in 2018 he started DTG to serve the Dallas-Fort Worth area. His knowledge base includes training in evasive/protective driving, pre-advance route planning, trauma care, and Celebrity/Executive personal protection. As a secured transportation chauffeur, he has provided services in entertainment and touring, as well as servicing international business personnel, high net-worth families, business executives, entertainers and more. www.dauntlessgrouptx.com 60


Connect your team with G6PTT. Radio without boundaries. G6 Push to Talk brings you the best from the communications world; the power of network radio using 3G, 4G, LTE & WiFi to give unparalleled global coverage. This system is the result of our successful collaboration with TASSTA; leading edge design and engineering for a changing world. Adaptable, scalable and flexible to fit any operational environment.

The functionality of two-way radio but with no coverage restrictions, and with advanced features that will transform the way you operate. Get in touch to see what we can do for you.

Communication connects everything that we do. G6 Global exists to create the best communications system for your operational needs.

www.g6-global.com +44 (0)1454 610050

61


CIRCUIT MAGAZINE ISSUE 66

By RANE Worldview

Chinese Chatbots and the Rise of AI Risks In the global race to develop artificial intelligence (AI) chatbots, Chinese censorship may hamper its competitiveness and pose compliance, reputational and other cyber risks for multinational organizations that use Chinese chatbots abroad, especially if they operate in China. In November 2022, U.S. firm 62

OpenAI's release of ChatGPT kicked off a global race to develop similar AI chatbots, heightening technological competition between the United States and China in particular. Following ChatGPT's introduction into the market, several Chinese companies raced to release their own models, such as internet company Baidu, whose Ernie Bot was unveiled in March, though it is only available to those who


CHINESE CHATBOTS AND THE RISE OF AI RISKS apply for and receive an access code and is still awaiting official governmental approval. Homegrown Chinese chatbots will be primarily trained on information scraped from the heavily censored Chinese internet space, which will constrain their outputs compared to their Western-developed counterparts. ChatGPT and other chatbots from Western firms are trained on huge datasets of information scraped from the internet. While this presents its own challenges, such as potentially incorporating biased or extremist content, overall, far more data can be acquired and processed. By contrast, China's "great firewall" prevents information the government does not approve of being publicly accessible within its borders. The Chinese Communist Party (CCP) is careful to maintain a tight grip on the information space, which unpredictable AI chatbots can threaten. To hedge against the risk that the bots will output information that does not align with CCP interests, the Cyberspace Administration of China (CAC) announced rules in April governing the development

of chatbots in the country. While the agency hopes to support AI innovation, it requires that generative AI content be in line with China's "core socialist values." Companies must heed the CCP's censorship rules by avoiding information that undermines "state power" or national unity. Providers will be responsible for the legitimacy of the information used to train generative AI products. Users will also be required to submit real identities and other related information, creating implications for the CCP regarding its ability to tie information entered into the bots back to specific identities. Additionally, the human finetuning stage of chatbot training will play a critical role in how the CCP governs censorship of this technology to ensure that the outputs align with CCP values. This often tedious process allows humans to correct bot outputs, usually with the intention of minimizing bias, and to incorporate additional (or specific, in this case) examples that a bot could produce for an answer to a particular prompt, especially if there is limited data on the subject available in the training dataset. 63


CIRCUIT MAGAZINE ISSUE 66 Chinese companies may also be constrained in their ability to produce effective chatbots due to export restrictions on advanced semiconductor technology needed to power such AI systems but will undertake measures to circumvent restrictions. In October 2022, the U.S. government announced restrictions to cut off Chinese access to advanced semiconductor technology in an effort to thwart its AI and military progress; since then, a handful of allies — including the Netherlands and Japan, which, with the United States, have a near monopoly on the highly advanced chipmaking gear market — have followed suit. China's Baidu is confident that it has access to adequate GPUs to power its chatbot models. Huawei, a Chinese technology company previously banned in several Western countries from supplying 5G network equipment, asserts that China's chip industry will strengthen over time. However, questions remain as to whether Chinese AI will be able to stay competitive as China's chip industry relies 64

on foreign technology, and domestic firms are highly unlikely to be able to compensate for all the aspects included in the production process. For instance, in March, Huawei and other Chinese companies announced that they had created electronic chip design tools for semiconductors sized at 14 nanometers and above. Nevertheless, these are quite large compared to the much smaller, more powerful and more efficient chips needed to support more advanced technology such as AI. Furthermore, the development of a self-reliant chip-making industry will take a long time to develop and will face significant technological challenges, potentially leaving China behind in its AI development. In contrast, the West will further advance using its access to relevant semiconductor technology. A Potential Chinese Advantage in Weaker Data Protections While Western-developed chatbots will have an advantage in being trained on a wider amount of information that governments do not censor, they may be constrained by


CHINESE CHATBOTS AND THE RISE OF AI RISKS

Chinese authorities at all levels of society are known to collect (and share among themselves and state-owned firms) a vast amount of data from citizens.

data privacy requirements. Western chatbots are grappling with how to best adapt to their governments' privacy regulations, notably the European Union's General Data Protection Regulation (GDPR), which over time, could harm advancement to such an extent that China may be able to gain a strategic advantage. OpenAI has already expressed concerns that it may not even be able to operate ChatGPT in Europe because strict GDPR standards contradict the principle of large language models, which require large swaths of (often personal or proprietary) data to function properly. Though Chinese authorities have also raised concerns about the risks of AI, they are mainly concerned with the risks to political stability and international security rather than data privacy. In fact, Chinese authorities at all levels of society are known to collect (and share among themselves and state-owned firms) a vast amount of data from citizens. This volume of data has already helped China make progress in a variety of AI technologies and, 65


CIRCUIT MAGAZINE ISSUE 66 over time, could give Chinese firms an advantage over Western competitors, which may face greater limits on their ability to pull data from their citizens. It should be noted that Chinese private tech companies could potentially be reprimanded for violating China's Personal Information Protection Law as the government seeks to control the abuse of data by big-tech firms. However, the government still has a vested interest in accessing as much data as possible, looking to mobilize large datasets as an economic catalyst for China's data economy. This is especially true because China sees AI as a key technology necessary for national economic growth and global tech leadership. If Chinese chatbots are able to overcome these challenges and be effectively used outside of the country, organizations that use them will face various data privacy and cyber security risks. If Chinese companies are able to obtain enough resources, including advanced semiconductor technology, to develop multiple versions 66

of chatbots, such as one for domestic use and another for external use, the bots may be more effective. They might include language offerings other than Chinese and have access to additional data for training that does not exist within China's domestic internet space. In this scenario, Chinese chatbots would not be subject to the same stringent privacy rules as their Western counterparts, allowing them to develop more advanced models more rapidly. However, organizations that use these bots will face data privacy risks, as any data entered into the model can be used to train future models. This is true for many existing Western AI chatbots too, but there are additional layers of concern for Chinesedeveloped chatbots as current CAC regulations require users to submit identification information before using the tools. Because the Chinese government is so data-driven, it would likely require similar requirements that maximize user data collection. There are also risks that Chinese authorities would be able to access data entered into Chinese-owned bots, fueling espionage and national security


CHINESE CHATBOTS AND THE RISE OF AI RISKS

concerns likely much larger than those expressed in the ongoing controversies of the Chinese short-form video app TikTok. The use of Chinese chatbots would also raise questions about whether the tools have extended permissions onto a user's device. While OpenAI and other Western AI firms have faced similar criticisms, there is a distinction between the third parties that OpenAI may be sharing information with for marketing and advertising purposes and the more sensitive user data that could potentially be shared with the Chinese government.

For multinational organizations with locations in China, there are reputational, compliance, surveillance and other risks in incorporating AI chatbots into business operations inside the country. Many organizations in numerous sectors have begun incorporating AI chatbot services into daily tasks and services, relying on their efficiency to carry out business operations. If these organizations have locations in China (or staff are required to frequently travel to China for business purposes), they 67


CIRCUIT MAGAZINE ISSUE 66 may be unable to use their preferred AI chatbot service, as foreign chatbots such as ChatGPT are often banned. Unless they forgo their use, organizations would have to turn to Chinese offerings, which may not be as effective for work in other languages or in producing the right types of content. This poses financial and reputational risks to organizations if a mistake were to be made that impacts the quality of its services or reflects poorly on it. Output from these chatbots may also be biased, inaccurate or contain political undertones that advance CCP interests.

risks than those associated with the potential development of Chinese firms' internationally focused chatbots.

Any information that is included in a prompt as well as user information will be logged and could be used to train future models, potentially revealing business information to other users, including Chinese business rivals who may have connections to the CCP. These chatbots may also be used as an avenue for surveillance, as this information will also be accessible by the government and definitively tied back to identity, portending risks for corporate espionage as China Organizations that use these seeks to gain an advantage in outputs could open themselves numerous sectors in the midst up to reputational damage. of economic competition with There may also be compliance the West. issues for organizations that could prevent them from using Summary: these chatbots in the first place, Chinese chatbots are rapidly which poses operational risks emerging in the global race if they rely on AI for daily work for AI dominance, posing and are unable to provide the both opportunities and risks. same services. Furthermore, While Chinese companies are multinational organizations striving to develop their own operating in China will likely chatbot models, they face face even greater data privacy limitations due to censorship 68


CHINESE CHATBOTS AND THE RISE OF AI RISKS

The Chinese Communist Party (CCP) imposes strict rules to ensure that chatbot content aligns with its interests and "core socialist values." and restricted access to information. The Chinese Communist Party (CCP) imposes strict rules to ensure that chatbot content aligns with its interests and "core socialist values." This control over information constrains the outputs of Chinese chatbots, especially when compared to their Western counterparts trained on vast datasets scraped from the internet.

semiconductor technology, crucial for powering AI systems, also pose challenges for Chinese companies. The US and its allies have implemented restrictions, potentially hindering China's AI development and leaving them dependent on foreign technology. While Chinese companies express confidence in their access to necessary resources, the development of a selfreliant chip-making industry will take time and face significant technological hurdles. The West, with its access to relevant semiconductor technology, may continue to advance at a faster pace.

