Author name: Robert Mann

Blog

What You Need to Know if You Are Caught in a Mass Shooting at an Airport

Five of the most important steps you can take to save your life. Essential tips from our Personal Protection Specialists. 1. Run Away The moment you hear what sounds like firecrackers or more specifically gunshots your first reaction is to walk or run in the opposite direction. Don’t try to figure out where the sounds are coming from. Immediately remove yourself from the area. We all can learn a lesson from the passengers at LAX who were running with their luggage in tow. Fortunately, (as pathetic as that sounds) the shooter had a specific target in mind and that was TSA employees. What if the shooter began shooting at everyone in sight, all those passenger dragging their suitcases had encumbered themselves to the point that in all likelihood they would have also become victims. It was astonishing seeing all those passengers dragging their luggage behind them as though their luggage was more important than their lives.  To escape a situation like that at LAX you need to rid yourself of anything that impedes your ability to flee. 2. Find a Closet or Restroom Try to head toward a door leading to a closet or restroom. If you go into a restroom try to enter and lock a bathroom stall. If there  are no closet or bathroom doors in the vicinity search for and leave through any exit that will remove you from the fire zone. 3.  Take Cover Try to take cover behind a restaurant or coffee bar counter or a kiosk. If you see a an area behind a ticket counter get behind it and lie as low as possible  Do all you can to stay perfectly still and control your breathing so it is not too loud. 4.  Don’t Reason With Them—Physically Defend Yourself In The Right Way Do not attempt to reason with a shooter as they are clearly mentally deranged and you will simply appear to them as just another trophy to shoot. However, if you are face to face with the shooter try not to scream, search for any object you can lift and throw at them, such as your luggage if you happen to be caught with it still in your hand. If you are within arm’s reach of the shooter, you may be able to disarm the shooter. If the shooter is using a rifle, grab the barrel and turn it away from you while striking the assailant with your other hand or kicking them with your feet. As the assailant instinctively pulls the weapon away from you, follow their movement to put them off balance and attempt to grab the butt end of the rifle while moving towards them. With both ends secured in your hands, you can use the weapon as leverage as you knee or kick the assailant in the body. If the weapon is a handgun try to quickly grab it from the top and hold it as tight as you can to prevent the firing action from completing.  While performing this action try to wrench the weapon from the shooter’s hand. Taking them by surprise is your only chance to survive. In reality the chances of you surviving a face to face confrontation is clearly not in your favor and if you are going to be shot you need to have the courage to do whatever it takes to defend yourself and to try and save your life. 5. Avoid Being Seen By The Shooter Do whatever you can to avoid being seen by the shooter as you do not want to draw attention to yourself. Should you find yourself running away from the sound of shots being fired stay as close the inner walls as possible because you don’t want to be running in the center of a pathway where the shooter has a center mass view to shoot at. If you need to move toward the center in order to reach an exit run in a zig-zag motion which will make it difficult for the shooter to hit you. Failing the above options try to lie in a facedown position which will protect your internal organs. Your facedown prone position may trick the shooter into thinking you are already dead. The flat profile also presents a smaller target profile for the shooter and may even cause the shooter to overlook you entirely.

