SlideShare a Scribd company logo
1 of 10
Escape the Wolf Presentation for Barilla 3 OCT 2011
ESCAPE THE WOLF - Our Mission
Wolves are everywhere in an uncertain world –
 • a stolen laptop with sensitive data.
 • the natural disaster that strands a traveler.
 • a sudden illness in a strange land.
Many travelers are unaware of threats, or wolves.

Are your executives and employees prepared?
Escape the Wolf delivers preemptive threat
assessment, recognition and avoidance. We help
travelers evolve from mindless sheep to alert
sheepdogs able to detect and elude wolves.                                                               Master metaphor for society - Sheep, Wolves,
                                                                                                                        Sheepdogs




                  While attached to a government intelligence agency, (Wolf CEO) Clinton Emerson
                  identified the need for high-level global travelawareness training. His curriculum is based
                  on successful offensive and defensive tactics, techniques and procedures of the most
                  highly skilled law enforcement, intelligence, and special operations units. Today, Emerson
                  and his cadre of highly experienced sheepdogs at Escape the Wolf share their knowledge
                  and expertise with global travelers.


         © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
         and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF - Capabilities
 Get the Edge on Threats - Preemptive, Holistic Approach




                                                      Escape the Wolf’s THREAT® matrix is a convenient way to research potential
                                                      risks prior to travel and an important memory tool to identify threats.




With Escape the Wolf, organizations enjoy –

• An end-to-end solution to keep employees safe and aware of travel and security risks, including
  kidnap avoidance.

• Preemptiveapproach with Escape the Wolf's flagship Total AwarenessSM system to identify, elude
  or minimize most threats.

• Best-of-the-best experts – government, defense, law enforcement and security experts –
  experienced in risks and lifelong travelers to the most remote and dangerous environments.

• Holistic, innovativetravel resources andeLearning, hands-on training and tailored consults
  transform travelers from unaware sheep into self-confident sheepdogs able to fend off wolves in
  changing environments.

          © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
          and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – The Book
      ESCAPE THE WOLF: Personal Security Handbook
              for the Traveling Professional

• Immediately start to build and practice travel security
  awareness. Learn how to recognize threats –from common
  crime, illness, natural disasters, competitive intelligence theft, or
  even terrorism – using Escape the Wolf’s proven Total
  AwarenessSM system.

• Develop skills sets. Build personal and group capabilities that
  work in dynamic and dangerous global environments.

• Preemptive offensive and defensive preparedness. Learn
  how to avoid being a “walking target,” and gain new confidence
  when venturing into unfamiliar territory. Identify, avoid and
  minimize threats and learn how to escape from threatening
  situations.

• Best practices. Principles build upon best-of-the best local, state
  and national security disciplines. Once available only to U.S.
  defense contractors and government employees, Escape the
  Wolf’s unique preemptive philosophy is now exclusively available
  to our clients.


         © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
         and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – eLearning
• Dynamic curriculum – Engaging, flexible, mobile.

• Convenience – Accessible 24hours a day anywhere in the
  world.

• Standardization – Learning delivered in a standardized and
  consistent manner to build a solid foundation for travel
  awareness.

• High retentionrate – Structured for increased retention
  through the use of interactive, audio and visual elements,
  quizzes and messages continually reinforced throughout the
  program.

• Self-paced learning modules– Learning controlled by the
  student.




         © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
         and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – Seminars and Consults

• Hands-on, interactive – Realistic, practical exercises
  designed to enhance tactical decision-making and
  deliberate action.

• Flexible scale – Our most popular training can be
  adapted incrementally from a one-day event to an in-
  depth, two-week course of instruction.

• Tailored to client requirements – Address a particular
  region of the globe or specific security concerns.

• Consults for on-the-go executives – Customized
  briefings by senior Escape the Wolf leads who have
  directed highly sensitive security operations in their
  positions in government and law enforcement.




           © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
           and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – Digital TravelcraftSM
and Zero Trace™ Products
                                              Digital TravelcraftSM training:

                                              • Learn how to avoid surveillance and
                                                protect cell phones, laptops and other
                                                digital devices.

                                              • Improve the ability to assess digital threats
                                                and escape the wolf in a discreet manner.


                                              Zero Trace™ products: a tailored line of
                                                Escape the Wolf travel accessories to
                                                increase travel and data security –

                                                           • Cell phone pouch.

                                                           • Travel bag pouch for laptop,
                                                             passport and the traveler’s other
                                                             digital devices, including RFID
                                                             passport.




      © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
      and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – Shepherd™ Secure
Phone Alert and Tracking Services and THREAT™ 24/7
Mobile Intelligence Service
                                            Shepherd Phone – available for the first
                                            time commercially only from Escape the
                                            Wolf:

                                             • Secure messaging, discrete distress
                                               signaling and powerful tracking and
                                               notification options

                                             • Secure two-way text and talk via 256-bit
                                               AES encrypted


                                             THREAT™ mobile intelligence risk
                                               identification or avoidance:

                                                          • 24/7 global travel resource with 163
                                                            country guides

                                                          • Web app via smartphone, computer
                                                            or tablet


     © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
     and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
Building a Better World for the Global Traveler
  • Preemptive philosophy.

  • Proven system to identify and respond to threats.

  • Phased learning for sustained capability.

  • Active traveler able to identify and elude the world’s wolves.



 With Escape the Wolf as your travel security risk mitigation
 partner, your organization will –

   • protect what matters most – your people, assets, competitive intelligence and reputation.

   • fulfill duty of care obligations since employees are trained to recognize and evade threats
     and travel more safely on a global scale.

   • and, ultimately, protect the bottom line by avoiding costs associated with negative incidents
     or lost proprietary information.




          © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
          and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF

For more information, please
     visit our website:
 www.EscapetheWolf.com


      or contact us at:

  lynn@escapethewolf.com

     Escape The Wolf
      P.O. Box 56425
 Virginia Beach, VA 23456
  703-270-0017 ext. 702




       © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
       and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.

More Related Content

Viewers also liked

Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
kelsports
 

Viewers also liked (10)

Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
 
A presentation on survival skills
A presentation on survival skillsA presentation on survival skills
A presentation on survival skills
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
Intelligence Cycle
Intelligence CycleIntelligence Cycle
Intelligence Cycle
 
The Hacks’ Guide to eLearning
The Hacks’ Guide to eLearningThe Hacks’ Guide to eLearning
The Hacks’ Guide to eLearning
 
33 emergency methods of moving casualties
33 emergency methods of moving casualties33 emergency methods of moving casualties
33 emergency methods of moving casualties
 
First aid lesson carrying
First aid lesson   carryingFirst aid lesson   carrying
First aid lesson carrying
 
Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentation
 
Espionage
EspionageEspionage
Espionage
 
First aid & bandaging
First aid & bandaging First aid & bandaging
First aid & bandaging
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Escape the wolf capabilities

