Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:04):
Welcome to Spycraft, a podcast that tells gripping life and
death spy stories and the amazing devices and operations that
made them possible. Now let's get started.
Speaker 2 (00:21):
Welcome back everybody today, we have a great show.
Speaker 3 (00:24):
We're going to be talking about a new book, The
Protective Intelligence Advantage Mitigating the Rising Threat to prominent People.
With us today is Scott Stewart, former Army tactical intelligence officer.
He's been fifteen years at Stratford and he's the VP
of Protective Intelligence at torch Stone Global. VP of Protective
Intelligence at torch Stone Global. Definitely look it up. Also
(00:46):
with us today is co author Fred Burton. He's the
author of another great book we interviewed a while back
ago called Beirute Rules. He's a former police officer and
special agent and together they've combined on this new book,
The Protective intelli Leigence Advantage.
Speaker 2 (01:00):
Before we get started, you know.
Speaker 3 (01:02):
What to do, share, subscribe, hit that I like, but
you know we like it, and let's not waste any
more time.
Speaker 2 (01:06):
I'm going to show Scott and Frey Welcome, gentlemen.
Speaker 4 (01:08):
Hey, thanks for having us.
Speaker 5 (01:09):
Carlos, thanks for having us.
Speaker 3 (01:11):
Thank you very much for being here and thank you
both for your service as well. Thanks so hok, you
have a lot of knowledge in this field. What got
you motivated to write this book now?
Speaker 6 (01:25):
I think just you know, you look at the headlines
and when we see what's you know, happening lately, whether
it was the Brian Thompson assassination you know in New York,
whether it was the attacks in Minneapolis, whether it's you know,
just these the attacks we're seeing and stocking of influencers.
There's really a need for protective intelligence now more than ever.
(01:48):
And it's not enough just to have goons with guns around,
you know, that's always reactive. So what we're trying to
do is to help security teams become proactive, to be
able to get ahead of the threat curve and basically
stay left to the boom.
Speaker 7 (02:03):
And Carlos, just for the background of your audience, you know,
Scott and I were part of the original group that
put together the Protective Intelligence Division at the State Department's
Diplomatic Security Service in the eighties, and we were the
first to bring that model to the private sector. And
so over the years we've written about it at Strategic Forecasting,
(02:27):
STRAT four and Scott's written about it extensively at towards
Stone Global, and certainly after the assassination of the United
Healthcare CEO. The timing was we thought was right for
us to collaborate and hopefully try to keep people safe
and have folks look at this problem and understand the
(02:49):
general threat landscape.
Speaker 3 (02:52):
Interesting that also reminds me the issue we were starting
to have with docsing and seeing that how dangerous that is,
and with the Homeland Security Christy nom that was kind
of wild, and how they docks here because it's no joke,
but some of them, I'm assuming I like to call
them LARPers, so they life action, real role player, whatever
they call them, and that's pretty dangerous.
Speaker 2 (03:14):
Staff.
Speaker 6 (03:15):
We actually have a whole chapter in this chapter thirteen
on don't docs yourself, because one of the things that
we recommend to our readers and to our clients is
that they subscribe to an information removal company to help
take down a lot of the information that's on the Internet,
especially with the data aggregators, because it is dangerous and
(03:35):
it is easy to get profiles on people, as we
show in the book, going all the way back to
like the two thousand and three kidnapping of financier Eddie Lampert.
We've seen criminals pulling down these profiles from these data
aggregators and using them to target prominent individuals. We also
saw the same thing even recently in those Minnesota political shootings.
Speaker 4 (03:57):
The shooter used those services.
Speaker 6 (04:00):
So you know, we recommend those those kind of companies,
you know, like a three sixty privacy. But if you're
out there doxing yourself by carelessly putting information on social media,
all that efforts really wasted. So you're really bringing down
heat on yourself by posting that information carelessly, by not
having your you know, accounts locked down on the privacy
(04:23):
settings and such, and so you can actually bring a
lot of heat and danger onto yourself.
Speaker 7 (04:28):
And Carlos, when you think of this from a historical perspective,
you know, as someone who writes about incidents, you know,
going back to the sixties and seventies. In nineteen seventy three,
you know, we had a cold case involving the political
assassination of an Israeli diplomat in my hometown, and the
(04:49):
terrorist group that found him just looked in the old
school telephone book and he was listed. So as you
fast forward, today, you know, a few clicks of the
keyboard and you can pretty much find anybody that you
want to find. Or, as Scott and I reflect in
the book, it's so easy for family members to out
(05:12):
whatever the CEO is doing or that ultra high net
worth person. You know, on a practical basis, you know,
we talk a lot to cops and protectors, and protectors
and cops.
Speaker 5 (05:25):
Are now in the gun sites.
Speaker 7 (05:26):
So it's important for all of us to think about
that and to try to eliminate that personal privacy information
that's out there. And there's some great companies out there
that can do that for you.
Speaker 3 (05:40):
So true, it's so sad now that they're targeting ice
agents as well. It's just kind of wild.
Speaker 7 (05:46):
You know.
Speaker 3 (05:46):
It also reminds me and if I'm getting out of
myself or if I if you're too far off to
bringing back in.
Speaker 2 (05:51):
But it reminded me.
Speaker 3 (05:53):
A lot of the baseball players lately. I don't know
if any other sport I think basketball, Yeah, go.
Speaker 2 (05:58):
Ahead, everybody.
Speaker 6 (06:01):
We've seen it in Europe with the soccer players, soccer
players in South America and being kidnapped, and it's kind
of a global problem. And there again a lot of
the stems from self doxing. They're not being careful what
they're putting on their social media. And we even saw
the NFL put down a notice after Joe Burrow, the
quarterback of.
Speaker 4 (06:21):
The Bengals, had his residence burgled.
Speaker 6 (06:24):
Basically warning them, you know, be careful what you're putting,
because what they were doing is showing, you know, kind
of their bling, showing off what they had, but then
they were also showing kind of where it was kept
within the residence. Some of the video would show, you know,
the home security system kind of allowing the burglars to
know exactly what was there, where it was, and what
was protecting it. So you wait till the uh, you know,
(06:46):
the person's out of town, or you do what happened
to the former Seattle Seahawks player Richard Sherman, and he
actually had his home invasion at his house while his
wife and family were still there. So, you know, these
things happen, and a lot of it. Unfortunately, there again
is self doxing. You know, when we saw that with
the Kim Kardashian thing back in twenty sixteen or it
(07:08):
was twenty sixteen, twenty seventeen in Paris, where she was
throwing the stuff on Instagram showing where she was staying,
all the jewels she had with her, and then all
of a sudden, those Paris thieves were able to put
those dots together, connect the dots and target her at
that hotel.
