Boys aggressively targeted on Instagram and Snapchat, analysis of Cybertip.ca data shows

Parents, pay attention! “Adolescent boys are being targeted primarily on social media giants Instagram® and Snapchat® as part of an ongoing sextortion crisis, an analysis of July Cybertip.ca data by the Canadian Centre for Child Protection (C3P) shows.
For the month of July 2022, Cybertip.ca has opened case files for 322 victims of sextortion:
When the gender victim was known, 92 percent of cases involved boys or young men;
Sixty‑three percent of victims reported they did not disclose the incident to trusted person;
Fifty percent of victims were under than 18 years of age, 37 were 18 years or older. In 13 percent of cases, the victim’s age was unknown;
When the platform used to facilitate the harm was disclosed, Instagram (42 percent) and Snapchat (38 percent) were by far the most frequently used social media environments where victims were targeted. Whatsapp® (5.6 percent), Facebook® (3.6 percent), and Apple’s iMessage® (1.2 percent) were the next closest platforms in terms of frequency.”

Read the full report at: https://lnkd.in/gP3nkJ4h

#socialmedia#sextortion#childsafety#childprotection#childabuse#onlinerisks#cybersecurity#onlinesafety#familyprotection#kidssafety#securityservices

‘Wren Eleanor’ TikTok movement inspires moms on social media to remove photos of kids: ‘Sick people’

TikTok sleuths noticed that users were saving videos of 3-year-old Wren Eleanor in concerning numbers

For years, security professionals have been repeatedly sounding the alarm in regards to the extreme danger of parents posting their children’s pictures or videos online. Your child’s adoring pictures or videos can be downloaded, used, and, quite often, photoshopped in horrific circumstances by pedophile rings, child traffickers, and ‘kiddie porn’ websites. What to you is “cute” and “adoring,” or a great way to draw more followers or make money as an influencer account, is for these insidious others “attractive,” “sexually stimulating,” or “erotically arousing”! Evil absolutely DOES exist…Horrible individuals and organizations are very real, and they are preying on your ignorance and hunting your children. Be alert!

According to the Fox News article, “One user, @hashtagfacts, noted that a video of Wren wearing a cropped, orange shirt was saved more than 45,000 times. A video of Wren eating a hotdog was saved nearly 375,000 times. She also highlighted unsettling comments on Wren’s videos and pointed out that popular searches for Wren’s account included phrases like “Wren Eleanor hotdog” or “Wren Eleanor pickle,” meaning users were frequently searching for videos of the three-year-old eating a hotdog or pickle.”…

Click here to read the full article

How to eliminate some ”new guy” mistakes in EP (certificates, association memberships, licenses)

Even though I addressed this subject over twelve years ago, the same still rings true. In the world of executive protection/close protection, there are already so many distractions, pitfalls, and misunderstandings that I believe there is a veritable need to, again, address the distinction and perceived necessity surrounding certifications, licenses, and memberships/associations that so many new practitioners fall prey to in their quest to achieve their career goals of becoming a truly professional executive protection or close protection agent. Let’s take a few minutes and see if we can answer a couple of your important questions and get you headed in the right direction…

Click here or on the link below to read the full article

Residential Security-It is more important than you think

What do celebrities like Piers Morgan, Tyler Perry, Paris Hilton, Simon Cowell, Ariana Grande, Kate Moss, Kim Kardashian, Rita Ora, Rihanna, Hilary Duff, Lindsay Lohan, Dorit Kemsley, Bella Thorn, Kelly McGillis, Chris Brown, Miley Cyrus, Kanye West… (Yeah, the list is a bit long, isn’t it? Wait though, we’re not done yet…), Sandra Bullock, Selena Gomez, David and Victoria Beckham, Christine Quinn, P.Diddy, Audrina Patridge, Orlando Bloom, Megan Fox, Kelly Clarkson, Scott Disick, Kendall Jenner, Charlie Hunnam, Taylor Swift, Cara Delivingne, Kylie Jenner, Harry Styles (We’ll have to end the list here so we don’t spend the fill page just on names) have in common? I mean, besides the fame, careers, and money? All their homes have been broken into either by fans, stalkers, or burglars. In some cases, the victims were either inside their homes when this happened or entered the home to find the intruders there. And this, fellow practitioners, is where we come in!

Piers Morgan, and his wife were burgled while they slept in their French villa

Besides the damages and the loss of valuables, cash, or assets that have enormous value, some of these victims are going to be scared forever. It is never easy for one to have his/her safe heaven, their home, broken into by others. Knowing that the place you consider the safest is not safe and seemingly anyone can target you, come closer to you, or steal from you, makes the victims feel vulnerable and unsafe and brings substantial levels of anxiety into their daily life. Having your privacy torn from you can leave mental and emotional scars that do not mend.

”A burglar has been found guilty of raiding the home of pop star Rita Ora while she and her sister slept upstairs. Charaf El Moudden, 26, took £200,000 worth of property from the former X Factor judge’s house during the burglary on 28 November last year. Her sister Elena was awoken by a man rifling through items in her bedroom, prompting Ora to call police.” BBC News

What’s even scarier is that many of these victims have families, and their children can be targeted as well. And if you think that only celebrities can be victims of having their homes broken into, think again. Many incidents show that other individuals such as C-Suite corporates, businessmen and businesswomen, as well as Royal Family members, have had their homes broken into. Florence Mirsky, Elton B. Stephens Jr, and the former prime minister of Qatar, Hamad bin Jassem Al-Thani are just a few examples.

You can download and use the picture as well as the full data by clicking the links below. Please make sure you mention the source of our blog.
If you have any issues downloading, please e-mail info@lemareschal.com

According to Vanity FairDavid and Victoria Beckham were reportedly “shaken up” after a masked intruder broke into their home while they were asleep. The couple’s West London mansion was burglarized in late February. The pair and their 10-year-old daughter, Harper, were apparently asleep when the intruder broke in upstairs, only becoming aware of the invasion later. In the meantime, the burglar was able to quietly make off with thousands of pounds worth of their belongings. The Beckhams didn’t realize they’d been burglarized until their 17-year-old son, Cruz, came home later that night after an evening out with friends and discovered a ransacked spare bedroom with broken glass from where the window had been smashed in. Cruz alerted his father, who called the police. They then both went looking for the trespasser, but he was long gone by then with their designer goods and electronics.

Reading all these names (who are just a small group considering the larger picture) you may ask: since they have the money, why can’t they protect their homes more efficiently?

One of the primary reasons is the all too common PROACTIVE vs REACTIVE security stance they take. This unfortunate view has become one of the leading factors in these types of circumstances. Many people, no matter what their financial background or celebrity status might be, will only take action and reach out for help AFTER an incident has taken place. They are convinced, either on their own or by friends and associates, that they don’t need that kind of protection, they’ll be fine, it won’t happen to them…Until it does. Then, some may invest in a close protective detail, but not in a residential security team, and in doing so, will never learn what may be truly necessary. Some interesting residential security facts brought up by the 2022 State of Safety report showed that although Americans believe that crime is on the rise, the use of property protection measures fell 6% between 2019 and 2020, and nearly 40% of American residents don’t use any kind of security measures to protect their home whatsoever.

What is Residential Security?

Residential security is a combination of technological measures, methods, and manpower to ensure the safety and security of a household (lives, valuables, privacy) and the assets and property that lie within its perimeter. Depending on the clients’ risk and threat factors (their security needs), it can be alarm systems, controlled access, guard dogs, physical residential security teams/guards (RST), drone coverage, or any combination of these tools.

A good residential security plan starts with a detailed, in-depth risk, threat, and vulnerability assessment. An expert should visit your residence and do a detailed physical survey to identify any weak points that will make it easier for someone to gain access to you or breach your privacy. The expert will be able to determine the seriousness of potential risks and the likelihood of an incident taking place, either due to what is discovered during the assessment or specific threats you have currently. He/she will consult with you on a plan and give their recommendations (upgrading the locks on windows and doors, upgrading the level of glass security, placing an alarm system and CCTV, hire security guards, etc.) on how to mitigate any risk and/or threat factors and protect your property. They can also identify the response time for first responders and law enforcement and do thorough research on your area’s criminal activities, crime rates/types, and even any known sex offenders’ presence in your surrounding neighborhood. So many families have small children, and knowing the potential risks in the surrounding area helps to mitigate any possible dangers to the children’s safety. During an estate risk, threat, and vulnerability assessment, they look for anything that can be harmful to you or disturb your life. A threat can be anything such as a natural disaster, fire incident, stalking and harassment, privacy violation, smash and grab theft, robbery, vehicle theft, or a serious physical attack such as a kidnapping, active home invasion when you’re home or even murder.

