It’s an anomaly then that so little importance seems to be attached to ‘comms’ both during planning and training. Having a competent ‘signaller’ on the team, who is well-trained and well-versed in multiple forms of communication has to be an advantage, right? Think back to the military example I gave earlier, the signaller clearly forms a vital part in any unit, whether on the frontline or back in the Ops Room. But most security-related courses only pay lip-service to the importance of communications, if it is ever mentioned at all.
Fire Safety in Executive Protection
When discussing executive protection topics with somebody not working in this field of expertise, the threats to the principal are often expected to come from rare incidents such as stalkers, snipers, explosions and so on. As professionals we know that the most significant and likely threats come from car accidents and health issues, then, next in line are serious fire emergencies. Don’t just take my word for it, a quick look at the statistics show just how frequent and deadly fires are in US.
Fit for Purpose – Packing for Adventure
In this article, we’re going to pick back up on the Adventure series, which we started in Issue 51 (Mindset, Ideas, and Planning). In that article, I laid out a formula for introducing more adventure into our lives. We looked at exploring the local, natural environment, discussed the Ancient Greek Stoic philosophy in assisting the mindset and dealing with mental blocks. We also addressed some simple strategies for preparing and taking action to make adventure a reality.
Now, in Part 2 of the Adventure Series, I’m going to show how putting together a kit list and packing for an adventure is a relatively simple process when a logical system is followed, and all the fundamentals are covered.
US Presidential Security Support
One memorable occasion was the visit by President George W. Bush to Manila, the Philippines, in October 2003, when he on his way to Thailand, where he was to attend the Asia-Pacific Economic Cooperation summit. This visit served as a great example of how much of an asset you can be for the protective elements if you know and apply protective operations principles.
Fit for Purpose – Mindset, Ideas, and Planning Adventure series P1
With the majority of people now living and working in built up, artificial environments, it is now even more prevalent to proactively seek out opportunities to maximise time in natural surroundings and include adventurous activity frequently. As security professionals we can be away for long periods and do less than favourable hours; having an outlet that allows us to disconnect and recharge our batteries is absolutely essential. Analyse your own unique situation, look to log a typical week and note down the hours you are inside at work and separately in your own time, log the time you spend exercising (at whatever intensity, a walk to the shops is included) and finally the time spent doing adventurous activities outside of a gym environment. The results will highlight where you can make positive changes or confirm a good indoor/outdoor balance.
How Criminals Operate
You need to be aware of how criminals and terrorists operate and what they look for in their victims; if you know this, you can hopefully avoid becoming a victim yourself.
Have You Got A Career Plan?
Goals are the broad intentions that define what you want. Objectives are the specific tasks that define the steps needed to achieve your goals. Goals and objectives are like a roadmap. Together they clearly define where you are going to end up, and how you are going to get there. You should use objectives as steps to attain your goals.
Taking A Domestic Client Abroad
8 Things to Remember As the designated protection you may have to create a plan for taking a domestic client abroad. If so, here are 8 things to consider before you set off. 1.The Advance: In some third world countries, the advance can be more challenging to effectively execute; that said, never go on […]
Surveillance Detection For Countering Terrorism
The ability to detect suspicious activity early in the planning phase is the primary means of defeating a terrorist attack. Thus, surveillance detection (SD) has become critical to successful intelligence collection, counter terrorism and security operations. By applying effective surveillance detection to security and counter terror operations we can effectively detect and prevent terrorist attacks in the planning phases, reduce the number of attacks and allow for safer operations in high risk environments.
Protective Intelligence
Many protective service providers and law enforcement agencies have protective intelligence units that conduct investigations, manage threat assessments and provide tactical, operational and strategic analysis of the information they uncover. However, they may fail to utilize the contemporary collection and analysis methods used by today’s intelligence professionals but rather lean on the standard criminal investigation processes they have always performed.
Operational Planning
Operational planning remains a specific and oriented led phase that is pivotal to the entire scope of the operation itself. This is due to the peculiarities of different operations.
The Silent Witness & Hacking
The Silent Witness & Hacking With the proliferation of mobile phones in the public domain, many myths surround the actual truth that lies behind this wireless technology and the inappropriate use of the word Hacking associated with them in recent times. In my past role in a Police Technical Support Unit, I have interrogated […]
Legal Testimony & the Close Protection Agent
Legal Testimony & the Close Protection Agent You are a well- trained, and well educated Protection Agent. You have gone through extensive training, and done everything you can to prepare yourself to be successful in the profession; you are ready for anything that comes your way. With the education, training, and strong work ethic […]
Communication Planning
Communication is vital to our everyday lives. There are so many ways in which we do it: voice, text, email, tweets, FB Messenger, Whatsapp, Telegram, the list is virtually endless. The ability to communicate is taken for granted, so much so, that it is often overlooked in the planning phase of operations where, in reality, it should take center stage.