FREE CARVER Chapter Login

Security Consultants vs. Security Contractors

Uncategorized Jul 27, 2020

Monday Security Memo

Intellectual firepower for security professionals

Security Consultants vs. Security Contractors

In over 20 years of working within the Intelligence Community, as well as the private security industry, I have come across many misconceptions about my profession.  On the intelligence side of the house, there is an obvious misconception that spies drink martinis, travel to exotic locations, and engage in adventures similar to that of James Bond.  When in reality, the majority of intelligence officers (myself included) prefer a smooth scotch, travel to some real "armpits" of the world, and honestly spend more time typing reports than Miss Moneypenny.  

When I transitioned into the private security world, I also found a major discrepancy... knowing the difference between being a security consultant and a security contractor.  Unfortunately, the terms seem to be

...
Continue Reading...

Reflections on a Decade in the Security Consulting Business

Uncategorized Jul 20, 2020

 

Monday Security Memo

Intellectual firepower for security professionals

Reflections on a Decade in the Security Consulting Business

Exactly ten years ago today, July 20th 2010, my company, Security Management International, LLC was officially formed in the Commonwealth of Virginia.  At the time, I was a naïve 37-year old guy, who thought that I could take on the world.  I vividly remember standing on the balcony of my one-bedroom apartment in the city of Rosslyn that day, overlooking the Potomac River and the shiny white monuments of the Washington DC National Mall, and imagining what I could accomplish by the year 2020.  It’s amazing what a decade can do.  

Today, as I write this issue of the “Monday Security Memo,” I am sitting on the back porch of my waterfront home on the island of Siesta Key, Florida.  I’ve graduated from the rat race of city living to a more tranquil

...
Continue Reading...

Security Industry Stereotypes: Kooks, Cowboys & Conmen

Uncategorized Jul 13, 2020

Monday Security Memo

Intellectual firepower for security professionals

Security Industry Stereotypes: Kooks, Cowboys & Conmen

We are living in an era where even the mere mention of a stereotype is viewed as prejudicial.  While I will forego any debate on whether or not society may be going overboard with political correctness, there is one stereotype that I'd like to address... and that is the perception of security professionals.

Whenever I tell someone that I work in security, more often than not, they will respond with, "Oh, so you're like a security guard?"  While I like to think that my two Master's degrees, years of training within the Intelligence Community, working in over 100 countries, and consulting for two-dozen Fortune 500s qualifies me as more than a security guard, m

...
Continue Reading...

How to Be a Business Judo-Master

Uncategorized Jul 06, 2020

Monday Security Memo

Intellectual firepower for security professionals

How to be a Business Judo-Master

My senior year of college I took a Judo class.  I had already graduated early from Michigan State and had an extra year of eligibility remaining on my football scholarship.  As a result, I spent that year taking mostly elective courses that seemed interesting (and easy), such as scuba diving, football coaching, classic cinema and the ancient martial art of Judo.  

My Judo sensei was a tiny, 60-year old, Japanese-American man who was previously the head coach of the US Olympic Judo Team.  Suffice to say, he enjoyed using his oafish football player student (me) as his demonstration dummy to showcase each day's lesson.  At only 5 feet 6 inches, the sensei would deftly kick my 6'4" 2

...
Continue Reading...

Two Words That Keep Me Going

Uncategorized Jun 29, 2020

 

Monday Security Memo

Intellectual firepower for security professionals

The Two Words That Keep Me Going

I have been uniquely blessed to have had many tremendous mentors in my life... from my father, to my former coaches, to my previous bosses.  Like most people, I am always trying to capture any small nugget of wisdom, from people whom I respect, that can provide me with a competitive edge.  Because let's face it, life is tough and everyday we need to keep pushing ourselves - and our loved ones - forward.  

Playing for legendary college football coach Nick Saban, he would repeatedly tell my teammates and I, "Mediocre people don't like high-achievers and high-achievers don't like mediocre people."  This simple phrase has helped me to avoid getting caught up with the o

...
Continue Reading...

