First, lets not get off on the wrong foot, I nor my boutique outfit represent the big bad wolf. We do however play in the terrain where they do, daily, everyday, and we are hired from time to time to find them for high net worth individuals, government contractors and civilian institutions. Or to be more accurate, hired to identify ways a sneaky wolf would exploit them, yeah thats better. {i can hear my lawyers red pin cap coming off }
One of the most startling observations Ive gleaned from my career is the “gonna be blunt here”, sheer amount of invincibility that security companies think they have. While quite logical in the security economy to have a bit of bravado on the battlefield or in the operation landscape, the “castles” or “HQ” of these institutions aren’t nearly as protected as they portray themselves to be online. Now before one of you 6’5 snake eating ninjas get all emo n/ ago and think it suitable to spew a retort or forge a professional vendetta against my firm first understand that fire burns, and there are no nails over here for your antiquated hammers, AND we are on your side.
Figure this, there are 4π steradians in a sphere, and most of the outfits Ive worked with or in tandem with down range are masters of their 75% of their tactical sphere domain. Best of Breed for everything you can fathom, shooters, force protectors, operators, or otherwise some of the baddest nail eating, meta humans on the planet.
The other %25 percent that is defined below, are completely forgotten or just not thought about. Why? Well Counter Social Engineering Acting Training, or conducting a warm audit of a companies reputation management position is not as cool as running snatch drills or acrobating the range for that super tactical Zero Dark Thirty operation that all the movies and Call of Duty semantics display in your social media programming. This in lays the problem, because its not cool or in more professional terms, because its not a core competency for your organization some believe its not important. How far from the truth that is…..Enter the Jackall who looks nothing like you, knows a gun fight with you and your team is a suicide mission, but you left your door wide open. Your passwords are simple to exploit, they are federated across all your tech, your corporate network is the doing of a cousin of a friend from one of the “teams” and or a local IT Consulting company that has NO CLUE what the importance of your Castle really is, and you have no way to check it. You’ve been nicked and cut by every IT contractor you’ve met and think they all are just blood sucking vampires, because, truth is thats the reputation they made for themselves in the last 12 years. I digress.
For those who understand the following phrase understand the silence after the period. Intel, drives ops. Not the other way around….. both are equally important, one is the capitol letter one is the period, the Alpha and Omega of a complete successful mission.
So, if your intelligence, your secrets, your castles blueprints
Are as put together as say, a coked out chinchillas nest, you may have a problem. Force Protection, or Counter Intelligence Briefings and OSPEC or Operational Security training is not even close to the edge of what is needed to protect the base of your operation.
How do I know this, because I watch, I study, Ive spent most of my life observing weaknesses. There is nothing under the Sun that cannot be exploited, flipped, turned inside out. For one, the human element is the biggest weakness due to #EGO and other factor. The below scenarios and examples should help materialize the contract of the message we are trying to convey.
Jokes aside, the #TRUTH remains the same, read on.
There are a million other things you should do but quite frankly Im not a charity operation. I love you all, hope you get the above top three as they are VERY CRITICAL. Now I have to go get my Tai Chi on before my employees call me things other that Bad Black Panther Mofo, actually we all know I tell myself that in the mirror.