The Surveillance Zone book is out! Go behind the scenes of corporate surveillance detection & covert special operations. Get a first-person account of actual covert operations I’ve participated in. Learn the secrets of the trade, and discover a hidden world that’s all around you. Amazon & Kindle: http://amzn.to/2qJo9gq iBooks: http://apple.co/2qPJ9RP Barnes & Noble: http://bit.ly/2sz6dFK Surveillance… Read More The Surveillance Zone Book
“Fail Often so you can succeed sooner.” —Tom Kelly. Mistakes and failures in surveillance, surveillance detection and special protective operations are things I write about quite frequently. I’ve examined them from every which way, explained how they look, discussed many case studies and talked about how to avoid them. One aspect I haven’t touched on… Read More Big Mistakes & Embarrassing Failures
A version of this article has also been published in Security Solutions Magazine. On the evening of the 19th of December, 2016, the world was shocked as news came out about the assassination of the Russian ambassador to Turkey, Andrei Karlov. Karlov was shot from behind as he was delivering a speech at the Cagdas… Read More A lesson In Diplomatic Protection
I’m very excited to host my first guest blogger on Protection Circle, Travis Lishok. Travis is the owner of EP Nexus, a fantastic executive protection blog that explores protective intelligence, OSINT investigations, threat assessment, and more. Travis and I decided to collaborate by writing two different perspectives on the same event (an actual protective detail… Read More The OSINT Connection: Intelligence In Executive Protection
In recent years, quite a few articles have been published about CEO protection and how much money different corporations spend on it. Forbes might have been the first to get this trend started with this (somewhat dated) article. CNBC discussed the issue back during the healthcare debate, and Fortune Magazine put out a piece about… Read More Protecting The CEO
Protective Intelligence can be described as the process of gathering and assessing information about entities that may have the intention and capability of harming you, and utilizing this information to protect your assets. As more and more individuals and corporations have begun to realize that early preventative measures are preferable to emergency reactive ones, many… Read More Protective Intelligence And Surveillance Detection
After going over the hostile planning process and reviewing a number of case studies, our next goal is to figure out the vulnerabilities of this process and figure out who can tackle which vulnerability.