Threats against individuals, families and organizations typically begin with telltale signs. Stalkers, disgruntled ex-spouses and employees, and terrorist groups often leak information. Whether through social media, their social networks or other means, some level of expression typically accompanies targeting behaviors.
AT-RISK uses a comprehensive, global intelligence gathering process to spot trends, warning signs and other activity that indicates potential violence and other threats. Most importantly, skilled analysts trained in behavioral-based threat assessment connect seemingly unrelated events to uncover patterns that may lead to attacks and other dangers.
Every protection and threat mitigation program includes multiple intelligence gathering and analysis tactics, including:
Consulting. We work with clients to uncover potential threats based on their lifestyle, activities, past relationships and other factors. We also analyze travel and activity habits and identify potential points of vulnerability.
Investigation. Our multi-disciplinary investigative teams include not only security experts, but also specialists in predicting human behavior, including forensic psychologists with expertise in criminal and terrorist activity. In addition, we have resources who understand the culture, politics and other nuances of the countries where our clients work and visit, ensuring accurate and complete investigations.
Protective intelligence. We apply protective intelligence to an integrated law enforcement and intelligence model, ensuring the application of collected intelligence to critical operations. We augment information gathered from open- and closed-source networks with our extensive network of threat assessment and intelligence specialists, security firms, and private agencies around the world, which provides local intelligence. Then, computer and human analysts sift through the data to spot patterns and trends and to help defuse potential threats before they escalate.
We protect individuals and families with a proactive approach that continually monitors and evaluates everything from terrorist activities to threatening social media posts. We connect the dots among seemingly unrelated activities to form a complete picture of potential threats.
We then use that information to manage our protection services for clients all over the world.
Global Security Operations Center (GSOC). Our “nerve center” maintains constant communication with security personnel around the globe, warning of potential threats nearby and along their intended routes. GSOC analysts are fully briefed on every client and situation, so clients are always communicating with someone who has in-depth familiarity with their account, situation and people.
Global intelligence, local contacts. Partnerships with local resources around the world provide AT-RISK protection teams and the people they protect with legal and discreet access to critical, timely intelligence. Relationships with local authorities enhance our ability to mitigate potential threats.
Skilled triage. AT-RISK analysts identify the most critical risks and vulnerabilities to set priorities during the investigation process. This approach maximizes efficiency and effectiveness, delivering the best value for client budgets.
Client-based monitoring. We protect clients by continually evaluating communications, websites, social media and other activities to spot patterns that reveal attempts to compromise or penetrate the security surrounding the principal.
- According to authorities, four credible ISIS-linked social media accounts posted messages 72 hours before the Paris attacks that killed 130 people in November 2015.
- Intelligence agencies missed opportunities to detain one of the Boston Marathon bombers soon after a trip when he was exposed to global jihadist ideology, a trip that sowed the seeds of an attack that killed three people and injured more than 260.
- The shooter who killed 10 people on an Oregon community college campus used social media to discuss his intentions the night before the attack.