air pump

How does an air pump work?

When we set out to build the Air Armor M240 air compressor we started with the question, what should this thing do? Our answer was, it should be durable, be able to be tossed into a truck or mounted on a jeep. It should have some room to keep some tools or a beer dry. But, most important, it should do what it’s intended to do…. inflate a tire!

Let’s face it, there are a lot of 12-volt portable tire inflators on the market these days. Some have a lot of features and claim they can perform a variety of jobs. You’ll see tire inflators with all sorts of bells and whistles from digital gauges to handheld, and cordless to rechargeable. Some claim they are versatile and can “do it all”

air pump

In our over a decade of research and design, we’ve learned, when you try to put too many demands on one little piece of portable equipment, you’re asking for trouble. We all remember the TV with the built in VCR right? Then we all remember that same TV sitting on top of the new VCR you had to buy because the VCR in the TV broke. A 12-volt portable compressor should be just that…a TIRE INFLATOR. It should be portable, durable and ready to inflate your tires when you need it. It doesn’t need Bluetooth speakers, fancy digital gauges, or be able to jump your car or do your laundry (although, the laundry would be nice). Over-thinking and refining by adding different features and functions, just opens you up to owning a broken product that you throw away.

Keep it simple! If you want safety and the security of knowing you’ll be able to inflate a tire on the side of the road in minutes, or if you’re looking to air up and air down quickly out on the trail, then the Special Ops Air Armor M240 portable air compressor is for you. It’s just a quality, 12-volt portable tire inflator built into a cool looking ammo can – because some things are just better left alone.

Portable 12 volt tire inflator

Direct drive, high volume air pump, 25 foot air hose built into military grade ammo can. Includes 27 piece tire repair kit.

What is it?

They say it’s one of the best portable tire inflator. Airing up has never been easier thanks to the M240’s high output patented design. Instrument panel with built-in pressure gauge, extended 50% duty cycle and an unprecedented 25′ hose that reaches all 4 tires of even the longest wheelbase vehicles.

Whats in side that counts!

Packed in the accessory box is an arsenal of 27 tire care and repair parts which features a convenient large folding carry handle, snap tight latch, and a water resistant O-ring to keep dirt and moisture out, leaving your equipment clean, dry, and ready for action. Inside is a 12-Volt, direct drive, high volume air pump.


This 40mm powerhouse delivers outstanding performance in the critical tire inflation pressure range. Powerful tire inflation solution for heavy trucks, light trucks, passenger cars, SUVs, ATVs, motorcycles, sports balls. Great for U.S. Forest Service, and First Responders a must have for any Jeep, off-road, or 4×4 enthusiast.

Build Links with Blog Writing Services to Boost Traffic

Want to Increase traffic? Links? Need more conversions? What business worth their digital footprint wouldn’t? A search engine optimization (SEO) trifecta, these elements when combined with SEO-friendly content are fundamental in engaging high-quality links and the marketing panacea that is organic traffic.

Are you in a niche industry? Find it challenging to brainstorm conversion friendly content ideas? For thought-hungry marketers and businesses in need of outreach, keeping abreast of trending topics in your domain will empower you with the information to develop infinitely clickable, shareable and linkable content. “You have a very high probability of your quote and your name being distributed, posted, and shared around the world!” ― Ken Poirot, Go Viral! Let’s consider ways to build links and attract persona focused traffic to your website. Relevancy is key!

Viral Bound Content

Are you often late to the content party? Repurposing syndicated articles two weeks after the wave has passed will find your content fatigued on page four of search. Positioning yourself one step ahead of industry trends by leveraging content and using topic harvesting tools will see your content viral bound in no time. Those tools include:

Google Trends

Probe Google [] data to determine the popularity of top search queries and subject matter in your industry niche. Check out how often specific keywords, phrases and topics have been searched and arm yourself with the knowledge to ride the trending topic wave.


A social networking behemoth, Facebook while innocuously bridging social gaps between friends and family and providing a platform for communication and advocacy, it is also ripe for the harvesting of ideas. For trending subject matter, make use of popular hashtags related to your niche, check out Facebook groups to see what your demographic is discussing and stay across your newsfeed for current events and dialogue.


