A few words on protective intelligence
Protective intelligence is the interesting juncture where you begin to expand outwards from direct physical protection, and enter realms like online presence, remote information collection, open sourced information, communications and surveillance detection. A good way to visualize this idea is to think of reactive mitigation as your inner most circle of physical security. Around this, we extend a larger circle of proactive prevention, and around that circle, we extend an even larger circle (one with an undetermined size) of protective intelligence. In a well written article by Kristin Lenardson Schwomeyer and Charles Randolph (two of the most highly regarded leaders in the field of protective intelligence), an important distinction is made between intelligence and information. Intelligence, the article explains, is information that is contextualized for your needs. “You discern what information is actually important to your principal and the detail; this turns the information into intelligence”. The article also emphasizes the need to diversify your sources of information – to not depend on any single source by itself. In the spirit of diversifying your sources of information, I’ve always been an advocate of expanding intelligence gathering into the field in order to better connect the cyber and open sourced dimension to the physical reality on the ground. It’s not that remote intelligence collection isn’t important – on the contrary, that’s where you want to start – and I’ve given two examples (out of many more) where this worked very well for us. But in many other cases, especially where we have little to no remote intelligence, adding a field component to your intelligence sources is a good idea. The field component of your protective intelligence effort (usually SD) can provide two very important functions:- It can collect vital, accurate information about unfolding events, situations and activities in real time; and draw on-the-spot inferences from what’s actually happening in the field. No open or remote source can currently provide this.
- It can verify the accuracy of your open sourced intelligence by means of physical observation – in real time. Open sources can be very important, but until they are put to the test – until you have evidence from the field – they essentially provide you with unsubstantiated claims. If you never see how open sourced intelligence does or doesn’t physically manifest itself in the field, how will you verify if it’s good intelligence?
I’ve read all articles on your blog and really like your analytical approach to the subject. I’d like to see even more real-world stories, they are very interesting. Keep on going!
Thank you, it’s much appreciated. And please stay tuned – there’s plenty more in the pipes…
Thank you this was very helpful.
At this time I actually find myself within the Majic Circle.
Keep it rocking.
Very good read!
All 3 articles are great contributions to better understanding how the circle of security should be functional.
Read your 3rd series, and it encourages me to read parts 1 an d 2. Very interesting, veteran stuff. Thanks .
Really great to understating how the security function. Thank you
As always a thought provoking article , cheers
[…] example, the three-part article series about Circles of Security (part 1, part 2, part 3) I wrote a while back can be applied to your own home. As can the principles of Surveillance […]