© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2021
J. SeamanProtective Securityhttps://doi.org/10.1007/978-1-4842-6908-4_12

12. Developing Your Human Firewall

Jim Seaman1  
(1)
Castleford, UK
 

Cheshire’s informality suited men and women whose shared experience had begun to dissolve many of the class barriers which had divided pre-war Air Force.

For example:

A young wireless operator, who had arrived at Linton the previous day, was climbing into the truck for dispersals when he felt Cheshire’s arm round his shoulder. “Good luck, Wilson.” All the way to the aircraft, the wireless operator pondered… “How the hell did the Commanding Officer know my name?”

Or:

“Hello Read.” I did not know he knew my name. “Hear ...

Get Protective Security: Creating Military-Grade Defenses for Your Digital Business now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.