We got you covered.
Home Blog

Threat Assessment Teams and Their Value to Protective Intelligence for Executive Protection  

0
Threat Assessment Teams
Threat Assessment Teams

Protective operations haven’t changed much over the last two decades.  At its most basic level, you are paid to place yourself between your protectee and harm’s way.  Simply put, your job boils down to “prepare for the bad guy, see the bad guy, stop the bad guy.”  Some do it better than others, and while it seems simple, the numerous online video fails that reflect everything from “fists” to “eggs” being thrown at protectees would indicate it’s not.  Avoiding physical attacks is one of the many reasons we use every available intelligence resource in our proactive approach to protection.   

One significant change in the last 20 years has been the abundance and inclusion of protective intelligence (PI) resources for corporate EP teams.  PI in contemporary protective operations cannot be overstated. It is widely recognized that all protective operational coverage is fundamentally based on the “threat.” This fact underscores why every U.S. federal protective agency maintains a dedicated protective intelligence division to complete threat analysis, management, and assessment.  

Lacking the extensive resources available to government agencies, corporate EP teams must rely on internally developed intelligence resources and externally contracted intelligence vendors. This blend of protective threat intelligence is tailored to each company and team, reflecting their unique preferences, budgets, and needs.  Beyond available conventional intelligence tools, EP teams should also consider the use and integration of corporate Threat Assessment Teams (TATs).  As part of the continuity of business and crisis management planning for most corporations, TATs were developed specifically to address the potentially violent and adverse behaviors of employees.  This conduct negatively impacts business activities and is often directed at key stakeholders within the corporate leadership structure.      

Threat Assessment Teams 

In the last decade, TATs have become commonplace in most Fortune 500 companies.  Like many of the best practices used by corporate EP teams, TATs also incorporate best practices and recommendations from existing federal and public programs.  The U.S. Secret Service (USSS) is regarded as the leading authority in Threat Assessment management and best practices in the United States.  Through decades of experience, the agency has developed the Behavioral Threat Assessment Unit (BTAU) model, which is widely recognized for successfully supporting state and local law enforcement agencies in preventing targeted violence in public spaces and schools.  

This model is a valuable proactive and structured framework to identify, evaluate, and mitigate potential threats for sectors including law enforcement, corporations, religious organizations, and educational institutions.  Corporations have adapted this model within their own Threat Assessment Teams to identify and manage employee threat behaviors.  Key elements of the process and principles of the model that are applied to Threat Assessment Teams include: 

  • Comprehensive Data Collection: Early intervention is at the core of the BTAU’s model in managing concerning behaviors, emphasizing a managed outcome to the behavior that does not result in violence or other unwanted behaviors.  The collection of comprehensive information about potential threats supports early intervention and includes:  
  • Background Investigations: Collecting information about individuals who may pose a threat, including their personal history, past behavior, relationships, and any previous incidents of violence or criminal activity, is an important first step in the process.  While the government can store data forever, corporations are legally limited in their collection and storage of PII.  Always confer with legal counsel regarding the collection of personal information.   
  • Behavioral Analysis: A TAT should initiate a behavioral Threat Assessment in response to any concerning behaviors. These behaviors include actions or communications by an individual that are troubling or inappropriate and indicate a potential for violence. The information-gathering process by the Threat Assessment Teams is intended to provide a comprehensive picture of the individual’s behavioral history and current life circumstances and enables the team to make an objective assessment of the potential for violence.  TATs should also closely examine specific behaviors and patterns that may indicate an increased risk of violence, such as stalking, harassment, or threatening communications.   

Multi-Disciplinary Approach 

The planning and team composition for Threat Assessment Teams should describe the roles and responsibilities of  Threat Assessment Teams as a whole, each team member, and any associated community partners involved in the behavioral Threat Assessment process. This process involves collaboration among various disciplines and agencies, including: 

  • Interagency Cooperation: Working with local law enforcement, mental health professionals, social services, and other relevant external organizations to gather information and assess threats comprehensively. 
  • Expert Input: The model encourages engaging professionals from diverse fields, including intelligence analysts, contracted or staff psychiatrists/psychologists, legal counsel, HR, IT, and corporate security teams to analyze threats from multiple perspectives.  Many corporations also routinely contract services with outside experts who specialize in Threat Assessment 

Risk Assessment 

During the behavioral Threat Assessment process, the TAT should document all relevant information gathered.  Most corporations have internalized investigative processes, but regardless of how information is collected, the purpose is to make this information easily available for team members during the assessment.  There is also an emphasis on employing a systematic risk assessment process to evaluate the severity of identified threats including: 

  • Identifying Risk Factors: Evaluating factors that contribute to the likelihood of violence, such as access to weapons, history of violence, and current emotional or psychological state.   
  • Prioritizing Threats: Identifying the classifying threats based on their immediacy and potential impact, which helps in allocating resources and determining the appropriate response.  Teams should consider where the subject is on the Pathway to Violence (Calhoun and Weston 2003) or an analysis of past behaviors leading up to the current issue.  Threats may develop over time but are usually only introduced to the TAT when violence has occurred or is imminent.   

Behavioral Intervention 

Once the threat is assessed, the model emphasizes intervention strategies designed to mitigate the risk of potential violence. This can include: 

  • Preventive Measures: Implementing measures to reduce risk, such as increased physical security, employee safety education, managerial monitoring, direct intervention, and medical referral for individuals exhibiting concerning behaviors. 
  • Crisis Management: Developing plans to address potential crises, including immediate response strategies when a threat materializes. 

Ongoing Monitoring and Evaluation 

Threat Assessment is not usually a “one-and-done” process; it requires continuous monitoring and reassessment, including: 

  • Follow-Up: Regularly reviewing and updating assessments based on new information or changes in an individual’s behavior or circumstances.  It’s not uncommon for some cases to last years based on reoccurring or seasonal behavior patterns.   
  • Feedback: Creating mechanisms for feedback and communication among involved managers and supporting agencies to ensure that emerging threats are identified and addressed promptly. 

Training and Awareness 

The U.S. Secret Service also places a strong emphasis on training analysts and agents in Threat Assessment techniques, including: 

  • Awareness Programs: Educating personnel on recognizing warning signs of potential violence and effective Threat Assessment strategies.   
  • The Association of Threat Assessment Professionals conducts bi-annual training conferences to provide industry-leading training and development for its membership.  This training, combined with core educational programs, enables practitioners to proactively share essential insights through case management and studies. 
  • Community Engagement: Encouraging employee involvement and awareness to report concerning behaviors, fostering a collaborative approach to Threat Assessment.   

Threat Assessment Teams

Documentation and Reporting 

Centralized case administration ensures standardization in initiating cases, gathering information, and managing cases over time.  The model also emphasizes the importance of thorough documentation of all steps in the Threat Assessment process including: 

  • Record-Keeping: As mentioned, maintaining detailed records of assessments, interventions, and outcomes to inform future practices and improve the overall Threat Assessment framework.  Record keeping should be historical to provide the best available picture of behavior over time.   
  • Reporting Mechanisms: Threat Assessment Teams must establish secure reporting mechanisms to receive reports of concerning behavior from the public.   The TAT evaluates cases for imminent threats to life or safety and responds accordingly.  Establishing clear channels for reporting threats and sharing information among stakeholders is key to enhancing situational awareness and response capabilities.  Companies can promote anonymous reporting through online web portals, dedicated email addresses, and tiplines.   

When evaluating threats, Threat Assessment teams must consider the “totality of the circumstances” regarding the communicated or implied threat, the individual making the threat, and the circumstances surrounding the threat. Teams use the TAT model for evaluation but require timely notification and response to address threats as efficiently and accurately as possible.  In a very short period, TATs must determine how potentially serious a threat scenario may be. Teams must also carefully balance the implementation of proactive safety measures and responses while avoiding overreaction through biases to the problem.  In most cases, a TAT does not have all the information it would like before making a decision but adjusts responses as more information is developed.     

One method to overcome this information vacuum is to interview the subject of interest.  While there are many methods for completing subject interviews, an established industry best practice is the use of the WAVR-21 interview method (Stephen G. White, Ph.D. and J. Reid Meloy, Ph.D.).  This interviewing method is a 21-item coded interviewing instrument for the assessment of workplace violence.  While WAVR-21 is a good baseline for conducting interviews, the TAT should consider other factors that may contribute to the likelihood of targeted violence.   

Contributing Factors to Targeted Violence 

While there are numerous models for the attack cycle, there is no exact science as to the probability of an attack.  There are too many variables that exist to predict all human behavior accurately.  TATs examine and carefully consider influencing factors that have statistically contributed to known incidents of targeted violence, including: 

Context Themes in Threat Assessment 

  • Stressors: 49% of mass shooting subjects had problematic financial issues before their attack (Source: FBI).  Various stressors in an individual’s life can contribute to heightened risk factors, including work pressures, financial difficulties, relationship problems, and significant life changes. Understanding these stressors is important in assessing an individual’s potential for violent behavior or other harmful actions.  Practitioners should evaluate the life circumstances of the subject with Maslow’s Hierarchy of Needs to identify key social deficiencies that may contribute to a violent act.      
  • Home Life: An individual’s home environment has a significant impact on their overall well-being. A chaotic or abusive home life can exacerbate existing mental health issues and lead to maladaptive behaviors. Assessing the dynamics of a person’s home life is essential for understanding their behavior and potential risks.   
  • Mental Health Issues: 62% of mass shooting subjects exhibited or were diagnosed with mental health issues (Source: FBI).  I would argue that anyone who participates in a mass shooting is mentally ill. Still, mental health concerns, such as depression, anxiety, or personality disorders, can significantly influence an individual’s behavior.  A history of untreated or poorly managed mental health issues may increase vulnerability to engaging in violence or other harmful behaviors. While mental health issues may have historical roots, they can also develop rapidly without warning and progress quickly if not recognized early.   Teams who conduct interviews with employees who are exhibiting mental health issues should be extremely cautious and should always have significant training and experience.    
  • Criminal History: The best indicator of future behavior is past behavior.  An individual’s past criminal behavior, particularly related to violence, serves as a critical indicator of future risk. Understanding the nature and context of any criminal history can provide valuable insights into potential threats. 
  • Interpersonal Difficulties: Challenges in relationships with family, friends, or colleagues can lead to frustration and isolation. Individuals struggling with interpersonal difficulties may be more prone to express aggression or engage in harmful behaviors.   
  • Lack of Consequences: A history of negative behaviors that have gone unpunished can reinforce future negative actions. When individuals do not face the consequences of their actions, they may feel emboldened to escalate their behavior, leading to increased risks of violence or destructive behavior. 

