AGLOSS in charge of Security of the Euro-African International Forum

AGLOSS in charge of Security of the Euro-African International Forum

Today the agreement with the Euro-African International Forum has been signed. To jointly promote training, research and service projects in Africa, Europe and Latin America.

Also the collaboration agreement of OISCOT International Observatory of Global Security with the International Organization for Human Rights.

Lines of action will be designed between international institutions and organizations such as the UN, the European Commission, the African Parliament.

As well as the appointment of Mr. Jesús Sevillano, Director of AGLOSS as responsible for the coordination of security and intelligence of the Forum.


AGLOSS carries out a high-level international training and training course in defense and security in Colombia


Through the institutional agreement that we have with Globalock, our strategic partner for Colombia and Latin America, with regard to training and international tactical and operational training. The Agloss High Performance Center was opened in Colombia: We work in the Guarne region.

We conducted defense and attack training, above all, tactical-operational, with the participation of Special Operations Forces made up of Colonels, Majors, Captains, Lieutenants, from the Colombian Armed Forces and Police, from special detachments such as GAULA (Grupos de Acción Unificada for Personal Liberty), whose role consists of directing, organizing, supervising, evaluating and advising the National Police in the different investigations and operations that they carry out, in accordance with current legal regulations. Other detachments and units of the Colombian Police and Armed Forces participated.

With these military and police forces we worked on physical conditioning, tactical training, introduction to our A.V.A.© protocol (Armed Violent Attacks) where we practiced various methods of entering buildings.

In addition, in Guarnes, a farm of many hectares, we made trips in squadrons, towards distant geographical points where the troops had to learn to orient themselves, locate them and arrive.

We also work intensively on the various forms of confrontation in rural areas.

One of the days was also assigned to the training, management and operation in the use of short arms for different groups of businessmen, who came to learn about our work and, incidentally, get trained as they are high-status businessmen in the area.


Psychological warfare and propaganda as direct action



Psychological warfare, has been an ancient practice that has been used since the strategy exists, this consists of the set of actions intended to morally, emotionally or symbolically destroy the opponent within the framework of a confrontation. 

Great warriors and combatants knew how to subjectively undermine the enemy producing strategic advantages.


Psychological warfare has been a millenary practice that has been used since the strategy exists, this consists of the set of actions designed to destroy the opponent morally, emotionally or symbolically in the framework of a confrontation.

Great warriors and combatants knew how to subjectively undermine the enemy producing strategic advantages.


Starting from the famous work The Art of War, which has since been a classic manual for combatants. The Chinese strategist Sun Tzu Sun proposed precisely the idea of defeating the enemy in war without firing a weapon.

Wars, institutional battles or corporate conflicts are not won only at the barricades, or with sophisticated systems; they must also be won in the minds of the people. Combining the elaboration of a good strategic plan, which must later be developed through appropriate tactics.

Psychological warfare is about impressing the enemy to reduce his chances of success. On the one hand, trying to paralyze the adversary, defeating him before he even enters a fight and, on the other hand, winning the "minds and hearts" of the people who act in third place.

Own source 

Later psychological warfare took the form of propaganda. War propaganda has been one of the main "weapons" that has been available since ancient times. Propaganda has served to create, reinforce or modify the opinions and actions of people, from the first civilizations to the current postmodern society.

Undoubtedly, the use of political propaganda came of age with the First World War. From then on he would experience an extraordinary development.

In general, psychological warfare is understood as propaganda and deception through the media. However, it is about something much broader. It is a war that combines political, economic, cultural and military aspects.


The current wars begin to be waged in the sphere of ideas and feelings, almost simultaneously in the field of the national public opinion of the aggressor, in the international arena and in the country that will be the object of the aggression, to later move on to their conjunction. with the armed struggle and accompany it throughout the duration of the conflict, overlapping in such a way that it is sometimes difficult to discern how much military or psychological purposes a military action pursues.

We talk about how the message you want to get across can be manipulated and distorted to cause the sender to have a confused perception of what may really be happening. The information is released by a channel or medium that makes this change in order to establish an appreciation in the different issuer.

Persuasive measures that are conceived in order to influence the attitudes, opinions and behavior of the opposing forces, with the purpose of achieving national objectives. Likewise, it is always important to take into account two elements closely linked to propaganda activity: censorship (control of the flow of information) and disinformation (what we currently call "fake news").

Strategically today, manipulation is used to reach a profile, thus being able to convert thoughts and ideals for a cause. The support of campaigns against a type of personal or institutional profile.

These resources are useful and help to mobilize masses in one direction or change the course already established. 


Risk assessment tools for radicalization (I)


Photo Markus Spiske in Unsplash


Risk assessment tools. Under the definition of risk of violence, the tendency of a person to commit antisocial or criminal behavioral acts is established, in short, to predict dangerousness. The objective of the analysis is to establish the content of the risk assessment tools for radicalization under the methodological use of a bibliographic review of professionals in the field at an international level.

Words key:

Extremism violent. Tools of assessment of risk. Dangerousness. radicalization. Religious terrorism.


Under the definition of risk of violence, the tendency of a person to commit antisocial or criminal behavioral acts is established, in short, to predict the dangerousness. The objective of the analysis is to determine the content of risk assessment tools for radicalization under the methodological use of a literature review of professionals in the field at international level.


Violent extremism. Risk assessment tools. Dangerousness. Radicalization. Religious terrorism.


It is not the purpose of this analysis to establish a distinction between risk of violence and dangerousness, for the purposes of our study it is affirmed that they are correlated, since the risk of violence has the purpose of determining the tendency that a person has to be dangerous in the future. Simultaneously, both risk factors and protective factors will be taken into account, that is, those that favor the commission of the criminal act and those that reduce the probability of recidivism of the criminal subject, respectively. It goes without saying that we are dealing with a construct that offers degrees of probability, offering an advantage and a drawback, namely:

  1. Advantage: There are subjects who are only, and solely, dangerous for a specific type of victim.
  2. Inconvenient: the dichotomous answer (yes or no) raises the possibility of missing relevant information that affects the trend and prediction of future criminal behavior.

In the field of terrorism, there is talk of radicalization, but not all radicalization leads to terrorism. Although we can establish a risk of violence, a prediction1 based on the conduct and behavior of a subject who is 'suspected' of his future dangerousness as 'presumed religious terrorist'.

Without delving into whether we are dealing with a relative risk or an assumable risk, one of the risk assessment tools for radicalization will be analyzed below. Although the reader is made to know that it is not the only one, among the list we find2 the Guide to Extremism Risk, the Islamic radicalization, The Identification of Vulnerable People, Multiple Levels, among other. All of them put into practice in different countries, none at the national level. Here the use of risk assessment tools for radicalization is null, we only found a protocol for a preventive radicalization strategy for terrorism towards those who are serving their custodial sentence in prisons.

The Violent Extremism Risk Assessment is briefly discussed below:

The method Violent Extremism Risk Assessment (VERA), of Canadian origin (2009) is the first protocol designed to determine the risk assessment of terrorists; it has been put into practice on convicted terrorists, after its application the deficiencies have been determined and the appropriate revisions have been carried out, thus, in 2010 it gave rise to VERA-2 and, in 2016, to VERA-2r, identifying itself, in In the latter case, additional relevant and applicable motivational indicators for violent radicalization in men, women, and youth.

The method is applied in different European countries, among which Spain is not found, it is also applied in North America, Australia and Southeast Asia in a

variability of environments, that is, in radicalization, but it does not have to be religious terrorism, but in a context of extremism and violent radicalization, regardless of ideology.

In the context discussed here, this tool has been used for convicted religious terrorists and for foreign terrorist fighters and their families who have returned from fighting and being part of terrorist organizations.

The assessment tool assesses a subject's risk of beliefs, attitudes, and ideology related to violent extremism, as well as context, social intent, history and ability, subject commitment, and motivation. In short, it allows the planning of risk scenarios and trace risk routes and allows its application on militants of groups of organizations and lone actors. Refining the issue further, indicators are established under contrasted theoretical aspects:

  1. Violent extremism and terrorist groups3
  2. Moral disassociation
  3. Lone actor
  4. Mental disorders

It is made up of 5 domains and 34 indicators, plus 3 additional domains with 11 indicators.4:

  1. Beliefs, attitudes and ideology. Very important to identify the nature of extremism.
  2. History, action and capacity. Relevant to determine what is the capacity of the subject to plan and carry out an extremist action. Also, because it identifies the capacity that the subject could have regarding access to materials, resources and his abilities.
  3. Commitment and motivation. The indicators indicate individual motivations and drivers of extremist and radical behavior. It allows to differentiate the motivated subject from the opportunist.
  4. Risk protection and mitigation. Identify the positive changes of the subject in the short and long term.
  5. Intention and social context. Identifies psychosocial risk factors.
  6. Additional indicators. Collected under the domains of criminal history, personal history and mental disorder.

A summary table of some of the items is established below:

Beliefs, attitudes and ideology

1. Commitment to an ideology that justifies violence
2. Perception of being victims of injustice
3. Dehumanization of selected targets and associated causes of injustice
4. Rejection of society and democratic values
5. Feeling of hate, anger, frustration, persecution, in relation to alienation
6. Hostility towards national identity
7. Lack of empathy and understanding towards those outside the group itself

History, action and capacity

8. Early exposure to or confrontation with a violent militant ideology
9. Network of family and friends involved in violent actions
10. Criminal record for violence
11. Tactical, (para)military and/or explosives training
12. Training in extremist ideology in your own country or abroad
13. Access to finance, funds, resources or organizational skills

Commitment and motivation

14. Legitimization of violence and murders for a higher cause (obligation religious, glorification)
15. Criminal opportunism
16. Commitment to the group, ideological group membership (camararía)
17. Moral obligation, moral superiority
18. Motivated by excitement and adventure
19. Participation. Forced participation in violent extremism
20. Estatus, rol
21. Striving for meaning (of life)

Protection and risk mitigation

22. Reinterpretation
23. Rejection as a means to achieve goals
24. Changing definitions
25. Participation in counter-extremism programs
26. Support for non-violence
27. Support for non-violence from relatives or important people

Intention and social context

28. Interested party
29. Identified objectives
30. Contact with extremists
31. Expressed intention to act for a reason
32. Expressed will or willingness to die for a cause or belief
33. Planning
34. Suggestible, susceptibility

Source Own production from Violent Extremism Risk Assessment

1 Monahan, J. (2018). Predictions of violence. In T. Grisso & S. L. Brodsky (Eds.), The roots of modern psychology and law: A narrative history (pp. 143). New York, NY: Oxford University Press

2 Borum, R. (2015). Assessing Risk for Terrorism Involvement. Journal of Threat Assessment and Management. 2(2), 63-87; Flockton, J. (2011). International Developments in Extremist Violent Risk Assessment and Management: Professional Development study trip to Canada 13-27 June 2010. Australasian Journal of Correctional Staff Development. 1-6.

3 Sageman, M. (2008). Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia: University of Pennsylvania Press

4 The original risk assessment tool consisted of 5 domains and 31 indicators.

5 Pressman, D.E., Duits, N., Rinne, T., Flockton, J.S. (2016). VERA-2R: A structured professional judgment approach. Utrecht: Nederlands Instituut voor Forensische Psychiatrie-Psychologie; Pressman, D.E. & Flockton, J. (2012). Calibrating risk for violent political extremists and terrorists; the VERA 2 structured assessment. The British Journal of Forensic Practice. 14(4), 237-251.


Fire Sale Attack: the biggest threat facing Peru in the 21st century | Pablo Bermudez


Photo Markus Spiske in Unsplash

The Fire Sale is an all-out cyber warfare attack that performs a systematic three-stage attack on an entire nation's computing infrastructure. The hackers called it the Fire Sale because "Everything must go" analogy to auctioning off products in a store that survived a fire. 

The greatest vulnerability to a terrorist attack for Peru today is a Firesale-type cyberterrorist attack that would sow chaos, and generate incalculable costs in lives and money. There would be a Peru before and after such a devastating attack.

