Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityArenas / Stadiums / Leagues / Entertainment

5 minutes with Fred Burton - Why protective intelligence is needed in professional sports

By Maria Henriquez
5mw Burton
June 15, 2021

When he won $1.1 million dollars in 50 days through sports betting, 24-year-old Ben Patz, better known as “Parlay Patz” was on top of the world. Now he faces five years in prison for threatening professional athletes and their families with unspeakable crimes after he lost a big bet. Patz’s actions point to the critical need for teams to protect their players and stay ahead of bad actors, particularly when a single tweet or photo gives a wealth of information on an athlete’s location and security situation. Here, we talk to Fred Burton, NYT best-selling author, former special agent, counterterrorism expert, and executive director of the Ontic Center for Protective Intelligence about athlete’s threat profiles and how protective intelligence can help keep them and their fans safe.

 

Security: What is your background? And current responsibilities at Ontic?

Burton: I have had a long career in the physical security industry, which began in the U.S. Secret Service and continued with the U.S. State Department. I was a special agent and deputy chief of the counterterrorism and protective intelligence division of the State Department's Diplomatic Security Service, where I led countless high-profile investigations, including the hunt for and arrest of Ramzi Yousef, the mastermind behind the first World Trade Center bombing. I also coordinated protective intelligence efforts for several national-level special events, including the 1996 Olympics in Atlanta and several United Nations General Assemblies and Middle East Peace Conferences. 

Today, I am the Executive Director of the Ontic Center for Protective Intelligence, which provides strategic consulting, services and resources for safety and security, risk and compliance, and legal professionals at major corporations. Through the Ontic Protective Intelligence Podcast and my books, I confer with other security experts to provide insights on trends in physical security, protective intelligence methodologies, and how these topics are affected by developments in corporate and national security.

 

Security: How have threats and vulnerabilities changed for the stadium and sports safety/security space?

Burton: Protection for sports venues has come a long way since my time coordinating protective intelligence operations for the State Department at the 1996 Olympics in Atlanta. In those days, the bulk of our intelligence efforts were manual, including typed BOLO's. Technology solutions continue to lead the way in the protection space, allowing for the seamless collection and rapid dissemination of threat data, such as photos of threat actors. Additionally, physical security tools like License Plate Readers (LPR's) and Image Matching greatly enhance holistic security efforts, along with simplistic solutions like transparent plastic bags.    

 

Security: How can professional teams and security leaders protect their players and stay ahead of bad actors, particularly when a single tweet or photo gives a wealth of information on an athlete's location and their security?

Burton: Education, training and situational awareness are critical, along with an open dialogue between the security team and the VIP. High-profile athletes can draw fixated persons, criminal actors, and unwanted attention to their families and homes through personal and location information disseminated via social media. It's also important for the players to talk to family members about social media discipline when it comes to location data.   
 

Security: How can protective intelligence help keep professional teams secure and give security leaders a leg up on the monitoring and safety of the players, and fans? Including for sports team travel security?

Burton: First, let's start with how we define the topic. Protective Intelligence is an investigative and analytical process used by protectors to proactively identify, assess and investigate threats to protectees. The threat landscape is never static; it's dynamic and fluid. Thus, an always-on continuous monitoring platform is needed to stay in front of threats and see around the corners. It's also important to remember that threat actors travel and can divert their focus of interest to other targets if their original fixation is unaccessible.   
 

Security: Could you talk about how security leaders can go about drafting an athlete's threat profile, and how this helps manage risk and threats?

Burton: First, a comprehensive baseline threat assessment should be conducted for the team and the owners. This should include crime and security-related problems around the home venue and residences, including vacation venues.  

Second, each high-profile athlete should also have a baseline threat assessment conducted to understand the degree of potential security-related problems and concerns. It would also be important to have great liaison relationships with the league headquarters and their counterparts at other teams to understand the scope of potential problems "dragged" to your venue by other high-profile athletes. For example, even if your players are relatively risk-free, it's important to gain knowledge of those threats traveling to you for games.  

It's also critical to maintain a good working dialogue with the local, state and federal law enforcement partners to understand trends and regional threat patterns from terrorism to crime.  

 

KEYWORDS: fan safety law enforcement protective intelligence sports security stadium safety

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Sarah Tatsis

    5 minutes with Sarah Tatsis - Why women are needed in the ongoing fight against cybercriminals

    See More
  • 5mw Tim Danks

    5 minutes with Tim Danks - Global collaboration in cyber risk management is needed

    See More
  • 5 minutes with Raj

    5 minutes with Satish Raj - Why AI will transform digital video surveillance in 2021

    See More

Related Products

See More Products
  • security book.jpg

    Security Investigations: A Professional’s Guide

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Layer Security in Wireless Communications

See More Products

Events

View AllSubmit An Event
  • January 14, 2026

    Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

    The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing