Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalAccess ManagementFire & Life SafetyPhysical SecurityArenas / Stadiums / Leagues / EntertainmentGovernment: Federal, State and Local

Strengthen mail security to better protect public figures

By Will Plummer
empty envelopes on white background

Image via Unsplash

April 28, 2023

In the wake of the disturbing attack on Paul Pelosi, the husband of House Speaker Nancy Pelosi, concerns have risen over how politicians and others in the public sphere can keep themselves protected. Increasing political polarization across the globe is leading to extremist violence that can put high-profile public figures such as politicians in danger. 

And they are not the only ones who need to worry. Business executives, influencers and any other high-profile individual can also be at risk, especially if they tend to make controversial public decisions or take strong stances on polarizing issues. 

Every chief security officer or executive protection team is well aware of all kinds of potential physical and cyber threats. As such, they likely have a detailed security and response plan or system in place. Unfortunately, there are some threats that, while known, are not deemed particularly likely to happen and therefore not a high priority, meaning there are not as many protections in place. The best example may be mail-based threats. 

Mail-based threats and public figures

Before any security team can start to plan for mail threats, the natural question is, how big of a deal are they? After all, everyone gets mail and most of it is harmless. Unfortunately, the past few years have made it clear that such assumptions are naïve and dangerous. In the wake of the contentious presidential election of 2020, poll workers went from often volunteer public servants to known individuals and targets of attacks.

A recent survey by the Benenson Strategy Group and Brennan Center for Justice showed that one in six local election officials has received a work-related threat. Of those who have been threatened, 25% received threats through the mail. Those threats have consisted of anything from death threats to dangerous substances intended to harm like toxic white powders or liquids. Other common mail threats sometimes include hoaxes consisting of flour or sugar, meant to spread fear or disrupt political operations. For example, in 2018 a South Boston polling station had to shut down due to finding a suspicious white powder inside a ballot. The powder turned out to be harmless, and responders said it was likely an attempt to disrupt the voting. Celebrities and TV personalities have faced similar threats.

Beyond the health risk and hoaxes, there’s also the “phygital” risk to consider, which involves physical objects like miniature computers or Wi-Fi boards getting sent through the mail to establish an on-site connection to home or office networks. Since many security teams aren’t informed about the phygital risk — or know how to recognize them — a phygital hacking device could go undetected for a long period of time acting as a portal for a hacker to gain network access or simply gathering data for a lengthy period of time in an unopened box or pile of mail items. 

Moreover, the risk of these threats reaching their destinations is increased by doxxing, which involves malicious actors getting ahold of important officials’ personal info and sharing it with the public. In short, doxxing can put home addresses in the hands of anyone who might want to send a mail threat. 

The recent doxxing of several Supreme Court justices is only one example of many. Mail security can get even more complex if a political leader or other public figure has multiple homes and office addresses that get exposed, resulting in even more locations that need protection. When considering personal homes, it is not only mail addressed to that specific individual. Packages received by family members, or others living at the residence, provide another mail stream to consider and thus a security vulnerability. How can a personal security team hope to collect all the mail that arrives at these different destinations and screen everything for threats? 

With every controversial ruling, every new bill that passes or an incendiary social event that causes a public uproar, more public figures are at risk of threats that not everyone knows how to address. 

Prioritizing mail security

The problem of mail threats isn’t limited to the homes and offices of politicians or other public figures. Nearly every industry has faced the same issues. As just one example, Meta increased spending for Mark Zuckerberg’s personal security by $4 million early this year after the recent mass layoffs. Thankfully, some leaders have developed protocols, technologies and educational resources to protect those who are most vulnerable to targeted mail attacks. 

One of the first things any security team can do is consult with experts in other industries and fields who may have experience in facing similar mail security issues. Some examples include former military or law enforcement experts, including former USPIS Dangerous Mail Inspectors. These individuals have already helped to develop protocols and strategies for mail security in their respective industries and fields, and have significant experience in recognizing and mitigating threats. 

Having this first-hand expertise on call to review potential threats, could make the difference between a dangerous powder injuring an innocent person — or a phygital device going undetected — and mail threats being safely and successfully neutralized. 

The second thing security teams and public figures can do is to look to new technologies for detecting any kind of mail threat. X-rays, while commonly used for scanning batches of mail, can only detect certain types of threats. For instance, an X-ray scanner cannot detect small quantities of powders or liquids, which are among the most common mail-based threats today. In addition X-ray scanners can be quite large and require specialized training to use, making them less than ideal for use across multiple locations or for mobile applications. Of course, the use of X-ray scanners also requires additional permits, not to mention extensive operator training and safety protocols, given radiation safety concerns. 

Another piece of technology that is easy to implement for detecting threats, specifically phygital threats, is a network scanner. A network scanner can detect irregular activity which may point to cybersecurity threats, including that of a phygital device. If the monitoring team members sees unusual activity on the network, they can check unopened packages that have been sitting in the facility for hacking devices. 

People in the public eye may wind up being targets for malicious threats. But these threats don’t have to be disruptive or dangerous when the right precautions are in place. CSOs and executive protection teams can begin taking stronger measures for protecting public figures. And with the political turmoil today, these measures are more necessary than ever before. 

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: attacks Mail screening post office security public and private security security budget

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

William plummer

Will Plummer, is military veteran and Chief Security Officer at mail screening technology provider RaySecur.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 4 Steps to Better Mail Screening and Ricin Detection

    See More
  • I voted stickers scattered on white background

    Government agencies collaborate to protect election mail from hazards

    See More
  • Senate Passes Bill to Strengthen DHS Public & Private Cybersecurity Efforts

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • surveillance.jpg

    Surveillance, Privacy and Public Space

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing