The Role of Counter-Surveillance in Executive Protection Operations

One of the most underestimated skills of an executive protection agent is counter-surveillance tactics. This specific topic is either being touched on for a brief time during EP courses or not covered at all. Within the functions of protective operations, counter-surveillance plays a pivotal role in mitigating risks and ensuring the effectiveness of protection strategies.

When most people think about bodyguards, they think about the people who are around a celebrity or an important public figure. They do not know that executive protection is more than just protective agents surrounding a VIP. It involves a comprehensive approach to security, involving thorough planning, risk and threat assessments, intelligence gathering, comprehensive advance work, and strategic responses. While visible security measures (such as bodyguards) are important, the covert and preemptive aspects are equally critical to a successful protection operation. Counter-surveillance is the art and science of identifying and countering threats before they manifest, making it an indispensable tool in the executive protection toolbox. It is such an important area that it needs to be properly studied.

Photo by Burak The Weekender on Pexels.com

Why are specific people at risk for surveillance? The objective of surveillance is to monitor, record, and analyze the movements and activities of individuals or groups to gather information. Criminals use surveillance to discover what your weaknesses are to do you harm (especially terrorist organizations), and paparazzi use it to find your patterns so they can predict your next move and where to find you next. Some other reasons individuals or entities may be surveilled is to gather business intelligence or other personal motives such as private investigations, often relating to legal matters or personal disputes. An all-new group of people who use surveillance against their victims are sex predators and stalkers. The intention of these individuals is obviously for kidnapping, trafficking, and harm to their victims.

Understandably, there are many risks associated with being followed or monitored, such as:

  • Compromised Personal Safety: Surveillance can be a precursor to more direct threats such as physical attacks, kidnapping, or ambushes.
  • Privacy Invasion: Persistent surveillance can lead to significant invasions of privacy, affecting the mental well-being and sense of security of the clients and their family members.
  • Information Leakage: Surveillance can result in sensitive or confidential information being intercepted, posing risks to both personal and corporate security.
  • Behavioral Alteration: Knowing one is being watched can lead to altered behavior, which can impact the client’s performance and decision-making.

What is Counter-Surveillance? Counter-surveillance is the proactive practice of monitoring and countering potential threats, hostile surveillance, or intelligence-gathering activities aimed at the protected individual or group. It involves the use of advanced techniques, technology, and trained personnel to detect, deter, and neutralize potential threats while avoiding confrontation.

And it can be crucial for the following reasons:

  • Early Threat Detection: One of the primary advantages of counter surveillance is the ability to detect threats in their early stages. Hostile individuals or groups often conduct surveillance to gather information, assess vulnerabilities, and plan attacks. In his book “I was Born on November 17”, Dimitris Koufontinas, one of the most notorious domestic terrorists in Greece and the leader of the infamous November 17 terrorist organization, (responsible for the assassination of CIA Chief of Station Richard Welch and 4 other Americans as well as the killing of at least 19 other individuals), explained in detail the tactics of how the terrorist organization would conduct surveillance on their targets. A very educational read for those interested in learning from the adversary. In such events, effective counter-surveillance can intercept early surveillance attempts by raising awareness and allowing security teams to intervene before a threat materializes.
  • Reducing Vulnerabilities: Counter surveillance helps protect individuals by identifying weaknesses in their security protocols. By pinpointing potential vulnerabilities or patterns that could be exploited by malicious actors, protective measures can be adjusted or strengthened to minimize risk. Weaknesses can be found in the biggest and most sophisticated protective operation, no one is immune.
  • Preventing Ambushes or Attacks: Surveillance is often a precursor to ambushes or attacks. Counter surveillance can identify suspicious individuals or activities that may indicate imminent danger, allowing security teams to take proactive measures to prevent an attack.
  • Enhanced Situational Awareness: Counter surveillance teams provide real-time intelligence, which enhances the situational awareness of executive protection personnel. This enables them to make informed decisions, adjust routes, and respond effectively to changing circumstances.
  • Protecting Privacy: Counter surveillance also plays a role in protecting the privacy of high-profile individuals. By identifying and deterring paparazzi or overzealous fans, it allows clients to maintain a degree of personal space and control over their lives. In one of our previous podcasts with a retired famous paparazzi, he admitted that he knew where to find celebrities because they had a routine life and used the same restaurants or bars over and over again.
Photo by Aleksandar Pasaric on Pexels.com