Things to consider when establishing a Residential Security Team

     A Residential Security Team is not established just because the client lives or spends a majority of their time at the said estate, a residential security team is placed for the safety of the premises even when the client is not home. Arriving home to find a violent individual in your home awaiting your return is no less disturbing than stopping one from coming in when you’re present in the home. Most clients and security companies focus so much on protective details that they forget the importance of having a proper and balanced RST in place that will make sure the house, your belongings, and your privacy are protected 24/7. Most of the victims mentioned at the beginning of our article could have prevented what happened to them if they had put the needed importance on their RST teams. While a determined criminal might come in when you’re home, most will attempt their task when you’re away from the residence, and a mere security system with cameras only takes great pictures of them getting away, not stopping the loss of assets or the even more frightening possibility of someone waiting until you arrive home.

     A Residential Security Team and the Protective Detail teams must cooperate and communicate with each other on a regular basis. They are two departments with the same goal, to keep the family safe. Either when the family is on the move or back at home. We’re highlighting the necessity of cooperation significantly because there seems to be a competition at times between RST and Protective Details teams who don’t share information or report to each other as they should. Remember, as an RST, you have eyes on the property and around it; as a Protective Detail team, you have eyes on the client while in public or away. Many incidents would have been avoided if one team could pass on the information they found to the other. In the end, we all truly want the same thing…A safe and happy client and his family.

     The training of your Residential Security Team is crucially important. You must have trained personnel who not only know every inch of your premises and all the needed procedures but also are trained and qualified for the job requirements. Make no mistake, a residential security team member is not just a uniform guard.

RST members are individuals who are responsible for a variety of functions such as:

  • access control
  • patrols
  • CCTV monitoring
  • surveillance
  • documenting and reporting
  • emergency response
  • providing real-time information about the surrounding area
  • identifying suspicious behaviors and reporting them
  • have a high level of customer service attitude
  • conduct ongoing threat, risk, and vulnerability assessments
  • follow up with SOPs
  • work directly with household personnel, other security teams, and local law enforcement
  • know how to use alarm and surveillance equipment
  • can support event security operations
  • mail screening

The residential security team is your first line of defense, and when they are truly professional, they can be a deterrent to anyone who may want to target your home.

     When you’re vetting your Residential Security Team, there are a few steadfast rules to always keep in mind. Would you allow just anyone to be close to your family and friends? No, of course, you wouldn’t! Then why shouldn’t you be extremely careful during the vetting and hiring process of your residential security team? Known incidents have shown that ‘’strong castles fell from within’’, and many home break-ins have happened due to insider information. When we deal with celebrities or people with specific wealth, insider threat is very real. Many of the break-ins happened because one of the residential security guards either committed the crime or made it easier/assisted the actual burglars. Vetting your security personnel is mandatory, a criminal background check should be done before hiring and be done again regularly at random after the initial hiring. An additional credit check is necessary to assure that your RST members are of sound financial background. There can be no room for any type of bribery or theft of the client’s assets due to an individual’s monetary indiscretion. Driving records are crucial as the RST members may or may not have access to or need to move the client’s vehicles. And as much as it sounds ‘extremist,’ there MUST always be a background into anyone near the children or having regular interaction with the children. The world is no longer a safe place…Unless we make it that way. This is our task…This is our Craft. We have chosen this, and a Residential Security Team is a very necessary asset for the proper 24/7 protection of clients, property, assets, and even their very lives.

If you are interested in learning more about Residential Security or need a Residential Risk, Threat, and Vulnerability Assessment? contact us today at info@lemareschal.com

Chris Grow

Protective & Intelligence Services

AUS Global Special Services Travel Team

Managing Partner LeMareschal LLC

Denida Grow

Protective & Intelligence Services

Founder & CEO

Athena Worldwide Nannyguards

Managing Partner LeMareschal LLC

Free Etiquette Training

In the corporate world, excellent etiquette means that you know how to act professionally and exercise proper manners in all aspects when engaging with others. You will be able to create a good impression, portray confidence, build strong business relationships, raise your productivity, and prevent any miscommunication issues.

The following link is a great resource for free etiquette training and it covers many sectors such as Corporate, Interview, Clothing, Internet, Email, and other forms and genres of etiquette.