Behavioral Themes in Threat Assessment 

  • Substance Abuse: The misuse of drugs or alcohol can impair judgment, increase impulsivity, and exacerbate underlying mental health issues, significantly increasing the risk of violent behavior. 
  • Domestic Violence: National statistics indicate one-third of workplace violence incidents begin as domestic violence incidents.   42% of women murdered in the workplace are killed by a domestic partner or spouse (Source: FBI).  41% of attackers had a history of domestic violence (Source: USSS).   16% of active shooters were motivated in whole or in part by a grievance related to domestic violence (Source: U.S. Secret Service Threat Assessment Center).  Patterns of domestic violence can indicate broader issues of control, aggression, and instability in a person’s life, and individuals with a history of domestic violence can always pose a threat to others. 
  • Aggression, Violence, and Abuse: Observable patterns of aggressive behavior, whether verbal or physical, can serve as significant warning signs. Understanding the context and frequency of such behaviors is critical in risk assessments. 
  • Inconsistency: Erratic behavior or inconsistent responses to stressors can suggest instability. Individuals who exhibit unpredictable behavior may pose a higher risk to themselves and others. 
  • Interpersonal Difficulties: Persistent issues in relationships can lead to feelings of frustration and isolation, increasing the likelihood of aggressive or violent responses. 52% of attackers reported experiencing feelings of humiliation, and 69% of mass shooting subjects experienced a “humiliating interpersonal event” (Source: FBI). 
  • Interest in Violence and Weapons: A fascination with weapons or violent behavior can indicate potential risk. This interest, particularly when coupled with other concerning behaviors, should always be taken seriously. 
  • Concerning Communications: Threatening or alarming communications, whether verbal or written, can serve as red flags. It is essential to analyze the content, context, and frequency of such communications to assess risk. 
  • Stalking, Harassing, and Bullying: Patterns of stalking or harassment can indicate an individual’s inability to respect boundaries and can escalate into more severe forms of violence. 
  • Extreme Beliefs: Ideologies that promote violence or intolerance can influence behavior. Individuals with extreme beliefs may justify harmful actions against others.   
  • Desperation and Despair: Feelings of hopelessness or desperation can drive individuals to engage in extreme behaviors, including violence, as a perceived means of escape or expression. 
  • Isolation: In nearly every case of targeted violence recorded in the United States, the attacker indicated they feared social isolation (Source: FBI).  Social isolation can exacerbate mental health issues and increase vulnerability to engaging in harmful behaviors. Individuals who feel disconnected from others may resort to violence as a means of personal expression. 
  • Planning and Final Acts: On average, active shootings by former employees occur within a two-week window following their termination.  Evidence of premeditated planning for harmful actions, such as detailed notes or purchases of weapons, is a critical indicator of potential violence. These occurrences are often reported by concerned family members.  Recognizing signs of planning can facilitate early intervention and prevention of targeted violence.   

Summative Themes in Threat Assessment 

  • Motive: Understanding the underlying motives for potential violence is essential in the TAT process. Motives can range from revenge and anger to ideological beliefs or a desire for attention. 
  • Elicits the Concerns of Others: When someone’s behavior change is recognized and communicated by those closest to them, it should not be dismissed and should raise alarms.  Individuals who elicit concern from peers, family, or colleagues often exhibit behaviors or statements that indicate the potential for violence.  These concerns should be taken seriously and investigated immediately.   
  • Access to Weapons: Access to firearms or other weapons significantly increases the potential for violence.  This issue often comes under scrutiny in the United States; however, if firearms are not available, other weapons are used by attackers.  The use of knives in targeted attacks is regularly seen in the United Kingdom, where firearms are limited.  Assessing an individual’s access to weapons is a critical component in evaluating the risk of harm. 

Conclusion 

Being an Executive Protection Professional requires attention to both physical and communicated threats.  While physical threats can often be avoided using time and distance, other risks require collective intelligence analysis to manage developing threats.  Using the Threat Assessment Team model with the managed analysis of behavior between context, behavioral, and summative themes provides a comprehensive framework for addressing and understanding potential hazards.      

By recognizing stressors, behavioral patterns, and underlying motives, Threat Assessment Teams can better assess threats and implement appropriate interventions for preventing targeted violence while ensuring the safety of protectees, communities, and workplaces.  EP teams should integrate this valuable resource into their protective operational intelligence to mitigate identified threat behaviors directed toward executives and other employees.   

About the Author: Kevin Dye is a retired U.S. Secret Service supervisor with over 30 years of executive protection and supervisory protective operations, including assignments on the prestigious U.S. Presidential Protective Division during two Presidential administrations.  He is currently Senior Manager of Executive Protection with the Procter and Gamble Company, providing protective operational coverage in over 180 countries worldwide. 

Travel Security – Aircraft, Motor Vehicles, and More

0
aircraft

I thought I’d wait to write this article on travel security, specifically the air travel segment since there was so much erroneous and outrageous response to the recent aircraft collision between the US Army Helicopter and a commuter aircraft in Washington, DC on social media in the EP industry.  

Whether you are flying, driving, or even taking a train with your client there is only so much you can control and plan for. But there are things you can do that will help you have a fighting chance of survival for you and your client.  

Motor Vehicles

The greatest risk to your client is when they are traveling in a motor vehicle, most incidents occur around arrivals and departures where incidents can happen as you’re exposed between one secure location and the next. Your client has a greater chance of injury during a motor vehicle accident than being attacked by an assailant. We spend more time moving in motor vehicles as a regular habit and part of our day. How many of us look at the prospect of what we’ll do in the event of our vehicle and our client being involved in an injury-related auto accident?  

Then what? What do you need to know? 

Are you allowed to accompany your client into the ER? What happens if you are also injured, who do you notify if you’re able to do so?  

  1. What is your protocol for protecting your client’s privacy, and dignity at the scene where they may be removed from the vehicle on a stretcher or have their clothes partially cut away to administer medical aid?  
  2. Are you trained to render aid until medical resources are dispatched to your location?  Do you have a trauma kit that travels with you and the client? Do you know what is in it? 
  3. What is your protocol for this event, what trauma level one hospital is closest? What local hospitals does your client have a relationship and doctors at?  
  4. What known medical conditions does your client have? Medications? 
  5. Do you know if your primary hospital will admit your client under a pseudonym or keep their names confidential from any press inquiries while in the hospital?  Will they keep outside callers from reaching their hospital room and protect the clients’ room numbers from the public? How will I post their hospital room for security purposes? 
  6. Who is responsible for staying/responding at the scene to talk to the police and recover any of the clients’ personal effects, or confidential items they carry and may have lost in the vehicle during the accident?  

All these questions will be case-by-case situations depending on where (home local area for client) or in a different geographical area on travel. However, a basic understanding and advance planning should be in place before you are in an incident.  

Clients and Personal Vehicles

I had a client who was involved in a non-injury accident that damaged their personal vehicle as we followed them to work. (They insisted on driving their own car and having the security element follow them.) The accident disabled their car, which had to be towed from the scene.  The principal was quickly assessed at the scene by our EP agents, and placed into the following vehicle out of traffic, and for his privacy. 

The EP director was notified, The EP agents secured their client’s Driver’s license and registration, interfacing with the local police and another vehicle driver. The EP agents already knowing the place the client had their vehicle maintenance done, called for a tow vehicle and had the vehicle towed to the shop. Once the client was released by local authorities, and no injuries to the client were verified on scene the client was transported to their intended destination by EP.  

An incident report was completed to document the actions taken on scene by the EP agents, what treatment if any was done, and general observations about the client’s physical, mental, and emotional assessment. Where the vehicle was towed, and photographs of the client’s car were taken by EP to document the scene. EP knew what hospital the client would go to if necessary and how to contact the client’s physician. We had an arrangement with the local hospital to protect our client’s privacy and for being admitted to the hospital. No one was injured in the accident and nothing more came of the incident. By putting our client into the following vehicle, our client was protected from being photographed at the scene by outside onlookers who inevitably show up to see what is going on with the police present.  

Advances for Travel

When our team does our advances for travel, we identify the local level one trauma hospital (or highest-level treatment hospital) and determine what their policies will be if our client must be taken to the hospital. Can we accompany them into the ER and liaison with medical staff during treatment? Can we arrange for their presence, identity, and room number to remain confidential? Is there a UHNW/Celebrity liaison staff member at the hospital and their number for coordination? We found many places do have someone assigned to make these types of arrangements for your client whether it’s a security staff member or a dedicated hospital person depending on the hospital. 

Other considerations for your advance team to consider for your armed teams are hospital emergency room entrances. 

Most US hospitals’ ER entrances are manned by security officers operating metal detectors and /or X-ray machines. By doing your due diligence and liaison with the hospital staff and security department you can avoid an incident where you are unnecessarily detained or delayed due to your armed team members having to negotiate security and metal detectors for the first time during an emergency. 

 If the closest hospital you have access to is less than a level one trauma center, do they have a heliport for transfer to a level one trauma center and where will that transport take your client? Where is that Level One trauma center located, how far? 

For non-urgent medical care beyond your medical scope of practice, we also inquire as to whether the local hotel we are staying at has an on-call physician who can be summoned to address and prescribe medications for illnesses contracted during your visit that don’t require an ER or hospital visit.  

The aftermath of a car accident with injuries will be chaotic, airbags will deploy, and unsecured items will fly, including your cell phone. You will likely incur some sort of injury from airbags (especially if you’re driving, or front right passenger), possibly flying glass, or impact-related body trauma. So may your client. Having a plan and doing some tabletop or dry run practices for validating an SOP is crucial to working through an incident before it happens.  

Air Travel  

All of us will at some point travel with a client on either a corporate jet or a commercial airliner. After seeing the social media responses by some people to what should be done, or how their people are instructed to operate on an aircraft I wanted to address this subject. A lot of good folks in the industry have made similar observations but I wanted to dive into the subject a little more.  

