In the world of executive protection & protective intelligence, I’ve long discovered that in addition to the crucial role that OSINT plays, there’s often also a need for information that’s collected from the field. It’s not that remote intelligence isn’t important—on the contrary—that’s where you want to start. But this first resort shouldn’t always be your last and only one. Hostile entities also use open sourced intelligence in their Hostile Planning Process, but they don’t stop there—they follow it up with field intelligence, i.e. surveillance.Read More
This article takes a look at the unseen paths that the executive protection specialist can take to acquire & sharpen skills for a prosperous career in executive protection. First, I take a look at MOOCs, which are FREE–university level courses, offered online, from some of the best schools in the US (Harvard, UC Berkley, Stanford, etc). Then I take a look at paid services which you might be more familiar with, such as Lynda, SkillShare, and Udemy.Read More
Executive protection training and executive protection jobs, are only limited by the individual specialists' mental resources. Below are free readings for those that want to develop as true professionals in executive protection.Read More
If executive protection is the art of anticipating threats so that they can be avoided or mitigated, then this book is a must read for anyone pursuing to build on top of their executive protection training.
The focus of this work is “combat profiling.” A means of proactively identifying threats based on human behavior and cues from the environment. "Left of Bang" has been recommended by Gavin De Becker, General James Mattis, and Dave Grossman, all regarded as experts in their field.Read More
One weakness of executive protection training, is that there is minimal focus on technology and related tools that can assist the executive protection specialist out in the field, all the while requiring minimal investment in resources.
What is the Alert Ecosystem? The Alert Ecosystem is a collection of tools, that when used collectively, keeps the executive protection specialist informed (instantly). Wouldn’t you like to be the first to know when a disaster strikes near by, or when an emergency alert for your area is issued?Read More
There are great advantages for using IFTTT, whether you’re a command center dweller, an executive protection team member, or an executive protection manager (or just a security savvy dude). Uses of IFTTT range from intelligence collection (key work tracking, social media activity tracking, etc) to personal convenience.
What is IFTTT? If This Then That is a free online application that allows the user to automate various functions between different apps...
Take remarkable executive protection or security concepts that we hold in high regard – MOSAIC (threat assessment system), iJET, OSINTtechniques.com, or the Advance/Odin apps – any one of these could have been created by any one of the readers of this blog. None of these ideas or systems are earth-shattering.
So why didn’t you create them? And why aren’t more of us doing remarkable things in executive protection?Read More
Executive protection and threat assessment go hand in hand with each other. The executive protection specialist is making evaluations on a daily basis, about whether an inappropriate pursuer is a violent threat, or just a nuisance. These pursuers attempt to make contact via letters to the principal, calls to the principal, and the occasional, unwanted attempt to meet the principal in person. And that's were our threat assessment training comes in...Read More
Executive Protection & Threat Assessment – You think that threat assessment requires paying $10,000, for academics to lecture you at the Gavin De Becker - Advanced Threat Assessment and Management Academy. But, all you really need to do is follow Mark Cuban's advice from How to Win at the Sport of Business. That is, “Read the F***ing manual.” Here's the manual...Read More
Could the executive protection team members' negligent personal information security practices be jeopardizing the principal's safety? I’m going to demonstrate for you in a 10 minute tutorial, how to conduct a simple red team assessment of your executive protection team members’ personal information security. This is a starting point, to give you perspective on how your team members' lazy information security practices are creating greater risk for the principal.Read More