We got you covered.
Home Blog Page 9

Importance of Crisis Management and Business Continuity Teams

0
Business Continuity Teams 

Just as distracted drivers can cause accidents, businesses must be prepared to mitigate risks and distractions during times of crisis. Issues occurring on the road can be mirrored in the corporate world, emphasizing the importance of crisis management and business continuity teams.

Introduction to Importance of Crisis Management and Business Continuity Teams

Every day, as we traverse the highways and byways of life, we encounter unexpected events that demand our immediate attention. While it may not be readily apparent, these roadside situations can serve as a valuable metaphor for understanding the challenges that businesses face during crises.

Distracted Attention

On the road, drivers can easily become distracted by flashing lights, billboards, or their smartphones, leading to accidents. In the business world, employees and leaders can be similarly distracted during a crisis, whether it’s due to conflicting priorities, misinformation, or overwhelming stress.

For instance, imagine a software company dealing with a significant data breach (a technological hazard). During the crisis, employees might become distracted by media coverage and public scrutiny, neglecting essential tasks like mitigating the breach’s impact. Crisis management teams must be ready to address this issue by providing clear guidance and establishing communication protocols to keep everyone focused on critical tasks.

Fatal Consequences

Just as a momentary lapse in concentration on the road can lead to fatal accidents, a poorly managed crisis in the business world can have dire consequences. Consider a retail chain facing a massive product recall (a human hazard). This can result in significant financial losses, damage to the brand’s reputation, and, in extreme cases, the closure of stores. Business continuity teams play a vital role in preventing such outcomes by developing strategies to mitigate the impact of crises and facilitating a swift recovery.

Risk to First Responders

On the road, first responders put their lives at risk to help those in distress. Similarly, employees involved in crisis management within a business can face immense pressure and stress. This risk extends to Hazmat incidents, where employees may be exposed to dangerous chemicals. Their well-being is crucial, and organizations must provide adequate support and resources to ensure their safety, both physically and mentally. For example, an industrial manufacturing plant handling hazardous materials needs to prioritize employee safety during a chemical spill crisis.

Unforeseen Challenges

Just as first responders encounter unforeseen challenges while assisting those in distress on the road, crisis management teams often deal with unpredictable circumstances in the business world. These may include natural hazards like wildfires affecting a manufacturing facility’s supply chain, technological failures in a financial institution’s trading systems, or human hazards like a high-profile executive scandal affecting a corporation’s reputation. Being prepared for such challenges and having well-defined contingency plans in place is essential for business continuity teams.

The Importance of Training

First responders receive extensive training to deal with various emergency situations. In the corporate world, however, employees and leaders may not be adequately prepared to handle crises. Providing ongoing training and simulations for the crisis management and business continuity teams is crucial to ensure they respond effectively when a crisis hits. For instance, a hospital needs to regularly train its medical staff in responding to a surge in patients during a natural disaster, such as a hurricane or pandemic (natural hazard).

Coordinated Response

A well-coordinated response on the road can mean the difference between life and death. Similarly, in the business world, coordination among different departments and stakeholders is vital to navigate a crisis successfully. Effective communication, teamwork, and a clearly defined chain of command are essential elements of crisis management. Consider a multinational corporation responding to a cybersecurity breach (a technological hazard). Without a coordinated response, sensitive data may remain vulnerable, leading to further breaches and potential legal and financial consequences.

Public Perception

Accidents on the road can lead to public scrutiny and legal consequences. Similarly, businesses facing crises are under the microscope of the public, shareholders, and regulators. Managing the perception and reputation of the organization is a core function of crisis management teams, as a damaged reputation can be a significant long-term consequence. For example, a food manufacturing company dealing with a food safety crisis (a human hazard) must act swiftly to restore public trust and meet regulatory requirements to avoid legal repercussions.

The similarities between incidents on the road and crises in the corporate world highlight the critical importance of being prepared for unforeseen events. Just as first responders must be ready to assist those in distress, businesses must have well-structured crisis management and business continuity teams in place to navigate crises effectively. These teams are not only responsible for ensuring business survival but also for safeguarding the well-being of employees and maintaining public trust.

Final Thoughts on the Importance of Crisis Management and Business Continuity Teams

Whether facing natural, technological, human, or Hazmat hazards, the principles of crisis management and preparedness remain constant, helping organizations navigate the most challenging of situations. By learning from the lessons of the road, businesses can build resilience in the face of uncertainty and drive forward safely, ensuring their continued success and sustainability in an ever-changing world.

Insider Threat to the Principal – Negligence, Complacent, or Malicious?

0
Threat to the Principal
Back view of dangerous team of hackers working on a new malware.

Viewing the possible threats or assaults on principals from the outside is only viewing the glass as half-empty.  Granted, outside manmade threat objectives such as but not limited to political, religious, or even intellectual disability, all pose potential hazards to the wellbeing of the principal(s).  However, examining a possible or suspected insider threat to the principal should not be dismissed.

The vantage point perceived by those outside the executive protection, risk, and security sector, which includes most of the public and even some of the principals, is that threats or proposed harm/attacks work from the outside in. No matter how trivial it may appear, executive protection agents and security personnel should remember, who knows the routines of the principal(s) better than those who make direct or indirect contact with him/her/them?

