We got you covered.

Perimeter

Advanced Levels of Close Protection Operative Training

No matter what tier of close protection operative training you have attended so far, there is always more to learn. From route reconnaissance to formations to vehicle search, the list is endless, if we are being frank. In fact, close...

Executive Protection and Venue Management

Executive protection details are as diverse as the principals under protection. Many close protection teams require coordination with the venue management and staff. And especially if the venue already has security currently contracted on-site. One of the most popular...

Joe Rogan Hired Armed Bodyguards to Protect His Family

One of the most popular podcasters to have ever lived, Joe Rogan hired armed bodyguards to protect himself, his family, and million-dollar property due to recent backlash against his controversial Spotify-based show. Retired Navy Seals turned elite security are now...

Smarts and Resilience: Protective Intelligence for Everyday Life  

Many people perceive protective intelligence (or PI) relative to high-secret government programs where security intelligence analysts plug away in a 24-hour operations center to protect those of importance. Or high-level officials from terrorist plots.     But in truth, while the term protective intelligence...

The Stalker – Much More Than a Physical Threat

The development of the internet in the 21st century has added another, deep layer of complexity to personal protection. Reports of online stalking and harassment are becoming more common. But how serious is the threat a stalker poses? How...

High-Risk Environments with Robert Currie

We sat down with Robert Currie – owner and founder of RC Advisory Services and security consultant to many companies – to discuss high-risk environments, covert operations, armored transport, and more. You have traveled the world, delivering services in countries...

Anti-Surveillance Tactics to Use in Daily Operations

In broad terms, anti-surveillance tactics comprise a series of actions to identify sources of unwanted attention from the media, stalkers, followers, fixated persons, groups, or forms of hostile reconnaissance. For example, if someone attempts to cause physical or reputational harm...

President Zuma in Jail: 75 Killed in South Africa Riots

Former president Jacob Zuma was arrested last Friday, with 75 people killed in the ensuing South Africa riots. Those well-acquainted with the country's history claim that this was its worst unrest since the end of apartheid. Riots derailed the country...

Armed Robbers Broke Into Eran Zahavi’s Home in Amsterdam

The wave of assaults and robberies of footballers and their families in Europe continues. The most recent victims is the family of PSV Eindhoven’s striker. On Sunday, armed robbers broke into Eran Zahavi's home in Amsterdam and robbed his...

What You Need to Know About Event Security 

Doing event security is a lot more difficult than it seems from the outside looking, no matter if you’re the coordinator or security manager. There are so many moving parts, and accounting for everything and everyone is virtually impossible....

Latest News

Executive Protection Organizations Worldwide — IPSB

For the fourth issue in our Executive Protection Organizations Worldwide series, we talked with Chuck Tobin, a Member Board...

Download Advance Work: Route Survey

    Download Advance Work: Restaurant

      Download Helicopter Extration: Landing Zone

        EP Career

        Your registry of the best opportunities in executive protection.

        EP Directory
        The right place to explore EP companies.