Import the 50 Most Significant Terrorist Attack Anniversary Dates into Your Calendar (in Two Steps)

Import the 50 Most Significant Terrorist Attack Anniversary Dates into Your Calendar (in Two Steps)

I created a digital calendar with over 50 of the most notable terrorist attack anniversaries in world history, which you can import into your personal calendar (iCal, Outlook, Gmail, Etc.). This simple tool–the first of it’s kind, allows the executive protection specialist to overlay terrorist attack anniversaries with the the principal's travel plans.

Read More

The Field-Intel' Connection: Intelligence in Executive Protection

The Field-Intel' Connection: Intelligence in Executive Protection

In the world of executive protection & protective intelligence, I’ve long discovered that in addition to the crucial role that OSINT plays, there’s often also a need for information that’s collected from the field. It’s not that remote intelligence isn’t important—on the contrary—that’s where you want to start. But this first resort shouldn’t always be your last and only one. Hostile entities also use open sourced intelligence in their Hostile Planning Process, but they don’t stop there—they follow it up with field intelligence, i.e. surveillance.

Read More

Unorthodoxy & Professional Development in Executive Protection

Unorthodoxy & Professional Development in Executive Protection

This article takes a look at the unseen paths that the executive protection specialist can take to acquire & sharpen skills for a prosperous career in executive protection. First, I take a look at MOOCs, which are FREE–university level courses, offered online, from some of the best schools in the US (Harvard, UC Berkley, Stanford, etc). Then I take a look at paid services which you might be more familiar with, such as Lynda, SkillShare, and Udemy.

Read More

Executive Protection: Brand Monitoring and the Alert Ecosystem

Executive Protection: Brand Monitoring and the Alert Ecosystem

One weakness of executive protection training, is that there is minimal focus on technology and related tools that can assist the executive protection specialist out in the field, all the while requiring minimal investment in resources.

What is the Alert Ecosystem? The Alert Ecosystem is a collection of tools, that when used collectively, keeps the executive protection specialist informed (instantly). Wouldn’t you like to be the first to know when a disaster strikes near by, or when an emergency alert for your area is issued?

Read More

20 Uses for IFTTT in Executive Protection

20 Uses for IFTTT in Executive Protection

There are great advantages for using IFTTT, whether you’re a command center dweller, an executive protection team member, or an executive protection manager (or just a security savvy dude). Uses of IFTTT range from intelligence collection (key work tracking, social media activity tracking, etc) to personal convenience.
What is IFTTT? If This Then That is a free online application that allows the user to automate various functions between different apps...

Read More

Create Something Bigger than Executive Protection

Create Something Bigger than Executive Protection

Take remarkable executive protection or security concepts that we hold in high regard – MOSAIC (threat assessment system), iJET, OSINTtechniques.com, or the Advance/Odin apps – any one of these could have been created by any one of the readers of this blog. None of these ideas or systems are earth-shattering.

So why didn’t you create them? And why aren’t more of us doing remarkable things in executive protection?

Read More

10 Threat Assessment Guidelines for Executive Protection

10 Threat Assessment Guidelines for Executive Protection

Executive protection and threat assessment go hand in hand with each other. The executive protection specialist is making evaluations on a daily basis, about whether an inappropriate pursuer is a violent threat, or just a nuisance.  These pursuers attempt to make contact via letters to the principal, calls to the principal, and the occasional, unwanted attempt to meet the principal in person. And that's were our threat assessment training comes in...

Read More

Executive Protection: Assessing Threats in 20 Questions (or Less)

Executive Protection: Assessing Threats in 20 Questions (or Less)

Executive Protection & Threat Assessment – You think that threat assessment requires paying $10,000, for academics to lecture you at the Gavin De Becker - Advanced Threat Assessment and Management Academy. But, all you really need to do is follow Mark Cuban's advice from How to Win at the Sport of Business. That is, “Read the F***ing manual.” Here's the manual...

Read More

10-Minute Red Team (Tutorial): Executive Protection INFOSEC

10-Minute Red Team (Tutorial): Executive Protection INFOSEC

Could the executive protection team members' negligent personal information security practices be jeopardizing the principal's safety? I’m going to demonstrate for you in a 10 minute tutorial, how to conduct a simple red team assessment of your executive protection team members’ personal information security. This is a starting point, to give you perspective on how your team members' lazy information security practices are creating greater risk for the principal.

Read More

The 10 Keys of OSINT Research in Executive Protection

The 10 Keys of OSINT Research in Executive Protection

In continuing my series about open source intelligence (OSINT) in executive protection, I have written "The 10 Keys of OSINT Research." These rules include the most important themes I have learned in my self-study of OSINT research and analysis. By following these rules, the executive protection specialist can be confident in the soundness of their investigations.

Read More