Speaker 7 (07:23):
La has been hit hard too lately, as it it Scott.
From the data that you collect there at Torchstone Global.
Speaker 6 (07:30):
Yeah, we're seeing a lot of high end robberies. Some
of them are are not necessarily targeted that way. We're
seeing just you know, basically the robbers see a nice house,
what were and they'll use things like drones on the house.
They'll set up cameras kind of you know, almost like
trail cameras, right, kind of remote cameras. They'll set those
(07:53):
up on the house to try to get the pattern
of life down, and then they'll come and you know,
try to hit the house when it's unoccupied. But they're
they're they're pretty they can be kind of sophisticated in
one hand and the other hand, you know, just pretty
straightforward because some of the gangs will try to use things,
you know, like jammers uh to jam bluetooth and uh
(08:15):
Wi Fi for the alarm systems, But at the same time,
they're like smashing in your plate glass window and your
sliding glass door with a brick or a spring loaded
punch and then trying to get out before the cops
can respond to the alarm. So we're seeing a combination
of fairly sophisticated with just pretty straightforward brutal home invasions.
Speaker 2 (08:38):
I'm trying to.
Speaker 3 (08:39):
Figure out what's the next question, because I have three
things that are popping up in my head. I'm trying
to see how I can coordinate thief because one of
the things I guess.
Speaker 2 (08:47):
I know this is not.
Speaker 3 (08:48):
Exactly your field, but with all the years of experience,
I'm sure you've either thought of it or having credible
insight into it.
Speaker 2 (08:55):
It's weird because in today's world things seem to have shifted.
Speaker 3 (08:58):
I know dosing is new obviously in the the last
twenty five years, but.
Speaker 2 (09:03):
The targeting of heroes in a sense right athletes, the
targeting of people that you just never thought would target.
It was almost like an unwritten rule. You don't target
these individuals that much. Or maybe I'm naive.
Speaker 3 (09:14):
Or didn't realize that in the past, but I see
just so many now where they just target big names
and there's like no rules or regulations.
Speaker 2 (09:23):
Do you think the criminals have changed.
Speaker 6 (09:25):
No, I mean go all the way think about the
Limberg baby kidnapping. You know, there's there's just been this
long history of you know, targeting high profile individuals, whether
it was in business, whether it's been in sports elsewhere.
So it's really not new, you know, it's it's kind
of you know, back to that quote about you know,
(09:47):
I robbed banks because it was really Setton allegedly said that,
you know, I rob banks because that's where the money's at. Well,
that's that's what we're seeing with you know, these high
profile individuals, especially right now with the money. You know,
so back in the day, you know, probably a Ken
Anderson as Cincinnati quarterback wasn't making millions and millions of dollars.
But now you fast forward to Joe Burrow and this
(10:08):
guy's probably making fifty million dollars a year or whatever.
So that really moves those athletes up that target continuum
that way, just because of you know, their their their
net worth is so much greater than it was in
the past.
Speaker 7 (10:22):
Yeah, and that's one of the things we try to
do with our book carlos Is put this in perspective
and look at it too from a historical aspect of
the past attacks and some of the lessons learned. So,
you know, Scott mentioned the Lindbergh baby, but we also
had the kidnapping of the heir to the Corps Beer Kingdom,
(10:45):
and many others that you know, this has been around
for a while and there's some, you know, very hard
lessons that can be learned, but then you can have
some takeaways as to what you can do about all
these kinds of incidents as well.
Speaker 6 (11:01):
Yeah, and many of the lessons that we talk about
kind of the first part of the book, the first
eight chapters are kind of case studies, and of course
the first one we did was the Brian Thompson assassination
in New York, but we moved through a whole bunch
of different types of criminals, types of vignettes to pull out,
you know, the important protective intelligence lessons there, and a
lot of them are very very applicable to the stuff.
(11:24):
Even some of the historical things, they're very applicable to
what we see happening today. I mean, because one of
the things that we talked about in the course kidnapping,
of course, was situational awareness and the fact that his
kidnapper basically was very, very awkward, and how he conducted.
Speaker 4 (11:40):
His pre operational surveillance.
Speaker 6 (11:41):
I mean, he had a bright yellow car that he
parked at the attack site. He's out in the middle
of the country, dressed in city clothes with a fedora
and a suit. You know, just he had no cover
for status, no cover for action at all. He stood out,
but nobody was paying attention. And really that's what we
see happening a lot now. I think that people don't
understand that, by and large, criminals still have very bad
(12:05):
tradecraft when it comes to things like surveillance. The reason
they're able to succeed is because nobody's looking for him.
And Fred and I during our careers, you know, over
the last four decades, have had a number of instances
where we've been working surveillance detection details and we've been
able to pick up on hostile behavior just because of
(12:25):
those demeanor mistakes, just because of plain old lurking or
you know what we call jdl R.
Speaker 4 (12:31):
Right, it just doesn't look right.
Speaker 6 (12:33):
And you know, if people would pay more attention to
what's going on around them, you know, they could really
avoid a lot of these criminals.
Speaker 7 (12:42):
Yeah, you can't find surveillance unless you're looking for it.
But you know, there are some basic things that everybody
can do. And what we've tried to do with the
book too, is is focus on those things that a
chief security officer can do to help either protect a
company or a executive could do to help protect himself
(13:05):
or herself or their families.
Speaker 3 (13:08):
Again, the name of the book is The Protective Intelligence
Advantage Mitigating the Rising Threat to Prominent People by Fred
Burton and Scott Stewart.
Speaker 2 (13:16):
Public by CRC Presso check it out, folks.
Speaker 3 (13:20):
Okay, still a lot of questions, but I'm gonna go
ahead and reduce this I'll tell you, or I'll start
wrapping it up on the dosing and social media site.
Speaker 2 (13:28):
I just want to get this question out of the way.
Speaker 3 (13:30):
It's kind of interesting too that it also made me
think of how people used to flaunt their jewelry, as
Scott mentioned, and now I hear some people that I
know that are worth quite a bit a lot more
than me, Andre worth millions of dollars, and they just no,
I can't wear that's out. I'm looking at it so
why did you buy it? I'm thinking this back in
my head and I've even asked some of them, why
(13:50):
would you buy it anymore? I mean, all you're really
doing is showing it off to whoever comes to your house.
That's pretty much it. Especially after Beverly Hills. You know
they target all those rolexes a couple of years ago,
and it's like, what are you gonna do with it?
You're just gonna go to a party and then go
right back and that's it. I don't know, it's kind
of funny in the years before they used to do it.
