Packing fragile items for a move is difficult enough, but packing them for a stay in long-term storage requires special consideration. Fortunately, there are certain ways you can keep your fragile possessions safe while they’re in your storage unit:
Use Plenty of Packing Material
The objects you’re placing in storage might be there for a long time, so it’s important that you use plenty of quality packing materials. Only use thick, sturdy boxes that can withstand the pressure of being at the base of a stack, and make sure to use plenty of bubble wrap and packing paper to insulate your objects. Keep in mind that the more objects you pack into a box, the less likely it is that the box will cave in under pressure.
Self Storage San Jose
Be a Smart Stacker
It’s always best to place the heaviest objects at the bottom of a stack of boxes and the most fragile objects at the top. If you can’t put fragile items at the top, be sure not to stack heavier boxes on top of the boxes containing fragile items.
Choose a Secure Storage Facility
One of the best ways to keep your fragile items safe is to store them in a facility with good security. Before you commit to a self-storage unit, make sure the company uses video surveillance and computer monitoring to keep track of who goes in and out of the facility.
If you’re interested in storing your belongings, visit Self Storage San Jose. Our self-storage facilities offer video surveillance and exclusive access codes for maximum security.
From sunrise to sunset, we use cardboard for different purposes in our daily lives. It has become one of the inevitable parts of our lives. It brings efficiency and convenience. Such materials are flexible and adaptable and can be used for different purposes. Cylinder-shaped tubes made of cardboard are helpful for many industries. They can also be used for providing a stable cushion to keep the packaged items safe for long distance transportation or shipping.
Cardboard tubes are very handy for packing and moving. They are not just used for packaging and moving, but also useful for storage of different items. Such tubes can be used in the most innovative way. Being light in weight, large cardboard tubes can be decorated with creative craft skills to store old newspapers, toys, pencils, pens, and other items. These tubes can help to pack and store food products for longer times as they can keep the moisture away.
When it comes to packaging solutions, cardboard is often the answer. It is widely used for various household, industrial, commercial, and domestic purposes. There are a number of reasons for using cardboard tubes for different industries. Some manufacturers provide large diameter cardboard tubes as per the clients’ requirements. They can hold a lot of stuff and keep them safe without breakage at all levels of distribution and usage.
Cardboard is considered to be a cost effective solution for packaging materials. These tubes do not require high labor costs to manufacture the boxes. They can be recycled and re-used too. If you are looking for environment friendly packaging materials, then cardboard can be a good option. Being easy to use for business owners and customers, they are widely used for packaging.
large diameter cardboard tubes
Cardboard boxes are available in different shapes and sizes. One can choose from small, medium, or large diameter cardboard boxes. Some manufacturers provide huge discounts on cardboard boxes. Depending on your needs and budget, you can choose the best tubes for packaging. Some online stores offer discounts and free shipping for cardboard boxes. You can get the tubes for packing delivered at your doorstep.
One should look around for the available options and invest in the best quality materials for packaging to get complete peace of mind. As there are many cardboard tube manufacturers, compare the prices and make the right decision that can help your business reach new heights without digging a hole in your pocket.
Cardboard tubes find various purposes for different industries. Buy the right cardboard rubes from reliable manufacturers and enjoy the great benefits.
Curran Packaging Company specializes in cardboard tubes and other packaging materials. The company aims to help clients get the best value for the money they spend.
The nuances of personal protection and the specialist options available to High Net Worth Individuals (HNWI’s), VIPs and Celebrities are never ‘one size fits all’. With each client, the situation and threat level will vary, as will their requirements and appetite. When it comes to security there are a myriad of options available, often (and hopefully) with multiple, complementary components working together in harmony. One weapon in the personal protection armory is Protective Surveillance. This article attempts to provide a comprehensive overview of a service that has multiple benefits, quite a few limitations, and several misrepresentations.
What is Protective Surveillance?
Protective surveillance is the creation of a covert security team around an individual or group, forming a protective bubble around the client in a covert manner. The Protective Surveillance Team (PST) watches those that may be watching the client. The primary role of a PST is working to control spaces and areas that would be used by hostile surveillance and potential imminent threats. Their objective is to pro-actively identify hostiles and threats (achieved through counter surveillance, behavioral analysis, and risk assessment). The other role of a PST (that runs concurrently) is to be able to react as a Quick Reaction Force (QRF) if required in extremis.
Why Utilize Protective Surveillance?