If it’s not tweetable, it’s not trending! A veritable hub of opinion contained within 280 characters, it is a fluid feed of all that is current, from social commentary, current affairs, celebrity news and an infinite pool of global news. Focus on the ‘trends for you’ and ‘moments’ section and search using popular hashtags to see what topics are dominating the discussion.


Often overlooked as a news source, Reddit is bursting with a million communities (subreddits) that showcase an ever-moving feed of breaking news, social news aggregation, stories, memes and trending discussions. Subreddits offer a deluge of niche subject matter analysis and debate and are ideal as a content development source, particularly in the SEO and business arenas.

Discovering Content Gap Opportunities

You’ve done your due diligence and have an informed understanding of what is trending in your niche area. Developing and creating persuasive and engaging content is now your focus.

Of course, you could search existing articles in your area and develop spin-off content, however, establishing authority will prove elusive with this approach. It is time for creativity and a dash of innovation.

Let’s talk brand. What is your brand message and who is your audience? If we begin from this juncture, recognizing content opportunities will be effortless. Before you search, ask yourself:

  1. Are there obvious gaps in the content currently being offered? Have news outlets, social platforms and websites covered all angles? Can I provide a different, original take on a current issue?
  2. What currently holds the interest of my audience? Have you surveyed your audience? Are there topics of interest being overlooked? Create content to fit their needs. Answer their questions.
  3. Monitor your competitors, what are they talking about? If your competitors are covering an issue, ask yourself is it relevant to my audience? If so, it’s a good indication you should too. Always ensure your content is original…and optimized.
  4. What type of content is trend-defiant? Is there a style of content that performs well regardless of trending topics? Discover how to replicate your ‘evergreen’ content by incorporating a contemporary twist.
  5. Are you across the most linkable content in your industry space? Time for research. Search your keywords, long-tail and phrases and explore the articles or content types that have performed well online. Check out the links, are they high-quality? Can you analyses the strategy and format?

Develop Shareable, Linkable Content 

Strategising content from the embers of trending topics offers a low risk, high reward outcome. In securing high-quality links and boosting traffic consider:


While the Blog Writing Services reigns supreme for its authoritative voice, ensure your content is offered in the most digestible format. Would an info graphic engage your demographic, perhaps a lattice? Meme? Get creative. 



We consume news and trends with ferocity, seeking instant gratification and knowledge. Ensure your message and the action you want the reader to take is clear and to the point. The quicker the consumption, the faster the share.


As marketers, we often go granular with audience, however, when the focus is on links and traffic, expand the audience. Leave the intensive tailoring for direct ROI content pieces. The end goal is to develop and position your content so that is thrown into the viral pool, landing on various platforms and shared with abandonment.


2018 has seen the importance of visual content continue to dominate the digital space. Statistics show that our reliance on social platforms determines how we digest content. Over 80% of marketers use visual assets in their social marketing with video accounting for 63% edging out blogging at 60%. Images and videos will up the engagement and share ability factor. Delivery channels and your audience widen as your content resonates with visitors who prefer formats other than text.


Do you speak SEO? The pursuit of traffic and links demands search engine optimization. Collaborate with a content marketer to ensure your copy follows SEO best practice. Our objective is to secure quality links and marketing across social channels in a short period of time.

Is your content optimized for sharing? Ensure the share buttons are easily accessible across your website and content platforms. Use conversion rate optimization call to actions across your titles, and descriptions and include featured images for your posts. Make it easy for visitors to share your content across social in a single swipe.


Be strategic with your content placement. Distribution is key to being found amongst the social chatter. Posting a blog on Facebook in isolation is unlikely to result in links and increased traffic. A content strategy is crucial as an overarching approach to your content distribution, however, to begin the delivery journey why not:

  1. Go live on Facebook discussing the topic from your business page
  2. Convert text-based content into a video with voiceover
  3. Share the images from your content to your Instagram story
  4. Do an email shout out linking your content (blog, e-book etc.)
  5. Distribute your content in niche-orientated Facebook groups and Reddit subs
  6. Run a Facebook or Instagram ad campaign

Parental Alienation Kids Can Protect Themselves

Ways Kids Can Protect Themselves from Being “Caught in the Middle” And from Parental Alienation (

Stand up to parental pressure to do the wrong thing…such as pressure to not see your other parent or to act hateful towards your other parent…the same way you should stand up to your peers when they try to influence you in the wrong direction. This can feel scary to do at first if one of your parents is very angry and intimidating but it gets easier every time you do it and eventually the parent pressuring you to “do the wrong thing” starts to realize that you are serious and committed about having relationships with both of your parents.

