We got you covered.
Home Blog Page 15

Here’s How to Prepare for a Medical Crisis While Traveling Overseas

0
medical care

When preparing for an international business trip, executives rarely think about the possibility of ending up in hospital. Nonetheless, for the thousands of Americans that find themselves far from home and in need of medical care as result of a car accident, or serious medical event such as a heart attack or stroke, a routine business trip becomes a life-changing event.

In addition to the mental and physical strains that come with hospitalization, there’s often a considerable financial shock as well. Many travelers assume that their standard healthcare plans cover medical expenses incurred in foreign countries. Unfortunately, that’s rarely the case, which means that stranded travelers often end up incurring substantial bills reaching into six, and sometimes, seven figures.

Before setting out on your next overseas business trip, use this checklist to prepare for your medical care while traveling outside the country.

Ascertain whether your existing medical insurance covers foreign travel

Call your insurance company to determine the extent of your medical coverage while overseas. In most cases, you’ll find that your coverage does not extend to foreign markets. If your insurance company does cover foreign medical expenses, ask to see the extent of that coverage writing. Pay close attention to the exclusions as well as policy limits. For example, a policy might not cover an individual that engages in activities the insurance company deems as risk. The policy may also limit its coverage to a low dollar amount.

Evaluate the purchase of additional insurance coverage.

There are three types of insurance that can help minimize out of pocket travel expenses: trip cancellation insurance, travel healthcare insurance, and medical evacuation insurance. While it’s possible to buy individual insurance plans, comprehensive travel insurance policies include multiple types of coverage for a single premium payment. When considering an individual policy versus a comprehensive one, pay close attention to the specifics including the extent of the coverage, plan deductibles, and policy exclusions.

medical care
Here’s How to Prepare for a Medical Crisis While Traveling Overseas by Hector Robles

Take steps to remain healthy while overseas.

Research the potential health threats in each country you plan to visit. In addition to reviewing the S. Department of State’s website for the latest travel advisories, access the Center of Disease Control and Prevention (CDC) travelers’ health database for country-specific information including vaccination requirements, recommendations to avoid becoming ill, and travel health notices detailing significant health risks.

 Plan your trip with an eye on safety and security.

Before setting foot on foreign soil, research your accommodation and how you’ll travel between locations. Keep in mind that in many countries, traveling by taxi or via public transportation is a risky proposition – especially in densely populated cities, or in countries with a strained relationship with the United States government. In addition, public transportation safety standards sometimes fall far short of standards in the United States. Therefore, consider hiring a prescreened car service to facilitate your travel. In addition to ensuring your safety and security while in transit, you’ll avoid the risk of becoming lost and the embarrassment of arriving late to an important meeting.

Learn how to respond in an emergency.

Gather the numbers for the emergency services in the countries you plan on visiting. Also remember to turn on your cell phone provider’s international calling plan. And consider carrying a GPS device with a dedicated connection to an operations center, staffed with highly trained, bilingual security professionals. In the event of emergency, the GPS will provide emergency services with your exact location.

Register with the U.S. government’s STEP program.

Prior to leaving the country, register your trip with U.S. Department of State. Once registered, you’ll receive real-time safety-related information during your overseas trip. Registration also means that the Embassy can contact you in the event of emergency a bombing or natural disaster. Also, remember to write down the address and phone number of the Embassy or Consulate in each of your travel destinations so you can seek government support and assistance in the event of an emergency.

While most business trips prove uneventful, every so often, executives find themselves facing a crisis. So before embarking on your next overseas trip, make sure you have a plan in place for the unexpected.

Surveillance Technology Today

0
Surveillance technology

Surveillance technology has evolved dramatically in recent years, enabling surveillance to become more sophisticated and complex. With drones, facial recognition software, and other advanced tools, surveillance has become more challenging for the subjects to detect, making it a formidable force. However, these advancements have raised concerns about privacy violations, disproportionate levels of surveillance and harassment, and the potential for suppression of free speech in authoritarian regimes. To strike a balance between privacy and security, it is crucial for both those who use surveillance and those who are being monitored to understand the capabilities and limitations of surveillance systems.

One of the most notable advancements in surveillance technology is the use of drones. Drones are unmanned aerial vehicles equipped with cameras and sensors, making it possible to capture images and data from above. Drones have been used in a variety of settings, including law enforcement, military operations, and commercial applications. For example, in law enforcement, drones have been used to monitor traffic, search for missing persons, and survey crime scenes. They have also been used in commercial applications, such as monitoring agricultural fields, inspecting power lines, and delivering packages.

