Martial arts is one of those subjects that as soon as you raise them, a weird mood sets in. Some people get oddly self-confident, others get defensive and most exhibit a strange combo of both. It’s almost as if a controversial political questions has been asked. Though I’ve never written about martial arts before, they’ve… Read More Martial Arts Misconceptions
“Fail Often so you can succeed sooner.” —Tom Kelly. Mistakes and failures in surveillance, surveillance detection and special protective operations are things I write about quite frequently. I’ve examined them from every which way, explained how they look, discussed many case studies and talked about how to avoid them. One aspect I haven’t touched on… Read More Big Mistakes & Embarrassing Failures
A version of this article has also been published in Security Solutions Magazine. On the evening of the 19th of December, 2016, the world was shocked as news came out about the assassination of the Russian ambassador to Turkey, Andrei Karlov. Karlov was shot from behind as he was delivering a speech at the Cagdas… Read More A lesson In Diplomatic Protection
I’m very excited to host my first guest blogger on Protection Circle, Travis Lishok. Travis is the owner of EP Nexus, a fantastic executive protection blog that explores protective intelligence, OSINT investigations, threat assessment, and more. Travis and I decided to collaborate by writing two different perspectives on the same event (an actual protective detail… Read More The OSINT Connection: Intelligence In Executive Protection
In recent years, quite a few articles have been published about CEO protection and how much money different corporations spend on it. Forbes might have been the first to get this trend started with this (somewhat dated) article. CNBC discussed the issue back during the healthcare debate, and Fortune Magazine put out a piece about… Read More Protecting The CEO
What’s the difference between risk and threat? It’s a simple question about two very common terms we use in the security industry, but one that more people need to ask themselves. And as a result of not doing so, too many security professionals end up using risk and threat (and occasionally, vulnerability too) interchangeably. This… Read More Threats and Risks
Surveillance Detection (SD) is thankfully receiving increasing amounts of attention in recent years, as more and more industry professionals (and even some non-industry professionals) are waking up to its potential benefits. As positive as this development is, it does create the need to abolish some misconceptions regarding SD, and to better explain how it can… Read More SD Enabled Security
After going over the hostile planning process and reviewing a number of case studies, our next goal is to figure out the vulnerabilities of this process and figure out who can tackle which vulnerability.