#training #interview #business #etiquette #etiquettetips #etiquettetraining #freeeducation #securityservices #securityprofessionals #securitymanagement #corporatesecurity #professionalism #religiousetiquette #culturaletiquette #firstimpression

Russian Oligarchs Keep Getting In Troubles by Instagram Selfies

In our latest interview with expert Nick Barreiro, Chief Forensic Analyst of Principle Forensics, we discussed the security risks from any/all social media platform postings and how someone can obtain critical information from your pictures. If you haven’t watched the interview yet, please find it below

According to Vice’s latest article, authorities have been following Instagram profiles of the women related to, or involved with, Russian oligarchs to obtain information about them, their holdings, accounts, and locate assets to seize/freeze by merely identifying and following the weakest link who posts the most. These women who act like ”influencers” or social media celebrities are looking for publicity, but they now represent a significant threat to the security of the individuals they’re around and expose them to unwanted scrutiny. ”Oligarchs themselves rarely use Instagram to accidentally crack open a window into their high living. Rather, it’s the people partying with them: A stepdaughter, an ex-wife, or in the least one infamous case, an escort.” Read the full article here.

”Stop posting pictures with your clients or from your security details” An interview with Nick Barreiro, Chief Forensic Analyst of Principle Forensics

Our interview with Nick Barreiro, Chief Forensic Analyst of Principle Forensics is available online. It was a pleasure, for us, to have this opportunity to discuss with Nick the ever popular subject of ”Don’t post pictures from your details, business trips or your clients and their ‘toys”. A subject that has been brought up for discussion hundreds of times and by many diverse colleagues, and even today there seems to be two categories: Those who say there is nothing wrong with it and it causes no threat or harm, and those who are against it and have been preaching it for years. Our new subject matter expert is a certified Audio/Video Forensic Analyst and the founder of Principle Forensics and he discussed with us how easy it is for someone to draw valuable information from your online posts, videos, audio, or pictures. We talked about photography risks, audio/video risks, discreet investigations involving recorded evidence, and why the issue is still critical even if you have the client’s permission to post your pictures with him or the fact that you have stopped working for said client. Nick will welcome any questions but he is not on social media so if you have a question for him to answer, you can email us and we will forward it and follow up with you. He has also offered to do a second interview where we can open it up to participants who can ask questions. So, if you are interested, let us know.

Child kidnapping prevention!

In this article Orlando “Andy” Wilson, talks about child kidnapping prevention.

”Children are especially vulnerable to kidnapping as their natural inquisitiveness can be exploited by kidnappers and pedophiles and most nannies or drivers are not security trained, also many kindergartens and schools have very low standards of security. And most parents think that something as horrific as having their child kidnapped will never happen to them… But is does happen, and in such cases prevention is far better than hoping for happy endings that the chances are, will not materialize.

Most people think of kidnap for ransom situations when we discuss kidnapping but another type of domestic kidnapping is where an estranged parent will take a child they do not have legal custody for. These situations can become very complicated if the child is taken to or is in another country, as the local laws usually take precedence. The Hague Child Abduction Convention is the international law that tends to be used for child custody disputes but how this is interpreted at local levels is another thing. A single parent may have custody of their child in U.S. or Western Europe, but if their ex-partner is a citizen of say an Asian or Middle Eastern country and manages to get the child there, the local courts will most probably give them custody.” read the full article HERE

Jussie Smollett’s Bodyguards Get Violent with Reporters

Performing close protective services for a public figure is a tedious task, to say the very least. It’s not easy and requires a great deal of skill and experience in dealing with crowds, fans, and media. You may think pushing people away or being physically overpowering is an accepted method, but you would be very wrong. Not to mention you will be 100% responsible for any injuries to the person that you pushed to the ground or roughly handled irresponsibly. “Hey, don’t shove me, man,” someone said. “You just knocked a man over!” one person said. A man with a camera can be seen on the ground in the video. Another man helped him up as the Smollett entourage moved forward without missing a step”…..read the full article in The Western Journal.

Jussie Smollett arrives at the Leighton Criminal Courts Building for his sentencing hearing on Thursday in Chicago. (Scott Olson / Getty Images)

Social Media Investigations and Monitoring for Risk Mitigation Purposes

The use of social media and the way it affects our lives and businesses have brought a new challenge to the security industry and the protective team’s responsibility. It gives the entire world the ability to look into people’s lives with the mere push of a button. Scandals are created, secrets exposed, and lives ruined. In the case of personal security, social media can be used in the advancement of a protective detail; however, one must know how to utilize it properly. Today, we will talk about Social Media Investigations and Monitoring. For those who are not aware of the term, as we utilize it in protection circles, Social Media Investigation and Monitoring is the process by which you can identify what is being said about your clients, a brand they represent, or the corporations with which they are involved and any threats or dangers that may exist in relation to those aspects.