However, the use of drones has raised concerns about privacy violations. Drones can easily capture images of people in public spaces, raising concerns about the collection of personal information. Privacy advocates argue that drone surveillance can be used for unlawful purposes, such as tracking individuals without their knowledge or consent. To address these concerns, some countries have implemented regulations on drone use, limiting the height and range of drone flights and requiring registration of drones.

Surveillance technology

Another significant development in surveillance technology is facial recognition software. Facial recognition software uses algorithms to analyze images and identify individuals based on their facial features. This technology has been used in law enforcement to help identify suspects in criminal investigations. However, facial recognition software has been criticized for its potential to violate privacy rights, particularly as it has been used by law enforcement to monitor protests and other public events.

Facial recognition software has been used to target marginalized communities, resulting in disproportionate levels of surveillance and harassment. A study by Georgetown Law School found that African American individuals were more likely to be subject to facial recognition software than white individuals, and the algorithms used by law enforcement were less accurate in identifying African American individuals. There are also concerns about the potential for facial recognition software to be used to suppress dissent and stifle free speech, particularly in authoritarian regimes.

To address these concerns, there have been calls for increased transparency and accountability in surveillance operations. In some cases, this has led to the implementation of regulations and oversight mechanisms to ensure that surveillance is carried out in a lawful and ethical manner. However, there is still much work to be done to strike a balance between the need for security and the protection of individual privacy rights.

For executive protection professionals, surveillance technology offers both opportunities and challenges. On the one hand, modern surveillance systems can provide real-time intelligence to help protect executives from potential threats. On the other hand, these same systems can also be used to track and monitor executives and their families, increasing the risk of kidnapping or other forms of violence. Therefore, it is important for executive protection professionals to carefully consider the risks and benefits of surveillance technology when designing their security plans.

Surveillance has become a ubiquitous feature of contemporary society, utilized by governments, law enforcement agencies, and private companies for various purposes. However, it is essential to strike a balance between privacy and security while utilizing surveillance technology. As technology advances, it is crucial to implement robust policies and regulations that ensure responsible and appropriate use of surveillance while protecting the rights of individuals.

To achieve this balance, it is important to educate the public about the capabilities and limitations of surveillance technology and encourage responsible use and transparency. Collaboration between government, law enforcement, private industry, and civil society is crucial to establish clear guidelines and best practices for the use of surveillance technology. Such guidelines can ensure that surveillance serves its intended purpose of promoting safety and security while upholding the principles of privacy, transparency, and accountability.

The challenge of surveillance is to utilize technology to enhance security without compromising individual rights and freedoms. As the landscape of surveillance continues to evolve, it is vital to remain vigilant and proactive in protecting the rights and freedoms of all individuals.

Information Sources for Executive Protection and Security Professionals

0
information sources for executive protection

Investigation is a complex process that requires the collection and analysis of information from a variety of sources. Security and executive protection professionals are expected to have a diverse set of skills, including the ability to source information, verify its accuracy and reliability, and make informed decisions based on this information. Reliable sources of information are critical to the success of investigative work as they significantly reduce the time and effort required to complete a successful inquiry. This article will explore the different available information sources for executive protection and security professionals and highlight the importance of reliable information in investigative work.

One of the most important sources of information for investigators is informants. Informants can provide valuable information about a subject’s activities and associations, but they also carry inherent risks. Informants may have an agenda or provide false information, and investigators must exercise caution when using information provided by informants. To ensure that the information provided by informants is credible and reliable, investigators must verify its accuracy and corroborate it with other sources. This process reduces the risk of relying on false information, ensuring that decisions made based on the information obtained are informed and accurate.

Another critical source of information for investigators is documentary evidence. Government agencies and private companies maintain records that can provide valuable information, ranging from financial transactions to employment records. Accessing these records may require a court order or subpoena, and investigators must adhere to legal and ethical considerations when accessing them. Moreover, electronic records are increasingly common, and investigators must be aware of the potential for electronic evidence to be tampered with or deleted. Verifying the authenticity and accuracy of electronic records is critical to ensuring that decisions made based on the information obtained are informed and accurate.

Information Sources for Executive Protection

The internet has become a ubiquitous source of information, and search engines can be used to find relevant information quickly. However, the vast amount of information available online can also make it difficult to verify the accuracy of information obtained through the internet. Investigators must exercise caution when relying on internet sources and take steps to verify the credibility of the information obtained. Cross-referencing information obtained through multiple sources and ensuring that any information used is reliable and factual are critical steps in verifying the accuracy of information obtained through the internet.