And I guess my question also is what do you
(14:11):
think about these accounts? And this may be treading a
dangerous liner for both of you, but on some of the
accounts that give a lot of situational awareness tips, and
I guess it made me think about it. Last night
I had a conversation with a former police officer and
cold case investigator and we were talking and he was saying,
(14:35):
how the TV.
Speaker 2 (14:35):
The criminals watch TV shows.
Speaker 3 (14:37):
Everybody he interviews in prisons they watch TV shows. And
I'm thinking, I know there's criminals looking at these situational awareness.
Speaker 2 (14:43):
Accounts, not your book, but the accounts.
Speaker 3 (14:46):
I don't think they're going to work out the money,
but on the accounts they'll look at these things and oh, okay,
I got to do this, So they don't pay attention
to me.
Speaker 2 (14:54):
I don't see you guys doing that. But what do
you think about that?
Speaker 6 (14:58):
Well, I think it's important that when we're t talking
about some of these tradecraft skills, right, they're really more
of an art and so I liken it a lot
to musicianship. So I play guitar, you know, I can
read books about playing guitar. I can watch videos, hours
of videos about playing guitar. I can talk to people
(15:19):
about playing guitar. But until I sit down and do it,
there's no way I'm going to master it. And it
takes time and effort. And that's the same thing on
the criminal side, with something like surveillance in order. You know,
when Fred and I were going through our surveillance courses,
I mean, obviously the stuff we had at Fletsey, the
Federal LA Enforcement Training Center, was very rudimentary, but when
we did some of the more advanced stuff, I mean
(15:41):
it really we're talking weeks and then months and months
of practice on the street in order to perfect the craft,
and even then you're still dealing with things like burn
syndrome in your gut. You're just able to deal with it.
You learn to deal with it because of that training,
because of that practice, because of that petition.
Speaker 4 (16:00):
Criminals just don't.
Speaker 6 (16:01):
Have the time or really the you know, the energy
to deal with it, and they don't need to because
they're still able to victimize people because they're careless. They're
not paying attention, and it's denial.
Speaker 4 (16:13):
You know.
Speaker 6 (16:13):
We talk about situational awareness, but you have the flip side, right,
which is is kind of the enemies of situational awareness,
and the big one is denial, not me, not here,
not now, not him, you know, and that plays into it.
The other one is distraction. And people are very very
very distracted right now, especially with the device in front
(16:33):
of their face all the time, so it's very easy
for these criminals to target them.
Speaker 7 (16:39):
And if you look too, Carlos said, just the general
situational awareness of most of America today. Just drive down
the street and look at the folks that are just
have their heads buried in their iPhone and they're totally
unaware of their surroundings and wherever you might go across
the country.
Speaker 5 (16:57):
You see it everywhere, and there's.
Speaker 7 (17:01):
Just some basic things that if people were just more
observant at times, they could see things and let someone
know about that, you know what has occurred. And you know,
as cheesy as it may sound, at times, you know,
with the DHS kind of alert, you see something, say
something you know that works, and most people want to
discount it. It's really kind of an interesting phenomenon. I
(17:23):
recently spoke to a roundtable of chief security officers in Washington,
d C. And after the Brian Thompson murder, there was
this rocket ship of just protection on everybody because everybody
was nervous.
Speaker 5 (17:38):
And now it's been a few.
Speaker 7 (17:39):
Months since then and that's been slowly decreasing and executives,
you know, are just kind of out of sight and
out of mind. Now with the trial coming up with
the assassin Luigi Mangioni, obviously that's going to get back
in the news and you know, that could generate copycats,
that could generate a renewed focus in that incident and
(18:01):
so forth. So it is a situational awareness aspect, and
we hope that our book does some good from that
aspect as well.
Speaker 3 (18:12):
Want I asked this question, but again, I know I
always try to respect the authors too, so I don't
want you to give away too much from the book,
but it'd be interesting some people when you read it
on social media.
Speaker 2 (18:23):
Of course, you got a.
Speaker 3 (18:24):
Bunch of wannabes and Noah balls and all that other
nonsense out there. But some had argued AMANGIONI was super sophisticated.
Speaker 2 (18:34):
Others argued he was lucky.
Speaker 3 (18:36):
Others argued, well, I guess all kinds of arguments about him.
Despite seeing Scott's head shaking, it wasn't sophistication.
Speaker 2 (18:45):
So what was your take on it? And I guess, again,
don't ruin it for the book, but what was your
take on it?
Speaker 6 (18:50):
Take it basically, you know, we had kind of denial
going on there. We had a victim who was very comfortable.
He was in an environment where he stayed very frequently,
stayed at a hotel just across the street and down
about a half a block, and he just felt secure there.
You know, he's a pretty strong guy, you know, former wrestler.
He was kind of the guy that was challenging to
(19:11):
people to.
Speaker 4 (19:12):
Armor wrestle all the time.
Speaker 6 (19:13):
So he felt, you know, he wasn't really worried about
being accosted by homeless people anything like that. But at
the same time, he just didn't realize that, you know,
some mutt with a gun could walk up behind him
and kill him. And really that's what we see there.
And that's also the concern, is that we see that
assassination as being a blueprint for others to follow. It's
(19:37):
basically saying that anybody can do it, even if you
have no training, just because of this lack of awareness
and this carelessness. And so, you know, one of the
things that the Fred and I have seen over the
years is you do have these peaks and valleys with security. Right,
something happens, you know, security gets ramped up, people pay attention,
(19:58):
but then after a while, things don't happen, and you
see that trickle down, attention wanes, funds programs go away,
and then you have the next you know event, And
I'm concerned that, you know, the further we get away
from some of these attacks, although I mean, we did
have an uptick after you know, the Minnesota attacks and
then of course the NFL attack, but still as as
(20:21):
we have you know, more and more time lapses, I
think we're going to see that complacency start to sneak
in again, and of course with that complacency comes the
denial and the ability just to kind of go back
to business as normal, and then you have those vulnerabilities
creeping up again.
Speaker 7 (20:39):
And you look at for example, the Minnesota incident was
just downright frightening, you know, with an individual that was
in the security business, so he understands that, he understands
how law enforcement responds. He's dressed as a cop and
he knocks on the door of homes that are not protected,
and you put yourself in that kind of perspective and
(21:03):
think about how many people would just open the door.
