What follows is Chapter 9 of my book Surveillance Zone. A technology conference somewhere in Silicon Valley, 2013. The tech conference was coming along well, and thousands of attendees were busily going in and out of the convention center during their lunch break. I was on my third day working undercover and was becoming quite… Read More Lessons From The Field: Covert Operations
The Surveillance Zone book is out! Go behind the scenes of corporate surveillance detection & covert special operations. Get a first-person account of actual covert operations I’ve participated in. Learn the secrets of the trade, and discover a hidden world that’s all around you. Amazon & Kindle: http://amzn.to/2qJo9gq iBooks: http://apple.co/2qPJ9RP Barnes & Noble: http://bit.ly/2sz6dFK Surveillance… Read More The Surveillance Zone Book
A version of this article has also been published in Security Solutions Magazine. On the evening of the 19th of December, 2016, the world was shocked as news came out about the assassination of the Russian ambassador to Turkey, Andrei Karlov. Karlov was shot from behind as he was delivering a speech at the Cagdas… Read More A lesson In Diplomatic Protection
I’m very excited to host my first guest blogger on Protection Circle, Travis Lishok. Travis is the owner of EP Nexus, a fantastic executive protection blog that explores protective intelligence, OSINT investigations, threat assessment, and more. Travis and I decided to collaborate by writing two different perspectives on the same event (an actual protective detail… Read More The OSINT Connection: Intelligence In Executive Protection
Protective Intelligence can be described as the process of gathering and assessing information about entities that may have the intention and capability of harming you, and utilizing this information to protect your assets. As more and more individuals and corporations have begun to realize that early preventative measures are preferable to emergency reactive ones, many… Read More Protective Intelligence And Surveillance Detection
After going over the hostile planning process and reviewing a number of case studies, our next goal is to figure out the vulnerabilities of this process and figure out who can tackle which vulnerability.