Approach

How we work
on every engagement.

A four-stage methodology that applies to every engagement, from a single advance to a sustained protective program.

Methodology

Our methodology,
step by step.

I.Assess

We begin with the threat environment, the principal's routine, exposure points, and operational geography. Resource recommendations come after that picture is clear.

II.Design

Operational plans are built specifically for the situation. Posture, coverage, response thresholds, and reporting structure are scoped to your circumstances rather than to a generic template.

III.Execute

Teams deploy under clear command, with disciplined communications and a profile calibrated to the principal and the operating environment.

IV.Report

Engagements close with written summaries, threat updates, and a debrief. Findings stay with you and inform decisions going forward.

Quiet work,
done well, ahead of need.

The most effective security work draws little attention. Our operators are trained to integrate into the environments where principals live, work, and travel, with minimal disruption to normal routines.

Operating Principles

Principles that guide
our work.

i.

Discretion

Client engagements are held in confidence. We do not discuss principals, findings, or the existence of an engagement outside of authorized reporting channels.

ii.

Discipline

Operator standards are set and applied consistently. Vetting covers background, references, professional history, and judgment under stress, and applies to every engagement.

iii.

Decisiveness

Operational authority is delegated to the personnel closest to the situation, supported by a clear command structure for escalation and oversight.

iv.

Integrity

We decline work that falls outside our capability or that conflicts with our professional standards. Clients are informed of any limits before an engagement begins.

v.

Anticipation

Much of our work takes place before an event rather than during it. Advance reconnaissance, intelligence, and contingency planning carry significant weight in every engagement.

vi.

Restraint

Force, surveillance, and disclosure are applied at the level the situation actually requires. Proportionality is treated with the same care as capability.

Standards

Standards applied
on every engagement.

Team members are selected through a thorough vetting process covering professional history, references, operational record, and personal character.

Engagements are conducted under documented protocols, with command oversight, communications discipline, and post-action review.

01
Operator Vetting

Background, references, professional history, and ongoing performance review.

02
Engagement Discipline

Documented operational plans, clear command structure, and disciplined communications on each engagement.

03
Information Handling

Client information is compartmentalized internally and encrypted in transit. It is not used in marketing or case studies.

04
Legal & Regulatory

Licensed and insured for the work we perform, operating in compliance with applicable US and UK regulations.

Who We Serve

Clients we are
built to support.

C-Suite & Boards

Public-facing leaders whose movement, family, and decisions carry security exposure.

Family Offices

Principals and their households across primary, secondary, and international residences.

Corporate Legal

In-house counsel and outside firms requiring confidential, evidence-grade investigative support.

Institutional Clients

Organizations with complex risk profiles preparing for the security demands of their operating environment.

Begin the Conversation

Tell us about
your situation.

One conversation, handled by senior personnel, in confidence.

Contact Us View Services