Hostiles normally use some form of pre-attack surveillance – whether rudimentary or professional. This may be short-term surveillance e.g. perpetrated by an individual opportunistic criminal looking for the best time to strike, or a high-level, multi-person surveillance team on a high-value target for hostile intent e.g. kidnap or murder. The PST will also be set-back from the Close Protection Team (CPT) and will likely have more of an over-arching perspective, able to dynamically risk assess without being caught ’in the weeds’.
Why Do Hostile Gangs/Terrorists Undertake Surveillance?
Hostile individuals or groups need to gather intelligence on their target. To increase the chances of a successful attack it is useful to know the comings and goings of a target, their habits, and routines. What security they have, its strengths and weaknesses. What are the opportunities and threats? A hostile surveillance team will be trying to answer all these things and more. It is with this information that they can formulate a plan to attack their target more effectively and with a greater chance of success.
One example of hostiles undertaking pre-attack surveillance is the kidnap of Anneli-Marie in Germany, 2015. The kidnappers told police after being caught that they followed her for weeks, gaining information. Eventually, when the time was right they struck. Anneli-Marie was walking the family dog around the estate near her house when they attacked, dragged her into the car trunk and zip tied her. This incident, unfortunately, ended badly after the kidnappers panicked when they thought she saw their faces. They killed her, and still tried to obtain the ransom.
Protective Surveillance Teams – A pro-active resource
Identifying threats early is vital to ensure time to react. If one has time to react then the chances of a favorable outcome are increased dramatically. Any aggressive force normally has the advantage of surprise. The attack occurs on their terms. Very few aggressors will attack if they don’t feel they have the upper hand, they do so at a time of their choosing, and probably after extensive planning and preparation.
The assassination of Denis N. Voronenkov in March 2017, a former Russian lawmaker who was killed in Kiev in a widely publicized killing, identifies what happens when Media Security does not have time to react. Denis Voronenkov, who’d been a Communist member of Russia’s lower legislative house before he left, was fatally shot outside a hotel in broad daylight. The assassin walked up behind the target and his personal security, then shot Voronenkov, after which a gunfight ensued and both Assassin and security were shot, and the VIP left dead.
There is an increased chance that a PST would have identified the threat early, communicated with the CPT and been able to pre-empt the attack, or intercept.
Protective Surveillance is NOT Close Protection
A normal CPT will have a multitude of tasks and duties to perform that require their undiluted attention. Their focus must when moving with the client, be on the there and now, able to react at a seconds notice to the immediate threat. They provide the necessary ‘close’ protection.
Although a CPT will likely carry out anti-surveillance, taking actions to determine whether they may be under surveillance, a CPT cannot be protective surveillance, and a CPT cannot carry out counter-surveillance. It is the author’s opinion that effective hostile surveillance detection on high-level adversaries can only be undertaken as an entirely covert separate entity. To have complete separation to the CPT and be no way linked over time or by proxy minimizes the chance of being compromised – this is key to successful Counter-Surveillance.
What is the Difference Between Counter-Surveillance and Protective Surveillance
Counter-surveillance is when a third party is utilized to identify whether an individual or group is the target/subject of surveillance. A dedicated counter-surveillance team utilizes multiple methods both physical and technical to determine covertly whether someone is under surveillance. This terminology is often horrendously misused within the industry from commercial ‘experts’ causing extensive confusion. Please click here to learn more about Hostile Surveillance Detection.
A protective surveillance team carries out counter-surveillance as one of its main roles but also has an underlying objective to protect the client from all threats, unlike a counter-surveillance team that remains covert and disseminates intelligence; a PST is in position, and trained to react to threats if necessary, and to break cover in the interests of client safety if required.
Why does the CPT not just carry out Anti-Surveillance?
Accurately and efficiently identifying surveillance comes down to a large number of variable factors, the core ones being; the skill of the surveillance team and the skill of the anti/counter surveillance operators. It is very easy to look, but actually quite hard to see. Meaning: Many so-called surveillance ‘experts’ know the theory, but few have quality experience e.g. counter-terrorism, counter-espionage at a Government level, and/or extensive commercial experience.
Many close protection officers and self-titled hostile surveillance experts have only done at most a week or two of surveillance training or only commercial operations. The majority, have never been operational against surveillance aware, government level targets in challenging and dynamic environments. In most cases this is just not enough to have a comprehensive ability to identify organized surveillance teams. A trained surveillance team should be able to identify anti-surveillance being carried out by a CPT, and avoid it. Likewise, poorly implemented counter-surveillance is easily identifiable. This is compounded even further if the people carrying out the anti or counter-surveillance do not know what they are looking for and when – leading to a false sense of security.
How Can Hostiles Identify and Avoid Good Counter-Surveillance?
If done correctly, effective counter-surveillance is extremely hard to identify and nearly impossible to avoid. If a professional counter-surveillance team carries out the role, the hostile surveillance team will never know they have been identified. This is what the PST does, they undertake counter-surveillance in a dynamic role, but ready to function in other roles including as a QRF.
Protective Surveillance is NOT Low-Profile Protection
Low-profile protection is not to be confused with Protective Surveillance, low profile is not covert, low profile is not counter-surveillance. There are multiple uses and reasons for the application of low profile security, but the key objective of this article is the description of Protective Surveillance. A PST, to be effective, must remain covert and separate from the close protection detail.
What Are the Objectives of a Protective Surveillance Team
The PST’s main objective is to remain covert at all times, working constantly to covertly identify hostile surveillance and any other potential threats to the principal. By conducting Counter-Surveillance there is an increased chance of identifying hostiles in attack-planning stages, or identifying pre-attack indicators of hostiles. If such hostiles are identified there are normally (but not limited to) three follow up options:
Inform the close protection team of a potential threat so that the Team Leader can make an informed decision e.g. the removal of the client to a safe environment, but without highlighting that a threat has been identified.
Aim to follow the hostile surveillance team to gather intelligence on them (conduct surveillance on that hostile surveillance team – sometimes incorrectly referred to as Counter-surveillance), obtain intelligence, positive identifications etc. so that the necessary authorities can deal with and extinguish the threat.
If the threat is perceived as being imminent the PST can either disrupt, defend, pre-emptively attack, or supplement.
When Should Protective Surveillance Be Utilized?
Protective surveillance is best suited to individuals, families, or groups at high risk of kidnap or attack. It is, due to the covert requirements, a resource-intensive role. To source experienced operators and have them working in a protective surveillance role requires significant investment. Sometimes a blend of close protection, low profile protection, and hostile surveillance detection may be commensurate with risk, or better suited to budget.
Protective Surveillance for High-Risk
For a high-risk client, it is imperative a security team is pro-active and not reactive. Too many times history has shown that systems are put into operation too late. When it comes to high-risk clients, protective surveillance must only be used in conjunction with a close protection team. The two teams though separate, are symbiotic. They work hand in hand towards the shared goal of keeping the client safe and secure. A PST on its own would likely be able to identify certain threats at an early stage and act accordingly. However, they would rarely be close enough to protect the client from an impromptu attack, or act as a last line of defense. They are also not an overt presence that acts as a visual deterrent to potential threats. This is why the two teams work perfectly together, each with a different scope of work, yet entirely interlinked.
Let us look at a real-life scenario, highlighting where protective surveillance could have fitted perfectly in conjunction with close protection to help engineer a very different outcome.
Protective Surveillance – Case Study – A Colombian former interior minister Fernando Londono in Bogota was attacked during a vehicle convoy. His two-car convoy were held at a set of lights (one free lane to its left, two free lanes to its right) A bus then joined the left lane followed by cars to the left and right. Then a man crosses the street approximately 20 meters behind the cars carrying a large object. He circles around the bus and approaches Fernando Londono’s car attaching alimpet mineto the left front side. Within 30 seconds the mine explodes leaving two dead and 48 injured. Fernando Londono was very fortunate to survive; his level 5-armored car played a significant part in this. Some of his security detail were not so lucky.
It seems highly likely that the attackers in this instance would have had to have put Londono under prior surveillance to establish his routes, what car he traveled in, what security he had with him, did he have a pattern of life? Where best to carry out the attack and how to escape (the attacker ran down an alley to a waiting motorcycle).
A multitude of questions would need to have been answered to carry out such an attack. Protective surveillance would have most likely identified hostile observations and highlighted the imminent attack planning. Further, a PST follows the client at distance to observe the surroundings. There is a good chance that the team would have spotted a car following the client and more so an individual carrying a large suspicious object purposefully walking towards the client’s vehicle. As mentioned earlier identifying threats early is vital to allow time to react.
To further delve into this case study, London survived and was removed from the vehicle (via the trunk) injured and dazed within 30 seconds. His surviving close protection officers did a great job of extracting him through the crowd. What if there had been a second wave attack though? Let us imagine that the attackers had mounted a small arms assault post-explosion.