My client utilizes a corporate jet most of the time in their travels with some exceptions. One of the things I came to understand early on in my experiences with our pilots and contract jet company was they have their own SOPs and resources that can help you in certain emergencies you could experience on the plane or in flight.  

The questions I asked my pilots about what resources they had at their disposal initially surprised me but made sense and changed my approach to some of my air travel planning.  

Does your pilots and airplane provider company do crisis management planning and tabletop exercises?

If so, you might want to see if you can join in or observe them to see how they plan on handling things like a crash, disabled aircraft on the ground, unscheduled stop due to mechanical issues, in-flight medical emergencies, and how to use the emergency escape exits on the plane as well as under what circumstances will you use them.  

I learned that our aircraft provider has a medical hotline they can call while in flight and talk directly to a contracted emergency doctor on the ground. I also learned that the aircraft (and many other private providers) have a more advanced medical kit on board that contains some controlled medications that can be accessed during a medical emergency while under the care of the medical authority on the ground. Using and breaking the seals of this kit requires crew documentation and justification after the incident.

Also, the presence of an AED that is aircraft friendly and where is it located. I also learned that medical care and the utilization of emergency doctors would be my responsibility as pilots would need to operate the aircraft for landing. One of the questions we had to answer was who are we notifying on the ground of our emergency from our company? How will we rally ground assets for assistance for our clients prior to our arrival to facilitate our transportation with the ambulance or to a hospital? We found we could use our GSOC as a dispatcher for corporate messages and responding to company resources. We found that the primary contract security company we use for hiring drivers and additional EP personnel has a GSOC we can reach out to and scramble assets to most locations where we would need them. 

Other questions we asked were what are our plans if our aircraft experiences a mechanical failure and is forced to land in another location other than the intended destination? Is there another corporate plane available and if so, how long will it take to respond? Are we now flying commercial, and if so from what airport? Can I get local assets to support my transportation or am I suddenly renting a car and driving my client from the FBO Airport to a commercial airport? For armed teams who fly with their clients, you also must consider the issue of now checking your firearms for a commercial flight, did you bring a TSA-compliant firearms box to transport your firearm? Does your luggage have a lock to be in compliance with the transportation of the firearm? 

These are problems you don’t want to be working through during an emergency, preplanning and talking these problems through with your team, pilots and company Crisis management leaders is a good start. Finding out what your resources and options are before you need them is critical. Have an SOP or a template you can use in the event you experience a problem so you’re not flying by the seat of your pants any more than you will in the moment.  

Flying Commercial

If you’re flying commercial, most of the time I’ve found myself flying in a different class of cabin than my principal. Know where they are sitting in relation to your seat. Instruct them on what to do in the event of an emergency evacuation, and that you’ll attempt to reach them to come and assist them in response. But if it’s a true evacuation to deplane with the instructions of the crew. During a normal deboarding of the aircraft, they will more than likely exit the aircraft ahead of you, ask them to wait for you after exiting the aircraft near the gate check-in point.   

Commercial aircraft have very similar medical kits, AEDs, and oxygen for emergencies. Most airlines will have the same arrangement with a medical doctor on call via aircraft communications to aid in in-flight emergencies. Your flight will be manned by trained flight attendants who know the medical procedures and where these items are stored. I carry a basic trauma kit with me, along with basic comfort OTC medications like Imodium, Tylenol, cold medicine, Benadryl for allergic reactions, and aspirin for heart attacks. TSA doesn’t like the standard emergency shears, so I carry a TSA-compliant Variant One HUK which will cut off clothes, seat belts, and tape. It’s the size of a credit card and has a curved blunt end blade. I carry extra flashlights, light sticks, zip ties, and a cellphone battery charger for emergencies.  

I generally will strike up a conversation with one of my flight attendants when flying to ask what I can expect for resources during an emergency on their aircraft.  

Most aircraft offer complimentary WIFI communications /messaging services on the aircraft which will work with WhatsApp, Messenger, iMessage, or Signal you can use for emergency or routine communications with your support team on the ground to coordinate your travel or emergencies.  

I’m not even going pretend to try and address emergency evacuations from a commercial aircraft, you and your clients are going to be scrambling to an exit as are most of the aircraft passengers. Even with your best intents and training chaos is going to ensue. Advising them to find a rallying point where you can find them in the chaos will be helpful. If they get separated on the ground or a water evacuation where you either don’t show up or can’t get to them, tell them who they should call in your company or team to update their location for emergency response.  

Give your client a colored light stick before the flight, they can activate in the crowd so you can locate them. It’ll also give rescue operators additional visual points to find them. I was just watching the aftermath of the commuter aircraft which crashed landed and flipped upside down in Canada. 

If you have ever experienced a rollover simulator in training, now not only are you hanging upside down suspended by the lap belt (hopefully not flying around the cabin) but the seat belt latch will need to have the weight of your body off the belt to release it. (Not to mention the disorientation of being rolled over upside down.) This means you may need to have someone help you or be able to push yourself up off the ceiling to release the belt latch if you can even reach the ceiling.  Just something to think about, not something any of us train for every day.  

Final Thoughts on Travel Security

We are all human and will have varied levels of physical and mental abilities to react during a crisis. Things like knowing how the aircraft doors operate and where the closest emergency exits are for you and your clients is a good beginning. Doing some planning, training, tabletop or mental rehearsals will help you further. As I found out in the aftermath of an injury accident I was involved in last year, expect to self-rescue, no one is coming to save you.  

Getting Duty of Care Right

0
duty of care
duty of care

On December 4th, 2024, a misguided and mentally unstable person, assassinated Brian Thompson, the CEO of United Health Care. To date, there is no evidence that Thompson was targeted for any reason other than his role as CEO of a major insurance company. Regardless of someone’s personal views about the insurance industry, reasonable law-abiding citizens agree killing a company’s employees is reprehensible. The reactions to this abhorrent crime are as equally shocking as the crime itself with certain elements of society lauding the suspect, Luigi Mangione, as a hero. This “reputational attack” has become a watershed moment in the EP industry. 

In discussions with my industry peers since the attack, there is widespread agreement that companies are increasingly looking to augment or implement EP protection for their CEOs. At the risk of sounding callous, this heightened attention is welcomed only because the industry has been underutilized for many years. The reason for these changes is quite clear but…

…Is adding EP protection for the CEO the right approach?

I have had countless interactions with current and new prospective clients requesting this singularly focused service. When queried, all stated fear of their CEO becoming a target because of negative views towards their company’s products, services, or associations. One financial institution shared they had received death threats in corporate inboxes because of investments in Israeli companies. No one was specifically mentioned in these threats, but it was clear the writer attributed the conflict in Gaza as directly related to the investments and someone should pay with their life. 

If we turn our attention towards the threat actor(s) for a moment, how can we ever stop such attacks? Mangione was outspoken about his dislike of the insurance industry but again there was no evidence he directly targeted Thompson. What if United Health Care had already had a robust EP program in place for Thompson prior to the attack?

Mangione went to great lengths to secure his getaway, so it does not appear he was ready to die for his cause. It is reasonable to assume this well-educated adversary would have found another target. Corporate websites are full of information about organizational structure, often with complete biographies. Would this impact have been any less if it had been another United Health Care executive or board member? 

“The duty of care is a fiduciary duty requiring directors and/or officers of a corporation to make decisions that pursue the corporation’s interests with reasonable diligence and prudence. This fiduciary duty of care is owed by directors and officers to the corporation, not the corporation’s stakeholders or broader society.”1 

The main driver for the implementation of any EP program must be the duty of care that is applied in a risk-managed approach.

The legal interpretation can be distilled to being reasonably prudent given the information that is available. If your company receives an e-mail stating dissatisfaction with a product or service, “You guys suck!” does not constitute a full EP detail for the entire C suite! That said, with the recent assassination and the troubling trend of online violent rhetoric becoming a societal norm, organisations are encouraged to focus on better understanding the threat towards their organisation in a more holistic fashion.  

Specifically, an EP program to counter these reputational attacks should consider the following: 

1) A collection strategy to gather negative sentiments towards the organisation and its employees.

The strategy should harness some of the latest technology that can ingest and filter sentiment from a variety of social media platforms. Valuable intelligence can also be gleaned from customer service departments that often deal one-on-one with client issues. Ideally, creating an awareness program with clear parameters for reporting ANY threatening behaviors. Unfortunately, we have become conditioned to certain online behavior making it easy to write off as benign. 

The collected data should be examined regularly by personnel with appropriate training in threat recognition and online investigation. As the program matures, a trustworthy baseline will be established that quantifies the sentiments towards the organisation as well as identify outliers who make direct or indirect threats. 

The EP team should be apprised daily of the current “temperature” of the sentiment towards the organisation, and any direct references to employees and/or the employee’s families. This intelligence should also be shared with the organisation’s site security team(s) so they can adjust the protective posture accordingly. 

2) All risk assessments for employees in scope should appreciate the collected threat data.

Conducting a risk assessment for an individual employee or certain corporate events is not a new activity for an EP professional. The nuance here is the risk assessment should expand much further than the classic C suite or board. I am not suggesting every single employee should have a risk assessment for a variety of reasons. Treat actors planning an attack on the company’s reputation are looking to make a statement of some kind. Attacking the intern in the mail room may have tragic consequences but it’s not going to bring the issue the notoriety they desire.

That said, you may have employees that have little or no public profile yet they may have a temporary duty that raises their profile. As an example, you may have a mid-level employee who is an SME in a certain area and they are asked to present at a public event. EP teams may wish to consider this other segment of employees when assessing risk for an event or corporate travel.  

3) EP service should be provided at a variety of flexible levels.

The level of service provided should be aligned with the risk assessments, ranging from full detail in a high-risk environment to very light detail or no EP protection required at all. Again, this is nothing new in this industry yet presently there is an unhealthy focus on CEO roles vice who would be considered a viable target to embarrass or harm the company.

And yes, there are very high-profile executives who work for companies that attract polarized views. These individuals may always require 24/7 EP protection but that is not the majority -not all CEOs run Tesla, Amazon, or Meta. Nor would that approach be sustainable for the business if applied to all executives.  

There is a trust dividend for EP providers who can balance the provision of a tiered protection model for their employees in scope. The application of a specific level of protection is tied to the risk assessment that is informed daily with collected and analyzed intelligence. I wouldn’t recommend daily changes to a protection level for an employee but if it’s been months since there is any active threat intelligence, consideration may be given to moving an employee (or group of employees) to a lower level.  

