I created a digital calendar with over 50 of the most notable terrorist attack anniversaries in world history, which you can import into your personal calendar (iCal, Outlook, Gmail, Etc.). This simple tool–the first of it’s kind, allows the executive protection specialist to overlay terrorist attack anniversaries with the the principal's travel plans.Read More
In the world of executive protection & protective intelligence, I’ve long discovered that in addition to the crucial role that OSINT plays, there’s often also a need for information that’s collected from the field. It’s not that remote intelligence isn’t important—on the contrary—that’s where you want to start. But this first resort shouldn’t always be your last and only one. Hostile entities also use open sourced intelligence in their Hostile Planning Process, but they don’t stop there—they follow it up with field intelligence, i.e. surveillance.Read More
This article takes a look at the unseen paths that the executive protection specialist can take to acquire & sharpen skills for a prosperous career in executive protection. First, I take a look at MOOCs, which are FREE–university level courses, offered online, from some of the best schools in the US (Harvard, UC Berkley, Stanford, etc). Then I take a look at paid services which you might be more familiar with, such as Lynda, SkillShare, and Udemy.Read More
One weakness of executive protection training, is that there is minimal focus on technology and related tools that can assist the executive protection specialist out in the field, all the while requiring minimal investment in resources.
What is the Alert Ecosystem? The Alert Ecosystem is a collection of tools, that when used collectively, keeps the executive protection specialist informed (instantly). Wouldn’t you like to be the first to know when a disaster strikes near by, or when an emergency alert for your area is issued?Read More
There are great advantages for using IFTTT, whether you’re a command center dweller, an executive protection team member, or an executive protection manager (or just a security savvy dude). Uses of IFTTT range from intelligence collection (key work tracking, social media activity tracking, etc) to personal convenience.
What is IFTTT? If This Then That is a free online application that allows the user to automate various functions between different apps...
Take remarkable executive protection or security concepts that we hold in high regard – MOSAIC (threat assessment system), iJET, OSINTtechniques.com, or the Advance/Odin apps – any one of these could have been created by any one of the readers of this blog. None of these ideas or systems are earth-shattering.
So why didn’t you create them? And why aren’t more of us doing remarkable things in executive protection?Read More
Executive protection and threat assessment go hand in hand with each other. The executive protection specialist is making evaluations on a daily basis, about whether an inappropriate pursuer is a violent threat, or just a nuisance. These pursuers attempt to make contact via letters to the principal, calls to the principal, and the occasional, unwanted attempt to meet the principal in person. And that's were our threat assessment training comes in...Read More
Executive Protection & Threat Assessment – You think that threat assessment requires paying $10,000, for academics to lecture you at the Gavin De Becker - Advanced Threat Assessment and Management Academy. But, all you really need to do is follow Mark Cuban's advice from How to Win at the Sport of Business. That is, “Read the F***ing manual.” Here's the manual...Read More
Could the executive protection team members' negligent personal information security practices be jeopardizing the principal's safety? I’m going to demonstrate for you in a 10 minute tutorial, how to conduct a simple red team assessment of your executive protection team members’ personal information security. This is a starting point, to give you perspective on how your team members' lazy information security practices are creating greater risk for the principal.Read More
In continuing my series about open source intelligence (OSINT) in executive protection, I have written "The 10 Keys of OSINT Research." These rules include the most important themes I have learned in my self-study of OSINT research and analysis. By following these rules, the executive protection specialist can be confident in the soundness of their investigations.Read More