Operational Communication for Close Protection

In the world of security operations, one of the most critical areas is communication, which involves constant cooperation and vital information sharing between top-level executives, their respective EA/P/A, the GSOC team, company employees, vendors, and agents working on the ground. Now, if you have been working for any reasonable amount of time in our industry, we are sure that the majority of you have experienced situations where the operation and security of everyone involved has been negatively affected by poor communication, inconsistent communication, or even the complete lack of communication. How information is being shared, what kind of information is being shared, and how/when it is documented is a skill one will quite often learn more readily outside the traditional ‘’EP Schools’’. Considering the fact that many security operations involve a huge number of people and different companies/vendors creating a hierarchy level, coupled with the fact that many companies have a tendency to be highly secretive with the information regarding the operation, you begin to understand how failing to communicate properly will not only create more risks but also will create day to day complications that don’t allow for a smooth operation. This is something that will not only be experienced by anyone secondarily involved, but also by the very protectees themselves. Keep in mind that your clients need peace of mind as well, and they shouldn’t be bothered or have their daily schedule negatively affected by your lack of communication skills or the resulting issues that ensue.

No alt text provided for this image

Communication tools

There is a common misbelief (Hollywood and action entertainment are all too often to blame for this) that all EP operations have agents using radios and other high-tech gadgets. In all actuality, the majority of EP agents are required to appear either low profile or not given a radio based on client proximity so they must rely upon and use their cellphones for a majority of their detail communication needs. Using your cellphone may seem like an easy tool and really quite convenient, but there is a downside, and it should also come with specific warnings regarding the pitfalls that come with it’s use.

Currently, for your operational needs, in order to communicate, you will need some form of a publicly available chat app. Some of the most utilized and popular platforms are Signal, Telegram, Wickr Pro and Threema, to name a few. The majority of our colleagues have used and are still using WhatsApp, even though the app has been reported for multiple data breaches and leaks, as well as ‘’system shutdowns’’, leaving many colleagues panicked and scrambling to rapidly find an alternative communication system. But no matter how serious the issues that it presents, WhatsApp seems to be yet another example of the phenomenon where people get so accustomed to a product and do not want to change because change means you have to learn to use something new from the ground up and start again. We have had serious resistance from other companies we provided services to, as well as our clients themselves, when we asked to use a different and more secure platform. In the end, we and our agents agreed to use WhatsApp as per our clients’ request for them; however, we were utilizing other platforms privately between our own agents. When you are using a third-party App such as WhatsApp, Telegram, Signal, etc., keep in mind that you will never be in control of the safety of the information you are sharing. Never. None of these apps are or ever will be entirely safe. So, when you are deciding, choose carefully based on who has fewer privacy issues, who is the creator (country), who your client is in relation to the creator (can the creators of this app be targeting your client?), what are your operational needs and always make sure you stay on top of the latest changes (social-political, geopolitical as well as company changes) that may affect the risk to your client. There are also paid work chat apps or business apps created for the workplace and personal messaging that promise a safer environment but again, one must take into consideration the fees and accessibility. (Who is paying when there is /more than one company involved and who IS involved, i.e. contractors, employees, 2nd parties, etc.).

No alt text provided for this image

And the available functions and capabilities of each platform need to be vetted thoroughly as well. What are your needs or requirements? Will you be using large group chats? Will you and any size group be able to utilize voice texting? Will you be able to send small packets of information through the groups that you set up? (Pics of critical POIs, BOLO vehicles, onsite venue pics for inbound teams or advances, etc.) These are just a few of the features that operational teams use all the time and finding the right platform for your team’s needs and unique requirements is very important. No one operational has any desire to have any more apps or sites open at once on their personal devices than is absolutely necessary in an effort to try to manage a detail. Less “moving parts” is always better, if possible.

Information flow

During a protective operation, there is information that is crucial and must be passed among the parties involved (as per their responsibilities) and the agents on the ground. For numerous reasons, some individuals who are assigned as an operation manager or contract manager seem to be apprehensive about asking the necessary questions of the client or the people assigned to act on behalf of the client. This apprehension, quite often, is caused by their own insecurity in what they want to ask, fear of a negative response to their request, or the simple fact that they do not know what to ask. Insecurity in what to ask is a skill acquired by time in grade. As we spend time in our Craft, it’s almost impossible not to learn what the correct questions or inquiries would be. Fear of a negative response can be associated with the desire for acceptance or to have the client like them. We all know that what is best for the client’s safety and family security may not exactly be what THEY want…Be prepared to patiently and thoroughly explain the reasoning behind the questions and the resulting decisions. And for those who don’t know what to ask, stay tuned we will share a template one can use as one sees fit for his/her own needs.

When you receive a request to provide protective services, you must ensure that any/all specific information that is necessary for that detail’s success is obtained from the client right away and is passed along immediately to the agents on the ground. How many of us have found ourselves working on short gigs and know nothing or very little about the client? Sometimes even the very basic information that pertains to the gig itself? While we all know that clients can change their minds about what they want from second to second, there is specific information that still must be passed to the agents. This is an inherent need to set your team up for success. Period. Being able to plan ahead, run successful advances, and lower the risk levels, or even eliminate them altogether, means you must have as much information as you can and communicate it properly.

Now, the information flow definitely has two sides. Because the agents on the ground are reacting in real-time during any situation, they are actively aware of new information that must be passed on to the GSOC or the assigned person in charge. It must be done on a consistent basis. This is critical for operational effectiveness. But we all know “that” agent who will put every, little, minute bit of information that he/she may think it is relevant to the task. Always keep this in the back of your mind…While you are communicating with your fellow team members or passing vital information to your GSOC, keep it brief. Short and to the point. Only the facts. K.I.S.S. is the acronym that suits this best…

Briefings and De-briefings

I don’t believe that we can accurately highlight enough how important briefings and de-briefings are in our line of work. It seems that more and more, only a handful of companies or team leaders are utilizing them properly or using them at all. This lack comes from a basic laziness in people who want to merely save time (Even though you can keep them short if you keep them on point and factual) and/or the absence of needed information. If you have nothing to pass on to your agents, why have one, right? Wrong. You, as a team lead, are not the only one who may have information that needs to be brought to the group. Allow team members to speak and ask questions so that later issues are avoided.

No alt text provided for this image

Communication Briefings are designed to provide necessary information about a client, the detail, events or occurrences and how they all interact, in a quick and effective way. They can also inform your agents about the SOPs, how to carry on specific instructions or corrections/encouragements to how they are performing or changes required to perform their duties. Everyone involved will hear about current risks and key threats in the areas they will be operating and will all be on the same page.

No alt text provided for this image

De-briefings are equally important as it gives the team the opportunity to again share any information they gained through the day, identify any issue, discuss risks, possible POIs, improve communication between the team members and provide any additional support or guidance depending on the situation. It may also include discussions about changing tactics for the next day of operations as required due to new informational input gathered. And if there is truly nothing to report at the end of any time period, take the opportunity to boost morale and congratulate the team on a job well done. Remember, while we work very hard to stay out of sight and not draw attention to ourselves, this in no way means that we don’t need encouragement from time to time.