In summary, should changing the way your organisation manages the security of its employees due to the Thompson assassination, ensure you build the new or enhanced program with the right focus in mind.

You will highly likely end up adding or augmenting protection for your CEO and others who are publicly facing. Following the risk-based approach vice simply adding one individual based on role description will do far more to protect the organisation. It will also be much easier to articulate a duty of care approach should the organisation need to defend its EP program’s positioning. 

To all EP operators – be safe in your duties! 

1 Cornell Law School – https://www.law.cornell.edu/wex/duty_of_care

7 Bodyguards Who Have Sued Their Celebrity Clients

0
Bodyguards Who Have Sued Their Celebrity Clients
Bodyguards Who Have Sued Their Celebrity Clients

In executive protection, building and maintaining relationships with principals is everything. But what happens when those relationships go sour or even go to trial? Here are examples of 7 bodyguards who have sued their celebrity clients for lost wages, unsafe work environments, sexual harassment, and more. 

7 Bodyguards Who Have Sued Their Celebrity Clients

These are the six most notable cases of bodyguards who have sued their celebrity clients, their motives, and how those lawsuits have been resolved. 

#1 Eugene Arreola and Miguel Sanchez vs Johnny Depp

Two former bodyguards, Eugene Arreola and Miguel Sanchez, have filed a lawsuit against Johnny Depp, alleging unpaid wages, wrongful termination, and a hostile work environment. 

Arreola, a retired LAPD detective, and Sanchez, a career bodyguard, claim they were forced to work in unsafe conditions. Their duties allegedly included supervising “unstable individuals,” chauffeuring minors in vehicles with drugs and open alcohol containers, and handling situations beyond a bodyguard’s role.

The lawsuit, filed in California Superior Court on May 1, 2018, sought compensation for unpaid overtime, missed breaks, and damages for psychological distress.

The plaintiffs said that despite working for Depp for years, they were improperly classified as independent contractors rather than employees, depriving them of proper wages under federal and California labor laws. They claimed they were denied overtime pay and rest breaks despite being promised full-time employment under Depp’s production company, Scaramanga Bros. Inc.

When Arreola and Sanchez raised concerns about their working conditions, they say they faced retaliation. Arreola’s hours were cut, while Sanchez was denied time off for a family medical issue.

Despite their grievances, both men say they initially enjoyed working for Depp but ultimately left due to an increasingly toxic and unsafe work environment.

Court documents indicate that the bodyguards reached a conditional settlement that resolves the matter but settlement details were never released.

#2 Fernando Flores vs Britney Spears

Former bodyguard Fernando Flores filed a lawsuit against Britney Spears, accusing her of sexual harassment and emotional distress.

Flores alleged that Spears repeatedly walked around nude, engaged in sexual acts in his presence, and made unwanted advances toward him. He also claimed she had violent arguments with her boyfriend in front of her children and acted inappropriately around them.

The lawsuit further accused Spears of punishing her sons with a belt, though Kevin Federline’s lawyer, Mark Vincent Kaplan, dismissed these claims as baseless and financially motivated. Kaplan stated that the accusations had been previously reviewed and found unsubstantiated.

Flores, who worked for Spears from February to July of 2010, also alleged that his security firm employers ignored or mocked his complaints about the singer’s behavior.

The lawsuit was settled in 2018, but settlement details remain undisclosed.

#3 Moshe Benabou vs Justin Bieber 

Justin Bieber’s former bodyguard, Moshe Benabou, filed a lawsuit against the singer and BT Touring LLC, alleging assault, battery, and labor law violations.

Benabou, who worked for Bieber from March 2011 to October 2012, claimed the singer verbally and physically attacked him before a concert. He alleged Bieber punched him repeatedly in the chest and upper body after mistakenly believing Benabou was keeping a member of his entourage away. Following the incident, Bieber allegedly fired him on the spot.

The lawsuit also accused BT Touring LLC of violating California labor laws by failing to pay Benabou overtime, wages, and earned vacation pay. Despite working 14–18 hours a day, seven days a week, Benabou says he was misclassified as a salaried employee and denied overtime.

His attorney argued that the case highlighted an abuse of power in employer-employee relationships and sought fair compensation and workplace protections.

The dispute was settled in 2014 and Bieber’s attorney at the time stated: “The matter has been resolved to the satisfaction of both parties, and the case has been dismissed.”

#4 Carlos Christian vs Lil Wayne

Lil Wayne’s former bodyguard, Carlos Christian, has accused the rapper of assault and making threats with a semiautomatic rifle. Christian originally filed a lawsuit in December 2023 and expanded on his allegations in a new legal filing.

Christian, who provided security for Lil Wayne several nights a week in 2021, said the rapper wrongly accused him of taking photos before allegedly attacking him. According to Christian, Lil Wayne punched him in the ear and confronted him with a rifle, shouting, “Why the f— you takin’ pictures?”

The bodyguard, who was armed at the time, insists he never pulled his weapon. After the altercation, Christian reported the incident to the police, claiming Lil Wayne threatened him with an AR-15.

Lil Wayne denied all allegations. His legal team argued that Christian was much larger than the rapper, was armed during the confrontation, and even shoved the rapper. They also pointed out that Christian continued working as a security guard for another company months later, despite claiming severe emotional distress and PTSD.

The lawsuit remains ongoing and Christian is fighting to keep the lawsuit from being tossed out.

#5 Marc McWilliams vs Kris Jenner and Kourtney Kardashian

McWilliams, who worked for Kris Jenner, Kourtney Kardashian, and David Shield Security from 2017 to 2019, claimed Jenner made unwanted sexual advances toward him. He detailed an alleged October 2017 incident in which Jenner groped him while they were in her Bentley, touching his thigh and groin in a manner he described as “overtly sexually offensive.” Jenner’s legal team has denied the accusations.

McWilliams also alleged he was fired in retaliation for complaining about Jenner’s behavior. He claims he first reported the alleged harassment in May 2017 and that Jenner later cut his work hours before he was ultimately dismissed in September 2019.

In 2023, McWilliams filed to dismiss his sexual harassment lawsuit against Jenner after three years of legal battles.

According to court documents, Marc McWilliams requested to dismiss his “entire action” against all parties, including Kourtney Kardashian, Armor Protection Services, and David Shield Security.

He asked to dismiss with prejudice, meaning he cannot bring the issue to court again. It is unclear whether there was a financial component to the dismissal.

#6 Eduardo Andres Torres Martinez vs Floyd Mayweather

Floyd Mayweather is being sued for an alleged assault at Yard House in L.A. Live, with the plaintiff, Eduardo Andres Torres Martinez, seeking $3.3 million in damages. The lawsuit claims that Mayweather ordered one of his security guards to physically confront Eduardo after he began recording the boxer’s arrival at the restaurant.

Eduardo alleges that on February 10, 2022, Mayweather’s presence caused a stir among restaurant patrons, leading him to pull out his phone to capture the moment. He claims that Mayweather then instructed his bodyguard to intervene, resulting in Eduardo being struck and knocked to the ground. The lawsuit also states that the bodyguard attempted to take his phone.

Eduardo is suing for assault, battery, intentional infliction of emotional distress, and negligence. His lawsuit demands $1.5 million in general damages, $40,000 in medical expenses, $500,000 for future medical costs, $300,000 for lost future earnings, and $1 million in punitive damages. Additionally, the owners of Yard House are included in the suit for alleged negligence in handling the situation.

Mayweather has denied all allegations and has sought to have the case dismissed. His legal team argues that Eduardo’s actions contributed to the incident and that the confrontation was not foreseeable as harmful.

This is not the only legal challenge Mayweather faces. A separate lawsuit was filed by William Rodriguez-Mercado, who claims that Mayweather’s security team assaulted him for filming the boxer jogging in public. William alleges that he was physically attacked, knocked unconscious, and had his phone confiscated. He is seeking over $15,000 in damages.

These lawsuits could impact Mayweather’s reputation and highlight concerns about the conduct of his security team. As the cases progress, they may set a precedent for the responsibilities celebrities bear regarding their entourages’ actions in public settings. The case is still ongoing.

Longevity in Close Protection – Does Age Matter?

0
Does Age Matter?
Does Age Matter?

Written by Tibi J Roman

Should age be a factor in determining when it is time to step back from working in close protection and specifically from being a bodyguard?

My ambivalent response – Well, Yes and No.

After saving the US president’s life a reporter asked Frank Horrigan, why are you retiring from the Secret Service?

Frank replied, “Well because I hate desk work and I’m too old to go running along the limousines, and thanks to you people plastering my picture up everywhere I’m no good for undercover work” …. The quote is taken from the movie “In the Line of Fire” starring Clint Eastwood, as dedicated Secret Service agent Frank Horrigan whose character was in his early 50’s.

It is recognized that “age” has the potential to be a sensitive topic, yet I have never heard this discussed during executive protection online discussions. It certainly is not a pro-recruiting topic for businesses/organizations wishing to promote executive protection training. It is recognized that some individuals retiring from law enforcement, the military, and other government enforcement positions transition into executive protection work when they are older however they may have special skill sets that will serve them well in performing executive protection duties as a civilian.

I had never given age much thought until we had our Prime Minister visiting Vancouver. As the division security file coordinator I was advancing to a venue when I received a phone call from Peter, a good friend and a former Royal Canadian Mounted Police (RCMP) protective services officer who had retired. His call was more of a rant – What he stated was this,

I just passed the PM’s motorcade on Cambie Street, I see that you guys are still using the same old GERIATRIC drivers.” I just laughed saying “I’ll call you back” … click.

Peter made a valid point, all the motorcade drivers were in fact older, and their ages were all north of 50.

Why this Happens – When you are the security file coordinator planning a VIP visit you want a smooth, safe, and uneventful visit. To play it safe you reach out to your seasoned VIP trained resources with lots of experience. This may include seconding resources from other units. These individuals are typically older. I want to add that it is important to develop your protective resources and to accomplish this you need to provide learning opportunities for your staff using good sense. For example, you should never pair or use an inexperienced motorcade commander with a new or inexperienced lead security vehicle (S1) driver.