Things to consider during counter-surveillance operations. A good counter-surveillance agent is the one who understands the tactics of surveillance practices. As we mentioned earlier, surveillance and counter-surveillance are a very specialized area within protective operations and one needs to dedicate a good amount of specialized training to it. Something to consider for those EP agents who want to learn more.

Before diving into counter-surveillance, it’s essential to grasp the concept of surveillance itself. Learn from your adversary. In order to be able to counter an act, you must know how to perform the act. Previously, we explained who may be conducting surveillance on you or your client and why. Below, we will analyze the methods of surveillance, the various methods used, different forms a surveillance can take, and commonly used techniques. If you know how your adversary operates, you will be more skilled in anticipating their moves, identifying surveillance, and mitigate risks.

Methods of Surveillance: Surveillance methods vary greatly depending on the objectives and the technology available. Common methods include:

  • Physical Surveillance: Involves the physical observation of a person or place. It can be either stationery (watching from a fixed position) or mobile (following the target).
  • Technical Surveillance: Utilizes electronic devices like cameras, microphones, GPS trackers, and wiretapping equipment to monitor and record activities.
  • Cyber Surveillance: Involves monitoring online activities, including email communications, social media interactions, and browsing history.
  • Aerial Surveillance: Uses drones or other aircraft to observe from above.
  • Agent-Based Surveillance: Involves human intelligence where individuals gather information through personal interaction or infiltration into a group.

Tools Used in Surveillance: Surveillance tools range from simple binoculars to sophisticated electronic equipment:

  • Optical Surveillance Tools: Binoculars, telescopes, and cameras.
  • Audio Surveillance Tools: Listening devices, voice recorders, and wiretaps.
  • Electronic Surveillance Tools: GPS trackers, motion sensors, and digital monitoring software.
  • Data Surveillance Tools: Software for monitoring internet activity, including email interception and network monitoring.

Forms Surveillance Can Take: Surveillance can take several forms, including:

  • Covert Surveillance: Conducted without knowledge of the subject.
  • Overt Surveillance: Visible and obvious monitoring, often used as a deterrent.
  • Personal Surveillance: Focused on individuals or small groups.
  • Mass Surveillance: Broad monitoring, often of large populations or areas.

Common Techniques Used in Surveillance: Surveillance techniques will depend on the purpose and context.

  • Tail Surveillance or “Tailing”: Following a subject discreetly.
  • Stationary Surveillance: Observing from a fixed point.
  • Electronic Eavesdropping: Listening in on conversations or communications.
  • Cyber Monitoring: Tracking online activities and digital footprints.
  • Pattern Analysis: Studying routines and behaviors for anomalies.

Counter-surveillance 101

Counter-surveillance tactics are critical for executive protection teams to ensure the safety and security of high-profile individuals. These tactics help identify and mitigate potential threats and hostile surveillance. One of the most important aspects of counter-surveillance is being able to identify suspicious people/behaviors. For this, we will use the U.S. government acronym TEDD which illustrates the principles one can use to identify surveillance. TEDD stands for Time – Environment – Distance – Demeanor. In other words, if a person sees someone repeatedly over a particular timeframe, in different environments and/or at distances not proximal to each other, or one who displays a poor demeanor, then it can be assumed he or she is under surveillance.

