January 2023
Kidnap and security threat intelligence provision for multinational in Mexico
Case Study: We were engaged by a large North American company with a global footprint to help with their Mexico security strategy.
The threat intelligence team at AnotherDay provides proactive bespoke intelligence to our clients, rather than bulk commoditised risk information. Pulling from the team’s expertise and experience this encompasses threats such as terrorism, organised crime, online hostile actors, conflict, and attempts to alert the client to a scenario before it has played out. It can also involve the analysis and monitoring of geopolitical developments that could impact client operations.
By staying on top of developments and providing actionable intelligence we act as our clients' ‘rear view mirror’, and feel this approach helps them best protect their assets, locations and people.
Our approach to threat intelligence broadly includes the following:
Client-specific information and intelligence which we have detected in a given period, that forms part of our ‘intelligence collection plan’ and provides a ‘horizon scanning’ feed. This focusses on potential threats which we have identified through the use of the specialist platforms we invest in. These include closed source databases, human source networks, and social media analytics, but also open-source intelligence (OSINT), social media and dark web monitoring. It can also include forward looking analysis of militant groups of concern such as single issue, jihadist or far-right terrorism.
Developments occur from time to time that pose a threat to clients, for which we would provide specific intelligence on a person or entity of interest that may be useful to an investigation, internal report, or decision. We would provide the raw data from a range of platforms, if such data is available. This includes data from open and closed source databases of politically exposed person information; sanctions information; terrorism and crime information on persons of interest; social media profiles and activity information. From time-to-time we may also need to tap into our human source network to provide more granular detail.
Social media generated posts indicating security incidents around a client property location, and social media generated posts referencing the client by name around their property location. These can be set to whatever radius the client prefers. Through this we can generate specific incident case studies relating to critical client locations.
This not limited to solely client sites, but also can include logistics routes, sites holding sensitive material, trip locations and event sites.