When you choose to embark on a new career there are prerequisites or skills that you are expected to BRING to the new position and maintain. For example, if you start a career in executive protection, you must have a valid driver’s licence on day 1. Being physically fit should be another “must BRING and maintain” to the new position.

At What Age Should You No Longer Perform Bodyguard Duties?

In the private sector, there are no obvious age restrictions limiting your ability to perform bodyguard duties however there can be some limitations that include age (directly and indirectly) for executive protection professionals working within government /law enforcement. For example – I was fortunate to be a part of 2 visits by Singapore’s President S.R. Nathan. One of the visiting foreign security officers from Singapore advised me that they can only be a bodyguard until the age of 37. This pertained to working on the Presidential and Prime Minister’s security details. At that time, I was one of the RCMP bodyguards in my mid to late 40’s.

When I was a police officer in the RCMP working full time in Protective Services there were no age restrictions however for some specialized units such as ERT, UN Missions, and Protective Services (VIP Security), you were required to pass the Physical Ability Requirement Evaluation (PARE) test meeting the 4-minute standard.

The PARE is an occupational test used to measure an individual’s ability to perform the physical demands of Police work (in our case close protection). I am certain that most individuals working in executive protection will agree that close protection duties can be physically demanding. In the aging process, some individuals may find it a challenge to meet the 4-minute requirement. Once you were on the protective (VIP) unit you were required to pass PARE annually, if you failed to meet the 4-minute standard the policy was in place that you were not supposed to perform bodyguard duties until you were able to meet the standard.

Age and Its Impact on Your Fitness Level

As we age, we typically decline in the following 4 key areas (used to measure our fitness level.)

  1. Aerobic fitness (how well the heart uses oxygen).

  2. Muscle strength and endurance (how long & hard muscles can work).

  3. Flexibility (joint ability to have a full range of motion).

  4. Body composition, (how much fat, bone, and muscle are in the body).

Pay attention to your Waist circumference (for most individuals this expands with age)

If the size of your waist, called the circumference, is greater than your hips, you carry more weight above the hips. This means you have a higher risk of heart disease and type 2 diabetes.

The risk is even greater for women with waist sizes of 35 inches (89 centimetres) or more. For men, the risk is higher with waist sizes of 40 inches (102 centimetres) or more. The mayo clinic

As humans our peak fitness potential is usually around the age of 20. This is true for both men and women. From there, fitness typically declines between 5%-20% per decade in healthy individuals between the ages of 20 and 65.

For the average man, the body is in its best physical shape in the early to mid 20’s but time can take a toll by age 30, when muscle strength starts to decrease by as much as 3 percent to 8 percent every 10 years. By age 40, reaction time starts to slow and at age 50, bones become brittle. https://www.bondclinic.com/tip-top-shape-at-any-age-an-article-

Activities That a Bodyguard Can Be Engaged In

Running, walking, pulling, pushing, twisting, bending, jumping, reaching out, and lifting. As a bodyguard, unless there is a scheduled walk or run planned you may not have the luxury to warm up and stretch. Protective activities can include but are not limited to the following examples.

  • Jogging with the VIP for 3-5+ Kilometers/miles.

  • Walking with an executive. This can be a brisk walk for an extended period. For example, being with the VIP when they are shopping or playing golf.

  • Standing for a long period of time waiting for an executive.

  • Going mountain biking, hiking, or snow skiing with an executive.

  • Racing up and down stairs to clear a stairwell or stop foot traffic.

  • If there are several bodyguards, everyone cannot be on the executive’s elevator. Bodyguards may be required to run upstairs or an escalator to get in position.

  • Moving quickly to clear an event room, holding room, or washroom.

  • Moving quickly to open a door.

  • Potential crowd scenarios may require pushing.

  • Stopping and moving an individual trying to push or force their way towards the VIP.

  • Reacting to an individual or individuals who are trying to access a stage when your executive is on the riser and or at the podium.

  • For media events, there could be pushing and pulling involved for example during a scrum where the media is in the VIP’s space.

  • Pushing may be required when the media and individuals / a crowd are blocking the VIP’s walking route on an aisle. The intensity of pushing can vary based on the subjects involved.

  • Pushing the VIP into the limo if there is a threat, an incident, or an attack.

  • Going in and out of vehicles. There is more strain on your lower back when you have additional weight which includes body armour and use of force equipment.

Wearing a firearm, body armour portable radio, belt, ammo clips, handcuffs, and OC spray can add up to 15 pounds of unbalanced weight to your body.

  • Moving your body to have proper positioning includes changing your direction.

  • Placing and removing luggage to and from the limo.

  • Opening building C limo doors. There is considerable weight with armoured limo doors.

  • Worst case scenarios i.e. reacting to a physical threat.

  • Lifting to carrying the VIP if there is an injury or an attack.

When I was in Protective Services our fitness and lifestyle coordinators put our Protective (VIP Security) Unit members through an appraisal to assess our fitness for duty. Here are the areas that were considered.

Fitness

Components

Test Results Score
Body Fat Jackson-Pollack The healthy body fat range for women is 25-31%, for males 18- 24% (Does not consider age or

athletic status)

Aerobic Fitness 1.5 mile run or Bike
Muscular

Strength

Grip Strength RCL
Muscular Endurance Wall Sit Push-ups Curl-ups Pull-ups Sec

# # #

Flexibility Sit C Reach Cm

When you are on a protective team, members should attain at least an “average” rating under each fitness component. There are no adjustments based on “age”. Scoring categories include a rating of Poor > Below Average > Average > Above Average > Excellent

What Happens to Your Body as You Become Older?

“We must recognize that, as we grow older, we become like old cars more and more repairs and replacements are necessary.” C.S. Lewis

Medical Issues will increase as we all age creating more challenges when assigned to bodyguard duties for example – As a runner in your 20s and 30s, you may develop shin splints, hand knee, and hip issues requiring medical treatment into your 40s and 50s.

If you work in executive protection as a supervisor there is merit in knowing if there are any medical issues regarding your staff that could impact their ability to be deployed. Some individuals may not wish to share this information and there is no mandatory requirement to self-disclose medical-related conditions.

A Few Potential Medical Issues May Surface as We Age

Diabetes – Working in executive protection creates an unhealthy work environment. Being on the run, very long shifts, missing meals, and eating in restaurants. I worked with one officer who had diabetes and there was only 1 occasion where he needed support in this area. It was during a major event briefing.

Kidney and Gallstones – Adults should drink 2 to 2.5 litres of fluid (8 glasses) per day. Not a chance if you are a bodyguard as you will need to use a washroom, frequently.

Hearing loss/hearing aids – My father-in-law was a train engineer for almost 40 years. CN Rail tested him prior to his retirement. I was surprised that he did not qualify for a hearing pension as his hearing was very poor and he requires 2 hearing aids.

If you have team members with a hearing pension, to qualify they must have significant hearing loss arguably rendering them unfit to work as a bodyguard.

Epilepsy – Executive protection work can be stressful with long shifts. Taking prescription meds can create challenges. I can see why someone who has a history of epilepsy would not disclose this condition. If they have a seizure, they will lose their driver’s licence for 1 year and their employment would likely be terminated.

Vision issues – As we age night vision can become more of a concern for some individuals. Pupils get smaller with age. At night there is a reduced amount of light entering the eye. This may lead to mild night blindness. When you have executive protection driver training, courses include a night driving segment.

It’s a Matter of Being Smart, Making the Right Choices

Yes, there are hereditary factors that can impact your health however, you must focus on what is controllable.

  • Wear quality shoes and rotate your footwear (don’t have only one pair of shoes). This includes quality running shoes. Your shoes should have laces (never wear slip-ons). Use good sense Do not wear high heels or platform shoes.

  • If you need orthotics do not procrastinate, get on it.

  • Always wear quality suspenders for back health.

  • If your VIP is a runner, especially long distance, consider purchasing a mountain bike for your EP security detail. If you have contacts within law enforcement where they have a bike squad, determine if you can have 1 or 2 positions on a future course. I was on a police bike course, I never realized how much I did not know until I received the proper training that included tactics when dealing with protesters or an adversary.

  • Consider packing 1 or 2 healthy snacks i.e. protein bar (in case you miss meals).

  • Be medically proactive by completing a yearly medical even when there are no obvious medical issues. If there are medical concerns promptly see a physician.

  • As a security manager consider a schedule with 8-hour shifts versus being with a VIP from first movement until they are in bed.

  • When given a choice, opt to take time off versus paid compensation.

  • You need a healthy life-family-work balance.

Good News – You Have Options

  1. As we age, our cardiorespiratory fitness typically declines. However, this loss of performance ability can be slowed and even reversed, to an extent, with regular physical activity. https://www.garmin.com/en-US/garmin-technology/health- science/fitness-age/

  1. With the right training, conditioning, and diet, you can mitigate many of the effects of aging to maintain your physical capability or even increase it. https://www.mayoclinic.org/healthy-lifestyle/fitness/in-depth/fitness/art-20046433

  1. There is more to executive protection than just bodyguard work, allowing you to continue in executive protection well into your 50’s and 60’s. From being a security file coordinator, advance, motorcade commander, motorcade driver, limo and spare limo driver, site commander, site security, working in intel, counter surveillance, performing residential / accommodation security, to luggage and aircraft security. There may also be an opportunity to be an executive protection training instructor.

In executive protection you may not be required to physically respond and react all the time however you must be able to physically react and respond when it’s time. To be effective and perform at a high level you must be physically fit regardless of age.

All the best on your executive protection journey. Surgite,

TJ Roman

The Challenges in Seeking a Career in Executive Protection  

0
Career in Executive Protection
Career in Executive Protection

If you’re thinking about a career in Executive Protection (EP), it’s essential to evaluate both the advantages and potential challenges of the industry as part of your decision-making process. To those unfamiliar with the field, this job appears attractive, even exciting. The distinction between what is real and what is not in EP often creates unnecessary noise and confusion. 

If I were to believe most of the promotional advertising on social media (and I don’t), I would envision myself (in slow motion) wearing my schmedium black shirt and skinny jeans, wind in my hair, carrying my suppressed M4 at the low ready up the steps of my Gulfstream 650 as I tactically walk behind an attractive blonde movie star.  The shiny brilliance of my presence would be reflected for all to see in my mirrored sunglasses, complemented by a notably obvious earpiece that connects to nothing.  It’s a cool image, but complete bullshit.   

