Protective Intelligence Resources

This month, we thought it would be good to share some of our favorite resources that a security professional can use to stay sharp. We are often asked by our clients and colleagues what literature or ongoing education we consume in order to follow trends relating to protective intelligence. Our typical answer is that it’s a relatively sophisticated [...]

Active Shooter Situations & Why Your Organization May Need A Protective Intelligence Program

According to the FBI in its April 2018 report titled, “Active Shooter Incidents in the United States in 2016 and 2017,” attacks have spiked significantly in the last several years.  Below, they have been broken down by the settings in which they occurred: 17 - Business/commerce environments (8 offenders were current or former employees) 14 - Open space [...]

Part II: An Introduction To OSINT Research For Protective Intelligence Professionals

In the previous article (Part I), we discussed the context around open source intelligence (OSINT) research – how OSINT fits into the intelligence cycle, the explosion in social media use, and background information about the internet & browsing. In this second half of the series, we will now discuss tools and concepts that are central to the duties [...]

Part I: An Introduction To OSINT Research For Protective Intelligence Professionals

Our two part series is divided into the following segments: Part I, in which we highlight the context in which protective intelligence professionals use open source intelligence (OSINT) and Part II, a brief overview of OSINT collection methods and how they relate to our organizations’ protection strategies.What makes OSINT research so important to protective intelligence professionals is that it’s [...]

The Role Of Protective Intelligence In Estate Security

Estate security is a critical element for corporate executive protection teams and their supporting protective intelligence programs.  We realize that executives spend the majority of their time at the corporate office, their primary estate, as well as various travel destinations.  Two of those are static locations, and are often desirable targets for would-be attackers or inappropriate pursuers. A [...]

How Do Protective Intelligence Analysts Support Security Programs?

Before we dive into this topic, we must acknowledge a great article from AIRIP published in October 2016, by Shana Tarbell. She wrote an article that outlined specific responsibilities and initiatives set by her organization’s risk intelligence program. I highly recommend reading her article: “What Does A Risk Intelligence Analyst Do In A Non-Profit Organization?” In today’s article, [...]

Protective Intelligence And Surveillance Detection

Guest Contributor We are honored to feature an article on the topic of protective intelligence from our guest contributor, Ami Toben – owner of Protection Circle, and the director of consulting, training and special operations for HighCom Security Services. (full bio below) Protective Intelligence And Surveillance Detection Protective Intelligence can be described as the process of [...]

What Is “Protective Intelligence?” – A Point Of View

What is “Protective intelligence?”To the executive protection analyst plugging away in a 24-hour operations center, protective intelligence is one thing.To the security consultant with an MA or MS in psychology, protective intelligence means something else.And to the US Department of Justice or the US Secret Service, it takes on another meaning.No discussion of protective intelligence could be complete, without [...]

An Introduction To Machine Learning For Protective Intelligence Professionals

How is machine learning relevant for protective intelligence professionals?Suppose your work computer was capable of taking all of the threatening communications ever sent to your CEO, studying each communication which you had assessed (low/medium/high threat), and then being able to assess future threatening communications with all of the previous communications as a basis for its judgement. Essentially, the computer [...]

10 Challenges Undermining Your Protective Intelligence Program

Protective intelligence means different things to every organization. A protective intelligence program somewhere out there only consists of a log book of suspicious events, and in other instances, it consists of a sophisticated digital platform that catalogues information, analyzes data-sets for patterns, and spits out immediate reports. Our goal in this article is to provide a broad examination [...]