Unorthodoxy & Professional Development in Executive Protection

Unorthodoxy & Professional Development in Executive Protection

This article takes a look at the unseen paths that the executive protection specialist can take to acquire & sharpen skills for a prosperous career in executive protection. First, I take a look at MOOCs, which are FREE–university level courses, offered online, from some of the best schools in the US (Harvard, UC Berkley, Stanford, etc). Then I take a look at paid services which you might be more familiar with, such as Lynda, SkillShare, and Udemy.

Read More

Executive Protection: Brand Monitoring and the Alert Ecosystem

Executive Protection: Brand Monitoring and the Alert Ecosystem

One weakness of executive protection training, is that there is minimal focus on technology and related tools that can assist the executive protection specialist out in the field, all the while requiring minimal investment in resources.

What is the Alert Ecosystem? The Alert Ecosystem is a collection of tools, that when used collectively, keeps the executive protection specialist informed (instantly). Wouldn’t you like to be the first to know when a disaster strikes near by, or when an emergency alert for your area is issued?

Read More

20 Uses for IFTTT in Executive Protection

20 Uses for IFTTT in Executive Protection

There are great advantages for using IFTTT, whether you’re a command center dweller, an executive protection team member, or an executive protection manager (or just a security savvy dude). Uses of IFTTT range from intelligence collection (key work tracking, social media activity tracking, etc) to personal convenience.
What is IFTTT? If This Then That is a free online application that allows the user to automate various functions between different apps...

Read More

Create Something Bigger than Executive Protection

Create Something Bigger than Executive Protection

Take remarkable executive protection or security concepts that we hold in high regard – MOSAIC (threat assessment system), iJET, OSINTtechniques.com, or the Advance/Odin apps – any one of these could have been created by any one of the readers of this blog. None of these ideas or systems are earth-shattering.

So why didn’t you create them? And why aren’t more of us doing remarkable things in executive protection?

Read More

10 Threat Assessment Guidelines for Executive Protection

10 Threat Assessment Guidelines for Executive Protection

Executive protection and threat assessment go hand in hand with each other. The executive protection specialist is making evaluations on a daily basis, about whether an inappropriate pursuer is a violent threat, or just a nuisance.  These pursuers attempt to make contact via letters to the principal, calls to the principal, and the occasional, unwanted attempt to meet the principal in person. And that's were our threat assessment training comes in...

Read More

Executive Protection: Assessing Threats in 20 Questions (or Less)

Executive Protection: Assessing Threats in 20 Questions (or Less)

Executive Protection & Threat Assessment – You think that threat assessment requires paying $10,000, for academics to lecture you at the Gavin De Becker - Advanced Threat Assessment and Management Academy. But, all you really need to do is follow Mark Cuban's advice from How to Win at the Sport of Business. That is, “Read the F***ing manual.” Here's the manual...

Read More

10-Minute Red Team (Tutorial): Executive Protection INFOSEC

10-Minute Red Team (Tutorial): Executive Protection INFOSEC

Could the executive protection team members' negligent personal information security practices be jeopardizing the principal's safety? I’m going to demonstrate for you in a 10 minute tutorial, how to conduct a simple red team assessment of your executive protection team members’ personal information security. This is a starting point, to give you perspective on how your team members' lazy information security practices are creating greater risk for the principal.

Read More

The 10 Keys of OSINT Research in Executive Protection

The 10 Keys of OSINT Research in Executive Protection

In continuing my series about open source intelligence (OSINT) in executive protection, I have written "The 10 Keys of OSINT Research." These rules include the most important themes I have learned in my self-study of OSINT research and analysis. By following these rules, the executive protection specialist can be confident in the soundness of their investigations.

Read More

How to Leverage Apps in Executive Protection (Pt. 2)

How to Leverage Apps in Executive Protection (Pt. 2)

This is my continuation of the series "How to Leverage Apps in Executive Protection." The conclusion of this series includes the Advance app by AS Solution, which is designed specifically for executive protection professionals. Plus, I discuss several apps that I use to protect my personal information (and thus the executive protection team's information) and more.

Read More

How to Leverage Apps in Executive Protection (Pt. 1)

How to Leverage Apps in Executive Protection (Pt. 1)

This is part-one of my list of essential apps for the executive protection specialist. I am writing this on July 21th, 2016. There is no doubt that these apps will change over time, and some may not exist at the end of the year. However, these apps themselves are not important. What is important, is the types of apps and the functions they serve for the executive protection specialist. Let the below list serve as a template of the types of apps an executive protection specialist should leverage.

Read More