When crisis hits, you need a calm, experienced team by your side… fast.

The world changes quickly - which means your approach to privacy and security needs to stay one step ahead. We provide fast and intelligent crisis response to physical and virtual threats.
Overview

Our critical risk capabilities

“Everyone has the right to life, liberty, and security of person” – this is enshrined in the Universal Declaration of Human Rights. If this right is breached, we can help.

Whether it’s kidnap, cyber extortion or stalking, we will help you through the crisis. Our team includes former senior leaders from government intelligence, US & UK law enforcement, and crisis response firms. You’re in safe hands in your toughest times.

Everyone has the right to life, liberty, and security of person

Universal Declaration of Human Rights, Article 3
Capabilities
Illegal detention response
Kidnap for ransom & extortion
Missing persons
Resilience training
Security risk analysis, planning & management
Stalking and fixated behaviour
Vetting
Case Study

Problem

When two employees of an international energy company were kidnapped on their way to a plant in Nigeria, there was no time to lose. We had to act fast for our client – a large company with a presence in around 70 countries.

What we did

On receiving the emergency call we deployed our consultants to our client’s local headquarters in Lagos. There, we assisted in the formation of a Crisis Management Team (CMT) and the selection of a communicator. Using our regional intelligence assessments, we were able to establish a timeline framework and target settlement figure.

In this kind of work there are many stakeholders to manage – and we worked with our client to liaise with the victims’ families and friends, their co-workers, local authorities, the media and governments (both Nigerian and the victims’ national governments).

Result

The victims were safely released after 44 days.

Team

Global experts

Our interdisciplinary global partners are committed to fighting falsehoods and protecting privacy.

All services

We are the only business in the world to deploy – under one roof – media experts, data protection lawyers, litigators, experts from military intelligence, investigative journalists, international investigators, cyber security specialists, digital forensic experts and senior people from the military, police and government.

Litigation & Disputes

The go-to legal experts when your privacy, reputation or security are under attack.

Capabilities
  • Anti-harassment & paparazzi deterrence
  • Breach of confidence
  • Breaches of Privacy & Injunctions
  • Contractual disputes
  • Data Protection & GDPR
  • Defamation & libel
  • Employment Litigation
  • Intellectual property & copyright
  • Misuse of data
  • Regulatory Complaints & Arbitration
Intelligence & Investigations

Ethical, boundary-pushing intelligence gathering to find facts and get ahead of problems, fast.

Capabilities
  • Anti-corruption & fraud investigations (FCPA & UK Bribery Act)
  • Asset tracing & recovery
  • Expert witness testimony
  • Influencer screening
  • Internal investigations
  • Litigation & dispute support
  • Reverse due diligence
Digital Communications

Digital wizards fighting falsehoods and putting you back in control of your online narrative.

Capabilities
  • Audience analysis
  • Competitor & market insights
  • Digital portfolio forensics
  • Falsehood identification
  • Research & analytics
  • Resilience building
  • Search result audit & monitoring
  • Social Listening & Analysis
Critical Risk, Physical & Cyber Security

The experts you need on your team – just not every day. Cyber security, physical security and geopolitical advice to keep you safe before, during and after a crisis.

Capabilities
    • Geopolitical advisory
    • Private diplomacy
    • Illegal detention response
    • Kidnap for ransom & extortion
    • Missing persons
    • Resilience training
    • Security risk analysis, planning & management
    • Stalking & fixated behaviour
    • Vetting
    • CISO-as-a-service
    • Design, test & secure systems
    • Digital forensics
    • Technical Surveillance Counter Measures (TSCM)