Law enforcement personnel, facility security directors, HR, CFOs, CS Security officers, CIOs and Risk Managers can will learn how to utilize intelligence techniques to create effective security countermeasures.
Just because you don’t have an intelligence operation does not mean that you cannot learn to apply the basic principles of INTEL when issues arise. Consider this – a full 90 percent of all intelligence information is garnered from open source material. You can learn how to read a newspaper from a new perspective and how to extrapolate the important subtext from a news source.
These techniques are designed to teach the layman how to become his or her own intelligence analyst.
Sal reveals the Five Step Process that helps you protect corporate executives, VIPs, high profile actors, and staff who are stalked or harassed. Learn how to best research, identify and assess threats, and then create a strategy to minimize those threats and develop a case that will hold up in a court of law.
The Five Step Process uncovers the elements you need to:
|1. ||Review the methodology of attacks and its relevancy
|2. ||Extract the usable intelligence
|3. ||Study and analyze behavior
|4. ||Develop pre-incident indicators
|5. ||Develop countermeasures
Not just for counter-terrorism measures, these techniques work for all crimes, including thefts from autos, stalking, employee theft, shoplifting, robberies and burglaries. The key is to break down the process, recognize the signs and become aware of what’s going on around you.
You’ll learn to look at the methodology of how a crime is happening, and combine that knowledge with the behavior that is associated with it before the act. Extrapolating intelligence from similar events and using role reversal to “become” that person allows you to break it down to understand a criminal’s specific behavior, so that you can look for them.
Don’t wait for the government to inform you of a threat. Stay ahead of the curve and identify external and internal risks from within your own organization.