While I have had numerous cool “moments,” they have always been punctuated by the reality and seriousness that I was providing protection that could save someone’s life.  In the real world, we aren’t that cool, tall, tanned, or tatted (at least most of us). 

When I talk to people interested in a career in executive protection, the conversations are always very “frank” and intended to paint the worst possible picture of the career field to understand the applicant’s true desire.  This is a job of “service” and it certainly isn’t about “you.”  From time to time, however, a potential recruit demonstrates a desire to serve and has both the pedigree and background to at least start the process.  For every applicant who possesses the qualities needed, there are a hundred that don’t.  The world also needs ditch diggers as my father’s voice reminds me.   

EP has gained significant attention in recent months, driven by national headlines and the increasing concerns over personal safety in a volatile and politically charged world. The market has seen a reciprocating increase in EP positions to offset the immediate fear of violence by some corporate leaders and UHNW clients.  While the allure of the career field can be enticing, new applicants often overlook the significant challenges they will face to establish themselves in this competitive and demanding industry. As stated before, a career in EP isn’t a race, it’s a marathon.   

The Training Never Ends (Or At Least It Shouldn’t)  

One of the primary hurdles for new applicants entering the executive protection field is the extensive and continuous training required to perform effectively in this zero-fail high-threat environment. Unlike many other professions, Executive Protection requires a distinctive combination of diverse professional skills to effectively navigate the protective operational environment.  Additionally, training in the EP field is an ongoing process due to the critical nature of the role. Professionals must consistently complete relevant training throughout their careers to ensure they are operationally ready at all times.   

Training programs for executive protection can be very expensive, often ranging from a few thousand to tens of thousands of dollars. Most training programs also require advance payment, which can be a significant hurdle for many young applicants, especially those just starting their careers in executive protection with limited savings.

Training and certification requirements are regulated by the State you wish to operate in.  It’s not a “one school fits all program, and new applicants should do their due diligence to research their own State requirements.  

Independent licensing, testing, insurance, and certification requirements can add significantly to the cost of entering this field.  In addition, ongoing training and certification are often necessary to stay current with industry standards and best practices, leading to a continuous financial commitment.   

Not all training programs are created equal (and that’s an understatement), and applicants may struggle to identify reputable training courses that provide the necessary skills and knowledge required for employment. Poor-quality training can also lead to inadequately prepared professionals who may jeopardize the safety of their clients. Applicants should research and choose accredited programs led by experienced instructors with strong backgrounds in EP, not social media cartoon characters or the self-identified EP Cool Guys.  Working through the hype and YouTube warrior training clubs can be discouraging, often leading to a waste of time and money.         

Training for executive protection is also very physically demanding. Candidates must maintain a high level of physical fitness and mental acuity to respond effectively to threats. The best training programs include combinations of intense physical conditioning, and scenario-based high-stress situational training, which should be challenging for all participants.  Scenario-based training should also be realistic. 

You will not be jumping out of your Suburban with an AR shooting anyone in the U.S. unless you enjoy federal prison. The physically demanding training alone discourages most applicants who may not be prepared for the rigors of the job.

Outside of the “in-person” training academies, there are hundreds of unscrupulous online diploma mills.  These groups have found the online training market financially lucrative by offering worthless “certification” classes to those who will most likely never enter the ranks of EP, but aspire nonetheless.  EP is not a career field you can “phone in,” you have to be physically present to stop violence and there is a good chance someday that will happen despite your best planning.   

The Competition is Intense  

If you’ve ever applied for a corporate EP position in the last ten years you are already aware that the market is competitive. The executive protection industry is full of overqualified applicants vying for a limited number of well-paid positions. The industry is constantly seeking the “best qualified” from a growing pool of younger, faster, and smarter applicants including retired or former (insert every federal agency acronym here), prior law enforcement/military, and seasoned/experienced EP professionals. 

It is estimated that there are 750,000 sworn police officers in the United States.  There are 1.29 million military service members in the U.S. Armed Forces.  Between the U.S. Secret Service, U.S. State Department, and FBI, there are 16,500 active agents, 660 of who retire on average annually.  This number doesn’t account for those who leave federal service before retirement.  If you are not in one of these groups, your chances of being selected for a corporate position in EP are extremely limited. On the contract side of EP, where many begin, you will have to work many years to establish your reputation and be competitive in the marketplace.   

As the demand for security services continues to grow, so does the pool of candidates, making it increasingly challenging for newcomers to stand out or even get past the resume review.  The preference for experience in EP creates a significant barrier for those without such backgrounds, as hiring managers may view them as lacking the required skills and judgment needed in high-pressure and confrontational situations. New EP school graduates often face the challenge of demonstrating their practical experience and capabilities to potential employers.   

Success in the EP industry often relies on professional networks and connections. This is especially true in the Contract EP sector where connections in other States equate to opportunities for potential employment.  Applicants without established relationships within the industry may find it difficult to secure opportunities or gain referrals. Networking events, conferences, and training programs can help build these connections, but they require time, money, and effort, which may not be feasible for all new applicants.   

No one is looking to hire knuckle-dragging “buddyguards” outside of certain sectors of the music industry.  This is a well-trained and educated industry and the nature of threats continues to evolve, with cybersecurity concerns becoming increasingly relevant in modern executive protection. Candidates must be knowledgeable not only in physical security countermeasures but also in digital threats and how they can negatively impact the safety of their protectees. Staying informed about the latest trends and technologies in security can be a daunting task for newcomers who are just learning the physical security aspect of their careers.  

The Experience Hurdle 

Securing employment in executive protection can be particularly challenging for those new to the field and lacking prior experience in security-related positions. 

If you graduate from the Vinnie Boom Batz School of EP, don’t expect to be walking the red carpet at Cannes anytime soon.  It requires time and experience to get to the level promised to you in the EP training brochure.  Many applicants find it difficult to secure basic entry-level positions in EP, as most roles require at least some experience.

Positions as security guards or administrative roles in security firms can provide valuable experience, but they too may not be easy to find or offer sufficient exposure to executive protection experience.  Early in your career, the pay is low and the positions are always less desirable. As your reputation and experience grow over the body of your work, so too does the trust and consideration prospective employers offer you.  A well-written resume is nice, but employers can see through the verbiage into your experience, and that experience takes time.    

Beyond your initial formal training, EP candidates must develop diverse skill sets that include conflict resolution, interpersonal communication, advanced medical training, protective driving techniques, and numerous other specialized skills. Applicants may need to seek additional training opportunities for specialized skills specific to a protectee and their lifestyle, which can be time-consuming and challenging to coordinate as a new protector.  The EP field is dynamic, with new techniques, technologies, information, and threats emerging daily. Continuous education in industry best practices and professional development are essential for maintaining a competitive edge over other applicants.    

Time May Be Money, But It’s Money You’ll Spend Alone  

The good news is, if you enjoy working and being alone, this is the job for you.  Whether conducting protective advances in nameless cities around the globe or working the “halls and walls” of forgettable buildings everywhere, you will spend a lot of introspective moments by yourself.   Because of the significant time constraints and travel demands, executive protection has negative impacts on your personal life.  The demands of the job often require long hours, irregular schedules, and last-minute or frequent travel, which can lead to extended periods away from home and loved ones. This lifestyle can strain the best relationships with family members, as missed birthdays, anniversaries, and important milestones become commonplace. 

The stress associated with your role as a protector—stemming from high-threat environments and the constant need for vigilance—can further complicate personal interactions, making it difficult for professionals to engage meaningfully with their loved ones when they are present. Over time, this disconnect can lead to feelings of isolation, guilt, and resentment, ultimately diminishing the quality of both personal relationships and job satisfaction.   

Your work-life balance should be considered early in your career to maintain valued relationships through effective communication and personal interactions. You will discover that those relationships are the anchors that provide success for most protectors.  Placing boundaries on what you will and won’t do in EP establishes a healthy environment for you to grow and maintain important relationships.    

Final Thoughts on the Challenges in Seeking a Career in Executive Protection   

If you’re considering EP as your chosen profession, do it with the understanding that it is more competitive than most other fields.  No one is going to tell you how difficult it is while taking your money for training either.  While the path to a successful career in executive protection can be daunting, those who are committed to overcoming these challenges can find rewarding opportunities in a field that plays a critical role in safeguarding individuals in an increasingly dangerous world. By investing in quality training, building professional networks, and continuously developing their skills, aspiring executive protection professionals can position themselves for success in this demanding but fulfilling industry. 

Insider Risks and the Evolving Role of Executive Protection Professionals in Cybersecurity 

0
cybersecurity
cybersecurity

Insider risks have long been a critical concern in corporate security, traditionally encompassing threats from employees, contractors, or third-party vendors with access to sensitive information. However, as digital transformation accelerates, the convergence of physical and cyber threats has created new vulnerabilities. Executive protection (EP) professionals, historically tasked with safeguarding high-profile individuals from physical threats, now find themselves on the frontlines of combating cyber-criminal attacks. Expanding their skill sets to include cybersecurity awareness is no longer optional—it is a necessity. 

This article explores insider risks, the growing need for executive protection professionals to adapt, and practical ways they can enhance their expertise to mitigate cyber threats targeting executives. 

Types of Insider Threats 

  • Malicious Insiders: Employees or contractors who intentionally exploit their access to harm the organization, whether for financial gain, revenge, or espionage. 
  • Negligent Insiders: Individuals who inadvertently compromise security through poor cybersecurity hygiene, such as weak passwords, falling for phishing scams, or misplacing sensitive data. 
  • Compromised Insiders: Employees whose credentials have been stolen through cyberattacks, making them unwitting conduits for cybercriminal activities. 

Insider threats can manifest in various ways, such as intellectual property theft, financial fraud, reputational damage, or even personal harm to executives through doxxing and cyberstalking. 

The Expanding Role of Executive Protection Professionals 

EP professionals traditionally focus on preventing physical threats such as kidnapping, surveillance, and unauthorized access. However, in today’s interconnected world, digital threats can be just as dangerous as physical ones. Cybercriminals leverage social engineering, deepfake technology, and online reconnaissance to exploit vulnerabilities in executives’ digital lives. 

