INTELLIGENCE MANAGEMENT

PROTECTIVE INTELLIGENCE

ABOUT US

Anticipating Risks

We provide ongoing monitoring of potential threats, comprehensive risk assessments, and strategic use of information to protect our clients and impede the malicious intelligence efforts of others.

We cover the full spectrum of intelligence gathering disciplines including HUMINT, OSINT and FININT. We integrate the collected data in our intelligence cycle management. This refers to the overall activity of guiding the intelligence cycle, which is a set of processes used to provide decision-useful information (intelligence) to our clients and decision makers.

Our proactive approach is designed to identify and neutralize threats before they impact client safety.

WHAT WE DO

Provide Decision-Useful Intelligence to our Clients

Because of our military background, we use what military strategist John Boyd created: the OODA Loop. This is a model of decision and action, originally for air-to-air fighter combat, but which has proven useful in many areas. Our model has four phases, which, while not usually stated in terms of the intelligence cycle, do relate to that cycle:

  1. Observe: become aware of a threat or opportunity.
  2. Orient: put the observation into the context of other information.
  3. Decide: make the best possible action plan that can be carried out in a timely manner.
  4. Act: carry out the plan.

After the action, the actor observes again, to see the effects of the action. If the cycle works properly, the actor has initiative, and can orient, decide, and act even faster in the second and subsequent iterations of the Boyd Loop.

Eventually, if the Boyd process works as intended, the actor will “get inside the opponent’s loop”. When the actor’s Boyd cycle dominates the opponent’s, the actor is acting repeatedly, based on reasoned choices, while the opponent is still trying to determine what is happening.

HUMAN INTELLIGENCE (HUMINT)

Human intelligence is intelligence gathered by means of human sources and interpersonal contact. It is distinct from more technical means of intelligence gathering such as signal interception. HUMINT can be conducted in a variety of ways, including via interviews, information analysis and conversations with persons having access to information.

  • Interviews
  • Information Analysis
  • Contacts to Information (CTI)

OPEN SOURCE INTELLIGENCE (OSINT)

Open-source intelligence (OSINT) is gathered from open sources. OSINT can be further segmented by the source type: Internet/General, Scientific/Technical, and various HUMINT specialties, e.g. trade shows, association meetings, and interviews.

  • Internet & Open Data Collection
  • Scientific and Technical Data
  • Events, Commercial, and Industrial Data

FINANCIAL INTELLIGENCE (FININT)

Financial Intelligence (FININT) is the gathering of information about the financial affairs of entities of interest, to understand their nature and capabilities, and predict their intentions. Financial and business intelligence has emerged as a best practice and core competency in many organizations leading to improved financial results, increased employee morale, and reduced employee turnover. Many organizations include financial intelligence programs in their leadership development curriculum.

  • Data Collection
  • Data Analysis
  • Financial & Business Intelligence Training

COUNTERINTELLIGENCE

Counterintelligence is tasked with impeding the intelligence efforts of others. It is part of the of the intelligence cycle management. A variety of security disciplines also fall under intelligence security management and complement counterintelligence. We use the necessary ressources to protect our clients intelligence management cycle and stay ahead of the curve regarding the client security needs.

  • Operationnal Security (OPSEC)

  • Defensive Counterintelligence
  • Foreign Interference Analysis & Protection (including technical and cyber intelligence and countermeasures)

OUR PROTECTIVE SERVICES

Our executive protection teams have extensive experience safeguarding executives and high net worth clients across different industries, addressing various threats. If you want to be proactive or are concerned about your safety, our close protection staff is the foremost option for protection. Here are some common scenarios in which our Executive Protection teams can be deployed:

  • Principal Protection
  • Family Security & Residential Coverage
  • Secure Transportation & Travel
  • Asset Protection & Surveillance
  • Corporate Security
  • Surveillance/Countersurveillance & Intelligence Services

WHY CHOOSE US

We purposely specialize in executive protection. We combine years of military special operations in domestic and international area of operations. Our focus enable us to ensure the safety and protection of our clients and their assets worldwide. In addition, we provide you with a nimble structure with direct client engagement by senior executives.

  • Extensive Military Special Operations & Intelligence Experience.
  • Experience in Domestic and International Areas of Operation with Extensive Network of International Security Partners.

  • Nimble Structure with Direct client Engagement by Senior Executives.
  • Our Internal Technological Infrastructure is “United States National Defense Authorization Act (NDAA) Infrastructure Compliant”.
  • We Possess the “Authorization to Contract” from the Quebec Public Markets Authority (AMP).
  • We are a “Licensed Security Agency” by the Bureau of Private Security (BSP-Quebec).
  • We Adhere to the “ASIS Code of Ethics” and the “International Code of Conduct for Private Security Service Providers (ICoCA)”.

CONTACT US

Thank you for your interest in contacting us. Your questions, feedback, and inquiries are important to us, and we’re here to assist you in any way we can.

Name(Required)
This field is for validation purposes and should be left unchanged.