Furthermore, Chinese chatbots heavily rely on Chinese language data, limiting their utility beyond China's borders. Compliance with censorship rules and the requirement for users to provide real identities raise concerns about privacy and freedom of expression. Export restrictions on advanced Go to: Stratfor Worldview >

69


CIRCUIT MAGAZINE ISSUE 66

Global Situation Report ANALYSIS

Each issue our global geopolitical partner, Stratfor, provides an indepth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.

Niger Tinubu Suggests Nine-Month Transition Period to Civilian Rule What Happened: Nigerian President Bola Tinubu, the current head of the Economic Community of West African States (ECOWAS), suggested that Niger's military junta should propose a nine-month transition from military to civilian rule, similar to his own country's transitional period in the late 1990s. Why It Matters: Tinubu may be trying to forestall an ECOWAS military intervention in Niger by suggesting an acceptable transition timeline. Niger's junta leaders may accept the nine-month suggestion as a starting point, as they also want to avoid an ECOWAS intervention. However, the junta would likely attempt to extend the transitional period upon its expiration.

70


GLOBAL SITUATION REPORT Ukraine Defense Minister Likely to Be Replaced What Happened: Ukrainian Defense Minister Oleksii Reznikov will be dismissed in the near future, possibly as soon as the week of Sept. 4. Ukraine's parliament has not decided on a replacement, but Rustem Umerov, the head of Ukraine State Property Fund, is the most likely candidate. Why It Matters: Kyiv is primarily firing Reznikov over a corruption scandal in January, but the government is also using the dismissal to satisfy widespread demands for accountability regarding the slow pace of Ukraine's counteroffensive. Sources suggest that the biggest reasons Reznikov remained in office for so long were the lack of a good replacement and Kyiv's desire for continuity with key Western partners at a crucial time.

71


CIRCUIT MAGAZINE ISSUE 66 Armenia - Azerbaijan Nagorno-Karabakh Leaders Resign as Blockade Continues North Korea North Korea's potential provision of weapons to Russia's war effort in Ukraine could bolster Moscow's longterm arms procurement and provide Pyongyang with key imports and a chance to balance ties with Russia against China. Libya A botched push for improved Libya-Israeli relations will chill their covert ties while potentially fueling instability in Libya as opposition groups use the scandal to undermine the Tripoli-based government. Gabon The fallout from Gabon's coup will likely be relatively limited as the military will probably sustain oil and gas exports, even as the pledged transition period will not necessarily lead to democratic processes and risks incentivizing more coups across central Africa. Ecuador General elections in Ecuador may lead to the emergence of an antiestablishment or extremist presidential candidate, while a simultaneous referendum threatens the country's oil output.

72

What Happened: The president and state minister of the Armenian-populated, selfproclaimed Nagorno-Karabakh Republic, which Azerbaijan completely surrounds and claims as its own, announced their resignations. Why It Matters: The resignations underscore the difficult and dangerous position in which Armenia and the self-proclaimed republic find themselves in the face of Azerbaijan's continued blockade and military power. The president's statement may indicate that Armenia and the Nagorno-Karabakh authorities may make concessions to Azerbaijan to avoid continued small-scale military actions. The longer the conflict over Nagorno-Karabakh persists, the higher the chance of ethnic cleansing or even genocide in the region will grow. Thailand Thaksin Prepares Royal Pardon Application What Happened: Former Thai Prime Minister Thaksin Shinawatra of the Pheu Thai Party (PTP) is preparing to seek a royal pardon for convictions of corruption and abuse of power. Why It Matters: Thaksin will likely receive


GLOBAL SITUATION REPORT the pardon, as Thailand's military-backed parties probably guaranteed it to the PTP as part of government formation negotiations. In this way, the forthcoming pardon speaks to the significant power military-backed parties retain, even though they were forced to form a coalition government with the PTP following Thailand's May 14 general election. Ukraine - Russia Kyiv Hits Pskov Airfield in Largest-Ever Mass Drone Attack on Russia What Happened: Ukraine conducted its most massive series of air attacks on objects inside Russia since Moscow's 2022 invasion of Ukraine, striking over half a dozen Russian regions. Why It Matters: The strikes across Russia are intended to increase Moscow's military and political costs in continuing the war. However, similar strikes on a broad range of military and industrial targets would likely have to become a regular occurrence to have the desired effect and decisively tilt the trajectory of the war in Kyiv's favor. U.K. - China British China Hawks Issue Controversial Report What Happened: The British Parliament's Foreign Affairs Committee issued a report referring to Taiwan as an "independent

Argentina Far-right libertarian candidate Javier Milei's surprisingly strong performance in the presidential primary will increase financial volatility in the coming weeks, deterring investment while raising the risk of a panic-induced bank run. Malaysia State elections could trigger another political crisis if members of the country's fragile federal government perform poorly, opening the door to political instability that could negatively impact the economy. Ecuador The assassination of a presidential candidate signals increasingly brazen political violence that could see more voters support tough-oncrime politicians in the Aug. 20 election. Cyprus EU-Turkey rapprochement is unlikely to result in Cyprus' reunification, but increased dialogue over the future of the island could improve the political climate, leading to mutually beneficial economic opportunities.

73


CIRCUIT MAGAZINE ISSUE 66 country" and calling on the government to guarantee a more direct response to the military threat China poses to the island. Why It Matters: The report highlights persisting divisions between the government and China hawks in the United Kingdom's ruling Conservative Party, but it will have little to no effect on London's China policies. Therefore, the government will continue to "de-risk" bilateral relations with Beijing (much like other European countries) while maintaining mutually beneficial trade and economic ties. Saudi Arabia - Palestinian Territories: PA Remains Unconvinced of Saudi-Israeli Normalization What Happened: Saudi Crown Prince Mohammed bin Salman offered to renew financial aid to the Palestinian Authority (PA) in April if the PA reined

74


GLOBAL SITUATION REPORT in terror groups in the West Bank, while Saudi officials added that the government hoped the offer would improve PA sentiment toward eventual Saudi-Israeli normalization. Why It Matters: Since Saudi Arabia has not resumed aid deliveries to the PA in the months following this offer, it seems that the PA is both unable to meet Saudi demands regarding West Bank militancy and unwilling to approve Israeli-Saudi normalization. The latter constraint will likely remain in place until Israel agrees to restart peace negotiations with the Palestinians, which is unlikely under the current far-right Israeli government. Poland - Lithuania - Latvia - Belarus Poland and Baltics Threaten to Shut Belarusian Border What Happened: Poland, Lithuania and Latvia said they will close their borders with Belarus completely if a "critical incident" involving Russian Wagner mercenaries or Belarusian troops occurs. Why It Matters: The statement comes in response to rising tensions at Belarus' three borders with the European Union due to concerns regarding the presence of Russian Wagner mercenaries in the country and a rising number of migrant border crossings. Should either of these issues escalate, Poland, Lithuania and Latvia could completely shut their border crossings with Belarus, marking an escalation in tensions on NATO's eastern flank and causing transport and economic disruptions. As Wagner troops are likely to remain in Belarus over the next weeks or even months to implicitly threaten NATO, the risk of a confrontation between troops on Belarus' borders will remain significant in the foreseeable future.

75


CIRCUIT MAGAZINE ISSUE 66 By Orlando Wilson

IMMEDIATE ACTION The Key to Staying

Alive in Close Combat

When I ask my students what is the most important thing they must do in a hostile incident, most reply that they should simply shoot the bad guys and so on. The answer I am looking for is not to get shot. It's okay to be able to shoot a silhouette target on a comfortable range, but it's another thing shooting a moving person who is doing their best to shoot and kill you. 76

You should, first of all, work out a plan of action that you will take in the case of a hostile incident. It is amazing how many supposed professionals have never thought about their immediate reaction to an incident apart from drawing their


TACTICAL FIREARMS

Remember, all situations are different, so adapt the below lists to your specific requirements and keep things as simple as possible. Procedures lists with 100 points are worse than a blank piece of paper.

pistol and shooting. For example, the below "Reaction to Fire" is an adaption of the old British Army immediate reaction drill, which, many years ago, when I was in the British Army, was drilled into us constantly. Read it, think about it and adapt it to your requirements. It would help if you broke things down into logical phases from a training and operational perspective. Consider the step-bystep phases of what you need to be aware of and how to deal with a hostile incident. In this article, I have given some examples of what needs to be considered. Remember, all situations are different, so adapt the below lists to your specific requirements and keep things as simple as possible. Procedures lists with 100 points are worse than having a blank piece of paper. Other things that need to be considered are means of communication, safe areas, when to fight, and when to flee. Planning is what sorts the professionals from the amateurs. If you plan how to deal with a hostile or emergency situation, and if it happens, you'll know how to react to it and not panic. The Basics of Being Street Wise Understanding the streets is 77


CIRCUIT MAGAZINE ISSUE 66 essential; without such basics, you're just a victim waiting to happen. Whether you're armed or not means nothing; you're just a land waiting to be slaughtered. • Threat Assessment: Complete a risk assessment on yourself, your business and the locations you are visiting or areas you are living in.

starts talking to you. • Know Where You Are: Know your exact location at all times and routes to safe locations; do not get lost!

• Always Have An Exit Plan: Make sure you know how and have the means to get out of your location to a safe area. Know how to get out of the hotel and have the • Have A Plan: Have a plan in place means to get out of the city or the to deal with all possible problems country and how to get to a safe or hostilities location. • Think Like A Criminal: Put yourself in the criminal’s shoes and think how you would rob or kidnap yourself, how would you break into your home or hotel room.

