combination to issue up-to-the-minute written and verbal briefings. The team helped its stakeholders understand the situation clearly and assisted decision-making in real- time. In the aftermath, an in-depth debrief document was prepared that helped to make sense of the attack. It will be used to suggest changes to security protocols for those organisations, their assets and people.
Pro-active security planning
Outside of dealing with major incidents, a GSOC pro-actively carries out assessments of threats to assets and people, as well as the potential for reputational damage. Part of the challenge is to ensure that only real threats are communicated. These threats might include extremist behaviour, protests and activism, major crime and disorder, cybercrime and environmental risks. The GSOC is well placed to facilitate tactical options such as engaging with law enforcement.
gnificance to security
Once the major incident needs are established, an organisation may consider additional activities that include pro-active intelligence reporting or travel risk and tracking services.
Technology is at the heart of the constant data gathering, analysis and communication. Cross-referencing social media and conventional media is crucial for intelligence analysts to quickly assess a security threat. To that end, tailored web-crawling platforms are essential tools for today’s GSOC to enable analysts to gather relevant data, assess it and communicate with customers with timely and relevant information. This is, in fact, one of the key attributes of a successful intelligence hub: being able to make sense of the data without being over-whelmed by information.
Although technology is fundamental to the ability to collate and access data and intelligence, the people are a fundamental part of a high functioning GSOC. Employing a diverse group of security analysts from military, police, government and private sector backgrounds helps create a more robust and rounded approach to gathering data and assessing security threats. The diversity of skills is important so that the breadth of security risks can be assessed accurately, and there is assurance that the information received in the event of an incident is reliable. Further, debriefing of major incidents is crucial to capturing the
© CI TY S ECURI TY MAGAZ INE – SUMMER 2017
learning outcomes and helping prepare all stakeholders for similar future events.
When it comes to team effectiveness, of course all of those analysts come with their own networks. They can help establish closer working relationships with peers within private sector intelligence organisations and with law enforcement and government partners. This provides resilience, efficiency and creates an environment where intelligence teams enhance their understanding and methodologies by working with each other.
Major incident management
During major incidents, whether they relate to global assets, people or international business travellers, the security teams on the ground are focused on dealing with the incident. The GSOC takes on the role of briefing decision-makers and communicating key messages as the analysts have access to real-time situation analysis.
The intelligence gathering at this stage becomes centred around the incident, monitoring social and conventional media channels to assess the potential impact for the organisation.
As an example, the recent terror attack in London prompted the VSG GSOC to utilise its situational intelligence platform, web crawler and mass communication tools in
www. c i t y s e cu r i t yma g a z ine . com
Of course there are opportunities to use the intelligence gathering and analysis for a range of other security situations. Take executive online vulnerability as an example. Assessing publicly available online information assists security teams with understanding the vulnerabilities the executive team and family members could potentially face. Individual asset risk assessments can be conducted on specific buildings including the potential for tenants to attract protesters, nearby crime trends and physical vulnerabilities.
Benefits to the wider community
Another key success factor is to understand how the security services operate to establish a common ‘language’ or ‘engagement’. A good example of this is the National Intelligence Model (NIM), used by police and security services in the UK. Working to NIM reduces ambiguity, ensures swift exchange of information and the ability for intelligence gathered by a GSOC to be used as part of a formal police or security services operation.
Response to a changing world
The diverse nature of emerging threats, from urban free climbing to cyber attack, means that constant vigilance and assessment are at the heart of any security strategy. Intelligence-led security is fundamental for effective pro-active planning as well as the operational response to any incident.
Stephen Shackell Head of Business Intelligence Services VSG
www.vsg.co.uk
> 11
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39