Here are some ways to do this…

  1. Tell your parents very straightforwardly that it is not fair to expect you to choose between them. Tell your parents you have a right to love both of them and you WILL love and have relationships with both of them. Remind them that their adult problems are between them and that it is not appropriate to involve you in those adult problems.
  2. Come right now and say, “I get the feel that you don’t want me to love my other parent. Is that correct?”
  3. Directly ask your parent, “Will you still love me if I also love my other parent?” You may need to follow up with “Because it seems like you won’t love me or be nice to me if I love my other parent.”
  4. If one parent is always directing your attention to bad things about the other parent, and never mentions anything positive about the parent, ask “Why are you telling me this? Are you trying to get me to stop loving my parent?”
  5. If one of your parents tries to encourage to not go to the other parent’s house when you’re supposed to for frivolous reasons such as “It will be easier with your school schedule” or other excuses; be firm and tell your parent “I’m committed to the schedule and am going to stick to it. I’m going to be with my other parent whenever I’m supposed to be…just like I’ll be with you whenever I’m supposed to be with you.”
  6. Making bold and assertive statements letting one parent know that you ARE going to love and respect and be committed to both of your parents. It can feel a little scary at first but it WILL get easier and will set boundaries with your parents that will make YOUR life easier and happier!
  7. When a parent starts bad-mouthing the other parent, it may be best to simply walk away, showing that you no longer want to hear this stuff and won’t engage in it.
  8. Remember to stay calm and use mature, rational thinking. For example….

If one parent tries to persuade you that the other parent is unworthy of anyone liking or respecting them, ask yourself does your parent have friends and other relatives who like them? Is your parent truly unworthy of anyone liking or respecting them or does it seem that the other parent is trying to make you just believe that? Follow Us:

Sometimes one parent suggests that you should reject the other parent because of one single incident or mistake. Often the incident is exaggerated. Ask yourself, how would YOU like to be judged only by your worst mistake? All parents make mistakes. There is no such thing as a perfect parent or perfect person. A parent doesn’t deserve to be completely rejected due to just one mistake…just as you know they wouldn’t reject you due to one mistake you might make.

You may think that you have decided for yourself that your mom or dad is not worthy of your love, but no one is immune from outside influence. That is why advertisers spend so much money to try to persuade you to buy their products, and why politicians try to make you think their opponents are unworthy of votes. When kids have parents who live apart from each other, sometimes a parent will act like a politician trying to get you to shun the other parent. Think calmly and rationally and ask yourself “Did I really decide to reject and be hateful towards my other parent ALL ON MY OWN or was I influenced by messages and actions by my other parent?”

Make a commitment to “do the right thing” by staying committed to seeing both parents when you’re supposed to and by staying firm with both parents that you won’t allow them to put you “in the middle” of their anger towards each other. Consider making a mantra to repeat to your parents as necessary such as “I love you both. I’m going to see you both when I’m supposed to. I’m not going to listen to either of you talk badly about each other. This is the way it’s going to be.” Repeat as needed. You’re smart. You’re strong. You’ve got this!

Gas Pressure

Pressure Testing and Rate of Pressure Change (Psi/Min)

Intelligent Pressure Testing and Rate of Change

Pressure testing specifications imposed by verification body standards include the following parameters:

  • Test Pressure
  • Hold Period
  • Allowable Pressure loss (over the hold Period)

Thorough pressure testing specifications will also include:

  • Min Test Pressure
  • Max Test Pressure
  • Improving Trend [True/False]

To aid in testing, Test Pressure and Hold Period can be combined into a rate of change (ROC). For example, where the Hold Period = 10min and the Allowable Pressure Loss = 30psi, the Average Allowable ROC = 3psi/min. That is, if the average rate of Pressure Calculator change during the 10min Hold Period =< 3psi/min, then the hold and allowable loss component of the test specification will have been achieved.

