When crisis hits, you need a calm, experienced team by your side… fast.

The world changes quickly - which means your approach to privacy and security needs to stay one step ahead. We provide fast and intelligent crisis response to physical and virtual threats.

Our critical risk capabilities

“Everyone has the right to life, liberty, and security of person” – this is enshrined in the Universal Declaration of Human Rights. If this right is breached, we can help.

Whether it’s kidnap, cyber extortion or stalking, we will help you through the crisis. Our team includes former senior leaders from government intelligence, US & UK law enforcement, and crisis response firms. You’re in safe hands in your toughest times.

Schillings Critical Risk proudly partners with Brit Insurance to provide a comprehensive kidnap for ransom offering.

Everyone has the right to life, liberty, and security of person

Universal Declaration of Human Rights, Article 3
Illegal detention response
Kidnap for ransom & extortion
Missing persons
Resilience training
Security risk analysis, planning & management
Stalking and fixated behaviour
Case Study


When you’re in the public eye, you can attract the wrong kind of attention. Our client – a high-profile creative – had received several threats of both kidnap and physical harm. Living with this fear was understandably creating enormous stress.

We stepped in to help mitigate the risk and create a feeling of badly needed safety.

What we did

We worked fast, conducting an in-depth privacy exposure review of the client and their family members. This helped us understand the scope of personal information available online.

Our research identified a range of sensitive personal data, including home addresses, architectural drawings, planning applications, social media accounts and personal photographs – all of which was publicly available.

With these findings, our specialist lawyers acted quickly to request the removal of this information online. We also provided social media training to help the client and their family strengthen their privacy settings and awareness of online privacy best practice.


The safeguarding advice we provided to the individual’s family helped reduce their online exposure and made them less of a target. The threat that prompted the assessment was monitored but never materialised.

All services

We are the only business in the world to deploy – under one roof – media experts, data protection lawyers, litigators, experts from military intelligence, investigative journalists, international investigators, cyber security specialists, digital forensic experts and senior people from the military, police and government.

Litigation & Disputes

The go-to legal experts when your privacy, reputation or security are under attack.

  • Anti-harassment & paparazzi deterrence
  • Breach of confidence
  • Breaches of Privacy & Injunctions
  • Contractual disputes
  • Data Protection & GDPR
  • Defamation & libel
  • Employment Litigation
  • Intellectual property & copyright
  • Misuse of data
  • Regulatory Complaints & Arbitration
Intelligence & Investigations

Ethical, boundary-pushing intelligence gathering to find facts and get ahead of problems, fast.

  • Anti-corruption & fraud investigations (FCPA & UK Bribery Act)
  • Asset tracing & recovery
  • Expert witness testimony
  • Influencer screening
  • Internal investigations
  • Litigation & dispute support
  • Reverse due diligence
Digital Communications

Digital wizards fighting falsehoods and putting you back in control of your online narrative.

  • Audience analysis
  • Competitor & market insights
  • Digital portfolio forensics
  • Falsehood identification
  • Research & analytics
  • Resilience building
  • Search result audit & monitoring
  • Social Listening & Analysis
Critical Risk, Security & Advisory

The experts you need on your team – just not every day. Cyber security, physical security and geopolitical advice to keep you safe before, during and after a crisis.

    • Geopolitical advisory
    • Private diplomacy
    • Illegal detention response
    • Kidnap for ransom & extortion
    • Missing persons
    • Resilience training
    • Security risk analysis, planning & management
    • Stalking & fixated behaviour
    • Vetting
    • CISO-as-a-service
    • Design, test & secure systems
    • Digital forensics
    • Technical Surveillance Counter Measures (TSCM)