Negligence

This form of insider threat is often dismissed as accidental; however, should not be dismissed as such.  Principals are human and require the same necessities and resources as bystanders on the street.  Meals, accommodations, and transportation, all provide a service.  With proprietary positions becoming more sparce and contracted/vendor services more prominent, many individuals will come in direct and indirect contact with variables of the principal’s routine.  For instance, what if the principal has a food allergy and that information has not been passed on to a vendor preparing the principal’s meal, or electrical work is being done in the vicinity of the C-Suite during an annual meeting, which cuts off power to the floor?  These types of scenarios must be pre-planned months in advance and depending on the executive protection detail.  This is where clear, concise, and constant communication comes in.

Complacent

Complacent insider threats involve those directly or indirectly involved with the principal(s), taking protocols too lightly or, for lack of a better word, not caring.  This can include but is not limited to:

  • Leaving sensitive information out and available.
  • Lending or swiping someone through a turnstile.
  • Noticing an entry point or broken protective circle and procrastinating its repair.

The list of examples is as long as the specifications fit the principal and his/her/their organization’s expectations.  Furthermore, this can increase if there is high turnover or inadequate compliance audits and training.  Much like negligent insider threats, complacent insider threats can be mitigated through training, communication, and audits.  Pride also plays a role in too much complacency.  This may come in the form of a security detail hosting the same principal year after year at the same venue, without researching the current threat landscape or familiarization with the principal’s organizational enterprise risk management (ERM) or enterprise security risk management (ESRM) structure.

Malicious

Finally, this form of insider threat is the most mitigated because of the knowledge that the insider with malicious intent possesses.  An insider threat attack can cripple anything from critical infrastructure to an organization’s reputation.  What lies behind the objective can range from personal profit to a disgruntled current or former employee.  Numerous countermeasures may be set up to combat this; however, one of the biggest mitigators is background checks and monitoring of red flags flown by those who may be considered a threat to the organization.

Final Thoughts on Insider Threat to the Principal

Regardless of the objective or intent, insider threats are very prominent and can alter or harm the well-being of a principal(s) and the executive protection team.  Operational intelligence and advance screens help combat the probability of an insider threat attack becoming a reality.  Negligence and complacency are an unacceptable issue that must be kept at bay.

Training, training, and more training, for spotting such behavior or that which might rear its head into the malicious realm is paramount.  Moreover, resources and even those who are members of the principals’ organization must not only abide by the security protocols in the locations that the principal inhabits, as well as in locations representing the organization but also proactively identify red flags that may morph into an insider threat attack.

Leadership in Business Continuity Planning and Resilience: The Role of Security Experts

0

In today’s fast-paced and ever-changing world, businesses constantly encounter unexpected challenges and disruptions that can jeopardize their very survival. Security professionals have emerged as pivotal figures in ensuring the stability and continuity of business operations. With the rising frequency of emergencies, natural disasters, and unforeseen crises like the COVID-19 pandemic, the importance of robust business continuity planning has never been more pronounced. At the core of this strategy lies the regular practice of drills and emergency management exercises, empowering security professionals, emergency managers, and business leaders to exhibit resilience in the face of adversity. Alan Saquella, Professor of Global Security and Intelligence at Embry-Riddle Aeronautical University, offers valuable insights on the crucial role of security professionals in business continuity planning and how these exercises bolster an organization’s ability to respond effectively in times of crisis.

“The core foundation of a successful business continuity plan thrives on the consistent execution of drills and exercises,” states Saquella. By conducting quarterly drills, organizations can foster an ongoing state of preparedness within their security professionals and emergency management teams. These exercises play a pivotal role in uncovering insights into various aspects of emergency response, facilitating the proactive refinement of policies and procedures. Tailored drills should be developed by the team’s leadership to foster growth and learning opportunities. Establishing measurable benchmarks for factors like response time, company policies, and identifying team vulnerabilities allows for more meaningful feedback following drills. Well-structured exercises can expose a team’s weaknesses in areas such as policy comprehension and effective communication, thus enabling management to better train and guide the team for success in real emergency situations. Here are the top four types of drills that security departments should incorporate.”

  • Active Threat Drills: These simulations place security professionals in high-stress scenarios, mirroring situations involving armed intruders. The objective is to evaluate their capacity to respond swiftly and decisively to safeguard lives and assets. In a world where the risk of active threats is unfortunately prevalent, these drills can make the difference between a successful response and a catastrophic event.
  • Medical Response Drills: The readiness to address medical emergencies is tested in these drills, ensuring employees receive prompt care, and healthcare protocols are meticulously followed. These drills ensure that organizations are not only prepared for security threats but also for health-related crises, such as accidents and sudden illnesses.
  • Fire Drills: Fire safety drills are crucial in assessing vulnerabilities and facilitating a well-orchestrated response to a fire outbreak, mitigating potential catastrophic losses. Effective fire drills can prevent loss of life, injury, and property damage, which can have severe consequences for any business.
  • Security Response Drills: Designed to gauge the readiness of security teams in handling diverse security-related situations, these exercises ensure that the organization can defend its assets effectively. Whether it’s cyber threats, theft, or vandalism, security response drills help in building a proactive security culture.

