When you step into a new role where you have routine access to classified information, have access to large amounts of cash or other assets/valuables, or deal with sensitive business information, you may become the target of human intelligence or HUMINT. In light of this, this article covers the different aspects of the threat of human intelligence to keep in mind from the point of view of a corporate setting or government contract.
In the Midst of Chaos
By now many of you have seen the photos and videos of the protestors turned rioters storming the US Capitol on the day of the Congressional Certification.
HUMAN INTELLIGENCE
Intelligence is the information we obtain on a target or threat in order to locate them, gain information on their operations and to predict their future actions. Accurate intelligence is essential not only in security and counter-insurgency operations but also in the corporate world where companies need to know what their competitors are developing and planning.
Crisis Management and Social Media
Effective crisis management invariably involves social media, whether the organization is a large multi-national or a small hometown business. When a crisis erupts, the effective use of social media should be seen as a key priority to counteract the crisis.
Industry News – At A Glance
We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue. Including, attack in Afghanistan, Boko Haram Leader dead, severed heads in Mexico and Kevin Durant’s Bodyguard charged.
Cyber Security and Humans
Over 2020 cyber security and technology have only soared in terms of profile and importance, with talk about threats to remote working from technology, difficulties, and some dramatic outages. Logistics, enabled largely by technology, have been essential to keep things moving and give people support and normality.
Hiding from OSINT
It often comes as a surprise just how much is available and the nefarious uses it can be put to. OSINT can be applied towards defensive purposes, but this article will only be covering the malicious purposes (i.e. how a bad guy might get access to your client’s sensitive information and data).
One of the biggest challenges of OSINT is not merely recognising it as a threat, but encouraging the behavioural change needed to protect against it widely enough. It is not simply enough for a principal to stop posting Instagram pictures of their travels in order to hide them. Their colleagues, friends, family, and employees also need to be aware and cautious with information which could be misused.
Industry News December 2020
We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.
Event Review – Learning and Development Forum
The Circuit Magazine held a Virtual Learning and Development Forum on September 4, 2020, that was attended by Executive Protection specialists and experts from around the globe, including the UK, US, Europe, Latin America, Middle East and West Africa.
Global Situation Report October, 2020
Having informed insight in today’s increasingly complex international environment is more important than ever. That’s why we’ve partnered with Stratfor, the worlds leading geopolitical intelligence platform, to bring readers regular analysis and accurate forecasting of global trends from someone you can trust.
US Presidential Security Support
One memorable occasion was the visit by President George W. Bush to Manila, the Philippines, in October 2003, when he on his way to Thailand, where he was to attend the Asia-Pacific Economic Cooperation summit. This visit served as a great example of how much of an asset you can be for the protective elements if you know and apply protective operations principles.
Protecting the Principal in a Pandemic
From an operational perspective, CPs need to go back to fundamentals and apply the golden rules of protection planning and risk assessments to medical scenarios. For instance, from a strategy perspective, many HNW bought ventilators only to later discover that they would never be delivered due to shortage. So, it’s important to think how do we improve our planning and strategy from the outset to account for the unexpected? Scenarios and risks should be assessed as always in a well thought out threat matrix.
Counter-Ambush Tactics for Security Professionals – Part 1
By far the best method to accomplish this goal is to adopt a predictive, preventative strategy for protecting clients based on the tenets of Detect, Deter, and Defend. To effectively employ these tenets, we need some very specific soft and hard skills. In the protective operations world, the “soft” skills are sometimes referred to as Protective Intelligence (PI) while in other security disciplines they are referred to as situational and tactical awareness skills. If we are unable to prevent or avoid an attack, we need to have some expertise in specific “hard” skills such as use of firearms and security driving so that we can survive an ambush.
The Mentality of the Modern Protector
Over 30 years ago, when I left a failing white-Collar industry in a failing economy in Texas, I did what many in my predicament did. I entered the contract security industry at near minimum wage. What I did that many others did not, was survive in the industry long enough to out earn annually what I was earning in my previous profession.
THE NEW Open Source Intelligence
We all hear about this OSINT malarkey but searching the Internet for information is much much more than just dropping a couple of search terms into Google.
There are many different search engines out there and using these various systems, combined with how you actually search for phrases, should bring you the results you are after.
Global Risk RoundUp – Feb 2020
Global Risk RoundUp – Feb 2020
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks via in-house experts, cutting edge technology and through a comprehensive global source network. Here is your summary of the incidents you need to know about from the last 30 days.
Global Risk RoundUp – January 2020
Global Risk RoundUp – January 2020. Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks via in-house experts, cutting edge technology and through a comprehensive global source network. Here is your summary of the incidents you need to know about from the last 30 days.
Executive Protection in Russia
Risk and Retaliation at the World Cup and Beyond. On 3/26/2018, the United States joined 20 nations including the UK, Canada, and Italy in what is said to be the largest coordinated expulsion of Russian intelligence officers in history.
Over 100 Russian diplomats were told to leave their foreign postings in response to the poisoning of a former Russian spy living in the UK. Russia promised to retaliate against this “provocative gesture”.
Global Risk RoundUp – November 2019
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks via in-house experts, cutting edge technology and through a comprehensive global source network. Here is your summary of the incidents you need to know about from the last 30 days.
Intelligence 2.0
Although the underlying principle of understanding ‘capability and intention’ and the objective of ‘forewarned is forearmed’ have not dramatically altered overtime, the sheer scale of intelligence available in the Open Source environment means that the greatest risk today is information overload rather than information scarcity.
It is in this context that in order to acquire and analyse asymmetric and potentially outcome-defining intelligence, analysts are required to think more laterally than ever and be able to draw both strategic and tactical conclusions from intelligence which may be independent and accurate as much as it may be deliberately misleading or presented through an emotional prism. SOCial Media INTelligence (SOCMINT) is one such instance of lateral thinking. FINancial INTelligence is another.