Protective Intelligence can be described as the process of gathering and assessing information about entities that may have the intention and capability of harming you, and utilizing this information to protect your assets.
As more and more individuals and corporations have begun to realize that early preventative measures are preferable to emergency reactive ones, many organizations over the last decade or so have begun to adopt a more proactive approach towards security. And once you start down the positive path of proactive prevention, you’re likely to reach some form or another of protective intelligence.
Protective intelligence is the interesting juncture where you begin to expand outwards from direct physical protection, and enter other realms like online presence, remote information collection, open sourced information, communications and surveillance detection. A good way to visualize this idea is to think of reactive mitigation as your inner most circle of physical security. Around this initial circle, we extend a larger outer security circle of proactive prevention, and around that circle, we extend an even larger circle (one with an undetermined size) of protective intelligence.
From my experience, one important factor that needs to be improved in many protective intelligence contingencies is their field component – the connection between the cyber or open sourced dimension and the physical reality on the ground. Without in any way denigrating the importance of open sourced or otherwise remotely obtained intelligence gathering and analysis, there is always a need for intelligence to also be gathered from the field. It’s not that remote intelligence collection isn’t important. On the contrary – that’s where you want to start. But this first resort shouldn’t be your last and only one. As I had detailed in an earlier article, hostile planners do indeed use open sourced intelligence in their Hostile Planning Process, but they don’t stop there – they follow it up with field intelligence, i.e. surveillance. So if hostile entities know better than to only rely on open sourced intelligence, why would a protective intelligence contingency not do at least as much?
What is intelligence?
In a well written article by Kristin Lenardson Schwomeyer and Charles Randolph (two very experienced and highly regarded experts in the field of protective intelligence), an important distinction is made between intelligence and information. Intelligence, the article explains, is information that is contextualized for your needs. “You discern what information is actually important to your principal and the detail; this turns the information into intelligence”. The article also emphasizes the need to diversify your sources of information – to not depend on any single source by itself.
The points I’m trying to make here are that, a) when it comes to physical assets, a very important source of information is the actual situation in the field; and b) your ability to discern between what is or isn’t relevant or accurate depends on a certain amount of field verification.
It ultimately comes down to what questions you want answered. If you want to find out what people are saying about you online, or who’s been researching, coordinating and communicating about you lately, then cyber or open-sourced avenues might very well provide you with the answers you’re looking for. But if you also want to find out whether anyone has been physically surveilling your corporate headquarters, the residences of your executives, their routes to and from work, your special events, or any other important asset (remote databases, employee transportation vehicles, etc.), then you’re going to need another – more physical – avenue to answer these types of questions.
The field component of your protective intelligence effort (usually SD) can provide two very important functions:
It can collect vital, accurate information about real-world events, situations and activities in real time, and do so in conjunction with a professional analysis of what it means (oftentimes on the spot). No open or remote source can currently provide this.
It can verify the accuracy of your open sourced intelligence by means of physical data – in real time. Open sources can be very important, but until they are put to the test – until you have actual evidence from the field – they essentially provide you with unsubstantiated claims. If you never see how open sourced intelligence does or doesn’t physically manifest itself in the field, how will you know if it’s good, verifiable intelligence?
I have lost count of how many hundreds of private and public sector open-sourced or otherwise remotely collected intelligence reports I or my clients have received over the years. These reports can, of course, be very useful in their own way. But in most of the cases where they’re not also accompanied with, or supplemented by, a field intelligence component (usually SD), they provide not much more than vague and general BOLO alerts and security advisories that don’t always leave you with much to go on. If all you’re looking for is to revise some theoretical threat matrix to present to a security committee then that’s fine. But if you’re interested in proactive prevention of harm to your physical assets, you’d be well advised to incorporate a field component into your protective intelligence program.
The main value of surveillance detection is that it straddles, and therefore bridges, the two realms of security and intelligence, which is why I view it as a form of Field Protective Intelligence.
Interestingly enough, SD can be employed by a physical protection program that sends operators out to take positions around it (from the inside, out); or it can be employed by a protective intelligence program that sends operators to the field, to be closer to the action (from the outside, in). I’ve done it both ways for corporate clients; in some cases reporting to the physical protection team, and in others, reporting to the protective intelligence center.
There’s no definite right or wrong way to do it. It just depends on the situation (and on client requirements). But either way, field protective intelligence is a great way to bridge the gap between the physical protectors in the field and the protective intelligence managers in the office.
Our Students Say
I've been in Executive Protection here in LA since returning from a tour in Iraq in 2005. I think a lot of people who are interested in this field are under the misconception that being a cop, soldier or bouncer will give them all the tools they need to be effective in the EP field. Far from it. These jobs may provide a foundation but they don't provide a true understanding of the dynamics of Executive Protection. Your course was a good introduction to the ins and outs (and potential pitfalls) of EP work. Whether or not someone is new to the field or, like me, just trying to maintain perishable skills, I highly recommend this course.Don Los Angeles, CA
As a former law enforcement officer I thought I had a pretty good understanding of what it would take to be a good Executive Protection Specialist but it's a whole different ball game when you don't have the weight of a badge behind you. Although this course was basically fundamentals, I felt it helped bridge the gap between my experience as a law enforcement officer and the EP field. Although I had done a lot of similar range work before I found the firearms portion of the course work to be very professional and well executed and could see how this would be a great course for someone new to the field. Thanks for a great course.Josh Huntington Beach, CA
I just want to say thank you to ASC for everything. After I graduated I got a call from ****** Security about my interview that I had with them on the last day of school. They said that the skill set and training I received from ASC (along with my military background) place me far beyond the average person who applied for a job with their company. And because of that they want to hire me not as a security guard, but as a shift supervisor. I couldn't believe it. One of my fears about starting my career and security was that I would graduate from training and not receive any job offers. However since graduating ASC I've been offered two jobs (one as a supervisor and one as a guard) and the pay for both are great. The money I'm going to start making is way more than what I was before so for that I want to say thank you. It was because of you guys that my life changed course and now the possibilities are ever-changing. Be sure to pass my thanks to Connor, Omer, Ryan, Jake, Ian, Steve and the rest of the guys.Jovidean Sun Valley, CA
I just wanted to thank you for giving me the opportunity to attend your CPR course. I know your focus is primarily training bodyguards but as a mother of two I wanted to learn CPR 'just in case.' I never realized there was such a difference between CPR for adults and CPR for infants. I now feel comfortable that if something bad were to happen I have the ability to do CPR. Thank you again.Larissa Courpus Christi, TX