Advances in technology and subscription services like Lexis-Nexis, Accurint, Clear, Dunn and Bradstreet, and others have made it easier for investigators to access and analyze information. For instance, data mining techniques can be used to analyze large volumes of data quickly. However, technology can also present new challenges, such as the need to authenticate electronic evidence and the potential for data breaches. Investigators must be aware of these challenges and take steps to mitigate the risks associated with technology use. Ensuring that data is stored securely, and access is restricted to authorized personnel is critical to mitigating the risks associated with technology use.

Legal and ethical considerations are crucial when gathering and utilizing information. The use of certain types of information, such as medical or financial records, is governed by strict laws, and investigators must obtain the necessary legal authorization before accessing such information. Additionally, investigators must ensure that their actions are ethical and do not infringe on the rights of individuals. Violations of these laws and ethical considerations can result in legal and reputational consequences for investigators and the organizations they represent.

The effective use of reliable sources of information can help investigators make informed decisions and achieve successful outcomes in their investigations. By utilizing a variety of sources and verifying the credibility of information obtained, investigators can reduce the time and effort required to complete a case successfully. Moreover, the use of technology can assist investigators in accessing and analyzing information, but it is essential to be aware of the potential challenges and limitations associated with technology use.

Sourcing and utilizing reliable sources of information is critical to the success of investigative work for all security and executive protection professions. Professionals in these fields must exercise caution when utilizing sources such as informants, documentary evidence, and the internet, ensuring that the information obtained is reliable and credible. The use of technology can be beneficial, but investigators must also be aware of the potential challenges and limitations associated with its use. Ultimately, by adhering to legal and ethical considerations and utilizing reliable sources of information, investigators can make informed decisions and achieve successful outcomes in their investigations and ultimately protection detail assignments.

EP Summit 2023

0
EP Summit 2023

The EP Summit 2023 is one of the most anticipated conferences in the executive protection industry and this year it will be taking place 10-11 October in Mexico City.

The EP Summit is a professional event dedicated to the advancement of executive protection. It brings together the most experienced and knowledgeable experts in the field from around the world to share their insights and practical tools with attendees.  

The summit is designed to help protectors and administrators of protection bodies enhance their skills and knowledge in the field of executive protection. It covers a wide range of topics, including threat assessment, risk management, emergency response, and operational planning. Through interactive sessions, workshops, and keynote speeches, attendees will learn about the latest techniques and strategies used by the most advanced protection teams in the world.  

They will also have the opportunity to network and exchange ideas with other professionals in the field. The EP Summit is a unique opportunity to gain valuable insights and practical tools that can help protectors and administrators of protection bodies perform their duties more effectively and efficiently.  

The main keynote this year will be: Lessons from Tragedy – Security Implications on the Fateful Night of Princess Diana and Dodi Al Fayed. This is an exclusive session with Lee Sansum, the former head of security for the Fayed family, as he examines the security implications that led to the tragic deaths of Princess Diana and Dodi Fayed in 1997.

The EP Summit 2023 is a must-attend event for anyone involved in executive protection.

DATE: 10-11 October 2023

LOCATION: Jardin de eventos Santa fe, Mexico City, Mexico

 

RESERVE YOUR SPOT

 

 

Unbeknownst Risk – When Too Much is Too Dangerous

0
risk

In the March 2023 EP Wired article, “Saving Principals from Themselves,” I included how some principals conveniently made careless decisions on altering their executive protection detail to fit their personal agendas and comfort. Even though there is truth to the adage, “don’t bite the hand that feeds you,” meaning that the executive protection detail must acknowledge that they walk a tightrope between protecting and pleasing their principal, it does not excuse ignorance for increasing the probability of harm toward the individual and brand he/she/they represent.

However, what if the principal is fully compliant with the executive protection detail? Would this not be something of a positive? Just as risk cannot be 100% mitigated, the aforementioned is also an impossibility, especially when the executive protection team breaks down the objectives of the principal.

Continuing current and obtaining new business are fuel for corporate engines

Organizations do not become successful through unfriendly and trustless relationships. A principal, regardless of what side or rung of the C-Suite table and company ladder respectively, sits, people do business with people. There are indeed certain things, (i.e. – trade/company secrets), that must remain confidential; however, a company’s image and reputation are just as important as the ones who run it.

For example, if a company’s Chief Executive Officer (CEO), Chief Operating Officer (COO) or Customer Care Executive (CCE), act as the face of the organization, that face cannot have a cold or impassive emotion, but one of warmth and welcome. Furthermore, as executive protection teams are skilled in blending in as to not get in the way of substantiating the welcoming disposition of the principal, this is where too much or unnecessary information can be inadvertently shared, thus increasing a level of risk; this is often not done behind closed doors or safe areas but out in public.

Risk
Unbeknownst Risk – When Too Much is Too Dangerous by Matthew Porcelli

Airports, hotel lobbies, and train stations, to name a few, are audible hunting grounds for corporate/industrial espionage. The amount of sensitive information inadvertently shared in such places are staggering. In his article, “How Indiscrete Employee Conversations Damage Businesses,” (2019), Ian Murphy, a Cyber Security and Infrastructure Practice Leader out of the United Kingdom, shares:

At airport lounges, the conversations are often about deals the enterprises are involved in.  The level of detail is truly scary. On a flight a few years ago, four journalists sitting behind senior salespeople for a technology company were treated to several hours of detailed confidential information. The look of fear on their faces, as when everyone deplaned, the journalists handed over their business cards was surprising.

Human beings, for the most part, are verbose by nature, especially in social settings.  Corporate leadership often love to announce their accolades not only to boost ego but also to substantiate how the organization they represent is superior to the competition, which is why briefing the principal or their representative prior to the assignment is very important.

Leaving personal information such as business cards in baggage identification windows, with name, title, and contact information of the principal are bad enough, even though it takes some effort on the aggressors’ part to discreetly take notice of this information without being noticed; moreover, once alcohol and a social setting is introduced into the mix, it increases the probability of risk not only on the principal and the organization represented, but also the executive protection team.

This is not meant to say that principals are to be treated like mobile prisons with fencing, barbed wires, and spotlights. Many organizations want to be secure; ironically, the countermeasures both physical, (i.e. fences, access control), are often frowned upon because it makes the asset look too institutionalized.

The objective is not for the principal to feel smothered by the executive protection team but to remember another adage, “You never know who might be listening.”

Interview with Jerry Heying: The Benefits of Traditional EP Training

0
traditional EP training

Jerry Heying is a highly respected figure in the field of EP with over 40 years of experience in protective services. He is the CEO of the Executive Protection Institute and IPG and is a member of several prestigious security associations such as the ASIS Executive Protection Council. In an interview with EP Wired, Heying provides his opinion on the benefits of traditional EP training and shares his thoughts on some critical issues in our industry.

How does the efficacy and practicality of traditional EP training compare to that of online courses, particularly in the context of emerging trends and technologies in the field of security? What do you see as the benefits or drawbacks in those different approaches and is there room for synergy? 

There is a place for online learning such as specialty or introductory informational courses, but for someone to enter the industry and expect to be accepted as ready to work after taking an online course is questionable at best. What if the person has a physical or emotional disability for example, how would that be detected by the online instructor (if course is live, and no observation if the course is just recorded sessions) as they are only able to see the student sitting in front of their screen. A serious concern is that some online students are being told that they are now “certified protection agents”. This is quite concerning as there is no real basis for them being certified to a standard or by a certifying body other than just completing a course of study.  

As an employer of protection agents, I would not hire someone who only attended an online program. I would also question a candidate if they attended an unknown training school to find out the quality of what was taught and by whom and their experience level. In conclusion, traditional EP training can be supplemented with online courses to provide a more comprehensive security training program, helping to ensure that learners have access to the most up-to-date information and resources. 

We are seeing more and more courses concentrating on hard skills and especially highly tactical training. What is the reason behind this in your opinion – is it a fad or are those skills really as necessary for the profession as we are led to believe? 

The images of folks wearing tactical gear, body armor, carrying M-4’s in advertisements for “EP Courses” pretty much comes right out of movies and in all honesty is seriously misleading as most executive protection assignments are rarely done with all that gear except in war zones.

Dr. Kobetz, the founder of the Executive Protection Institute (EPI) and who is one of the original pioneers in traditional EP training called that type of training as “run, jump, shoot, scream fantasy camps”.

I believe that one reason for the rise in this type of training is from military folks returning for war zones and because it’s sexy and exciting. Realistic? Again, only in high threat war zones. If I needed protection agents for a high threat detail, I would hire highly experienced individuals and not graduates of a fantasy camp.  

This is closely connected to the question of whether firearms are a necessary tool in executive protection. How does that relate to debates about gun control and the use of force in security contexts? 

