Threat Management

Our staff of former prosecutors, law enforcement officers and security specialists can investigate threats and advise on controlled, confidential and systematic ways to respond.

Corporate and social disaffection is a breeding ground for threatening behavior from individuals aimed at institutions, corporations, or their personnel. This can take many forms — from stalking and harassment to unwanted communications and disruptions.

Our staff of former prosecutors, law enforcement officers and security specialists can investigate the source of threats and advise you on the most appropriate and effective ways to respond.

Sometimes, it’s not easy to tell when a customer or critic is just blowing off steam and when a complaint is a harbinger of worse to come. Built on years of experience, our services will help you manage threats of this kind in a systematic, controlled, confidential and secure way.

Effective threat management in five steps

  • Assess the threat. Why are you being targeted and what precipitated the threat? Once we establish your risk parameters, we can advise you on the most appropriate course of action and investigative steps.
  • Investigate the threat. If the suspect is unknown, we’ll narrow the field by aligning what we learned in the assessment stage with a wide variety of investigative strategies, including detailed background searches and subject surveillance.
  • Review security and provide executive protection. This includes ensuring you have contingencies, personnel and systems in place to mitigate the threat. Additionally, our executive protection professionals are trained, licensed, and experienced.
  • Determine the response. As necessary, we’ll work with your outside counsel and third party specialists (e.g., psychologists/psychiatrists) to determine the most effective response within existing civil and legal frameworks.
  • Establish and execute an intervention plan. After deciding on the response, we’ll develop and carry out the plan to address the threat. This may be as simple as visiting the source of the threat or civil remedies such as a restraining order, mental health intervention, or law enforcement involvement.

Related Case Studies