Tag Archives: Secret Service

Reputation Communications. Ultra High Net Worth

Having worked with ultra-high net worth individuals and families over the years, we have become attuned to the issues they face: heightened privacy and security pressures, invasive interest in their private and business lives, unwanted attention in a high-risk world, and being the focus of unrelenting hacker attempts to access their confidential and financial data.

Attorneys, family offices and security teams go hand-in-hand with reputation management. We work in tandem with one or more such experts when planning crisis responses and reputation repair programs during engagements with ultra-high net worth clients.

With that in mind, we checked in with Charles Marino, CEO of Sentinel Security Solutions, LLC, who works with ultra-high net worth families and other high-end clients. Charles

A former supervisory special agent with the United States Secret Service, Mr. Marino previously served under three presidents and is presently  a prominent Global Security Expert. He has extensive experience in the development and execution of  complex security and operational strategies, plans, protection programs, and budgets for the U.S. government, high net worth clients, major sports teams, and Fortune 500 companies. He is a frequent contributor on major news networks, providing expert analysis on tops of national and homeland security, and law enforcement. He is also a contributor at The Hill.

Your view is that keeping clients safe includes reputation safety. Can you explain what you mean by that?

Clients work a lifetime to create their own personal reputations and “personal brand.” In many instances, they are also closely connected to a major corporate brand based on their position within a company. Keeping in mind just how much a security-related incident can negatively impact reputational management and vice-versa, it is important to identify what items encompass a thorough security operation when creating protection plans and procedures. While the physical safety and security of the client is the most obvious concern to many, it is certainly not the only. It is essential to identify and mitigate all threats and hazards that, if left exposed, could cause the same reputational damage to clients as physical threats. The myriad of additional threats which could directly impact the client’s reputation include poor cyber security and insufficient asset protection. 

Cyber security is an area that cannot be ignored or handled by unqualified people. An initial and ongoing cyber assessment should always be conducted by a qualified company to safeguard a client’s personal and business communications, photos, smart homes, etc. Poor cyber programs are certain to jeopardize client privacy and increase reputational risk.

Asset protection is also essential. A breach of any asset is highly likely to draw attention to the client. Various plans can be put in place that do not always require full time physical protection of assets. Each client and environment is unique in this sense.

Ultra-high net worth individuals are frequent targets of intelligence gathering. How does your work prepare and defend against that?

To understand the intelligence landscape associated with clients, an initial overall threat assessment is conducted to assess the general level of public interest, available public information, and risk based on lifestyle. The assessment includes items such as a client’s overall recognizability, wealth, public profile, publicly known assets, family, businesses, unusual directions of interest, and, if applicable, existing security programs.

The creation of a comprehensive protective intelligence program, including ongoing threat assessments, provides the metrics and information necessary to form the initial foundation of a comprehensive security and reputation management program.

Protective intelligence programs should primarily be proactive in nature to identify and mitigate vulnerabilities. A successful program allows for the adjustment of a client’s security posture when needed in response to any adverse information and analysis. This is the key to staying ahead of potential incidents and threats.

Finally, for many ultra-high net worth clients business has come to the home even more, and especially in light of the ongoing pandemic. Similar to corporate business environments, periodic technical countermeasures surveillance sweeps should be undertaken at the home to search for and detect potential electronic eavesdropping devices.     

What do you wish your clients knew that —too often, you find —they do not?

First, that security does have a return on investment. Quite simply, a properly constructed and implemented security program allows for clients to be more effective and efficient in their daily activities and businesses by eliminating unnecessary risks and distractions associated with all facets of their lives.

Second, the client should be active in their own security. Communicate with the person you hired who thinks about security as their full-time job. The participation of the client allows for the creation of a successful and dynamic security plan.  

How do your crisis management and communications plans help to save reputations as well as mitigate and repair reputation damage?

The plans I create for clients are unique to them and their family office structure, and account for a wide array of possible scenarios. It is important to identify decision makers who need to be part of a crisis management team and, more importantly, who doesn’t. If not undertaken correctly, having the wrong people at the table in a time of crisis will be detrimental to the client.

An organization’s crisis management team is the mechanism for responding to a crisis and mitigating further damage – efficiently! They are responsible for setting preexisting response plans to specific incidents in motion and offering recommendations to the client on further response and mitigation steps. If a scenario has not been planned for, the crisis management team is the consensus on a proposed response.