As we sift through different social media platforms and online channels, we must then determine if what is being said has any significance regarding your clients’ reputation, persona, and safety and if there is the need to mitigate any risks. In other words, it’s like setting up an online, social media “net”. This process then helps you discover everything that is being said, written about, or portrayed on social media and determine its relevance to your clients. You can gather information about the ‘’public opinion’’ surrounding your clients, about people or entities who are angry with them for one reason or the other, people who are obsessed with them, or people who are making online threats. SOCMINT or Social Media Intelligence (not to be confused with OSINT) has seen a huge rise in necessity due to the use of social media and a competent protective detail needs to always be informed and social media investigations and monitoring are a huge part of this process. 

Now, let’s see some examples of how social media investigations and monitoring applies in protective services. Let’s say one of the people you are protecting belongs to a large pharmaceutical company and they decided to raise the price of a specific drug, thus affecting the lives and wellbeing of thousands of people. Perhaps another client is involved in a financial institution that quite suddenly makes a significant decision that affects people’s lifetime savings and pensions. You can imagine that there will be a significant number of people who become very angry, and some may want to harm your client. During the recent pandemic, there were a number of “anti-vaxx” groups that were quite vocal and utilized Facebook as one of their many platforms to accomplish their goals. Another example would be the need to discover if there is someone using your client’s name or company to scam others and commit crimes.

We are sure that many of you today are aware of the infamous ‘’Tinder Swindler’’, Shimon Yehuda Hayut, who legally changed his name to Simon Leviev to pretend to be the son of the billionaire Lev Leviev and used his name and company logos to scam people. Although his actions were known since 2017, it was only after the airing of the Netflix documentary in 2022 that the Leviev family found out and filed a lawsuit against Hayut for falsely portraying himself as the son of Lev Leviev, receiving benefits, and committing crimes.

No alt text provided for this image
(Photoshopped image of Shimon Hayut, aka Simon Leviev, with Lev Leviev (Picture: Netflix)

According to Leviev’s family attorney, Guy Ophir, they will now include anyone who has attempted to make a profit from his scam during the next lawsuit. What we can ask is, as security providers, why didn’t someone from the real Leviev family ever discover this scam artist who was extremely public and active on social media as the ‘’son of Lev Leviev’’? Although the real family members were never part of this fraudulent scheme, and it didn’t appear to affect their safety, it did, however, involve their name/brand in a very public and negative way. In other words, it should have definitely been considered as a threat to their reputation. Other people who were harmed by this scam artist were the businesses who did work with them, and their secondary service providers as well. 

No alt text provided for this image

Another interesting case to mention is Elon Musk where he, the actual client, took it upon himself to “solve” the issue and directly contacted the person of interest who had begun posting his private flight details and created the security risk for him and was literally blackmailing him unless the POI was paid. According to media reports “Elon Musk states social-media accounts that track his travel movements are ‘becoming a security issue.” Tail numbers and yacht names of billionaires are increasingly being shared on online platforms and one can track them by having the appropriate app unless significant efforts are made to secure them from the reach of those diligent few. These are some unique specific details that the security team needs to pay close attention to at all times.

Since Social Media platforms are the way people today communicate with each other, we as security providers must keep in mind that this is not always a positive aspect. Perhaps a person or persons will utilize social media to collectively gather people with their same goal or mission, to get together and plan their next move (Example: protesting outside your client’s house or corporation). In this case, you will want to know what is being said online about the person you protect to determine if there is something of extreme necessity to include in your risk and threat assessment and then take protective measures as well as inform their legal department.

As we have all witnessed too many times, it only takes one well-placed picture or story regarding some alleged activity on the part of your client, and it will go viral quickly, truth or not. Staying one step ahead of this type of “attack” has become a crucial necessity in order to protect your client from embarrassment or exposure. One of the most common issues in recent history is when personnel close to the client i.e., family, staff, vendors, and any other secondary customers post pictures, stories, or opinions and subsequently fail to understand the negative effect these types of communications can and will have on the client’s life, business, and the lives of their loved ones.

Why do you need a Social Media Investigations and Monitoring Strategy when you are a security services provider? To summarize we can say:  

1) To identify new threats. 

2) To discover what information about your client is posted online either by himself, the ones close to him, or his employees and evaluate how these affect his safety. 

3) To evaluate a threat (someone is posting online threats directed at your client).

4) To add to your due diligence.

5) To geolocate a picture or a video, sometimes even audio. 

