Threat Armor℠ Legal

Threat Armor’s integrated approach to cyber and physical security facilitates exceptional enterprise security governance and risk management practices. Investigations, procedures and processes do not compromise downstream litigation and afford expert testimony on subsequent litigation.Portrait painted with fluorescent makeup under the ultraviolet l

Advanced proprietary technologies and enhanced forensic capabilities employed capacitate collection and preservation of evidence of documents, electronic records, video records and “presence” records.

Select Case Studies / Notable Matters

  • An unknown person was physically and electronically stalking a celebrity. We trained the celebrity to effectively respond to the unwanted attention and also engaged the stalker online. This allowed us to build a profile of the stalker and predict the stalker’s activity. Using this profile enabled us to draw out the stalker, photograph the individual and identify them. After the stalker was confronted with the identification and the threat of prosecution, the stalker ceased the harassment.
  • An individual with a substantial retinue of employees, assistants and service people owns several homes each of which contains collections of considerable value. An insider who was aware of the security arrangements at the various homes and who was intimately familiar with the individual’s travel agenda shared vulnerability information with outsiders who were then able to defeat the electronic and physical security measures at two of the homes and steal millions of dollars worth of the individual’s collection. Threat Armor services allowed the client to set up a scenario utilizing the insider’s predictable pattern of betrayal in which the thieves were identified and subsequently arrested by law enforcement. They in turn named the insider who had aided them. The insider was removed from the individual’s environment and later charged and convicted of multiple felonies.
  • The Threat Armor team tracked and repatriated offshore funds misappropriated from a US-based financial institution.

 

Global Reach

  • The United States of America
  • Algeria
  • Afghanistan
  • Australia
  • Belgium
  • Belize
  • Bermuda
  • Brazil
  • Canada
  • Cayman Islands
  • Chile
  • Czech Republic
  • France
  • Germany
  • Greece
  • Guyana
  • Haiti
  • Iceland
  • India
  • Indonesia
  • Iraq
  • Israel
  • Italy
  • Japan
  • Jordan
  • Kuwait
  • Mexico
  • Morocco
  • Netherlands
  • Nigeria
  • Philippines
  • Portugal
  • People’s Republic of China
  • Russia
  • Singapore
  • South Africa
  • South Korea
  • Spain
  • Switzerland
  • Taiwan
  • Thailand
  • Turkey
  • Ukraine
  • U.K.

Industries Served

  • Advertising
  • Aerospace and Defense
  • Airline and Travel
  • Arts, Entertainment & Recreation
  • Automotive
  • Biotechnology
  • Construction
  • Corporate Security
  • Electronics
  • Energy
  • Financial Services
  • Government
  • Healthcare
  • High Technology
  • Insurance
  • Investment Management
  • Manufacturing
  • National Security and International Affairs
  • Pharmaceuticals
  • Professional Sports
  • Publishing
  • Real Estate
  • Telecommunications
  • Transportation and Warehousing