The Playbook: The Value of Process

Uncategorized May 27, 2020
 

Global security consultant, Luke Bencie, discusses the value of having a process to run your global consulting firm. 

Continue Reading...

SOTERIA: A Better Way to Conduct Vulnerability Assessments

Uncategorized May 26, 2020

A Better Way to Conduct Security Vulnerability Assessments

 Why is it that progress comes quickly in some areas of our lives and slowly in others?  Consider for a moment that we lived for decades with household items that did not evolve much and were simply viewed as utilitarian goods.  Think vacuum cleaners, thermostats, hairdryers, and coffee makers.  These were all mundane appliances, which could be found in any middle-class home across America since the 1950s.  Yet, these very same items have recently been reinvented and rebranded as luxury accessories (dare we say status symbols) that are priced several times more than their predecessor models.  Have we reached a tipping point where any product, especially those considered no-frills (even drab) can be “sexed up” and re-packaged as the exclusive must-have gift of the year?  The days of the $900 vacuum cleaner are upon us. And, while product evolution is pricey, it is also widely appreciated by those who utilize them to make their ...

Continue Reading...

Transit Systems - Logical Soft Targets

Uncategorized May 26, 2020

Transit systems are among the most vulnerable and visible targets in modern cities. Metros represent a lifeline in urban economy and are often symbols of a city’s vitality and identity. The London Underground is recognized all over the world, its images, logos and maps can be found throughout pop culture, on T-shirts seen in Los Angeles or Nigeria.  The New York City subway is likewise an emblem of the city’s place in the media. Yet, such systems also epitomize the concept of a soft target. A soft target can be defined as a critical asset that is highly vulnerable to (mostly terrorist) attack, often leading to the loss of life in order to emphasize/justify a political or ideological point of view.  Terrorists, gangs, vandals and other criminals have all been drawn to metro systems the world over. In the last decades, some of the highest-profile incidents of terror have taken place on transit lines, a trend that does not show indications of slowing.  

Ensuring that metros function effi...

Continue Reading...

Criminal Planning Cycle and Victim Selection Process

Uncategorized May 26, 2020

Criminal activity normally follows a predictable planning pattern as 90% of victim’s recall noticing suspicious activity prior to the crime. Understanding how criminals choose their targets, plan and deploy can assist bank executives in preventing a kidnapping for ransom or extortion situation before it begins. 

The first step is target selection; criminals typically select individuals who are vulnerable and unaware of their surroundings. These victims unknowingly display non-verbal cues and behavioral signals labeling themselves as oblivious to their surroundings. Indicators of a preferred victim include abnormal walking stride (dragging feet), slow walking rate, awkwardness of body movements, posture and even gaze.

Victim Selection Process

Prior to criminals conducting surveillance, they first select a target. Numerous studies and research has been conducted to understand how kidnappers, serial killers, rapists and other criminals select their victims. Besides the indicators menti...

Continue Reading...

The Role of Pre-Operational Surveillance in Terrorist Attack Planning

Uncategorized May 26, 2020

by Luke Bencie and Leo West

It should come as no surprise that the aspect of the terrorist attack planning cycle in which the terrorist is most easily detected, is that during the pre-operational surveillance of intended targets.  This “exposed” phase has been the downfall of many would-be terrorists and is usually credited as a key indicator of potential threats. It has also proven significant in post-attack investigations, where surveillance video has helped piece together the evolution of plots for use in assisting with future mitigation strategies.  

However, government officials are often reminded that the investigations of 9/11, the 2005 London Underground bombings, as well as of the 2008 terrorist attacks in Mumbai (just to name a few) all reported instances of “casing” prior to the event.  A good example is that of Ramzi Yousef who visited the World Trade Center (WTC) several times prior to his delivering the bomb to the complex on February 26, 1993. It’s known that he initia...

Continue Reading...
1 2 3 4 5 6 7
Close

50% Complete

Two Step

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.