888-831-0809
International Travel Risk Matrix

International Travel Risk Matrix

The OSAC Risk Matrix is designed to allow private-sector security professionals to take a holistic approach to risk analysis by assessing different dimensions of a given risk – and to do so in a way that is the most relevant to their organization and its interests.

Investigative and Intelligence Services for Alumni

As a courtesy to our Alumni, we will be offering our investigative services* at ‘no-profit’ rates in order to enable effective information gathering and intelligence development to those with limited resources. No results = no fee.

Contact us for more information on other services: Surveillance, Due Diligence, Business Intelligence, Technical Surveillance Counter-Measures, Consulting, Safe Rooms, Expert Witness.

Invoice & Contract Templates

Invoice & Contract Templates

Drafting documents can be tricky, time consuming and expensive. However, there is no reason to re-invent the wheel. As we try to facilitate our graduates in their endeavors, attached below are the typically inquired about forms and documents.

General Advance Worksheet

One of the most important and effective function of providing protective services is the advance. From coordinating logistics to screening for threats, the advance produces more positive results and a higher chance of success than any other protective function of the practitioner.

The chances of something happening are statistically low given the threat facing our average executive, however IF something does happen… those statistics don’t matter anymore.

FAILING TO PREPARE, IS PREPARING TO FAIL

Below, developed from the methodologies we rely on to protect our clients combined with my experiential and practical knowledge, we have compiled the most effective task list for the widest range of venues we could given our average task and environment. Some advances are far more detailed and some just the opposite, however what we have created is a utility driven example of an advance worksheet that is simple and rapid enough to use repeatedly yet productive enough to result in an effective advance.

Vehicle Readiness: Inspection Checklists

Recent discussions in professional groups, such as the Security Driver & Training Facebook group, included recommendations and ideas for putting together a vehicle readiness check list, any input on lessons learned to add to the standard check lists for vehicles, etc.

Below is a list that I have developed for our Defensive & Evasive Driving Course that is both simple and effective for use by protective agents who routinely check their vehicles for optimal readiness, including rental vehicles. 

Protective Intelligence: Open Source Intelligence Resources

Protective Intelligence: Open Source Intelligence Resources

Protective intelligence is the process of gathering and assessing information about persons who may have the interest, motive, intention, and capability of mounting attacks against public officials and figures.” – USSS Protective Intelligence & Threat Assessment Investigations: A Guide for State and Local Law Enforcement Officials

“Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term “open” refers to overt, publicly available sources (as opposed to covert or clandestine sources); drawn from publicly available material, including: the Internet, the media, photos and geospatial information.” – CIA DNI Open Source Center

Below, we have put together a list of highly effective resources we use while conducting OSINT investigations for protective intelligence; and remember, information is the data obtained through research and the resultant actionable conclusions we formulate from that data is the intelligence.

Resources – Counter Surveillance, Deception Detection, Graphology & Behavioral Analysis

Our segment on Counter Surveillance & Behavioral Analysis in our Executive Protection Fundamentals Training Course is continuing to gain popularity, set trends, win friends and influence people. Due to the high volume of positive feedback and requests for more, here is a list of resources on the topic. Enjoy, and please keep up the honest feedback – it helps us maintain our relevancy.
counter surveillance and behavioral analysis