Media & Speaking

About

We work in the overlap between cybersecurity, open-source intelligence (OSINT), and real-world risk. Where digital exposure leads to physical consequences.

Our CEO, Jesus, has a background that spans operational deployments, digital forensics, counter-surveillance, and intelligence-led security work, supporting individuals and organisations exposed to elevated threat environments. Much of this work is deliberately low-profile.

While specific client details and operations cannot be discussed, the patterns, mistakes, and lessons behind modern digital exposure are increasingly relevant to everyday people, professionals, and public figures.

His focus is not hacking or tools, but how people are identified, profiled, and located using information they unknowingly leave behind.

Topics He Speak On

He is particularly well-suited to discussions around:

  • How people expose themselves online without being hacked

  • OSINT in the real world (beyond social media and tools)

  • When digital privacy failures become physical security problems

  • Surveillance myths vs operational reality

  • Why “security awareness” often fails under stress

  • The convergence of cyber, physical, and human factors

  • Ethical boundaries and misconceptions around OSINT

  • Lessons from high-risk environments that apply to civilians

No sales pitches. No fear-mongering. Practical, grounded insight.

Audience Fit

His work resonates most with:

  • Cybersecurity & technology audiences

  • Journalists and investigative communities

  • Privacy-conscious professionals

  • Founders, executives, and public-facing individuals

  • Security-curious listeners who want realism over hype

Previous Experience

Without breaching confidentiality, his professional experience includes:

  • Digital forensics and intelligence-led investigations

  • OSINT assessments for legal, corporate, and private clients

  • Counter-surveillance and technical security work

  • Training and advisory roles in complex and hostile environments

  • Bridging cyber concepts into non-technical decision-making

This work has been conducted both in the UK and internationally, often under operational, legal, or reputational constraints.

Media Guidelines

To ensure accuracy and safety:

  • He will not discuss named clients, live operations, or sensitive locations

  • He will avoid detailed “how-to” instructions that could be misused

  • He is happy to explain why things happen, not step-by-step exploitation

  • Discussions are always framed around awareness, defence, and risk reduction