A Red Team is a non-hostile group or individual that challenges a system or an organization by simulating a potential adversary. This is done in order to uncover security vulnerabilities that are often not apparent to organizational insiders. The term comes from the cold war practice of US forces taking a Soviet, i.e. “red”, perspective.… Read More Red Team
In almost every security training I’ve conducted over the years, the subjects of verbal compliance and verbal management of aggressive behavior have come up. The interest in these topics is found among security and non-security professionals alike. It’s a concern that unites everyone. Having spent years grinding it out in the field, dealing with this… Read More Verbal Management of Aggression
For a little while now, I’ve been looking for a good way to give a ringing endorsement to Left of Bang. For those of you who are unfamiliar with this book, it provides guidelines and instructions on how to look at individuals and environments in order to detect early warning signs and indicators of impending… Read More Left of Bang
This article is intended for non-security professionals who are looking for advice on how to get a physical security program started. OK, you’ve gotten to the point where your organization needs to employ some physical security measures. Now, for most small companies, startups, VCs, foundations and family offices, having to deal with security isn’t… Read More How To Get Started With Physical Security: A Guide For Startups & Small Companies
What follows is Chapter 12 of my new book Surveillance Zone. The book gives you an exclusive, behind-the-scenes look into the mysterious world of private-sector espionage, surveillance detection and covert protective operations. By this point in the book, some of you are bound to start asking how you, too, can get in on the action and become… Read More So You Want To Be A Covert Operator
Are there any overlaps between the physical and cyber security fields? Are there certain corners of cyber security that can best be reached by physical security experts, and vice versa? Can the two fields benefit from more cross-pollination and professional cooperation? The answer to all three questions turns out to be a resounding Yes, and… Read More Patrolling The Cyber-Physical Security Border
I had a great time on SOFREP Radio recently. For those of you who haven’t heard of SOFREP, check it out. These guys do lots of good and provide great content, insights and commentary. It was a true honor to be invited on.
In my last article, I discussed how security professionals should treat security as a science rather than an art. This is because our goals should be objectively verifiable and should therefore be based on reason, evidence and probability. This, however, is just one half of the story. The other half has to do with the client.… Read More The Feeling Of Security
I’ll admit it, I have an annoying pet peeve about the security field being described as an art rather than a science. The sentiment behind this is that security, protection, intelligence, surveillance detection, etc., can’t be reduced to formulas, equations and lab experiments. There are some general principles, but there aren’t any one-size-fits-all solutions. It… Read More It’s Not an Art, It’s a Science!
What follows is Chapter 9 of my new book Surveillance Zone. The book gives you an exclusive, behind-the-scenes look into the mysterious world of private-sector espionage, surveillance detection and covert protective operations. Here’s where you can find it: Amazon & Kindle: http://amzn.to/2qJo9gq iBooks: http://apple.co/2qPJ9RP Barnes & Noble: http://bit.ly/2sz6dFK A technology conference somewhere in Silicon Valley, 2013. The tech conference was… Read More Lessons From The Field: Covert Operations