Executive Protection Note: "Just 2 Seconds"

Executive Protection Note: "Just 2 Seconds"

We're not really practicing executive protection if we haven't studied Gavin de Becker's work regarding public figure attacks (and how to prevent them!). I have boiled down all 683 pages of Just 2 Seconds for you in the attached 6 page PDF. Please read it and share it with your associates.

Just 2 Seconds is THE BOOK for executive protection specialists studying attacks on public figures. The authors take the approach of academic researchers, in their experimenting, statistical analyses, and conclusions. This book is the product of their combined experience in protective security and violence research.

Read More

9 Deadly Travel-Health Alerts Executive Protection Analysts Need to Know

9 Deadly Travel-Health Alerts Executive Protection Analysts Need to Know

As an analyst collecting and producing travel intelligence for executive protection programs, you will undoubtedly come across alerts from iJET, The Center for Disease Control (CDC), The US State Department, and others about a range of ridiculous viruses and illnesses you’ve never heard of.

As an exercise for myself and the reader, I have created a simple chart breaking down the most common and notable illnesses that we should be aware of. You’re going to see alerts for these, so you might as well know if they’re fatal, if there’s a vaccine, and how to prevent becoming affected.

Read More

Executive Protection Hacks: Travel Intelligence Challenge

Executive Protection Hacks: Travel Intelligence Challenge

I have a challenge for junior executive protection analysts and novice students of travel intelligence. Experts need not apply.

If you produce your own report (following the guidelines in this PDF) based on real locations, for a specific time period, for a specific high-net-worth traveler, and email it to me…

Provided that it is up to our (your and my) standards, I will mail you a physical certificate for completing my challenge AND I’ll enter you into a drawing to attend my in-person, 2-day Travel Intelligence Hacks training FOR FREE.

Read More

How to Write Winning Travel Intelligence in Executive Protection

How to Write Winning Travel Intelligence in Executive Protection

Travel intelligence in executive protection means many different things to many different people. I am going to outline how I prefer to structure and curate my travel intelligence reports. What to include, what is assumed, what’s irrelevant, and so on. The structure of my travel intelligence reports share similarities with reports of iJet, OSAC, and the US State Department. (USE WHAT WORKS!)

Read More

Executive Protection: Intelligence Writing Secrets for the Uninitiated

Executive Protection: Intelligence Writing Secrets for the Uninitiated

“Intelligence deals with all the things which should be known in advance of initiating a course of action.” The following are valuable excerpts of wisdom from the book Communicating With Intelligence: Writing and Briefing in the Intelligence and National Security Communities (2nd Edition) by James S. Major. I highly recommend reading this book whether you’re a novice executive protection analyst or a veteran that wants to brush up on the fundamentals.

Read More

The Ultimate Travel Intelligence Mind Map for Executive Protection Analysts

The Ultimate Travel Intelligence Mind Map for Executive Protection Analysts

The Travel Intelligence Mind Map is a framework for the executive protection analyst. It gives them a systematic process to tackle the ambiguous task of producing travel intelligence. I have broken down the mind map into three sections: General, Macro-Level, and Micro-Level. General encompasses the most basic information about the location, such as entry requirements, immunizations, infrastructure, and crime & safety...

Read More

10-Minute Travel Intelligence for Executive Protection Analysts

10-Minute Travel Intelligence for Executive Protection Analysts

Suppose you only had 10 minutes to initiate your travel intelligence research, and and then you had to provide an initial report to your principal / executive protection manager. Where would you start?

10-Minute Travel Intelligence will not fulfill all of your travel intelligence needs in 10 minutes. Rather, it is a proven framework for the analyst to conduct their initial assessment of a particular domestic or international travel destination.

Read More

What is "Executive Protection Hacks?"

What is "Executive Protection Hacks?"

EP Hacks is a medium for executive protection professionals to tackle complex issues and share ideas with their peers. My mission is to build a collection of invaluable resources–challenging the individual executive protection professional to develop and improve upon their skill set.

This issue of EP Hacks is the product of my boiling down the process and key ideas involved in producing quality travel intelligence for an executive protection program.

Read More

Import the 50 Most Significant Terrorist Attack Anniversary Dates into Your Calendar (in Two Steps)

Import the 50 Most Significant Terrorist Attack Anniversary Dates into Your Calendar (in Two Steps)

I created a digital calendar with over 50 of the most notable terrorist attack anniversaries in world history, which you can import into your personal calendar (iCal, Outlook, Gmail, Etc.). This simple tool–the first of it’s kind, allows the executive protection specialist to overlay terrorist attack anniversaries with the the principal's travel plans.

Read More

The Field-Intel' Connection: Intelligence in Executive Protection

The Field-Intel' Connection: Intelligence in Executive Protection

In the world of executive protection & protective intelligence, I’ve long discovered that in addition to the crucial role that OSINT plays, there’s often also a need for information that’s collected from the field. It’s not that remote intelligence isn’t important—on the contrary—that’s where you want to start. But this first resort shouldn’t always be your last and only one. Hostile entities also use open sourced intelligence in their Hostile Planning Process, but they don’t stop there—they follow it up with field intelligence, i.e. surveillance.

Read More