Once we know the Average Allowable ROC, we apply it to a test by sampling a short duration of pressure x time data and multiply it out to display it as psi/min, then compare that to the specified Average Allowable ROC.

Pressure Test Result Prediction with Average Allowable Rate of change

The DARTT Recorder samples data over a few seconds, removing motion induced pressure noise (vessel or rig heave causing water hammer) and displaying psi/min.

So why is using the ROC of such significance?

  1. You cannot pass a pressure test until you have met the Average Allowable ROC
  2. Typically, the ROC will be met well before the end of a pressure test Hold Period.


Gas Pressure

Gas Pressure

Note: The image below shows the Gas Pressure line turn from blue to green as the pressure tests ROC meets or exceeds the Average Allowable ROC for the pressure test specification. You can see approximately 1.5 min in to the 5 min hold period, the DARTT Recorder is showing an inevitable pass.

Save Time Pressure Testing with a DARTT Recorder

The ROC User Interface, combined with the DARTT Recorders other test health functions, such as “Trend” and “Prediction”, can save a lot of time when Pressure Testing Services Perth. They also make trouble-shooting leaks significantly faster and more definitive.

ROC displayed during a test can tell the operator not to “bump” pressure when the ROC has been met and the predicted end test pressure will not be below the minimum test pressure.

Alternatively, if you have not met the ROC, and the test is not showing an “Improving Trend”, then the test is not going to pass as things stand. Most likely caused by a leak somewhere in the system that needs rectifying, so prolonging the hold period is wasting time.

Test with confidence

ROC, Trend and Prediction functions give an unprecedented level of confidence in the results during the test. Having a pressure-testing tool that can provide an objective pass/fail based on the given criteria removes the second-guessing and allows the focus to be on the next step, not whether the last step was correct.

Further Application of the DARTT Recorder ROC Pressure Test Assessment

Consider running Riser for a BOP or Intervention System. It is desirable to confirm each Riser connection before running the next. Usually once the BOP/Intervention system has been landed and latched, a final pressure test re-tests all previously tested connections.

Save a lot of time without reducing quality by pressure testing these and similar connections until the Average Allowable ROC has been met. Very little (if arguably any) assurance is gained by holding such a pressure test beyond this goal.

Are Deodorant Without Aluminum Healthier?

Several rumors have persisted around the Internet regarding the dangers of aluminum in deodorant, and while science has been able to prove a number of them false, there are several benefits of switching to best deodorant without aluminum.  Even though studies have been able to conclude that there is little chance of a link between Alzheimer’s and aluminum, there are certain things that should be established regarding these products.

For starters, just because it doesn’t cause Alzheimer’s or cancer, which many studies have been able to prove, doesn’t mean they aren’t dangerous.  An Internet campaign via e-mail established a link between certain diseases, namely breast cancer and Alzheimer’s disease and aluminum levels in the body and brain.  Most of the campaign was geared towards breast cancer in women from the use of aluminum-laden deodorants.  Scientific research has almost completely eliminated these potentials, but other dangers are found in the history of this product.

Finding best deodorant without aluminum is actually quite easy, since almost all deodorants, at least by themselves, lack this chemical substance.  Aluminum zirconium is the substance used in antiperspirant to help stop you from sweating, and since many modern deodorants function as a combination deodorant and antiperspirant, the combo will naturally have aluminum in it.  Most deodorants that do not provide sweat protection are normally safe, but make sure you read the ingredients before you apply.

The Benefits of Deodorant without Aluminum

While most people think the dangers of aluminum are diseases, there are several other concerns that should be expressed regarding deodorants that contain aluminum.  Skin irritation, high acidity levels, increased skin sensitivity, burns, and other skin problems can be directly linked to deodorant with aluminum.  As a product, deodorant was first marketed in 1888, but antiperspirant and deodorant combinations would not be marketed until 1941 when a safe antiperspirant could be invented.  Prior to 1941, there were issues with the level of aluminum in the product, which was known to eat through and damage clothing!  If the acidity level is so high in antiperspirants that it can eat through and damage clothing, do you really think it is good for your skin?  This product was not mastered by lowering or eliminating the level of acidity, but rather by adding other products to help counteract this high acid level.  If you notice a rashes, a red burn, skin blemishes, or severe irritation in your underarms, it is time to switch.

