Politics and motives aside, I think everyone can conclude these are very dangerous days for journalists, advocates of free speech or anyone else for that matter that voices an opinion. For the security consultant who is providing services to journalists, activists or opposition politicians these clients can give you some unique challenges as the threats can include harassment and arrest by local or state police, as well as threats from opposing parties etc…
When it comes to staffing an international team, I have five major considerations I look for in the team’s composition: Operational Capability, Operational Chemistry, Operational Relevance, Operational Flexibility and Operational Capacity.
YouTube is the number two search engine right behind Google (go figure). Everyday 3 BILLION VIDEOS are viewed on YouTube everyday. Why? For me personally and I’m sure thousands of others would rather find a video on how-to fix a widget then read pages of text on a web page.
From microblogs to what Google and Amazon says, China knows full well that unlimited, unaccountable and unsubstantiated news reports on the nation is simply not in its best interests, or pointedly its cultural interest! That may also mean news reports that are factually correct.
No matter who you are, everyone has been affected by the pandemic, hopefully, all of us out there are surviving but no doubt there will be some that may be struggling more than most.
When you step into a new role where you have routine access to classified information, have access to large amounts of cash or other assets/valuables, or deal with sensitive business information, you may become the target of human intelligence or HUMINT. In light of this, this article covers the different aspects of the threat of human intelligence to keep in mind from the point of view of a corporate setting or government contract.
As security professionals you may be an attack vector to your client if you do not maintain basic online security controls. At the very least you should be in a position to provide basic advice to your clients in order to help them stay secure.
Anyone who works for you and has their work title/position linked to your company represents your brand and is responsible for your reputation. They can also be a liability for you and may become the weak link of your company and their online activities are such that your competitors can use it against you.
As the President-Elect wrapped up his speech, now joined onstage by his extended family, my attention was on the members of the United States Secret Service who were close by. I thought of these men and the job that they were tasked to do. Not knowing them personally, I wasn’t aware of their political affiliations, were they a Democratic like Biden, or a Republican, rooting for the current President, Trump? They, like every other citizen of the country, were allowed to cast their votes, and could have picked either, or none. However, at that moment, on that stage, I don’t think it mattered. These agents, surely knowing the risk associated with the occasion, were focused on the task at hand: The safety of their protective charges, no matter their personal political affiliation.
It is inevitable if you work within the security sector that at some point, you will have has a radio thrust in your direction for you to use as your primary form of communication.
Yet many of you will not have received any significant training on it, yet this one tool that may just save your life.
In this article, we’re covering some of the things you might have missed.
Effective crisis management invariably involves social media, whether the organization is a large multi-national or a small hometown business. When a crisis erupts, the effective use of social media should be seen as a key priority to counteract the crisis.
Is technology effective as a security solution or is it simply being misused? In this article, Ivor Terret shares his philosophy of the four pillars of effective and practical security and how they can only work together in conjunction – not as silos.
Each issue our global geopolitical partner, Stratfor, provides an in-depth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.
These days many shooters and those in the armed security business shy away from revolvers. I have heard quite a few people brush them off as being old-fashioned, obviously not tacticool enough to post on their social media. But in the real world of protection, there are a lot of revolvers in use for personal self-defense and security duties.
If you are a security professional with significant high-threat worldwide protective services experience, you know that depending on the client, it may not be a matter of if your client or a family member is kidnapped, but when. You also understand that it is likely that you may not even be directly providing protection for the client at the time it happens and unable to prevent it, especially when they are alone and most vulnerable.
Maybe you’re a close protection officer, trying to arrange a safe route through a dangerous location, or a surveillance specialist trying to communicate with others in your team.
Perhaps you just don’t trust the local government. Whatever the situation, it’ll almost certainly be easier to focus on the task at hand if you aren’t worrying about whether your messages were possibly subject to being intercepted.
What happens when there is more than one primary client? What happens when the “primary” becomes two, three, four, or more? What happens when your client instructs you that their two-year-old, is the primary “client” on a particular day or outing?
Over 2020 cyber security and technology have only soared in terms of profile and importance, with talk about threats to remote working from technology, difficulties, and some dramatic outages. Logistics, enabled largely by technology, have been essential to keep things moving and give people support and normality.
It often comes as a surprise just how much is available and the nefarious uses it can be put to. OSINT can be applied towards defensive purposes, but this article will only be covering the malicious purposes (i.e. how a bad guy might get access to your client’s sensitive information and data).
One of the biggest challenges of OSINT is not merely recognising it as a threat, but encouraging the behavioural change needed to protect against it widely enough. It is not simply enough for a principal to stop posting Instagram pictures of their travels in order to hide them. Their colleagues, friends, family, and employees also need to be aware and cautious with information which could be misused.