Specialist Operations
Discreet, assessment-first operations for high-stakes situations. I coordinate or deploy vetted resources only when field action is justified.
Most Clients Start Here
Assessment-first. We clarify facts and exposure before moving into field operations.
Executive Threat Management
Assessment-first. Triage, risk picture, and options. I escalate only if field work is justified.
Targeted Intelligence Report
Focused OSINT/SOCMINT to surface facts, validate threats, and inform the decision to move into operations.
Intelligence Retainer
Ongoing monitoring and advisory while we scope potential field requirements and keep communications open.
Specialist Capabilities
Operator-grade work when the situation demands discretion, precision, and disciplined decision-making.
Counter-Surveillance & Detection
Surveillance detection routes, pattern-of-life analysis, anti-surveillance measures, and disruption of hostile collectors.
Sensitive Private Investigations
Discreet fact-finding, asset discovery, litigation support, and witness location with operator-grade tradecraft.
Crisis & Extortion Coordination
Structured response for extortion and credible threats; liaison with legal, insurers, and authorities; message discipline.
Evacuation & Secure Movement
Contingency planning, vetted drivers and teams, routing, and oversight for high-risk moves and extractions.
Kidnap Response Support
Advisory, communications discipline, and coordination with specialized resources. No ransom handling or unlawful actions.
Intelligence Collection
OSINT/SOCMINT/HUMINT tasking to map adversaries, validate intent, and guide operations with facts.
Hard Boundaries
Clear, non-negotiable lines that protect clients, teams, and outcomes.
- No hacking or illegal access
- No impersonation or social engineering pretexting
- No weapons claims or vigilante activity
- No bounty or harassment work
- Legal lane, compliance, and client safety first
Who This Is For
High-Net-Worth Individuals
Clients facing credible threats, extortion, blackmail, stalking, or requiring sensitive investigations that demand strict discretion.
Corporate Executives
C-suite leaders requiring counter-surveillance, competitive intelligence, crisis intervention, or emergency extractions.
Legal & Litigation
Law firms requiring private investigations, witness location, asset searches, or intelligence gathering for litigation support.
Crisis Situations
Individuals or families facing active threats or security emergencies requiring immediate professional intervention.
How It Works
1. Intake and Triage
Submit a brief or email. We assess urgency, suitability, and whether specialist operations are required. Secure channels available on request.
2. Assessment First
Most clients begin with Executive Threat Management or a targeted Intelligence Report to clarify facts, exposure, and options.
3. Scope and Legal Lane
Define objectives, constraints, jurisdictions, and communication protocol. NDAs standard; contingencies documented.
4. Execution and Oversight
Coordinate or deploy vetted resources, maintain disciplined updates, and provide written reporting when applicable.
Common Questions
Apply for Specialist Support
By referral and qualification only. Start with assessment; I escalate to field work only when justified.
Most Cases Start With Assessment
Before we discuss field operations, I recommend threat analysis and planning. Here's where to begin: