• On the Circuit
  • Posts
  • The Dark Web Exposed: Confronting the Internet’s Hidden Threats

The Dark Web Exposed: Confronting the Internet’s Hidden Threats

A Protectors Guide to the Hidden Depths of the Internet

Sponsored by

In an age where data is as valuable as gold, the stakes for safeguarding it are at an all-time high.

This week, On the Circuit, we’re delving into the intricacies of data ownership and protection, the lurking dangers of the dark web, and we’ve got some practical strategies to safeguard your protectees.

*This week, our newsletter is brought to you by Incogni, a company we've carefully selected for their relevance and value to our readers.


🇵🇰 Pakistan's Special Representative Confirms Mutual Understanding Among Afghanistan's Neighbors and Russia for Engaging with Taliban.

🇺🇦 Ukraine's Tactical Advance: Multiple Bridgeheads Secured on Dnieper River Despite Russian Resistance

🇯🇴 Diplomatic Shift: Jordan Withdraws from Energy-for-Water Agreement with Israel Amid Regional Tensions

🇵🇭 Nuclear Power Pact: Philippines and U.S. Sign Pivotal Nuclear Power Cooperation Agreement

🇸🇸 South Sudan in Turmoil: President Kiir Fires Police Chief Amid Coup Plot Rumors

Understanding the Data Collection Industry

Data collection is baked into everything we do. It is spearheaded by tech giants, data brokers, and advertising networks. Their goal is to gather insights into consumer behavior for:

  1. targeted advertising

  2. service improvement

  3. product development.

For the most part, our data isn’t being stolen, there are no safecrackers, and Tom Cruise isn’t abseiling through a complex network of laser beams to get his hands on it. Instead, we hand it over freely and without complaint. And in many cases, were it not for the pesky pop-ups that insist on our consent, we wouldn’t even know an exchange had taken place.

Furthermore, we’re happy resigned to this trade-off; it’s more convenient, it streamlines our workflows, and it adds a level of personalization that we’ve come to expect.

“Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.”

Bruce Schneier

While this data exchange may be convenient, it’s a double-edged sword, balancing utility against substantial privacy concerns and security risks. And, when we start to look beyond our own tolerances and consider the threat to public figures, the stakes are even higher.

Further reading

Data and Goliath

The Hidden Battles to Collect Your Data and Control Your World

A Book by Bruce Schneier

The Data Threat

The aftermath of data breaches is devastating: identity theft and privacy invasion can lead to reputational damage and financial loss, not to mention to serious psychological impact it can leave in its wake. Understanding these consequences can help us to implement more effective protection strategies.

The Dark Web – Understanding the Underbelly

The dark web is a hidden part of the internet that serves as a digital black market for stolen data. Users can operate with anonymity creating the perfect conditions for illegal activities such as data theft. Understanding these dangers and the availability of dark web monitoring tools is essential for creating and implementing protection strategies.

Recommended Listening
Darknet DiariesTrue stories from the dark side of the Internet.

The Modern Operator's Toolbox

Protecting our clients in this digital age means going beyond physical security. It involves monitoring their digital footprint and educating them about potential risks, conducting regular security audits and staying up-to-date on the available tools and how they work.

Tools like EchoSec and DarkOwl can help inform us when our client’s data has been compromised. These tools monitor for mentions of a protectee’s personal information and alert us of potential data leaks or threats.

For an in-depth look at how these tools work, listen to our podcast with Sandra Stibbards >

Understanding the dark web and its monitoring tools is fast becoming an integral part of modern protective strategies a will help you to anticipate and mitigate the digital threats that lurk in the shadows.

Social Media Strategy

While we’ve spoken about social media management in great detail in previous newsletters, it’s worth touching on here. Social media is a crucial aspect of our clients' public profiles and requires careful management.

While these platforms can be powerful tools for brand building, they also open the door to potential threats. Stalking, harassment, and data misuse, to name but a few. Download our tactical checklist for safeguarding your client's social media presence.

Download the checklist

Like it or not, as protectors operating in a digital age, we need to keep pace with technological advancement and emerging trends. It’s a dynamic and changing landscape, but don’t worry; the Circuit has got your back. Read to the end for a list of further resources and assets to help keep you informed.