When an individual becomes the specific target of a planned attack, they may find themselves subjected to various elements of surveillance, including time, environment, and distance (TEDD). However, if the focus of the threat is directed towards a location, such as a subway or a government facility where the individual works, the primary element to be aware of is demeanor. Demeanor, in this context, refers to a person’s behavior that appears unusual or unnatural, or his presence is unjustified. This behavior can range from overtly suspicious actions, such as loitering without a clear purpose or reason for being in a particular place, to more subtle signs that are almost undetectable to an observer. Sometimes, it’s a gut feeling or a sense that something isn’t right, rather than something visibly obvious.

Signs of poor demeanor may include:

  • Mirroring: Acting in sync with the target’s movements, indicating a potential attempt to monitor or follow them.
  • Communication: Making efforts to communicate or coordinate with others when the target moves, possibly signaling collaboration within a surveillance team.
  • Avoiding Eye Contact: Refraining from making eye contact with the target, potentially to avoid drawing attention or revealing intent.
  • Unnatural Behavior: Signs of emotional stress, such as nervousness, excessive enthusiasm, or noticeable sweating.
  • Abrupt Movements: Making sudden turns, stops, or changes in direction that seem out of place or unnatural.
  • Extended Presence: A person who remains in a specific area for an unusually long period without an apparent reason.
  • Unjustified Contact: Repeated or unplanned interactions with a specific person without a clear explanation.
  • Unjustified Presence: A person whose presence in a particular location or at a specific time is not easily justified or explained.
  • Pattern Repetition: Multiple individuals displaying similar behaviors or signs.
  • Standing Out: Someone who noticeably differs from the surrounding crowd in some way.
  • Intuition: Trusting your instincts when you get a bad feeling or sense that something is amiss.
  • Observing Hands: Pay attention to whether individuals are holding anything that could be used as a weapon or a tool for kidnapping.
  • Covert Communication: Monitoring for signs of communication, such as texting, hand signals, nods, repeated eye contact, or any unusual interactions when you move.

 

In the context of terrorism, displaying a poor demeanor can also involve:

  • Inappropriate Attire: Wearing clothing that is unsuitable for the weather, like donning heavy coats in the summertime, or exhibiting unusual bulges or wires under clothing that might suggest concealed weapons or devices.
  • Physical Discomfort: Showing signs of nervousness, such as excessive sweating, mumbling, or fidgeting.
  • Avoiding Security: Deliberately attempting to evade security personnel or behaving in a manner that raises suspicions when encountering security measures.
  • Unusual Baggage: A person carrying bags, suitcases, or luggage that appears out of place or disproportionate to the situation.
  • In addition, according to some reports, suicide bombers often exhibit an intense stare as they approach the final stages of their mission. They seem to have tunnel vision, being able to focus only on their intended purpose or target. They may also be under the influence of drugs.

 

We have to highlight that poor demeanor encompasses a wide range of behaviors and signs, from the overtly conspicuous to the subtly unusual. Being vigilant and aware of these indicators can help individuals recognize potential threats and take appropriate actions to ensure their safety in various situations, especially in environments where security risks are a concern.

Photo by Kaique Rocha on Pexels.com

Recognizing signs of being followed is critical for executive protection teams. One should be on the lookout for:

  • Repetition in Appearances: Notice repeated appearances of the same vehicle or person(s) in different locations or over time.
  • Unusual Patterns: Highlighting patterns such as a person on foot or in a vehicle making the same turns, stopping when you stop, or lingering in the same areas.

-Using your peripheral vision, mirrors, and other reflective surfaces (like shop windows or parked cars) for better observation.

-Enter buildings or make sudden, unexpected turns to test if a follower is maintaining their pursuit.

-While driving, change speeds, make sudden, unexpected turns to test if a follower is maintaining their pursuit. Make a stop at a safe location to observe if any vehicle stops nearby or behaves suspiciously. When you can, perform a legal and safe U-turn to see if the following vehicle replicates the maneuver. Drive a route in reverse or returning to a previous location to check for surveillance.

 

Counter-surveillance tactics for executive protection teams:

  • Behavior Analysis: EP team members have to learn how to observe the behavior of people in the vicinity of the protected individual. Look for signs of unusual or suspicious conduct, such as individuals who appear to be loitering, repeatedly changing their positions, taking a keen interest in the protected person, or other signs we mentioned earlier.
  • Varying Routes and Schedules: In our world, we say routine can be as deadly as a bullet, and there is a truth to it. EP teams must avoid predictable patterns by varying the routes and schedules of the protected individual. This makes it more challenging for potential threats to plan and execute an attack. And an additional challenge is that many clients become quite used to their patterns and it takes patience and understanding to slowly convince them that the day-to-day changes in routes or patterns are a good thing and not a bother or a hinderance.
  • Discreet and Safe Communication: It is disappointing to say that we have many examples of EP agents who do not practice secure and discreet communication methods, adding more risks to their client’s safety. Always maintain OPSEC, use secure communication apps (Sorry, but WhatsApp is NOT one of them), and be careful what you post on social media.
  • Counter-Observation: The majority of EP operations are done by small teams. Not all clients or teams have those extra bodies to deploy for their own counter-surveillance team. That is why it is important for the team members to be extra vigilant and keep an eye on individuals who may be surveilling the protected individual.
  • Technical Surveillance Detection: Use specialized equipment to detect electronic surveillance devices, such as hidden cameras, bugs, or GPS trackers. In addition, educate yourself and seek extra training in how to sweep vehicles, accommodations, and meeting locations for listening devices or threats.
  • Situational Awareness: Promote constant situational awareness among team members. Encourage them to be vigilant and observant of their surroundings, including people, vehicles, and anomalies.
  • Route Reconnaissance: Conduct advance reconnaissance of routes and locations where the protected individual will visit. Identify potential chokepoints, escape routes, and secure areas.
  • Spotting Surveillance Teams: Train team members to recognize signs of hostile surveillance teams. Look for vehicles or individuals that appear out of place, conduct frequent U-turns, or employ evasive driving tactics.
  • Emergency Response Protocols: Develop and rehearse with your team emergency response protocols to address situations where hostile surveillance is identified. These protocols should include contacting law enforcement, documentation, team briefings, and taking appropriate actions to ensure the principal’s safety.
  • Counter-Intelligence Measures: Be aware of potential leaks of sensitive information within the team, household personnel, or from external sources. Implement counter-intelligence measures to protect operational details.
  • Adaptive Tactics: Be always flexible and adapt tactics based on the specific circumstances and threat environment. Threats may change, so the counter-surveillance approach should evolve accordingly.

Do not forget the Human Element!

The human element is irreplaceable in counter-surveillance operations. Skilled and trained personnel with a deep understanding of human behavior and surveillance techniques are the linchpin of a successful counter-surveillance program. Their ability to blend in, remain discreet, and adapt to evolving threats is invaluable. Nothing can replace real-time-on-the ground intelligence.

For executive protection teams, counter surveillance is not really an option, it is an important component for protecting high-profile individuals, security team members and mitigating potential risks. By providing early threat detection, reducing vulnerabilities, preventing ambushes, enhancing situational awareness, and protecting privacy, counter surveillance serves as a vital pillar of executive protection operations.

#ExecutiveProtection #CounterSurveillance #SecurityTactics #RiskManagement

#ProtectiveOperations #SurveillanceCountermeasures #PersonalSafety #ThreatDetection

#VIPSecurity #ProtectionStrategies

Operational Communication for Close Protection Operations

In the world of security operations, one of the most critical areas is communication, which involves constant cooperation and vital information sharing between top-level executives, their respective EA/P/A, the GSOC team, company employees, vendors, and agents working on the ground. Now, if you have been working for any reasonable amount of time in our industry, we are sure that the majority of you have experienced situations where the operation and security of everyone involved has been negatively affected by poor communication, inconsistent communication, or even the complete lack of communication. How information is being shared, what kind of information is being shared, and how/when it is documented is a skill one will quite often learn more readily outside the traditional ‘’EP Schools’’. Considering the fact that many security operations involve a huge number of people and different companies/vendors creating a hierarchy level, coupled with the fact that many companies have a tendency to be highly secretive with the information regarding the operation, you begin to understand how failing to communicate properly will not only create more risks but also will create day to day complications that don’t allow for a smooth operation. This is something that will not only be experienced by anyone secondarily involved, but also by the very protectees themselves. Keep in mind that your clients need peace of mind as well, and they shouldn’t be bothered or have their daily schedule negatively affected by your lack of communication skills or the resulting issues that ensue.

Communication tools

There is a common misbelief (Hollywood and action entertainment are all too often to blame for this) that all EP operations have agents using radios and other high-tech gadgets. In all actuality, the majority of EP agents are required to appear either low profile or not given a radio based on client proximity so they must rely upon and use their cellphones for a majority of their detail communication needs. Using your cellphone may seem like an easy tool and really quite convenient, but there is a downside, and it should also come with specific warnings regarding the pitfalls that come with its use.

Currently, for your operational needs, in order to communicate, you will need some form of a publicly available chat app. Some of the most utilized and popular platforms are Signal, Telegram, Wickr Pro, and Threema, to name a few. The majority of our colleagues have used and are still using WhatsApp, even though the app has been reported for multiple data breaches and leaks, as well as ‘’system shutdowns’’, leaving many colleagues panicked and scrambling to rapidly find an alternative communication system. But no matter how serious the issues that it presents, WhatsApp seems to be yet another example of the phenomenon where people get so accustomed to a product and do not want to change because change means you have to learn to use something new from the ground up and start again. We have had serious resistance from other companies we provided services to, as well as our clients themselves when we asked to use a different and more secure platform. In the end, we and our agents agreed to use WhatsApp as per our clients’ request for them; however, we were utilizing other platforms privately between our own agents. When you are using a third-party App such as WhatsApp, Telegram, Signal, etc., keep in mind that you will never be in control of the safety of the information you are sharing. Never. None of these apps are or ever will be entirely safe. So, when you are deciding, choose carefully based on who has fewer privacy issues, who is the creator (country), who your client is in relation to the creator (can the creators of this app be targeting your client?), what are your operational needs and always make sure you stay on top of the latest changes (social-political, geopolitical as well as company changes) that may affect the risk to your client. There are also paid work chat apps or business apps created for the workplace and personal messaging that promise a safer environment but again, one must take into consideration the fees and accessibility. (Who is paying when there is /more than one company involved and who IS involved, i.e. contractors, employees, 2nd parties, etc.).

Photo by MOHI SYED on Pexels.com

And the available functions and capabilities of each platform need to be vetted thoroughly as well. What are your needs or requirements? Will you be using large group chats? Will you and any size group be able to utilize voice texting? Will you be able to send small packets of information through the groups that you set up? (Pics of critical POIs, BOLO vehicles, onsite venue pics for inbound teams or advances, etc.) These are just a few of the features that operational teams use all the time and finding the right platform for your team’s needs and unique requirements is very important. No one operational has any desire to have any more apps or sites open at once on their personal devices than is absolutely necessary in an effort to try to manage a detail. Less “moving parts” is always better, if possible.

Information flow

During a protective operation, there is information that is crucial and must be passed among the parties involved (as per their responsibilities) and the agents on the ground. For numerous reasons, some individuals who are assigned as an operation manager or contract manager seem to be apprehensive about asking the necessary questions of the client or the people assigned to act on behalf of the client. This apprehension, quite often, is caused by their own insecurity in what they want to ask, fear of a negative response to their request, or the simple fact that they do not know what to ask. Insecurity in what to ask is a skill acquired by time in grade. As we spend time in our Craft, it’s almost impossible not to learn what the correct questions or inquiries would be. Fear of a negative response can be associated with the desire for acceptance or to have the client like them. We all know that what is best for the client’s safety and family security may not exactly be what THEY want…Be prepared to patiently and thoroughly explain the reasoning behind the questions and the resulting decisions. And for those who don’t know what to ask, stay tuned we will share a template one can use as one sees fit for his/her own needs.

When you receive a request to provide protective services, you must ensure that any/all specific information that is necessary for that detail’s success is obtained from the client right away and is passed along immediately to the agents on the ground. How many of us have found ourselves working on short gigs and know nothing or very little about the client? Sometimes even the very basic information that pertains to the gig itself? While we all know that clients can change their minds about what they want from second to second, there is specific information that still must be passed to the agents. This is an inherent need to set your team up for success. Period. Being able to plan ahead, run successful advances, and lower the risk levels, or even eliminate them altogether, means you must have as much information as you can and communicate it properly.

Now, the information flow definitely has two sides. Because the agents on the ground are reacting in real-time during any situation, they are actively aware of new information that must be passed on to the GSOC or the assigned person in charge. It must be done on a consistent basis. This is critical for operational effectiveness. But we all know “that” agent who will put every, little, minute bit of information that he/she may think it is relevant to the task. Always keep this in the back of your mind…While you are communicating with your fellow team members or passing vital information to your GSOC, keep it brief. Short and to the point. Only the facts. K.I.S.S. is the acronym that suits this best…

Photo by Lukas on Pexels.com

Briefings and De-briefings

I don’t believe that we can accurately highlight enough how important briefings and de-briefings are in our line of work. It seems that more and more, only a handful of companies or team leaders are utilizing them properly or using them at all. This lack comes from basic laziness in people who want to merely save time (Even though you can keep them short if you keep them on point and factual) and/or the absence of needed information. If you have nothing to pass on to your agents, why have one, right? Wrong. You, as a team lead, are not the only one who may have information that needs to be brought to the group. Allow team members to speak and ask questions so that later issues are avoided.

Photo by Christina Morillo on Pexels.com

Communication Briefings are designed to provide necessary information about a client, the detail, events or occurrences and how they all interact, in a quick and effective way. They can also inform your agents about the SOPs, how to carry on specific instructions or corrections/encouragements to how they are performing or changes required to perform their duties. Everyone involved will hear about current risks and key threats in the areas they will be operating and will all be on the same page.

De-briefings are equally important as it gives the team the opportunity to again share any information they gained through the day, identify any issue, discuss risks, possible POIs, improve communication between the team members and provide any additional support or guidance depending on the situation. It may also include discussions about changing tactics for the next day of operations as required due to new informational input gathered. And if there is truly nothing to report at the end of any time period, take the opportunity to boost morale and congratulate the team on a job well done. Remember, while we work very hard to stay out of sight and not draw attention to ourselves, this in no way means that we don’t need encouragement from time to time.

Documentation

After being in this industry for a combined 54 years, we can both tell you how important documentation is (And it will save your position [And your posterior] one day!). If you are an EP agent and part of the team, it doesn’t matter if you have been sending your information and communicating with your fellow team members, your TL, or GSOC during the day. At the end of each shift, or the end of the operational day, you MUST keep a daily report. Your own daily report. In simple words, your own ‘’diary’’. As much as we have been discussing communication during this article, this is the most important form of communication that you can possibly use. It literally is your communication with the future. We know that sounds a bit “out there”, but hear us out. At any one point in the future, you may be called upon to recount a day, event, or occurrence that is critical and it could very well be the difference between safety or an unsafe condition…contract or no contract….Employment or unemployment…Some little detail that will be the deciding factor between simplicity and severity.  And the very fact that you kept an intricate record of your daily operations will be the one factor that makes all the difference in the world. The reason is, the information you (or that has been circulated by others during the shift) may or may not have reported or documented, or the incidents or special client’s requests of that day that may or may not have been registered will be absolutely dependent on the accurate reporting and documentation that you and your team kept. As part of our job is preparing and preventing the worst, keeping your own diary/documentation means you are protecting yourself and the decisions you or your team made at work if you ever are questioned or called in for explanations. It will help you to tell your side of what happened and why you made the decisions you made, what were client’s requests or TL requests, and how you responded. The easiest way to do this is by sending yourself an email at the end of your shift. Besides the information you would obviously include, you will have (because of the e-mail) the time and date also registered.