The use of deadly force can only be used legally as an absolute last resort when no other option was available, and as protectors, we should do everything humanly possible to avoid having to use deadly force. Personally, I have carried a licensed firearm in New York City for close to 40 years, and thank God, I have not had to use it even once.

Protection is not about the gun. It is a tool we can use in the event it becomes necessary against the ultimate threat of deadly force being used against our client and ourselves.

Protectors who carry should have an advanced level of training specifically in consideration of the environment where they are working, and they should only carry if properly licensed to do so. Too many entry level protectors put too much emphasis on guns, when our total focus should be on problem avoidance. The debate on gun control and the use of guns will continue on and on with no end.  

Traditional EP Training
Interview with Jerry Heying: The Benefits of Traditional EP Training

The EP industry is growing, and services are becoming more complex in light of the changing and evolving threat landscape. Has this affected what we can call the “purpose” of executive protection? Also, where is our industry heading in the next, say, five years? 

Executive Protection or Bodyguards is an old established industry, often called the “5th Profession”. However, modern EP is relatively young and has undergone much development over the years, especially recently with the development of technology, particularly the use of smart phones and apps. The traditional “Secret Service” type protection with agents working within arm’s reach of the principal wearing earpieces has seemed to have faded for a more conservative covert style of protection, slightly more distanced, except for notable people at high profile events.  

The protection industry is rapidly expanding and is showing no sign of slowing down. ASIS International is working on publishing EP Standards and Guidelines (as are some others) which should help the overall industry be recognized as trained professionals. Nearly all 50 states have regulations and training requirements for security and protection services, and we are in touch with some states who want to increase the training requirements for providing executive protection. All of this will help the industry grow and develop over the next 5-10 years.   

As we said, to a certain extent the market is being flooded with various courses and instructors that pertain to teaching skills important to EP agents. What do you think, what are the advantages and what are the disadvantages of such a profusion of offerings? And how much should we diversify our skillset or training schools?  

I have always been an advocate that professional protectors should constantly investing in themselves and train continuously and be a student of the profession. However, one should be prudent with their money and make sure that the training will provide you with a return on investment.

The “fantasy camp” type training may provide “entra-trainment” (meaning they are entertaining and fun) but will that training provide serious employment opportunities, or will it just be something to add on the resume?

And honestly, corporations are generally not thrilled to see run jump shoot scream courses as they may see that training as potential liability. Those considering taking a training program should carefully evaluate the value of the course and how it can be leveraged to strengthen their existing skillset 

Finally, in your opinion, what are the characteristics of a good training program? How do we find the right fit or make a good choice? Instructor numbers and backgrounds? History of an institution? 

In considering attending a school, I strongly recommend looking at a number of factors, such as how long has the school has been in operation? How many Instructors? Who are the instructors and what is their background and experience? What is the school’s reputation? Do they have an alumni network or will attending the school provide potential job opportunities?  

A good training program should offer comprehensive and up-to-date courses that cover the latest developments in executive protection. The instructor numbers and backgrounds should be diverse and include experts from the field who can provide hands-on experience. The history of an institution should also be considered, as a longer-term track record indicates a higher level of expertise and experience. Additionally, it’s important to assess the student to instructor ratio, as individual attention is often key to success.

Finally, consider the support provided throughout the program, as well as the post-course job assistance and networking opportunities. All these factors should be considered when making an informed decision. After attending one school, consider attending another school soon to multiply your opportunities and expand your learning and capabilities.

Over the years, I have attended quite a few schools and courses and have benefited from all of them. 

EP and Security Professionals Help in the Fight Against Fraud

0
fraud

Fraud and corruption remain a significant issue for organizations worldwide, with the latest ACFE Report to the Nations indicating that it costs over $300 million, and corruption is one of the most prevalent methods of fraud. The lack of equal application of the Foreign Corrupt Practices Act (FCPA) in other countries due to cultural differences is one reason fraud and corruption persist. However, there are several ways in which organizations can curb the increase in white-collar crime, including the integration of security and executive protection into their fraud prevention strategies.

A robust security and executive protection program can help reduce the risk of white-collar crime by providing physical security to employees and assets. This includes implementing access control measures to sensitive data and systems, conducting background checks on employees by using software provided by Verensics.com, and developing emergency response plans to mitigate risk. Additionally, security and executive protection specialists can help organizations conduct risk assessments and develop comprehensive security plans. These plans can include procedures for responding to fraud incidents and other security threats, as well as guidelines for conducting internal investigations.

Executive protection specialists can also work with organizations to develop and implement travel safety programs for employees who travel internationally. This can include pre-trip briefings, transportation security, and emergency response planning. By providing employees with the tools and resources they need to stay safe while traveling abroad, organizations can reduce the risk of fraud and corruption incidents occurring.

Furthermore, integrating security and executive protection into an organization’s fraud prevention strategy can help protect the company’s reputation. In the event of a fraud or corruption incident, having a comprehensive security plan in place can demonstrate to stakeholders that the organization takes the issue seriously and has taken measures to prevent it from occurring.

fraud

The role of internal reporting and whistleblowing is also critical in fraud prevention, as it allows for faster detection and acts as a deterrent if well-publicized. However, employees may be hesitant to come forward with information if they do not feel safe or secure. By implementing security and executive protection measures, organizations can provide employees with the confidence to report incidents without fear of retaliation.

Moreover, in recent years, cybersecurity has become a significant concern for organizations, and it is a growing threat to fraud prevention efforts. Threat and cyber intelligence monitoring are also essential in protecting organizations from other threats, including cybercrime. A strong cyber policy must exist in every organization, and vendors like Life-raft Navigator and Topo.ai can scour the dark web, social media, etc., to gather actionable information that can prevent, mitigate, or respond to a threat.

Additionally, the role of the fraud prevention specialist is evolving with a focus on policy and data to prevent and mitigate fraud and corruption risk. Fraud prevention is a key component of fraud risk management, and prevention is crucial. While fraud risk management encompasses various components such as assessment, governance, fraud detection, and monitoring-reporting, prevention is where everyone would ideally like to be.

The recent COVID-19 pandemic has had a significant impact on US corporations, with many experiencing a surge in white-collar crime cases. The fraud triangle has seen a significant increase in opportunity due to the lack of controls, monitoring, and supervision with employees working from home. Furthermore, the pressure on employees has increased due to balancing work, home, family, marriages, and the loss of jobs by partners, among other factors.

To curb the recent increase in white-collar crime, organizations can take several steps, including checking in regularly with employees working from home, offering employees more health services and counseling, adding monitoring software on employees’ computers with total transparency, and bringing employees back to the office on a rotating basis while still having work from home options and flexibility.

Incorporating security and executive protection measures into fraud prevention strategies can help organizations take a proactive approach to reducing the risk of white-collar crime. By providing physical security to employees and assets, conducting background checks on employees, implementing access control measures, and developing travel safety programs, organizations can take a more comprehensive approach to protecting their people and resources.

A strong security and executive protection program can also help organizations respond to fraud incidents and other security threats by providing guidelines for internal investigations and emergency response planning.

The fight against fraud and corruption in organizations requires a multifaceted approach that involves a range of preventive measures. Incorporating security and executive protection into fraud prevention strategies is a crucial step that organizations can take to protect their people, assets, and reputation. By doing so, organizations can reduce the risk of white-collar crime and minimize the financial losses associated with fraud and corruption. Finally, the tone at the C-suite must align with the operations. Without it all other efforts to prevent, mitigate and respond to white collar crime will be ignored.

Real Life Scenarios in EP: Multiculturalism, Tech and Crypto

0
crypto

Nader Elawar, a security industry and EP veteran since 2009, shares his journey and experience in dealing with multicultural environments, special forces, and corporate security.

In this interview, Nader talks about the unique security challenges presented by the crypto industry and shares insights on identifying potential threats, developing strategies to mitigate risks, and implementing security measures across different geographies.

We are very interested in hearing about the various twists and turns that have shaped your career trajectory and brought you to where you are today. Can you share with us some of the significant milestones or challenges that you have encountered throughout your journey in the industry, as well as any lessons that you have learned along the way?

I’ve been working in the security industry since 2009, and I have to say that it’s been quite a journey. One of the most significant things I’ve learned along the way is how to work effectively in multicultural environments.

This skill has had a significant impact on who I am today. One of the highlights of my career so far was the opportunity to work with special forces such as the Green Berets and MARSOC in 2013. It was an amazing experience to learn about the security SOF and apply it in my civilian life.

However, transitioning from working with the army to the corporate security side was not easy for me. I faced some challenges along the way, but I was able to learn from my mistakes and mitigate them. It was a valuable lesson that helped me adapt and succeed in my career.

What are some of the unique security challenges that the crypto industry presents, and how have you adapted your corporate protection strategies to address them? How have these threats evolved, and what steps have you taken to mitigate them?