In addition to physical drills, it’s essential for businesses to incorporate tabletop exercises into their preparedness strategy, assessing their overall readiness and decision-making prowess. These exercises usually involve a diverse group of stakeholders from different departments and can cover a broad spectrum of scenarios, such as natural disasters, power outages, and telecom disruptions. Ideally, a Business Continuity leader should oversee and orchestrate these scenarios with the support of senior management and financial resources to ensure their effectiveness. Here’s why tabletop exercises play a crucial role in building a resilient organization:

  • Identifying Weak Points: Tabletop exercises provide a controlled environment for management to identify weak links within corporate teams, thus facilitating enhanced communication and collaboration for seamless business continuity. These exercises allow organizations to address issues in their planning and coordination processes before a real crisis occurs.
  • Realistic Simulation: By requiring participants to role-play as if they were facing genuine emergencies, tabletop exercises inculcate a sense of urgency and responsibility, ensuring that personnel are better equipped to manage actual crises. This kind of realistic training can make all the difference when a real crisis unfolds.
  • Mitigating Financial Loss: Large-scale disruptions during emergencies can precipitate substantial financial losses. However, adequate preparation, achieved through tabletop exercises, can prevent this hemorrhaging of resources, safeguarding the bottom line. These exercises are not just about saving lives; they are also about protecting the financial health of the organization.
  • Skillset Maintenance: Regular exercises are instrumental in keeping stakeholders within emergency management and corporate security departments updated on their skillsets, ensuring that they remain highly capable and effective during emergencies. The skills and knowledge gained through these exercises need to be constantly reinforced to be effective when needed.

The role of security professionals in the realm of business continuity planning is of paramount importance. The implementation of regular drills and tabletop exercises represents a strategic investment in an organization’s overall resilience. These exercises not only serve as diagnostic tools for businesses but also illuminate weaknesses and areas for improvement in emergency responses. By promoting effective communication, skill maintenance, and a realistic grasp of potential crises, these exercises empower organizations to safeguard their employees, assets, and financial stability.

Hence, it is not merely advisable but imperative for companies, irrespective of their size or industry, to seamlessly integrate routinely scheduled business continuity tabletop exercises and physical drills into their operational framework. These proactive measures are not only cost-effective investments but also a lifeline, ensuring that businesses can continue to function and provide essential services when unexpected emergencies inevitably occur. In an uncertain world, these exercises serve as a beacon of hope, resilience, and a safeguard against the unpredictable.

As our world continues to evolve, security professionals remain at the forefront of ensuring the resilience of business operations. They play a pivotal role in safeguarding the continuity of operations. By acknowledging the significance of these professionals and the exercises they undertake, organizations can confidently navigate the challenges presented by an ever-changing landscape. Preparedness is the key to resilience, and security professionals are the linchpin of preparedness. It is imperative that security professionals maintain their skill sets and undergo continuous testing to uphold team proficiency and provide the best possible services when a real emergency arises.

The Hashshashin: History and Myths

0

The word “Hashshashin” evokes images of enigmatic assassins lurking in the shadows, carrying out covert missions with deadly precision. These shadowy figures from the history books have captured the imagination of many, but separating historical truth from myth when it comes to the Hashshashins is no easy task.  

Historical Origins of the Hashshashins

The story of the Hashshashins dates back to the 11th century in Persia, a tumultuous period in Islamic history marked by the Sunni-Shiite divide. During this time, Hassan-i Sabbah, a radical Isma’ili missionary, founded a subsect of Isma’ilism known as Nizari Isma’ilism. His quest for a base to spread his beliefs led him to Alamut Castle, perched strategically in the Alburz mountains of Iran. 

Hassan-i Sabbah converted the local population with remarkable dedication and established strongholds in mountainous regions throughout Persia and Syria. These fortresses, equipped with complex water infrastructure and designed to withstand sieges, served as the Hashshashin’s bases of operation. 

Hassan-i Sabbah is remembered for his religious fervor and for creating a military group known as the Hashshashin. These “self-sacrificers” were trained to carry out precise assassinations on specific targets, often enemies of the Nizari Isma’ili. The Hashshashin developed a reputation for deadly tactics and unwavering religious devotion, a reputation that would become a part of their legacy. 

The Myth of Hashish-Induced Assassins

One of the enduring myths surrounding the Hashshashins is their supposed use of hashish, an extract from the cannabis plant, to induce blind obedience in their followers. According to a story attributed to the Italian traveler Marco Polo, Hassan-i Sabbah drugged his followers with hashish, claiming that he alone could grant them access to paradise. However, this story is fraught with problems. 

Firstly, using hashish as a means of control may have been a misinterpretation or even an early form of “fake news.” Some argue that Western observers, unfamiliar with the Hashshashins’ guerrilla tactics, mistakenly attributed their effectiveness to drug-induced behavior. In reality, the Hashshashins’ success lay in their strategic assassinations, not chemical manipulation. 

Moreover, “Hashshashin” may not be directly linked to hashish. Some believe it was a derogatory Arabic term to describe the Syrian Nizaris, implying they were “outcasts” or “rabble.” This term, employed by anti-Isma’ili historians, eventually spread to Europe via the Crusaders, giving rise to the word “assassin.” Thus, the notion of hashish-induced assassins may be more fiction than fact. 

The Hashshashins’ Reputation as Cold-Blooded Killers

The Hashshashins are often portrayed as cold-blooded killers responsible for numerous high-profile assassinations. While it is true that they carried out assassinations, their reputation may have been exaggerated. During their time, it was common to attribute significant political murders to the Hashshashins, even when evidence was lacking. 

