(2018 Update) Import the 65 Most Significant Terrorist Attack Anniversary Dates into Your Calendar (in Two Steps)

(2018 Update) Import the 65 Most Significant Terrorist Attack Anniversary Dates into Your Calendar (in Two Steps)

I created a digital calendar with over 65 of the most notable terrorist attack anniversaries in world history and recent memory, which you can import into your personal calendar (iCal, Outlook, Gmail, Etc.). This simple tool–the first of it’s kind, allows the executive protection specialist to overlay terrorist attack anniversaries with the the principal's travel plans.

Read More

Protective Intelligence in Estate Security

Protective Intelligence in Estate Security

OSINT feeds protective intelligence programs a steady diet of information, 24 hours per day. Most of this is empty calories, some of it is red meat, but we don’t know until it’s collected and evaluated.

Real-time social media monitoring (by geographic location) is the single most practical and effective practice that any estate security program can implement...

Read More

The Final Word on Travel Intelligence & Executive Protection

The Final Word on Travel Intelligence & Executive Protection

Yes, I’m putting the executive protection/Travel Intelligence topic to rest, but only after one final overview. Below is a short summary of relevant ideas from the Travel Intelligence Masterclass held recently. Plus, I have included two important links below.

First, you need to check out the travel intelligence reading list. Any novice could knock out this list in a month, and then they’d have a great reservoir of information to pull from when they’re supporting the executive protection team with travel intelligence...

Read More

10 "Common Sense Security Practices" for the CEO

10 "Common Sense Security Practices" for the CEO

I'm guilty of using the phrase "common sense security practices," and I imagine that many executive protection professionals throw around that term periodically too. Every time I've used that phrase, I've thought "what a cop out" ...there's no phrase in security that's more lazy and vacuous than "common sense security practices." Is there even such a thing?

Read More

15 Patterns of Travel Security Briefings for Executive Protection Analysts

15 Patterns of Travel Security Briefings for Executive Protection Analysts

Did you know that 80% of our success in producing valuable travel intelligence rests on us internalizing only a handful of patterns? What do I mean?

Patterns begin to emerge once we've read enough briefings from the US State Department, UK/MI5, iJET, Stratfor, etc...

This article highlights 15 patterns that consistently appear in travel security briefings and related literature. Once these patterns are identified, our work as executive protection analysts becomes much easier.

Read More

The Field-Intel' Connection: Intelligence in Executive Protection

The Field-Intel' Connection: Intelligence in Executive Protection

In the world of executive protection & protective intelligence, I’ve long discovered that in addition to the crucial role that OSINT plays, there’s often also a need for information that’s collected from the field. It’s not that remote intelligence isn’t important—on the contrary—that’s where you want to start. But this first resort shouldn’t always be your last and only one. Hostile entities also use open sourced intelligence in their Hostile Planning Process, but they don’t stop there—they follow it up with field intelligence, i.e. surveillance.

Read More

Executive Protection: Brand Monitoring and the Alert Ecosystem

Executive Protection: Brand Monitoring and the Alert Ecosystem

One weakness of executive protection training, is that there is minimal focus on technology and related tools that can assist the executive protection specialist out in the field, all the while requiring minimal investment in resources.

What is the Alert Ecosystem? The Alert Ecosystem is a collection of tools, that when used collectively, keeps the executive protection specialist informed (instantly). Wouldn’t you like to be the first to know when a disaster strikes near by, or when an emergency alert for your area is issued?

Read More

10-Minute Red Team (Tutorial): Executive Protection INFOSEC

10-Minute Red Team (Tutorial): Executive Protection INFOSEC

Could the executive protection team members' negligent personal information security practices be jeopardizing the principal's safety? I’m going to demonstrate for you in a 10 minute tutorial, how to conduct a simple red team assessment of your executive protection team members’ personal information security. This is a starting point, to give you perspective on how your team members' lazy information security practices are creating greater risk for the principal.

Read More

The 10 Keys of OSINT Research in Executive Protection

The 10 Keys of OSINT Research in Executive Protection

In continuing my series about open source intelligence (OSINT) in executive protection, I have written "The 10 Keys of OSINT Research." These rules include the most important themes I have learned in my self-study of OSINT research and analysis. By following these rules, the executive protection specialist can be confident in the soundness of their investigations.

Read More