Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Access Control, Incident Response & Protective Intelligence: the three circles of Preventive Security.

Man watching conference.- Photo credit to protectioncircle.wordpress.com

Man watching conference.- Photo credit to protectioncircle.wordpress.com

Circles of Security,  constitute one of the most important ideas in preventive security. We have three layers/circles of security (by Amy Toben, Director of consulting, training and special operations at HighCom Security Services, all three articles published in protectioncircle.wordpress.com ) :
ACCESS CONTROL .- This concept, which is most commonly applied to facilities and campuses, draws two general circles around the asset or property in question – the Inner Circle and the Outer Circle. The Inner Circle can be defined as the property that’s being protected, along with its immediate exterior. The Outer Circle is the whole area around the property, stretching as far as a security officer can realistically visually control (1-3 blocks on average, depending on the surroundings). The geographic dichotomy between these two circles is most pronounced when talking about closed/controlled facilities and campuses, or controlled buildings within an open campus, and the relationship between these two circles is the subject of this article. READ PART 1 ARTICLE ON ACCESS CONTROL HERE

INCIDENT RESPONSE.-  Anyone who’s been involved in, or even just witnessed, a full-on Explosive Ordnance Disposal (EOD) operation would know how fascinating and exciting it is to watch (albeit from a distance). Brave men and women in Advanced Bomb Suits, putting themselves in harm’s way, EOD robots being deployed,projected water disruptors blasting open suspicious items – exciting stuff. But unless you happen to be an EOD operator, you have nothing much to contribute to the Inner Circle after it’s been evacuated. Therefore, try to resist the urge to satisfy your curiosity, and shift at least some of your focus to the Outer Circle – looking for anyone who might be watching, filming or taking notes. Even if your incident response in the Inner Circle was perfect, meaning that an attack plan of the sort you just responded to would not work well, don’t let potential hostile planners calmly assess this, change their plans accordingly and come back next time with something you won’t be able to stop. Detect, expose and if possible, engage anyone out there – suspicious or not. Even if this won’t necessarily lead to an advanced surveillance operative being captured, you can at least cause them to abandon their plan or take it somewhere else.   READ ARTICLE HERE



Well, there was actually another layer to this story, an additional protective circle that began before this individual (and a few others) ever even made it to the Outer Circle – an intelligence circle.

Protective intelligence is the interesting juncture where you begin to expand outwards from direct physical protection, and enter realms like online presence, remote information collection, open sourced information, communications and surveillance detection.
A good way to visualize this idea is to think of reactive mitigation as your inner most circle of physical security. Around this, we extend a larger circle of proactive prevention, and around that circle, we extend an even larger circle (one with an undetermined size) of protective intelligence.

In a well written article by Kristin Lenardson Schwomeyer and Charles Randolph (two of the most highly regarded leaders in the field of protective intelligence), an important distinction is made between intelligence and information. Intelligence, the article explains, is information that is contextualized for your needs. “You discern what information is actually important to your principal and the detail; this turns the information into intelligence. The article also emphasizes the need to diversify your sources of information – to not depend on any single source by itself.  READ ARTICLE HERE