Key Areas Where EP Professionals Must Adapt: 

  • Cyber Awareness Training: Understanding common cyber threats, including phishing, malware, and social engineering tactics, to help executives recognize and avoid them. 
  • Digital Footprint Management: Reducing executives’ online exposure by monitoring their digital presence, limiting personal information online, and ensuring secure social media usage. 
  • Secure Communications: Encouraging encrypted communication channels to protect sensitive business and personal conversations. 
  • Travel Cybersecurity: Implementing measures to protect executives’ devices and data while traveling, such as using VPNs, disabling automatic Wi-Fi connections, and securing devices from potential compromise. 
  • Incident Response Coordination: Working alongside cybersecurity teams to ensure a swift and effective response in the event of a data breach or cyberattack targeting an executive. 

Case Studies: Real-World Examples of Cyber Threats to Executives 

The Jeff Bezos Phone Hack: Jeff Bezos, founder of Amazon, fell victim to a sophisticated cyberattack when a malicious file was sent via WhatsApp from the phone number of Saudi Crown Prince Mohammed bin Salman. The attack resulted in unauthorized access to Bezos’ personal data, illustrating how even the most high-profile executives can be compromised through cyber means. 

Key Takeaways for EP Professionals: 

  • Ensure that executives use encrypted and secure messaging platforms. 
  • Regularly audit and monitor digital communications for signs of intrusion. 

The Twitter CEO SIM Swap Attack: Twitter CEO Jack Dorsey’s Twitter account was hijacked through a SIM swap attack, where hackers socially engineered a mobile carrier into transferring his phone number to a fraudulent SIM card. This allowed attackers to post messages from his account. 

Key Takeaways for EP Professionals: 

  • Encourage executives to use multi-factor authentication (MFA) with authentication apps instead of SMS. 
  • Advise executives to lock down their accounts with mobile carriers to prevent SIM swap attacks. 

The Sony Pictures Cyberattack: While not targeting an individual executive, the Sony Pictures breach, attributed to North Korean hackers, exposed executives’ personal emails, sensitive corporate data, and unreleased films. This resulted in reputational damage and financial losses. 

Key Takeaways for EP Professionals: 

  • Collaborate with IT teams to implement secure email policies and encryption. 
  • Educate executives on the risks of discussing sensitive matters via unprotected digital channels. 

Enhancing EP Skill Sets for Cybersecurity 

For executive protection professionals to effectively safeguard high-profile individuals against cyber threats, they must develop expertise in cybersecurity fundamentals. Here’s how: 

  • Obtain Cybersecurity Certifications: Consider certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Cybersecurity Awareness Training. 
  • Participate in Cybersecurity Drills: Work with corporate cybersecurity teams to conduct simulated phishing attacks and cyber incident response exercises. 
  • Build Relationships with Cybersecurity Teams: Establish close collaboration with IT security teams to ensure a holistic security approach that integrates both physical and digital protection. 
  • Educate Executives on Cyber Hygiene: Provide personalized cybersecurity training to executives, including password management, safe browsing habits, and recognizing social engineering tactics. 
  • Leverage OSINT (Open-Source Intelligence): Use OSINT techniques to monitor for executive-related threats on the dark web, social media, and hacker forums. 
  • Adopt Secure Technology Solutions: Equip executives with secure devices, encrypted communications, and biometric authentication to enhance their digital security. 

The line between physical and digital security is blurring, making it imperative for executive protection professionals to adapt and broaden their expertise. By understanding insider risks and integrating cybersecurity best practices into their protection strategies, EP professionals can offer a more comprehensive security framework for executives. In today’s digital age, an executive’s safety is no longer just about bodyguards and secure perimeters—it’s also about safeguarding their digital lives from cyber threats. 

By staying ahead of emerging risks and continually updating their skill sets, executive protection professionals can position themselves as indispensable assets in the modern security landscape. 

Interview with Daniel Weil on Security Driving, Armored Vehicles, and More

0
armored vehicle
armored vehicle

Could you share insights on how your experience in the IDF Special Forces shaped your approach to security driving and vehicle-related operations?

Firstly, military service develops your general security perception. You develop an understanding of the situation and constantly train yourself to recognize unusual things. Apart from that the amount of training an organization like the IDF, police, etc. can provide is way higher than what you can do in the private market. When you train with big armored vehicles, it becomes easier to manage the day-to-day vehicles we normally use for EP. Saying this, it’s crucial to understand that your military service is a good step to start your career. If you are not constantly learning and training, you will lose these abilities.

In your time managing security operations globally, how did you adapt vehicle tactics to different regions such as LATAM, MEA, or Asia?

First, there is a standard to maintain regardless of your location. As EPs, we should always pray for the best and get ready for the worst. I am not in favor of the “there is no risk” approach. Obviously, there should be additional training for each location based on its unique challenges. Mexico and Brazil have high crime rates, but driving through a mess in a city like Bangkok or Mumbai is also a challenging thing. Local good people are key!

What role do you believe blinded cars play in mitigating risks during executive protection operations?

First, it gives you a chance to recover if someone attacks/shoots the vehicle. It also removes threats of petty crimes like robberies. Very common in Brazil and Nigeria for instance. It provides another layer of protection. It will be much harder to deal with a properly armored vehicle rather than a soft-skinned one. There is never 100% but by adding layers of security and making things difficult for the attacker, we make them choose other (easier) targets. Saying this, armored vehicle is not immune. It should not make you take down your guard or be less alert.

Can you discuss some of the most effective modifications or technologies used in blinded vehicles for high-risk scenarios?

I think everyone is on the same page about the strength of the armor, however, other things like RUN-FLAT TIRES, Blast Protection, and boasted suitable breaks are not always given enough attention. I saw government vehicles that were converted into armored vehicles that had the same brakes. It obviously can’t bear the extra weight the armoring added.

Could you explain how you approach route planning and vehicle selection to minimize risks for your clients?

In some cases, you want to choose a vehicle that is more low-key approach. Some vehicles can be targeted as they are known to be used by expats. Some vehicles can draw unnecessary attention. I was on a detail a couple of years ago when tension against some government officials was skyrocketing in Israel. Driving in a convoy with 3 black Mercedes, made protesters think that we were government officials.. changing a vehicle or two to white or other colors could help there. But risk is one element when choosing a vehicle and routes for a task. For instance, driving in a condensed city like TLV with its narrow street in a big vehicle like a Mercedes Sprinter can be a problem. If you need to park in an underground parking, a tall SUV may not be able to enter.

How do you prepare drivers and security teams for emergency situations, such as ambushes or vehicle-related attacks?

Risk is one element when choosing a vehicle and routes for a task. For instance, iTRAINING TRAINING TRAINING and building their awareness to always look for threats.’

Protecting President Trump in a New Era of Executive Protection

0
Protecting President Trump
Protecting President Trump

In the aftermath of the September 11, 2001, attacks, the United States made significant changes to its national security framework. Key among these was the merger of the U.S. Customs Service and the Immigration and Naturalization Service, leading to the establishment of Immigration and Customs Enforcement. The FBI evolved into a counterterrorism agency, shutting down its Violent Crimes Programs and discontinuing its Drug Program. The most prominent change was the formation of the Department of Homeland Security (DHS), all under the mantra of “Never Again!”

As we consider the recent attempts to assassinate a Presidential candidate, we must ask whether we should adopt a similar approach: “Never Again.” If this is the case, it is essential to implement critical reforms within the government agency tasked with this responsibility.

Professionals in Executive Protection, such as those in the United States Secret Service, should focus their mission on minimizing risk to the dignitaries they protect. Understanding risk can be encapsulated in the formula: Risk = Threat x Vulnerability x Impact. By dissecting these elements, we can refine our operational strategies and identify necessary resources.

Evaluating Risks

As we evaluate the risks associated with a Trump presidency, we must adopt a comprehensive perspective. This includes analyzing the potential impact of a Presidential assassination, assessing the current threat level based on recent incidents, and perhaps most crucially, examining the vulnerability of the President concerning the effectiveness and resource allocation of the United States Secret Service (USSS). This discussion is not intended as a critique of USSS personnel but rather an evaluation of the agency’s readiness and resource distribution in a high-threat climate.

Having served in the USSS Uniformed Division and as a Special Agent, I have confidence in the caliber of personnel and the rigorous standards upheld for security roles. As a professor at the College of Business, Security, and Intelligence (CBSI) at Embry-Riddle Aeronautical University, I have guided many students toward careers in both the Uniformed Division and as Special Agents within the USSS. I can vouch for their ability to meet the demanding fitness, written, and polygraph testing requirements, as well as the interview process. They are dedicated professionals serving the agency effectively.

The restructuring of the FBI in the aftermath of the terror attacks of 9/11, was to provide an agency laser-focused on the prevention of a future attack. The changes in the Bureau entailed the creation of a multi-agency task force in each of the FBI’s 56 field offices, the now-established and recognized Joint Terrorism Task Force or JTTF.

Along with the JTTFs, the FBI established the first-ever Domestic Intelligence Program and Directorate of Intelligence (DI) to operate much like Britain’s MI-5. The role of the DI is to collect intelligence on Foreign Terrorist Organizations (FTO) operating in the U.S. as well as identify U.S. citizens supporting the FTOs. These changes caused the elimination of some of the FBI’s criminal programs, which were considered necessary and effective. The success has been significant to our counterterrorism and national security capability.

Final Thoughts on Protecting President Trump

The USSS has a rich and diverse history, including federal investigations into white-collar crime, U.S. currency counterfeiting, identity theft, and more recently, cybercrime—areas that could be handled by partner federal investigative agencies. Considering the comprehensive restructuring of U.S. national security agencies post-9/11, is it time to similarly reform the United States Secret Service as they continue protecting President Trump in a new era of executive protection?

About the Author

Steve Hooper is a Professor of Global Security at Embry-Riddle Aeronautical Engineering University’s College of Business, Security, and Intelligence in Prescott, AZ. He is also the founder of Tripwire Security Solutions. LLC a training and consultancy on all facets of Crisis Management and Safety and Security.

Professor Hooper retired after a 30-year career with the Federal Bureau of Investigation. His career included executive management in Counterterrorism and Counterintelligence. Professor Hooper also has extensive experience in Crisis Management and Tactical Operations.

Prior to the FBI, Professor Hooper was a Special Agent with the United States Secret Service and a patrol officer in Dover, NH.