  • 1. Escape the Wolf Presentation for Barilla 3 OCT 2011
  • 2. ESCAPE THE WOLF - Our Mission Wolves are everywhere in an uncertain world – • a stolen laptop with sensitive data. • the natural disaster that strands a traveler. • a sudden illness in a strange land. Many travelers are unaware of threats, or wolves. Are your executives and employees prepared? Escape the Wolf delivers preemptive threat assessment, recognition and avoidance. We help travelers evolve from mindless sheep to alert sheepdogs able to detect and elude wolves. Master metaphor for society - Sheep, Wolves, Sheepdogs While attached to a government intelligence agency, (Wolf CEO) Clinton Emerson identified the need for high-level global travelawareness training. His curriculum is based on successful offensive and defensive tactics, techniques and procedures of the most highly skilled law enforcement, intelligence, and special operations units. Today, Emerson and his cadre of highly experienced sheepdogs at Escape the Wolf share their knowledge and expertise with global travelers. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 3. ESCAPE THE WOLF - Capabilities Get the Edge on Threats - Preemptive, Holistic Approach Escape the Wolf’s THREAT® matrix is a convenient way to research potential risks prior to travel and an important memory tool to identify threats. With Escape the Wolf, organizations enjoy – • An end-to-end solution to keep employees safe and aware of travel and security risks, including kidnap avoidance. • Preemptiveapproach with Escape the Wolf's flagship Total AwarenessSM system to identify, elude or minimize most threats. • Best-of-the-best experts – government, defense, law enforcement and security experts – experienced in risks and lifelong travelers to the most remote and dangerous environments. • Holistic, innovativetravel resources andeLearning, hands-on training and tailored consults transform travelers from unaware sheep into self-confident sheepdogs able to fend off wolves in changing environments. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 4. ESCAPE THE WOLF Capabilities – The Book ESCAPE THE WOLF: Personal Security Handbook for the Traveling Professional • Immediately start to build and practice travel security awareness. Learn how to recognize threats –from common crime, illness, natural disasters, competitive intelligence theft, or even terrorism – using Escape the Wolf’s proven Total AwarenessSM system. • Develop skills sets. Build personal and group capabilities that work in dynamic and dangerous global environments. • Preemptive offensive and defensive preparedness. Learn how to avoid being a “walking target,” and gain new confidence when venturing into unfamiliar territory. Identify, avoid and minimize threats and learn how to escape from threatening situations. • Best practices. Principles build upon best-of-the best local, state and national security disciplines. Once available only to U.S. defense contractors and government employees, Escape the Wolf’s unique preemptive philosophy is now exclusively available to our clients. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 5. ESCAPE THE WOLF Capabilities – eLearning • Dynamic curriculum – Engaging, flexible, mobile. • Convenience – Accessible 24hours a day anywhere in the world. • Standardization – Learning delivered in a standardized and consistent manner to build a solid foundation for travel awareness. • High retentionrate – Structured for increased retention through the use of interactive, audio and visual elements, quizzes and messages continually reinforced throughout the program. • Self-paced learning modules– Learning controlled by the student. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 6. ESCAPE THE WOLF Capabilities – Seminars and Consults • Hands-on, interactive – Realistic, practical exercises designed to enhance tactical decision-making and deliberate action. • Flexible scale – Our most popular training can be adapted incrementally from a one-day event to an in- depth, two-week course of instruction. • Tailored to client requirements – Address a particular region of the globe or specific security concerns. • Consults for on-the-go executives – Customized briefings by senior Escape the Wolf leads who have directed highly sensitive security operations in their positions in government and law enforcement. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 7. ESCAPE THE WOLF Capabilities – Digital TravelcraftSM and Zero Trace™ Products Digital TravelcraftSM training: • Learn how to avoid surveillance and protect cell phones, laptops and other digital devices. • Improve the ability to assess digital threats and escape the wolf in a discreet manner. Zero Trace™ products: a tailored line of Escape the Wolf travel accessories to increase travel and data security – • Cell phone pouch. • Travel bag pouch for laptop, passport and the traveler’s other digital devices, including RFID passport. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 8. ESCAPE THE WOLF Capabilities – Shepherd™ Secure Phone Alert and Tracking Services and THREAT™ 24/7 Mobile Intelligence Service Shepherd Phone – available for the first time commercially only from Escape the Wolf: • Secure messaging, discrete distress signaling and powerful tracking and notification options • Secure two-way text and talk via 256-bit AES encrypted THREAT™ mobile intelligence risk identification or avoidance: • 24/7 global travel resource with 163 country guides • Web app via smartphone, computer or tablet © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 9. Building a Better World for the Global Traveler • Preemptive philosophy. • Proven system to identify and respond to threats. • Phased learning for sustained capability. • Active traveler able to identify and elude the world’s wolves. With Escape the Wolf as your travel security risk mitigation partner, your organization will – • protect what matters most – your people, assets, competitive intelligence and reputation. • fulfill duty of care obligations since employees are trained to recognize and evade threats and travel more safely on a global scale. • and, ultimately, protect the bottom line by avoiding costs associated with negative incidents or lost proprietary information. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 10. ESCAPE THE WOLF For more information, please visit our website: www.EscapetheWolf.com or contact us at: lynn@escapethewolf.com Escape The Wolf P.O. Box 56425 Virginia Beach, VA 23456 703-270-0017 ext. 702 © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.