Travel Risk Management

Is It Safe To Go To Russia for Attend The World Cup?

Frank Figliuzzi is the Chief Operating Officer of ETS Risk Management, Inc., a global provider of travel security, Travel Risk Management, executive protection, threat intelligence and major event security. Frank is the former FBI Assistant Director of Counterintelligence, and recent head of Investigations, Special Event Security and Workplace Violence Prevention for General Electric.

How safe is it to visit Russia?

Virtually no travel to Russia is without risk.  Russia travel risk assessment is driven by three factors:

  1. Location specific inherent risks;
  2. The nature of the travel;
  3. And, the individual traveller.

For example, hate crimes against foreigners, minorities, and the LGBT community occur in Russia because of an apparent tolerance for such conduct as reflected in weak legislative prohibitions and an unwillingness to prosecute. Deadly terror attacks happen in Moscow, the north Caucasus and, most recently, St. Petersburg because of long-standing organic ethnic, religious and regional strife such as the Chechen/Russian conflict including possible sympathies for ISIS within the Chechen region.

Travel in connection with special events or sporting matches raises the already well documented daily risk of tourists targeted by pickpockets and muggers, often by organized gangs in major cities. Individual travellers of Asian or Afro-Caribbean descent or who simply “don’t look like they belong” in the eyes of certain locals should exercise particularly enhanced vigilance.

Business travellers should understand that electronic devices are frequently targeted for intrusion via malware and other means in an attempt by the Russian intelligence services to access proprietary corporate information for a competitive edge.

Despite the inherent risks, travellers who make the effort to seek the “ground truth” of their destination through their own government alerts, reading current country risk profiles offered by established security firms, and who maintain vigilance and a low-profile, can easily mitigate the risks and enjoy a memorable trip to a vast and proud nation.

How safe will it be to go to the World Cup?

Travelers to the World Cup are advised of the significant risk posed by organized hooligans who seek to engage in brutal fights with opposing fans from countries like Britain, France and other nations.

Russian hooliganism is marked by elements distinct from traditional hooliganism in the UK and Europe. Law enforcement agencies with decades of experience in securing soccer competitions have documented observations of Russian thugs who are highly trained and prepared to fight. These hooligans physically train in body-building and fight techniques and they make a point of not drinking alcohol during matches to maintain an advantage over their UK or European counterparts.

Disturbingly, Russian government leaders seemingly encourage such behaviour with Russian Ministers quoted saying “Keep up the good work”, and Putin himself observing how Russian fans had quite literally beaten the English fans.

However, a major world event such as the World Cup is likely to be secured by the highest level of Russian national security agencies who understand the negative impact globally of any major incident during the World Cup.  The largely incident-free Winter Olympics in Sochi, even under threat of terrorism, is evidence that Russian can secure a major event when it chooses.

What are the biggest risks?

Opportunistic crimes such as pick-pocketing and other thefts are common in major Russian cities. This risk includes theft from hotel rooms and theft from vehicles. Cases are well-documented of visitors whose drinks were spiked at bars for the purpose of robbery, rape or other violence. Unconscious victims are often left outside sometimes with life-threatening implications especially in the cold winter months. Further reports exist of criminals impersonating police officers for the purpose of harassing and robbing tourists.

What are the overlooked risks?

Travel Risk Management

Travel Risk Management

Travellers to Russia often overlook or dismiss the reality that the Russian government is in near total control of infrastructure which facilitates intelligence service targeting of western business and government travellers to include remote intrusion into their devices, or, even outright theft of their laptops, smart phones and other devices.

Similarly, hotel frequented by western travellers are particularly notorious for intelligence collection, entrapment and attempts to compromise western business and government visitors. This fact poses a dilemma for travellers seeking to avoid such targeting by possibly choosing a local, non-westernized hotel.