Reaction to Fire IIf you are involved in a hostile incident, how will you react? Break things down into logical steps, think about what's required and adapt your training to the drills and skill sets required.

• Keep A Low Profile: Do not draw attention to yourself, consider • Preparation: Your handgun what you wear and drive, and must be clean, serviceable, and don’t be loud and rowdy. Don’t well-oiled. Your ammunition tell strangers too much about must be good quality, clean, and yourself - especially anything to your magazines full. You must do with your personal security. be properly trained and ready to If you are trying to impress deal with the incident. someone, use a cover story.. • Reacting to fire: Your immediate • Be Aware OF Your reaction must be to identify Environment: Always be looking the threat and return fire for people who are watching or immediately, killing the criminal following you. Be cautious of or terrorist. Move to cover as you anyone who approaches and are deploying your weapon and 78


TACTICAL FIREARMS returning fire. If you are being • Return fire. shot at from a distance or do not know where the shots are coming • Winning the firefight: As soon from, you should: as the threat has been firmly located, you must bring down • Dash—a moving target is sufficient accurate fire on the harder to hit than a stationary criminals or terrorists to kill them target. or force them into cover so you can extract yourself from the • Down—keep low and present situation. a smaller target. • Reorganizing: As soon as you • Get into cover from fire. have incapacitated the opposition or are in a safe area, you must reorganize yourself quickly to • Observe where the threat is.

79


CIRCUIT MAGAZINE ISSUE 66 need to get to your weapon or be ready for other threats. You initiate a strike. need to reload your handgun, ensure that you or anyone with • Weapon Deployment: If you you is not injured, and inform can't get to your weapon, then law enforcement and emergency why have it? If you can't set up services immediately. the strike, then what have you been training for? Fundamentals of Close Combat You can focus your mindset • Head Shots / Throat Cuts or and training by breaking down Strikes: If you shoot, then shoot the logical stages you need to kill. If you cut or strike, do so to go through to deal with a quickly to end the confrontation! confrontation. So, suppose you're ever unfortunate enough to be Anyone can shoot a gun; it's involved in a close-up hostile simple, but staying alive in a situation when you won't be hostile situation is another game afforded seconds to consider altogether. If you're serious a response. In that case, your about working armed in the close reactions will be per-rehearsed, protection industry, you must work fluid and intuitive. and train to be at a standard far beyond the minimal requirements • Pre-Defined Strategy: You for security and law enforcement must have a well-thoughtpersonnel. Remember, if things out defensive strategy for go bad, it will be up to you to keep dealing with potentially hostile yourself and your client safe while situations. dealing with an armed attack, all • Maximum Use of Distractions: of which must be done in several You must use distractions to give seconds if you are lucky. you the fraction of a second you

Orlando Wilson has worked in the security industry internationally for over 25 years. He has become accustomed to the types of complications that can occur, when dealing with international law enforcement agencies, organized criminal and Mafia groups. He is the chief consultant for Risks Inc. and based in Miami but spends much of his time traveling and providing a wide range of kidnapping prevention and tactical training services to private and government clients. 80


TACTICAL TACTICAL PISTOL FIREARMS TRAINING

AHNA CONSULTING GROUP

The difference between feeling safe

AND BEING SAFE HOTEL & HOSPITALITY CONSULTING

CYBER/IT SECURITY

CORPORATE SECURITY PROGRAMME AUDITING & DESIGN

TRAINING

RISK ASSESSMENTS

We are ready to listen to you ahnagroup.com

+373 79 557736

info@ahnagroup.com 81


CIRCUIT MAGAZINE ISSUE 66 By Scott Hamer

beyond the surface

distinguishing between looking & seeing

On Thursday, 4th May 2023, The Prince and Princess of Wales arrived on foot to visit The Dog and Duck Pub in Frith Street, Soho, London, W1. Not long after their arrival outside the venue, a male was seen wandering into the 'secure' area, and it was quickly branded a 'security fail' by many security ‘experts’ on Facebook, LinkedIn 82

and various other media. But was it really a security fail? Did anybody die? Was anybody assaulted? Was the safety of the principals compromised in any way? The answer to all three of those


BEYOND THE SURFACE questions is, of course, no. But I can understand why it looks that way. To truly assess the risks, one needs to see, not just look.

and a cool head is required to do the job correctly.

If we really want to protect public figures with no chance of any compromise or attack whatsoever, So, what is close protection? As I've the reality is they would be closely always taught, there's a clue in the guarded in secure premises with title! It isn’t just about denying all lots of security features and never access to a principal. That’s what have any interactions with anybody a bodyguard does. You won’t last unknown or the general public. long if that’s what you think or Unfortunately, that does not fit do. Put simply, protection officers in with the wishes of most public are responsible for the last ten figures. They are expected to be feet. They, generally, have to work accessible, and they expect to be in concentric rings of security accessible. In my experience, those layers provided by somebody or who want close protection don't something else. There's a lot of need it, and those who need it don’t trust in those outer rings and a lot want it! Whilst it can be a nice talking of responsibility for the last. The Personal Protection Officer (PPO) is point or fashion accessory for those responsible for what happens in the who think they need it, for those last ten feet. It is a big responsibility, who do, it is a massive imposition on

83


CIRCUIT MAGAZINE ISSUE 66 them and their families’ lives. The protection officer has to assess, then allow or deny many interactions with his or her charge on a daily basis. It isn’t an easy task. It requires intelligence. Emotional and social intelligence is also needed in abundance, not just the apparent ability to comprehend. So, what is the difference between bodyguarding and close protection? Generally speaking, anyone with muscles and size can be a bodyguard. A physical, sometimes intimidating, presence which, hopefully, deters people from approaching or attacking the principal. It isn’t much more than that and doesn’t require much security training or experience. The bodyguard believes that their mere presence will prevent an attack and, generally, they will only ever respond or react to a given and obvious threat. I remember seeing news footage a few years ago when a public figure appeared in a high-profile case at a London court. He was surrounded by tough bodyguards who pushed their way through the crowds and the media frenzy to the court's front doors only to find them locked! The principal 84

then had to stand outside the front doors in an embarrassed silence as the media pack threw questions and aimed their cameras at him. The bodyguards uncomfortably attempted to maintain a ring of bodies around him until the court opened. It’s all they could do. There was clearly no Plan B nor any contingencies considered. Their only objective, which they probably never considered not achieving, was to get their principal in through the front door. How hard can that be? The close protection officer, on the other hand, will understand and acknowledge their vulnerabilities. They will make plans to reduce the likely risks and have several contingency plans to fall back on should something happen. The close protection officer is constantly assessing, watching, seeing (not just looking) and reassessing. You will see them watching the crowd, not the principal. They never need to touch a principal unless it has all gone wrong. No 'protective arm' is required to guide the principal along - for all that is worth! They let their principals go about their business and lead their daily lives, blending into the background unless there is a real need to intervene. Close protection officers assigned to the court task above would


BEYOND THE SURFACE

Their only objective, which they probably never considered not achieving, was to get their principal in through the front door. How hard can that be?

have researched the court, completed a recce, had a Plan B, C, and D, etc., would know what time the doors opened, would have had an advance, would have communications and would have scoped out alternative methods of getting into the court as an absolute minimum. Now, whilst everyone with an SIA CP badge will call themselves, or even might think of themselves, as close protection officers, the reality is most of them have only ever completed an initial bodyguard course. The SIA course is just 194 hours of training. (It used to be 150hrs). Many will not do much more training than that. It is no secret. The Royals are protected by police officers from The Metropolitan Police’s Royalty and Specialist Protection Department (RaSP) - a department I was part of, in various iterations, for just over half of my 30-year police career. There are a lot of reasons why the police protect public figures. They have lots of experience dealing with the public, confrontation, mental health and much more. No new protection officers get to look after the UK's most highprofile figures. They have to cut 85


CIRCUIT MAGAZINE ISSUE 66 their teeth on the 'minor' principals for a few years first. Before this, they have undertaken one of the most comprehensive CP courses anywhere in the world, which, including all the firearms, advanced driving and First Aid, means at least six months of dedicated training and, once successful, continual refreshers. Prior to that, most have spent at least five to ten years on the mean streets of London honing their people and conflict management skills. They are very good at ‘reading’ people. Good cops make good protection officers. Managing shades of grey is the skill. Close protection is rarely black or white. Anyway, back to the point, was it a security fail? Not from the footage

86

I saw. Knowing the principals, the officers, and the training and protocols, I could quickly deduce from the footage that the male posed no real threat. One can never say never, of course. There is always some risk, but the difference between a good, close protection officer and a mediocre bodyguard is that the protection officer is constantly assessing the risks. He or she is seeing, not just looking. They have spent as much time studying the art (or is it a science?) of close protection, and maybe even more, as they have in the gym. Now, don’t get me wrong, fitness IS essential in close protection, but being the strongest man or woman in the world does not stop the weakest person from shooting you, stabbing you or smashing you over the


BEYOND THE SURFACE

head with an iron bar when you let your guard down. Arrogance kills, ignorance kills, and the belief in your own invincibility kills. Close protection officers never believe they are invincible.

real security risk? Of course not.

A quick risk assessment needs to be made in that split second. Of course, we all realise it would have been better for the operation if he wasn't there; he clearly So, let’s look at the ‘security breach’ should have been diverted, but he wasn't, so what next? Well, the in further detail. How did the principals arrive? Well, they took The bodyguard would have probably flattened him! Nobody gets near the Underground and walked to the pub. The trains were full of morning principal; that was the brief. Simple. (Although I would like to hear the commuters, the trains would not lawful justification for doing the have been searched, and the two principals would have mingled with aforementioned). On the other lots of (unscreened) members of the hand, a good protection officer will have quickly considered and public on the train, the escalators, assessed the situation unfolding not to mention the walk from the and, in particular, the following: bustling Central London station to the venue itself. So, does one Person: Is the individual posing more member of the public who a threat? Does he/she have the inadvertently finds himself in the middle of a Royal arrival on an open current capability to commit an assault on the principals? Is the public pavement really present a 87


CIRCUIT MAGAZINE ISSUE 66 person exhibiting any apparent intention to harm our principals? Does the person's demeanour or body language support this premise? In this example, the male displays a number of behavioural signs consistent with being in the wrong place. He doesn’t appear to be very aware of his surroundings. He looks a little startled when challenged, realises he is probably in the wrong place and is quick to show the officer he has (presumably) just been to collect a prescription.

How would the principal expect me to react in this scenario? Will my actions become the Object: Is there an obvious weapon - made, adapted, main story? improvised or otherwise? The man is carrying a bag. It could contain a weapon; though, what Will my actions kind of weapon could it be in a paper bag? A viable IED, a gun, a embarrass the knife? We need to see rather than just simply look. If we actually see, principal? we can deduce the bag is a chemisttype paper bag which, clearly, contains nothing of substantial weight. That means we can probably rule out an IED, a gun or other weapon. Phew! At this stage, we can't rule out a lightweight, noxious substance or, maybe, confetti or something else that could be used in protest. But, his demeanour and behaviour are not in keeping with what a protestor might expect and exhibit in such circumstances. 88


BEYOND THE SURFACE Profile and Wishes of the Principal: How would the principal expect me to react in this scenario? Will my actions become the main story? Will my actions embarrass the principal? These aspects should never override safety and security if you pile drive an elderly male walking along a Soho pavement with his poorly wife's medication (poetic licence here) into the ground. He didn't present a risk; you will not be thanked – and you probably won’t keep your job either! Environment: Does this person fit into this environment at this time? It’s an open, public street scene. The road has not been fully closed. Pedestrians are free to move in the

street. Barriers are in place for the press pack, but the public still have free movement in the street. With some local knowledge and having completed a good recce, we know a dispensing chemist is in the same street, just up from the pub, along the route taken. In addition, in the footage I have watched on YouTube, you can see the same male near the medical centre moments earlier. He has already been assessed at least once. Experienced cops are good at recognising faces and evaluating whether someone is up to no good! As well as the obvious protection officers around the couple, there would have been several additional covert and technical assets

89


CIRCUIT MAGAZINE ISSUE 66

deployed around the couple to make it look, as much as possible, like they'd just decided to take the tube and have a nice walk. The whole point of being a public figure is to get amongst and meet the public. Close protection officers are enablers.

do not close down streets for such visits. The principals do not want to inconvenience the public. Normality is allowed to continue, and the protection team manages the risks, most of which have been pre-considered with a contingency option.

As an official engagement, the press were in attendance, and some pedestrian barriers were placed to manage them. No barriers were used to stop the public or pavement flow. Generally, the British Police

I would invite anybody who still thinks it was a ‘security fail’ to review the footage again. It is freely available on YouTube. Search "William and Kate visit Dog and Duck Pub" or "Man breaks royal

90


BEYOND THE SURFACE

You might even need to watch it a few more times to pick up on all the information available. Look at his body language, look at the bag and how light it is, look at his demeanour. security barrier and gets within 2 inches of Kate Middleton". Even though the vast majority of that last statement is factually incorrect - it will find the correct footage! This time, really see what is happening in that street scene rather than just look. Drill into the details. You might even need to watch it several times to pick up on all the information available. Look at his body language, the bag, how light it is, and his demeanour. When the personal protection officer identified the errant male, he did his job perfectly. He reacted quickly, had a presence, and unobtrusively managed the

situation. The show went on, and, furthermore, he did it with a smile and good humour without embarrassing his principals or becoming the story. Then, take a minute to reflect; the reacting protection officer on the street on the day didn’t have the benefit of hindsight; he couldn't rewind, review and have another look at the footage. He had to assess it all in a split second and make the right decision. Now, that’s the hard part. That takes years of experience and training. That’s the real difference between a protection officer and a bodyguard.

Scott Hamer spent over half of his Metropolitan Police career as a senior manager in Royalty and Specialist Protection (RaSP) protecting international and UK public figures before retiring in 2022. He has undertaken protection operations in over fifty countries, led the RaSP close protection training unit and spent the last five years of his police career as Personal Protection Officer to His Majesty King Charles III, formerly known as The Prince of Wales. He continues to work and teach in the protective security industry. 91


CIRCUIT MAGAZINE ISSUE 66

By Inga Faust,

travel safety: protection money TO PAY OR NOT TO PAY? Using the example of South America Even though the security situation in South America has improved significantly in recent years, corruption and organized crime (OC) are still widespread.

Even if tourists are rarely affected by demands for protection money, these can be the undoing of companies and non-governmental organizations (NGOs).

simply waved through?

Why do some organizations pay large sums of money at checkpoints where others are

What image comes to mind when thoughts turn to South America?

And what can a tourist or business traveler learn from this?

Below are some best practices Why do some organizations have that organizations can use to minimize the risk of protection to stop their projects in certain regions while others continue to money claims to ensure the operate peacefully? safety of their employees.

92


TRAVEL SAFETY

Cartel wars - coca plantations - hit men - violence - weapons drugs - bribes IT IS WELL KNOWN THAT VIOLENCE IS FOLLOWED BY VIOLENCE. To fight against thoughts and, therefore, partly prejudices is difficult. But in the last few years, things have changed, as governments have become active. The focus has been placed, for example, on education and support for

young people to get them off the streets: For example, the then hard-fought district of "Comuna 13" in Medellín, Colombia, is nowadays a trendy neighborhood where art studios, restaurants and dance schools have set up shop. Former drug dealers have become beer brewers with their own bars or city guides for tourists. The favelas of Rio de Janeiro have also largely quieted down nowadays. Instead of hard drugs, ice cream is now sold to tourists. Despite reports of 93


CIRCUIT MAGAZINE ISSUE 66 arrests of well-known cartel members, the narcos (colloquial word for drug dealers) are far from gone. Even if an attentive tourist in South American cities is not necessarily any less safe than in Europe or North America, Latinos armed with grenades and guns in the streets of the favelas and comunas are still a reminder of the existence and influence of the drug cartels.

a person is engaged in, estimate what they can earn from it, and demand taxes accordingly, e.g., three percent income tax, as practiced in Comuna 13, for example. The government tolerates this approach because it means "peace" for the population. The drug cartels have been able to establish themselves in recent decades - preceded by protracted antidrug wars - in such a way that it The police stepped up their fight is now almost impossible to put against drug-related crime in the a stop to them completely. The 1990s and 2000s. We often only increasing sales of cocaine in the know the violent confrontations U.S. and Europe are not making from television, such as Pablo it any easier for governments Escobar's spectacular chase across either, so this joint, if not official, the rooftops of Medellín. agreement was found. New peace between state and cartels makes many things possible To maintain this rather fresh peace between the state and the cartels, the residents of some municipalities pay taxes to the state and the cartel. How does this work?

Other countries other customs For us, as 'Westeners', it may seem strange to pay protection money to criminals, but in Colombia, this is the price that the population is quite willing to pay for peace. Corruption is also common in other countries where things are largely peaceful.

The drug dealers watch the residents or have them watched. As a result, they know a similar In Paraguay, for example, it amount as the tax authorities: regularly happens that drivers They know what kind of activity are stopped, and the policemen 94


TRAVEL SAFETY

With a low monthly salary of the equivalent of about 300 euros, corruption is unfortunately often found especially in industries that deal with people. Because it is the only way to make ends meet and to finance the living.

demand money for alleged traffic violations, of course in cash and without receipts, especially before holidays. With a low monthly salary of about 300 euros, corruption is unfortunately often found, especially in industries that deal with people, because it is the only way to make ends meet and finance a living. Not only for private travelers but also for companies and NGOs as well as their staff, corruption and demands for protection money can become a problem. While for tourists, such encounters are mainly annoying and, in a few cases, really scary, for organizations, it can mean the end of a project or even force the staff to leave the country. Exactly at this point, they get into a dilemma: If the demands are paid, and thus criminals are supported, on the one hand, the budget is reduced, and they possibly get into moral trouble. If the protection money is not paid, this can lead to the termination of the project, for example, through violence, intimidation or arbitrary imprisonment. 95


CIRCUIT MAGAZINE ISSUE 66

In the context of illegal payments and abuse of power, a distinction must be made between protection money and corruption in general and demands for bribes/grease payments, which cannot always be clearly separated. 96

The dictionary defines protection money as "a regular payment extorted by threat of violence. However, this definition cannot be applied quite so clearly in practice. The threats and demands are usually made subtly more


TRAVEL SAFETY Bribery (colloquially known as kickback) is a form of corruption. It means the "granting and promising or demanding of gifts or benefits for specific purposes", which are almost exclusively carried out by public officials. The risks of protection money claims State authorities have a right to know who is in the country and for what purpose (tourist, business traveler, expat, investor, company, NGO, etc.). But this information also often ends up in the hands of criminal gangs who then seek to profit from it or who "control" the area (by state consent) anyway. The effects of unpaid protection money (especially if routes have to be passed frequently) can be directly effective, for example: than this definition suggests. Protection money is often demanded, for example, as a "toll" at (illegal) checkpoints or as "payment" for an alleged service. The "violence" only occurs when payment is not made.

• in the form of obstruction of further travel, • the taking of valuables or • also through the threat or execution of physical violence. 97


CIRCUIT MAGAZINE ISSUE 66 Prolonged detention or damage to vehicles or luggage can also be the consequences. Corrupt officials may disguise demands for protection money, such as "punishment" for alleged misconduct. Unfortunately, in practice, it is often difficult to recognize the "real" police officer. It is, therefore, neither advisable to break through an official checkpoint nor to provide criminals with money and information. Therefore, organizations operating abroad should also adequately prepare themselves and their employees for such events. "As a foreigner, if you are not familiar with a country's language, customs and rules, it is difficult to distinguish who is working for you and who is working against you." Prevention is better than response Therefore, strategies to mitigate the risk of protection money claims should be developed proactively and as early as possible. Information, network, relationships and effective security management are the 98

Corrupt officials may disguise demands for protection money, for example, as "punishment" for alleged misconduct. Unfortunately, in practice it is often difficult to recognize the "real" police officer.


TRAVEL SAFETY be-all and end-all. The overriding principle is that the country's culture must be respected, which should also be reflected in the appropriate procedures and guidelines. The following measures can be effective before demands for protection money even arise: • Relations with authorities and communities: for example, through foreign missions, local authorities, and other local European organizations to share experiences, assessments and best practices. Not to be neglected is establishing contact with the local population, e.g. via churches and the like. • It should not be done without the government's explicit permission in a country - of course, in compliance with local requirements. • Key actors in the country should be identified (police chief, military leaders, nongovernmental groups, etc.). • Personnel familiar with the country and its language

should be hired, who are trustworthy and keep in touch with the actors. • The more information obtained, the better a project/ stay can be prepared. • Also, areas where the government is not in control should be avoided.. After intelligence gathering, networking and preparations, including travel safety and emergency measures, employees working on-site must be briefed and individually trained to be prepared for all eventualities. So-called HEAT training (Hostile Environment Awareness Training) is ideal for this purpose. TRAINING CONTENTS OF HEATTRAININGS for countries with a high incidence of violence or travel to crisis areas • Risk sensitization • Damage limitation and protective equipment • Recognition of the situation 99


CIRCUIT MAGAZINE ISSUE 66 and differentiation from other an orderly withdrawal from the situation, a new plan should crime be developed and the points • Conducting conversations and mentioned should be gone through again. remaining calm • Behavior at (illegal) checkpoints • Interrogation and questioning situation • Mobile safety and behavior in road traffic • Information security and procurement • Stress management

And if events do occur (reactive measures) No concept can 100% rule out claims for protection money. Therefore, it is essential to draft recommendations for action for those affected because calm and level-headed behavior in incident situations is essential to manage the situation in the best possible way.

In case of doubt, the negotiated price should be paid because "The success of a company's one's integrity is more important or NGO's work is based on than money. After an orderly the population's trust, thus minimizing the risk of protection withdrawal from the situation, a new plan should be developed, claims." and the points mentioned In case of doubt, the negotiated should be reviewed. Only when employees feel safe on-site can price should be paid, because they devote themselves fully to one's own integrity is more their work. important than money. After

This article was written with the kind support of Inga Faust, Security Risk Manager at FOXPEDITION medial & protectionTM a provider of security concepts for NGOs, media professionals and expeditions. Booking of security management, risk analysis and HEAT trainings available through FOXPEDITION. 100


CLICK TO BOOK NOW! Cosain Media Safety Advisors Training Course Price: £300 inc VAT

101


CIRCUIT MAGAZINE ISSUE 66 By Mark “Six” James CPO, EPS, CAS

Secrets to a Successful Tour Security personnel play a critical role in ensuring the safety and well-being of the music artists, crew, and fans during a music tour. Here are some of the most important things a security person must do and understand while on a music tour: 102


SECRETS TO A SUCCESSFUL TOUR Maintain Social Media OPSEC Don’t just monitor the protectee's social media; also, pay attention to what the family/entourage or new tour members may be posting. Be Organized Have a plan and work the plan. Touring is like protective services; while it is always dynamic, it should never be random. Trust the process. Conduct post-event evaluations to identify areas for improvement and implement lessons learned in future cities or tours. Advance Person A rock-solid advance person is a must-have. They will be the security ambassador and primary liaison with venue personnel, tour management, hotel management, law enforcement and emergency services (EMS). Before the tour starts, they should conduct a thorough threat assessment to identify potential security risks and develop appropriate risk mitigation protocols. They should thoroughly understand the venue's security plans, including crowd control, credentialing access control, and emergency action plans (EAP), including show-stop protocols.

Contingency planning: prepare for unexpected situations, such as medical emergencies, equipment malfunctions, or weather-related issues. Also help identify unruly behavior during the show to help protect both the tour staff and the safety of attendees. Play Your Role (teamwork) You are an integral part of the team and maintain a positive attitude and team orientation. A positive and adaptable mindset is essential for dealing with the challenges and uncertainties that may arise during the tour. Understand the objectives of the tour as well as the day. While you may have played other roles on other tours, understand your particular role on this particular tour. If you have an issue with someone, talk to them, not about them. Put all the guns on the table and work through it. Focus on the issue, not the individual. Strive for Anonymity It’s hard to be anonymous at hotels (but it’s possible). Make sure that rooms are under your name, but remember that the travel agent may book it through a VIP account to get a premium room discount. That means sales may have the protectee's 103


CIRCUIT MAGAZINE ISSUE 66 name, which could still make its way around the hotel. Maintain confidentiality about tour details and artist's personal information and always exhibit a high level of professionalism. Build Relationships Everywhere Establish clear communication channels with the tour manager, venue staff, law enforcement, EMS staff and other security personnel to coordinate actions effectively. Be conscious of cultural sensitivity and understand and respect different regions' cultural norms and practices when touring internationally. When communicating with fans (i.e., meet and greet, movements through the venue, etc.), interact with fans respectfully and directly when required. Understand the Importance of Deference Sometimes, you may find yourself and your artist as the featured act; on other tours, you may be the opening act. Maintain your professionalism regardless of your position on the tour’s run of show. Whether you are the opening act or the featured act, deference is generally extended to the artist 104

You will need both mental and physical stamina. Touring is a marathon and not a sprint. Try to maintain both a healthy nutrition plan and exercise routine.


SECRETS TO A SUCCESSFUL TOUR who is on stage or about to go on stage. Yield the elevators, “back of the house” travel corridors and stage to them. Once your show is over, consider restricting your backstage guests from returning to your green room until the other artist is on stage. Remember, the travel corridors belong to the other artists now. Remember, their all-access pass only means all access while you are on stage, not during the other artist' time.

will develop some camaraderie with the driver, ensure you both maintain your level of professionalism and focus. While the drivers will often provide light maintenance, their primary focus is driving. Clean up behind yourself and help keep the common areas clean. Keep your entertainment volume, as well as your personal conversations, down. Tour Bus Supplies: If traveling by tour bus or van, pack snacks, water, pillows, blankets, and entertainment Mental and Physical Stamina to stay comfortable during You will need both mental and long journeys. Noise Canceling physical stamina. Touring is a Headphones, ear plugs, buds marathon and not a sprint. Try to and an eye mask are great maintain both a healthy nutrition ways to relax, unplug, block out plan and exercise routine. Most environmental noises or sleep. hotels today generally have some The bathroom garbage can is for level of fitness center. Even in paper; the toilet is for liquids. NO the absence of a fitness center, NUMBER TWO on the tour bus, you can always do bodyweight and no paper towels or feminine exercises in your room and products are allowed down the early or late-night walks around toilet. the hotel property or venue. Rest whenever you can (naps, Tech and Communication meditation, night sleep). Ensure Mobile phones, chargers, your house is in order before you computers, electronic tablets, go on tour, and stay connected power banks, communication as often as possible. devices and external batteries. Multi-Outlet power strip: useful Understand Tour Bus Etiquette for charging multiple devices Don’t talk to the bus driver unless simultaneously in limited necessary. Allow them to stay electrical outlets. Portable music focused on the road. Although player or electronic tablets for during the course of the tour, you personal entertainment during 105


CIRCUIT MAGAZINE ISSUE 66

downtime. Travel Credentials & Essentials Valid identification (e.g., passport or driver's license), travel documents, cash or credit cards for emergencies, and insurance information. Health and Personal Items: Medications (prescription and OTC), personal hygiene products, and any essential health-related items OTC. Travel Clothes Light travel clothing that is both comfortable and travelfriendly (won’t slow you down 106

at airline security checkpoints. Consider jogging suits, yoga pants, hoodies, etc., and other items which don’t trigger metal detectors. Since most airlines no longer offer blankets, hoodies are a great way to manage those cold airline flights. Comfortable Non-Work Shoes Touring often involves long days and short nights with many hours of standing, so when you are not on duty, allow your feet to rest. Soccer slides, slippers, sandals, athletic shoes, or any comfortable shoe that takes stress off your feet are good options.


SECRETS TO A SUCCESSFUL TOUR

Remain vigilant and attentive at all times to quickly identify and respond to potential security issues. Laundry Essentials A laundry bag, detergent, dryer sheets, a Tide pen and quarters. Keep your dirty clothes separate from your clean clothes. Keeping your clothes clean and organized is essential. Remember you are working in close contact with others, so personal hygiene is important.

Remember, when you visit a touring venue, you'll likely return at some point. A good strategy is to send a thank you letter to individuals who helped you out or, even better, send a letter to their supervisor; in the long run, it will make your life easier if and when you return there.

Stay Alert: RRemain vigilant and attentive at all times to Emergency Contact List quickly identify and respond to Names and contact information potential security issues. Security for family, friends, and personnel are an integral part emergency services. Don’t let a tour emergency be the first time of the music tour, and their we seek to secure your critical in- professionalism and attention case-of-emergency (ICE) contacts. to detail are crucial for the safety and success of not just an individual show or event but the What Goes Around Comes entire tour. Around Mark “Six” James is Founder and Executive Director of Panther Protection Services, LLC. He is an internationally published author, keynote speaker, security consultant to educational institutions and frequent contributor to print, broadcast and online media. Panther Protection Services is a full-service protection agency focusing on Risk and Crisis Mitigation, Protective Services, Self-Defense Training, and Firearm Instruction. www.pantherprotectionservices.com 107


EVOLVING SECURITY THROUGH INNOVATION Providing the critical link between Government and end-users, International Security Expo 2023 will showcase cutting-edge security innovation alongside the latest insights and policy discussions from key industry figures, plus not to be missed networking opportunities.