Professor Hooper received a bachelor’s degree in criminal justice from St. Anselm College, Manchester, NH and a Master’s Degree in Criminal Justice/Homeland Security from St. Joseph’s University, Philadelphia, PA. He also attended the Marshal School for European Security Studies in Garmisch Germany and The Kellogg School of Business at Northwestern University. Professor Hooper is a Certified Protection Professional (CPP) and Threat Manager.

Satellite Phones Explained: How, Where, and When to Use Them

0
Satellite phones
Satellite phones

Satellite phones have countless different applications, from remote travel, and expeditions, to protection, security, and more. They’re an invaluable tool in any executive protection kit and knowing when, why, and how to use them can make or break your next detail or mission. Here’s everything to know about sat phones, how they work, and the top models for 2025.

What Are Satellite Phones?

Satellite phones, often called sat phones, are advanced communication devices that connect to orbiting satellites instead of relying on terrestrial cell towers. This unique technology allows them to provide voice, text, and data services in locations where conventional cellular networks can’t reach. Designed for reliability and global accessibility, satellite phones are indispensable tools for staying connected in remote or challenging environments.

Unlike standard mobile phones, which depend on ground-based infrastructure, satellite phones communicate directly with satellites in geostationary or low Earth orbit. This enables uninterrupted coverage across deserts, oceans, mountains, and other areas beyond the reach of traditional networks. Whether used for personal safety, professional operations, or emergency response, satellite phones ensure a lifeline to the rest of the world, no matter where you are.

Benefits of Satellite Phones

While conventional cellular networks have significantly broadened their reach, remote and rugged terrains often remain beyond their grasp. These challenging scenarios highlight the indispensable value of sat phones, which offer unparalleled connectivity that surpasses the limitations of traditional communication methods.

Global Reach and Constant Coverage

Satellite phones transcend the constraints of terrestrial infrastructure, delivering reliable communication in locations where cellular networks are non-existent or unreliable. Whether navigating vast wildernesses, operating in disaster-hit regions, or venturing into uncharted territories, sat phones provide an unbroken connection to the world. Their global reach ensures individuals and organizations can stay in touch with loved ones, facilitate rescue missions, or seamlessly manage business operations, regardless of location.

Reliable Communication in Emergencies

Natural disasters such as hurricanes, earthquakes, and floods often destroy conventional communication systems, leaving communities isolated. Satellite phones emerge as a crucial lifeline in these critical moments. They empower individuals to call for help, alert emergency services, and coordinate relief operations efficiently. Unlike traditional networks, sat phones are immune to local infrastructure damage, ensuring communication remains uninterrupted when it is needed most.

Military and Government Applications

For military personnel and government agencies, satellite phones are essential tools for secure and reliable communication. These devices facilitate encrypted conversations in remote or high-security areas, ensuring sensitive information remains confidential. Additionally, sat phones allow deployed personnel to maintain personal connections with their families, offering peace of mind during prolonged assignments in isolated regions.

Remote Expeditions and Outdoor Activities

Explorers, adventurers, researchers, and executive protection agents often find themselves in areas far beyond the reach of cellular coverage. Satellite phones act as a vital link, enabling them to communicate with base camps, coordinate with emergency services, or share updates from the field. This capability enhances the safety and success of expeditions, reducing the inherent risks of operating in remote and unpredictable environments.

Disadvantages of Satellite Phones

While satellite phones provide exceptional connectivity, it’s essential to weigh their potential drawbacks before making an investment.

Cost

One of the most significant barriers to getting a satellite phone is its cost. The upfront expense of purchasing a satellite phone is considerably higher than that of standard mobile devices. Beyond the initial investment, service plans and usage fees can be steep, with charges for voice calls, text messages, and data significantly exceeding those of conventional cellular networks. These ongoing costs make sat phones a premium option, often limiting their appeal to those with critical needs for global communication.

Portability and Bulk

Unlike modern smartphones, which are designed for sleekness and portability, satellite phones are often bulkier and heavier. This added weight and size can be inconvenient for users prioritizing compact equipment, such as backpackers, mountaineers, or minimalist travelers. The physical design, optimized for robust performance rather than aesthetics, may not meet the expectations of those accustomed to slim and lightweight communication devices.

Call Quality and Latency

Satellite communication inherently involves a longer signal travel distance—often from the device to a satellite in orbit and then back to Earth. This can introduce noticeable latency, causing delays that disrupt the natural flow of conversation. Additionally, call quality is influenced by environmental factors such as weather, dense foliage, or obstructions like tall buildings. These conditions can result in audio distortions, dropped calls, or inconsistent performance, which may not meet the expectations of users accustomed to the high reliability of terrestrial networks.

Best Uses for Satellite Phones

Sat phones have proven to be a powerful tool for maintaining connectivity in areas where traditional communication methods fall short. While their versatility spans across a wide range of applications, it is essential to understand the specific scenarios where they deliver the most value.

Remote Travel and Expeditions

For those venturing into remote regions—whether trekking through uninhabited deserts, scaling remote mountain peaks, or navigating the open sea—satellite phones become invaluable. These devices ensure a reliable line of communication with the outside world, offering safety and peace of mind in emergencies. In locations where conventional cellular networks are absent, a satellite phone serves as the crucial link between adventurers and the resources they may need, be it for help or coordination with support teams.

Disaster Response and Recovery

In the wake of natural disasters, such as earthquakes, floods, or hurricanes, traditional communication networks often become overwhelmed or entirely inoperable. Satellite phones fill this critical gap, enabling disaster response teams, humanitarian organizations, and local authorities to stay connected and coordinate recovery efforts. These phones facilitate the timely exchange of information, allowing for effective rescue operations and aid distribution, especially in areas where infrastructure has been severely damaged.

Remote Work and Business Operations

Industries like oil, gas, mining, forestry, and agriculture frequently operate in isolated locations, far from reliable cellular networks. In these environments, satellite phones are indispensable for maintaining business continuity. They allow workers, managers, and security personnel to communicate with headquarters, exchange data, and stay on top of operational needs, ensuring that projects progress without interruptions, despite geographic barriers.

Military and Defense Operations

In military and defense settings, where secure, uninterrupted communication is a necessity, satellite phones are critical. These devices provide encrypted communication channels for deployed personnel, allowing them to exchange sensitive information and maintain operational secrecy. Satellite phones also help military units remain in contact with higher command and fellow soldiers, ensuring coordination and tactical effectiveness in remote or hostile environments.

The Best Satellite Phones for 2025

ZOLEO: Global Connectivity Without Limits

The ZOLEO Global Satellite Communicator bridges the gap between mobile networks and remote areas, providing reliable communication even in places where traditional cell service is unavailable. By connecting to the Iridium® satellite network, ZOLEO ensures users can send and receive messages, access emergency services, and stay informed, no matter the location.

This device allows for seamless messaging through satellite, mobile, or Wi-Fi networks, automatically switching to the most cost-effective option when available. Even if the ZOLEO device is powered off, the app continues to receive messages, ensuring that important communications are never missed.

In emergency situations, ZOLEO’s SOS feature provides 24/7 monitoring and immediate response, with ongoing progress updates sent directly to the user. The communicator also offers non-emergency medical assistance, giving users access to medical advice regardless of their surroundings.

Designed with durability in mind, the ZOLEO device is compact, lightweight, and built to withstand harsh environments. It offers location sharing and check-in features, allowing users to stay connected with family, friends, or colleagues while traveling or working in remote areas. Weather forecasts are also available through the app, helping users plan and stay ahead of changing conditions.

ZOLEO supports long-form messaging, with the ability to send over 900 characters in a single message. Each device comes with a dedicated phone number and email address, making it easy for others to recognize and store the contact information.

For businesses operating in remote regions, ZOLEO offers practical solutions to ensure teams remain connected and can coordinate operations efficiently. Its reliable communication system enhances safety and productivity, making it a valuable tool for industries such as forestry, mining, and maritime services.

Inmarsat Maritime: Global Satellite Communications for Critical Connectivity

Inmarsat supports operations where traditional networks fall short, ensuring communication remains uninterrupted in maritime, aviation, and remote enterprise environments.

As the maritime industry increasingly prioritizes digitalization, decarbonization, and crew welfare, Inmarsat’s connectivity solutions play a vital role in enhancing operational efficiency and safety. Reliable communication at sea supports everything from navigation and weather updates to remote diagnostics and crew contact with family and friends, contributing to overall vessel performance and employee well-being.

 The company’s strategies focus on leveraging technology to reduce emissions, optimize routes, and integrate data-driven decision-making, moving toward a more sustainable future.

Inmarsat is a trusted partner to governments, providing secure, resilient communications essential for defense, emergency response, and critical infrastructure management. For enterprises, Inmarsat’s solutions ensure connectivity across remote work sites, enabling real-time communication and data transfer, which drives productivity and operational continuity.

Garmin Satellite Communicators: Reliable Connectivity for Remote Adventures

Garmin’s satellite communicators provide a dependable connection when venturing beyond the limits of traditional cellular networks. These devices leverage the Iridium® satellite network to offer global two-way messaging, ensuring that users can stay in touch with family, friends, or emergency services even in the most remote environments.

Garmin’s inReach® series stands out by combining navigation with messaging capabilities. Users can send texts, photos, and voice messages or trigger an SOS that relays GPS coordinates to Garmin’s 24/7 emergency response center. The rugged design and extended battery life make these devices suitable for extended trips, withstanding harsh conditions and extreme temperatures.

For outdoor enthusiasts, the GPSMAP® and Montana® handheld series enhance exploration with advanced mapping, long-lasting power, and optional inReach® integration. Whether hiking, sailing, or navigating rough terrain, Garmin’s technology keeps users connected and informed, providing real-time weather updates and location tracking.

Garmin’s satellite communication solutions are equally valuable for marine and aviation applications, ensuring safety and connectivity across vast expanses of water or sky. By maintaining access to communication regardless of location, these devices enhance both recreational and professional expeditions.

Subscription plans enable access to the Iridium® network, ensuring continuous live tracking, messaging, and SOS features. Garmin’s ecosystem extends further through apps like Garmin Explore™ and Garmin Messenger™, providing seamless cloud-based data and smart-device integration.

Download Advance Work: Route Survey

    Download Advance Work: Restaurant

      Download Helicopter Extration: Landing Zone

        EP Career

        Your registry of the best opportunities in executive protection.

        EP Directory
        The right place to explore EP companies.