A Firesale is a cyber attack that can bring a country to its knees consisting of three stages of attack on a country's IT infrastructure:

  1. First: Make all transport systems inoperable, such as traffic lights, railways, subways and airport systems, 
  2. Second: Disable financial systems (stock exchanges, banks and financial houses),
  3. Third: Making public utility systems, such as electricity, gas, satellite, and telecommunications, inoperative. 

This type of threat is not a fantasy, it is real and Peru (and by the way, most developing countries) is extremely vulnerable to this type of attack and constitutes, in my view, the greatest threat facing Peru in the 21st century.

In the case of an attack on public organizations and private companies, where the greatest vulnerability exists is undoubtedly found in the government sector. 

In my experience, having worked as a public official and as a provider of IT solutions for the State, I can attest to the shortcomings in cybersecurity in most public institutions at the three levels of the executive branch and in the three branches of the State.

Undoubtedly, the level of preparedness varies from agency to agency. In the Peruvian public sector, some key institutions are highly developed at the IT level, however, this is not the rule, it is the exception, which makes most of the national public infrastructure highly vulnerable to this type of attack.

Let's not be naive. This type of attack is carefully planned and orchestrated well in advance.

The exponential advance of information technology and the strategic dependence of countries on it means that institutions cannot keep up with the pace by shielding their technological infrastructure against the increasingly high level of sophistication of hackers.

Let's be consistent with the times that the planet lives in the 21st century: All corners of the world are at war on this front, with millions of attacks on computers and mobile devices every minute.

*Digitally more advanced governments have now recognized the enormous gravity of the situation and are launching multiple initiatives to deal with the great threat posed by cyber-attacks. But the public sector cannot shoulder the full burden of responsibility and needs to work very closely with the private sector to raise awareness and harden the state's computer systems. For reference, globally, more than 500,000 million dollars are lost due to cybercrime.»


Ongoing police training to handle the widening variety of cybercrime then becomes a strategic priority, as does education on how to share the right information on social media without exposing our personal safety or security in doing so. of ours. Mixed work teams that combat cybercrime (public + private) should collaborate with other international organizations in order to join efforts and share knowledge.

There is a whole cybercrime market to which public security agencies do not have access where criminals can buy and sell access to compromised servers, computers, cell phones and digital accounts and malware to attack people and public and private institutions.

Statistics indicate that EVERY device in the country will have been attacked by some type of malware in the last three months.

Cyber attacks

Nowadays, with the wide adoption of smartphones, which are finally becoming more and more powerful computers, the number and variety of malware with which these devices are exploited has risen exponentially.

Mobile risks include ransomware, infected apps in official marketplaces, espionage, mobile web browser hacking, intellectual property theft, remote device hijacking, data theft, and mobile banking Trojans. Such is the threat to Smartphones that we now see in banking Trojans, that 25% percent of attacks are directed at desktop computers and 75% at mobile devices. 

The motivation for all this variety of attacks is not just money. They are looking for innovations, projects, business plans, patents, budgets, data and access channels to shareholders and partners. They want digital certificates and credentials, scientific research results, and physical access codes. The intent is to disrupt your business, damage your reputation, and find ways to control your company. 

How can this scourge be combated?

It is essential that public institutions implement a proactive culture of digital security, since acting on merely reactive initiatives could put their digital infrastructure at risk. In the information age, this is the greatest asset of any institution. Let's start because the State prohibits the use of pirated software and implements mandatory security regulations in all public institutions.

It is essential that the government implement a Cyber Response Committee (Cyber Response Committee) made up of representatives of the public, private and civil society sectors, that has a regulatory and budgetary shield and that supports the continuity and constant training of the team and acquisition of ad-hoc software and hardware.

In addition, it is strategic to have international agreements for cooperation and exchange of knowledge and information, particularly with the most developed countries and organizations in terms of cybersecurity.

Pablo Bermúdez

International Consultant in Digital Transformation, Knowmad, Entrepreneur, Mystagogue, Professor, Exhibitor, Writer and a thousand other things….

Manager at The Startup Factory
Twitter: @pablober