SECURE YOUR FREE PASS!

10,000+ 300+ HIGH-LEVEL SECURITY INTERNATIONAL DECISION-MAKERS

EXHIBITING BRANDS

CPD LIVE ACCREDITED LEARNING DEMONSTRATIONS Scan to register for free internationalsecurityexpo.com 108


ACTION NEEDED By Shaun West

Action Needed:

Where's Your Security Journey Heading?

In the dynamic and ever-evolving field of security, the question of where you stand in your career journey is both poignant and pivotal. Are you just starting out, venturing into the vast landscape of security possibilities? Or are you a seasoned professional adeptly navigating this industry's challenges and triumphs? Regardless of your current position, one question remains: Do you have a plan? And more

importantly, are you taking purposeful action to bring that plan to life? Crafting Your Path with Purpose A security career is not a mere coincidence; it's a conscious decision to safeguard, protect, 109


CIRCUIT MAGAZINE ISSUE 66 defend and secure. Whether you're guarding digital realms in cybersecurity, overseeing physical spaces' safety, managing risks, or guiding others through the intricacies of security consultancy, every path is unique. Yet, one common denominator separates the aspiring from the accomplished: a strategic plan. The Power of Purposeful Action A plan is more than just a list of goals – it's a roadmap to your aspirations. It's a compass that points you in the direction of excellence. The blueprint bridges the gap between where you are today and where you want to be tomorrow. But having a plan is only the first step. The magic happens when you pair that plan with purposeful action. Are you taking steps every day to realise your vision? The Sun Sets on Excellence The path to excellence is not stumbled upon; it's meticulously designed and diligently followed. It's a journey that requires a clear vision and the resolve to forge ahead despite challenges and setbacks. As the sun sets each day, every action you take towards your plan propels you closer to your destination. It's a destination 110

There's one common denominator that separates the aspiring from the accomplished: a strategic plan.


ACTION NEEDED

crafted through deliberate steps, a dedication, and the results will be a testament to your efforts. voracious hunger for knowledge, and an unwavering commitment to In Conclusion making the world a safer place. Whether you're a novice or an expert, the path to security Your Call to Action excellence remains the same – So, where do you stand in your with a clear vision, a well-defined security career journey? Are you roadmap, and the determination forging ahead with a well-defined to achieve. So, as you navigate plan, or are you meandering without direction? As you consider your career journey, recognise that the decisions you make today these questions, remember that will define your professional purposeful action is your vehicle journey ahead. Embrace each day to success. It's the momentum that drives you forward, no matter as an opportunity to inch closer towards your business and career the obstacles in your way. Take a objectives. Let your commitment moment to reflect on your plan and evaluate whether your daily to deliberate actions light the way actions align with your aspirations. toward a safer and more secure The security landscape demands world.

Shaun West, Business and Mindset Coach Helping security professionals seeking success using elite business & mindset techniques to level up their business and career. www.shaunwest.co www.linkedin.com/in/shaunlwest 111


CIRCUIT MAGAZINE ISSUE 66

Cloud & Cyber Security Expo 6-7 Mar, 2024 London, UK

DSEI 12-15 Sept 2024 London, United Kingdom

ISC West 09-12 April 2024 Las Vegas

ISC East 14–16 Nov, 2023 New York City, NY

GSX 11-13 Sept 2023 Dallas, Tx

IPSB 6-8 Dec 2023 Dallas, Tx

Expo Seguridad Mexico 16 – 18 April 2024 Mexico City SECUREXPO – East Africa 15 – 17 Oct 2024 Nairobi, Kenya

112


INDUSTRY EVENTS CP World security and networking conference 10 November 2023 London, United Kingdom

Executive Security and CP Technology Forum 25 January 2024 London, United Kingdom

Security – Essen 17-20 Sept, 2024 Essen, Germany

International Security Expo 26-27 Sept, 2023 London, UK

Cyber Security Summit 11-12 Sept, 2023 Hong Kong

Safety and Security Expo Asia 15 – 17 Nov, 2023 Singapore

ASIS Europe 20-22 March, 2024 Vienna, Austria

OFSEC Expo 9-10 Oct, 2023 Muscat, Oman

Intersec 16 – 18 Jan, 2024 Dubai, UAE

Do you have a security event that is not listed here that you would like our readers to know about? Contact us: info@circuit-magazine.com 113


CIRCUIT MAGAZINE ISSUE 66

Keeping Your Edge: Client Confidentiality in the Age of Social Media

By Elijah Shaw

In this smartphone era, the allure of social media as a branding and promotional tool is undeniable. The executive protection industry, like many others, has felt the gravitational pull of platforms 114

that promise extensive reach and instant recognition. However, beneath the shiny surface lies a web of risks that can compromise client confidentiality and operational security (OPSEC).


KEEPING YOUR EDGE

While every industry and individual brand needs some promotion, the reality is that both seasoned professionals and newcomers alike must tread carefully to safeguard the data that could expose ourselves or our clients to physical or reputational harm.

By 2025, it is projected that the monthly active user By 2025, the monthly user count on social count on social active networks is projected to hit a staggering 4.41 billion. This networks will statistic, courtesy of Statista, hit a staggering serves as a jaw-dropping testament to the global reach 4.41 billion. of social media. To provide

some perspective, that figure represents approximately one-third of the entire world's population. It's worth noting that this upward trend in social media usage has been steadily climbing since 2017. Drilling even deeper: A staggering 350 thousand tweets are fired off every minute, underlining the internet's and digital 115


CIRCUIT MAGAZINE ISSUE 66

technology's profound impact posts, which means that on our daily lives. Combine the attention of the world, that with 694 thousand not just protectors, is being TikTok videos watched per captured. minute and an equal number of YouTube videos. Moreover, The Tempting Terrain of every sixty seconds, there Social Media: are 4.1 thousand clicks From LinkedIn to Instagram, on sponsored Instagram social media platforms offer

116


KEEPING YOUR EDGE

a platform to showcase your expertise and connect with peers while potentially attracting clients. It's easy to be lured by the promise of exposure, but the very nature of the business demands discretion, confidentiality, and a degree of invisibility. In a field where trust ranks near the top of the list, clients rely on protectors to keep their information, movements, and vulnerabilities hidden from prying eyes. However, the addictive pull of social platforms and algorithms creates a virtual race for “likes” and “follows.” As such, the line between sharing your achievements and inadvertently revealing sensitive details can mingle and blur. A Slippery Slope: Do protectors who are very active on the socials consider that a photo

snapped during a detail could inadvertently give away a protectee's identity or whereabouts? Even wellintentioned shout-outs or acknowledgements can lead to unintended breaches of confidentiality. Of course, "social proof" can be used for positive endeavors such as creating brand awareness; however, the viewing public rarely sees the downside. Best Practices for Social Media Promotion: Educate Yourself: Understand the intricacies of privacy settings, location services, and tagging features on each platform you use. Regularly update your knowledge as platforms evolve. Consider the Big Picture: Before hitting "post," scrutinize your content. Could it inadvertently reveal a client's whereabouts or 117


CIRCUIT MAGAZINE ISSUE 66

divulging operational details. routine? If in doubt, err on The allure of social media the side of caution. promotion can be irresistible, especially when it holds the Restrict Personal Details: Limit the amount of personal promise of expanding your information you share. Your brand's reach. However, the realm of executive protection protectee's privacy extends operates within a different to you as well. paradigm—one where discretion and safeguarding Avoid Real-Time Updates: lives are paramount. Every Avoid posting about like, comment, and share ongoing details or current can shape how others view movements. Always prioritize safety over instant you and your reputation. In this modern landscape, gratification. the virtual and the real are interconnected; therefore, Engage Discreetly: Engaging with peers online in the navigation of the discussion rooms and groups spaces professionally and is common, but refrain from intentionally is vital to overall discussing sensitive topics or protective posture. Elijah Shaw is the National Director of the North American Bodyguard Association and the CEO of ICON Global, and International Executive Protection Consulting Firm. Elijah, who has been featured in international publications such as Inc. Magazine, Entrepreneur, and Portfolio, runs the ICON Academy, an EP Training Program specializing in Celebrity & VIP Protection. He also currently sits on the Board of Directors of Executive Security International (ESI), the United States oldest Executive Protection Training School. His books, An Introduction to Executive Protection & Touring & Introduction to Executive Protection 4th edition, cowritten by Dale L. June (USSS ret.), both hit the Amazon best sellers list, and are available now

118


Membership starting from £5

admin@the-bba.org.uk www.the-bba.org.uk 119


CIRCUIT MAGAZINE ISSUE 66

120


CLASSIFIEDS

Email: info@circuit-magazine.com United Kingdom 242 Security 242 Security offer a discrete, sophisticated but uncompromising approach that uses special forces principles gained through decades of experience in high-threat and high-risk environments. Because of this knowledge, we can disrupt conventional threats by providing next-generation services suited for today’s discerning clients. T : +44 (0)7498 990788 E : enquiries@242security.co.uk W : www.242security.co.uk 3D Security Ltd Taunton, Somerset, TA1 1TG Based in Taunton 3D Security provides security services for a wide range of clients. Whether you need a security guard in Somerset, event security in Leeds or Close Protection in London we will provide a solution for your needs. T: +44 (0)1823 253 001 W - www.3dsecurity.org E - enquiries@3dsecurity.org.uk A.B.I. Solutions A.B.I Solutions is a dynamic, forward thinking company, specialising in surveillance, security and investigations with local, national and internationalexperience. A.B.I provides a wide range of services to the corporate sector and individuals alike. W - www.abisolutions.co.uk Alex Morgan - Close Protection Officer I am a hardworking, enthusiastic and committed person. Adaptable and driven, I have great attention to detail and high standards. I am honest, reliable, friendly and work well as part of a team as well as on my own initiative. I am also a good listener who has the ability to communicate with people at all levels. I am comfortable, both taking and issuing direction. I am looking for the opportunity to apply and expand my skills. E: adsmorgan74@gmail.com T: 07775 636964 Argus Europe County Durham