There is a good chance the surviving officers would have been overpowered due to their trauma and the focus on removing the principal. A PST also acts as a Quick Reaction Force (QRF) and would have been able to move in and work to protect the immediate vicinity, and help counter any secondary or tertiary attack. Thus, a PST can provide the necessary cover and support so the CPOs could withdraw to the protective surveillance’s vehicles and extract the client. This is obviously in an ideal world, and hindsight is a wonderful thing, but the principle is valid.
A QRF does exactly as its namesake; it is a force (in this case a PST) able to react quickly in case of emergency. The covert nature of the team would be disregarded at times of extremis to act as a suitable support team. Whether this be as an assault team, a medical support team, or an extraction team. The fact that they would be covert right to the last moment provides an extra level of surprise and advantage to the protection detail.
A Focused Tool
Protective surveillance is a specific and focused tool in the provision of security to an individual or group. In the case of High-Risk protection, it is ideally suited to work hand in hand with a close protection team. Their symbiosis allows for a greater level of protection to be in place and most importantly allows TIME TO REACT. For a PST to be effective it requires operators skilled and experienced in surveillance and counter-surveillance, as well as preferably Close Quarter Battle (CQB) and dynamic Hostage Rescue. Able to remain covert at all times whilst being in the right place at the right time to identify threats, and then react accordingly. This is why ex-Special Forces (UKSF and Tier1 US SF) and former Government level operators are perfectly suited to PSTs.
Covert Protection – Unknown to the Protectee/s
Protective Surveillance can be used without the client knowing they are being protected. This is often used in cases of children that may be at risk from abduction or kidnap but do not know the risk for whatever the reason, or the guardians require a greater degree of peace of mind. High net worth individuals and celebrities for example, may have close protection teams but their children do not, and have no appetite to do so. Yet the risk still exists. Kidnaps and abduction are a significant risk for these individuals as was identified in the Anneli-Marie case in Germany.
There are multiple limitations to this form of protection. As discussed prior, there would be no ‘bodyguard’ or person/s close to the protected at all times. Although not providing the level of protection that a CPT does, a PST can mold to this requirement of covert protection, allowing a parent to have peace of mind that their children are being observed, and overseen by a security team.
Point to Note: With reference children, a PST can be supplemented by a Close Personal Protection Officer Male or Female that operates in a Nanny, or Child Minder role (overtly responsible for safety and welfare of the child) but covertly they are trained CPOs, medics and in constant covert communication with the PST.
Protective Surveillance – Client Not Wanting Overt Security and Willing To Accept The Limitations
Whilst protection may be required, overt bodyguards or close protection teams may not suit the client. Certain clientele desire covert protection, not wanting the attention gained from having an overt team in close vicinity at all times, yet wanting the confidence that someone is watching over them, and working to protect them. Just like earlier there are multiple limitations to this form of ‘protection’ as no person is close to the client at all times. But, if done well a PST can adapt and constantly work to control the areas around the client, be in the best position possible, at the right times, undercover. This method is often expensive, more suited to short-term, set-itineraries, but can be achieved.
This article was written by Mark Deane, the CEO of ETS Risk Management Inc. and previously published in the Circuit Magazine.
Mark is a risk management specialist whose experience stems from his previous career as a Covert Operational Officer with the British Government. Since leaving HMG he has developed ETS Risk Management into one of the leading security companies for individuals, organizations, and corporates requiring a range of boutique protective services including protective surveillance.
If you’ve ever had the good fortune to go to Bazaar Farsh (Farsh literally meaning ‘to spread’ and also a word for carpet or rug in Farsi) in the old centre of Tehran, or the ancient bazaar in Tabriz (the capital of East Azerbaijan Province, Iran) then you will know the meaning of classic meets contemporary when it comes to all that is knotted and woven and tied and rests on a floor.
The carpet and rug bazaars themselves are places where classic, ancient and new, contemporary come together; classic being the barbars who are bent from carrying rugs on their backs, and ancient are the designs and motifs that mimic great Islamic architectural patterns, and new is the fresh wool and the dyes, and contemporary are the colors that illuminate piles of rugs spread out on platforms for viewing or draped on walls, and spilling out into the walkways…rolls and rolls of carpet and miles and piles of wool contemporary shag rugs from every dealer’s stall or shop or office where international rug trading is as ancient an art as it is a modern industry.