However, such a choice often increases the odds of opportunistic crimes such as theft or assault and can antagonize the intelligence services who may become perturbed by your diversion from the usual hotel chains.

How should people mitigate this?

Risk mitigation remains similar to advice given for most international travel.

Specifically, avoid open display of wealth, including expensive jewellery, and anything that may identify you as a tourist. Avoid walking alone at night. Be vigilant for pickpockets in main tourist areas and around the main railway stations, and keep your passport tightly secured. Always buy your own drinks at the bar and keep them in sight at all times.

To mitigate the risk of being victimized by “fake” police officers, always insist on seeing identification if you are stopped.

What duty of care provisions should employers sending staff to Russia have in place? What should employees ask for?

Business leaders sending employees to Russia are advised to include professional risk management measures into the travel plan.

These measures should include physical security guidance, protection of intellectual property, and potential medical consultation and even evacuation. The addition of enhanced security enables your team to focus on business objectives within minimal constraints or distractions.  Employees should ask for loaner devices to take that contain only the data needed for that trip and bring a reliable communication device.

Employees traveling for lengthy periods, particularly to more remote areas of Russia, should understand that the local hospital blood supply may not be screened for HIV and other diseases as is the standard in the US, UK and other nations. Therefore, employees should ask about medical evacuation plans in the event of an unexpected need for surgery.

Westlake Village pool remodeling

Benefits of Fiberglass Pool Resurfacing In Westlake Village

Maintaining a swimming pool can be difficult and costly for an individual with modest means.

As for commercial places like hotels, they earn money for the maintenance and upkeep of their pools. However, when it comes to homes, Westlake Village pool remodeling has to be done on your own or by hiring someone who can do the needful.

It is highly essential to regularly maintain your pools in order to get rid of the bacteria and pathogens which may be present.

One of the most commonly used methods for pool resurfacing happens to be fiberglass pool renovation. This is because it has its own set of benefits, some of which are:

Westlake Village pool remodeling

Versatility: Fiberglass swimming pool renovations in Westlake Village can be done on a wide variety of surfaces, be it brick, concrete, tiles or any other surface. It is not easy for people to maintain swimming pools regularly and but if not done, then the sheen of swimming pools tends to diminish. In such cases, a fiberglass renovation can prove to be highly beneficial.

Strength: It is the tensile strength of fiberglass pools because of which it scores above the rest of the pool resurfacing techniques. There are a number of swimming pool resurfacing techniques in Westlake Village but it is fiberglass which is the most unique, owing to its strength. Apart from pool renovation in Westlake Village, it finds application in a number of other areas including helmets, helicopter rotor blades, ship hulls and traffic lights.

Lost Cost of Maintenance: Now this is something which most people would love to hear because swimming pool owners very commonly tend to complain about the high maintenance costs of swimming pools. The low cost of maintenance of fiberglass swimming pools in Westlake Village is because it is highly resistant to algae and discoloration. It is because of this that the pool requires very little renovation and the costs are substantially reduced in the long run.

12v air compressor

12 Volt Air Compressor and Off Road Lingo

You have a nice four-wheel drive, a quality Special ops tools Air Armor 12v air compressor and you have read our tips for off-road driving, you are almost ready to head out on your very first trip. You see, here is the thing; you are going to want to be well-versed in the terminology used in off-road driving. So when somebody comes by and asks you about the approach angle, you don’t just stare back at them with a dumb look on your face.

Approach Angle

This is the steepest angle a vehicle can climb or descend before any part of the body, bumpers or any equipment mounted on the vehicle makes contact with the ground. Lift kits can be installed to improve your vehicle’s approach angle.


This is your suspensions capacity to droop on one axle over terrain that is uneven. Your axle should work at extreme levels to navigate uneven ground while keeping the body of your vehicle relatively level. If not, it feels as though you are driving a roller coaster.

Breakover Angle

This is the degree of slope defining the largest hill your vehicle can travel over without scraping the midsection. That is, this is what you can clear without any danger of getting high-centered.

