Time + Place Predictable

One of the main factors to reduce the likelihood of being a victim of a targeted attack is to not be time and place predictable.  This is especially true for “at-risk” personnel who are more likely to be specifically targeted.  What do I mean by at-risk personnel?  These are people that because of their profile,…

Surveillance Detection & Personal Security – Part 2

When using surveillance detection principles as part of your personal security program there are two levels that can be used: passive and active.  In an active program you would design an implement surveillance detection routes (SDR) that include preplanned stops and movements designed to cause anyone that might be following you to inadvertently expose themselves. …

Overview of Surveillance Detection for Personal Security

Most attacks, robberies, kidnappings, sexual assaults and other forms of personal, confrontational crime occur after a period of observation and target selection.  This can range from a period of weeks or months (or in rare cases even years) in the case of terrorist attacks to less than a minute or two  in cases of a…

Using Threat Info in the Context of Business Operations

  When evaluating threat information, especially information received from subscription security intelligence services which are produced for a broad audience, it is essential to view them in the context of your company’s operations.  Many, if not most providers, use a color and/or numerical rating to designate the risk level of a particular city or country. …

Utilizing Local Sources for Threat Intelligence

Local sources of information can be immensely valuable when assessing the threat level at a location.  These local sources may include host country national employees, expatriate employees or expatriates affiliated with another organization, employees of vendors or others.  They are often able to provide excellent insight as they are there on the ground in the…

Evaluating & Choosing Private Intelligence Providers

How does management identify and monitor these threats in different locations around the world?  Many companies subscribe to one or more of the private security intelligence providers that are available.  While some of these firms use the term intelligence to describe their products and services, others use terms like risk reporting, assessment & analysis and…

Tactical vs. Strategic Intelligence

Intelligence needs related to security will largely be determined by the type of operation a company has in a particular location, the size of the footprint, number of personnel, amount of infrastructure and assets, etc.  As an example, a company involved in oil, gas or mining operations with extensive and costly infrastructure will typically need…

Things You Might Not Want to Bring When Traveling

There are things that are considered harmless in much of the world that can cause problems in certain countries or regions of the world.  You can bring many of these items on most trips you might take but its important to research the location you are going to prior to your travel to determine if…