With each client, the situation and threat level will vary, as will their requirements and appetite. When it comes to security there are a myriad of options available, often (and hopefully) with multiple, complementary components working together in harmony. One weapon in the personal protection armory is Protective Surveillance. This article attempts to provide a comprehensive overview of a service that has multiple benefits, quite a few limitations and several misrepresentations.
If ISIS is the new Public Enemy Number 1 then Al Qaeda would likely be 1A, but they don’t hold a monopoly on terror. Whether the act is a beheading, lynching or being drunk behind a pickup truck, the results are equally as brutal, senseless and catastrophic to the victim’s families or targeted groups. […]
Mobile Telephone monitoring software (spyware), its effectiveness as an espionage tool and its cost vs potential rewards.
The British security services are fuming, and rightly so. The minutes, hours and days immediately following a terrorist incident are crucial for apprehending members of the terrorist network before they flee the country and for thwarting attacks which may be imminent. Leaking and publishing details of an investigation during this narrow window undermines those efforts and jeopardizes public safety.
Many protective service providers and law enforcement agencies have protective intelligence units that conduct investigations, manage threat assessments and provide tactical, operational and strategic analysis of the information they uncover. However, they may fail to utilize the contemporary collection and analysis methods used by today’s intelligence professionals but rather lean on the standard criminal investigation processes they have always performed.