|
|

In over 20 years of working within the Intelligence Community, as well as the private security industry, I have come across many misconceptions about my profession. On the intelligence side of the house, there is an obvious misconception that spies drink martinis, travel to exotic locations, and engage in adventures similar to that of James Bond. When in reality, the majority of intelligence officers (myself included) prefer a smooth scotch, travel to some real "armpits" of the world, and honestly spend more time typing reports than Miss Moneypenny.
When I transitioned into the private security world, I also found a major discrepancy... knowing the difference between being a security consultant and a security contractor. Unfortunately, the terms seem to be
...
|
|

Exactly ten years ago today, July 20th 2010, my company, Security Management International, LLC was officially formed in the Commonwealth of Virginia. At the time, I was a naïve 37-year old guy, who thought that I could take on the world. I vividly remember standing on the balcony of my one-bedroom apartment in the city of Rosslyn that day, overlooking the Potomac River and the shiny white monuments of the Washington DC National Mall, and imagining what I could accomplish by the year 2020. It’s amazing what a decade can do.
Today, as I write this issue of the “Monday Security Memo,” I am sitting on the back porch of my waterfront home on the island of Siesta Key, Florida. I’ve graduated from the rat race of city living to a more tranquil
...
|
|
|
||||
|
|
|
|
||||
|
|
Global security consultant, Luke Bencie, discusses the value of having a process to run your global consulting firm.
A Better Way to Conduct Security Vulnerability Assessments
Why is it that progress comes quickly in some areas of our lives and slowly in others? Consider for a moment that we lived for decades with household items that did not evolve much and were simply viewed as utilitarian goods. Think vacuum cleaners, thermostats, hairdryers, and coffee makers. These were all mundane appliances, which could be found in any middle-class home across America since the 1950s. Yet, these very same items have recently been reinvented and rebranded as luxury accessories (dare we say status symbols) that are priced several times more than their predecessor models. Have we reached a tipping point where any product, especially those considered no-frills (even drab) can be “sexed up” and re-packaged as the exclusive must-have gift of the year? The days of the $900 vacuum cleaner are upon us. And, while product evolution is pricey, it is also widely appreciated by those who utilize them to make their ...
Transit systems are among the most vulnerable and visible targets in modern cities. Metros represent a lifeline in urban economy and are often symbols of a city’s vitality and identity. The London Underground is recognized all over the world, its images, logos and maps can be found throughout pop culture, on T-shirts seen in Los Angeles or Nigeria. The New York City subway is likewise an emblem of the city’s place in the media. Yet, such systems also epitomize the concept of a soft target. A soft target can be defined as a critical asset that is highly vulnerable to (mostly terrorist) attack, often leading to the loss of life in order to emphasize/justify a political or ideological point of view. Terrorists, gangs, vandals and other criminals have all been drawn to metro systems the world over. In the last decades, some of the highest-profile incidents of terror have taken place on transit lines, a trend that does not show indications of slowing.
Ensuring that metros function effi...
Criminal activity normally follows a predictable planning pattern as 90% of victim’s recall noticing suspicious activity prior to the crime. Understanding how criminals choose their targets, plan and deploy can assist bank executives in preventing a kidnapping for ransom or extortion situation before it begins.
The first step is target selection; criminals typically select individuals who are vulnerable and unaware of their surroundings. These victims unknowingly display non-verbal cues and behavioral signals labeling themselves as oblivious to their surroundings. Indicators of a preferred victim include abnormal walking stride (dragging feet), slow walking rate, awkwardness of body movements, posture and even gaze.
Victim Selection Process
Prior to criminals conducting surveillance, they first select a target. Numerous studies and research has been conducted to understand how kidnappers, serial killers, rapists and other criminals select their victims. Besides the indicators menti...
by Luke Bencie and Leo West
It should come as no surprise that the aspect of the terrorist attack planning cycle in which the terrorist is most easily detected, is that during the pre-operational surveillance of intended targets. This “exposed” phase has been the downfall of many would-be terrorists and is usually credited as a key indicator of potential threats. It has also proven significant in post-attack investigations, where surveillance video has helped piece together the evolution of plots for use in assisting with future mitigation strategies.
However, government officials are often reminded that the investigations of 9/11, the 2005 London Underground bombings, as well as of the 2008 terrorist attacks in Mumbai (just to name a few) all reported instances of “casing” prior to the event. A good example is that of Ramzi Yousef who visited the World Trade Center (WTC) several times prior to his delivering the bomb to the complex on February 26, 1993. It’s known that he initia...
50% Complete
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.