Mon-Sun 9:00 am - 5:00 PM (PST)
360-270-1287

Case Studies

Case Studies – Real Clients. Real Risks. Real Results.

Case Study: Hidden Risks Within the Inner Circle

Challenge:
A high-net-worth client requested a full assessment of his personal security measures—both physical and digital—to determine whether his current protocols were truly effective in today’s exposure-heavy environment.

What I Did:
Using a combination of open-source intelligence (OSINT), surveillance, and investigative methods, I conducted a thorough review of the client’s online presence, family activity, associates, and protection detail.

The investigation included:

  • Deep-dive OSINT analysis tied to his name, likeness, and known affiliations
  • Surveillance of behavior patterns across social platforms and online connections
  • On-the-ground observation of security habits and personnel

What I Found:
While the client himself maintained a strong level of operational security and practiced disciplined online hygiene, several vulnerabilities were identified—none of which originated from him directly.

  • Immediate family members were unintentionally sharing revealing details and interacting online with individuals that posed indirect risk
  • The client’s own Executive Protection Agent had been posting content that, when analyzed, exposed private residences, daily patterns, and the identities of key individuals within the client’s organization

Result:
I presented the findings along with a targeted mitigation plan, outlining specific adjustments to both personal protocols and team behavior. The client implemented the changes, significantly reducing his digital exposure and eliminating the critical points of failure created by those around him.

Case Study: Corporate Security Audit & Operational Overhaul

Challenge:
An international company, having recently updated their security program, requested an independent review to evaluate its effectiveness and uncover any remaining vulnerabilities.

What I Did:
I met directly with the client’s leadership team to discuss their concerns, assess their current security posture, and identify areas of potential failure.

The engagement included:

  • A comprehensive on-site inspection of the company’s headquarters
  • A full review of security protocols, personnel procedures, and access control systems
  • Evaluation of their Protective Operations team’s structure, training, and operational readiness

What I Found:
Despite the recent program update, several critical weaknesses remained.

  • The company’s protective staff were undertrained and lacked the necessary qualifications to manage high-level security operations
  • Core protocols were outdated, inconsistently followed, and insufficient to meet the company’s risk profile

Result:
I worked directly with the client to design a new, scalable security program tailored to their specific threat landscape. This included restructuring their Protective Operations team, onboarding qualified agents, and establishing new protocols for high-value asset protection.

Following implementation, the company secured the highest-value insurance policy in their industry—backed by the strength and credibility of the new security posture.

Case Study: Threat Investigation & Home Security Enhancement for Corporate CEO

Challenge:
A CEO of an international company received direct threats from an unidentified individual who had somehow obtained his personal email and home address. The subject claimed he would hire mercenaries to kidnap the client and his family.

What I Did:
I met with the CEO to review the threats, gather documentation, and establish the scope of exposure.

Using a combination of OSINT, handwriting and linguistic analysis, and targeted intelligence methods, I identified the subject behind the threats—along with his physical location, occupation, and digital footprint.

In parallel, I conducted a full security review of the client’s private residence to identify vulnerabilities in physical access, routines, and publicly available data.

What I Found:
The subject was located in a different country and, despite the alarming nature of the threats, was found to have no realistic means, motive, or capability to carry them out. He was ultimately identified as a disgruntled former customer of the CEO’s company, with no known history of violence, international travel, or financial resources.

Result:
The client received a detailed briefing on the subject, including risk assessment and documentation, along with a list of recommended upgrades to his home security systems and digital privacy practices.

The client implemented the suggestions immediately. A follow-up several weeks later confirmed that no additional threats had been received, and the subject had ceased all activity.

Case Study: Digital Exposure Audit & Driver Risk Evaluation

Challenge:
A high-net-worth client requested a comprehensive assessment of his online footprint and a professional evaluation of the personal driver responsible for his daily transport and safety.

What I Did:
Using OSINT and targeted investigative techniques, I conducted a detailed review of the client’s digital exposure—analyzing publicly available information, behavioral data, and patterns that could compromise security.

I also reviewed the personal driver’s background, training, and operational behavior. To assess real-world performance, I conducted covert surveillance focused on routine, awareness, and risk behaviors during transport.

What I Found:
Despite the client’s high-level privacy precautions, several online vulnerabilities were identified that exposed personal routines, locations, and other sensitive information.

The driver, while professionally presentable, had developed predictable patterns and demonstrated poor situational awareness. He had received limited training and lacked the tactical mindset necessary to manage potential threats in dynamic environments.

Result:
I presented the client with a clear, prioritized action plan that included:

  • Immediate steps to reduce digital exposure and correct online vulnerabilities
  • Recommendations for driver retraining or replacement
  • A framework for building a more resilient, low-visibility daily security routine

The client implemented the suggested changes, improving both his personal safety posture and the performance of his protective team.

Your situation doesn’t have to become a case study.
If you’re facing something similar, or just want to know where you’re exposed, reach out. I’ll assess your risk and build a plan that fits your circumstances.