Ever since there was ever more than one of us in proximity to one another, there is one undeniable fact…To survive, we MUST communicate. Every deciding moment in history has been built around communication. Banners, signs, signal fires, telegraph messages, the Pony Express, Morse code, Enigma, emails, burst satellite…All based on the need for and the understanding of communication. In our Craft, we must be the true professionals, and with this requirement comes the critical need to convey what we know, what we’ve seen, where we’ve been…The list goes on. Now, we know that this article only covers the basics when it comes to the subject of communication, and we realize that. But for those of us in our Craft, these points that we have made in this article are several of the “little things” that come up all too often in any detail AND they are the most frequently abused, ignored, and neglected aspects of what we consider to be a crucial part of any successful operation in close protection. How we communicate. For once we can smoothly, eloquently, accurately, safely, and quickly disseminate information properly, all the other aspects of our task will fall into place.

The Grows

Denida & Chris Grow bring a combined 54 years of international experience in the Protective and Intelligence services. They are based in Seattle, WA, and run their companies LeMareschalAthena Worldwide and Nannyguards

Marketing tips for Executive Protection Agents

Perception is everything, protect yourself and build your reputation on solid ground.

*These are part of a panel of personal opinions formulated from my experience in the industry as an EP agent, business owner and recruiter for other corporations. Keep in mind that just because I preach it, doesn’t mean I haven’t made the mistakes. It’s actually the fact I have made some of these and it’s caused me to learn what can work and what doesn’t. You may not agree with me or follow up with the suggestions, but experience is an amazing teacher…”Let he who has ears…”*

1) Know what you know and know your value. (Know what you are willing to sacrifice as well, working more hours, night shifts, holidays, for how much, or how little.)

2) Know what you don’t know and either leave it to someone else or study it (There is nothing worse than someone who is trying to operate in many different fields, and yet, have quite limited knowledge on each field and act as though they’re the authority on it.) Focus on what you are most interested in and master it. Only move on to something else when you have a solid foundation on a topic and you are prepared to expand to something else.

3) “Listen more and talk less” Comment or post on social media only if you have something constructive to say and always stay on point and use professional language.

4) Post or comment only on subjects you know well, subjects you have studied, and subjects you know from real-life experience. There is no need to post daily or non-related posts.

5) It takes specific work and, quite simply, boots on the ground to consider yourself experienced. Having worked EP two or three days a month doesn’t make you qualified enough to disagree or raise your voice with people who have been doing this for 10+ years. Neither are you an expert after one or two years in the industry (You can always see who is who and what they know and don’t know by what they post on social media). Stay humble, lay low and learn your trade well…Your day will come.

6) Maintain a professional image on all business-related social media sites. A suit and tie picture will always be better than a tank top or a duckface selfie.

7) Build a professional LinkedIn Profile, highlight your skills and post all your professional and educational achievements.

8) Stop posting sensitive information, IDs, and license numbers on social media (You are a security professional! If you fail to protect even your own personal information, what does that tell me about how you handle your clients’ information??)

9) Always maintain OPSEC in every post you make. Always think, “How could this be used to harm my client or my team?

10) Protect your data! We have seen more and more security professionals warning their connections that they have been hacked! If your ex-girlfriend can hack your Facebook or LinkedIn profile, then you are probably not very good at keeping your clients or your information safe.

11) Keep high school drama out of social media.

12) Control your emotions, and remain professional at all times…You are your client’s close protection, NOT his/her “Buddyguard”. Friendly at all times, not Friends.

13) Be careful of your connections and the people that you recommend or work with. Have you heard of death by association? Make no mistake, it is a very real factor in our business!

14) Build a professional-looking CV. Keep it simple and to the point. There is no need to hire a CV writer, you know what you have done, trained for, and accomplished.

15) Invest time in building connections. Spend time talking to others or helping them with their projects. I have gained many contracts after the interviews I did with others.

