Scott Stewart and Fred Burton Discuss the Attack Cycle and Pre-Operational Surveillance
In this episode When it comes to spotting potential threats, it’s often the subtle details that matter most. In this episode, Fred Burton sits down with Scott Stewart, Vice President at TorchStone Global and former Diplomatic Security Service Special Agent, to unpack how the attack cycle plays out in real-world scenarios. From analyzing pre-operational surveillance…
Read MoreHow the U.S. Capitol Riots Forever Changed the Value of a Proactive Security Approach
The riots at the U.S. Capitol on January 6, 2021 took many by surprise. Unfortunately, this feeling of surprise was felt by security and protection agencies near and far. It forever changed how we value protective intelligence and proactive threat management — especially in close proximity to a high-profile event. In this episode, Fred Burton…
Read MoreTop Seven Corporate Security Lessons from the Capitol Riot
As a former police officer and special agent in the Washington D.C. area, I am no stranger to large-scale demonstrations. But I could never have imagined mob violence overrunning the U.S. Capitol. The events on January 6 were a clear example of what happens when there is a lack of protective intelligence and contingency planning,…
Read MoreThe Risk Profile and Motivation Behind Fully Armored Vehicles
There are not many car owners who contemplate the glass longevity, degree of sunlight exposure, or whether or not Windex has been applied to the inside and outside of the windows. However, these are exactly the types of details that run through the mind of Mark Caldwell, Co-Owner of TAC Americas, Ltd. — a market…
Read MoreWhen Hiring Drivers, Proper Vetting Is Vital For Safety And Compliance
This article was originally featured on securityinformed.com. Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in…
Read MoreTop 5 Security Analyst Interview Questions to Prepare For
When you are inspired to apply everything you learned in your university programs to protect people and assets, a Security Analyst position is a common starting point. It is also an area that companies plan to further invest in — in Ontic’s recent study on the State of Protective Intelligence, 66% of security leaders plan…
Read MoreWhat Makes Someone Predisposed to Stalking and the Shifting Threat Landscape
In this episode In this episode, Fred Burton speaks with Dr. Reid Meloy, renowned forensic psychologist and co-founder of WAVR-21, about the psychology behind fixation and stalking. They explore what drives individuals to obsess over public figures, executives, and celebrities—and how those behaviors can escalate to violence. Dr. Meloy reflects on his shift from litigation…
Read MoreThe 2021 State of Protective Intelligence Report
Download the report for insights on:
Read MoreSituational Awareness: What an Attacker is Looking For with Kelly Sayre
Have you ever stepped back to think about how you carry yourself as you walk down the street? Everything from your posture, to your line of sight, to what you are fidgeting with (cellphone, anyone?) is what an attacker is observing from afar. A cue as small as turning your head twice within one minute…
Read MoreWhy Enterprises Must Rethink Employee Safety in a Remote Work Environment
This article was originally featured on Forbes Technology Council. “Staying safe” in today’s workplace usually means taking precautions to protect yourself from Covid-19, but even with millions of people across the globe working remotely, corporate security and HR teams still need to consider the issue of workplace violence. A virtual workforce has pushed potential threats…
Read MoreChallenges Facing Security Industry and Historical Inflection Points
This article is based off of my 2020 OSAC Annual Briefing presentation “Historical Inflection Points for the Security Industry” Looking back, history has not been kind to the safety and security industry. As a former agent hired after the devastating embassy bombings in Beirut and Kuwait in ‘84 and ‘85, tragedy has forced lots of changes, mostly…
Read MoreGuest Post: Protective Intelligence within Executive Protection
As threats in the world become more resourceful, diverse, and determined along their pathways to violence or to inflict harm, executive protection (EP) practitioners must increasingly shoulder a heavier burden. It is no longer acceptable for protection managers and their consumers (protectees – those being protected) to rely on the reactionary expertise and capabilities of the…
Read MoreFormer CIA Special Agent Shares Perspective on the Timeless Practice of Executive Protection
In this episode In this episode, Fred Burton sits down with Mike Trott, former CIA special agent and seasoned international security expert, to explore the timeless craft of protection. They discuss how the principles of close protection have remained constant, even as threats, tools, and tactics have evolved. Mike reflects on lessons learned from his…
Read MoreA Call for Change in Physical Security
Fred Burton’s article was originally featured in Dark Reading. We’re at an inflection point. The threats we face are dynamic, emerging, and global. Are you ready? Despite dedicating the majority of my life to protective intelligence in the private and public sectors, I still find it hard to believe when I see companies that have…
Read MoreThe Patterns Behind Mass Shootings and the Creation of The Violence Project
We all have events or situations in our childhood that shape who we are today. While many are uplifting, there are less fortunate people who encountered childhood trauma, setting them off track to commit some of the most upsetting crimes. Dr. Jillian Peterson, President and Co-Founder of The Violence Project, has dedicated her career to…
Read MoreHow to Identify Those Who Pose a Threat from Those Who Make a Threat
In this on-demand webinar with WAVR-21, you’ll learn how to distinguish those who pose a threat from those who make a threat, including why it’s important to:
Read More