One notable victim of the Hashshashins was Conrad of Montferrat, the de facto King of Jerusalem at the end of the 12th century. Legend has it that Conrad was assassinated by two Hashshashin operatives disguised as Christian monks. Although the identity of those who hired the assassins remains unknown, it has been speculated that figures like Richard the Lionheart and Henry of Champagne may have been involved. However, these claims are largely speculative, and the true orchestrators of the assassination remain a mystery. 

Psychological Warfare by the Hashshashins

One aspect of the Hashshashins’ activities that stands out is their effective use of psychological warfare. By instilling fear in their enemies, they often achieved their goals without risking their own lives. One story recounts an incident during Saladin’s conquest of Masyaf, in Syria. Saladin discovered hot scones, a dagger, and a threatening note in his tent, all in the distinctive shape of the Hashshashin. This psychological tactic left Saladin paranoid and led to negotiations rather than confrontation. 

The Hashshashins’ ability to manipulate their enemies psychologically is well-documented in historical accounts. This aspect of their strategy highlights their strategic sophistication and adaptability. 

The Fall of the Hashshashins

Despite their notoriety and skill, the Hashshashins met their downfall at the hands of the Mongols. In 1256, the Mongols invaded Alamut, the seemingly impregnable fortress of the Hashshashins. While the Hashshashins managed to recapture Alamut briefly, they were ultimately crushed in 1275. 

 Unfortunately, no surviving sources provide the Hashshashins’ perspective on these events. As a result, much of what we know about their decline is based on historical records from other sources. This lack of firsthand accounts has contributed to the Hashshashins’ mystique, making it difficult to ascertain the full extent of their history. 

Conclusion: Separating History from Myth

Despite their intricate blend of history and myth, the Hashshashins remain one of history’s most fascinating mysteries. Their story challenges our ability to separate fact from fiction, reminding us that history is often as much about the context in which events unfold as it is about the events themselves. 

While certain aspects of the Hashshashin narrative, such as their origins and military strategies, are verified by historical records, others, including the tale of drug-induced obedience and the actual puppeteers behind their assassinations, remain ambiguous. 

As we navigate the complex tapestry of the hashashin’ history, it becomes evident that their enduring allure lies in the interplay between documented facts and the shadows of conjecture. The Hashshashins were a product of their turbulent era, when religious schisms and political intrigue flourished. Their legacy stands as a testament to the potency of perception, myth, and intrigue in shaping our understanding of the past and our ongoing fascination with the mysterious and enigmatic. 

CPC 2023: Interview with Chuck Randolph

0
CPC 2023

In this interview with Charles Randolph, Founding Member and President of the International Protective Security Board, we delve into the IPSB’s mission and goals, and talk about the highly anticipated CPC 2023.

With over two decades of experience in the protective security industry and an extensive military background, Chuck shares his unique journey, the IPSB’s mission, and what attendees can expect from the upcoming Close Protection Conference 2023.

Could you provide our readers with an overview of the IPSB and its mission? What led to its founding in 2016, and how has it evolved since then?

First and foremost, we serve as a dedicated forum to enhance, educate, and elevate awareness within the Close Protection Industry.

Complementing this core objective, we are committed to providing opportunities for professional development and continuous education in the Close Protection field. We recognize the dynamic nature of this industry and the importance of staying up to date with evolving trends and technologies. By facilitating these learning experiences, we empower Close Protection professionals to improve and excel continually.

As an agnostic organization, the IPSB believes collecting best practices and acquiring insights from them should be a shared industry-wide objective. The board is dedicated to creating an environment that encourages the cultivation and widespread distribution of professional standards and optimal practices within this sector.

In tandem with our educational efforts, we actively promote the Close Protection Industry in established and emerging markets. Our strategic promotional initiatives aim to underscore the industry’s significance and its contribution to safeguarding individuals and assets. Additionally, we engage in research and educational endeavors to advance the understanding of Close Protection practices, ensuring that the industry remains at the forefront of security solutions and adapts to meet the evolving needs of the global community.

The IPSB has outlined several goals, including the development of professional standards and best practices in the industry. Can you elaborate on the significance of these goals and how they benefit both professionals and the industry as a whole?

Best practices are the essential foundation of any industry, ensuring the quality and safety of services. In the Protective Security industry, even more so. The IPSB is committed to promoting best practices across all aspects of this field, actively contributing to organizations developing standards.

The importance of best practices transcends individual practitioners; they have the power to raise the industry’s bar. When universally understood, they create a benchmark of excellence that can inspire greater trust and instill confidence in the industry.

In line with the IPSB’s motto – by, with, and for the industry, we’re eager to learn more about this year’s conference. It’s considered to be the largest and most influential event in the industry, what can attendees expect at the CPC 2023?

The CPC 2023 stands as the crowning jewel in the IPSB’s event calendar, positioned to draw practitioners from diverse corners of the globe. This flagship conference celebrates industry excellence, offering a forum where professionals share knowledge, foster connections, and stay informed about the latest Protective Security trends.

We are thrilled to have Rex Tillerson, the former U.S. Secretary of State and former Chairman of ExxonMobil, deliver the keynote address at CPC 2023. Mr. Tillerson’s extensive experience and insights will undoubtedly provide a unique perspective on the challenges and opportunities within the Protective Security industry. As a professional who has been privy to security measures from both private and public spheres of his career and as a leader who has expertly navigated risk management for one of the world’s most significant multinational corporations, his keynote promises to be a conference highlight. His tenure as the Secretary of the United States Department of State further enriches his perspective. Attendees can look forward to a fantastic opportunity to gain fresh insights and inspiration from this globally recognized leader.

At the core of the CPC 2023 lies a comprehensive program designed to enrich and educate. Attendees can anticipate diverse educational sessions, workshops, and ample networking opportunities. The conference represents a unique space where ideas, experiences, and insights converge, fostering collaboration and innovation among industry peers. In essence, the CPC 2023 is a must-attend event for anyone with a vested interest in remaining ahead of the curve and embracing the future of Protective Security.

Training Security Professionals in Combating Human Trafficking

0
Human Trafficking

In the last few months, we have heard a lot of talk about the plague of human trafficking due to the release of the “Sound of Freedom” movie which is bringing a new level of awareness about the issue to the general public. Although many of us in the security industry have been aware of this horrible crime for quite some time and some of us have even been involved in one way or another combating human trafficking and assisting its victims, it brings a spark of hope to see that people outside the security industry, LE, and other similar organizations are finally recognizing that this type of crime not only exists, but is affecting the lives of millions of people (and so many of them are underage children).

Human trafficking is a heinous crime that involves the exploitation and enslavement of millions of people worldwide. It is a multi-billion-dollar industry that thrives on the vulnerability of its victims to include adults, teenagers, and even extremely young children. There are many myths surrounding this issue and many organizations have been working to educate people about the truths regarding it and how they can help. Although the main public opinion is that victims are pressured into forced labor or sexual exploitation, human trafficking can take different forms aside from that, such as organ trafficking, illegal adoptions, trafficking for exploitative begging, forced marriage, and forced criminal activity.

Here are some important findings to consider:

·        According to UNODC, Global Report on Tracking in Persons 2022, between 2017 and 2020 there were 187,915 victims reported.

·        The Global Estimates of Modern Slavery: Forced Labour and Forced Marriage report, 2022 by the International Labour Organization (ILO), shows that there are 27.6 million people in situations of forced labour and an estimated 22 million people living in situations of forced marriage on any given day in 2021.

·        According to the U.S. Department of Justice and the data published by the Bureau of Justice Statistics on the Human Trafficking Data Collection Activities, 2022 report, for the year 2020, we had 2,198 people referred to U.S. Attorneys for human trafficking offenses. Of which 1,343 got prosecuted.

·        In its 2023 Trafficking in Persons Report: United States, the U.S. Department of State, mentions that ‘’human trafficking cases have been reported in all 50 states, the District of Columbia, and U.S. insular areas’’ and that ‘’Victims originate from almost every region of the world; the top three countries of origin of victims identified by federally funded providers in FY 2022 were the United States, Mexico, and Honduras.’’

But what is the real number of human trafficking victims, one may ask? While it is estimated to be a multi-billion-dollar industry with millions of victims worldwide, we cannot know the exact numbers because of the underreporting, logistical difficulties, and reporting complexities associated with this crime. Due to the fact that human traffickers operate clandestinely and go to great lengths to conceal their activities, their victims are often kept in isolated locations, subjected to coercion, threats, and physical violence, which makes it challenging to locate them or even for them to come forward themselves and seek help. Many of these victims distrust authorities, cannot speak the language to ask for help, and fear deportation or that they may be charged with a crime (according to UNODC, Global Report on Tracking in Persons 2022, victims rely mostly on ‘’self-rescue’’). This along with the fact that identifying trafficking victims is a complex process, especially when victims may not self-identify as such, contributes to underreporting.

Another important issue is that human trafficking often intersects with other criminal activities, such as migrant smuggling and forced labor. For authorities to be able to distinguish between these crimes and accurately attribute cases solely to human trafficking, the separation between them can be tedious and accurate reporting can be difficult. The fact that trafficking is a transnational crime, there are no real boundaries and it involves movement across borders and victims are often moved through numerous countries. Coordinating efforts and information-sharing between countries can be very challenging (especially between countries who do not have the education and resources on the subject or ones where politics can be strained) making it difficult to track and quantify the global scope of the issue.

Why should security professionals get involved in fighting this crime? Because this issue concerns everyone, it can affect all of us and it can happen to anyone. As frontline defenders, our expertise, unique positions within our societal structure, our training, and not to mention our excessive amounts of travel, positions us to play a crucial role in identifying, preventing, and assisting victims. Having already been trained to identify patterns, criminal activity, and threats/risks, we have the unique skills to identify the signs and indicators of unusual behavior, physical abuse, restricted movement, and fear exhibited by potential victims.

We believe that all of us should be helping to fight this crime, and this type of training, specifically aimed at security professionals to combat human trafficking, is paramount for several reasons:

·        Enhanced Awareness: Specialized training raises awareness among security professionals about the signs and indicators of trafficking. Protection personnel are taught the places where victims are commonly trafficked, enabling them to identify victims and trafficking operations more effectively. Trained personnel are then better equipped to recognize signs of trafficking victims, such as physical abuse, restricted movement, fear, and lack of personal identification. Once identified, they can inform authorities and provide initial assistance and link victims to the proper agencies/organizations that will assist them best.

·        Improved Victim-Centered Approach: Training empowers security professionals to handle victims with sensitivity and empathy, understanding the trauma they may have endured, and providing appropriate support and care until authorities arrive.