And so those are the kinds of incidents that with
our book, The Protective Intelligence Advantage, we're hoping that we're
just going to help folks raise their situational awareness, understand
the threat landscape, understand what's on the horizon, what could
(21:24):
be next, and learn from some of these horrific case
studies that have taken place in the past. You know,
our industry, Carlos has been greatly influenced by tragedy. Meaning
Scott and I were hired as special agents with the
State Department predicated upon the horrific embassy bombings in the
(21:44):
Middle East, predominantly in the eighties, and that industry has
always been driven by that kind of tragedy. And there
is this boom or bust or feast or famine, however
you want to describe it. And we just want to
make sure that with the assassination of Brian Thompson the
(22:05):
upcoming trial, that it's not going to generate additional Luigi
Mangiones that could say if he could get away with that,
I can too. And then you just look at I
don't know where we are, and you are probably better suited, Carlos,
to explain this than Scott and I. But when you
look at this phenomena out there, with this relationship now
(22:26):
with Mangioni that there's folks out there that believe he
did a good thing, which neither of us can fathom.
But the support network that's kicked in for him has
just been frightening.
Speaker 2 (22:39):
Yeah.
Speaker 6 (22:39):
That goes to something we talk about in the book, Carlos,
that we call the social media threat continuum too, and
we talk about how with the advent of the Internet
and our social media and the connectedness that's there, it's
really made a way for people with grievances, and whether
that's a racial grievance, religious grievance, you know, even even
(23:01):
at business grievance, whatever. It's allowed these grievance collectors and
you know, these extremists to kind of network together, and
it's allowed the kind of the emergence of what we
call these extremist influencers to get up there, to articulate
the grievances and the conspiracies and then to identify and vilify,
(23:22):
you know, the denounce basically targets. And then we see
the dosing, we see the harassment, and you know, eventually
the physical attacks. So there's this whole continuum there that's
coming out of this the social media in a way
that's that's very disturbing right now. And there again, that's
one of the reasons that you know, now more than ever,
(23:43):
we really believe you need protective intelligence to help you
understand what's out there, to get a grip on the threats,
and then to help you stay ahead of them, because
otherwise it's just hopeless right now with the amount of
information that's out there and the ability of these threat
acts to kind of you know, kind of recruit radicalize
(24:04):
and then operationalize people over the Internet, and we see
kind of you know, extremists of all stripes, right that
giehaties are doing that, the white supremacists are doing that,
the anarchists are doing that, the in cells are doing that.
So it's it's it's not you know, dependent on any
one ideology. And I just think that we're in this
phase right now where we're going to see more and
(24:27):
more of these kind of loan individuals with these grievances
targeting prominent individuals.
Speaker 2 (24:33):
Great, right, the.
Speaker 3 (24:35):
Book again is the Protective Intelligence Advantage Mitigating the rising
threat to prominent people.
Speaker 2 (24:39):
Fret Berdon and Scott Stewart are the authors.
Speaker 3 (24:42):
Well, now you kind of got me thinking, not a
good thing, and I'm kind of trying to combine these
three things together. Media reading books, which is back to
your line earlier about people. You can read a book
about something and not be able to do it. And
I think that it made me think about what you
guys were saying in regards to the Mangioni where a
lot of people came out either reading books and situational
(25:03):
awareness or how to attack somebody or whatever it is,
and then they thought they knew how this guy figured
it all out.
Speaker 2 (25:11):
But the media is also to blame a.
Speaker 3 (25:13):
Lot, I think, not just social media, but even the
media within social media, because they like this, they like
to create the drama, and I get it, right, they
need the clicks, they need the views.
Speaker 2 (25:24):
I get it. It doesn't mean it's right, but they
do a lot of that, right.
Speaker 3 (25:27):
They trickle in, they create these possible theories out of nothing,
and then everybody starts watching like it's law and order,
or at least used to be in the old days,
and they're following these cases and what could this have happened?
Speaker 2 (25:40):
Could this have happened?
Speaker 3 (25:41):
And then the media trickles something else out that they
probably already knew hours before or days before, but they
trickle it out to create a storyline like a TV
show of a real murder, which is insane to me
because it's becoming this it's becoming a TV show when
it's actually realc people are dying. And yet you'll see
(26:02):
this little trend that they do, and it gets all
these people kind of looking at it and trying to
figure it out, and everybody's everybody's the joker in Batman.
And then when you figure it out now it was
just a schlep. Somebody maybe wound seeing a Clue Zone
movie and that was about the end of it. So
it's really bizarre to me how that's happening. I don't
(26:23):
know any thoughts on that. About a little ramp.
Speaker 6 (26:26):
Well, you have to you have to fill those twenty
four to seven hours of news coverage with something, and
you know, you have to sell the advertising, and so
the hotter the better, and if it bleeds, it leads.
H That's historically worked and it's still true so that
when we do have these tragedies, obviously they do take
(26:47):
over and everything, and you know, it goes back to
the old days. You think about the old days, uh,
when some of the cases that we were talking about now,
of course, like the Lindberg the course, some of those
big high profile cases got a lot. But I think
even back into like the you know, the sixties and seventies,
you had all these bombings going on in the United
States by groups like the Weather Underground, like the Puerto
(27:08):
Rican Separatists and some of these others, and they didn't
get any press hardly at all. They would maybe get
a paragraph or something on the front page and then
a little bit more deeper in when we had a
half hour national newscast, they had to fit everything in
a little little so they didn't have time to really
focus and go crazy.
Speaker 4 (27:29):
On these specific attacks. And so really that twenty.
Speaker 6 (27:34):
Four to seven news coverage, along with the social media,
has really hyped up all this stuff. Of course, that's
why we have that right now. There's kind of an
interesting contradiction in society where murder rates are actually lower
than they were, say a ninety one, but people feel
more exposed and kind of more fearful despite murder rates
(27:57):
being down. But it's because every murders covered now and
it's everywhere you know, on your social media, it's on
the twenty four to seven news, and so the stuff
is hyped up a lot more, you know, than it
was in previous times, quieter times.
Speaker 7 (28:12):
And Carlos, I mean even when we started as young agents.
I mean I I had a couple of cases, one
in Khartoon and one in Sona in eighty six where
two of our diplomats were shot by a terrorist group
and it was I think we got maybe two lines
in the New York Times, you know, diplomat shot overseas
(28:33):
and that was it, and you know, it's really kind
of interesting from that development from a news cycle. I mean,
the Munich massacre in nineteen seventy two was the first
terrorist incident that was covered and you know globally live
when Black September, you know, took the eleven Israeli hostages.
But you can also look at events, you know, I
(28:56):
vividly recall like being at the Olympics in Atlanta when
doing protection for all the athletes there and we had
the bombing and CNN covered it, But even an incident
like that did not get the scope of the kind
of coverage that.
Speaker 5 (29:11):
You would see today.