6) To include any findings in your Risk and Threat Assessment (We can never highlight this enough, social media surveys and investigations are now a critical part of your Risk and Threat Assessments).

7) To find people obsessed with or following your clients (stalkers).

8) To identify hate groups or terrorist organizations that may affect your client.

9) To identify people or businesses your client may or may not want to do business with.

10)To mitigate risks from the information found online about the person you protect (How are the pictures of my client used or tampered with and for what purpose?).

11)To identify if someone is impersonating your client or a family member.

12)To find out if your client’s moves/visits/travels are posted online (Exposing them to others who may be in the same hotel, conference room, restaurant). 

13)To identify workplace violence or insider threats indicators.

14)To find out what is the ‘’public opinion’’ regarding your client (Always keep an eye on what is being said about your client and have a strategy to respond). 

15)To determine if a person or persons are utilizing your client’s name or business name in a malicious or unauthorized manner for their own personal gain. (Claiming associations or partnerships, etc.)

How to perform Social Media Monitoring for security purposes? 

First, let’s clarify one important thing. ‘’Googling it’’ is not enough, nor is it the answer. There are a number of search sites that allow for user input thus watering down or contaminating information and it’s accuracy. For those who are not aware, Social Media Investigations and Monitoring is quite a different department of protective services and quite often falls under Intelligence Analysis and Open-Source Intelligence. It requires unique skills and knowledge. One must clearly understand different social media and research platforms and how to use each one of them (and/or in combination) to obtain information. How you will approach each case is different and certainly depends on who your client is, their business, close relations, and/or their public image. This will directly affect the searches and the resources used and for what purpose. It is vital in our current day and age to include SOCMINT (Social Media Intelligence) in your client’s service proposal, no matter how public the person may or may not be. Hiring ten Executive Protection agents and a Residential Security Team is not enough anymore. SOCMINT services are a vital part of your Risk and Threat Assessments (Dynamic Risk Assessments too) and enable your protective detail to function more efficiently. 

For those who can not provide a certified Social Media Investigator for their clients, follow up with these steps:

1)Understand who your client is, his/her background, the threats, where do they stand in political, social, financial sectors.

2)Be aware of any of the latest changes in your clients’ lifestyle, public opinions, and professional decisions. 

3)Be aware of any of their political and social changes. Watch the news from multiple channels. 

4)Familiarize yourself with all close family, friends, staff, and associates and their respective social media footprints.

5)Set up a social media investigation and monitoring strategy. 

6)Have a good understanding of the Intelligence Cycle (How the intel is being collected, analyzed, disseminated, reviewed, etc.).

7)Have a good understanding of the search tools on different platforms (Facebook, Twitter, Instagram, TikTok, LinkedIn, Tumblr, Reddit, etc.) 

8)Do research on the available search engines and the strengths and limitations each one may have. 

9)Know how to conduct image, video, and audio research and gather intelligence from them.

10)Invest in appropriate platforms for social media investigations and monitoring (Have in mind, NEVER rely on one platform’s result or just platforms’ results. The user/investigator is the main component of a social media investigation). 

11)Download and use appropriate search engines extensions and apps. 

12)Invest time in creating ‘’sock puppets’’ or fake profiles and maintain their persona. Sometimes you may need a profile to have access to different forums or groups without being discovered.

13)Train yourself in link analysis (How to look for connections between people, events, and organizations).

14)Set keyword alerts (In multiple languages in case your client has ties with more than one country).

15)Gather, analyze, evaluate, and report your findings to the appropriate department or leadership.  

As the threat landscape changes every day, we as protection providers must be able to adapt and keep ourselves up to date with additional training. Today’s executive protection agent must also be skilled and knowledgeable in investigations, open-source intelligence, protective intelligence, HUMINT, and have an increased understanding of cyber security. Large corporations have already created their own embedded intelligence departments, while others are hiring threat analysts and OSINT investigations from outside security providers. The rise of protective intelligence, and whatever that includes, is here to stay and we are seeing it more and more through the highly increased number of related job postings every day. 

If you are an Executive Protection Agent and want to learn more on how to utilize Social Media Investigations and Monitoring for Risk Mitigation Purposes, reach out to us.

f you are a service provider and want to add Social Media Investigations and Monitoring for Risk Mitigation Purposes on your service list, contact us to learn about our vendor services. 

Chris Grow

AUS Global Special Services Travel Team

Managing Partner LeMareschal LLC

Denida Grow

Founder & CEO

Athena Worldwide 

Nannyguards

Managing Partner LeMareschal LLC