·        Efficient Reporting: Specialized training equips security professionals with the necessary skills and knowledge to gather evidence, and report through the proper channels. They will know how to collaborate better with law enforcement agencies, NGOs, and other international organizations to share intelligence and resources, strengthening the overall response to human trafficking.

·        Prevention and Disruption: Trained security professionals can act as a deterrent, and implement proactive measures to prevent human trafficking activities, disrupting trafficking networks and protecting potential victims.

When it comes to training, it is important to make sure your security personnel receive comprehensive training that, at the very least, covers the following:

a. Understanding Human Trafficking: Educating professionals about the different forms of trafficking, its root causes, and the global and local impact of this crime. You cannot fight something you know nothing about. Learning the methodology that these traffickers utilize is critical to accurately recognize signs. Ignorance is particularly why it is such a profitable crime and that it has been easily able to create a global presence with transnational movements.

b. Victim Identification and Protection: Training on recognizing physical signs of trafficking, specific venues and other locations that have a tendency for victims to be present, and how to establish a victim-centered approach, and ensure their safety and confidentiality. If the victims are not handled properly and with empathy and care, they will not be apt to come forward or give information that will assist your efforts.

c. Interagency Cooperation: Promotion of collaboration between security agencies, law enforcement, NGOs, and other stakeholders will foster a coordinated response to trafficking cases. This is not a fight that any one of us can fight by ourselves. The nature of the crime requires a good understanding of how to cooperate with different agencies, vendors, or other professionals. Only through cooperation and coordination can this be overcome.

e. Cultural Sensitivity: Cultivating an understanding of diverse cultural norms and practices to effectively interact with potential victims from various backgrounds. Because human trafficking is a transnational crime, you will most likely have to deal with victims brought in from other countries. Being able to understand cultural differences will help your approach in assisting them.

f. Dealing with Emotional Burn Out: The emotional toll of confronting the horrors of human trafficking, witnessing victims’ suffering, engaging with traumatic circumstances, and sometimes failing to be able to help the victims, can lead to severe psychological and emotional strain for security professionals who are supporting anti-trafficking operations.

We believe that the role of trained security professionals in the fight against human trafficking cannot be emphasized enough. Their expertise, competencies, and unwavering commitment are pivotal in identifying and assisting victims, apprehending traffickers, and dismantling trafficking networks. By investing in proper training programs, we aim to empower security professionals to actively combat this heinous crime and make a significant contribution to the global efforts aimed at eradicating human trafficking.

How Prepared and Trained Are You to Deal with a “Crisis Situation”

0
crisis situation

We have always supported the need for a continuum of training, qualification, and evaluation for people who work throughout the security industry. Our type of profession requires operatives to perform, at the top of their skill set and ability, in any number of situations that may require hard physical activities, training in various disciplines, possession of comprehensive knowledge when it comes to security measures, and, most crucially, a sharp mind and the ability to take actions and react fast in a crisis situation. It is we who are required to act calmly and with steadfast resolve when all others have lost all sense of control. But bear in mind, while we all strive to train in some of the “sexier” skills in EP, sometimes the very basic abilities and adherence to fundamental policies will make all the difference in the world.

For example, we would like to bring to your attention an incident that took place in Turkey some years ago involving Turkey’s Prime Minister Recep Tayyip Erdogan, an incident that was riddled with many mistakes made, one after another, by his Executive Protection Team. It was this particular security failure that was one of the primary reasons that led to major changes in the security detail protocols in Turkey.

According to sources, Mr. Erdogan, a few minutes after leaving the Turkish Parliament and entering his vehicle, started feeling unwell and lost consciousness. His chauffeur and his executive protection agent panicked. And from that moment forward, a series of significant errors began to unfold.

Neither the chauffeur nor the executive protection agent seemed to have any background or training in First Aid. When they saw their client in the back of the car lose consciousness, they immediately drove the car, in a reckless manner and at excessive speeds, to get to the hospital which was on the other side of town. In hindsight, they should have driven to the Parliament Health Center, which was quite close to them. And, while speeding en route to the hospital, they managed to lose the rest of their security convoy and found themselves all alone racing through the streets.

When they finally arrived at the hospital, both driver and executive protection agent got out of the vehicle at the same time, thus putting themselves in yet another embarrassing circumstance and their client in a potentially dangerous situation, according to the Hurriyet Press. “Erdogan’s chauffeur, found himself in a panic as he rushed from the Mercedes Tuesday morning in front of Ankara’s Guven Hospital, inadvertently leaving the keys to the car in the ignition, which meant the locks on all of the doors, which had proceeded to shut automatically, could not be opened. It took security detail members 10 minutes to break open the window of the armored Mercedes. Critically valuable time, added doctors, who note that had Erdogan experienced any health problems more serious than a hypoglycemic faint, he could have died during that period.”

crisis situation
How prepared and trained are you to deal with a “crisis situation”?

Although this specific incident might serve well as a valuable advertisement for Mercedes armored cars in regard to how difficult it is to break their windows, it certainly placed Mr. Erdogan in a precarious situation and his security team in an even more awkward and quite embarrassing position. As their client lay unconscious inside the car, his security team struggled for about 10 minutes to break the thick window of the armored car, aided by workers at a construction site near the hospital who brought a sledgehammer and a chisel.

