Executive Protection

executive protection

Our Executive Protection details include the following services provided for the client:

  • Develop and implement complete security and logistical plans for domestic and international travel and appearances by senior executives.
  • Anticipate, assess and manage situations creating a risk of harm to senior executives.
  • Make critical decisions, without management consultation or approval, regarding the expeditious and safe resolution of such situations, directing others, including non employees, and interfacing with law enforcement and potentially hostile and/or disturbed individuals.
  • Provide secure transportation and evasive driving skills necessary for executive protection.
  • Maintain a database of communications and personnel that create a potential risk of harm to senior executives and evaluate for severity and nature of said risk.
  • Develop and implement appropriate security response to address risk.
  • Conduct investigations of individuals/situations involving direct, indirect or suspicious threats against executives and make recommendations on minimizing any risk of harm to senior principles.
  • Coordinate security/logistical planning with other executive support staff, contract security personnel of other organizations, event planners, site managers, law enforcement personnel, etc.
  • Establish and maintain excellent working relationships with local, state and federal agencies.
  • Establish and maintain excellent working relationships with key departments such as Office of the President, Publicity, Marketing, etc.
  • Develop and implement crisis management plans for senior principle staff.
  • Monitor and advise on travel safety both domestically and internationally.


Private Investigation Services Images for City College's Website

General Investigators

Open up any phone book and you will likely come across an abundance of private investigators that provide general services. They may help clients find information on a missing loved one; they may gather information for clients embroiled in a child custody battle or divorce; or they may assist businesses in locating customers who refuse to pay a debt.

Legal Investigators

Private investigators are often brought in to help either clients or lawyers prepare for court cases. They may conduct surveillance, interview people, and perform research for parties in litigation. Legal investigators often have extensive experience in the court system, as they must understand the laws surrounding evidence in court procedures and what can and cannot be admitted into a court of law.

Corporate/Financial Investigators

Corporate investigators, who are often hired by large, private corporations, are called upon to perform any number of duties, including:

  • Investigate a company’s history and financial performance before proceeding with a merger or acquisition.
  • Investigate a company’s interests and investments.
  • Conduct background investigations on new employees.
  • Review financial, computer, telephone, etc. records of employees suspected of fraud, embezzlement or theft.

Insurance Investigators

Private investigator jobs are often found in insurance companies who pay compensation claims, and within businesses that suspect financial abuse or fraud. They may work for homeowners insurance companies, auto insurance companies, and workman’s compensation insurance companies, and they may investigate everything from personal injury claims to medical malpractice claims, just to name a few.

Computer Forensic Investigators

Given the wide use of technology, professionals who can uncover cybercrimes are in high demand. As such, private investigators deal with investigations involving everything from cyber bullying to identity theft. Private investigators are experts in a number of areas, including tracking and retrieving digital information and accessing and analyzing computer hardware and software.

Computer forensic investigators may employ a number of investigative tools to locate files or file fragments, even deleted files, all the while preserving the integrity of the electronic evidence. They may also recover electronic evidence during a computer forensic investigation from any number of devices, including: email servers, hard drives, storage media, databases, web servers, personal digital devices, digital answering machines, zip drives, and digital cameras.

Civil/Domestic Investigators

Private investigators that provide investigative services in civil or domestic matters may be called upon to uncover information related to infidelity, child custody, or divorce, among others. For example, a domestic private investigator (also often referred to as a marital investigator) may be hired to perform surveillance and gather evidence for clients that suspect their spouses are being unfaithful. Domestic investigators are also hired to find defamatory information on a spouse for child custody purposes.

Missing Persons Investigators

Private investigators may focus their practice on locating missing persons, regardless of the circumstances surrounding their disappearance. Often times, private investigators involved in missing person cases work alongside law enforcement officials. Missing person investigations may involve finding lost loved ones, debtors who owe money, runaways, and missing persons involved in cold cases.

Threat Assessment

vulnerability-risk-analysis-Threat assessment is a structured group process used to evaluate the risk posed by a student or another person, typically as a response to an actual or perceived threat or concerning behavior. Threat assessment as a process was developed by the Secret Service as a response to incidents of school violence.

-The primary purpose of a threat assessment is to prevent targeted violence. The threat assessment process is centered upon on analysis of the facts and evidence of behavior in a given situation. The appraisal of risk in a threat assessment focuses on actions, communications, and specific circumstances that might suggest that an individual intends to mount an attack and is engaged in planning or preparing for that event.

-In a situation that becomes the focus of a threat assessment inquiry or investigation, appropriate authorities gather information, evaluate facts, and make a determination as to whether a given student poses a threat of violence to a target. If an inquiry indicates that there is a risk of violence in a specific situation, authorities conducting the threat assessment collaborate with others to develop and implement a plan to manage or reduce the threat posed by the student in that situation.


Professional | Solutions Focused



Armed | Unarmed Guard

Executive Protection


Screening Services


Threat Assessment

Special Event Details

Transportation Security

Formal Training | Instruction

Armed | Unarmed Guard

vetsOur officers take pride in the quality of services they provide; these services include, but are not limited too:

  • Develop and implement an efficient admission process at client site.
  • Monitor all entrances and exits to ensure prevention of all unapproved entry into facility.
  • Supervise all vehicular movement and parking at security gate.
  • Monitor all employees and visitors into facility, initiate in appropriate screening prior to entering building and ensured high end security.
  • Assist all legitimate visitors in all queries and monitor entry and exit to facility.
  • Develop and maintain professional relations with employees and visitors and ensure appropriate courtesy to everyone.
  • Ensure optimal levels of communication with clients and visitors and provide all required information.
  • Determine a remote sensing system for all entrance and exits of facility, monitor all activities on CCTV and prevent any unlawful entries.
  • Perform regular patrols on facility on foot or in a vehicle.
  • Supervise site and identify any unsafe conditions and inform authorities immediately in case of any suspicious activity.
  • Provide emergency services to facility in case of an emergency and restrict movement of people to ensure safety.
  • Prepare and maintain logs on computer for all entry and exit of customer and employees for future references.
  • Identify any security violation and ensure immediate communication to client representative or management.
  • Manage and monitor all client property and ensure prevention of any damages.