Documentation

After being in this industry for a combined 54 years, we can both tell you how important documentation is (And it will save your position [And your posterior] one day!). If you are an EP agent and part of the team, it doesn’t matter if you have been sending your information and communicating with your fellow team members, your TL, or GSOC during the day. At the end of each shift, or the end of the operational day, you MUST keep a daily report. Your own daily report. In simple words, your own ‘’diary’’. As much as we have been discussing communication during this article, this is the most important form of communication that you can possibly use. It literally is your communication with the future. We know, that sounds a bit “out there”, but hear us out. At any one point in the future, you may be called upon to recount a day, event or occurrence that is critical and it could very well be the difference between safety or an unsafe condition…contract or no contract….Employment or unemployment…Some little detail that will be the deciding factor between simplicity and severity.  And the very fact that you kept an intricate record of your daily operations will be the one factor that makes all the difference in the world. The reason is, the information you (or that has been circulated by others during the shift) may or may not have reported or documented, or the incidents or special client’s requests of that day that may or may not have been registered will be absolutely dependent on the accurate reporting and documentation that you and your team kept. As part of our job is preparing and preventing the worst, keeping your own diary/documentation means you are protecting yourself and the decisions you or your team made at work if you ever are questioned or called in for explanations. It will help you to tell your side of what happened and why you made the decisions you made, what were client’s requests or TL requests, and how you responded. The easiest way to do this is by sending yourself an email at the end of your shift. Besides the information you would obviously include, you will have (because of the e-mail) the time and date also registered.

Ever since there was ever more than one of us in proximity to one another, there is one undeniable fact…To survive, we MUST communicate. Every deciding moment in history has been built around communication. Banners, signs, signal fires, telegraph messages, the Pony Express, Morse code, Enigma, emails, burst satellite…All based on the need for and the understanding of communication. In our Craft, we must be the true professionals and with this requirement comes the critical need to convey what we know, what we’ve seen, where we’ve been…The list goes on. Now, we know that this article only covers the basics when it comes to the subject of communication, and we realize that. But for those of us in our Craft, these points that we have made in this article are several of the “little things” that come up all too often in any detail AND they are the most frequently abused, ignored, and neglected aspects of what we consider to be a crucial part of any successful operation in close protection. How we communicate. For once we can smoothly, eloquently, accurately, safely, and quickly disseminate information properly, all the other aspects of our task will fall into place.

The Grows

Denida & Chris Grow bring a combined 54 years of international experience in the Protective and Intelligence services. They are based in Seattle, WA, and run their companies LeMareschal, Athena Worldwide and Nannyguards

Russian Oligarchs Keep Getting In Troubles by Instagram Selfies

In our latest interview with expert Nick Barreiro, Chief Forensic Analyst of Principle Forensics, we discussed the security risks from any/all social media platform postings and how someone can obtain critical information from your pictures. If you haven’t watched the interview yet, please find it below

According to Vice’s latest article, authorities have been following Instagram profiles of the women related to, or involved with, Russian oligarchs to obtain information about them, their holdings, accounts, and locate assets to seize/freeze by merely identifying and following the weakest link who posts the most. These women who act like ”influencers” or social media celebrities are looking for publicity, but they now represent a significant threat to the security of the individuals they’re around and expose them to unwanted scrutiny. ”Oligarchs themselves rarely use Instagram to accidentally crack open a window into their high living. Rather, it’s the people partying with them: A stepdaughter, an ex-wife, or in the least one infamous case, an escort.” Read the full article here.

Social Media Investigations and Monitoring for Risk Mitigation Purposes

The use of social media and the way it affects our lives and businesses have brought a new challenge to the security industry and the protective team’s responsibility. It gives the entire world the ability to look into people’s lives with the mere push of a button. Scandals are created, secrets exposed, and lives ruined. In the case of personal security, social media can be used in the advancement of a protective detail; however, one must know how to utilize it properly. Today, we will talk about Social Media Investigations and Monitoring. For those who are not aware of the term, as we utilize it in protection circles, Social Media Investigation and Monitoring is the process by which you can identify what is being said about your clients, a brand they represent, or the corporations with which they are involved and any threats or dangers that may exist in relation to those aspects.

As we sift through different social media platforms and online channels, we must then determine if what is being said has any significance regarding your clients’ reputation, persona, and safety and if there is the need to mitigate any risks. In other words, it’s like setting up an online, social media “net”. This process then helps you discover everything that is being said, written about, or portrayed on social media and determine its relevance to your clients. You can gather information about the ‘’public opinion’’ surrounding your clients, about people or entities who are angry with them for one reason or the other, people who are obsessed with them, or people who are making online threats. SOCMINT or Social Media Intelligence (not to be confused with OSINT) has seen a huge rise in necessity due to the use of social media and a competent protective detail needs to always be informed and social media investigations and monitoring are a huge part of this process. 

Now, let’s see some examples of how social media investigations and monitoring applies in protective services. Let’s say one of the people you are protecting belongs to a large pharmaceutical company and they decided to raise the price of a specific drug, thus affecting the lives and wellbeing of thousands of people. Perhaps another client is involved in a financial institution that quite suddenly makes a significant decision that affects people’s lifetime savings and pensions. You can imagine that there will be a significant number of people who become very angry, and some may want to harm your client. During the recent pandemic, there were a number of “anti-vaxx” groups that were quite vocal and utilized Facebook as one of their many platforms to accomplish their goals. Another example would be the need to discover if there is someone using your client’s name or company to scam others and commit crimes.

We are sure that many of you today are aware of the infamous ‘’Tinder Swindler’’, Shimon Yehuda Hayut, who legally changed his name to Simon Leviev to pretend to be the son of the billionaire Lev Leviev and used his name and company logos to scam people. Although his actions were known since 2017, it was only after the airing of the Netflix documentary in 2022 that the Leviev family found out and filed a lawsuit against Hayut for falsely portraying himself as the son of Lev Leviev, receiving benefits, and committing crimes.

No alt text provided for this image
(Photoshopped image of Shimon Hayut, aka Simon Leviev, with Lev Leviev (Picture: Netflix)

According to Leviev’s family attorney, Guy Ophir, they will now include anyone who has attempted to make a profit from his scam during the next lawsuit. What we can ask is, as security providers, why didn’t someone from the real Leviev family ever discover this scam artist who was extremely public and active on social media as the ‘’son of Lev Leviev’’? Although the real family members were never part of this fraudulent scheme, and it didn’t appear to affect their safety, it did, however, involve their name/brand in a very public and negative way. In other words, it should have definitely been considered as a threat to their reputation. Other people who were harmed by this scam artist were the businesses who did work with them, and their secondary service providers as well. 

No alt text provided for this image

Another interesting case to mention is Elon Musk where he, the actual client, took it upon himself to “solve” the issue and directly contacted the person of interest who had begun posting his private flight details and created the security risk for him and was literally blackmailing him unless the POI was paid. According to media reports “Elon Musk states social-media accounts that track his travel movements are ‘becoming a security issue.” Tail numbers and yacht names of billionaires are increasingly being shared on online platforms and one can track them by having the appropriate app unless significant efforts are made to secure them from the reach of those diligent few. These are some unique specific details that the security team needs to pay close attention to at all times.