According to the New York Times, the newspaper Hurriyet called it “a security scandal,” while another paper, Sabah, asked, “What if the prime minister was having a heart attack?”

While we all may offer up a number of solutions for this particular crisis situation, there are a couple of basic truths that, if followed, would have alleviated most of these issues. One, possessing a second set of keys for our client’s sedans is a godsend in a moment like this. We all have seen several incidents recently where the security team couldn’t seem to locate the keys for the limo, leaving the client standing exposed to the crowds nearby, the paparazzi, and who knows what other risks or threats. In this particular circumstance, the result could have been fatal. Secondly, as we are all clearly aware, the driver should NEVER leave the vehicle. If this basic truth had been adhered to, there would not have been the excruciatingly long moments trying to break into the sedan.

There are a number of reasons that the security driver stays behind the wheel at all times and while this is not the first example that comes to mind, this certainly made the point quite clear. And lastly, had the driver kept the convoy together as a unit, there is a good chance that several of the mishaps could have been minimized or avoided altogether. This event exemplifies the prime reason for SOP’s that would address many of these issues, and with continued training, could eradicate mistakes that have potentially serious consequences.

Following that incident, some of the crucial changes to Erdogan’s security detail were that a doctor will accompany the Prime Minister on both domestic and international trips, an ambulance will also be included as a part of Erdogan’s normal convoy package, and last, but very importantly, all security Ankara officials agreed that chauffeurs, driving the official vehicles used by the Prime Minister, must go through special “crisis situation” training.

A real-life incident such as this combined with circumstances that anyone of us could be called to deal with illustrates the imperative need to make certain you are properly prepared and thoroughly trained to respond in a professional and effective manner to whatever life may throw in your path. It is always wisest to have skills and training and not need it than to need a particular skill(s) or skillset and not have it or be trained properly in it. We in our Craft always make the humorous comment that your client will, most likely, never suffer an ill moment or awkward circumstance unless you are unprepared for it. We have no idea what the future holds. Plan as though everything is real…Train as though the weight of the entire issue rests in your hands… It’s all up to you.

The Role of Mentoring in Preparing Students for Security, Intelligence, and Related Professions

0
mentoring

Alan Saquella, a Professor of Global Security and Intelligence at Embry Riddle Aeronautical University in Prescott, Arizona, and a former executive leader in the security industry, emphasizes the critical importance of mentoring in bridging the gap between student graduation and employment in security, intelligence, investigations, and related fields. This gap is characterized by employers’ demands for experience, a challenge that professional societies often fail to address by providing internship opportunities.

Mentoring emerges as a fundamental catalyst to assist students in building LinkedIn profiles, connecting with industry professionals, and gaining practical experience before graduation.

For students pursuing careers in security, intelligence, investigations, and related domains, the path to a successful and fulfilling professional life is significantly influenced by mentorship. Mentors play a central role in offering guidance and insights into the complexities of the professional world, acting as unwavering sources of support during times of uncertainty. This article examines the multifaceted impact of mentorship on students in these fields, highlighting the importance of selecting the right mentor, tailoring guidance, and adapting to the evolving landscape of workplace norms.

Matching Mentor to Mentee

The effectiveness of mentorship in security, intelligence, and related sectors hinges on finding the perfect synergy between mentor and mentee. While mentors provide invaluable guidance and support, aligning values and long-term career aspirations is crucial to prevent potential conflicts that could undermine the mentorship relationship.

It is imperative to recognize that mentorship is a mutually beneficial relationship. Mentees gain inspiration, industry insights, and valuable contacts, while mentors often acquire fresh perspectives and skills from their mentees. Maintaining an open attitude toward learning is essential for mentors, fostering a reciprocal exchange of ideas and experiences, which holds particular significance in fields where information and strategies are continually evolving.

Customizing Guidance for Specific Disciplines

In fields like cybersecurity, intelligence analysis, investigations, and others, career paths and challenges are highly specialized. Thus, adopting a one-size-fits-all approach to mentoring is ineffective. To be truly impactful, a mentor’s guidance must be precisely tailored to the unique abilities, strengths, and details of each student’s chosen discipline.

For instance, a student excelling in cybersecurity might benefit from mentorship focused on digital forensics, while another student with strengths in human intelligence should receive guidance tailored to enhancing interpersonal skills and understanding of human behavior. Mentors must exhibit adaptability in their approach, considering the specific demands and nuances of each subfield within security and intelligence.

Adapting the Mentoring Curriculum to Evolving Norms and Challenges

The landscape of security, intelligence, investigations, and related fields is in a constant state of flux. Emerging technologies, geopolitical shifts, and evolving threats continuously redefine the profession. Students require mentors who can guide them through these changes, providing them with the skills and knowledge necessary to navigate this dynamic landscape.

Mentors must also address the unique challenges that students in these fields may encounter. From ethical dilemmas to the high-stress nature of the work, mentors should offer guidance and support that prepare students for the realities of their chosen careers.

Proper Mentoring Makes a World of Difference

Mentorship stands as a critical component of the educational journey for students exploring security, intelligence, investigations, and related fields. A mentor’s transformative impact is profound, as they provide not only wise guidance but also unwavering support and industry insights specific to these critical disciplines.