Argus Europe has been providing specialist training for high-net worth clients and their families for close to 20 years, worldwide. Argus Europe now offer accredited training for CPO’s, Surveillance Operators and Private detectives. Argus Europe is an operational company working globally with an extensive variety of contracts. W: www.arguseurope.co.uk T: +44 (0) 8456 123 843 Briareus Security Our aim is to give a complete, discreet and professional service to all of our clients, be they large corporations, small businesses, local authorities or private individuals, all tailored to meet their individual needs. W: www.briareussecurity.com E: info@briareussecurity.com Callum Barrie Experienced Dog Handler since July 2020 and Security Industry experience of over 6 years. I have 2 working dogs, 1 Belgian Malinois (3 years) and 1 German Shepherd (1 year) available to work immediately. I have a current Close Protection Badge and Door Supervisor Badge. I am NASDU Level 2 Qualified. I have Public Liability Insurance and my own vehicle. Seeking employment immediately in Wales M: 07580405745 Cosain Consultancy Ltd Cosain has over 25 years of experience within the media safety and executive protection industry and has a network of trusted relationships with global media companies across the globe. Our services include crisis management, risk assessment, ground truth, rapid deployment and bespoke training for our clients. We deliver the only Media Safety Advisor Training course available today that is based on extensive, operational experience, preparing the attendees for the varied and challenging demands of media safety. W: www.cosainconsultancy.com E: info@cosainconsultancy.com T: +44 7859 040 807

121


CIRCUIT MAGAZINE ISSUE 66 Bespoke Britannia Bespoke Britannia draws experience from a specialist group of individuals who banded together in 2015 – 20 years of British Royal Family, over 30 years with the Security Intelligence Services as well as the British Police Force and Armed Forces. T : +44 (0) 207 692 5714 W : www.bespokebritannia.co.uk British Training Board The British Training Board are very proud to be a Community Interest Company (CIC) this means that we are company that helps a specific community to achieve a specific target or goal. T : 01792 709 287 E : admin@britishtrainingboard.org.uk W : www.thebtb.co.uk Creative Protection Services Our aim is to work with our customers to develop and improve how security is managed, keeping you and your business safe. We are passionate about utilising proven, cost-effective, and innovative tech – but we passionately believe in traditional time-honored methods when they are appropriate. We will listen to your needs and will always be happy to provide a fast and competitive quotation, completely free and with no-hidden-extras. T : 0333 224 1777 E : cps@creativeprotectionservices.com W : www.creativeprotectionservices.com Elysium Security Elysium employees are drawn from the military, police, and civilians at the top of their profession, and have to go through our personal company training insuring they are at the high competent standard required by Elysium Security, which provides the company with a unique balance of experience and knowledge to which the client benefits with bespoke security solutions. T : 01803 298 989 E : info@elysium-security.uk W : www.elysium-security.uk Exclusively Private Exclusively Private is an independent private security and household staffing company based in the UK. We pride ourselves in providing outstanding security and staffing services for high-net-worth individuals, families, and businesses based in the UK, Beijing, Hong Kong, Singapore, and Tokyo. T : +44 (0) 7928 744344 E : info@exclusivelyprivate.co.uk W : www.exclusivelyprivate.co.uk G6 Global G6 are specialists in all types of radio, telephony and satellite communications for both voice and data with particular emphasis on covert communications installations in both vehicles and fixed

122

locations. In addition, our range of personal covert radios and bespoke accessories is extensive. W: info@g6-global.com T: +44 (0)1454 610050 Horizon Horizon is an internationally renowned and accredited security and medical company founded in response to the growing need for bespoke solutions for individuals and corporate clients offering a comprehensive range of services in the provision of security consultancy, security management, manned guarding services, training and manpower solutions. T : 01389 755551 E : info@horizon.uk.com W : www.horizon.uk.com Intelligent Protection International Intelligent Protection International Limited provides Close Protection Bodyguards and Executive Protection Services to meet our clients’ requirements, whether it is in a hostile environment, or a capital city. We operate with an amalgamation of professional standards, great management and highly experienced personnel. T : +44 207 4566740 E : info@intelligent-protection.co.uk W : www.intelligent-protection.co.uk Janus Protection Solutions Janus Protection Solutions have a track record of excellence, commitment to customer service and loyalty to our clients. Our employees have positive attitudes, professional demeanour and care genuinely about providing excellence in security services. T : +44 (0)161 706 0857 E : info@janusprotectionsolutions.com W : www.janusprotectionsolutions.com King Cobra Security Ltd King Cobra Security are a Milton Keynes based company, incorporating Certificated Enforcement Agents, Security and Surveillance officers carrying services for the Domestic & Corporate Sector. Being one of Milton Keynes leading and vibrant companies not scared by trying new technologies sets us out from the rest. We are capable of tasking agents throughout the UK & Internationally when required. E : info@kingcobrasecurity.co.uk T: 0330 223 5099 W: www.kingcobrasecurity.co.uk Adam McErlane Close Protection & Client Management A qualified/licenced close protection operative and live events technician from the UK. • 12+ years of experience operating within the live events sector as on operational technician/engineer (Touring & In-House) • Extensive knowledge of the operational procedures, security protocols & logistical processes of large tours and venues. • Personal


CLASSIFIEDS protection/client management experience (unlicensed) for a high net-worth individuals. Personal Qualities - • Determined, motivated & hard working. • Punctual and reliable. • Able to work independently & as part of a team • High ethical & moral standing. • Act quickly and decisively when required. • Working knowledge of defensive tactics in hostile situations. • Patient & Tolerant in stressful situations with others. • Rudimentary understanding of the Spanish languages. • Effective communicator with a diplomatic approach. • Very resourceful & able to find solutions to complex problems. • Possess good foresight & vigilance. • Years of experience working long & unsociable hours. • Physically fit & Healthy E: adammcerlane1989@outlook.com T: +44 7751953009 Marcin Gebler Close Protection Officer I have experience with work as an armed security officer, an armed security guard at army unit and army airport, an armed officer responsible for searching and identifying explosive devices, an armed CP in Poland. I have experience with work as a mobile patrol security officer and static security guard in UK. I have experience with work as a security officer at hotels, production sites, private households in UK. I am SIA CP and DS licensed. First Aid at Work Level 3 completed in 2020. Firearms Training Course Combat Pistol 1 for CPOs Shockfire in Poland 2020. E: p.i.gebler@gmail.com T: + 44 07799907528 Minerva Elite Minerva Elite is a highly professional and effective risk management and resilience consultancy formed to provide clients with competitive advantage and bespoke solutions to their security needs. Formed by a former United Kingdom Special Forces (UKSF) officer, we have a core value of the ‘Unrelenting pursuit of excellence’ in all tasks we undertake and bring world-class experience to bear for our clients. E : hello@minervaelite.com W : www.minervaelite.com Optimal Risk Optimal Risk provide integrated multi-domain support for physical and cyber risk, and lead the field in converged risk services. From protective services, to security and contingency planning, security exercises, preventative measures, and crisis management solutions for complex environments. T : +44 (0)20 7118 8870 E : info@optimalrisk.com W : www.optimalrisk.com Pinnacle Risk Consultancy Pinnacle Risk Consultancy are a veteran owned company based in the United Kingdom, with offices in Yorkshire, Manchester and London. This affords an excellent coverage of all major cities, towns and counties within the UK.

T : +44 (0) 20 7971 1990 E : info@pinnacle-risk.com W : www.pinnacle-risk.com Polaris Operations Polaris Operations are a premier provider of turnkey specialist services worldwide. We provide a full security service to care for all of our client requirements a dedicated complete package for all their needs or we dovetail into existing structures, working with external agencies to national levels. We provide a high-quality bespoke personal security service for discerning clients. We do not provide a one-size-fits-all security solution. T : 0208 100 6071 E : projects@polaris-operations.co.uk W : www.polaris-operations.co.uk Protegimus Protection Protegimus Protection is a leading specialist and licensed bodyguard, executive protection and security consulting company that ensures all your security requirements are met. We have expertise in executing, adding and improving to your security. As security experts we offer a complete range of security services and a multitude of bespoke security services to the highest of standards. T : +44 (0)7306 395194 E : enquiries@protegimusprotection.com W : www.protegimusprotection.com RWSSI Rob W is a professional security consultant with world wide experience and capabilities in Security, Surveillance and Investigation; I can support you to overcome any problems and enable you to achieve your goals E: rob@rwssi.co.uk T: +44 (0)7818 220985 Samaritan Protection Services Samaritan Protection Services are an industry leading risk management firm specializing in Protection, Intelligence, Crisis Management and Security Consulting. We provide professional and comprehensive strategies to reduce risk for public and private entities worldwide. T : +44 (0)203 137 7380 E : info.uk@samaritanps.com W : www.samaritanps.com Securitatatem Group Our mission is to provide unrivaled security services and tradecraft worldwide. Our ethos and culture are to deliver the highest of public service standards and values tailored to private sector clients. T : 0203 746 2214 E : enquiries@securitatemgroup.com W : www.securitatemgroup.com Safe Crowds As one of the UK’s leading security service providers

