Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalAccess ManagementFire & Life SafetyPhysical SecurityArenas / Stadiums / Leagues / EntertainmentGovernment: Federal, State and Local

Strengthen mail security to better protect public figures

By Will Plummer
empty envelopes on white background

Image via Unsplash

April 28, 2023

In the wake of the disturbing attack on Paul Pelosi, the husband of House Speaker Nancy Pelosi, concerns have risen over how politicians and others in the public sphere can keep themselves protected. Increasing political polarization across the globe is leading to extremist violence that can put high-profile public figures such as politicians in danger. 

And they are not the only ones who need to worry. Business executives, influencers and any other high-profile individual can also be at risk, especially if they tend to make controversial public decisions or take strong stances on polarizing issues. 

Every chief security officer or executive protection team is well aware of all kinds of potential physical and cyber threats. As such, they likely have a detailed security and response plan or system in place. Unfortunately, there are some threats that, while known, are not deemed particularly likely to happen and therefore not a high priority, meaning there are not as many protections in place. The best example may be mail-based threats. 

Mail-based threats and public figures

Before any security team can start to plan for mail threats, the natural question is, how big of a deal are they? After all, everyone gets mail and most of it is harmless. Unfortunately, the past few years have made it clear that such assumptions are naïve and dangerous. In the wake of the contentious presidential election of 2020, poll workers went from often volunteer public servants to known individuals and targets of attacks.

A recent survey by the Benenson Strategy Group and Brennan Center for Justice showed that one in six local election officials has received a work-related threat. Of those who have been threatened, 25% received threats through the mail. Those threats have consisted of anything from death threats to dangerous substances intended to harm like toxic white powders or liquids. Other common mail threats sometimes include hoaxes consisting of flour or sugar, meant to spread fear or disrupt political operations. For example, in 2018 a South Boston polling station had to shut down due to finding a suspicious white powder inside a ballot. The powder turned out to be harmless, and responders said it was likely an attempt to disrupt the voting. Celebrities and TV personalities have faced similar threats.

Beyond the health risk and hoaxes, there’s also the “phygital” risk to consider, which involves physical objects like miniature computers or Wi-Fi boards getting sent through the mail to establish an on-site connection to home or office networks. Since many security teams aren’t informed about the phygital risk — or know how to recognize them — a phygital hacking device could go undetected for a long period of time acting as a portal for a hacker to gain network access or simply gathering data for a lengthy period of time in an unopened box or pile of mail items. 

Moreover, the risk of these threats reaching their destinations is increased by doxxing, which involves malicious actors getting ahold of important officials’ personal info and sharing it with the public. In short, doxxing can put home addresses in the hands of anyone who might want to send a mail threat. 

The recent doxxing of several Supreme Court justices is only one example of many. Mail security can get even more complex if a political leader or other public figure has multiple homes and office addresses that get exposed, resulting in even more locations that need protection. When considering personal homes, it is not only mail addressed to that specific individual. Packages received by family members, or others living at the residence, provide another mail stream to consider and thus a security vulnerability. How can a personal security team hope to collect all the mail that arrives at these different destinations and screen everything for threats? 

With every controversial ruling, every new bill that passes or an incendiary social event that causes a public uproar, more public figures are at risk of threats that not everyone knows how to address. 

Prioritizing mail security

The problem of mail threats isn’t limited to the homes and offices of politicians or other public figures. Nearly every industry has faced the same issues. As just one example, Meta increased spending for Mark Zuckerberg’s personal security by $4 million early this year after the recent mass layoffs. Thankfully, some leaders have developed protocols, technologies and educational resources to protect those who are most vulnerable to targeted mail attacks. 

One of the first things any security team can do is consult with experts in other industries and fields who may have experience in facing similar mail security issues. Some examples include former military or law enforcement experts, including former USPIS Dangerous Mail Inspectors. These individuals have already helped to develop protocols and strategies for mail security in their respective industries and fields, and have significant experience in recognizing and mitigating threats. 

Having this first-hand expertise on call to review potential threats, could make the difference between a dangerous powder injuring an innocent person — or a phygital device going undetected — and mail threats being safely and successfully neutralized. 

The second thing security teams and public figures can do is to look to new technologies for detecting any kind of mail threat. X-rays, while commonly used for scanning batches of mail, can only detect certain types of threats. For instance, an X-ray scanner cannot detect small quantities of powders or liquids, which are among the most common mail-based threats today. In addition X-ray scanners can be quite large and require specialized training to use, making them less than ideal for use across multiple locations or for mobile applications. Of course, the use of X-ray scanners also requires additional permits, not to mention extensive operator training and safety protocols, given radiation safety concerns. 

Another piece of technology that is easy to implement for detecting threats, specifically phygital threats, is a network scanner. A network scanner can detect irregular activity which may point to cybersecurity threats, including that of a phygital device. If the monitoring team members sees unusual activity on the network, they can check unopened packages that have been sitting in the facility for hacking devices. 

People in the public eye may wind up being targets for malicious threats. But these threats don’t have to be disruptive or dangerous when the right precautions are in place. CSOs and executive protection teams can begin taking stronger measures for protecting public figures. And with the political turmoil today, these measures are more necessary than ever before. 

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: attacks Mail screening post office security public and private security security budget

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

William plummer

Will Plummer, is military veteran and Chief Security Officer at mail screening technology provider RaySecur.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • mail_enews

    4 Steps to Better Mail Screening and Ricin Detection

    See More
  • I voted stickers scattered on white background

    Government agencies collaborate to protect election mail from hazards

    See More
  • government responsive default

    Senate Passes Bill to Strengthen DHS Public & Private Cybersecurity Efforts

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • surveillance.jpg

    Surveillance, Privacy and Public Space

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!