post

WHEN “THINGS HAPPEN” IN EXECUTIVE PROTECTION

WHEN “THINGS HAPPEN” IN EXECUTIVE PROTECTION

My favorite quotation as a protector is “It is my job to be president of France, it is your job to allow me to do mine” spoken by former president of France Charles de Gaulle to his security chief when his security chief told the president of a potential threat and to change his itinerary for an event he was to attend.

As I have told members of my security teams and to students the client dictates the parameters of their protection it is our job to allow the client to do his job.

read more WHEN “THINGS HAPPEN” IN EXECUTIVE PROTECTION.

post

Corporate Security – Advance Work – Executive Protection

post

U.S. development and use of robotic weapons troubles U.N. – National Law Enforcement

In a report released on Tuesday by a non-governmental agency (NGO) that monitors human rights, the United Nations is urging the United States to cease its development and use of what the U.N. special rapporteur terms "fully autonomous robotic weapons" by the military and law enforcement agencies.

via U.S. development and use of robotic weapons troubles U.N. – National Law Enforcement | Examiner.com.

post

Smartphone Theft: What You Can Do To Stop the Rise

Recent statistics from London’s Metropolitan Police suggest that 70 per cent of all personal crime is mobile phone theft, and the Office of National Statistics ONS reports that it’s the only crime in the UK that’s actually on the rise.

read more Smartphone Theft: What You Can Do To Stop the Rise.

post

New Android Trojan App Found – Mobile Security

You dont need to look too far to find evidence that Android is currently at the top of criminals mobile hit list. A simple web search of “Android Security” will produce more than enough results to indicate the scale of the issue. But if any reminder was needed, a newly detected trojan comes as a stark reminder.

more New Android Trojan App Found – Mobile Security.

post

Keyloggers Come to Smartphones – Mobile Security

In the armoury of the cybercriminal, a variety of weapons sit waiting to be used. For more traditional desktop systems, keystroke logging or keylogging is a method that has been around for some time. But with the current drop in sales of PCs, and the strength of mobile devices, it should be no surprise that keystroke logging is capable of making the switch to the mini computers many of us carry in the form of a smartphone or tablet.

via Keyloggers Come to Smartphones – Mobile Security.

post

Failed assassination attempt of Russian CEO caught on camera VIDEO

A Russian news agency, released surveillance video today of an attempted assassination of a St. Petersburg businessman.

via Failed assassination attempt of Russian CEO caught on camera VIDEO.

post

10 Assumptions that Compromise Mobile Security

Assumptions can cause trouble in all walks of life, but particularly so when it comes to mobile device security. Many of us fail to take precautions against threats and the loss of our smartphones or tablets, only to regret it later on. So, to improve the security of your device and data, here are the ten assumptions you should avoid making.

read more 10 Assumptions that Compromise Mobile Security – Mobile Security.

post

Houston neighborhood turns to private security firm for protection

A Houston-based company with offices in London and Dubai that helps protect cargo ships from pirates is now helping a southwest neighborhood protect itself against common thieves.

read more Houston neighborhood turns to private security firm for protection www.privateofficer.com | PRIVATE OFFICER NEWS NETWORK.

post

AFP: N. Korea approves nuclear strike on United States

SEOUL — North Korea dramatically escalated its warlike rhetoric on Thursday, warning that it had authorised plans for nuclear strikes on targets in the United States."The moment of explosion is approaching fast," the North Korean military said, warning that war could break out "today or tomorrow".

read more AFP: N. Korea approves nuclear strike on United States.