The crypto industry presents unique security challenges, and it is crucial to adapt corporate security strategies to address them. To help mitigate these risks, we should take several steps, including securing physical offices, training employees on operational security awareness, conducting risk and threat assessments, and utilizing social intelligence monitoring.

Social intelligence monitoring is essential to help us identify potential threats to any crypto organization. By monitoring social media and other online platforms, we can stay current on potential threats or attacks against our organization. This allows us to proactively mitigate risks and ensure our employees and premises safety and security.

It is important to take a comprehensive approach to security in the crypto industry. Social intelligence monitoring is just one of the many tools we should consider using to help keep our organization safe.

crypto

Given your experience in risk management, can you share some best practices and insights for identifying potential threats, developing strategies to mitigate risks, and implementing security measures to protect people and assets? Especially across different geographies such as Lebanon, Dubai or Congo?

Having worked in risk management across various geographies, including Lebanon, Dubai, and Congo, I know each country presents unique security challenges that require different approaches to mitigate risks.

One of the best practices is to conduct a thorough threat assessment and country brief before entering an unknown area. This helps us identify potential threats and risks so that we can develop effective strategies. Risk assessments are also crucial at this stage, as they help us evaluate the potential impact of different risks and prioritize our efforts accordingly.

By conducting advance planning and having boots on the ground, we can prepare and implement security measures to protect our people and assets. Being multilingual has been helpful in my work as it allows me to communicate more effectively with people from different cultures and backgrounds. It is important to be aware of cultural differences and adapt our approaches accordingly.

Overall, taking a comprehensive approach to risk management is essential, including threat assessment, risk assessment, advance planning, and effective communication. By doing so, we can better protect our people and assets in different geographies with varying threat levels and cultural nuances.

According to surveys, with the rise of hybrid work, cybersecurity is now the biggest challenge that most employers face. How do we adapt security protocols to ensure the safety of its employees and company data to these hybrid work models?

The first step is to educate employees on the importance of cybersecurity and best practices such as using strong passwords and changing them regularly, two-factor authentications, avoiding public Wi-Fi, and being cautious with email attachments and phishing attempts.

Encourage the use of Virtual Private Networks (VPNs) to encrypt internet traffic and protect sensitive data when employees are accessing company resources remotely.

Implement MFA to add an extra layer of security to user accounts. This can help prevent unauthorized access to company resources even if a password is compromised. Limit access to company resources on a need-to-know basis. Implement access controls and permissions to ensure only authorized personnel can access sensitive data. Use cloud-based security solutions such as firewalls, antivirus software, and intrusion detection and prevention systems to protect against cyber threats.

Regularly update and patch systems; keep software and systems up to date with the latest security patches to protect against known vulnerabilities. Regularly monitor company systems and networks for any signs of cyber threats or suspicious activity. Establish clear incident response plans to ensure that employees know what to do during a cyber-attack or security breach.

By implementing these measures, companies can better adapt their security protocols to ensure the safety of their employees and company data in a hybrid or on-site work model.

There is a lot of talk nowadays about the importance of being agile and adaptable in the face of rapid change and uncertainty. How do you ensure that a company’s security measures and strategies can quickly and effectively respond to new and emerging threats?

Businesses should conduct regular risk assessments, stay up-to-date on threat intelligence, develop an incident response plan, establish cross-functional collaboration, conduct regular security training, implement automation and orchestration, and regularly test security measures, including taking permission to do penetration tests.

These steps can help organizations identify potential security threats, prioritize security measures, and respond proactively to security incidents.

Heidi Klum’s Relationship with Her Bodyguard: The Reason Behind the Divorce?!

0
Heidi Klums Relationship with Her Bodyguard

Heidi Klum, the supermodel and television personality, has been in the public eye for years, and her personal life has been the subject of much speculation. One of the most talked-about aspects of her personal life in recent years has been Klum’s relationship with her former bodyguard, Martin Kirsten.

Her ex-husband, Seal, said that the romance had started before their breakup – opening speculations that the affair was the reason behind the divorce.

The Relationship with Her Bodyguard

Klum and Kirsten worked together for four years, during which time he was responsible for protecting her and her family. As time passed, rumors began to circulate that the relationship between the two had become romantic.

However, Klum was initially tight-lipped about the nature of their relationship, simply saying that it was “complicated.” But she later opened up about their romance during an interview with Katie Couric, saying that Kirsten was “a great man” and that they had recently gotten to know each other “from a completely different side.”

Kirsten has been a steady presence in Klum’s life for years, providing support and protection during some of the most challenging times of her life. He’s also been a source of stability for her children, whom he’s cared for and protected as well.