16) Offer pro bono services to companies you respect and want to be involved with.

17) If you are single and have no family commitments, perhaps you work that shift on Christmas or other holidays so someone else can spend the day with his children. You have no idea how being understanding can help you in the long term.

18) Study your clientele and any potential clients. The industry has changed significantly, and the new wave of clients are IT gurus, app developers, cryptocurrency investors, reality stars, etc. Always be knowledgeable on current trends and topics.

19) Be informed on local and international news, threats, and events that affect the industry and the needs or operational aspects of your clients.

20) Don’t be arrogant, there is a fine line between being confident and arrogant. Never cross it…There usually is no way back once the damage is done.

Denida Zinxhiria Grow

Founder & CEO

Athena Worldwide

Athena Academy

Nannyguards

Managing Partner

LeMareschal LLC

Things to consider before you hire an Executive Protection team aka Bodyguards

 To all CEOs, celebrities, VIPs and high value individuals…

At some point in your careers, you will most likely find the need to retain, or at the very least, inquire about close protection services for yourselves, your loved ones and possibly for those you employ closest to you.
      Now, the list of companies and corporations that provide these type of services is quite lengthy and, while at first they all appear very impressive, you need to be thorough as you take a deep look at them and the ideals and morals they represent. Again, you are searching for the perfect fit that best protects yourselves, your families, employees and all things that you need secured and confidential.
      A quite disturbing trend as of late has been the repeated posting of pics with you as the client, at your locations and in front of your vehicles, private planes, residences, etc. while boasting about the details of who you might be, what was happening or other items of a secure nature. Now, this is entirely unacceptable no matter what the terms or conditions of their employment may be with you. You, and all that that may encompass, are to be secure, confidential and invisible for all intents and purposes. Period.
      Social media has become the source of all communications amongst a great number of these entities and this in turn has led to a trend of exposing enormous amounts of confidential client information when it is not only unnecessary but highly unprofessional and, frankly, childish. At times, it has even been portrayed as “marketing” when, in it’s true form, it’s nothing more than schoolyard bragging.
      So, when researching a prospective organization that you perceive may be the one you will choose, a thorough search of all related social media should be performed. The company’s sites, the reviews and even the social media sites of any/all possible employees that you might hire from their corporation. If they are willing to expose their previous clients with seemingly reckless abandon, you will most likely be the next celebrity/VIP pic that hits the Facebook/Instagram/LinkedIn circuit and that is, I’m quite sure, not your desire at all.
      Many companies will show an endless supply of “tactical” pictures, extreme condition photos, worst case scenario snapshots, etc. Please understand that most of the organizations are composed of a large number of former military members, former LEO/SWAT members and private security contractors who have “been there & done that”. But it is always wise to remember that while these skills are highly advantageous should everything go tragically wrong in your day, these type of days should never happen if the proper planning is performed which is completely above and beyond the “hard skills” as they are often referred to.
      Another highly recommended item is a detailed NDA and total social media blackout for all involved. Leave nothing to chance and be very clear regarding the seriousness that this represents to you and the severity of disciplinary action should it be violated. Again, you and all you hold most dear are to be secure, confidential and private and definitely NOT on the front page of a local newspaper, tabloid, media page or out to the highest bidder.
      Always remember this…You came looking to us with your concerns and fears, placing your overall well-being in our capable hands. With that in mind, you should always feel protected, safe and secure from anyone or anything that might wish to harm you. And that harm should NEVER be at the hands of the very people whom you have so willingly trusted to provide the very best security, protection and peace of mind.

Denida Zinxhiria Grow

Founder & CEO

Athena Worldwide

Athena Academy

Nannyguards

At Athena Worldwide we are industry leaders in promoting, training, and staffing female bodyguards internationally. With our affiliate offices, we can provide worldwide close protection and executive protection services for entertainment professionals, politicians, CEOs, Royal Families, journalists, clergy, and corporate personnel. Want to find out more about female bodyguards? visit www.athenaworldwide.com