SIC Overview +

12
PROGRAM OVERVIEW SECURITY INTELLIGENCE CONSULTING L.L.C. sicllc

Transcript of SIC Overview +

Page 1: SIC Overview +

PROGRAM OVERVIEW

SECURITY INTELLIGENCE

CONSULTING L.L.C.

sicllc

Page 2: SIC Overview +

THOMAS A TRIER

• FBI Special Agent (25 years) 1986-2011

• Assistant Special Agent in Charge (ASAC) of the Washington Field Office Intelligence Branch

• Specialization – Task Force Initiation and Operations

• Enterprise Investigations

• Criminal/Terrorist Organizations

• Gang and Drug Investigations in the FBI Los Angeles Office 1991-2001

• Case Agent – RICO Case on the Nazi Low Riders in Los Angeles

• KENBOM – Responded to Nairobi, Kenya in 1998 when Al-Qaida blew up the US Embassy – Provided Security for the FBI Evidence Recovery Team (SWAT Mission)

• Iraq – FBI Deputy on Scene Commander of the Counterterrorism Mission in 2007

• China – Conducted Intellectual Property Rights Crime assessment in 2010 through a 60 day TDY to Beijing, China

• FBI SWAT – Seattle, Los Angeles and Milwaukee Offices

Page 3: SIC Overview +

THOMAS A. TRIER

A T C

• Physical Security Lead at American Transmission Company 2011 – 2014

• Developed an Intelligence Based Security Posture

• Conducted an initial assessment of the Security Department 2011

• Developed Mission specific duties/assignments for Security Personnel

• Three Missions

• Asset Protection

• Physical Access Control

• Compliance

• Initiated and conducted assessments for the components of the Intel Program

• External Threats

• Internal/Insider Threats

• Vulnerability Assessments

• Risk Assessments

• Made recommendations and mitigated risk through cost effective measures

• Documented efforts and published results in ASIS Security Management Magazine 09/2014 cover article entitled “Let Intelligence Light the Way”

Page 4: SIC Overview +

INTELLIGENCE DEFINED

• Intelligence is the gathering and evaluating data, then conducting analysis on the collected information.

• The objective is to concentrate on the potential effects the threats may have on Client assets/personnel.

•Based upon the analysis, initiate notifications and make recommendations to reduce risk to Client assets/personnel.

Page 5: SIC Overview +

ELEMENTS OF AN EFFECTIVE INTELLIGENCE PROGRAM

• Analytical Ability

• Communication Ability

• Flexibility

• Components:

• External Threats

• Insider Threats

• Industry Threats

• Vulnerability Assessments

• Risk Assessments

Page 6: SIC Overview +

INTENT• Evaluation of any threat stream from people must include a determination

of “intent”.

• Has the person, group or organization threatened your company or personnel?

• “I am going to kill you”, in any statement is an overt threat.

• “Someday you all will get what is coming to you”, is more veiled but is still a threat.

• By threatening the subject has demonstrated intent. It is recommended the Intelligence Program track every threat and analyze to the best of your ability the capability of the person making the threat.

• If they are threatening your company they are already demonstrating intent to harm the company, it may just take some time before they develop the capability to carry out the attack.

• That is the point, you don't know who is going to attack you if you don't track the threats that come in and continually assess intent and capability of the threats you are tracking.

Page 7: SIC Overview +

CAPABILITY

• The objectives of reducing risk cannot be one dimensional by any means, the specific threat assessments for Internal and External threats concentrates on people and their capabilities.

• These capabilities includes, but isn’t limited to, Cyber-attacks, sabotage, bombings, shootings, physical assault on employees and their families, financial crimes, economic espionage, theft of trade secrets, intentional damage to reputation, frivolous lawsuits and harassment.

• Risk reduction by measuring vulnerability assessments must also include natural disasters.

• Ensure that any physical measures that are deployed are able to withstand nature and man made attacks.

Page 8: SIC Overview +

SIC SERVICES

• Conduct independent analytical review of Client’s enterprise evaluating and documenting any or all of the following:• External Threats• Insider Threats• Industry Threats• Vulnerability Assessments• Risk Assessments• Criminal Activity

Page 9: SIC Overview +

SIC SERVICES II

• Working with Client personnel, train them to conduct and maintain an analytical review of their enterprise evaluating and documenting any or all of the following:

• External Threats

• Insider Threats

• Industry Threats

• Vulnerability Assessments

• Risk Assessments

Page 10: SIC Overview +

SIC SERVICES III

•Assess the Physical Security function of the Client company to evaluate current capabilities and assist in providing mission focus to the enterprise Security posture.•Assess•Define Mission•Assist in developing Strategic Plans•Assist in implementation

Page 11: SIC Overview +

SIC SERVICES IV

• Will evaluate, investigate and make recommendations on any Criminal activity.

• For example, but not limited to:• Internal – Fraud,

embezzlement, workplace violence, employee misconduct.

• External – Violent crime, burglary, theft, bomb threats, arson, extortion, white collar crime.

Page 12: SIC Overview +

CONTACT US FOR A CONSULTATION

• Thomas A. Trier

•SIC LLC

• Telephone 262-354-0302

•Email – [email protected]

•Website – securityintelligenceconsulting.com