Industry Insights
Subscribe and stay updated with the latest security and intelligence tips and news.
Enhanced vs. Reliant
In today's digital age, we are increasingly reliant on mobile devices and technology to keep track of our daily schedules and plans. With the convenience of having a smartphone in our pocket at all times, it's easy to rely on it to keep us organized and on track. However, there are significant benefits to memorizing plans instead of relying solely on technology.
Smurfing, Money Laundering, and Travelers' Peril
Money laundering is a complex and illicit process that involves disguising the origins of illegally obtained funds by channeling them through legitimate transactions. One lesser-known facet of money laundering is "smurfing," a tactic often used to evade detection by authorities. This article sheds light on the dark world of smurfing in the context of money laundering, with a focus on how unsuspecting travelers can inadvertently get entangled in this criminal activity.
Navigating the Process of Medical Evacuation from a Foreign Country
Traveling to foreign countries can be an exciting and enriching experience, but sometimes unforeseen medical emergencies can arise, necessitating a medical evacuation. A medical evacuation involves transporting individuals in need of urgent medical care from a foreign country to their home country or a medical facility with the required expertise.
Crisis avoidance requires courageous leadership
I cannot recall how many crisis situations I have found myself in the middle of, but each one has something in common. The crisis typically provides opportunity for everyday individuals to step into a heroic role. I have seen employees put themselves in extreme danger outside of their area of expertise, to save a life in a war zone.
The thin line between Security Expert & Egoist?
Are you a security expert? That is a good question. It's one I'm often asked and consistently ask myself. Am I a security expert? Well, maybe... at least for this month.
Secure Comms in Risky Environments
Simple tactics for communicating securely in hostile environments.
Cut Through The Noise
Free Open Source Aggregators every Intelligence Analyst should know about.
Understanding History and Overcoming Bias: Lessons from Ukraine
In recent months, my consultancy, Morton Executive Decisions, has been actively involved in Ukraine, conducting long-term needs assessments, facilitating refugee evacuations, providing humanitarian aid logistical support, and delivering tailored training programs for aid workers. As someone who has witnessed the conflict firsthand, I often hear people express their disbelief at the scale of the situation.
Predicting an attack...its not rocket science!
The attack cycle is not considered to be a complex process for those operating in the shadows and it applies to all types of attacks. The cycle entails searching for a vulnerable target, conducting intelligence collection and analysis, deploying assets, executing the attack, exploiting the attack's results, and then beginning the cycle anew.