Crisis management drives crisis communication. How you successfully or unsuccessfully manage a crisis will drive the narrative. Similar to preparing security plans for various scenarios, the same holds true for preparing press statements in advance that can be quickly augmented to allow for rapid communications when required. To preserve the client’s reputation, being prepared for the successful management of a crisis is necessary and should be practiced before  an actual crisis.

This is part of our continuing series of interviews with experts whose work relates to online reputation management.      

 
 
Philip Grindell, Reputation Communications Interview

Philip Grindell, was a Scotland Yard Detective for London’s Metropolitan Police when Jo Cox, a British politician and Member of Parliament, was murdered. He set up the Metropolitan Police team to mitigate such risks, introducing best practices from across the world. In 2019, he retired from the Police and set up Defuse to protect family/executive offices, high-profile individuals and well-known brands from targeted and fixated physical, reputational & financial harm on social media and the dark web.

Now, working alongside a team of experts, he brings the same level of intelligence and counsel to high-profile individuals, organizations and their teams who are dealing with or want to prevent abuse, threats, or a high-risk situation. Defuse is based in London and serves clients internationally, from the Middle East to the U.S. We interviewed him to get the state-of-the-moment take on what you need to know when you fall into that group.

What sparks public figures to reach out to you?

Receiving abuse, a death threat or feeling like their safety might be in jeopardy. But most genuine threats are not direct. Often, they are subtle.

We understand how to identify serious threats from false ones. There are many social media users who are fixated on celebrities, politicians and a range of other high-profile types. When you are the subject of such focus, you understandably become increasingly anxious, fearful and confused about these interactions. It is hard to to identify who the communicators are, whether they pose a threat and how to manage the communications.

This uncertainty compounds the fear, frustration and the lack of control our clients’ experience.

How do you evaluate the level of risk of such threats?

In general, those who threaten often do not actually pose a threat. There has been significant research into this, initiated by Defuse’s special advisor, Dr Robert Fein. Dr Fein was tasked by the US Secret Service to review all attacks and attempted attacks on prominent public officials in the United States since 1949.

It is important to understand the signs of cyberstalking as it can escalate into a particularly dangerous behavior. This is especially true with ‘celebrities’ with whom stalkers may start as fans and then turn dangerous when the stalker’s expectations are not met.
An indication of this may be a sudden change in their behavior, making a physical approach or starting to communicate via different channels, such as moving from social media to phone calls, or emails or multiple methods.

How does Defuse combat online abuse?

The very first task of a security specialist when tackling online abuse is to analyze whether the individual receiving online abuse is in any physical danger. Most online abusive posts are not going to lead to a physical attack, but remain deeply hurtful, at times frightening and often corrosive.

Many who are repeatedly targeting high profile people can have associated mental health challenges. Each case requires a particular response bespoke to its circumstances. To ensure that the response is the correct one, a more forensic approach is required. One size does not fit all! By psychoanalyzing the communications it’s possible to identify specific personality issues, which can then direct the response.

If you are considering an intervention, it is vital that this is supported by analysis and if appropriate some form of surveillance be that online or physical. It is crucial that any sudden change of behavior is quickly identified, and the appropriate security measures considered.

In your media interviews, you’ve said women are the most common targets of online harassment.

Yes. In a Daily Mail interview, I was quoted as saying: ‘Anyone in the public eye can become a target for online abuse but women are attacked in a very personal way.” I believe misogyny should be made a hate crime.

In a recent blog post, you also warned about an increase in threats to C-Suite-level executives and CEOs.

Due to the daily reports of COVID-related job loss and loss of bonuses, Defuse predicts an escalation of personal threats to CEOs and C-Suite executives.

Most targeted campaigns are by fixated persons, such as those suffering from deteriorating mental health or activists, and they usually start from a grievance such as being dismissed from their job. A grievance can quickly escalate along what we call a ‘pathway to violence’. The targets of this hostility are escalating risks to CEOs, other members of the C-Suite HR executives and their families. While the most visible reports concern social media abuse, less well publicized are personal threats communicated via emails, forums and letters.

Personal reputation attacks are also likely. The ‘cancel culture’ is destroying reputations, careers and organizations almost overnight. Those targeted may suffer fear, anxiety and diminishing performance. Organizations should recognize and support those targeted and have confidential solutions readily available to deploy.

