The Insider Threat & Risk of Kidnapping

This is excerpted from the Integrated Protective Concepts book Kidnapping Prevention & Avoidance. Without a doubt the greatest threat you are likely to potentially encounter is the insider threat. Numerous kidnapping cases throughout the world have involved a person close to the victim or with inside knowledge of the victim’s activities and routine facilitating the…

Personal Risk Assessment

Considering that personal and travel security rely heavily on context its important to consider how the threat relates to you whether at home or abroad.  Understanding this contextual relationship let’s you realistically determine how much effort, energy and possibly money you should invest in your security. The best way to do this is to conduct…

Social Engineering: Personal Security Implications

Social engineering – the calculated manipulation and exploitation of people has historically been associated with cyber security issues.  Computer hackers found they could best get access to secure networks by targeting the weakest link – the human factor. The same techniques used to get an employee to give up their password or provide other information…

Social Networks & the Threat to Personal Security

Recent open source reporting indicates that the Colombian National Police just arrested a group of criminals that were using Facebook to identify, profile and target victims for kidnapping.  Initial reports the gang were using false Facebook profiles with pictures of beautiful women to target wealthy men as victims.  They would use information in the victim’s…

Time + Place Predictable

One of the main factors to reduce the likelihood of being a victim of a targeted attack is to not be time and place predictable.  This is especially true for “at-risk” personnel who are more likely to be specifically targeted.  What do I mean by at-risk personnel?  These are people that because of their profile,…

Using Threat Info in the Context of Business Operations

  When evaluating threat information, especially information received from subscription security intelligence services which are produced for a broad audience, it is essential to view them in the context of your company’s operations.  Many, if not most providers, use a color and/or numerical rating to designate the risk level of a particular city or country. …

Utilizing Local Sources for Threat Intelligence

Local sources of information can be immensely valuable when assessing the threat level at a location.  These local sources may include host country national employees, expatriate employees or expatriates affiliated with another organization, employees of vendors or others.  They are often able to provide excellent insight as they are there on the ground in the…

Evaluating & Choosing Private Intelligence Providers

How does management identify and monitor these threats in different locations around the world?  Many companies subscribe to one or more of the private security intelligence providers that are available.  While some of these firms use the term intelligence to describe their products and services, others use terms like risk reporting, assessment & analysis and…

Tactical vs. Strategic Intelligence

Intelligence needs related to security will largely be determined by the type of operation a company has in a particular location, the size of the footprint, number of personnel, amount of infrastructure and assets, etc.  As an example, a company involved in oil, gas or mining operations with extensive and costly infrastructure will typically need…