• On the Circuit
  • Posts
  • Is OSINT an Essential Skill for Executive Protection?

Is OSINT an Essential Skill for Executive Protection?

October marks Cybersecurity Awareness month and before it's over, we wanted to add our own contribution to this growing area of importance.

In this edition of On the Circuit, we chat with surveillance expert, Pete Jenkins who explains why he thinks all protectors should knowledge-up on the subject of Open Source Intelligence.

Next up, resident cybersecurity expert, James Bore reveals the most prevalent cyber threat we face and how we can keep our clients protected.

And as if that's not enough, Brittany Spears provides a timely reminder of how celeb clients often need educating a little more when it comes to securing their safety online.

Join us as we cover this and much more!

The Circuit Magazine Podcast

What is Open-Source Intelligence and how does it apply to modern-day Executive Protection? Is this something that everyone should know something about or is it only for a few select specialists? 

In this week's episode, we're talking with Pete Jenkins of ISS training, one of the leading providers of OSINT training. We're going to be looking at the applicability of OSINT in everyday EP operations, its use as an investigative tool and how we can use that knowledge to protect ourselves and our clients from unseen threats.

This is a huge area and we'll be covering a lot in this episode, including:

  • What sort of background, prerequisites, or prior learning do candidates need before they embark on an OSINT course?

  • How can EP operators use OSINT fundamentals to mask the movements of their principal?

  • If you're looking to remain under the radar, what can people do to stop others from finding them? 

If you enjoy listening to the Circuit Podcast and can spare a minute, please rate/review us. Your rating will help us to rank higher making it easier for others to find the podcast.

The Need to Know

Seven people have been shot dead and 140 injured as thousands took to the streets to protest. Footage showed heavily armed Sudanese army and paramilitary forces fanning out across the city, restricting civilian movements and firing teargas at protesters carrying national flags and burning tyres.

The "Balikbayan Foxes", concentrated in the Philippines, are targeting the shipping, logistics, manufacturing, pharmaceutical, business, and energy sectors across the US, Europe, and Asia. The gang is also taking advantage of COVID-19 to propagate Trojan malware.

No boarding pass? No problem. Your face is the new passport. The ‘Digital ID’ is a series of verifications at each of the four checkpoints one encounters from curb to gate. There is no change to the standard airport obstacle course. But it is designed to make the process more efficient. 

Not much is known about North Korea's huge special operations force, but they are believed to be well trained and highly motivated. A defected spy offers hints about how they'd be used in a war.

Afghanistan is facing the biggest humanitarian crisis in the world, with the country seeing a sharp deterioration in the situation since the Taliban seized power in August. The United Nations has issued a stark warning – that millions will die if urgent aid does not reach the country soon.

The alleged Mossad spies were of Arab descent and were reportedly present to spy on Palestinians living in Turkey. Turkish reports claimed that the suspects were split into five cells of three people each, and were all arrested in a covert operation on October 7.

For more timely global updates like this, get the Circuit Daily Briefing delivered to your inbox... daily! Get on the list >

From the Pages of the Circuit Magazine

Phishing is a whole family of different attacks designed to manipulate a target into performing actions against their best interest, usually disclosing information in some way or carrying out fraudulent transactions. Within that family of different types of phishing we have:

  • Vishing

  • Smishing

  • Spear-Phishing

  • Whaling

  • ...and many more

The overwhelming majority of cyberattacks occur through some form of phishing. In this article, resident Cybersecurity expert, James Bore, lifts the lid on the many types of phishing, why these attacks are so prevalent and how we can protect against them.

If you enjoyed this article and want more great content from across the industry then sign up for the Circuit Magazine >

[Stratfor] Situation Report

Russia is concerned that Ukraine could soon use the drone to retake the Donbas region, but Ukraine is unlikely to do so because the country does not want to risk Russian retaliation. Even so, the use of this drone will push Moscow to consider escalating the Donbas conflict. It will also damage Russia’s relationship with Turkey, as Istanbul supplied Ukraine with the drone and other support.

China, Russia and the United States have been competing to help Tajikistan secure its porous and remote frontier with Afghanistan following the Taliban’s takeover in August. Tajikistan will likely use the new Chinse-backed base to keep a closer eye on its southern neighbor and prevent illegal border crossings by militants.

Special Offer for On the Circuit Readers

Be the smartest person in the room with this exclusive offer from Stratfor.

From the Community

Britney Spears arrived in Belize and went viral with in minutes of her arrival. As I sat watching the news, I realized, I know exactly where she is located in the country because of the videos she posted. From my stand point, clients should not post their videos and pictures until they leave the country. @Edwin Biggz Mendez

This is a huge security risk that ramps up the pressure on the security detail and hotel staff, making everyones job more difficult.

Should the celebrity know better. Or, should her security detail take more responsibility to ensure their client is educated on such matters?

Ask questions, get advice, and find industry resources from an active and thriving community of professional, working operators:

🇺🇸 NABA Protector >

🇬🇧 BBA Connect >

On the Circuit Merch

To any industry insider, being 'On the Circuit' means being operationally active in the world of international protection. To anyone else, it's just three words. Those who know, know!

Upcoming Events

Conflict Management for Protectors - 17 Nov 2021

This upcoming Circuit event will cover this hugely anticipated topic, brining together some of the industry's top experts on the subject. Look out for more information coming soon.

Elsewhere, On the Circuit...

Megan Thee Stallion stepped out at the Formula 1 U.S. Grand Prix event, where her bodyguard shut down Sky News reporter and former racer Martin Brundle for an interview. Who came out of this awkward situation worse off?

Knowledge Up

Cybersecurity for Everyone, offered by the University of Maryland, is free to enrol in.

This course is designed for students with some or no background in information technology, whether a novice or active in the cybersecurity field and will provide the principles to understand the current debates shaping a rapidly evolving security landscape.

The Circuit Magazine has no affiliation with the UoM or Coursera.

Until next week...

If you found this issue of the On the Circuit newsletter useful, please forward it to a friend or colleague who’d also enjoy it.

Here's a handy message you can use to share with your friends:

Hey! Have you read On the Circuit? It’s a newsletter for Protectors like us -- it gives you the low-down on what's happening across the industry and you’ll sound like the most informed person in the room. Sign up here, it’s free: https://www.getrevue.co/profile/circuit-magazine

On the Circuit has you covered when you're busy covering others.

Reply

or to participate.