Shipbroker Clarksons confirmed its computer systems were breached in a major cyber-security attack. Today, more than ever, cyber security has to be the number one priority for the shipping industry. Naval Dome will be working with key stakeholders to establish global cyber maritime defence standards and guidelines
Zero Day Vulnerabilities
There is no better time than now to dive into the world of zero day vulnerabilities. This article looks at how zero days behave, assesses some of the most infamous examples of them, and perhaps most importantly, provides best practices for how to deal with these elusive threats.
Surveillance Detection For Countering Terrorism
The ability to detect suspicious activity early in the planning phase is the primary means of defeating a terrorist attack. Thus, surveillance detection (SD) has become critical to successful intelligence collection, counter terrorism and security operations. By applying effective surveillance detection to security and counter terror operations we can effectively detect and prevent terrorist attacks in the planning phases, reduce the number of attacks and allow for safer operations in high risk environments.
Protective Intelligence
Many protective service providers and law enforcement agencies have protective intelligence units that conduct investigations, manage threat assessments and provide tactical, operational and strategic analysis of the information they uncover. However, they may fail to utilize the contemporary collection and analysis methods used by today’s intelligence professionals but rather lean on the standard criminal investigation processes they have always performed.
Surveillance Tips for Investigations & Protective Intelligence
Surveillance is a skill learned best through experience, however tactics and techniques can also be improved via tips and tricks from seasoned practitioners. This article contains some very effective tactics, techniques and procedures for conducting surveillance investigations, for both private investigators as well as for protective intelligence assignments.
Hostile Environment Surveillance Operations
A look at Hostile Environment Surveillance Operations As a result of the privatization of Iraq in 2003 and the dramatic growth of private security operations in politically unstable and hostile environments, close protection professionals are finding themselves working in increasingly diverse environments that require highly specialized skills and training. One of those specializations […]
Surveillance Detection & Global Business
Surveillance Detection & Global Business As we continue this series of articles discussing surveillance detection (SD), it is only natural that we explore the use of SD by global business to mitigate and prevent attacks on their businesses. The National Institute for the Prevention of Terrorism reports that around 20% of international […]
Surveillance Detection for Individuals
Individuals face a variety of threats in today’s global environment. By developing and applying a Surveillance Detection (SD) plan to the targets daily protection operations you can significantly reduce the likelihood of an attack on your target. Before surveillance detection (SD) can be used to prevent or deter an attack, you must […]
Hostile Surveillance Detection
Hostile surveillance detection is one of the few security techniques that preempts danger. As the name suggests it is the art of identifying an individual or group that is attempting to obtain intelligence by placing your client under surveillance. Its main advantage as a security tool is that it is proactive rather than reactive.
Surveillance Detection
Surveillance Detection A key skill for security and counter-terrorism professionals History has taught us that certain kinds of activities can indicate terrorist plans are in the works, especially when they occur at or near high profile or sensitive sites, places where high profile individuals reside or work, or where large numbers of people gather like […]
The Silent Witness & Hacking
The Silent Witness & Hacking With the proliferation of mobile phones in the public domain, many myths surround the actual truth that lies behind this wireless technology and the inappropriate use of the word Hacking associated with them in recent times. In my past role in a Police Technical Support Unit, I have interrogated […]
Working Girl – October 2011
Working Girl Jacquie Davis I was sitting in a side road watching an address in London for a few days when suddenly I heard the sound of breaking glass, I called up the other surveillance team members to ask if they had heard it, yes yes came the reply over the radio. I then saw […]
Mystery Shopper – Circuit Q&A
Mystery Shopper – Circuit Q&A Nick McCarthy interviews Linda Eastwood. Linda, we became ‘friends’ recently via an online networking portal, exchanged a few messages and then met up at a networking meeting. I was very impressed by your story and your success and thought that Circuit Magazine readers would enjoy your story and the somewhat […]
What's in your GO Bag – Going Digital
What’s in your GO Bag – Going Digital Your Principal has a known stalker that has sent letters and threatening emails. You are at a small venue for a public appearance, and suspect that they might show up. You need to remain with your client in a holding room, but what could make life […]