Since Social Media platforms are the way people today communicate with each other, we as security providers must keep in mind that this is not always a positive aspect. Perhaps a person or persons will utilize social media to collectively gather people with their same goal or mission, to get together and plan their next move (Example: protesting outside your client’s house or corporation). In this case, you will want to know what is being said online about the person you protect to determine if there is something of extreme necessity to include in your risk and threat assessment and then take protective measures as well as inform their legal department.

As we have all witnessed too many times, it only takes one well-placed picture or story regarding some alleged activity on the part of your client, and it will go viral quickly, truth or not. Staying one step ahead of this type of “attack” has become a crucial necessity in order to protect your client from embarrassment or exposure. One of the most common issues in recent history is when personnel close to the client i.e., family, staff, vendors, and any other secondary customers post pictures, stories, or opinions and subsequently fail to understand the negative effect these types of communications can and will have on the client’s life, business, and the lives of their loved ones.

Why do you need a Social Media Investigations and Monitoring Strategy when you are a security services provider? To summarize we can say:  

1) To identify new threats. 

2) To discover what information about your client is posted online either by himself, the ones close to him, or his employees and evaluate how these affect his safety. 

3) To evaluate a threat (someone is posting online threats directed at your client).

4) To add to your due diligence.

5) To geolocate a picture or a video, sometimes even audio. 

6) To include any findings in your Risk and Threat Assessment (We can never highlight this enough, social media surveys and investigations are now a critical part of your Risk and Threat Assessments).

7) To find people obsessed with or following your clients (stalkers).

8) To identify hate groups or terrorist organizations that may affect your client.

9) To identify people or businesses your client may or may not want to do business with.

10)To mitigate risks from the information found online about the person you protect (How are the pictures of my client used or tampered with and for what purpose?).

11)To identify if someone is impersonating your client or a family member.

12)To find out if your client’s moves/visits/travels are posted online (Exposing them to others who may be in the same hotel, conference room, restaurant). 

13)To identify workplace violence or insider threats indicators.

14)To find out what is the ‘’public opinion’’ regarding your client (Always keep an eye on what is being said about your client and have a strategy to respond). 

15)To determine if a person or persons are utilizing your client’s name or business name in a malicious or unauthorized manner for their own personal gain. (Claiming associations or partnerships, etc.)

How to perform Social Media Monitoring for security purposes? 

First, let’s clarify one important thing. ‘’Googling it’’ is not enough, nor is it the answer. There are a number of search sites that allow for user input thus watering down or contaminating information and it’s accuracy. For those who are not aware, Social Media Investigations and Monitoring is quite a different department of protective services and quite often falls under Intelligence Analysis and Open-Source Intelligence. It requires unique skills and knowledge. One must clearly understand different social media and research platforms and how to use each one of them (and/or in combination) to obtain information. How you will approach each case is different and certainly depends on who your client is, their business, close relations, and/or their public image. This will directly affect the searches and the resources used and for what purpose. It is vital in our current day and age to include SOCMINT (Social Media Intelligence) in your client’s service proposal, no matter how public the person may or may not be. Hiring ten Executive Protection agents and a Residential Security Team is not enough anymore. SOCMINT services are a vital part of your Risk and Threat Assessments (Dynamic Risk Assessments too) and enable your protective detail to function more efficiently. 

For those who can not provide a certified Social Media Investigator for their clients, follow up with these steps:

1)Understand who your client is, his/her background, the threats, where do they stand in political, social, financial sectors.

2)Be aware of any of the latest changes in your clients’ lifestyle, public opinions, and professional decisions. 

3)Be aware of any of their political and social changes. Watch the news from multiple channels. 

4)Familiarize yourself with all close family, friends, staff, and associates and their respective social media footprints.

5)Set up a social media investigation and monitoring strategy. 

6)Have a good understanding of the Intelligence Cycle (How the intel is being collected, analyzed, disseminated, reviewed, etc.).

7)Have a good understanding of the search tools on different platforms (Facebook, Twitter, Instagram, TikTok, LinkedIn, Tumblr, Reddit, etc.) 

8)Do research on the available search engines and the strengths and limitations each one may have. 

9)Know how to conduct image, video, and audio research and gather intelligence from them.

10)Invest in appropriate platforms for social media investigations and monitoring (Have in mind, NEVER rely on one platform’s result or just platforms’ results. The user/investigator is the main component of a social media investigation). 

11)Download and use appropriate search engines extensions and apps. 

12)Invest time in creating ‘’sock puppets’’ or fake profiles and maintain their persona. Sometimes you may need a profile to have access to different forums or groups without being discovered.

13)Train yourself in link analysis (How to look for connections between people, events, and organizations).

14)Set keyword alerts (In multiple languages in case your client has ties with more than one country).

15)Gather, analyze, evaluate, and report your findings to the appropriate department or leadership.  

As the threat landscape changes every day, we as protection providers must be able to adapt and keep ourselves up to date with additional training. Today’s executive protection agent must also be skilled and knowledgeable in investigations, open-source intelligence, protective intelligence, HUMINT, and have an increased understanding of cyber security. Large corporations have already created their own embedded intelligence departments, while others are hiring threat analysts and OSINT investigations from outside security providers. The rise of protective intelligence, and whatever that includes, is here to stay and we are seeing it more and more through the highly increased number of related job postings every day. 

If you are an Executive Protection Agent and want to learn more on how to utilize Social Media Investigations and Monitoring for Risk Mitigation Purposes, reach out to us.

f you are a service provider and want to add Social Media Investigations and Monitoring for Risk Mitigation Purposes on your service list, contact us to learn about our vendor services. 

Chris Grow

AUS Global Special Services Travel Team

Managing Partner LeMareschal LLC

Denida Grow

Founder & CEO

Athena Worldwide 

Nannyguards

Managing Partner LeMareschal LLC

Executive Protection Agents in a Rare Interview with a Retired Paparazzi

It’s not very often when we have the ability to interview and learn from our adversaries. While most efforts are seemingly focused only on physical attacks, they do not give enough emphasis to the paparazzi, media, and all that this facet of protection entails. But we’ve got you covered. This is an interview we have been wanting to do for the last 5 years. What we learned from a retired British paparazzi is that pointing a flashlight toward them won’t work, neither you are safe if you block the tail number from your private jet. We also learned how they find information about your clients, who are willing to pay a lot of money to buy your pictures (no, it is not only the media outlets), to what length they will go to distract you and get that picture and why you will be not able to buy their silence.

*Disclaimer: During this interview, you may encounter offensive language content within the realm of your site.*

** For permission to use this video please contact info@lemareschal.com**

***Copyright @Athena Worldwide, a LeMareschal LLC company. Any illegal reproduction of this content will result in immediate legal action.***

The challenges for protecting Public Figures- The Macron Incident

The latest incident with French President Emmanuel Macron being slapped by someone in the crowd has once again fired up the keyboard warriors who take any incident (video or picture) such as this and claim how improperly the Executive Protection team functioned and what would they have done differently and, of course, be more successful. As a Greek proverb says ‘’Whoever is outside the dance (floor), can sing many songs’’ Meaning: It is easy to talk about something when you are not the one involved in it. 

