Real Operations. Real Decisions. Real Results.
Most security companies show gear. I show work. Redacted case studies in executive protection, threat intelligence, digital resilience, and security strategy.
No client names. No locations. No operational details that compromise anyone. Just the truth: what happened, how it was handled, and why it mattered.
If you want marketing theater, wrong place. If you want to see what actual, operator-grade security looks like, keep reading.
What You'll Find on This Page
Organized by capability so you can understand the type of work I do and the value behind each service.
Threat Intelligence & OSINT Cases
- Stalker identification & threat assessment
- Hybrid digitalβphysical threats
- Corporate espionage investigations
- Deepfake extortion containment
- High-risk online harassment cases
Executive Protection Case Studies
- Stalker at a public event
- Paparazzi interception & movement control
- Failed EP team audit β recovery operation
- Family protection during travel
- Emergency extraction from unstable environment
Digital Resilience & Privacy Cases
- Doxxing prevention
- Social media exposure cleanup
- High-risk profile digital hardening
- Travel-specific cyber safety programs
Risk Advisory & Travel Security
- Country entry risk for high-risk destinations
- Route-risk mapping and protective intelligence
- Hotel & residence vulnerability audits
- Global mobility programs for executives and families
Security Strategy & Provider Vetting
- Vetting and evaluating security companies
- Replacing failing EP teams
- Designing security programs for HNW families & studios
- Operational philosophy development for firms
Featured Case Studies
Short summaries showing real problems and real outcomes.
Stalker Threat Escalation: From Online Noise to Physical Approach
Threat Intelligence / Hybrid Threat
High-profile female client noticed increasingly aggressive online messages. Local police dismissed it as 'digital noise.' OSINT analysis revealed the individual was already in the same city, had visited two past event locations, and had attempted to purchase contact info from a venue employee.
Outcome: Stalker identified, threat classified as high, client movement modified, law enforcement coordinated. Incident prevented.
High-Risk Business Travel: Pre-Incident Avoidance in an Unstable Environment
Travel Risk Management / Threat Intelligence / Executive Protection Advisory
Executive scheduled for 4-day trip to politically unstable region for contract negotiation. Corporate security said 'low to moderate risk.' Real-time threat intelligence detected rapid escalation: protest coordination, airport targeting, and civil unrest within 48 hours of travel.
Outcome: Pre-travel advisory prevented executive from traveling into violent clashes, roadblocks, and airport paralysis. Trip rescheduled. Client remained safe and operational.
EP Failure at a Studio Event: Correcting Someone Else's Mistake
Executive Protection
Well-known studio hired a large EP team for a red-carpet event. They looked tactical. They were not competent. A photographer breached the inner perimeter due to poor positioning and an agent distracted by crowd optics.
Outcome: Repositioned agents, adjusted flow, corrected routes, stabilized event without escalation or visibility.
Family Office Digital Footprint Reconstruction
Digital Resilience
Family office reached out after repeated doxxing attempts, fake social media profiles, and leaked travel itineraries. Digital exposure was creating operational risk across multiple entities.
Outcome: Complete digital footprint cleanup, hardened devices, travel protocols, staff training. 14 vulnerabilities removed.
High-Risk Travel Advisory: Sub-Saharan Deployment
Risk Advisory / Travel Security
Client needed executive-level protection and intelligence for a 10-day trip into a politically unstable region. Real-time threat environment required continuous monitoring and adaptive protocols.
Outcome: Pre-travel brief, route-level intelligence, safe lodging protocols, cyber hygiene support, real-time threat updates.
Security Provider Vetting: When a 'Top' Firm Was the Real Threat
Security Strategy & Vetting
Celebrity family working with large LA firm that looked impressive but was leaking information through careless staff. Internal security became the vulnerability.
Outcome: Full audit, replacement program, policy redesign, covert culture screening, complete operational reset.
Sample Intelligence Reports (Redacted)
Clients often ask what actual reporting looks like. Below are the types of analysis you'd receive (structure, depth, and methodology) without sensitive details.
π Tactical Threat Intelligence Snapshot
π Full Intelligence Assessment (10β14 pages)
π Stalker OSINT Report (heavily redacted)
π Travel Intel Brief β High-Risk Region
π Event Risk Brief (executive-level)
π Digital Exposure & Doxxing Analysis
Each reflects real methodology. All sensitive content removed for client privacy and operational security.
How to Use These Case Studies
These are not "success stories." They're decision stories.
Clients hire me because the decisions I make under pressure determine outcomes...not the gear, not the vehicles, not the optics. If you see your situation in any of these examples, or you want to discuss your own risk profile, reach out. I don't oversell. I don't upsell. I tell you what you actually need, nothing more.
If You're Dealing With:
- β’ a stalker
- β’ escalated online harassment
- β’ travel to medium/high-risk regions
- β’ a failing EP team
- β’ security concerns you can't publicly discuss
- β’ building a real security program
β¦you can contact me directly. I handle every engagement myself. No junior analysts. No outsourcing. No Instagram operators.
Ready To Discuss Your Situation?
Whether you need protection, intelligence, or training, let's talk confidentially.
Response within 24 hours β’ All inquiries confidential