In this light, the guiding principles behind protective intelligence can be applied to a much wider range of use cases outside the typical realm of just protecting public figures, CEO’s, and High Net Worth Individuals. Having decades of experience in this arena, we see the benefit of deploying protective intelligence initiatives in various sectors, including corporate security, loss prevention, educational campus safety, religious community centers, and more. In fact, as the number of violent incidents increase, we have determined that so does the noise, chatter, and unhealthy behavior that led up to the event.
This month, we thought it would be good to share some of our favorite resources that a security professional can use to stay sharp. We are often asked by our clients and colleagues what literature or ongoing education we consume in order to follow trends relating to protective intelligence. Our typical answer is that it’s a relatively sophisticated and multifaceted topic, and it should be broken down into several categories, as we have done below.
Protective intelligence is the only way that you can be offensive in your approach to protective security – at Ontic Technologies, we refer to this as “Threat Hunting.” The best protective intelligence teams in the world make their own luck by influencing workplace factors, rather than allowing workplace factors to impose their will on them. The more proactive one is, either in the field or behind a keyboard, the more information they find – which then becomes actionable intelligence.
In the previous article (Part I), we discussed the context around open source intelligence (OSINT) research – how OSINT fits into the intelligence cycle, the explosion in social media use, and background information about the internet & browsing.
In this second half of the series, we will now discuss tools and concepts that are central to the duties of an OSINT researcher. Highlighting these tools and concepts serves two purposes for readers. First, it brings useful research methods to our attention.
Here is our Ultimate Threat Assessment Checklist. It is meant to serve as a tool to keep your mind oriented toward key topics and ideas as you conduct your protective intelligence research. There are no shortcuts in threat assessment and protective intelligence research, but there are tools.
Checklists serve as a guide to keep us on track when we’re performing tasks that require us to consider a range of important variables, any of which may be critical.
AI is simply computers/programs, also referred to as machines, imitating intelligent (human) behavior. Machine learning is a subset of AI, where computers receive data and use it to learn from themselves.