Discretion
Client engagements are held in confidence. We do not discuss principals, findings, or the existence of an engagement outside of authorized reporting channels.
Approach
A four-stage methodology that applies to every engagement, from a single advance to a sustained protective program.
We begin with the threat environment, the principal's routine, exposure points, and operational geography. Resource recommendations come after that picture is clear.
Operational plans are built specifically for the situation. Posture, coverage, response thresholds, and reporting structure are scoped to your circumstances rather than to a generic template.
Teams deploy under clear command, with disciplined communications and a profile calibrated to the principal and the operating environment.
Engagements close with written summaries, threat updates, and a debrief. Findings stay with you and inform decisions going forward.
Quiet work,
done well, ahead of need.
The most effective security work draws little attention. Our operators are trained to integrate into the environments where principals live, work, and travel, with minimal disruption to normal routines.
Client engagements are held in confidence. We do not discuss principals, findings, or the existence of an engagement outside of authorized reporting channels.
Operator standards are set and applied consistently. Vetting covers background, references, professional history, and judgment under stress, and applies to every engagement.
Operational authority is delegated to the personnel closest to the situation, supported by a clear command structure for escalation and oversight.
We decline work that falls outside our capability or that conflicts with our professional standards. Clients are informed of any limits before an engagement begins.
Much of our work takes place before an event rather than during it. Advance reconnaissance, intelligence, and contingency planning carry significant weight in every engagement.
Force, surveillance, and disclosure are applied at the level the situation actually requires. Proportionality is treated with the same care as capability.
Standards
Team members are selected through a thorough vetting process covering professional history, references, operational record, and personal character.
Engagements are conducted under documented protocols, with command oversight, communications discipline, and post-action review.
Background, references, professional history, and ongoing performance review.
Documented operational plans, clear command structure, and disciplined communications on each engagement.
Client information is compartmentalized internally and encrypted in transit. It is not used in marketing or case studies.
Licensed and insured for the work we perform, operating in compliance with applicable US and UK regulations.
Public-facing leaders whose movement, family, and decisions carry security exposure.
Principals and their households across primary, secondary, and international residences.
In-house counsel and outside firms requiring confidential, evidence-grade investigative support.
Organizations with complex risk profiles preparing for the security demands of their operating environment.
One conversation, handled by senior personnel, in confidence.