The first step in working to prevent any type of attack is to understand how such attacks are conducted. This pertains not just to the tactics and techniques used in the actual attack but also to the planning process that must occur before the attack can be launched. Viewing attacks as the result of a discernible planning process — what we refer to as the terrorist attack cycle — and then breaking that process into its distinct phases and tasks makes it possible to identify times during the attack cycle when those conducting it are vulnerable to detection.Read More
In this light, the guiding principles behind protective intelligence can be applied to a much wider range of use cases outside the typical realm of just protecting public figures, CEO’s, and High Net Worth Individuals. Having decades of experience in this arena, we see the benefit of deploying protective intelligence initiatives in various sectors, including corporate security, loss prevention, educational campus safety, religious community centers, and more. In fact, as the number of violent incidents increase, we have determined that so does the noise, chatter, and unhealthy behavior that led up to the event.Read More
This month, we thought it would be good to share some of our favorite resources that a security professional can use to stay sharp. We are often asked by our clients and colleagues what literature or ongoing education we consume in order to follow trends relating to protective intelligence. Our typical answer is that it’s a relatively sophisticated and multifaceted topic, and it should be broken down into several categories, as we have done below.Read More
Protective intelligence is the only way that you can be offensive in your approach to protective security – at Ontic Technologies, we refer to this as “Threat Hunting.” The best protective intelligence teams in the world make their own luck by influencing workplace factors, rather than allowing workplace factors to impose their will on them. The more proactive one is, either in the field or behind a keyboard, the more information they find – which then becomes actionable intelligence.Read More
In the previous article (Part I), we discussed the context around open source intelligence (OSINT) research – how OSINT fits into the intelligence cycle, the explosion in social media use, and background information about the internet & browsing.
In this second half of the series, we will now discuss tools and concepts that are central to the duties of an OSINT researcher. Highlighting these tools and concepts serves two purposes for readers. First, it brings useful research methods to our attention.Read More
What makes OSINT research so important to protective intelligence professionals is that it’s not only a tool for us to use for good, in collecting information to support decision makers, but also a potentially malicious tool to be used against us (and our organization’s assets). Having a basic understanding of OSINT supports our proactive assessment of threats, and it also supports our assessment of OPSEC/information related vulnerabilities of our own organizations.Read More
Estate security programs fulfill a critical protective intelligence function by acting as a static post and base of operations for many protective movements. Agents charged with providing estate security can proactively observe, identify, assess, and understand what is normal, and can quickly determine an anomaly. Based on the vast knowledge of the security professionals protecting the estate, they can compare activity in the moment to their baseline, which has been developed over hundreds of hours of observing activity in that specific area…Read More
Remote intelligence is an essential component in our comprehensive travel risk assessments prior to the arrival of our advance teams. However, it is critical to have a reliable source on the ground that can corroborate or negate initial intelligence estimates. Marrying both remote and on-the-ground intelligence, is a requisite for providing our clients with the highest standards of safety and security. Additionally, and this issue is severely understated, an over reliance on general news media coverage can provide false, and at times, an embarrassing version of what some protection agents and analysts refer to as “open source intelligence.”Read More
The most fundamental functions performed by protective intelligence analysts, are those that supplement the security program’s evolving assessment of threat/risk to the principal. Below, we make a distinction between that which we have the most influence over (activity of the principal/organization) and that which we have less control over (general population sentiment/activity).Read More
Protective Intelligence can be described as the process of gathering and assessing information about entities that may have the intention and capability of harming you, and utilizing this information to protect your assets.
As more and more individuals and corporations have begun to realize that early preventative measures are preferable to emergency reactive ones, many organizations over the last decade or so have begun to adopt a more proactive approach towards security...Read More