infidelity investigators
Blog

Beware Of Inexperienced Infidelity Investigators

When it comes to Infidelity Investigators you should know who to select. Worldwide Intelligence Network assigns the most highly regarded and respected field operatives with years and thousands of hours in surveillance operations experience. Here are 2 things you have to look out for in good infidelity investigators: 1.  They know how not to be discovered by the person they’re tailing. You don’t want your partner, who you suspect to be cheating, to discover that they are being followed. It jeopardizes your chances of finding out the truth and can create more tension in your already strained relationship. However, in order to increase their bottom line, many Private Investigative companies hire newcomers/wannabes willing to work for low wages with little to no field experience. Lack of experience means that nearly all newcomers are discovered by the person they are following. This is the last thing you want to happen! They won’t be able to do their job right yet the PI company will still charge you top dollar for an alleged “professional” infidelity investigator. 2. They are honest with you. As in any other field, some Private Investigators are dishonest and just out for your money. They could care less about the outcome of your case and have no integrity. For example, they would never reveal that they were caught in the act of following your partner (it has happened before!). Instead of revealing the truth to you, they discontinue the surveillance and tell you that there was no activity worth reporting. Lies! To prevent being scammed, make sure you ask for the credentials of the investigator you’re thinking of hiring. Check out their professional reputation and experience. Worldwide Intelligence Network assigns the most highly regarded and respected field operatives with years and thousands of hours in surveillance operations experience. Each of our surveillance investigators are required to film mandatory “integrity video” of the location where they are stationed every hour on the hour to demonstrate that they are on the job and in the field doing what the client expects them to do. Integrity video is included in the video filmed while the investigator was in the field and it is submitted to the client at the conclusion of the assignment. Our integrity is proven by our performance for over 22 years. But if you don’t believe us, you have the right to practice due diligence and ask for our credentials and references. We would be happy to oblige so that you can have peace of mind knowing that you’ve chosen the right investigator for your delicate situation.

Blog

Frantic Parents Searching For Their Missing Son

Just before the Memorial Day Holiday this year we received a phone call from a gentleman in Florida who told us that his twenty one year old son who is attending college in Santa Monica suddenly went missing. He and his son communicated everyday either by phone or text messages. Of course our concerns were; was his son abducted, kidnapped, perhaps even murdered. The father said he had not heard from his son for three days. The father was beside himself with worry, understandably. We were retained to try and locate his son and the father was very well informed about his son’s cell calls, his classes in college, the balance in his bank account and the balance of his small credit card balance. All of these documents were sent to us by the client. The father of the young man told us that he also had his son’s bills for his gasoline credit card. We reviewed those charges and noticed that until the week he went missing he had driven to the same gas station he always used which tended to dispel the horrible thought that he was abducted and or murdered at least not so up and until the last day he bought gas at the same gas station. A Private Investigator is only as good as the sources he/she has cultivated over the years and his/her knowledge of the technology available when performing various investigations. One particular source was contacted by us who has a unique technology tool that assists in possibly locating a person anywhere on earth. Sorry we cannot disclose the tool or the method as that is proprietary technology known only to a few. Within 24 hours we developed a location on the missing young man in San Diego, California and in less than 24 hours we had his location surrounded by off duty police detectives who confirmed to us that our intelligence gathering on the young man’s location was accurate. Two hours after departing Los Angeles we joined our detectives in a surveillance of a motel where the missing young man’s car was observed and we also acquired his room number (not an easy task). When the young man emerged from his room we approached him very cooperatively announcing who we were and that his father retained us to locate him. We asked if he would be willing to talk to us and explain why he ran away and tried to appear to be missing. Yes, he was willing to talk to us and did so for several hours. We put him In touch with his frantic parents and his sister who were delighted to know he was alive and well. Since he is an adult there was nothing we could do to force him to return home to Santa Monica or to his parent’s home in Florida. Everything we were going to do from this point forward would have to meet with his approval. What did he insist upon? He wanted to go to the San Diego Zoo the following day. So we asked if we could accompany him to make sure he wouldn’t take off again and go missing. We also asked him if we could have his car keys and his hide a key which he willingly gave to us. The following day we were off to the Zoo and he became more and more relaxed throughout the day and evening. His reason for going missing had to with his failing his classes in college and he was incredibly ashamed of his failures. We are pleased to report that he’s back home in Florida with his parents and his entire family is in therapy working out their problems. Great ending for the family, the young man and us.  

Blog

Are you a victim of Cyber Sexting, Stalking, Identity Theft, or Bullying?