As security practitioners, we must be very careful what we say online, keeping in mind, whatever you post online stays online even if you delete it minutes later. We should not criticize security details and/or the people involved because we do not know all the facts, details, limitations and the full story. When you post a comment on a 10-second video, you may not have the full story. You do not know what happened before or after the incident. What you see in a photo may not be the full picture. It doesn’t make you any more ‘’professional’’ when you try to spot the wrong moves in an incident where you weren’t involved and you do not know all the parameters: you are just assuming.

In this case, we heard many opinions:

‘’Why didn’t they keep standard formation?’’- How can you keep standard formation when your principal is anticipating close interaction with a member of the crowd? Greeting lines are extremely tedious and are one of the most difficult situations to read and provide protection.

‘’The reaction time was slow.’’- The reaction time always seems to be slower when you see an incident on a video over and over again rather than being involved with it in real-time in the field.

‘’They were lucky he wasn’t holding a knife.’’ – Actually someone did their job well and made sure he (or anyone else in the crowd) wasn’t holding a weapon. What most fail to understand is that these crowds are previously checked for anything that can be used as a weapon.

‘’Why didn’t they saw that coming?’’ – They don’t teach ESP at Executive Protection schools…

‘’Why didn’t someone teach Macron?’’ – Most protectees won’t sit down and learn from you about protection, they want you to protect them. It’s not their job to know how to do yours…Why do you think you’re employed?

Now let’s address some challenges for protecting public figures and try to make some rational sense of all of this.

Protecting people whose identity depends on the public, such as politicians, in this case, is very much different than protecting a C-Suite executive for example. A politician needs the interaction with public. They shake hands, hug, get pictures with and celebrate with large crowds. Having people like them is what makes people vote for them, and they need to look and act quite approachable to everyone in order to gain votes. If they don’t get the votes, well, then they no longer hold their current political position. They have to attend gatherings and events and most of those functions may be outside of your span of control regarding organizing it. You have to provide services as best as you can with what you have and minimize whatever limitations you can. 

In this case ‘’the unknown crowd’’ is the issue. The ‘’crowd’’ provides a good opportunity for the enemy to blend in, act and even escape in some cases. Also, as most public appearances are preplanned and announced, the enemy has the time to be prepared for the attack. And when we say attack, let’s clarify that “attack on your principal” is not only an assassination or physical harm but also an attack on his/her personality, reputation or by causing embarrassment. 

While most EP training schools focus only on physical attacks, have in mind causing embarrassing situations may be something your principal is particularly vulnerable and endangered by, thus it is something you must be prepared to prevent. Making sure the crowd has been checked for anything that can be used as a weapon doesn’t mean you are safe from an embarrassing situation. Paying attention to people’s hands and what they are carrying doesn’t mean you can be sure about the intention of a handshake. A handshake can become a pat on the shoulder or a slap on the face. How would you know the intentions of the handshake and act within 2 seconds to prevent it? You must be in very close proximity to do that and sometimes you have limitations on how close you can be with your principal, particularly when they are interacting with the public and potential voters. When any public figure decides he/she want to come within close proximity of a voter, you are required to break the standard formations and you cannot have security between the voter and the principal because they need that ‘’personal space’’.

Act too aggressive and they will perceive this position as very unapproachable, something that goes against your principal’s political campaigns. So you have limitations or adaptations to perform your protective job competently. 

Another thing to consider is that some protectees will appear uncooperative with you and your suggestions or directions. They will do the exact opposite of what you have instructed them to do or whatever the plan was because they thought doing something different was ok, safe or was suggested at the last minute by their campaign manager. Some protectees will ask you to protect them no matter what. The fact that they won’t consider changing their lifestyle, and you have to do your best, becomes another facet of the ever-evolving detail.

Have we forgotten the flying shoe incident with President Bush in a press conference in 2008? The red paint thrown at Mary Harney, Ireland’s Health Minister in November 2010? Berlusconi’s nose being broken and two teeth knocked out when a man attending a political rally threw the statuette of Milan’s Duomo gothic cathedral straight in his face in 2009? Eggs being thrown at Bill Clinton in Warsaw, Poland? Nicolas Sarkozy being a victim of a flying pie in 1997? The book thrown at Obama in 2010? The glitter attack on Minnesota Governor Tim Pawlently in 2011? Pope being attacked by a woman who jumped barriers at St Peter’s Basilica and knocked him down in 2009? The famous slap on Dimitra Liani Papandreou, the widow of ex Greek PM at her book signing by a woman who appears to be there to sign her book? Bill Gates’ “Pie-to-the-Face” fiasco? There are so many more similar incidents including paint, body fluids, pies, yoghurt, vegetables, flour and even flashing body parts such as the Femen members who went toplessness in front of the EU-Russia summit, in Brussels, in December 2012.

Can we criticize the EP team members involved in these incidents? Can we say that you would have done better after the incident has taken place? From the moment you have a complete crowd check for weapons, you are in a “secure” space. But what leads you to believe that you have a better understanding regarding the mental status of someone who appears to be a voter or a fan? Can you honestly guess his motives if he/she wants to slap, or spit or in some way embarrass your client?

If you haven’t provided security details for Public Figures, it may seem easy for you to criticize an incident like this, but criticizing what you don’t know and just assuming doesn’t make you right and it very well may show your ignorance. Instead, use this incident as a reminder that people will use anything to harm your client’s reputation and their imagination can be big and quite unpleasant. Keep it as a learning tool for yourself and yet another scenario in your head of what you would or wouldn’t do if…

Denida Grow

Managing Partner

LeMareschal LLC

Founder & CEO

Athena Worldwide

Nannyguards

Marketing tips for Executive Protection Agents

Perception is everything, protect yourself and build your reputation on solid ground.

*These are part of a panel of personal opinions formulated from my experience in the industry as an EP agent, business owner and recruiter for other corporations. Keep in mind that just because I preach it, doesn’t mean I haven’t made the mistakes. It’s actually the fact I have made some of these and it’s caused me to learn what can work and what doesn’t. You may not agree with me or follow up with the suggestions, but experience is an amazing teacher…”Let he who has ears…”*

1) Know what you know and know your value. (Know what you are willing to sacrifice as well, working more hours, night shifts, holidays, for how much, or how little.)

2) Know what you don’t know and either leave it to someone else or study it (There is nothing worse than someone who is trying to operate in many different fields, and yet, have quite limited knowledge on each field and act as though they’re the authority on it.) Focus on what you are most interested in and master it. Only move on to something else when you have a solid foundation on a topic and you are prepared to expand to something else.

3) “Listen more and talk less” Comment or post on social media only if you have something constructive to say and always stay on point and use professional language.

4) Post or comment only on subjects you know well, subjects you have studied, and subjects you know from real-life experience. There is no need to post daily or non-related posts.

5) It takes specific work and, quite simply, boots on the ground to consider yourself experienced. Having worked EP two or three days a month doesn’t make you qualified enough to disagree or raise your voice with people who have been doing this for 10+ years. Neither are you an expert after one or two years in the industry (You can always see who is who and what they know and don’t know by what they post on social media). Stay humble, lay low and learn your trade well…Your day will come.

6) Maintain a professional image on all business-related social media sites. A suit and tie picture will always be better than a tank top or a duckface selfie.

7) Build a professional LinkedIn Profile, highlight your skills and post all your professional and educational achievements.

8) Stop posting sensitive information, IDs, and license numbers on social media (You are a security professional! If you fail to protect even your own personal information, what does that tell me about how you handle your clients’ information??)

9) Always maintain OPSEC in every post you make. Always think, “How could this be used to harm my client or my team?

10) Protect your data! We have seen more and more security professionals warning their connections that they have been hacked! If your ex-girlfriend can hack your Facebook or LinkedIn profile, then you are probably not very good at keeping your clients or your information safe.

11) Keep high school drama out of social media.

12) Control your emotions, and remain professional at all times…You are your client’s close protection, NOT his/her “Buddyguard”. Friendly at all times, not Friends.

13) Be careful of your connections and the people that you recommend or work with. Have you heard of death by association? Make no mistake, it is a very real factor in our business!

14) Build a professional-looking CV. Keep it simple and to the point. There is no need to hire a CV writer, you know what you have done, trained for, and accomplished.

15) Invest time in building connections. Spend time talking to others or helping them with their projects. I have gained many contracts after the interviews I did with others.

16) Offer pro bono services to companies you respect and want to be involved with.

17) If you are single and have no family commitments, perhaps you work that shift on Christmas or other holidays so someone else can spend the day with his children. You have no idea how being understanding can help you in the long term.

18) Study your clientele and any potential clients. The industry has changed significantly, and the new wave of clients are IT gurus, app developers, cryptocurrency investors, reality stars, etc. Always be knowledgeable on current trends and topics.

19) Be informed on local and international news, threats, and events that affect the industry and the needs or operational aspects of your clients.

20) Don’t be arrogant, there is a fine line between being confident and arrogant. Never cross it…There usually is no way back once the damage is done.

Denida Zinxhiria Grow

Founder & CEO

Athena Worldwide

Athena Academy

Nannyguards

Managing Partner

LeMareschal LLC

Things to consider before you hire an Executive Protection team aka Bodyguards

 To all CEOs, celebrities, VIPs and high value individuals…

At some point in your careers, you will most likely find the need to retain, or at the very least, inquire about close protection services for yourselves, your loved ones and possibly for those you employ closest to you.
      Now, the list of companies and corporations that provide these type of services is quite lengthy and, while at first they all appear very impressive, you need to be thorough as you take a deep look at them and the ideals and morals they represent. Again, you are searching for the perfect fit that best protects yourselves, your families, employees and all things that you need secured and confidential.
      A quite disturbing trend as of late has been the repeated posting of pics with you as the client, at your locations and in front of your vehicles, private planes, residences, etc. while boasting about the details of who you might be, what was happening or other items of a secure nature. Now, this is entirely unacceptable no matter what the terms or conditions of their employment may be with you. You, and all that that may encompass, are to be secure, confidential and invisible for all intents and purposes. Period.
      Social media has become the source of all communications amongst a great number of these entities and this in turn has led to a trend of exposing enormous amounts of confidential client information when it is not only unnecessary but highly unprofessional and, frankly, childish. At times, it has even been portrayed as “marketing” when, in it’s true form, it’s nothing more than schoolyard bragging.
      So, when researching a prospective organization that you perceive may be the one you will choose, a thorough search of all related social media should be performed. The company’s sites, the reviews and even the social media sites of any/all possible employees that you might hire from their corporation. If they are willing to expose their previous clients with seemingly reckless abandon, you will most likely be the next celebrity/VIP pic that hits the Facebook/Instagram/LinkedIn circuit and that is, I’m quite sure, not your desire at all.
      Many companies will show an endless supply of “tactical” pictures, extreme condition photos, worst case scenario snapshots, etc. Please understand that most of the organizations are composed of a large number of former military members, former LEO/SWAT members and private security contractors who have “been there & done that”. But it is always wise to remember that while these skills are highly advantageous should everything go tragically wrong in your day, these type of days should never happen if the proper planning is performed which is completely above and beyond the “hard skills” as they are often referred to.
      Another highly recommended item is a detailed NDA and total social media blackout for all involved. Leave nothing to chance and be very clear regarding the seriousness that this represents to you and the severity of disciplinary action should it be violated. Again, you and all you hold most dear are to be secure, confidential and private and definitely NOT on the front page of a local newspaper, tabloid, media page or out to the highest bidder.
      Always remember this…You came looking to us with your concerns and fears, placing your overall well-being in our capable hands. With that in mind, you should always feel protected, safe and secure from anyone or anything that might wish to harm you. And that harm should NEVER be at the hands of the very people whom you have so willingly trusted to provide the very best security, protection and peace of mind.

Denida Zinxhiria Grow

Founder & CEO

Athena Worldwide

Athena Academy

Nannyguards

At Athena Worldwide we are industry leaders for promoting, training and staffing female bodyguards internationally. With our affiliate offices, we can provide world-wide close protection and executive protection services for entertainment professionals, politicians, CEOs, Royal Families, journalists, clergy and corporate personnel. Want to find out more about female bodyguards? visit www.athenaworldwide.com

Female Bodyguards

Female Bodyguards are in high demand!” I am sure you have heard this before but as a female Close Protection Operative you are still struggling to find a job. There are many misconceptions regarding our role in the industry. In this article, we will try to address some. 

Anyone who has read my articles knows that I base most of them on questions or inquiries from those professionals who either offer good and accurate advice or from those who ask for it.

First, I prefer placing female Close Protection Operatives with female clients or their children for the client’s comfort or peace of mind. Some males are easily suited to this task but the client may simply think that a male does not belong in constant close proximity and occasionally in isolated private settings with the kids or a client’s wife. This can be equally true with female CPOs and male clients but the concern of inappropriate behavior with the children dissolves when a female is placed with them. Remember, it’s always up to the client.

The most active topics to come through my office are all related to females in the Executive Protection industry. As a female CPO, a business owner, and as the founder of a successful training academy exclusive to females in the Personal Protection Industry, I will address a few of the most popular statements I am routinely tasked with arguing against.

“A female CPO is better than a male CPO”

Your gender doesn’t make you better in this profession. What allows you to outperform a colleague or be more suited to a specific task is how well you meet or can adapt to a client’s specific needs. In our case, the security needs that a client may have might be provided by a female, male, canine, or even a machine.

“It is very hard for a woman to break into this industry”  

Well, it is also difficult for a male to break into this industry. Training, experience, personality, knowledge of how to dress, how to drive, and a really well-polished CV mean nothing if you believe that you have some preordained right to be here. Both women and men alike will be passed over equally if they lack humility, charm, manners, couth, education, social polish, or real-world experience. Which of these is most important?

“It is hard to find a job”

Keep in mind that the market for female CPOs has historically been smaller which means you have to compete harder to get the job.

It is worth mentioning that in cases where security is needed for females and kids, many clients are looking for not just female CPOs but feminine looking females to place next to their wife, sister or daughter so if you are a female with a very harsh or more masculine appearance, you reduce your chances of being hired. And if a male appears too feminine or too “cute” or even too “handsome” he may not be hired either. You see, it is not your gender, it is the appearance you choose to reflect to your client, and it is your client’s perception you must cater to in order to get hired.

