The insider threat of crime to organisations is always present and can manifest itself in many ways. This has become more apparent because of the recent social-economic climate change within the UK.
As recently as January of this year a man was jailed for a string of threating abuses against Mark Prisk, the MP for Hertford and Stortford. Perhaps the most worrying aspect of the story around this attack is that Prisk was so fearful that he failed to attending a hustings. He is not the only MP who has had to change his course of action due to threats. In February last year Diane Abbott, who was suffering cyber-attacks claimed she was fearful of walking the streets of her own constituency.
Although the underlying principle of understanding ‘capability and intention’ and the objective of ‘forewarned is forearmed’ have not dramatically altered overtime, the sheer scale of intelligence available in the Open Source environment means that the greatest risk today is information overload rather than information scarcity.
It is in this context that in order to acquire and analyse asymmetric and potentially outcome-defining intelligence, analysts are required to think more laterally than ever and be able to draw both strategic and tactical conclusions from intelligence which may be independent and accurate as much as it may be deliberately misleading or presented through an emotional prism. SOCial Media INTelligence (SOCMINT) is one such instance of lateral thinking. FINancial INTelligence is another.
Cybersecurity is often seen as a niche area which requires a lot of specialist knowledge to apply. This is partly true – in order to configure a web application firewall someone needs to understand how to work with the technology at a very low level. What is often missed, as the technologists take over, is that cyber is still security and the same fundamental principles apply to designing and building effective protections.
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks, here is your summary of the last 30 days. Including: 40 dead in armed attack in Mali, 13 killed in Hostage situation in Mexico, Multiple Islamic State Militants killed in Iraq and explosion on a bus in Sweden.
With each client, the situation and threat level will vary, as will their requirements and appetite. When it comes to security there are a myriad of options available, often (and hopefully) with multiple, complementary components working together in harmony. One weapon in the personal protection armory is Protective Surveillance. This article attempts to provide a comprehensive overview of a service that has multiple benefits, quite a few limitations and several misrepresentations.
One thing I find amusing and annoying is that whenever there is a terrorist attack with an attacker using a long gun the media tends to immediately label the shooter as a sniper. There is a very big difference between a trained sniper and some idiot with a rifle and just because someone served in the military to some extent it does not make them a sniper. But, with modern weapons and a little knowledge the wannabe jihadist or anarchist are still a serious threat.
This past March, WikiLeaks dumped 8,761 CIA documents collectively known as “Vault 7.” These documents contained information about what was essentially the government agency’s armory of cyber threats.
They included malware, viruses and Trojans used for espionage purposes. More importantly, they had information about zero day vulnerabilities the CIA had been using to hack computers, tablets, smartphones and other devices for intelligence gathering purposes.
Task, Threat and Environment, The Mindset of Protective Services Professional. This is a mindset that goes beyond situational awareness, knowledge, or even foresight but rather a collection of them all into a cycle which must be constantly in rotation. The items listed are the most paramount on the task list of a security professional engaged in protective services.
Our Intelligence and Analysis Partner, Drum Cussac provides in-depth analysis of global risks via in-house experts, cutting edge technology and a comprehensive global source network. Global Risk Roundup, October 2018 Edition.