There are a number of ‘red flags’ that will be apparent but are often ignored often because they can be counterintuitive. The key is to differentiate those who make threats from those who pose them.
*
Philip Grindell is one of the UK’s most trusted advisors when it comes to fixated persons and national security issues. He was called in to serve in Parliament while serving as a Scotland Yard Detective for Metropolitan Police investigations, a role he held for almost 30 years, including time spent seconded to British Intelligence on Counter-Terrorist investigations.

He was also employed as a Counter-Terrorism Security Coordinator to ensure that high profile events, including Royal and Government events, were safe from terrorist attacks with detailed contingency plans. His background also includes threat intelligence, risk management, protective security, and expertise in analyzing and predicting the behavior of stalkers.

This article is part of our continuing series of interviews with experts whose work relates to online reputation management.

 
 
Scott Alswang: Protector of Celebrities, CEOs and VIPs

The Internet has made the security industry far more complex. For celebrities, CEOs and VIPs, it means pictures of their homes can be online, their office addresses are public knowledge and pictures of their cars and children are available for anyone to see. That contributes to their risks at home, while traveling, or attending large-scale events. When they lead major organizations or champion controversial causes, they can become targets for many types of crimes. We asked international security expert Scott Alswang what VIPs need to know in today’s environment. A former Secret Service agent, he has provided protection services for every U.S. president from Ronald Reagan to George W. Bush as well as for dignitaries, high profile global executives and prominent individuals. 

You work with many celebrities. What are examples of what they should not do?

My first rule is, never drive a car. Because of the ubiquity of the paparazzi and other intrusive types of people, always use a driver who is a trained security specialist. When you are a celebrity, you are your own intellectual property. You must protect that. Don’t become complacent. Realize your children are targets for kidnapping and you are a target for faux lawsuits and other financial crimes. So don’t rely on your instinct or your friend’s opinions when you hire people: check references and conduct due diligence checks. When you are not proactive on these fronts, it can affect your public image and you can lose control over your story. That can harm your brand, although your safety is my main concern.

CEOs and C-Suite executives face special issues, especially when they travel out of the country.

Too many continue to broadcast their locations on social media. That makes them vulnerable to carjackings when they travel. They often also lack computer security on their laptops and other devices, which increases their vulnerability to hacking. When they are associated with publicly traded companies that can severely impact a career and impact a reputation that has taken years to build. Many are targets for Russian or European hackers. Rogue groups put spyware in place to obtain confidential or private information that may affect stock price or ruin a reputation. Express kidnappings in Mexico and Brazil, cloning of computers in China, audio countermeasures in your hotel room spying on you when you’re most at ease, spiking your drink — these are all things that can and do happen to business people while traveling, especially when they are associated with a well-known organization.

What are some other areas that folks with high visibility should be aware of?

Celebrities and high net worth folks, especially C-suite types running a publicly traded company, sometimes forget that the most mundane thing makes news and can bring unwanted attention with potentially embarrassing consequences. Folks with high visibility must conduct themselves differently in this TMZ environment. Most know to be courteous in public. Many forget that their private life on the web may not be private. It’s a dangerous world out there and becoming more so. Many high net worth individuals and celebrities don’t see any ROI employing security professionals, executive protection specialists, reputation defenders or vetted staff to ensure trust and security with sensitive matters. It is important to realize that not everyone loves a movie star or the CEO of a company that conducts animal testing, or whose stock has plummeted and lost money for stakeholders while the CEO receives an eight-figure salary and bonus. Some people are resentful, some are unhinged and some are downright dangerous. Emotionally disturbed people or sane people set on kidnapping or blackmail for profit are risks that the security experts can help thwart. Just as you dress for success, prepare and protect your future physically, at home, at work and online. Live a safe, conflict-free life. Coordinate security and safety with a professional.

Scott Alswang is the CSO of Titan HST. He served for 20 years in the United States Secret Service and retired as the assistant to the special agent in charge of the New York Field Office of the United States Secret Service. During his service he protected every U.S. president from Ronald Reagan to George W. Bush. Mr. Alswang also conducted protective advances for every major foreign head of state that visited the United States of America.  He is director of the Association of the Former Agents of the United States Secret Service, a fraternal and charitable organization comprised of 6000 former U.S. Secret Service agents. He regularly appears on national/international TV and radio to speak about security issues.  Mr. Alswang graduated from William Paterson University with a BS in Public Safety Administration and completed a MA in Criminal Justice at City University of New York’s John Jay College of Criminal Justice. This is the eighteenth in a series of interviews with experts whose work relates to online reputation management.