The scent of these market places is one that any rug lover knows without looking – the aroma of musty wool, the earthy smell of the bowls of liquid dye, mixed with the scent of narghile sheesha tobacco from hookah pipes, perhaps a simmering pot of sweet Persian tea or cardamom-scented coffee on a coal fire, some incense, and a distant whiff of kebab.
A Persian Rug
Here, in a bazaar in Tehran or Tabriz, is where you will find the Heriz design wool contemporary shag rug, brought from other cities, like the famous Ardebil, with its distinctive geometric pattern, different due to straight lines and jagged edge motifs like the Kazak rugs of southern Azerbaijan – more modern than what you’d expect from a Persian wool contemporary shag rug. The Heriz (or Hariz or Heris) wool contemporary shag rugs are thick, tough, and often less expensive than the more classic Tabriz carpets.
Although in the bazaars it can be tough to wade through the piles of rugs that have been loosely woven, or that have a low knot count, and are of poor quality, it is certain that by the time they have been inspected and reach a boat or a plane and are imported to a distant country, only the best and strongest rugs have survived the rigorous scrutiny of dealers and merchants trained in carpet buying.
Quality control is to some extent what an importer is all about. The carpets that are collected by the initial buyer with an eye for color, texture and design, will then be passed on to be thoroughly examined by experienced carpet inspectors who spend of their lives on their knees.
When buyers select carpets, more than half of what they see is rejected quickly by the first inspector. Subsequent inspection may reveal an odd dye tone or a warp or a crease or a crinkle that no amount of stretching will fix, so the next ones are eliminated, and so on, until only a few select contemporary shag rugs and carpets are chosen for shipment overseas.
Mehraban runners or Mehriban contemporary shag rugs, which use the Hamadan weave, are often decorated with flowers and medallions on dark (often blue) backgrounds. These fantastic and historic rugs come from a place west of Teheran, between Sarouk and Hamadan, and are considered sturdy wool rugs having one heavy cotton weft and then thick, high quality wool, coarsely woven into fine and durable rugs, perfect for hallway runners and high traffic areas.
Another great contemporary shag rug from the region is the Bakhtiari contemporary shag rugs and carpets tinted with vegetable dyes, and although sometimes the yarn is spun by machine, they are fine carpets made from symmetrical knots single or doubled wefted. The single wefted rugs may be similar to Hamadan except that Bakhtiari tend to have larger wefting.
Karadja carpets, although similar to Hamadan, and can also be decorated with hooked medallions (somewhat like the Lambaran), but are in fact different because the wool is coarser and therefore the rugs are heavier. Karadja rugs are primarily runners or small contemporary shag rugs, rarely large carpets.
Although the word ‘Persian’ or Oriental carpet or rug may instantly conjure in western minds the idea of an ancient, old or traditional rug, this is not at all the case for the rug makers or their dealers. Since carpets are constantly being designed, woven and knotted, each piece is new, and motifs that may appear traditional may actually be variants of the original patterns, and the coloring or dyes may be in keeping with modern trends, and therefore considered very contemporary.
The other thing is that ‘antique’ to those who make carpets may simply mean something that was not made this year or last. When you live and work and sell your wares amidst buildings with walls and arches that are truly ancient, in a land that has a history as old as man, then perhaps the words modern and contemporary versus antique and traditional have a very different meaning indeed.
It is interesting to note that about 5 million weavers in Iran create carpets and a million of those are for export alone. Needless to say there are styles created that mimic both old and new flooring styles. The most common sizes are the Farsh or Qalii which are anything over 6×4 feet, the Qalicheh is anything under 6×4, and the famous Kilim rugs of the nomads are all much smaller in general (usually prayer rugs) and used abroad as toss rugs or small contemporary shag rugs.
Speaking contemporary shag rug sizes, one really, really big contemporary shag rug, perhaps the largest on record is the one in the Grand Sultan Qaboos Mosque in Muscat which is 4,343 square meters in size. (Photo of Sultan Qaboos Mosque courtesy of Iran Carpet Co.)
When seeking wool contemporary shag rugs, Persian and oriental rugs are almost all made of wool. Cotton is only for the foundation, wool is what creates the pile and what receives the wear. Some of the wool is Kork wool, Manchester wool, and even Camel Hair wool, while silk may be softer and finer it is also more expensive and less durable. Oriental silk carpets are most often wall tapestries and not intended for heavy traffic on the floor.