Every day, data brokers profit from your sensitive info—phone number, DOB, SSN—selling it to the highest bidder. And who’s buying it? Best case: Companies targeting you with ads. Worst case: Scammers and identity thieves.

It's time you check out Incogni. It scrubs your personal data from the web, confronting the world’s data brokers on your behalf. And unlike other services, Incogni helps remove your sensitive information from all broker types, including those tricky People Search Sites.

Help protect yourself from identity theft, spam calls, and health insurers raising your rates. Plus, just for our readers: Get 60% off the Incogni annual plan at this link with code PRIVACY.



"This is a fantastic publication. This magazine is included in our (BBA) Corporate membership package. It’s a great read, informative and keeps the team at Pinnacle Risk up to speed and ahead of the industry."

Tracy Webster- Pinnacle Risk Consultancy


Considering the Future Terrorist Threat From the Israel-Hamas War

Already, lone actors in Belgium, Egypt and France have carried out lethal attacks, while affiliates of al Qaeda and the Islamic State have encouraged their followers to commit violence against Westerners, and particularly Jews. These risks will only grow as Israel's ground incursion into Gaza deepens, as it will undoubtedly lead to even more Palestinian casualties and accusations, regardless of veracity, of Israeli atrocities. Strong U.S. (and to a lesser extent European) support for Israel will further feed extremist narratives that frame the West, led by Israel, as the oppressor of Muslims. And should the Israel-Hamas War become a larger regional conflict, terrorist threats would rise even more.

At some point, however, the war will end and Israel (and its Western supporters, namely the United States) will have to confront difficult questions of what comes next. The conflict has shattered the status quo in the Gaza Strip, and very well may do so in the wider region if tensions escalate further, meaning there is no going back to a pre-Oct. 7 environment.


Tomorrow's Body Armour for Today's Protector | Colin MacKinnon

If they asked you, would you stab your boss? Even if you were confident they were wearing the latest in body armour and it was just a demonstration? Today's podcast guest Colin MacKinnon has demonstrated the benefit of effective body armour on several occasions, and we are delighted to explore this evolving topic including:

  • Why can't bulletproof vests often stop blades and sharpened screwdrivers?

  • How easy is it to incorporate discrete body armour into a suit?

  • What can body armour not achieve today but might achieve in future?

  • What new composites and technology should the protector learn about?

  • How can an effective armour selection be made?


IPSB CP Conference: 6-8 Dec 2023 - Dallas, TX

The 2023 Close Protection Conference offers the opportunity to engage with industry leaders and peers in the global protective security sector, providing unparalleled educational and networking experiences. Hosted by the International Protective Security Board, this event is perfect for both seasoned professionals and newcomers.


The Troubling Reality of Allied Universal, America's Third-Largest Private Employer

Takeaways from the Circuit:

Private security replacing public police, lawsuits piling up, and a company so big it could have its own zip code, all set against the backdrop of a society grappling with the balance of safety, responsibility, and the ever-elusive perfect security solution.

The situation with Allied Universal is a classic tale of cutting corners where it counts the most. It's a reminder that in the quest to keep the public safe, the first step is ensuring those on the front lines are well-equipped, well-trained, and well-paid. Otherwise, it's like trying to sail a ship with no sails – you might stay afloat, but you're not going anywhere fast.

Thank you for sticking with us to the end; we appreciate your support.

Stay safe and keep looking out for one another.

P.S. If you like this newsletter and want to support it, there are 4 WAYS THIS WEEK! PICK ONE right now before you forget:

  1. Buy a Subscription to Circuit Magazine. 

  2. Listen to the Podcast.

  3. Download BBA Connect or NABA Protector 

  4. Forward this newsletter to a friend. Here's a handy message you can use to share with your friends:

Hey! Have you read On the Circuit? It’s a newsletter for Protectors -- Each week you'll receive an email giving you the low-down on what's happening across the industry. Sign up here. It’s free: https://on-the-circuit.beehiiv.com/

On the Circuit has you covered when you're busy covering others.

Resource list


or to participate.