By far the best method to accomplish this goal is to adopt a predictive, preventative strategy for protecting clients based on the tenets of Detect, Deter, and Defend. To effectively employ these tenets, we need some very specific soft and hard skills. In the protective operations world, the “soft” skills are sometimes referred to as Protective Intelligence (PI) while in other security disciplines they are referred to as situational and tactical awareness skills. If we are unable to prevent or avoid an attack, we need to have some expertise in specific “hard” skills such as use of firearms and security driving so that we can survive an ambush.
The Mentality of the Modern Protector
Over 30 years ago, when I left a failing white-Collar industry in a failing economy in Texas, I did what many in my predicament did. I entered the contract security industry at near minimum wage. What I did that many others did not, was survive in the industry long enough to out earn annually what I was earning in my previous profession.
THE NEW Open Source Intelligence
We all hear about this OSINT malarkey but searching the Internet for information is much much more than just dropping a couple of search terms into Google.
There are many different search engines out there and using these various systems, combined with how you actually search for phrases, should bring you the results you are after.
Global Risk RoundUp – Feb 2020
Global Risk RoundUp – Feb 2020
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks via in-house experts, cutting edge technology and through a comprehensive global source network. Here is your summary of the incidents you need to know about from the last 30 days.
Global Risk RoundUp – January 2020
Global Risk RoundUp – January 2020. Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks via in-house experts, cutting edge technology and through a comprehensive global source network. Here is your summary of the incidents you need to know about from the last 30 days.
Executive Protection in Russia
Risk and Retaliation at the World Cup and Beyond. On 3/26/2018, the United States joined 20 nations including the UK, Canada, and Italy in what is said to be the largest coordinated expulsion of Russian intelligence officers in history.
Over 100 Russian diplomats were told to leave their foreign postings in response to the poisoning of a former Russian spy living in the UK. Russia promised to retaliate against this “provocative gesture”.
Global Risk RoundUp – November 2019
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks via in-house experts, cutting edge technology and through a comprehensive global source network. Here is your summary of the incidents you need to know about from the last 30 days.
Intelligence 2.0
Although the underlying principle of understanding ‘capability and intention’ and the objective of ‘forewarned is forearmed’ have not dramatically altered overtime, the sheer scale of intelligence available in the Open Source environment means that the greatest risk today is information overload rather than information scarcity.
It is in this context that in order to acquire and analyse asymmetric and potentially outcome-defining intelligence, analysts are required to think more laterally than ever and be able to draw both strategic and tactical conclusions from intelligence which may be independent and accurate as much as it may be deliberately misleading or presented through an emotional prism. SOCial Media INTelligence (SOCMINT) is one such instance of lateral thinking. FINancial INTelligence is another.
Key Points to Being a Good Bodyguard
For long-term assignments, it is very important to build up a rapport with your client / VIP and anyone else associated with the operation. Effective and good communications will not only assist you with having an easier and less stressful assignment but also keeps you up-to-date on the client’s day to day activities
Protective Surveillance
With each client, the situation and threat level will vary, as will their requirements and appetite. When it comes to security there are a myriad of options available, often (and hopefully) with multiple, complementary components working together in harmony. One weapon in the personal protection armory is Protective Surveillance. This article attempts to provide a comprehensive overview of a service that has multiple benefits, quite a few limitations and several misrepresentations.
The Terrorist Next Door
If ISIS is the new Public Enemy Number 1 then Al Qaeda would likely be 1A, but they don’t hold a monopoly on terror. Whether the act is a beheading, lynching or being drunk behind a pickup truck, the results are equally as brutal, senseless and catastrophic to the victim’s families or targeted groups. […]
Tapping, but not my feet…
Mobile Telephone monitoring software (spyware), its effectiveness as an espionage tool and its cost vs potential rewards.
MANCHESTER & THE U.S. MEDIA’S DANGEROUS DOUBLE STANDARD
The British security services are fuming, and rightly so. The minutes, hours and days immediately following a terrorist incident are crucial for apprehending members of the terrorist network before they flee the country and for thwarting attacks which may be imminent. Leaking and publishing details of an investigation during this narrow window undermines those efforts and jeopardizes public safety.
Protective Intelligence
Many protective service providers and law enforcement agencies have protective intelligence units that conduct investigations, manage threat assessments and provide tactical, operational and strategic analysis of the information they uncover. However, they may fail to utilize the contemporary collection and analysis methods used by today’s intelligence professionals but rather lean on the standard criminal investigation processes they have always performed.