Intelligence Training and Education
Culture • Lifestyle • Preparedness
Training and education on the intelligence cycle, collection methods, disciplines and analysis for the everyday person. It will include example reports and formats, how to analyze information, conduct open source research and publish the findings. Content will be articles, podcasts, first hand accounts and real world examples of current events. The intent is to have a "how to" of relevant intelligence subjects that anyone can learn.
Interested? Want to learn more about the community?
September 05, 2021
Travel Security Considerations: Cyber Threats and Mitigation

Cyber Threats

Similar to the guidance for airports and hotels, conference attendees should also avoid connecting to any public Wi-Fi networks due to their inherent insecurity. The threat of network snooping is especially high at conferences and trade shows given the increased espionage threat highlighted above. At the same time, conferences and trade show vendors and attendees alike rely heavily on local networks to make presentations, highlight their services and stay in touch while visiting contacts, so having some sort of network solution is important. Individual attendees are best off using their cellphone data, physically tethering it to their laptop if necessary. Most conferences and trade show organizers offer internet packages for presenters and vendors that may offer a degree of increased security, but it is always important to review terms and conditions associated with such packages to determine the level of privacy they afford. Even then, it is important to remember that no internet connection is 100% secure, so use discretion when sharing information at a conference.

Mitigating Threats at Conferences

Conference attendees can anticipate the threats they might face at a given conference by assessing both the security threats facing the sector involved in the conference and those facing the city that is hosting the event — as well as considering how certain individuals or organizations attending a conference can attract an elevated threat. While the threat of violence should not be ruled out, it is unlikely to affect the average conference attendee, especially once inside the venue. That threat increases, however, once attendees are outside, particularly en route to or from hotels and/or local transportation hubs. Attendees should be aware of who may be targeting their organization's intellectual property and be especially careful about making contact with unverified individuals at conference events. Finally, conferences covering controversial topics or occurring during waves of social upheaval are more likely to face disruptions or even cancelations due to logistical or political challenges.

Research the conference before you go. What threats have been associated with the particular event in the past? What kinds of threats are most common in the city hosting the event or, better yet, the specific area of town? Who else is attending the event and have they attracted hostile behavior in the past?
Understand what security features the conference organizers are planning to implement, such as perimeter patrols, attendee screening measures and venue patrols; assess whether these are enough to counter the threat profile of the event.

Keep a low profile while entering and exiting the conference building to avoid attracting criminal attention; do not unnecessarily display your badge and avoid traveling in large groups that could mark an attendee as a target.

Depending on the sensitivity to industrial espionage of the sector in question, avoid bringing proprietary information or discussing sensitive details with unvetted persons. When making new contacts, vet them before engaging with them down the road.

If there is an elevated protest threat, consider the reputational risk of attending the event. Prepare contingency plans for ground transportation and accommodations if unrest disrupts basic city operations.
Avoid using public Wi-Fi connections and instead rely on cellphone data or private networks to conduct secure communications.

Interested? Want to learn more about the community?
What else you may like…
Videos
Podcasts
Posts
July 03, 2021
How to get your free month of access

How to get your free month
How pricing works
How to view posts
What you can post

00:14:00
May 02, 2021
Search tips and thoughts

Video talking through basic google searches and what to look for, crossreferencing. It is using simple google and Facebook without additional tools

00:37:40
March 31, 2021
1 Million Tweet Map How-To Video

Uploaded to replace the previous "audio-only" podcast

00:13:21
October 30, 2021
Travel Plans, schedules, training
Travel Plans, schedules, training
October 21, 2021
Training Opportunities

How to identify and prepare for intel and other training you may want. This will help both of us out which I explain in addition to what is available

Training Opportunities
September 25, 2021
Comments, Questions, My upcoming Schedule

Listen till the end to hear about some training opportunities

Comments, Questions, My upcoming Schedule
See More
Available on mobile and TV devices
google store google store app store app store
google store google store app tv store app tv store amazon store amazon store roku store roku store
Powered by Locals