Over recent years there have been a number of distinct changes that we have observed as it relates to how protective intelligence teams operate across all industries.
First, the makeup of our investigative teams has begun to change in light of the new demands of our intelligence programs. Second, technology and data have grown to play a significant role in how our programs operate and how they are evaluated. Third, corporate protective intelligence programs are undergoing a maturing stage – becoming more standardized like other legacy programs. All of these evolving points influence our day to day work and we foresee their impact continuing to grow in the future.
The composition of our teams has become notably younger, more academic, and more tech-savvy. This is easily evident if you conduct a simple search on LinkedIn for roles relating to protective intelligence, or if you attend any industry conference such as ATAP or AIRIP. The professionals executing work in protective intelligence programs and those leading teams increasingly fit the bill noted above – and this has its advantages for several reasons.
Having a team of digital natives (those that have grown up during recent digital technology advancements) is a great advantage. They can easily learn and adapt to new tools & techniques required to carry out your organization’s mission with efficient means. Plus, they are often technologically curious and inclined to always be learning about new methods for performing their work. Having team members like this is a great asset because they stay on top of current trends and are then willing to teach others in your organization, thus increasing the efficacy of your team.
Previously, where we may have seen protective intelligence teams dominated by those with past government, military, or similar experience, we are now seeing an influx of young professionals with remarkable academic backgrounds. It’s common to see a GSOC or investigative program with several team members that hold advanced degrees in international studies or related criminal justice disciplines. Additionally, many of them have completed notable internships with NGOs or have served in varying degrees of public law enforcement. Being able to source talented professionals with diverse academic backgrounds can add great value to our programs, especially given how much weight is placed on written products and presentation skills in our line of work.
Although team members with technology and academics as strong suits can be remarkably helpful, the importance of tempering their work with the expertise of senior team members cannot be overstated. We have found that teams do their best work when there are open lines of communication and collaboration between these two cohorts. Like so many other areas of our work as security professionals, everything comes down to knowledge sharing among team members. When younger team members learn from their more-experienced counterparts, yet are still given permission to creatively ideate, the benefits for the entire program are enormous.
Technology’s Growing Role
The role that technology plays in our protective intelligence programs has grown increasingly, along with the required technical knowledge of our operational team members.
Think about this…
Can any enterprise claim to have an adequate protective intelligence program if they don’t have dedicated technologies for social listening, incident monitoring, case management, asset tracking, secure communications, proprietary data sources for researching persons of interest, and a travel risk solution?
Although these technology solutions tend to require hours of training and time in each system to maximize their use, they bring significant advantages with them. Each of these tools saves hours of manual, tedious work, freeing trained analysts to tackle the most demanding work requiring their expertise and creativity, such as dedicating more time to comprehensively investigating direct threats to assets.
A second advantage here is the ability to capture security metrics. Where spreadsheets and Word docs were used previously, smart technologies make it easier to quantify all of the hard work of protective intelligence teams. It’s much easier to demonstrate our value-add when we can point to the most basic analytics that break down the number of international trips that were conducted, the number of travelers that were supported, the number of threats investigated, and much more – all of which justify more resources for your team to do their best work (training, incentives, tools, etc.).
The Maturing of Protective Intelligence Programs
Since corporate protective intelligence programs are a relatively new phenomenon, they are naturally undergoing an observable maturing stage. Previously, it was commonplace to have the most savvy member of the executive protection team hold an investigative function as a secondary responsibility. However, with an emphasis on proactive security, it is becoming increasingly difficult for any program manager to confidently state that they are taking the most prudent steps possible, when so few resources are actually dedicated to proactive security measures.
We are slowly starting to see fewer hybrid (field) executive protection / intelligence roles, less use of spreadsheets & Google Docs as case management tools, and more professional & dedicated approaches to protective intelligence.
A significant element in this maturing scenario is big (security) data. Finally, we have the ability to do much more with the data we have. We can catalogue our data, assess it over time to identify trends, measure the effectiveness of our safeguards, collaborate across departments, identify anomalies, and more. The proliferation of tools enabling us to do so much more with our security data is leading us to a turning point, where it is questionable if our organizations are practicing due care if they are not taking advantage of these systems that can provide an added layer of protection by proactively surfacing threats.
For example, these questions come to mind:
- Will our organization be found negligent in the event of a security incident?
- How will this reflect on how we value our employees?
- How will our employees react if we are found to not be implementing safeguards that are standard throughout our industry?
We’re watching a number of themes in the protective intelligence space play out before us. A simple way to view it is as a bridging between the tradecraft of two generations: the experienced generation that developed the tested, foundational ideas of protective intelligence, with the younger generation that has increasingly incorporated the use of data & technology to solve protective intelligence challenges.
Looking at this with a wide aperture, each of these themes has far greater benefits than otherwise: our younger investigative team of digital natives makes us adaptable, our growing use of technologies enables us to automate a large part of the mundane work so that our talented team members can do what they do best – use their creativity to solve challenging tasks. And our maturing protective intelligence programs will have hiccups as we bring them up to our desired standards, but they’ll make our workforces & assets safer for it.
This short post only touches on several themes that we are all part of within the protective intelligence space. We look forward to diving deeper into these topics in the near future with our guest contributors.
About The Protective Intelligence Blog
By every metric, the role of protective intelligence is growing increasingly important for your security program, as it operates domestically and (especially) internationally. Protective Intelligence is our medium for understanding not only threat matrix and risk level, but also trends, problems, solutions, as well as ideas to support the mission of protective security professionals. The speed by which we can send and receive information, and the amount of information we need to evaluate, has eliminated problems in some areas and exponentially compounded problems in others. Our team seeks to address issues stemming from these problem areas, offering next-level analyses and proven solutions with an eye toward the future.
Our content contributors come from organizations involved in protective intelligence research, corporate executive protection, threat assessment investigations, and related security intelligence fields.