Additionally, my records show that a majority of females who want to break into the industry seem to be older than 40 years of age. It seems that many women who are retired Law Enforcement or military are looking to get into the private security industry. The fact is that unless you are applying for a Nanny position, most clients are looking for 25 to 38-year-old CPOs with at least 5 years of experience. So at 40+ with no experience, men and women alike stand less of a chance against a younger experienced CPO.

Finally, among those women who complain that they can’t find a job, a vast majority of them do not have what it takes to be hired or they do not know how to sell their skills. Having a large database of female candidates and qualified operatives allows me to compare them to each other.

Here is what I found out of 400 applications: 

Some don’t have a passport.

Some don’t have a local State license and can’t drive.

Some have no firearms license or experience with anything mechanical.

Some are waiting to apply for licenses as they are interviewed and being hired by a client or a company.

Understand that if you don’t have the licenses or other qualifications, you will never be considered for a position, so act in advance. And if you make a misstatement of facts to get hired, you will get fired and never hired again.

Some are not willing to relocate and looking only for gigs in their area. Many female candidates are not willing to relocate due to being married with kids. Although a male CPO can leave his wife and kids behind, it is traditionally harder and less socially acceptable for a female CPO to do so. Many women in the U.S. left to fight in the Gulf War in 2002. The practice of the Father staying behind became acceptable there and the trend quickly spread to other countries.

Some are not willing to take an entry-level position even though they have not much experience.

Some do not know how to present themselves professionally during a phone, video, or live interview.

Some women practice the outward arrogance associated with a man’s success when they have a couple of good assignments and don’t recognize when this attitude is rejected by the client or colleagues. This is a problem with the men too so again, no difference.

The result is, if you rub the placement company or client the wrong way, your CV goes in the trash. Turn down too many offers due to money (I had a candidate with zero experience who was requesting more payment than what the rest of the team was being paid) or other issues and we will stop calling. If you don’t have a verifiable track record and reputation, you cannot make demands. Fail to answer when we call with an offer or fail to present yourself after the first selection and we will not call back……ever. Clients are looking for people who can commit and be responsible.

“Female CPO’s are paid less”

From my experience both personally being an operative and placing females with other companies or clients I highly disagree with this. I have always been paid the same as the rest of the team and even more than the rest of the team when my performance or qualifications were measured against theirs.

In closing, we need to clarify and understand four things:

1)        If you are making less than your colleagues, male or female, remember that you agreed to the terms of your employment. It was your choice.

2)        If you don’t know how to ‘’sell’’ your skillset then you have missed something in your professional training. Go back to the basics and learn how to respond to a contract offer.

3)        If you are a beginner, you may have to agree to a lower rate in order to build up your experience and work portfolio. If you do your job, you will progress.

4)        Because of the nature of the services needed, some team members may work fewer hours than the rest of the team, therefore they may be paid less. If you are a female working with the kids for 6 hours a day, you cannot compare your position with a CPO that works for 10 hours driving the car or standing next to the client. If you are doing equal work on equal ground, you should argue for equal pay and equal treatment. If you don’t like the terms, don’t take the job. If you find out after you accept a position that you are paid less, chalk it up to a lesson learned and don’t make the mistake next time.

The demand for female CPOs has increased steadily over the last decade. If you are not working or not earning what you think you are worth, ask yourself the following:

-What kind of experience do I have?

-What education do I have?

-Does my personality, loyalty, integrity, knowledge, skill, and ability add to the client’s needs or solutions?

-How I’m I presenting myself in online forums or social media? Unfortunately, there are many female operatives who are using unprofessional ways to present themselves in the industry. Provocative pictures, aggressive and insulting language to other operatives, etc.

-How does my CV measure up against the other candidates interviewing for a position?

-Am I willing to take an entry position job or a job that pays less to progress and make my connections in the industry? Some companies may not have the budget to pay big money and they may be stuck with finding someone, so if you have nothing else to do, I would highly suggest you take that job. Many of us would highly appreciate an operative who can cover a position when we are having hard time filling it and make sure we call you again for a better placement.

If you need a professional assessment of your CV or even your image or need to add to your skillset, go to our website. There is guidance there to help you. Or reach out to us.

Remember, ladies:

You are equal in your ability to protect a person from the threat of another but the opportunity to perform will be based on a human being assessing your value to the effort. What are you doing to increase your value to the person that needs what you offer?  And, as always, there are a number of well qualified, experienced, time tested female agents out there that you can reach out to and speak with regarding further questions, mentorship, and guidance…We’re all here to help!

Denida Zinxhiria Grow

Founder & CEO

Athena Worldwide

Athena Academy

Nannyguards

www.athenaworldwide.com

www.nannyguards.com

At Athena Worldwide we are industry leaders for promoting, training and staffing female bodyguards internationally. With our affiliate offices, we can provide world-wide close protection and executive protection services for entertainment professionals, politicians, CEOs, Royal Families, journalists, clergy and corporate personnel. Want to find out more about female bodyguards? visit www.athenaworldwide.com

Who is guarding Prince Harry and Meghan Markle’s baby?

1255048
Lately, many news agencies have tried to write about the protection detail of Prince Harry and Meghan Markle’s baby, based on ”insiders” and revealing name of companies and protectors assigned for little Archie’s security. Now, before you believe any story, have in mind that most of the time those ”insiders” are the company owners who want to draw attention to their companies. It doesn’t mean that those insiders are saying the truth and should be believed.
 
Prince Harry comes from the most powerful Royal Family in the world, their family members are trained and educated on how to select people that will work for them. They give a huge emphasis on confidentiality, work ethics, and discretion. So you will never know the names of the people who work to protect them, not even the companies.
Ask yourself if the public is aware of the names of the people who protect Bill Gates, Jeff Bezo’s, or other Royal Families. They don’t. Because it is very important for those Close Protection Operatives/ Bodyguards to be unidentified. You will never see them posting pictures with their clients or name their clients on social media or interviews. Only an or amateur or an unprofessional protector would do so.
 
Close Protection Operatives/Bodyguards have been hired in the past to protect children of HNW families, celebrities, Royal families, etc. It is not a new ”trend”, so let’s see what it means to offer close protection services to minors.
 
Some may think it is the ‘’easy job’’ but when you get hired to protect a client’s most valuable asset, his child,  you will find out that providing security details for minors is actually harder and more challenging than protecting adults. Consider as well, the immense amount of trust a client has to put in your ability before they offer you the opportunity and then not be overconfident in your performance. Kids are the fastest way to end a career, don’t underestimate the challenge they present or the rewards that service to them offers.
 
Today more and more celebrities, dignitaries, politicians and the corporate elite are hiring female bodyguards that are assigned specifically to protect their children.
 
The traditional huge thick-necked bodyguard accompanying a child to the zoo is giving way to the ‘’child-friendly image’’ of a well-dressed athlete with an I.Q. of 130+, caring for that child as if it was their own. Male and female bodyguards that can blend in with and adapt to the environment of parents and children are more likely to gain employment over the classic muscleman.
 
If you are in charge of protecting young children, you will either be their sole caretaker in public or be in charge of both them and their caretakers. Either way, you have challenges. If you are the sole caretaker, you will be as preoccupied with meals, diapers, tempers, and entertainment as with their security. If you are watching over the child while in the company of a nanny or parents, your job is immensely easier but also exponentially harder with the addition of each person added to the party.
 
Conditions are easier if the child is younger and cannot communicate because you don’t have to carry on a conversation, but harder because you also may have to carry them, thus occupying your hands. Easier if they can talk but harder when they can talk back or argue.  Easier when they are older and can listen for and follow directions but harder when they want their own way.
 
The difficulty really comes when you are dealing with teenagers. An exceptionally high number of security details for teenagers has to be done covertly. This is to say that the kids just won’t want you around or cooperate with you if you are “in their space”. So forget about walking formations, suits, and stiff postures. Be prepared to dress casual and blend in. That includes both your physical appearance and behavior. One wrong move that embarrasses your young client and you are done, and with a negative review of your conduct reaching the parents, done for good.
 
Here are some hints to consider when protecting children:
If you can work with a caretaker or parent and allow them to care for the child, this is ideal. The adult would go through training with you to learn to understand verbal instructions and non-verbal instructions and you would not deal directly with the child or ever be alone with them. You must also consider your age and athletic ability when compared with the nanny or the parent(s). Could you pass for a spouse or parent or Aunt or Uncle?
 
When you interview a client prior to accepting an assignment, ask them about your limitations or role regarding their child’s protection. Typically, the client will not allow you to admonish or punish a child for misbehavior. You will be spending a lot of time with a child that may be developing his/her character. This is a very vulnerable period. Not many parents are willing and open to allow another person to correct their child’s behavior. So be sure to clarify your limitations in writing.
 
Also, remember that attraction is a natural function in life and children learn to trust and become attracted to adults at an early age.  This process averages about 6 months which is why it is recommended that you limit your contracts to that amount of time. If you are going to stay longer, you must obtain additional training as the emotional stress on you can be overwhelming over longer periods of time. Some may ask you to just act as a bodyguard and protect their child’s physical well-being and some will ask you to also educate them and correct bad behavior.
 
When it comes to children or teenagers protection, clients tend to hire bodyguards that will be assigned to the family and the child for many years. As one might understand, it can be difficult to place different bodyguards on a child’s or teenager’s protection during short time periods. In this case, they are looking for someone skilled and mature enough both professionally and ethically to protect but also work as a mentor for their child.
 
Mentoring and teaching could include academia as well as self-protection skillsets. Make sure your need for income doesn’t overwhelm your ability to teach.
 
As with any client, there are roughly 50 mandatory questions that should be asked and answered and an additional 100 that could be asked. Many of these should be asked of the parents but many should be asked of the child while the parents are present. As soon as you get assigned to a child protection detail you must ask about their habits, his/her medical record ( blood type, if he/she is allergic to anything, etc), preferable places they like to spend time and of course who their friends are.
 
Background checks should be conducted on every adult around the child, including the parents of friends. Include school staff such as teachers, coaches, bus drivers, school nurses, and cafeteria staff.
 
Have a conversation with the child. Explain to them why you are there and what your job is. Usually, they see you as a new person intruding in their life and someone who is there to spy on them and report anything they do to their parents. This initial bonding is critical to you keeping your job.
 
Deal with older children as adults. Have a conversation with them. Children are not stupid and like to be dealt with as adults. Respect their opinion and explain your position. Make sure they understand that your only duty is to keep them safe.
 
An additional concern is reporting. Whether asked to report back to the child’s parents or not, you should keep very accurate notes and be prepared to deliver an accurate report to them. This may ruin trust so be very careful with this.
 
Allow the child some time to feel comfortable with you and trust you. Depending on the child and your approach, it may take them up to 3 months to start feeling comfortable and trust you. Don’t rush the process. Be approachable and let them decide when they can come closer to you. Again remember that this is dependent on your planned length of the assignment.
 
Children by nature are very reactive and they tend to do the opposite of what they have been told. For the child, we are another ‘’intruder’’ in his personal life. It takes a great deal of patience and discipline to earn trust. Study this process and seek out a professional counselor if needed. Your client should retain one for you.
 
In the beginning, (with an older child), you will have to deal with a child who will be asking you to stay further away, don’t look at them, don’t open the car doors for them, don’t accompany them for shopping or to the movie theater. Of course, as you do your job, you will have to disregard or ignore their requests and although some in our profession may say it doesn’t matter what the child wants the fact is that at some point it does matter. At the end of the day, you don’t want to deal with a kid who will play hide and seek with you and see you as an enemy, but a child that will be cooperative with you and seek you out and trust you when danger threatens their safety or security.
 
Educate the child on security awareness topics. Children love learning new stuff and they will understand why you can’t stay back out of reaction range, How you can see them but not watch, how you can be close enough to hear them but not listen, why she/he can’t sit on the passenger’s seat next to the driver, why you have to open the door for them etc…
 
Since much of teenager protection is done undercover, set some signals or codes with the child. Let her/him know what signs you can both use for cases such us ‘’stay there’’, ‘’go’’, ‘’come close to me’’ etc. AND Practice these every day.
Consider the child’s friends. Your presence around them can affect how your client acts or reacts. Avoid addressing the friends and never correct the child in front of them.
 
Another important issue to discuss with the child you are protecting is their online behavior. You may have to teach and explain why it is important for him/her to be very cautious about what information and pictures they post or share with friends. Many times, parents neglect these matters. You will become all things to these children. Take the influence you have over them seriously. You are not just protecting them, you are influencing them too. Children will learn to manipulate both parents and the protectors. Parents may become jealous or resent that you spend all your time with their kids or that you are “too close”. Address this issue early on. It will save your career.
You need a female bodyguard to protect your child? Contact us today
 
Denida Zinxhiria Grow
Founder & CEO
Athena Worldwide
Athena Academy
Nannyguards
At Athena Worldwide we are industry leaders for promoting, training and staffing female bodyguards internationally. With our affiliate offices, we can provide world-wide close protection and executive protection services for entertainment professionals, politicians, CEOs, Royal Families, journalists, clergy and corporate personnel.
Want to find out more about female bodyguards? visit www.athenaworldwide.com Prince Harry and Meghan Markle’s baby bodyguard, who is protecting Prince Harry baby, Bodyguards for Archie

Confidentiality: Personal Choice or Professional code of conduct?

Recently, a young lady, new in the industry, raised a question in a social platform questioning the practice of, or if it is acceptable for, people in our industry dropping clients’ names in public. Surprisingly, many people who took part in the thread commented saying that they don’t find anything wrong with it. Some of them even named their own old clients. Some were trying to justify it by saying they don’t work for that specific client anymore, they didn’t reveal anything personal about the client, they have the client’s approval to post that picture or name the client, their client is super famous and paparazzi are always getting pictures of them together so why hide it. Essentially, they are good guys and how dare we criticize people we don’t know. These were a number of comments from individuals who either work in the security industry as operatives or own companies and hire agents to represent them.

Now, we all know that confidentiality has been a hot topic that raises many debates every time it’s laid on the table. And we see the ever-increasing need to have discussions about it nowadays, more than ever, due to the internet and the influence of social media. Merely saying that it is wrong to post a picture or name your client on public does not remotely infer that we are jealous of the clientele you have, it is certainly not because we want to talk bad about you or because we want to look better. The primary reason for it being discussed as wrong goes all the way back to the very basics of Risk Assessment and Dynamic Risk Assessment. Those who haven’t had the opportunity to be taught these topics in one of their EP schools should truly seek continuing education on it and those who fail to remember their training on how it can drastically affect the client’s safety, need to go back and re-study.

For a moment, let’s talk about risk factors and who may be after your client: Media representatives (journalists, paparazzi), stalkers, unhappy former employees, former wives, girlfriends, business associates, business antagonists, people he owes money to, kidnappers and the list can go endlessly on so, for brevity’s sake, let’s say, anyone who may want to harm him/her in any way, shape or form. That being stated, the person who is standing directly between that client and all these risk factors is you, and anyone who works in the security detail. By linking your name or putting an ID on the person who is standing next to that client in the picture frame is a risk by itself. How so? We will explain later.

Now, let’s address some of the individuals who have stated that these are acceptable practices. Confidentiality is quite always associated with the less than desirable actions and events that occur during a detail, “What happens on the detail, stays on the detail” sort of thing. We have a tendency to become complacent with many other aspects of the more pleasant, day to day occurrences, not feeling that they are of any importance in the overall aspect of security. One could not be more mistaken. Confidentiality is about ANYTHING that involves your client and their life, and whoever was involved or interacted with the security detail. It entails the complete protection of any/all kinds of information that someone might gain access to, who may want to harm him in some way, obtain something to use against him, or even harm his reputation.

How long must I maintain this confidentiality? Well, just because you worked for someone in the past doesn’t mean you can or should discuss any details about them or the fact you worked for them formerly. Having worked for someone means you now know critical information regarding their security detail, estate security, what kind of vehicles are used, how many people work for them, what are the skill sets of the current agents (basically how good they are), if they have any issues or weaknesses (divorces, custody battles, use of drugs and alcohol, illegal affairs …), etc. You also know where the client likes to “hang out”, where his good friends live, his personal family, and most importantly, you are aware of all the security ‘’gaps’’ and security protocols….these tiny gaps? We write about them in our reports and address them to our supervisors and most of the time no one cares to take them into consideration because of the budget, or because they don’t want to ‘’bother’’ the client’s routine or bring inconvenience to their daily life. So the complacent prefer not to change anything, and most of us have walked in security details where protocols (even radio call signs) haven’t been changed for years. So, having worked for someone in the past, even if you are no longer employed there now, doesn’t make it acceptable to talk about it, because you are in possession of important information that may harm or put anyone who worked for that client in a position to be blackmailed or harmed.

“I have the client’s approval to get a picture with him and even post it”. Let’s admit it, there is nothing more satisfying in our profession than to have a happy client who is OK with having a picture together. Yes, you can take that picture of the two of you, but for your own personal photo album if you like to keep one of those…Never to post in public. The client may be OK with it, but remember, the client hired YOU to protect THEM. They don’t know about security procedures and risk factors, and if you ask for a picture, they may think it is safe. You, however, as the security professional, the trained and educated one, must think and breath ‘’security’’. You alone are the one whose acts must always take into consideration the client’s and team’s safety.

Many inexperienced agents are misled to believe that since paparazzi are after their clients, their face is all over the media so why not post a picture? Well, the simple answer is, your face may be in those pictures, but you are just a face. A face doesn’t give an ID to that person standing next to your client, however, posting anywhere on the internet or in any type of social media platform absolutely does. So again, you’re putting a name with the face of the person who guards that client and thus presenting possible access to the client or their lives.

And to those who say we shouldn’t criticize someone we don’t know in person, please understand that you are critiqued for everything that potentially shows your professional attitude and performance. “Perception is reality” is more critical than you think. And for something like this, it only takes a misspoken statement in an interview or your personal opinion on social media. You are not necessarily judged if you are a good family person or a good friend. Someone must know you personally to have an opinion on those matters. But when it surrounds work, what you post, how you comment, and your professional behavior will be criticized and this fact spares no one.

In our line of work, we are the ones who must think and prepare for all threats and take needed measures to prevent worst-case scenarios. Depending on who your client is (or was) talking about them doesn’t necessarily cause life-threatening harm, but it can do damage in many other forms, which you as their security (past and present) must always protect them from, keeping them safe at all times. It may also harm anyone who worked along with you. Just think for a moment…If someone is threatening your child, blackmailing you or threatening someone you love, would you still be able to remain quiet, hold the information and not reveal what you know about that client? There are blackmail, extortion, and kidnappings that are never reported in the news. Predators will go after the ‘’weak’’ target…Showing that there are any weaknesses and that client is most likely a candidate.

The companies who have the biggest clients are not known to most of us and they most certainly don’t go by ‘’tacticool’’ logos or brand names. These companies use strict NDAs, and they are critical of how you carry yourself on social media platforms and some will even forbid you from having any significant social media presence. NDAs are there for a good reason, mostly to protect any/all the information you will gain while working for the client. There are many of our colleagues who work for HNW and UHNW individuals and you will never know their names. For example, you’ll never see anyone from some of Forbes Top 100 security teams ever mention where they work or for whom they provide protection services.

Where you work, or who you have worked for doesn’t say who you are as a professional, or how proficient you are. We have seen excellent professionals working for great clients and less than deserving individuals working for them as well. The name of your client or his social/celebrity status is not related to the level of your success by any means. Each detail has its own unique aspects. Consider the actual threat levels, the intricate advances required, the planning and realtime decisions that must be constantly made on the move. It’s NOT about you…Never was, never will be. It’s all about the client and the operational professionalism you and your team provide.

Most of the confidentiality issues come from people who have done celebrity protection. Rarely, if at all, will we see it with anyone who runs corporate security details, or works for foreign dignitaries or politicians. We all probably know a bad professional who said yes to a low paying job just to get that chance and get pictured next to a celebrity, but at the end of the day, you should measure your success by the fact you are still working as an EPO full time, it is your main income, you bring enough money home to your family and you are keeping your client and your team happy and safe.

It is up to us, the trained and educated security professionals, to identify a possible risk and minimize the threat level. Name-dropping our clients or unneeded selfies won’t make it any easier, and it always adds more risks. There are many colleagues, who think it is not a big thing naming or talking about your clients, but that becomes a liability and you yourself then become a liability as well. Tomorrow your work application may be rejected because someone saw how quick you talk publicly about your clients. You will find yourself passed over for another applicant who can remain quiet, over the simple fact that you can’t keep your ego aside. And you will always wonder why they didn’t hire someone like you who has more work experience and more tactical skills. The truth is, there are many companies who do truly care about confidentiality, and they not only see it as an ethical threat but as a very strict part of their professional code of conduct.

Think twice before you name your clients or post that picture on the public… it may very well leave you out of the loop!

Denida Zinxhiria Grow

Founder & CEO

Athena Worldwide LLC

Athena Academy

Nannyguards