But there’s more to their relationship than just a professional bond. There’s also physical attraction: Kirsten is tall, handsome, and professional, all qualities that have drawn Klum to him.

Seal’s Reaction

One person who wasn’t thrilled about Klum’s relationship with Kirsten was her estranged husband, Seal. The singer was reportedly upset when he learned about the romance, feeling betrayed by both Klum and Kirsten.

“If there is going to be someone else in their lives, I’d much rather it was a familiar face. I guess the only thing I would have preferred is… while I didn’t expect any better from him, I would have thought Heidi would have showed a little bit more class. She could have at least waited until we separated first before deciding to fornicate with the help, as it were.” Seal said.

Despite the drama surrounding their personal lives, Klum and Seal have been focused on co-parenting their children and reaching a settlement in their divorce. Klum has said that her priority is protecting and providing for their children, and it appears that both she and Seal are committed to putting their differences aside for their sake.

Conclusion

In conclusion, while Heidi Klum’s relationship with her former bodyguard, Martin Kirsten, may have garnered media attention, it raises concerns about the professionalism of such relationships. As a protector, the primary duty of a bodyguard is to provide security and protection to their clients.

By engaging in a romantic relationship with a client, a bodyguard compromises their ability to effectively fulfill their duties, potentially putting their client at risk.

This situation highlights the importance of maintaining professional boundaries in any protector-protectee relationship. A bodyguard must prioritize their client’s safety and well-being above all else, and any personal relationship should not interfere with their professional obligations.

The Power of Counter-Surveillance: What Criminals Fear More than Weapons

0
counter-surveillance

Counter-surveillance is, without a doubt, one of the most effective and underused methods in executive protection. Despite being a long-known technique, its potential is virtually untapped in executive protection operations. 

Recent and unfortunate attacks in Mexico City support this point of view. In attacks such as the one at Norberto Rivera’s house in 2018, the assassination attempt on the Mexico City Chief of Police, Omar García Harfuch, in 2020; restaurant entrepreneur Eduardo Beaven in 2021, and Gabriela Sanches and Ciro Gómez Leyva in 2022; subsequent investigations revealed that the victims had been under hostile surveillance by criminals for months prior to the aggression, without being detected in time. 

It is known that an attack on an executive lasts only a few moments, but the preparation for such an attack involves a prolonged process of observation and tracking of the target by criminals, which can last months. Counter-surveillance allows detecting and thwarting the attack in this early observation phase, thus avoiding exposing the protectee to risks and uncertainties associated with reaction. 

counter surveillance
The Power of Counter-surveillance: What Criminals Fear More than Weapons by Ivan Ivanovich

The effectiveness of counter-surveillance is widely recognized, even by the criminals themselves. Olivera Ćirković, a former member of the infamous international Pink Panthers gang, asserts that she was never deterred by armed agents. However, if during the prior surveillance of a victim someone approached and took note of her vehicle’s license plate or identified her and asked what she was doing there, she would immediately abandon that victim. 

In her own words, the most critical phase of an attack, from her perspective as a criminal, was not the moment of aggression itself, since by then the victim had been extensively studied, found distracted, and at their most vulnerable point. On the other hand, the aggressors attacked with the element of surprise, concealing their identity with ski masks, using stolen vehicles, and having other advantages in their favor. 

For this reason, Olivera points out that the most critical aspect for her was not the final aggression but the prolonged process in which she observed and analyzed the victim. During this time, she could not wear a disguise, as it would draw attention, and the vehicles she used had to be legal, making them identifiable. Her greatest fear was being observed and identified by an unknown person whom she could not see or know of their existence. In fact, this is how she eventually ended up being arrested. Consequently, it is clear that high-profile criminals fear counter-surveillance much more than weapons. 

If there had been a structured counter-surveillance system in the previously mentioned cases, experts in this technique would have identified the presence of the criminals in the same way it was done later, and even more easily, as they would have had teams on the ground. In this way, the attack would have been neutralized months before its planned execution, thus preventing human losses. 

The question we must ask ourselves is: what more needs to happen for us to leave behind dangerous fantasies about weapons and reaction and direct our actions in executive protection towards counter-surveillance, logistics and early-warning methods, thereby avoiding the loss of lives of both the protectees and their protectors? 

Download Advance Work: Route Survey

    Download Advance Work: Restaurant

      Download Helicopter Extration: Landing Zone

        EP Career

        Your registry of the best opportunities in executive protection.

        EP Directory
        The right place to explore EP companies.