Customizing guidance to individual students’ career aspirations, adapting to the evolving landscape of security and intelligence, and selecting the right mentor are all critical factors that shape the future of those who will become the guardians of our security. As protection, security, and intelligence professionals, we owe it to the next generation to ensure they achieve their goals of assuming vital roles in safeguarding our entities, communities, and world.

Digital Executive Protection and the CPC 2023

0
digital executive protection

In the lead-up to the highly anticipated Close Protection Conference in Dallas this December, we had the privilege of sitting down with Trinity Davis, a renowned expert and the Senior Vice-President of Strategic Business Development at 360 Privacy. With the conference just around the corner, we delve into the world of digital executive protection, exploring the evolving strategies and challenges that define this critical aspect of the profession.

At this year’s Close Protection Conference in Dallas, you will be presenting a very interesting topic. Can you give us a sneak-peek into your presentation and explain the concept of Digital Executive Protection?

Digital executive protection is our way of making clients a ‘hard target’ – meaning we specialize in securing the digital footprint of those we serve to protect them from online threats. In other words, they’re hard to exploit. Now we’re aiming to take our program one step further to protect our clients, and those protecting them, with our latest initiative.

Our new course focuses on ‘Protect the Protector’ – geared towards securing and hardening those that surround our clients. You can think of this as solutions for their unique support system, whether that be family members, executive assistants, house staff, or the executive protection team. Whoever it may be, these groups are just as likely to be exploited as well, putting the client at risk.

The goal is to form them into a hard target digitally as well and eliminate intel pivot points online that enable a threat actor to use their personal identifiable information (PII) or publicly available information (PAI) that most people willingly giving out, such as geolocation to cause reputational harm, formulate a physical attack, or commit fraud.

Can you elaborate on the specific strategies and tactics used to “harden” the client and their inner circle in the context of Digital Executive Protection?

Our methodology at 360 Privacy is both rational and proactive. What we want to do is eliminate connections that would lead to an information leak. We all have cell phones, laptops, social media, and countless other connected devices, and while we love the advancement of today’s technology, these same quality-of-life devices are building out our electronic pattern of life.

When – not if – threat actors are able to get a hold of that electronic pattern of life, such as where you are, who you are with, where you’ve been and where you are living, their job becomes a lot easier. We’re determined to take back control. It takes time and resources to exploit or attack a human or an organization, so our job is to make sure an attacker is forced to use more time, energy, and resources on their path to exploitation that they eventually move on to a softer target or organization that is less prepared instead.

Finally, is there anything you are especially looking forward to in December in Dallas? What is a must for you at the Close Protection Conference?

Aside from seeing close friends and old colleagues in this rapidly growing industry, we are looking forward to the next evolution of full-spectrum digital executive protection. We’re so proud of how our industry is adapting to modern threats and are excited to expand the digital protections typically provided to an executive or family onto the executive support structure.

We look forward to getting their initial reaction and feedback on the value we add. If employed correctly, these measures will greatly strengthen the overall security posture and operational footprint of those we work to protect.

“Executive Protection in the 21st Century: A New Vision” is out in English!

0
Executive Protection in the 21st Century: A New Vision

Executive Protection in the 21st Century: A New Vision has achieved an extraordinary feat by securing the coveted #1 position in its category on Amazon Mexico upon its initial release. This accomplishment underscores the book’s exceptional value and impact in the realm of executive protection. We are pleased to announce that Executive Protection in the 21st Century: A New Vision has now been translated into English and is available on Amazon. 

What sets this book apart is its status as the most influential work on executive protection in Spanish. It serves as a testament to the invaluable knowledge it imparts and the significant impact it has had on professionals worldwide. 

For far too long, executive protection has been synonymous with reactive measures, mirroring the clichéd portrayals in Hollywood films – patrols, weapons, sharp suits, and dark sunglasses. However, these outdated approaches are no match for the contemporary society. What’s needed now is a fresh, proactive strategy that prioritizes discretion, threat detection, and preemptive threat neutralization.  

This book opens the doors to high-level security, providing invaluable insights for individuals navigating a tumultuous world. With a keen focus on adapting to modern challenges, it sheds light on the urgent need for a new doctrine that aligns with the demands of today. 

Within these pages, readers will discover: 

  • Cutting-edge strategies for recognizing and mitigating threats before they materialize. 
  • Practical advice on adopting a discreet and efficient approach to safeguarding high-profile individuals. 
  • Insights into the latest industry trends and developments shaping executive protection’s future. 
  • Expert guidance from professionals who have successfully navigated the security world in the 21st century.

The book is a call for change in the executive protection industry. Whether you’re a seasoned professional or a newcomer, this book equips you with the knowledge and inspiration needed to advance your career. Click on the link below and get your copy of Executive Protection in the 21st Century: A New Vision.

ORDER YOUR COPY

 

This is the real deal!

This book exposes a reality, and how most executive protection teams rely on luck and success, but they are not successful, they are just lucky.

I couldn’t put it down the examples and stories coming from one of the worlds most complex and dangerous places to do executive protection made me realize how lucky some people are to still be alive by just doing and not knowing what they’re doing. If you’re serious about EP, done the right way, this book will certainly create a paradigm shift.

Pablo Ortiz-Monasterio

Download Advance Work: Route Survey

    Download Advance Work: Restaurant

      Download Helicopter Extration: Landing Zone

        EP Career

        Your registry of the best opportunities in executive protection.

        EP Directory
        The right place to explore EP companies.