123


CIRCUIT MAGAZINE ISSUE 66 SafeCrowds is driven to deliver and maintain a standard that exceeds the expectations of both existing and future clients. T : 020 4511 0100 E : info@safecrowds.co.uk W : www.safecrowds.co.uk Shaun West Associates Shaun West Associates is an integrated partner operating within the global security market. Based in the North East of England, delivering solutions across a wide range of security requirements. With the highest calibre of experience, alongside a passion for the industry, we provide discreet and effective solutions to your security requirements, whether that be looking after yourself, your loved ones, property and assets or your business. T : +44 (0) 191 300 4500 E : info@shaunwest.co.uk W : www.shaunwest.co.uk Shaun West – Business | Mindset Coaching An internationally accredited coach, with a background steeped in military discipline, security expertise, and entrepreneurial success. Using Elite Mindset coaching techniques, empowering individuals and organisations in the security industry to overcome their obstacles and achieve exponential growth. E : sw@shaunwest.co W : www.shaunwest.coz Stephen OCallaghan Founder & Managing Director Strategically oriented Close Protection Security Specialist with a proven track record for providing effective leadership and exceeding performance objectives. Has been responsible for implementation of security standards in hostile and non-hostile job roles, security awareness and education, coordination of sensitive investigations, analysis of emerging industry trends and threats and the evaluation of overall team effectiveness. Ability to develop and maintain effective working relationships within a team, whilst at all times keeping the main objective and security needs at the fore front. E: enquiries@protegimusprotection.com T: +44 7306395194 W: www.protegimusprotection.com Vas Sotiropoulos London, UK I am a security operator with over nineteen years of experience in close protection, counter-surveillance, diplomatic protection, door supervision, and CCTV monitoring in the United Kingdom and Greece. Second Lieutenant in the elite of the Hellenic Army, the Special Forces. Undertaken a number of close protection courses run by the Greek Ministry of Defence, the VIP Protection Unit of the Hellenic Police, and the Surveillance Department of the US Embassy in Athens. Highly

124

motivated and confident relocated to the UK for further career progression and to install my own footprint in the private security sector. Fully licensed Close Protection Officer by the British Security Industry Authority. E: info@spartanelitesecurity.co.uk T 02038882020 W: https://spartanelitesecurity.co.uk Wagtail UK Wales, UK Wagtail UK are international specialists in detection dogs and dog handler training. Established in 2003, Wagtail UK provides detection dogs and related services for government agencies such as UK Border Force, HM Revenue & Customs, Police, Trading Standards and Armed Forces. Wagtail International School of Excellence in North Wales is a fully approved training centre endorsed by Highfield Awarding Body for Certification. T: +44(0)1745 561166 E: info@wagtailuk.com W: http://www.wagtailuk.com Westminster Security Ltd London, UK Westminster Security Ltd are an independent, industry leading private security company in London; providing security and investigation services throughout the UK, EU and worldwide for our clients. We specialise in close protection services; providing ex-military and police bodyguards to many national and international companies, heads of state, royalty, high-profile personalities, CEO's, private individuals and families. T: +44 (0)207 123 4544 E: Info@westminstersecurity.co.uk W: www.westminstersecurity.co.uk Europe & Africa Wille Heino, Security Specialist, Owner Finland Gambeson is a security training & Consulting Company specialized in countering modern day threats. - Security & safety planning for different events. - Security training: Active shooter/Terrorism awareness/Surveillance detection/ Other. - Security consulting. We are specialized in executive protection related services. Local knowledge, trained and licensed close protection offers, mission support, other. E: wille.heino@gambeson.fi W: www.gambeson.fi Americas Bodyguard Careers Bodyguard Careers is an informational site with the purpose of providing bodyguards with all the information and tools necessary to succeed in the Close Protection Industry Info@BodyguardCareers.com www.BodyguardCareers.com


CLASSIFIEDS Decisiones Estratégicas Buenos Aires – Argentina Executive protection specialists we have experienced in all Latin America, for multinationals companies, also providing support in project throughout Latin America to consulting first the US. and UK. We have a team of specialists and psychologists in assistance and crisis negotiation. T: +54(911) 6415 1941 E: jbenitez@d–estrategicas.com W: www.d–estrategicas.com Fernando Mata Mexico I started in the Protection of Officials as an infantryman in the Presidential Guards Corps, in the Mexican Army. Later, as a civilian, I certified in executive protection and took a diplomaed in personal protection. I have also taken intelligence, terrorism and counterterrorism courses and some refresher courses. I am currently participating in an Academy project for the professional training of Protection agents with international standards. E: matamfer@hotmail.com T: + 55 2126 6994 W: www.afeeg.mx USA Icon Services Corporation 1043 Grand Ave. #312, St. Paul, MN 55105, USA A full service security and investigative agency specializing in providing high-level security and bodyguards to international celebrities, public figures and corporations. Licensed, bonded and insured, our diverse roster of clients reads as a virtual who’s who in the corporate, motion picture, fashion and recording industry. Icon has been the hand picked choice to provide Executive Protection to everyone from Superintendents to Supermodels. BBA Member. T: + 1 651 695 8778 W: www.Industry-Icon.com Imperial Protective Service, LLC 15849 N. 71st Street, Suite 100, Scottsdale , Arizona, 85254, USA Imperial Protective Service’ (IPS) is a security consulting and services firm founded in 1978. IPS provides both national and international corporate, executive and celebrity protective services. BBA Member. T: + 1 480 281 1588 W: www.executiveprotect.com Panther Protection Services 3695F Cascade Road, Suite 2207, Atlanta, GA 30331 Panther Protection Services is a full service protection agency offering such services as threat assessment, executive protection, self-defense training, firearms instruction, and high risk tactical protection. Our executive protection specialists have over 75 years of experience.

Panther can handle your protection needs whether around the corner or around the world. Member: BBA and NABA T: (404) 349-9117 W: www.pantherprotectionservices.com Tony Scotti’s Vehicle Dynamics Institute 1162 St. Georges Ave, Suite 277 , Avenel, NJ 07001, USA The first name in advanced driver training, offering our highly acclaimed Protective/Evasive Driving Programs. Designed specifically for today’s executive chauffeurs, executive protection professionals and others who are responsible for providing safe and secure transportation services. BBA Member. T: + 1 732 738 5221 W: www.vehicledynamics.net New Zealand Security Investigations & Risk Solutions LTD We are dedicated to providing professional and effective security solutions for your personal or business security requirements. S.I.R.S is one of the only security companies in New Zealand with ISO 9001 and ISO 18788 Running the most advanced security management system TrackForce to help S.I.R.S security operations with real-time reporting and lone worker technology. With a combination of Military and Security industry experienced staff. We offer high-quality security services and industry recognised training programs with international qualifications in Close Protection, Bodyguards, Maritime Security, Hostile Environment, Firearms Training, Door Supervision, Private Investigations, Surveillance, CCTV Operations, Event Security, Mobile Patrols and Static Guards. S.I.R.S has the expertise and flexibility to meet a wide variety of client needs. E: lee@sirs.org.nz T: 02040787549 W: www.sirs.org.nz Asia - Middle East - UAE Health Safety Emirates Health Safety Emirates are proud to be the number 1 Film Production Safety and Security Consultancy in the UAE and Middle East T : +971501001946 E : info@healthsafety.ae W : www.healthsafety.ae Krav Maga Middle East DMCC First established training company for the military selfdefense and fighting system developed by the Israel Defense Forces (IDF) and Israeli security forces in UAE since 2018. T: +971 50 343 1832 W: www.kravmagamiddleast.com E: info@kravmagamiddleast.com

125


Life can be testing, no matter what you fight. - Keep Fighting.

FOP is for you, whether you wear uniform, a suit, or gym kit. 126


ISSUE 66

Subscrib e today & save

THE TEAM: UK Editor: Shaun West US Editor: Elijah Shaw

Subscription means you’ll never miss an issue of the Circuit Magazine again. Subscribers get: • Every issue of the Circuit • Full access to the Circuit website. • Priority delivery of each magazine. • Access to all back issues. • Subscriber only content and offers.

Managing Editor: Jon Moss Director of Events Phelim Rowe Art Direction: Pete Falkous

Contributors: By Mick Coup By James Bore Michael Brown Jr., EPS, CAS Tom Pecora Krisztian Zerkowitz Kevin Ghee Donald Sadler Chase Blazek Orlando Wilson Scott Hamer Orlando Wilson Mark “Six” James Shaun West Elijah Shaw Inga Faust,

Our Sincere Thanks to all those that continue to contribute their wisdom and experience for the enjoyment of others The Circuit is compiled, edited and published in the UK and US bi-monthly. W: www.circuit-magazine.com E: info@circuit-magazine.com T: +44 0191 645 0865

TO ADVERTISE: IF YOUR BUSINESS OPERATORS IN, OR SERVES THE PROTECTION INDUSTRY THEN YOU NEED TO SPEAK DIRECT TO YOUR AUDIENCE THROUGH A TRUSTED CHANNEL. GET IN TOUCH TO FIND OUT ABOUT THE GREAT OPPORTUNITIES THE CIRCUIT CAN PROVIDE TO IMPROVE YOUR BUSINESS SALES AND GROWTH. Email: info@circuit-magazine.com

New app with more features Get The Circuit Security Magazine with immediate electronic downloads to read on your PC, laptop or smart device.

DISCLAIMER While every care has been taken to ensure that the information contained in this magazine is both accurate and up-to-date, The Circuit accepts no liability in any part for loss or damage incurred by reliance on information contained in this magazine through omissions, errors, howsoever caused. ©COPYRIGHT Copyright remains with the authors and contributors at all times. No part of this publication can be copied or reproduced in anyway whatsoever without permission from the publisher AND the author / contributor.

127


128

facebook.com/groups/TheNABA/


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.