Threat and Risk Profile
An evaluation and analysis of the nature and credibility of the existing and potential threats to the executive. We review information across a variety of public and proprietary databases, and both traditional and social media to determine the availability of the principal’s personally identifiable information. These data points are what adversaries may use to commit identity theft, leverage for extortion, and/or establish an individual’s pattern of life. The executive’s digital footprint is used by individuals or social activism groups for in-person approaches to harass, intimidate, harm, or embarrass.
Deep and Dark Web Searches
Title 26 CFR § 1.132-5 does not require deep or dark web searches. However, Guidepost also offers this service for clients who are concerned about their personally identifiable information, including usernames and passwords, exposed on the deep and dark web. The availability of this information primarily comes from data breaches, which contributes significantly to identity theft, medical insurance fraud, and tax fraud.
Physical Security Assessment
Evaluation and analysis of the defensibility, architecture, electronic security systems, infrastructure dependencies, operations, staffing, communications, alarm monitoring, and response elements of the overall security posture at the principal’s residence(s), primary office, and any corporate transportation hubs (i.e., aircraft hangars, watercraft docks, vehicle storage). The physical security assessments generally include the following elements:
- Architecture
- Crime Prevention Through Environmental Design (CPTED)
- Technology
- Executive protection
- Security drivers
- Comprehensive review of security program policies and procedures