We have had the pleasure of retaining the services of Michael Roberts for the past few years and he has demonstrated time and again how unbelievably talented he is. Simply stated Michael is among the world’s best IT-Cyber investigators and he is a valued asset for our company and our clients. Michael has successfully tracked down numerous scam artists who preyed upon our clients through Internet scams mostly operating outside the United States. Michael just shared with us that he received confirmation from a joint task force of US Marshals and the Maryland State Police that his investigative support led to the arrest of a murder suspect who had eluded law enforcement authorities and U.S. Marshal Service for two months. Earlier this week, Dinkue Brown age 27 who was on the run in connection with the murder of 26 year old Luis R. Rodriguez was apprehended by the U.S. Marshal Service thanks to Michael’s ingenious work. Maryland State Police called Michael on August 14, seeking advice on obtaining information from Google. Michael offered his technical and investigative assistance far beyond that scope. Michael and his team devised a pretext thus setting up a sting operation and then, after approval from law enforcement conveyed a message to one of the suspect’s family members. The message contained one of Michael’s proprietary forensic tripwire payloads attached to it. Subsequently, the tripwire transmitted numerous electronic footprints triggered by the fugitive, from behind anonymous proxy servers in an attempt to disguise his location. Over the next few hours Michael and his team worked with the task force to circumvent the fugitive’s attempts to obfuscate his activities and location. As a result of the digital artifacts and intelligence collected by Michael and his team within a few hours they identified a cell phone number. It was allocated to a disposable SIM card in the possession of the fugitive, but it did not reconnect to the cell-tower network after Michael’s first discovered it — ergo triangulation was impossible. It appears that the fugitive purchased the SIM card to use once for an emergency and thereafter destroy it. After obtaining a court warrant the U.S. Marshals were able to obtain the unique device identifier [UDID] that was associated with the one-time-use SIM card. A few days later the same UDID popped up again in association with a new disposable SIM card. The Marshals were then able to triangulate the fugitive who was in possession of that cell phone. The fugitive was found at the triangulated location in Indiana, was arrested, and is now in police custody. Brown waived his right to fight extradition and is being held in the Wayne County Jail without bail. The Worcester District Attorney’s office is making arrangements to transport Brown for his arraignment in Fitchburg District Court. Great work again Michael!!!

Blog

Are You Willing To Be Polygraphed To Prove Your Innocence?

That was a question we asked all the employees of a grocery store located in Los Angeles after an ATM machine inside the grocery store was broken into on Father’s Day 2013 in the early morning hours just before the market opened for business. The police were called and they took a report but they hadn’t made any progress. Therefore the owner of the ATM machine call us to determine who may have broken into the ATM. A Crazy Access Theory There was no forced entry, no broken windows or doors so it had to be someone who had access to the market. The craziest access theory all the employees were floating around was that someone had gotten access to the roof of the market and had opened an air vent which is attached to vent that goes down to a ceiling inside if a coffee shop inside the grocery store. That vent is very narrow and ends inside an aluminum hood that is positioned directly over a grill that is hot all night because the pilot lights remain on even though the grill burners are turned off. So if someone managed to enter the vent from the roof they would have had to slide down a greasy aluminum vent shaft and then step on a hot grill and walk over to the ATM on the other side of the grocery store without leaving any greasy foot prints on the floor. Then they would have broken into the ATM returned to the hot grill stepped on the grill and climbed up the very narrow greasy vent to the roof. The person would have had to be bone thin to fit in the vent and been Superman to climb upward and out of the vent. There was only one person in the entire universe capable of doing that and that would have been Spiderman. So we discounted the entry theory and focused on the owner of the market and his employees as possible suspects. Interviews and Investigation Of Possible Employee Misconduct We asked all the employees we interviewed if they were willing to speak with us voluntarily and would they be willing to take a polygraph if asked to do so. We also interviewed two vendors who rented space in the market and asked them if they would be willing to take a polygraph if asked to do so. We spent two days conducting interviews and on day two we had a four possible suspects in mind for a polygraph examination. What the police hadn’t learned but we did, was that one of the vendors who sold and repaired computers was just a was a few feet from the ATM. The police had checked out all the CCTV cameras in the store but they missed the most important CCTV camera and that was one that sat on a shelf pointing directly at the ATM in the computer vendor’s kiosk. When we asked the vendor to play back the video on the day of the burglary he told us that he had viewed the video and there was nothing that could be seen so he erased that day’s video. Oh boy!! Red flag time!! We then asked the computer vendor to show us any of his video that was taken around the same time the burglary took place in the morning hours so we could see for ourselves how obscure the video would be. The vendor showed us a video taken the exact same time as the burglary and we could have made out who the thief was in a heartbeat because the camera had infrared capability. Of course we asked this vendor the sixty four thousand dollar question, “would you be willing to take a polygraph?” “Sure” he says. We narrowed down our potential suspects to one employee and two vendors. Want to guess who the vendors were? Well the coffee shop owner who fabricated the story of Spiderman and the grease vent and the computer vendor. When the polygraph examiner showed up the only one who refused to take the polygraph was the computer vendor who by the way hadn’t lost a single computer or accessory from his kiosk when the burglary occurred. Remember his Kiosk was a few feet from the ATM. The net result is we accomplished our investigative assignment and identified the perpetrator. However, the police couldn’t arrest him because they had no evidence that the District Attorney would accept. Successful, But Disappointing This assignment was successfull but the end result was a disappointment to us. The client was very pleased with our corporate investigation because they wanted to set an example of being a pro-active company regarding this theft due to the fact that they wanted to replace the damaged ATM in the grocery store and they also had another ATM in another grocery store the same owner owned.

