A Red Team is a non-hostile group or individual that challenges a system or an organization by simulating a potential adversary. This is done in order to uncover security vulnerabilities that are often not apparent to organizational insiders. The term comes from the cold war practice of US forces taking a Soviet, i.e. “red”, perspective.… Read More Red Team
This article will cover some of the more common misconceptions I’ve encountered among non-practitioners of covert operations (mainly those who want to employ covert operators). For those interested in getting tips for field operators, please check out my previous articles, Tips & Suggestions for Covert Operators and Tips & Suggestions for SD Operators. Overt—Low-Profile—Covert I… Read More Covert Operations – Common Misconceptions
I have two important recommendations to make today. The first one is easy. If you haven’t done so yet, stop what you’re doing and go get Chasing Shadows by Fred Burton. Fred is the Chief Security Officer and Vice President of Intelligence for Stratfor. He was kind enough to send me a signed copy of… Read More Chasing Shadows
What follows is Chapter 12 of my new book Surveillance Zone. The book gives you an exclusive, behind-the-scenes look into the mysterious world of private-sector espionage, surveillance detection and covert protective operations. By this point in the book, some of you are bound to start asking how you, too, can get in on the action and become… Read More So You Want To Be A Covert Operator
Are there any overlaps between the physical and cyber security fields? Are there certain corners of cyber security that can best be reached by physical security experts, and vice versa? Can the two fields benefit from more cross-pollination and professional cooperation? The answer to all three questions turns out to be a resounding Yes, and… Read More Patrolling The Cyber-Physical Security Border
I had a great time on SOFREP Radio recently. For those of you who haven’t heard of SOFREP, check it out. These guys do lots of good and provide great content, insights and commentary. It was a true honor to be invited on.
What follows is Chapter 9 of my new book Surveillance Zone. The book gives you an exclusive, behind-the-scenes look into the mysterious world of private-sector espionage, surveillance detection and covert protective operations. Here’s where you can find it: Amazon & Kindle: http://amzn.to/2qJo9gq iBooks: http://apple.co/2qPJ9RP Barnes & Noble: http://bit.ly/2sz6dFK A technology conference somewhere in Silicon Valley, 2013. The tech conference was… Read More Lessons From The Field: Covert Operations