Speaker 7 (29:13):
You know, just the evolution of that news cycle. So
you know, the Mangioni effect now and you know, to
harken back to that case, which you know we cover
in detail in chapter one in our book, is you know,
you have these deck of cards, deck of enemy cards.
You have all these CEOs that have been threatened and
(29:34):
just putting this big target on their backs as a
result of what Mangioni has done. And it's really been
a watershed event for corporate security to manage those kinds
of threats today and you know, for for just the
benefit of your audience. You know, when when Scott and
(29:54):
I first got in this business, you know, we were
lucky to manage threats, you know, with three by five
index car arts, and you know today or Excel spreadsheets.
You know if today you can only manage those threats
with technology solutions. So that's been a huge evolution in
our industry as well.
Speaker 2 (30:12):
It's interesting. I'm a superhero fan.
Speaker 3 (30:14):
It would be a strange twist on this, but I
see a lot of the themes you mentioned this earlier, Fred,
I think when you were asking, or at least kind
of asking about the Maggioni effect, right, it seemed like
a lot of those anti capitalism and revenge for being
greedy or whatever whatever they wanted to say. But I
remember watching some of the latest TV shows or movies
(30:36):
in the Martin in the superhero world, and that's a theme.
Speaker 2 (30:39):
That's a theme right there. Go after the CEO, they're
the greedy person.
Speaker 3 (30:44):
I don't want to name shows in case I get
nailed for something, but there's a couple of shows that
watched it where the dad was a CEO and then
the superhero had a fight against this evil guy who
had all this money, and other shows now were the
one guys who rules the whole entire Hell's Kitchen. I
think it is down in New York, and he's not.
It was the Hell's Kitchen ridiculous.
Speaker 2 (31:06):
He was.
Speaker 3 (31:07):
He was running everything down there. And he's a big
wig too, with the CEO of a company. So it's
it's funny because they're they're The theme continues, it continues
on really strange.
Speaker 2 (31:18):
But let me.
Speaker 3 (31:22):
Yeah, it's kind of interesting today with Trump is kind
of fascinating, just because Trump has great a vibe that
we haven't seen for several years now, which is pro
law enforcement. I think intentionally or unintentionally, he's given.
Speaker 2 (31:41):
A lot of purpose to young men.
Speaker 3 (31:43):
We've seen a lot of articles over the last five
years by young males not knowing what to do with
their lives. We've seen a huge decline in them going
to college and either going to becoming welders or plumbers
or electricians. But look, every job is going to max
out sooner or later. But now in law enforcement, I mean,
it's so big that has such an enormous amount of
(32:04):
applications going on.
Speaker 2 (32:06):
Does that have an impact for you?
Speaker 3 (32:08):
And then after that we're going to start looking at
a little bit more in depth of the book.
Speaker 7 (32:11):
What do you think, Well, I'll be happy to tackle that.
You know, it's it's something that is fascinating to both
of us when you know, we've dissected so many assassination
attempts and actual assassinations over the years, both in the
government and outside the government, that you look at the incident,
(32:33):
for example, in Butler, and you know, as a student
of protection history, you have you know, the Kennedy assassination,
and one of the huge takeaways in the Warrant Commission
was that you needed to have better protective research, better
intelligence research, and how about you know, counter sniper teams.
(32:54):
So you get counter sniper teams that gets created specifically
to neutralize that kind of threat. And so as you
dissect Butler, there was so many mistakes that were made.
You know, there was a protective intelligence advance there. To
the best of our knowledge, this shooter was not known,
(33:15):
or at least if he was known, that's not been
publicly released thus far. But was he known to other
entities inside of let's say, the Joint Terrorism Task Force umbrellas.
So you know, there's so many things you can look
at from that aspect, you know, but your question on Butler,
(33:37):
for me centers on two major failure points. One is
that certainly was a very poor advance. Love to know
what Scott thinks. You know, we've done the grunt work
in our years gone by. There was certainly not enough
resources on site. Why that rooftop was not covered, for
(33:59):
the life of me, I don't know. You know, that's
basic agent work one oh one, you know. But at
the end of the day, the Trump detail, you know,
in Butler, did not have the same amount of resources
that the Biden detail had the Presidential Protection Division for
reasons that were only made at Secret Service headquarters.
Speaker 6 (34:21):
Well, you're never going to have that for a candidate,
you know. And that's just the reality with the Secret
Service and how they operate the A teams on potus
all the time. You have kind of the B team
then going on the family down into the VP insich.
But during a campaign season, the Secret Service gets stretched
super thin because they have to start covering the candidates,
(34:43):
and these candidates have multiple steps, multiple stops every day.
So I'm not really familiar how many stops Trump had
before and scheduled before and after Butler, but I would
assume it was many and so what happens is everything
gets divided out. And in some ways it was similar
to what would happen to US at DS and end
(35:04):
of Secret Service a little bit at the U in
General Assembly, where we might have thirty protective details going
at any one time, and you just you know, for
US at those times on those foreign ministers, we did
not have the same number of agents that we would
say on the Secretary of State, And really a lot
of times we were borrowing agents from the US Marshall Service,
(35:27):
from ATF, from other organizations to kind of help bulk
up the details because we didn't have enough bodies to
stab them because of what's going on. And that really
happens a lot to the Secret Service during campaign season.
At the same time, you know, they're assigning people to
(35:48):
tasks to go out and do things who probably ordinarily
wouldn't be put in charge of a major event. So
I'm sure that that advanced agent that did the Butler
County Fair was in charge of all that planning, probably
would not have been selected for a pota's trip to
Pittsburgh or something, you know, And so they were just
(36:09):
trying to find a body somewhere to put you know,
to take this role and to take this responsibility, and
so you really don't have your best agents doing that
at that point. And I think that that probably, you know,
some of the firings that we've seen and some of
the repercussions that have rolled downhill after the Butler incident
seemed to kind of reflect that. So, you know, at
(36:34):
the one point you can understand too, it kind of
goes back to us talking about earlier about complacency. Right,
nothing's happened, nothing's happened, nothing happened, So it's okay if
we send this agent to do this advance because nothing's
going to happen here. It's it's a quiet little farm
town outside of Pittsburgh, you know, don't worry about it.
Speaker 7 (36:51):
Yeah, and then the protection business, since Scott raises some
tremendous points, Carlos, it doesn't matter until it does. But
when it does matter, usually there is a disaster. And
you know, I started with the Secret Service, and you know,
one of the takeaways after Hinkley shot President Reagan was
(37:12):
that the Secret Service was going to no longer rely
on the local police, for example, to watch the press
pen where Hinkley popped out of forever going forward, they
were going to include the Secret Service Uniform Division to
do that job. So the Secret Service adapts very well
(37:33):
after tragedy. And you know, the protective intelligence model really
started out of the Warren Commission, one of the with
with all its thoughts, It came out of the Warren
Commission that recognized that you need to do better research
into localized threat actors wherever they might be, and there
(37:55):
had to be a centralized database and so forth. So
the Secret Service has done a huge course correction since Butler.
I think that you know, it still is, you know,
a tremendous protective agency. We have a lot of friends there.
We work with a lot of colleagues that came from there,
so you know, they won't get things right. But it
(38:17):
also takes support from the top. You know, I can't
tell you enough. You know, we've Scott and I have
lived through enough tragedy to know that budgets get whacked,
you know, agent assignments get get reduced, and that really
affects your morale when you're out there, because the job
at times is extraordinarily difficult. I mean, you know, we
(38:39):
both stood in front of buildings or doorways at three
am in the morning and there's literally nothing going on. Nothing,
And it's a very difficult job at times. And if
you're doing this year in and year out, and you're
doing it on holidays, you're doing it on weekends, you know,
it's you're you're really out there all the time and
(39:01):
you're very rarely home.
Speaker 5 (39:02):
So there's a lot of problems as a result of that.
As well.
Speaker 3 (39:05):
It reminds me a lot of being an outfielder and
just kind of sitting out there when you have a
strikeout pitcher and hey, something's.
Speaker 2 (39:11):
Coming now, I got a move. Yeah, And I guess
there's I know some look.
Speaker 3 (39:18):
I guess there was a weird situation there with the
Trump and the Butler incident that there's going to be
some conspiracy people. But I assume by now Trump would
have come out if he saw something. I'm assuming he
would have noticed it and made a public by now,
I don't know.
Speaker 2 (39:33):
I know he is investigating that whole incident.
Speaker 7 (39:36):
I know one thing, and I Scott and I have
actually not talked about this, but uh, I find it
very unusual that that threat actor had so many burner phones,
uh that we've seen, you know, I've seen as many
as twelve. And you know, granted, he just might have
been a mentally disturbed individual that has watched one too
(39:57):
many spy movie in a CHOI all those for whatever
purposes he might have, but I really would like to
see what's contained on those burner phones.
Speaker 5 (40:06):
That's just me. I don't know, what do you think, Scotty?
Speaker 6 (40:11):
Yeah, I think it would be interesting to you know,
and I'm sure that eventually more will come out.
Speaker 4 (40:17):
Kind of on his background, on his rationale and his reasoning.
Speaker 6 (40:20):
But it's kind of interesting to me that the initial
reports were that he wasn't necessarily even you know, like
politically motivated towards targeting Trump, but he just wanted to
go after a fat target. It was going to get
him attention. So it's more of it like an attention
seeking thing, which I find is interesting. But there again,
it kind of plays into the whole social media thing.
(40:40):
You know, he wanted to become famous, Internet famous. You know,
it's fifteen minutes of fame by doing an infamous act,
which is just another scary reason, you know what. It's
so necessary to stay on top of these threats and
to practice you know, very good situational awareness and not
to allow complacency, and then I all to slip in
(41:02):
and the.
Speaker 7 (41:02):
One thing, Carlos, it really kind of dovetails back to
our book as well as these threat actors will look
at multiple targets, which literally gets lost in the course
of history. You can go back to Sirhan. Sirhan even
he looked at other targets. Chapman who shot Lennon looked
at other targets, Hinkley looked at other targets, and that's
(41:24):
not unusual. And you know, it was recently disclosed that
Mangioni also.
Speaker 5 (41:28):
Looked at another target.
Speaker 7 (41:30):
So you know that's natural as a part of these
air quote assassins to do that, and they'll take advantage
of that target of opportunity.
Speaker 6 (41:40):
And that's just part of what we talk about in
the in the book too when we really outline how
the attack cycle works. When we talk about that, you know,
the target identification and then target target selection, and we
go through that in several of the case studies, and
then we unpack it a little bit later when we
talk about how threat actors work.
Speaker 2 (41:58):
That the protective model you were mentioned.
Speaker 6 (42:00):
Hm uh no, Actually that well, that that's more those
are models that we use for understanding how threat actors work.
So we kind of have that attack cycle model, which
initially was kind of developed as the terrorist attack cycle,
you know, back in the day. Uh, but then we've
really uh expanded it to show how it really applies
(42:21):
to all targeted attacks.
Speaker 4 (42:23):
Uh.
Speaker 6 (42:23):
The same thing with you know, the criminals all follow
that same attack cycle. Uh, they'll do it differently depending
what kind of criminal we're talking about, you know, a
stocking criminal versus an ambush criminal, so a bank robber
versus a rapist, but still they're they're still going through
those same steps and so it's really a useful model
to help understand, you know, how how criminals work. Of course,
(42:45):
another one is the pathway to violence. That is a
very helpful you know, just just there again to help
understand how you can put events into context as you
see them developing. Uh, you know, put your observation to
be basically go from situational awareness to situational understanding. And
then of course another one is that that social media
(43:06):
threat continuum that we use as far as the models
for understanding how criminals work, but as far as the
protective intelligence uh you know, lead security model for why
don't you go ahead on that, Okay?
Speaker 2 (43:19):
Yeah. Basically it's the idea.
Speaker 6 (43:21):
Is you just can't have guns with guns, okay, And
so you really need to have a good protective intelligence
uh program in place to support, you know, and really
joined at the hip with your your physical security program
there and really your cybersecurity to it. It's all it
all has to be code joined. But so what you're
(43:44):
really doing is assessments. You're you're looking at baseline threat assessment.
You're looking at uh, you know, assessments of the protect
e's public profile on the internet, what's available, what's out there,
what's not out there, what should we protect You're you're
looking at, you know, obviously taking information in from the detail,
(44:06):
you're analyzing it. You're investigating it's to some point, trying
to identify who these people might be. You're logging sightings
that that might be potential surveillance, and you're you're putting
all of those things together at databasing it and trying
to stay ahead of the thread actors to identify activities
that are associated with the attack cycle, activities that are
(44:29):
associated with the pathway to violence, with that social media
threat continuum. So you're trying to put those you know,
categorize it and understand contextualize what you're seeing and what
you're team seeing. And so by having the protective intelligence
function that you have a place where the information that's
being collected can be synthesized and turned from information into
(44:52):
intelligence that can be actionable that can help you prevent
those attacks from happening. You know, some examples that if
Fred and I talk about uh uh you know in
the past where where we've had uh you know, counter
surveillance operations going uh. You know, there's been cases where
we've we've picked up uh there again just based kind
of on demeanor and you know, what they were doing.
