Loose Lips: Recognizing and Avoiding Elicitation

In discussing social engineering and threats to your personal security we mentioned elicitation.  Elicitation is a technique that is used by an adversary to get a person to unintentionally divulge more information about a particular subject than they normally would.  Its used to gather confidential or proprietary information and in the realm of personal security…

Personal Risk Assessment

Considering that personal and travel security rely heavily on context its important to consider how the threat relates to you whether at home or abroad.  Understanding this contextual relationship let’s you realistically determine how much effort, energy and possibly money you should invest in your security. The best way to do this is to conduct…

Social Engineering: Personal Security Implications

Social engineering – the calculated manipulation and exploitation of people has historically been associated with cyber security issues.  Computer hackers found they could best get access to secure networks by targeting the weakest link – the human factor. The same techniques used to get an employee to give up their password or provide other information…

Social Networks & the Threat to Personal Security

Recent open source reporting indicates that the Colombian National Police just arrested a group of criminals that were using Facebook to identify, profile and target victims for kidnapping.  Initial reports the gang were using false Facebook profiles with pictures of beautiful women to target wealthy men as victims.  They would use information in the victim’s…

Not in Kansas Anymore……

One of the greatest challenges in protecting a global workforce and training travelers and personnel undertaking overseas assignments is getting them to understand that the individual rights they enjoy in their home country don’t travel with them overseas.  This is particularly true of Americans who are imbued from an early age with the concept of…

4 Steps to Taking the Adversary’s Perspective and Enhancing Your Security

  When you are evaluating your own personal security its very useful to take the perspective of your adversary — for most of us that is the common criminal but depending on your location it may also include terrorists, militants, members of organized criminal groups or others.  Traditionally most people and most organizations have viewed…

Always Have an Exit Plan

When traveling or living in the politically unstable regions it’s important to always have an exit plan.  After assessing the potential threats from coups, civil unrest or conflict you should consider several methods of egress from the country, different transportation modes that could be used and also the possibility of sheltering in place. You should…

Security Considerations: Working with Local Contacts

If you are working overseas or traveling internationally for business then you probably deal with local contacts of some type.  They may be local representatives, partners, vendors or suppliers, customers or others.  While most interaction with local contacts will be valuable and productive there are potential security concerns to be aware of and to think…

Expatriate Residential Considerations

Expatriates and long term visitors who will be using private accommodation rather than a hotel need to look at security considerations when selecting a residence. The first consideration should be the location and neighborhood.   You clearly want to identify a safe or safer neighborhood for obvious reasons.  Unfortunately in many places crime statistics are not…