“10 Guidelines for Managing Hunters and Howlers”

“10 Guidelines for Managing Hunters and Howlers”

Threat assessment is like cleaning your rifle, it’s a process, and it never really “ends.” There’s always dirt, carbon, or some impurity present and the senior drill instructor will find it. - Chesty Puller

First, we make an initial assessment based on very limited information for the purpose of expediency and urgency. We engage in more fact finding, then reassess. Then we apply our intervention strategies (even if that’s only “watch and wait”). Then we reassess again...

Read More

Assessing Threats in 20 Questions (or Less)

Assessing Threats in 20 Questions (or Less)

You think that threat assessment requires paying $10,000, for academics to lecture you at the Gavin De Becker - Advanced Threat Assessment and Management Academy. But, all you really need to do is follow Mark Cuban's advice from How to Win at the Sport of Business. That is, “Read the F***ing manual.”

Read More

[VIDEO] 10-Minute Red Team: How to Find Your INFOSEC Vulnerabilities – FAST

[VIDEO] 10-Minute Red Team: How to Find Your INFOSEC Vulnerabilities – FAST

Your security team’s negligent personal information security practices are jeopardizing the principal's safety.

Imagine, how difficult it is to get access to the principal, or to get access to their sensitive personal information. It’s hard as ****, if you’re doing your job right. Now compare that with the simplicity of getting access to your team members' or their personal information.

 

Read More

Simple Tips for Using Automation for Intelligence Collection

Simple Tips for Using Automation for Intelligence Collection

I will touch on only simple steps here, to make automation work for you in the intelligence collection phase (and you won’t have to pay Geofeedia $1,000’s per year to do it). You do not need any technical knowledge to implement these steps, any executive protection professional can do this.

Read More