Speaker 2 (45:14):
But we've picked up.
Speaker 6 (45:15):
Like pedophiles or hanging out around schools of uh, you know,
the protect these children here. You know, we we initially
we're kind of looking at that you could just be
a kidnapper. Now it's just a pedophile. But still we're
able to get the cops in on them, uh, you know,
and and and resolve those things. But then there's a
lot of stuff that's innocuous, but you know, when you
follow up on it, then it kind of becomes more understandable.
(45:37):
But still you can rule those things out as potential
hostile apps. Right, So you know we work stuff like, uh,
you've had a p I who is working uh a
divorce case against the corporate executive hanging out in the
parking lot of the building. Well, that's why they're they
are doing surveillance, and it's hostile surveillance. It's just not
an attack surveillance.
Speaker 7 (45:57):
Uh.
Speaker 6 (45:57):
We've seen the same thing with uh, you know kind
of process servers that they want to serve somebody a
lawsuit and they're waiting for that person to come out
of work so they can approach them because it's a
known location, right and and so you know that's where
that having that ability to investigate, analyze, and contextualize what
(46:19):
the team seeing really then provides a lot.
Speaker 4 (46:22):
Of capability there.
Speaker 6 (46:24):
And then of course the things like that, you know,
the social media monitoring, so looking for those threats, looking
for instances of your protectee being mentioned by these extremist
UH influencers, being denounced by these extremist influencers, being doxed,
being you know, uh called for you know, these these
(46:48):
influencers calling for their followers to harass or or or
target these people. Kind of like what what you're talking
about with the ICE earlier, about the ICE agents being
uh doxed and targeted because of these extremist influencers calling
for that kind of activity. So you're looking for those
things as well and really putting that you know, that
(47:11):
intelligence bubble or layer around the protective detail. You know,
it can evolve things like surveillance detection, because what happens
is detail agents are always focused. You know, they call
them close protection agents for a reason, right because they're
close to the principle. They're looking for those close in threats,
(47:32):
the immediate threats. But they're not going to see the
guy across the street that's conducting surveillance.
Speaker 4 (47:37):
Their eyes just aren't going to go there.
Speaker 6 (47:39):
They're not going to see the car that follows them
when they leave the parking lot, because that's not you know,
what they're focused on. And so having those counter surveillance
elements in place to record those things, to note those things,
to report them and then have them cataloged, analyzed and assessed,
it just forms a very strong program and uh, you know,
(48:02):
it's just something that allows there again protection teams to
be proactive instead.
Speaker 4 (48:06):
Of just reacting.
Speaker 7 (48:09):
And Carlos Scott you did a fabulous job explaining the model.
You know, to put it in a operational kind of component.
If you think in concept, if you all your listeners
can envision this a bruder film with the agents traveling
at Daly Plaza. Well, inside the coat pocket of those
(48:29):
agents were called three flash cards, three by five index cards,
and on that flashcard was a photograph of a person
of interest or a bolo we call them pois today
is in our business. So imagine you're trying to pick
out a person in a crowd as you're traveling down
(48:50):
the road that might be in an index card in
your pocket. It was almost an impossible task in those days.
So the evolution of this concept is one that even
when Scott and I started, when we would have thread actors,
we would photograph, We would take a photograph of a
thread actor, we would photocopy that, we would physically pass
it around to agents on protective details for example, and
(49:12):
then we would have those pictures in our coat pockets
and we would be out there looking on the perimeter
for a thread actor to get inside, looking for a
John Hinckley kind of person, or looking for a sur
hand sur hand kind of person. If we had that
intelligence that they even existed. Most of the time, we
did not have the intelligence that they even existed, and
that was the problem a Dalley plaza. You know, the
(49:33):
Secret Service had no intelligence on Lee Harvey Oswald on
what was called the Lancer detail at the time, the
JFK detail. So technology today, if you fast forward to
twenty twenty five, can be managed easily. For example, you know,
we both work with a company called Ontic, which manages
(49:55):
that threat landscape so you can put it all on
a single pane of glass. And the ability to do
that today has really changed the evolution of the business.
So I can look at my smartphone today and know
how many threat actors are around any fixed location, any
mobile location, and any city I might be. So managing
(50:18):
that kind of data today, with the influx of social
media and sentiment analysis, is one of the hardest problems
that corporate security people manage today. And I don't care
if you're at a company the world's largest company, or
if you're doing a small operation and a business. You know,
trying to manage that threat landscape today is very dynamic
(50:40):
and it changes all the time.
Speaker 3 (50:45):
So much there unfortunately running out of time, but before
I get to the last question, is one of the
highlight that's got me in a great point. This is
something I always try to teach my classes that not
every criminal is the same. They have different mos, different motivations,
just like you mentioned with the p I compared to
a serial rapist, compared to a serial killer, compared to
a terrorist.
Speaker 2 (51:04):
And you have to know that. So I'm really really
glad you pointed that out.
Speaker 3 (51:08):
The book again, is the protective intelligence advantage mitigating the
rising threat to protecting people, no prominent people. I guess
my last question and maybe you think Fred's already going
that direction. You said future trends and we have AI.
I watch a show. It's a British show called Capture.
I don't know if you folks have ever seen it.
(51:29):
It's an interesting show. A lot of deep fakes going on,
trying to get people blamed for murders and things of
that nature so they can kind of divert attention.
Speaker 2 (51:41):
But what's what's going on in future trends?
Speaker 5 (51:43):
AI?
Speaker 2 (51:44):
What's the book say? And your books say.
Speaker 6 (51:46):
Well, really, you know, there's a number of areas that
it's going to impact, you know right now, you know,
and there's different types of AI, right, So in our
large language model type AI wrote using a lot of
that in the tools we use to scrape social media,
you know, and to really kind of monitor things like
(52:07):
the license plate reader, cameras and such. So there's there's
really quite a bit of AI that's going on on
the good guy side. Of course, the bad guys use
it as well, right, And I always like to like
an AI. Well, it's like any tool. It can be
used for good, it can be used for bad. But
as you know, the protectors, you need to understand how
(52:28):
it works and how to use it so that you
can counter it. And so I'm you know, we're we're big.
Fred and I are both big proponents of encouraging security
practitioners to learn how to use AI so they can
learn to defend against it. But at the same time,
that large language model, that type of AI is also
(52:48):
helping it make it easier for for threat actors to
gather targeting information, uh, you know, on potential targets as
they scrape the internet for that type of information, and
so you know that that's kind of the bad side
of it. You know, you mentioned deep fakes briefly. You know,
(53:09):
we are definitely seeing a very rapid evolution of that.
It's gone, you know, just in my clients. It's gone
from just like you know, pornography of my clients, you know,
basically putting their faces.
Speaker 4 (53:23):
On a porn actor's body.
Speaker 6 (53:25):
Two deep fakes that are involved in in you know,
like president fraud, business fraud, where they're they're using deep
fake voices to try to get money sent. We even
had a I was talking to a client who had
a case where they had a zoom call in which
the CEO seated in his office, you could see him
(53:48):
in his office, told somebody to do a transaction, and
it was all bogus. It was a deep fake of
the CEO. So it's becoming more and more difficult. Also,
I'm very concerned. We already see a lot of and
I actually was just quoted in New York Times last
week talking about all these scammers that are setting up
accounts in the name of the athletes and other people
(54:12):
and then you know, scamming people with those accounts. Right now,
they're just basically dming and they're basically just you know,
email chatting with those people. Imagine though, if they start
having video conversations or audio conversations with the voice of
the you know, the purported person. It's going to be
(54:34):
very right now, it's difficult to convince them that they
weren't convinced that they weren't conversing with the real person.
Once they see it and hear it, it's going to
become even more difficult. And I'm really afraid that it's
only a matter of time before we see one of
the people who's you know, being impersonated attacked by one
of the people who have been scammed, just because they're
(54:55):
totally convinced that it was that person and not you know,
some due to Nigeria that was scamming them. So I
think that that's only going to uh, you know, make
things more more and more difficult coming.
Speaker 4 (55:10):
Down the line.
Speaker 6 (55:11):
And you know, think about the larger implications at a
national level as far as you know, the political scene.
Once you start seeing you know, deep fakes of some
politician you know, claiming he was at Epstein's Island with
with underage girls or something. So I think that there's
a lot of you know, negative repercussions there. But I
(55:32):
think we're also going to be able to use AI
to combat that. And that's where kind of the You know,
the importance is on us as practitioners to really embrace
AI and figure out ways to use it defensively.
Speaker 7 (55:44):
Yeah, and just to piggyback, we can't stress enough how
these deep fakes are going to be a problem for
everybody going forward. I know even in discussions in Washington
with some of my government contacts that it's one of
the biggest concerns that they have when it comes to
just the impersonation of government officials, that it could go
viral so quickly it's hard to put the toothpaste back
(56:08):
in the tube. I watched a demo put together with
a company that can very quickly mitigate that threat. Having
said that, what they showed you the ease of operation
and how Carlos, you and I are talking to each other,
but how do you know you're even talking to Fred,
(56:29):
and how easy that can be done.
Speaker 5 (56:31):
It's pretty scary.
Speaker 7 (56:33):
And I don't think that most of America understands that
at dyscope yet unless you've been specifically burned by that.
Speaker 5 (56:40):
But it's coming, and it's going to be coming as
a wave.
Speaker 2 (56:45):
It made me a little bit suspicious of what I'm
talking to you or now.
Speaker 3 (56:48):
Well, how do you know that you are, Oh boy,
let mean we're gonna find fort here. It is the
protective intelligence anddvantage mitigating the rising threat to prominent people.
That could be a whole show in itself. I guess
my last question was I thought was kind of interesting
cameo who created as if it was meta or what
(57:09):
company was it that's creating these glasses now that you
can see people coming in, My mind went into your
directions for a second, and I thought, I wonder if
law enforcement will eventually have these glasses where you can
start picking up people's physiological responses.
Speaker 2 (57:25):
Why is this.
Speaker 3 (57:26):
Person's heart rate going up all of a sudden when
we walked by or the cop walk by, and what's
going on?
Speaker 2 (57:33):
Why is this person standing in this corner?
Speaker 3 (57:34):
Like you mentioned earlier, several reasons why people could be
But then you can pick up other things. Maybe you
can pick up the id with the glasses, right, well,
this person's got to criminal record, or oh this person's
heart rates going up. I don't know any ideas anything
out there that you've seen on that, or we keep
it on the down low, as they say.
Speaker 6 (57:52):
Well, I think we're already seeing some of that with
some of the AI enabled, whether it's the weapon recognition
systems or the face recognition systems. And certainly, you know,
countries like China are are big time going into that
field and you know, in their quest to really control
(58:12):
their their society. But but certainly I think that there
is a very real possibility of having that kind of
of AI. You know, they're again for good or for bad.
But I I could see an application on you know,
an agent having Google glasses with facial recognition that could
(58:32):
point out pois, hey, this is a thread actor, you know,
uh this or or just this is paparazzi, which is
probably more common, which is a kind of thread actor,
but I mean more common for for my uh my
operations where I was dealing with paparazzi. But yeah, I
really do think that that's you know, the type of
(58:52):
thing we're going to see going on, uh, you know,
as we move forward. But there again that that's why
it's important and incumbent upon security practitioners to understand the
technologies and the implications for good and for ill.
Speaker 7 (59:06):
Yeah, there's a reason, Carlos that the intelligence community loves
reading fiction, especially science fiction and things that are on
the horizon because that spins off all kinds of gadgets
and ways to manipulate that for either good or bad purposes.
Speaker 3 (59:24):
You read my mind as I was thinking about all
the again the superhero movies and how many technologies I've
seen that they were talking about ten, fifteen, twenty years
ago that now it's true. It's kind of wild thinking wow,
And that's where I kind of got the idea with
the Google of glasses. And I think one of the
agents of Shield or something was able to do that
and be able to measure.
Speaker 2 (59:44):
This person's heart rate. Why is this person's heart rag
going up? They must be concerned about something.
Speaker 3 (59:48):
And I thought, you know what, that's not going to
be too far off, because they're already doing it now
with medical AI as well, being able to determine people's blood,
sugars and stuff without.
Speaker 2 (59:56):
Even getting contact. So doesn't su fascinating stuff.
Speaker 3 (01:00:02):
Gentlemen, the book again, The Protective Intelligence Advantage Mitigating the
Rising Threat to Prominent People by Fred Burton and Scott Stewart.
Speaker 2 (01:00:08):
Gentlemen, thank you so much for joining me today.
Speaker 4 (01:00:11):
Hey, thanks for having.
Speaker 7 (01:00:12):
Us, Carlos, Thank you, as always, we greatly appreciate it.
Speaker 2 (01:00:16):
Thank you very much, both of you folks. You know
what to do, share, subscribe, hit the.
Speaker 3 (01:00:20):
Like, Butndon you know we like it, and go get
the protective intelligence advantage.
Speaker 2 (01:00:24):
You won't be sorry. Stay safe out there, everyone,