Anonymous Internet Reviews
Blog

Anonymous Internet Reviews

Authored by Robert Mann of Worldwide Intelligence Network. Over the past few years we’ve been asked by numerous business owners if we could identify and investigate people who posted scathing anonymous internet reviews about their establishments.  The owners wanted to reach out to those reviewers to obtain more information and to make good on any poor experience that customer had. In today’s highly sophisticated age, it is nearly impossible to identify an anonymous email addresses especially those that pay to email through anonymous email websites. Those websites specialize in protecting the true identity of the person sending the email and only by filing a law suit and serving the website with a subsequent subpoena can the real name of the person sending the anonymous email be revealed. We have highly skilled experts who do contract work for our company that have identified numerous anonymous internet reviews over the years. I’m all for the first amendment freedom of speech but our forefathers didn’t envision a worldwide wide web and global anonymous emails. I acknowledge that everyone has a right to express their point of view and to write about good as well as bad experiences with vendors. However, there were far too many times we uncovered through law suits and subpoenas that the unhappy customer who wrote a scathing review was none other than the owner’s competitor. Now that’s not playing fair and that is what appears to be poisoning online reviews because we really don’t know who is posting a truthful or untruthful review. If an establishment offer horrible dishonest services then we all should know about it but the reviewer should be identified and be able to be contacted so the owner could either reach out to the reviewer to correct their bad experience or to evidence that they never were in the owner’s establishment and that they are unhappy competitors. Some of the client who came to us have been in the restaurant business for decades with extremely high rating in various Food and Wine Magazines and in Zagat. Some owners have photographs taken with dignitaries and past Presidents on the walls of their establishments.  I’ve met with these people personally and it is truly a shame that they could not respond to the negative reviews in a way that would actually make a difference. This past weekend there was an article in the Los Angeles Times about reviews posted in Yelp where Yelp has a software that designates whose negative reviews should be accelerated on the search engines or appear on page one of Google. Their criteria has to do with the frequency of the reviews written by the reviewer and if the reviewer is a paid advertiser on Yelp. Now that is simply awful and grossly unfair to the proprietors of the establishments that are being reviewed.  Does anyone remember when reviews were published by critics or in Opinion Letters send to newspapers. Seems those reviewers didn’t have a problem affixing their name to their review why should Yelp and all the other so-called review websites do the same. If someone wants to write a good or horrible review be big enough to tell the establishment where they can be reached. Perhaps someone should create a website that permits reviewers to post their review with a hidden contact email address or phone number along with their name and then have their review be posted where they designate it to be. If the establishment wants to contact the reviewer they click on a link that sends the request back to the reviewer and if the reviewer refuses to identify themselves then their review is removed.  This is just a thought to make the playing field fair to all parties involved.

Kidnap for Ransom
Blog

Kidnap for Ransom

Mike Clayton has managed over three hundred  private investigation cases worldwide and can pinpoint in 87% of the cases, where the mistakes were made, which determined why the kidnapper chose the victim. Part I of III Kidnap for Ransom Systemic corruption – Mexico: weak law enforcement system A profitable business model –high return with low risk that can be repeated The residual effect of kidnap for ransom How is it that kidnap for ransom is such a low risk business with a high return when there are so many laws against it? How is it that people who have very little education, except for “street smarts”, are able to plan and execute a business model, which seldom fails? In all cases examined, the answer is the same, systemic corruption.  Often local law enforcement is on the kidnappers’ side so that kidnappers are able to coordinate and execute the crime easily. As in any successful business model, a general strategy is followed. In the case of kidnap for ransom, the bad guys have a plan as well. They give thought and consideration to whom they are going to kidnap by profiling their victims. They organize where the kidnap will take place, who will do the actual kidnap,   the escape route to be used, and how the victim will be held, the location of the safe house, etc.. They know how much profit they will need and generally how long the kidnap will last. With planning and the element of surprise, 97% of all kidnapping attempts are successful. There is a residual effect that results from a kidnap for ransom. In 99% of the cases, the family suffers the most. The next group who suffers is the company that the victim works for or owns, and the person who suffers the least of the three is the victim. The victim is usually taken care of, albeit by killers, they are killers with a plan that have a business strategy with a high degree of success. Understanding how kidnappers work is the first step in learning how not to be an easy target, which reduces the chance of a kidnap for ransom. Kidnap for Ransom – Part II Traditional vs. non-traditional kidnaps Who kidnappers kidnap Important counter measures Traditional kidnappers will analyze their target. One or two members of a traditional kidnap group will have the job of selecting possible targets, which takes time. They select possible targets from the business community and/or the high social economic groups, and then they surveil their targets choosing the most predictable ones from the list. The non-traditional or non-professionals have fewer members, they are more spontaneous in their actions and choice of targets, and are likely to be street criminals or gang members. Cases from non-traditional groups are usually shorter in duration than traditional groups, the victim is usually randomly selected, and they can be very violent. Potential targets are owners of businesses who are, or appear to be, able to pay a ransom, and/or their family members, and business executives; anyone who looks like they can pay a ransom. Where kidnaps frequently occur, executives, travelers, or high net worth individuals and their family members are targeted. To protect kidnap gangs and to gather information, the police are sometimes used by the kidnappers. Information can be gathered in various ways, such as, by surveillance from employees or gained by an ex-employee. Also, information may be gathered through an ongoing business project where management may not be taking proper security measures to safeguard themselves. By knowing the steps kidnappers take in analyzing who to take, individuals can take counter measures to lower their profile. However for measures to be effective, daily and constant attention must be given. The ultimate goal is to make the person a more difficult target so that kidnappers will then move on to  an easier one. Since kidnappers surveil their targets, a good counter measure is to break routine. Vary routes daily, such as to and from residences, hotels, and offices. Also, vary the time of departures and arrivals. This should be part of the daily routine, that is, not having a routine. On each route, choose a “safe area”.  Look for places on or close to the routes going from point A-to-B. Safe areas are places that have an armed guard, such as a bank, hospital, schools, a residence or business with an armed guard stationed on the street side of the property, or it could be a private parking area. If surveillance is suspected, go to the safe area, call coworkers, friends, or a trusted security response team. In addition, at all times be aware of who is around, if suspicious people or vehicles are noticed, REACT! Be proactive! On a daily basis: Vary the travel time and routes used between point A-to-B Learn the safe areas, which can be used for protection Be aware of surveillance, when suspicious people or vehicles are noticed – REACT! Seldom, potential targets know that they are being targeted. Remember, understanding that the risk is there is the first step in countering an incident. Next, make security an ongoing practice, and REACT proactively to situations. The kidnappers only need to know two things; can the victim or victim’s family or company pay a ransom, and where will the target be at a given time? If they know these two things,  it is often too late, and it is highly likely that person will be kidnapped. Kidnap for Ransom – Part III Surviving a Kidnap – Scenario Tactics for Survival Scenario – When the victim was released, he returned in relatively good physical condition and in spirits. He remarked that it had not gone as well for his cousin who was also taken. When he elaborated, he said that his cousin cried and complained a lot, which infuriated the kidnappers. He said that they severely beat him on a daily basis and withheld food from him. When asked about the difference with his own conditions, he said that he was able

Kidnap & Ransom Series by Michael Clayton – Presented by Worldwide Intelligence Network
Blog

Kidnap & Ransom Series by Michael Clayton – Presented by Worldwide Intelligence Network

Are You Equipped? Why Security Briefings Are Important By Michael Clayton; The victim of a kidnap complained after being released that he had followed the security recommendations every day. The guard at the company confirmed his boss would arrive at various times in the morning, that he varied his routes, sometimes arriving from one direction and sometimes from another. He said his boss varied how he arrived, i.e., he varied the use of several cars he owned; he received rides from others, and took taxis from his home to work. So why had the kidnappers taken him? How did the kidnappers know where he was going to be? The guard confirmed that his boss always parked his car in the same space every day, and he was kidnapped as he left his parked vehicle. The aforementioned case happened in Mexico. Though the victim had been given a security briefing and he was aware of the risks around him, he did not apply all of the tools he had learned to every aspect of his daily routine. In a review of cases managed over a six-year period, out of those briefed, only three individuals had been kidnapped. The purpose of security briefings is to enable individuals to recognize the risks that surround them, and then how to respond to those risks. However, this is only possible by following certain criteria for a successful briefing such as a wide range of topics, a qualified presenter, and continuing preventive training. The following is a list of topics that should be covered and highlighted with client-specific information:  Relevant kidnap case studies  How kidnappers work  How individuals are targeted  How to become a difficult target  Should a kidnap occur, how best to survive  Problems specific to the locale The quality of the security consultant who gives the briefing is of equal importance. The consultant should have several years of onsite case management experience, he should have lived in country, or at least be genuinely familiar with the culture of the countries in which clients live and work, and have near native language capability. In times of crises, clients want to know that they will have immediate access to an experienced consultant who will give them specific and time-tested advice. Another aspect of effective preventive training is that of the follow-up briefing. To renew skills and review changing kidnap trends helps to guard against future threats. By following these standards when looking for the proper service provider to perform a security briefing, clients will be confident that they and their family members will be best equipped to mitigate risks after they are trained.

Looking For Love in All the Wrong Places - Catfish Tales
Blog

Looking For Love in All the Wrong Places – Catfish Tales

Robert Mann of Worldwide Intelligence Network has been at the helm of his company for twenty-six years providing private investigation services. It seems incomprehensible at times when his firm receives requests from both men and women asking if we can locate and identify someone they met online. They are referring to people they met on online dating sites and they truly believe they are in love with that person even though they never met that individual in person. As it turns out. one of our female  clients was conned into sending her alleged lover a large amount of money and afterward he simply disappeared. It is astonishing to hear the same story over and over again and it breaks our hearts to learn how so many naïve men and women lose so much of their hard earned money not to mention heir self esteem because of being conned and losing all hope to ever fall in love again. The schemers are males and females behind these cons and they are very good at pushing just the right buttons when corresponding with their victims. They way it works as an example; The con-artists enroll in Match Maker type website. They post photographs of very handsome and attractive men and woman they found online and they register themselves with false identities and those photos. They then begin trolling those websites to bait their victims. Upon finding one, they reach out to them saying their profiles match very close because they have the same interest and some of the same favorite  books and movies and etc.  They establish a dialogue of which reveals that they live outside of the USA allegedly stuck in a country they cannot leave from until they pay a large amount of income tax to the foreign government of that country. They don’t ask their new online friend or lover for money immediately because they want to establish a bond that appears to be undeniably true love because true love never says no. An Example of a Personal Investigation Services Case Here’s an example of one such personal investigation services case we worked on. After sending two bank wires to someone she thought was truly in love with her that amounted to $25,000 she never heard from him again. There was a second con working her simultaneously and that person was a female who said she was the young man’s mother and she stated that she lived in the USA. The alleged mother not only corresponded with her via email she also called her via phone. The alleged mother filled in during the time gaps when her alleged son was busy working on other victims. Dearest mom played a roll of being kind and assuring until the $25,000 was wired made it their bank. A few weeks later both the alleged lover and his mother were back online trying to run a new con on our client who was then under our tutelage. The result of the investigation led us to an address in Alabama that looked like a shack. The second address turned up an operation in Nigeria where there was a boiler room type operation working with dozens of people on keyboards and scripts posted on the walls for them to quote from. The end result, was our client retained us to go to Alabama and work with the local police there who eventually arrested the phony mother who was no stranger to the police. During our investigation we presented our client with hard evidence that man’s photo who victimize her  was posted on several dating sites all over the Internet and we found several other victims of this same person. The good news is our client did meet someone local and married him to our delight. May she live a joyful life. Our advise, never ever commit to sending money to someone you have never met in person and if something said to you doesn’t add up, take a pass.

Blog

Executive Protection Agents & Body Guards

One of the most fulfilling and utterly devoted occupations in the world is that of a Bodyguard also known as an Personal Protection Specialist. A professional Body Guard’s job is to assume the  awesome responsibility of protecting someone’s life. A Personal Protection Specialist makes certain that all possible contingencies are investigated in advance so their client’s passage is safe and secure from possible threats. Many lay persons believe that a tall heavyset foreboding appearing man is enough to scare off a possible perpetrator, Unfortunately, that’s not realistic in the world we live in. A bullet brings down Mr. Big as does a explosive bomb vest and a thrown dagger. What keeps a client safe is intelligence gathering, advance planning and in-depth knowledge of the geographical location the client will be traveling in. A Personal Protection Specialists’ first order of business is to become familiar with the local emergency hospitals and the best routes to those emergency facilities. Quite often local Police Officers are asked to join one of our protective details in foreign countries where their expertise is required.  With a high profile client who has been threatened with violence searching all vehicles in and around the client is crucial to make certain there are no explosives hidden under the vehicles. Ask yourself one pertinent question when thinking about going into a career as a Body Guard. “Are you willing to jump in front of your client to take a bullet?’ If you replied affirmative then ask yourself another question; “Do you have a death wish?’ Personal Protection Specialists don’t rationalize about taking a bullet for their clients, they focus on a chronological list of all the obstacles they need to avoid. Each client assignment is different and evaluated upon the risk associated with the client. For example, a dignitary or high profile political figure is more likely to be under imminent threat of physical violence than a Rock Star. Unless the Rock Star received verbal or written threats to his/her personal safety they do not generally undergo the long list of precautions used for a political figure.  Regardless, what kind of client a Personal Protection Specialist is assigned to, an in-depth one on one discussion is mandatory between the Body Guard and the client to conduct a professional Risk Assessment.  Protecting people or property is a huge responsibility and Worldwide Intelligence Network (wincor) believe we have the finest Personal Protection Specialists in America and around the world, many of whom are former Government Protection Agents and Detectives who have worked on Official Protection Details.

Scroll to Top