12v air compressor

Bull Bar

The bull bar is a structure mounted to the front of your vehicle that protects your bumper and the underside of the front of your vehicle from impacts. In essence, it is a bumper for your bumper or an extension of your front bumper. Keep in mind that when installing a bull bar, it will change your approach angle.


This is a fixed anchor point, like a tree, that is sturdy enough to remain in place while force is applied to it.

Ground Clearance

Ground clearance is the space between the lowest part of your vehicle and the ground. You can improve your ground clearance with the installation of a lift kit.


This happens when you attempt to travel over a hill or ridge higher than your vehicle’s breakover angle. Basically, your vehicle gets stuck halfway over as the wheels get too far off the ground to break away.

Push Bars

Push bars are mounted to your vehicle’s grill and are designed to line up with the bumper of other vehicles to push them out of harm’s way without causing any damage to either vehicle.

Skid Plate

A skid plate is a flat metal plate that is installed on the frame of your vehicle and offers protection for your oil pan, steering linkage and other components under your vehicle.


Wheelbase is the distance from the center of your vehicle’s front wheel to the center of the rear wheel on the same side. A longer wheelbase will offer you a smoother ride, but a shorter wheelbase is advantageous as it makes getting high-centered less likely.

insider threat programs

How to Build an Insider Threat Program

What your company spent years to develop can be lost in an instant at the hands of one bad intentioned employee. The statistics on employee theft of intellectual property (IP) paint a dark portrait of what employees do when disgruntled, moving on, or stockpiling for a rainy day. William Evanina, the U.S. government’s National Counterintelligence Executive in the Office of the Director of National Intelligence says, “As a corporate leader, the single most important investment in protecting your proprietary information and sensitive trade secrets is developing a viable and enterprise-wide insider threat programs”.

To paraphrase the well-worn mantra on hacking and apply it to the pandemic of Insider Threat: There are two types of companies, those whose employees have already stolen IP, and those who simply don’t know it yet. No matter where your company is along its journey toward an effective insider threat program, success or failure is measured by the last harmful egress of research, formulas, algorithms, strategies, service manuals, or other critical business information (CBI). Whether your effort to detect, deter, and prevent CBI loss has become an industry model or is still a nascent vision, three common components can help build a new plan or help review and adapt a mature program.

Security professionals exploring insider threat fundamentals can take a lesson from first year journalism students. Budding reporters are trained to instinctively repeat basic questions designed to get to the truth, and three of those questions drive formation of all Insider Threat programs: “What?”; “Where?”; and, “Who?” Security leaders should make it their practice to ask these three questions of their staff, key partners, and operational components of their companies. What is it that most merits protection? Where is this most critical information located, physically and in cyber space? Who amongst us requires regular access to CBI?

As the past head of counterintelligence for the FBI, a former corporate security executive for one of the world’s largest companies, and now a risk management consultant, it no longer surprises me to hear new security professionals struggle to answer these basic questions. Security practitioners sometimes perpetuate the long-standing C-suite myth that “security’s got this” when it comes to everything from a missing gym bag to a missing gyroscope. The perception that someone, somewhere, must have already addressed, planned for, or is in the process of resolving the concern of the moment, provides comfort to our senior executives and job assurance for those of us in the profession. But the comfort is dangerous and the assurance is hollow. Rather, we should work to dispel the notion that security can or should protect everything. To do that, the savvy security executive endeavors to first identify and then deeply understand exactly what represents the future of the company, where it resides, and which employees have stewardship of this lifeblood. Done correctly, in partnership with key stakeholders including Human Resources (HR), Legal, IT Risk, and Engineering, Science or Business leaders, this approach provides laser-like focus on what really matters, shares ownership across components, and generates confidence in a process designed to protect against existential threats to jobs and share price.

