The Delivery Man Ruse: An Effective Method to Kill

Key Points If you want to prevent the next attack, understanding the “how” can be much more important than the “why” With numerous individuals to protect, technology can help prioritize resources Technology and threat assessments can help fill intelligence gaps After a lifetime of examining attacks and failed plots, my eye has always been drawn…

Read More

Surveillance Detection: You Can’t Find Surveillance Unless You’re Looking For It

I learned surveillance tradecraft the hard way in the 1980’s, as chronicled in my memoir Ghost: Confessions of a Counterterrorism Agent (Random House, 2008). The course of history has been altered with significant protective intelligence failures and tragedies, from assassinations to school shootings, many caused by failing to notice or act on hostile surveillance. The…

Read More

Protective Intelligence: Mobile Applications are the New Norm

Due to protective intelligence failures, our efforts to identify surveillance were born out of necessity. Technology innovation continues to drive better protection tools. A mobile application enables the officer to rapidly identify persons or vehicles that pose a proximity risk. I’m a big believer in understanding how we got here. Due to protective intelligence failures,…

Read More

The Terrorist Attack Cycle Remains Unbroken

While our team and many protective intelligence professionals across the industry like to speak to the benefits of new technologies and new methods for protecting assets, we acknowledge that everything we do has a foundation in the tried and true methods that our colleagues in public sector security have developed over the decades. Specifically, it…

Read More

How Corporate Security Teams are Evolving

In light of new demands on intelligence programs, security teams have made changes pertaining to team composition, new technology, and the maturing of their programs. Over recent years there have been a number of distinct changes that we have observed as it relates to how corporate security teams operate across all industries. First, the makeup…

Read More