Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityArenas / Stadiums / Leagues / Entertainment

5 minutes with Fred Burton - Why protective intelligence is needed in professional sports

By Maria Henriquez
5mw Burton
June 15, 2021

When he won $1.1 million dollars in 50 days through sports betting, 24-year-old Ben Patz, better known as “Parlay Patz” was on top of the world. Now he faces five years in prison for threatening professional athletes and their families with unspeakable crimes after he lost a big bet. Patz’s actions point to the critical need for teams to protect their players and stay ahead of bad actors, particularly when a single tweet or photo gives a wealth of information on an athlete’s location and security situation. Here, we talk to Fred Burton, NYT best-selling author, former special agent, counterterrorism expert, and executive director of the Ontic Center for Protective Intelligence about athlete’s threat profiles and how protective intelligence can help keep them and their fans safe.

 

Security: What is your background? And current responsibilities at Ontic?

Burton: I have had a long career in the physical security industry, which began in the U.S. Secret Service and continued with the U.S. State Department. I was a special agent and deputy chief of the counterterrorism and protective intelligence division of the State Department's Diplomatic Security Service, where I led countless high-profile investigations, including the hunt for and arrest of Ramzi Yousef, the mastermind behind the first World Trade Center bombing. I also coordinated protective intelligence efforts for several national-level special events, including the 1996 Olympics in Atlanta and several United Nations General Assemblies and Middle East Peace Conferences. 

Today, I am the Executive Director of the Ontic Center for Protective Intelligence, which provides strategic consulting, services and resources for safety and security, risk and compliance, and legal professionals at major corporations. Through the Ontic Protective Intelligence Podcast and my books, I confer with other security experts to provide insights on trends in physical security, protective intelligence methodologies, and how these topics are affected by developments in corporate and national security.

 

Security: How have threats and vulnerabilities changed for the stadium and sports safety/security space?

Burton: Protection for sports venues has come a long way since my time coordinating protective intelligence operations for the State Department at the 1996 Olympics in Atlanta. In those days, the bulk of our intelligence efforts were manual, including typed BOLO's. Technology solutions continue to lead the way in the protection space, allowing for the seamless collection and rapid dissemination of threat data, such as photos of threat actors. Additionally, physical security tools like License Plate Readers (LPR's) and Image Matching greatly enhance holistic security efforts, along with simplistic solutions like transparent plastic bags.    

 

Security: How can professional teams and security leaders protect their players and stay ahead of bad actors, particularly when a single tweet or photo gives a wealth of information on an athlete's location and their security?

Burton: Education, training and situational awareness are critical, along with an open dialogue between the security team and the VIP. High-profile athletes can draw fixated persons, criminal actors, and unwanted attention to their families and homes through personal and location information disseminated via social media. It's also important for the players to talk to family members about social media discipline when it comes to location data.   
 

Security: How can protective intelligence help keep professional teams secure and give security leaders a leg up on the monitoring and safety of the players, and fans? Including for sports team travel security?

Burton: First, let's start with how we define the topic. Protective Intelligence is an investigative and analytical process used by protectors to proactively identify, assess and investigate threats to protectees. The threat landscape is never static; it's dynamic and fluid. Thus, an always-on continuous monitoring platform is needed to stay in front of threats and see around the corners. It's also important to remember that threat actors travel and can divert their focus of interest to other targets if their original fixation is unaccessible.   
 

Security: Could you talk about how security leaders can go about drafting an athlete's threat profile, and how this helps manage risk and threats?

Burton: First, a comprehensive baseline threat assessment should be conducted for the team and the owners. This should include crime and security-related problems around the home venue and residences, including vacation venues.  

Second, each high-profile athlete should also have a baseline threat assessment conducted to understand the degree of potential security-related problems and concerns. It would also be important to have great liaison relationships with the league headquarters and their counterparts at other teams to understand the scope of potential problems "dragged" to your venue by other high-profile athletes. For example, even if your players are relatively risk-free, it's important to gain knowledge of those threats traveling to you for games.  

It's also critical to maintain a good working dialogue with the local, state and federal law enforcement partners to understand trends and regional threat patterns from terrorism to crime.  

 

KEYWORDS: fan safety law enforcement protective intelligence sports security stadium safety

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Sarah Tatsis

    5 minutes with Sarah Tatsis - Why women are needed in the ongoing fight against cybercriminals

    See More
  • 5mw Tim Danks

    5 minutes with Tim Danks - Global collaboration in cyber risk management is needed

    See More
  • 5 mins with Bocek

    5 minutes with Kevin Bocek - Why machine identity management is critical for security

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing