Operational Communication for Close Protection

In the world of security operations, one of the most critical areas is communication, which involves constant cooperation and vital information sharing between top-level executives, their respective EA/P/A, the GSOC team, company employees, vendors, and agents working on the ground. Now, if you have been working for any reasonable amount of time in our industry, we are sure that the majority of you have experienced situations where the operation and security of everyone involved has been negatively affected by poor communication, inconsistent communication, or even the complete lack of communication. How information is being shared, what kind of information is being shared, and how/when it is documented is a skill one will quite often learn more readily outside the traditional ‘’EP Schools’’. Considering the fact that many security operations involve a huge number of people and different companies/vendors creating a hierarchy level, coupled with the fact that many companies have a tendency to be highly secretive with the information regarding the operation, you begin to understand how failing to communicate properly will not only create more risks but also will create day to day complications that don’t allow for a smooth operation. This is something that will not only be experienced by anyone secondarily involved, but also by the very protectees themselves. Keep in mind that your clients need peace of mind as well, and they shouldn’t be bothered or have their daily schedule negatively affected by your lack of communication skills or the resulting issues that ensue.

No alt text provided for this image

Communication tools

There is a common misbelief (Hollywood and action entertainment are all too often to blame for this) that all EP operations have agents using radios and other high-tech gadgets. In all actuality, the majority of EP agents are required to appear either low profile or not given a radio based on client proximity so they must rely upon and use their cellphones for a majority of their detail communication needs. Using your cellphone may seem like an easy tool and really quite convenient, but there is a downside, and it should also come with specific warnings regarding the pitfalls that come with it’s use.

Currently, for your operational needs, in order to communicate, you will need some form of a publicly available chat app. Some of the most utilized and popular platforms are Signal, Telegram, Wickr Pro and Threema, to name a few. The majority of our colleagues have used and are still using WhatsApp, even though the app has been reported for multiple data breaches and leaks, as well as ‘’system shutdowns’’, leaving many colleagues panicked and scrambling to rapidly find an alternative communication system. But no matter how serious the issues that it presents, WhatsApp seems to be yet another example of the phenomenon where people get so accustomed to a product and do not want to change because change means you have to learn to use something new from the ground up and start again. We have had serious resistance from other companies we provided services to, as well as our clients themselves, when we asked to use a different and more secure platform. In the end, we and our agents agreed to use WhatsApp as per our clients’ request for them; however, we were utilizing other platforms privately between our own agents. When you are using a third-party App such as WhatsApp, Telegram, Signal, etc., keep in mind that you will never be in control of the safety of the information you are sharing. Never. None of these apps are or ever will be entirely safe. So, when you are deciding, choose carefully based on who has fewer privacy issues, who is the creator (country), who your client is in relation to the creator (can the creators of this app be targeting your client?), what are your operational needs and always make sure you stay on top of the latest changes (social-political, geopolitical as well as company changes) that may affect the risk to your client. There are also paid work chat apps or business apps created for the workplace and personal messaging that promise a safer environment but again, one must take into consideration the fees and accessibility. (Who is paying when there is /more than one company involved and who IS involved, i.e. contractors, employees, 2nd parties, etc.).

No alt text provided for this image

And the available functions and capabilities of each platform need to be vetted thoroughly as well. What are your needs or requirements? Will you be using large group chats? Will you and any size group be able to utilize voice texting? Will you be able to send small packets of information through the groups that you set up? (Pics of critical POIs, BOLO vehicles, onsite venue pics for inbound teams or advances, etc.) These are just a few of the features that operational teams use all the time and finding the right platform for your team’s needs and unique requirements is very important. No one operational has any desire to have any more apps or sites open at once on their personal devices than is absolutely necessary in an effort to try to manage a detail. Less “moving parts” is always better, if possible.

Information flow

During a protective operation, there is information that is crucial and must be passed among the parties involved (as per their responsibilities) and the agents on the ground. For numerous reasons, some individuals who are assigned as an operation manager or contract manager seem to be apprehensive about asking the necessary questions of the client or the people assigned to act on behalf of the client. This apprehension, quite often, is caused by their own insecurity in what they want to ask, fear of a negative response to their request, or the simple fact that they do not know what to ask. Insecurity in what to ask is a skill acquired by time in grade. As we spend time in our Craft, it’s almost impossible not to learn what the correct questions or inquiries would be. Fear of a negative response can be associated with the desire for acceptance or to have the client like them. We all know that what is best for the client’s safety and family security may not exactly be what THEY want…Be prepared to patiently and thoroughly explain the reasoning behind the questions and the resulting decisions. And for those who don’t know what to ask, stay tuned we will share a template one can use as one sees fit for his/her own needs.

When you receive a request to provide protective services, you must ensure that any/all specific information that is necessary for that detail’s success is obtained from the client right away and is passed along immediately to the agents on the ground. How many of us have found ourselves working on short gigs and know nothing or very little about the client? Sometimes even the very basic information that pertains to the gig itself? While we all know that clients can change their minds about what they want from second to second, there is specific information that still must be passed to the agents. This is an inherent need to set your team up for success. Period. Being able to plan ahead, run successful advances, and lower the risk levels, or even eliminate them altogether, means you must have as much information as you can and communicate it properly.

Now, the information flow definitely has two sides. Because the agents on the ground are reacting in real-time during any situation, they are actively aware of new information that must be passed on to the GSOC or the assigned person in charge. It must be done on a consistent basis. This is critical for operational effectiveness. But we all know “that” agent who will put every, little, minute bit of information that he/she may think it is relevant to the task. Always keep this in the back of your mind…While you are communicating with your fellow team members or passing vital information to your GSOC, keep it brief. Short and to the point. Only the facts. K.I.S.S. is the acronym that suits this best…

Briefings and De-briefings

I don’t believe that we can accurately highlight enough how important briefings and de-briefings are in our line of work. It seems that more and more, only a handful of companies or team leaders are utilizing them properly or using them at all. This lack comes from a basic laziness in people who want to merely save time (Even though you can keep them short if you keep them on point and factual) and/or the absence of needed information. If you have nothing to pass on to your agents, why have one, right? Wrong. You, as a team lead, are not the only one who may have information that needs to be brought to the group. Allow team members to speak and ask questions so that later issues are avoided.

No alt text provided for this image

Communication Briefings are designed to provide necessary information about a client, the detail, events or occurrences and how they all interact, in a quick and effective way. They can also inform your agents about the SOPs, how to carry on specific instructions or corrections/encouragements to how they are performing or changes required to perform their duties. Everyone involved will hear about current risks and key threats in the areas they will be operating and will all be on the same page.

No alt text provided for this image

De-briefings are equally important as it gives the team the opportunity to again share any information they gained through the day, identify any issue, discuss risks, possible POIs, improve communication between the team members and provide any additional support or guidance depending on the situation. It may also include discussions about changing tactics for the next day of operations as required due to new informational input gathered. And if there is truly nothing to report at the end of any time period, take the opportunity to boost morale and congratulate the team on a job well done. Remember, while we work very hard to stay out of sight and not draw attention to ourselves, this in no way means that we don’t need encouragement from time to time.

Documentation

After being in this industry for a combined 54 years, we can both tell you how important documentation is (And it will save your position [And your posterior] one day!). If you are an EP agent and part of the team, it doesn’t matter if you have been sending your information and communicating with your fellow team members, your TL, or GSOC during the day. At the end of each shift, or the end of the operational day, you MUST keep a daily report. Your own daily report. In simple words, your own ‘’diary’’. As much as we have been discussing communication during this article, this is the most important form of communication that you can possibly use. It literally is your communication with the future. We know, that sounds a bit “out there”, but hear us out. At any one point in the future, you may be called upon to recount a day, event or occurrence that is critical and it could very well be the difference between safety or an unsafe condition…contract or no contract….Employment or unemployment…Some little detail that will be the deciding factor between simplicity and severity.  And the very fact that you kept an intricate record of your daily operations will be the one factor that makes all the difference in the world. The reason is, the information you (or that has been circulated by others during the shift) may or may not have reported or documented, or the incidents or special client’s requests of that day that may or may not have been registered will be absolutely dependent on the accurate reporting and documentation that you and your team kept. As part of our job is preparing and preventing the worst, keeping your own diary/documentation means you are protecting yourself and the decisions you or your team made at work if you ever are questioned or called in for explanations. It will help you to tell your side of what happened and why you made the decisions you made, what were client’s requests or TL requests, and how you responded. The easiest way to do this is by sending yourself an email at the end of your shift. Besides the information you would obviously include, you will have (because of the e-mail) the time and date also registered.

Ever since there was ever more than one of us in proximity to one another, there is one undeniable fact…To survive, we MUST communicate. Every deciding moment in history has been built around communication. Banners, signs, signal fires, telegraph messages, the Pony Express, Morse code, Enigma, emails, burst satellite…All based on the need for and the understanding of communication. In our Craft, we must be the true professionals and with this requirement comes the critical need to convey what we know, what we’ve seen, where we’ve been…The list goes on. Now, we know that this article only covers the basics when it comes to the subject of communication, and we realize that. But for those of us in our Craft, these points that we have made in this article are several of the “little things” that come up all too often in any detail AND they are the most frequently abused, ignored, and neglected aspects of what we consider to be a crucial part of any successful operation in close protection. How we communicate. For once we can smoothly, eloquently, accurately, safely, and quickly disseminate information properly, all the other aspects of our task will fall into place.

The Grows

Denida & Chris Grow bring a combined 54 years of international experience in the Protective and Intelligence services. They are based in Seattle, WA, and run their companies LeMareschal, Athena Worldwide and Nannyguards

Russian Oligarchs Keep Getting In Troubles by Instagram Selfies

In our latest interview with expert Nick Barreiro, Chief Forensic Analyst of Principle Forensics, we discussed the security risks from any/all social media platform postings and how someone can obtain critical information from your pictures. If you haven’t watched the interview yet, please find it below

According to Vice’s latest article, authorities have been following Instagram profiles of the women related to, or involved with, Russian oligarchs to obtain information about them, their holdings, accounts, and locate assets to seize/freeze by merely identifying and following the weakest link who posts the most. These women who act like ”influencers” or social media celebrities are looking for publicity, but they now represent a significant threat to the security of the individuals they’re around and expose them to unwanted scrutiny. ”Oligarchs themselves rarely use Instagram to accidentally crack open a window into their high living. Rather, it’s the people partying with them: A stepdaughter, an ex-wife, or in the least one infamous case, an escort.” Read the full article here.

Social Media Investigations and Monitoring for Risk Mitigation Purposes

The use of social media and the way it affects our lives and businesses have brought a new challenge to the security industry and the protective team’s responsibility. It gives the entire world the ability to look into people’s lives with the mere push of a button. Scandals are created, secrets exposed, and lives ruined. In the case of personal security, social media can be used in the advancement of a protective detail; however, one must know how to utilize it properly. Today, we will talk about Social Media Investigations and Monitoring. For those who are not aware of the term, as we utilize it in protection circles, Social Media Investigation and Monitoring is the process by which you can identify what is being said about your clients, a brand they represent, or the corporations with which they are involved and any threats or dangers that may exist in relation to those aspects.

As we sift through different social media platforms and online channels, we must then determine if what is being said has any significance regarding your clients’ reputation, persona, and safety and if there is the need to mitigate any risks. In other words, it’s like setting up an online, social media “net”. This process then helps you discover everything that is being said, written about, or portrayed on social media and determine its relevance to your clients. You can gather information about the ‘’public opinion’’ surrounding your clients, about people or entities who are angry with them for one reason or the other, people who are obsessed with them, or people who are making online threats. SOCMINT or Social Media Intelligence (not to be confused with OSINT) has seen a huge rise in necessity due to the use of social media and a competent protective detail needs to always be informed and social media investigations and monitoring are a huge part of this process. 

Now, let’s see some examples of how social media investigations and monitoring applies in protective services. Let’s say one of the people you are protecting belongs to a large pharmaceutical company and they decided to raise the price of a specific drug, thus affecting the lives and wellbeing of thousands of people. Perhaps another client is involved in a financial institution that quite suddenly makes a significant decision that affects people’s lifetime savings and pensions. You can imagine that there will be a significant number of people who become very angry, and some may want to harm your client. During the recent pandemic, there were a number of “anti-vaxx” groups that were quite vocal and utilized Facebook as one of their many platforms to accomplish their goals. Another example would be the need to discover if there is someone using your client’s name or company to scam others and commit crimes.

We are sure that many of you today are aware of the infamous ‘’Tinder Swindler’’, Shimon Yehuda Hayut, who legally changed his name to Simon Leviev to pretend to be the son of the billionaire Lev Leviev and used his name and company logos to scam people. Although his actions were known since 2017, it was only after the airing of the Netflix documentary in 2022 that the Leviev family found out and filed a lawsuit against Hayut for falsely portraying himself as the son of Lev Leviev, receiving benefits, and committing crimes.

No alt text provided for this image
(Photoshopped image of Shimon Hayut, aka Simon Leviev, with Lev Leviev (Picture: Netflix)

According to Leviev’s family attorney, Guy Ophir, they will now include anyone who has attempted to make a profit from his scam during the next lawsuit. What we can ask is, as security providers, why didn’t someone from the real Leviev family ever discover this scam artist who was extremely public and active on social media as the ‘’son of Lev Leviev’’? Although the real family members were never part of this fraudulent scheme, and it didn’t appear to affect their safety, it did, however, involve their name/brand in a very public and negative way. In other words, it should have definitely been considered as a threat to their reputation. Other people who were harmed by this scam artist were the businesses who did work with them, and their secondary service providers as well. 

No alt text provided for this image

Another interesting case to mention is Elon Musk where he, the actual client, took it upon himself to “solve” the issue and directly contacted the person of interest who had begun posting his private flight details and created the security risk for him and was literally blackmailing him unless the POI was paid. According to media reports “Elon Musk states social-media accounts that track his travel movements are ‘becoming a security issue.” Tail numbers and yacht names of billionaires are increasingly being shared on online platforms and one can track them by having the appropriate app unless significant efforts are made to secure them from the reach of those diligent few. These are some unique specific details that the security team needs to pay close attention to at all times.

Since Social Media platforms are the way people today communicate with each other, we as security providers must keep in mind that this is not always a positive aspect. Perhaps a person or persons will utilize social media to collectively gather people with their same goal or mission, to get together and plan their next move (Example: protesting outside your client’s house or corporation). In this case, you will want to know what is being said online about the person you protect to determine if there is something of extreme necessity to include in your risk and threat assessment and then take protective measures as well as inform their legal department.

As we have all witnessed too many times, it only takes one well-placed picture or story regarding some alleged activity on the part of your client, and it will go viral quickly, truth or not. Staying one step ahead of this type of “attack” has become a crucial necessity in order to protect your client from embarrassment or exposure. One of the most common issues in recent history is when personnel close to the client i.e., family, staff, vendors, and any other secondary customers post pictures, stories, or opinions and subsequently fail to understand the negative effect these types of communications can and will have on the client’s life, business, and the lives of their loved ones.

Why do you need a Social Media Investigations and Monitoring Strategy when you are a security services provider? To summarize we can say:  

1) To identify new threats. 

2) To discover what information about your client is posted online either by himself, the ones close to him, or his employees and evaluate how these affect his safety. 

3) To evaluate a threat (someone is posting online threats directed at your client).

4) To add to your due diligence.

5) To geolocate a picture or a video, sometimes even audio. 

6) To include any findings in your Risk and Threat Assessment (We can never highlight this enough, social media surveys and investigations are now a critical part of your Risk and Threat Assessments).

7) To find people obsessed with or following your clients (stalkers).

8) To identify hate groups or terrorist organizations that may affect your client.

9) To identify people or businesses your client may or may not want to do business with.

10)To mitigate risks from the information found online about the person you protect (How are the pictures of my client used or tampered with and for what purpose?).

11)To identify if someone is impersonating your client or a family member.

12)To find out if your client’s moves/visits/travels are posted online (Exposing them to others who may be in the same hotel, conference room, restaurant). 

13)To identify workplace violence or insider threats indicators.

14)To find out what is the ‘’public opinion’’ regarding your client (Always keep an eye on what is being said about your client and have a strategy to respond). 

15)To determine if a person or persons are utilizing your client’s name or business name in a malicious or unauthorized manner for their own personal gain. (Claiming associations or partnerships, etc.)

How to perform Social Media Monitoring for security purposes? 

First, let’s clarify one important thing. ‘’Googling it’’ is not enough, nor is it the answer. There are a number of search sites that allow for user input thus watering down or contaminating information and it’s accuracy. For those who are not aware, Social Media Investigations and Monitoring is quite a different department of protective services and quite often falls under Intelligence Analysis and Open-Source Intelligence. It requires unique skills and knowledge. One must clearly understand different social media and research platforms and how to use each one of them (and/or in combination) to obtain information. How you will approach each case is different and certainly depends on who your client is, their business, close relations, and/or their public image. This will directly affect the searches and the resources used and for what purpose. It is vital in our current day and age to include SOCMINT (Social Media Intelligence) in your client’s service proposal, no matter how public the person may or may not be. Hiring ten Executive Protection agents and a Residential Security Team is not enough anymore. SOCMINT services are a vital part of your Risk and Threat Assessments (Dynamic Risk Assessments too) and enable your protective detail to function more efficiently. 

For those who can not provide a certified Social Media Investigator for their clients, follow up with these steps:

1)Understand who your client is, his/her background, the threats, where do they stand in political, social, financial sectors.

2)Be aware of any of the latest changes in your clients’ lifestyle, public opinions, and professional decisions. 

3)Be aware of any of their political and social changes. Watch the news from multiple channels. 

4)Familiarize yourself with all close family, friends, staff, and associates and their respective social media footprints.

5)Set up a social media investigation and monitoring strategy. 

6)Have a good understanding of the Intelligence Cycle (How the intel is being collected, analyzed, disseminated, reviewed, etc.).

7)Have a good understanding of the search tools on different platforms (Facebook, Twitter, Instagram, TikTok, LinkedIn, Tumblr, Reddit, etc.) 

8)Do research on the available search engines and the strengths and limitations each one may have. 

9)Know how to conduct image, video, and audio research and gather intelligence from them.

10)Invest in appropriate platforms for social media investigations and monitoring (Have in mind, NEVER rely on one platform’s result or just platforms’ results. The user/investigator is the main component of a social media investigation). 

11)Download and use appropriate search engines extensions and apps. 

12)Invest time in creating ‘’sock puppets’’ or fake profiles and maintain their persona. Sometimes you may need a profile to have access to different forums or groups without being discovered.

13)Train yourself in link analysis (How to look for connections between people, events, and organizations).

14)Set keyword alerts (In multiple languages in case your client has ties with more than one country).

15)Gather, analyze, evaluate, and report your findings to the appropriate department or leadership.  

As the threat landscape changes every day, we as protection providers must be able to adapt and keep ourselves up to date with additional training. Today’s executive protection agent must also be skilled and knowledgeable in investigations, open-source intelligence, protective intelligence, HUMINT, and have an increased understanding of cyber security. Large corporations have already created their own embedded intelligence departments, while others are hiring threat analysts and OSINT investigations from outside security providers. The rise of protective intelligence, and whatever that includes, is here to stay and we are seeing it more and more through the highly increased number of related job postings every day. 

If you are an Executive Protection Agent and want to learn more on how to utilize Social Media Investigations and Monitoring for Risk Mitigation Purposes, reach out to us.

f you are a service provider and want to add Social Media Investigations and Monitoring for Risk Mitigation Purposes on your service list, contact us to learn about our vendor services. 

Chris Grow

AUS Global Special Services Travel Team

Managing Partner LeMareschal LLC

Denida Grow

Founder & CEO

Athena Worldwide 

Nannyguards

Managing Partner LeMareschal LLC

Marketing tips for Executive Protection Agents

Perception is everything, protect yourself and build your reputation on solid ground.

*These are part of a panel of personal opinions formulated from my experience in the industry as an EP agent, business owner and recruiter for other corporations. Keep in mind that just because I preach it, doesn’t mean I haven’t made the mistakes. It’s actually the fact I have made some of these and it’s caused me to learn what can work and what doesn’t. You may not agree with me or follow up with the suggestions, but experience is an amazing teacher…”Let he who has ears…”*

1) Know what you know and know your value. (Know what you are willing to sacrifice as well, working more hours, night shifts, holidays, for how much, or how little.)

2) Know what you don’t know and either leave it to someone else or study it (There is nothing worse than someone who is trying to operate in many different fields, and yet, have quite limited knowledge on each field and act as though they’re the authority on it.) Focus on what you are most interested in and master it. Only move on to something else when you have a solid foundation on a topic and you are prepared to expand to something else.

3) “Listen more and talk less” Comment or post on social media only if you have something constructive to say and always stay on point and use professional language.

4) Post or comment only on subjects you know well, subjects you have studied, and subjects you know from real-life experience. There is no need to post daily or non-related posts.

5) It takes specific work and, quite simply, boots on the ground to consider yourself experienced. Having worked EP two or three days a month doesn’t make you qualified enough to disagree or raise your voice with people who have been doing this for 10+ years. Neither are you an expert after one or two years in the industry (You can always see who is who and what they know and don’t know by what they post on social media). Stay humble, lay low and learn your trade well…Your day will come.

6) Maintain a professional image on all business-related social media sites. A suit and tie picture will always be better than a tank top or a duckface selfie.

7) Build a professional LinkedIn Profile, highlight your skills and post all your professional and educational achievements.

8) Stop posting sensitive information, IDs, and license numbers on social media (You are a security professional! If you fail to protect even your own personal information, what does that tell me about how you handle your clients’ information??)

9) Always maintain OPSEC in every post you make. Always think, “How could this be used to harm my client or my team?

10) Protect your data! We have seen more and more security professionals warning their connections that they have been hacked! If your ex-girlfriend can hack your Facebook or LinkedIn profile, then you are probably not very good at keeping your clients or your information safe.

11) Keep high school drama out of social media.

12) Control your emotions, and remain professional at all times…You are your client’s close protection, NOT his/her “Buddyguard”. Friendly at all times, not Friends.

13) Be careful of your connections and the people that you recommend or work with. Have you heard of death by association? Make no mistake, it is a very real factor in our business!

14) Build a professional-looking CV. Keep it simple and to the point. There is no need to hire a CV writer, you know what you have done, trained for, and accomplished.

15) Invest time in building connections. Spend time talking to others or helping them with their projects. I have gained many contracts after the interviews I did with others.

16) Offer pro bono services to companies you respect and want to be involved with.

17) If you are single and have no family commitments, perhaps you work that shift on Christmas or other holidays so someone else can spend the day with his children. You have no idea how being understanding can help you in the long term.

18) Study your clientele and any potential clients. The industry has changed significantly, and the new wave of clients are IT gurus, app developers, cryptocurrency investors, reality stars, etc. Always be knowledgeable on current trends and topics.

19) Be informed on local and international news, threats, and events that affect the industry and the needs or operational aspects of your clients.

20) Don’t be arrogant, there is a fine line between being confident and arrogant. Never cross it…There usually is no way back once the damage is done.

Denida Zinxhiria Grow

Founder & CEO

Athena Worldwide

Athena Academy

Nannyguards

Managing Partner

LeMareschal LLC

The importance of being a responsible and safety-conscious citizen in your community

I wrote this article due to a horrible crime that took place several days ago in Greece. A 34-year-old woman returning home late at night, while unlocking the door of her apartment building, was grabbed and pulled away by a violent criminal. She was raped, beaten, doused with gasoline, and then set on fire while still alive. Despite living in a crowded neighborhood where many people heard her screaming, not a single person went out to see what was happening until it was too late. The most horrible part is that both her father and brother could hear a woman screaming, but they never thought it was their beloved family member…

The criminal, a 27-year-old, who has been accused in the past of sexual attacks by other victims, had been released back into society due to a lack of evidence to convict him. He was described as a male with strange and abusive behavior toward women, and he was stalking the victim for a long time. The blame cannot be solely shouldered by the Greek Justice and Authorities for allowing this man to continue his abusive acts, which ultimately ended the horrible murder of this woman.

I would like to raise the attention to the fact that people in today’s society fail to care about others or act to assist someone in distress. If one of the neighbors, hearing her first screams, had gone outside and yelled at the criminal or made their presence known, might have assisted in stopping the crime, which would have saved the poor woman’s life. Witnesses said they heard a woman screaming, but they were scared to go outside and see what was wrong. Several just didn’t think it was something serious enough to investigate. It must be horrible for the family members and neighbors to know they could have saved this woman’s life if they had acted instead of hiding. This lack of action will most likely haunt the community for a long time.

We are obviously not responsible for the actions of criminals within our community. However, we are accountable for our actions or lack thereof. Being a responsible citizen that cares about their neighbors can save lives. You don’t have to be the hero that will stop the crime by physically engaging the criminal. You can be the hero by just paying attention and reporting suspicious or criminal acts. Let’s think about it, maybe the victim wasn’t our sister or daughter, but if it was, wouldn’t we pray that someone would act if they heard her screams for help and react fast enough to save her? I’m sure we all would pray for that.

Leaving the comfort of your couch and going out to see what’s taking place can save people’s lives. Criminals don’t want to be captured and usually flee if confronted by witnesses. Making criminals aware that someone is watching is a powerful deterrent to their criminal activity and makes for a much safer community

.Image

Denida Zinxhiria

Founder & CEO

Athena Worldwide

Nannyguards