Build Your Team

Successful implementation of insider threat programs hinge on assembling the right team. IP protection is a team sport and should not be carried out by one component alone. The team requires willful senior level participants who are convinced the time is right to defend the company against the threat from within. Leadership is often motivated to take this step by a crisis sparked by the loss or near loss of a trade secret at the hands of a departing or on-board employee or contractor. But waiting for such a crisis is not advisable. Gather data on losses suffered within your industry, supply chain, or customers. Talk to FBI corporate outreach contacts and ask for examples of economic espionage targeting your technologies. Talk to HR about where employees go when they depart and ask those employee’s former managers whether cumulative losses pose a concern.

insider threat programs

Meet one-on-one with a senior thought leader in Legal, IT Risk, HR, Business Development, or Research and ask them to partner with you to assemble a team and form an Insider Threat program. Next, meet unilaterally with each proposed team member to brief them on the threat and risk to proprietary data and seek their support to more strongly defend the company. In some non-defense corporate cultures, using the phrase “Insider Threat” can still generate privacy, trust, and culture concerns. In one large company, a security leader’s proposal to discuss such a program was met with this question from the head of HR, “Do you not think we should trust our employees?” The security leader responded, “I do, and I think we should have mechanisms in place to defend our trust.” Meeting first with each partner will allow you to listen to their concerns. Limit the team to five or six decision makers from key functions. When the team is assembled start asking the first of the Journalism 101 questions.


Whether a newly appointed security leader or seasoned veteran, the question at the heart of IP protection is, “What exactly are we protecting?” Responses provided by security and business leaders to this single question help measure the need for an Insider Threat initiative or the maturity of an existing program. Common responses from the security ranks include; “I’m protecting these buildings”, “I’m protecting this campus”, “I’m protecting people”. Even security professionals in large, sophisticated corporations frequently do not cite, “ideas”, “research”, “technologies”, or “critical employees”, when asked what they protect. Follow up questions on which campuses, buildings, or people are more critical than others are sometimes met with silence or criticism that the question implies some employees are more important than others. One long-tenured security leader responded by displaying his daily automated reports advising him which doors, hallways and offices were entered, but, he could neither articulate which company functions occurred there nor how his data was relevant.

Importantly, your team should pose the “What” question to key business leaders including the CEO, General Counsel, CFO, Supply Chain leader, Research or Engineering executives, Business Development or Sales heads, and corporate audit manager. Provide context by framing the question as an attempt to identify the small subset of proprietary information that would most damage the company if it fell into the wrong hands. Various formulas and thresholds can be customized to help guide this discussion and quantify the degree of damage to finances, share price and reputational risk.


Security professionals can only truly protect that which they know is there. Once CBI is identified, the team must learn where it resides, in both physical and cyber space. In large companies with thousands of employees and facilities, this question is more easily asked than answered. Yet, the answer is vital to learning how your CBI is exposed. One large company locating its CBI discovered a proprietary formula sitting in an open folder accessible by its entire employee population. Audit of the folder revealed that employees in high risk nations had visited the folder without any valid reason.

When countering the insider threat, the physical and the cyber security of CBI must be viewed as one holistic endeavor. The behavior of data and the behavior of humans are inextricably linked and the partnership between IT Risk and Physical Security should be seamless. Once aware that specific buildings, offices, or laboratories contain CBI, protocols and checklists for enhanced safeguarding can be drafted. This initiative counters more than just the internal threat. Upon learning the location of a sensitive manufacturing process one company found the process was part of a public tour route.


The seemingly simple “Who” question can generate more consternation than the previous two questions combined, particularly from your partners in HR and Labor & Employment Law. While answering the first two questions is often labor intensive, this last query raises issues of policy, organizational culture, and law. Companies may learn that some CBI is assigned to contractors, and the team must wrestle with the issue of whether people with less allegiance, and more transient tenure, should be entrusted with the firm’s future. Yet, identifying employees who require access to CBI is easy compared to planning how to relate to them. This discussion should include: standards for employees to receive and maintain CBI access; policies on travel and device security; enhanced computer monitoring; and, governance protocols for investigative response to suspicious conduct. Importantly, the approach to such vital and often singularly knowledgeable employees should be an inclusive one that views them as special stewards with more responsibility than the average employee.

If approached carelessly, insider threat plans can breed mistrust, alienate key employees, erode company culture, and even violate labor or privacy laws. But, a quality program can be a leader’s most important legacy, reaping tangible dividends in loss prevented, jobs saved, and relationships forged.

Originally posted in the Security Magazine