In 2018, we saw continued evidence of how vulnerable our organizations truly are to the threat of violence (specifically shootings). Currently, various news sources estimate that the number of deaths in 2018 from “mass shootings” (3 or more deaths) is between 80 and 209. Regardless of where the true number falls in this range, we can say with certainty that these numbers are similar to those of 2017 (approximately 112 deaths) and all of us in the asset protection industry have an opportunity to improve the practices of our security programs.
The first step in working to prevent any type of attack is to understand how such attacks are conducted. This pertains not just to the tactics and techniques used in the actual attack but also to the planning process that must occur before the attack can be launched. Viewing attacks as the result of a discernible planning process — what we refer to as the terrorist attack cycle — and then breaking that process into its distinct phases and tasks makes it possible to identify times during the attack cycle when those conducting it are vulnerable to detection.
In this light, the guiding principles behind protective intelligence can be applied to a much wider range of use cases outside the typical realm of just protecting public figures, CEO’s, and High Net Worth Individuals. Having decades of experience in this arena, we see the benefit of deploying protective intelligence initiatives in various sectors, including corporate security, loss prevention, educational campus safety, religious community centers, and more. In fact, as the number of violent incidents increase, we have determined that so does the noise, chatter, and unhealthy behavior that led up to the event.
This month, we thought it would be good to share some of our favorite resources that a security professional can use to stay sharp. We are often asked by our clients and colleagues what literature or ongoing education we consume in order to follow trends relating to protective intelligence. Our typical answer is that it’s a relatively sophisticated and multifaceted topic, and it should be broken down into several categories, as we have done below.
Here is our Ultimate Threat Assessment Checklist. It is meant to serve as a tool to keep your mind oriented toward key topics and ideas as you conduct your protective intelligence research. There are no shortcuts in threat assessment and protective intelligence research, but there are tools.
Checklists serve as a guide to keep us on track when we’re performing tasks that require us to consider a range of important variables, any of which may be critical.
AI is simply computers/programs, also referred to as machines, imitating intelligent (human) behavior. Machine learning is a subset of AI, where computers receive data and use it to learn from themselves.