Case Studies

Jesus J Jesus J

Executive Travel Security Briefing for Senior Leadership Team

International travel is a defining feature of modern executive life. From board meetings in financial hubs to conferences in geopolitically sensitive regions, senior leaders are constantly on the move. Yet mobility introduces vulnerability. Executives can become targets of cyber compromise, opportunistic crime or state surveillance, particularly when travelling to high-risk regions.

Our client, a multinational organisation with operations across Europe and the Middle East, engaged us to deliver a tailored Executive Travel Security Briefing. With senior executives scheduled to attend a major event in the Middle East, the leadership team required assurance that they understood the risks and were equipped with clear, actionable protocols.

We designed and delivered, in-person briefing that combined regional threat intelligence with practical digital and physical resilience measures. The result was a leadership team that travelled with confidence, armed with a playbook of behaviours and contingencies to safeguard both themselves and corporate information.

Read More
Jesus J Jesus J

GPS Jamming Detection Pilot for Executive Vehicle Fleet

Vehicle theft and executive transport disruption have evolved beyond traditional methods. Increasingly, adversaries employ GPS jammers to disable tracking systems, obscure vehicle movements or delay response times during theft or abduction attempts. For high-profile organisations and their leadership, the ability to detect and respond to such attacks is not optional — it is critical.

Our client, a multinational with a fleet of executive vehicles operating across Europe, engaged us to design and deliver a pilot GPS jamming detection system. Their goal was simple: determine whether their vehicles were at risk from jamming and evaluate whether real-time detection could enhance resilience.

We deployed prototype detection hardware across a subset of the fleet. The system logged and reported attempted jamming events, feeding data back into a central analysis platform. The pilot uncovered two incidents of attempted jamming within the test period, validating the threat and demonstrating the need for scaled deployment.

The outcome was clear: the client gained both proof of concept and proof of value. They established an early-warning capability that could not only protect their assets but also feed into wider law enforcement intelligence around vehicle theft.

Read More
Jesus J Jesus J

Physical Penetration Testing of a Multinational Headquarters

Physical security remains the first line of defence for any organisation. While cybersecurity investment continues to grow, physical access to facilities can render even the most advanced digital defences obsolete. From cloned access cards to visitor badge abuse, adversaries have an expanding toolkit for gaining entry to sensitive spaces.

Our client — a multinational corporation headquartered in Manchester— sought assurance that their physical security measures were effective against real-world adversarial techniques. They engaged us to conduct a controlled physical penetration test of their flagship office building.

Over the course of a carefully scoped engagement, our red-team operators successfully bypassed security staff, cloned an access badge and gained access to two restricted floors. The test revealed procedural weaknesses in visitor management and a reliance on outdated badge configurations.

The outcome was a positive one: no assets were compromised, but the client gained critical insight into vulnerabilities, retrained their staff and restructured visitor badge permissions. This case demonstrates how controlled penetration testing can expose gaps before adversaries exploit them.

Read More
Jesus J Jesus J

Secure Communications Deployment for a Multinational Executive Team

In the modern threat environment, executive communications are a prime target. From state-sponsored adversaries to commercial competitors, the interception of sensitive discussions can yield intelligence of immense value. Traditional mobile devices, reliant on commercial operating systems and default configurations, are increasingly vulnerable to exploitation through spyware, network manipulation and social engineering.

Our client, a multinational headquartered in Europe, approached us with a clear mandate: provide their executive team with a secure, private communications capability that could operate independently of commercial infrastructure where necessary.

Over our engagement, we designed, built and deployed a secure communications ecosystem centred on hardened mobile operating system, combined with VPN and end-to-end encrypted messaging platforms. Each executive received one-on-one training on device usage, privacy principles and secure travel protocols.

The outcome was immediate and measurable. The executive team adopted the devices seamlessly, reducing reliance on insecure consumer apps and gaining assurance that sensitive conversations, files and travel details were protected. The project was not just a technical deployment — it was a cultural shift in the way the organisation approached secure communications.

Read More
Jesus J Jesus J

Technical Surveillance Countermeasures (TSCM) Sweep for a High-Profile Negotiation

Confidential negotiations and boardroom discussions often involve commercially sensitive information — details that, if leaked, could alter market valuations, influence competitors or undermine strategic positioning. For organisations operating at scale, the risk is no longer hypothetical. Surveillance devices are increasingly accessible, inexpensive and discreet, making them a realistic threat to corporate security.

Our client, a Paris-based multinational organisation, engaged us to perform a Technical Surveillance Countermeasures (TSCM) sweep of their headquarters ahead of a high-stakes negotiation. Their concern was straightforward: could their sensitive conversations be intercepted without their knowledge?

Through a structured, technology-led sweep, we identified two insecure VoIP phones and one misconfigured Wi-Fi access point that could have allowed unauthorised eavesdropping. While no hostile devices were found, the vulnerabilities we uncovered highlighted the importance of regular TSCM audits as part of a comprehensive security strategy.

The sweep provided not only reassurance but also a clear roadmap for remediation. Ultimately, it reinforced the client’s confidence that negotiations could proceed without compromise.

Read More
Jesus J Jesus J

Digital Exposure Review for a High-Profile Client

In today’s interconnected world, the lines between professional and personal digital footprints are increasingly blurred. For senior executives, board members, and high-profile organisations, this creates significant vulnerability. From oversharing on social media to legacy breaches leaving credentials exposed, these fragments of information can be aggregated and weaponised by adversaries.

Our client — a multinational enterprise preparing for a flagship industry event — engaged us to conduct a Digital Exposure Review. Their goal was to understand what was visible online about their executives and corporate operations and to take immediate steps to reduce potential threats.

Over our investigation period, we applied a structured methodology combining open-source intelligence (OSINT), breach data analysis, and behavioural exposure mapping. We identified critical risks, including active credential exposure, metadata leaks and personal oversharing by staff and executive “circle of trust” members.

The outcome was tangible: the client reduced phishing exposure, mitigated reputational risks, and equipped their executive team with actionable steps to maintain digital hygiene moving forward.

Read More