SlideShare a Scribd company logo
1 of 10
Escape the Wolf Presentation for Barilla 3 OCT 2011
ESCAPE THE WOLF - Our Mission
Wolves are everywhere in an uncertain world –
 • a stolen laptop with sensitive data.
 • the natural disaster that strands a traveler.
 • a sudden illness in a strange land.
Many travelers are unaware of threats, or wolves.

Are your executives and employees prepared?
Escape the Wolf delivers preemptive threat
assessment, recognition and avoidance. We help
travelers evolve from mindless sheep to alert
sheepdogs able to detect and elude wolves.                                                               Master metaphor for society - Sheep, Wolves,
                                                                                                                        Sheepdogs




                  While attached to a government intelligence agency, (Wolf CEO) Clinton Emerson
                  identified the need for high-level global travelawareness training. His curriculum is based
                  on successful offensive and defensive tactics, techniques and procedures of the most
                  highly skilled law enforcement, intelligence, and special operations units. Today, Emerson
                  and his cadre of highly experienced sheepdogs at Escape the Wolf share their knowledge
                  and expertise with global travelers.


         © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
         and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF - Capabilities
 Get the Edge on Threats - Preemptive, Holistic Approach




                                                      Escape the Wolf’s THREAT® matrix is a convenient way to research potential
                                                      risks prior to travel and an important memory tool to identify threats.




With Escape the Wolf, organizations enjoy –

• An end-to-end solution to keep employees safe and aware of travel and security risks, including
  kidnap avoidance.

• Preemptiveapproach with Escape the Wolf's flagship Total AwarenessSM system to identify, elude
  or minimize most threats.

• Best-of-the-best experts – government, defense, law enforcement and security experts –
  experienced in risks and lifelong travelers to the most remote and dangerous environments.

• Holistic, innovativetravel resources andeLearning, hands-on training and tailored consults
  transform travelers from unaware sheep into self-confident sheepdogs able to fend off wolves in
  changing environments.

          © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
          and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – The Book
      ESCAPE THE WOLF: Personal Security Handbook
              for the Traveling Professional

• Immediately start to build and practice travel security
  awareness. Learn how to recognize threats –from common
  crime, illness, natural disasters, competitive intelligence theft, or
  even terrorism – using Escape the Wolf’s proven Total
  AwarenessSM system.

• Develop skills sets. Build personal and group capabilities that
  work in dynamic and dangerous global environments.

• Preemptive offensive and defensive preparedness. Learn
  how to avoid being a “walking target,” and gain new confidence
  when venturing into unfamiliar territory. Identify, avoid and
  minimize threats and learn how to escape from threatening
  situations.

• Best practices. Principles build upon best-of-the best local, state
  and national security disciplines. Once available only to U.S.
  defense contractors and government employees, Escape the
  Wolf’s unique preemptive philosophy is now exclusively available
  to our clients.


         © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
         and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – eLearning
• Dynamic curriculum – Engaging, flexible, mobile.

• Convenience – Accessible 24hours a day anywhere in the
  world.

• Standardization – Learning delivered in a standardized and
  consistent manner to build a solid foundation for travel
  awareness.

• High retentionrate – Structured for increased retention
  through the use of interactive, audio and visual elements,
  quizzes and messages continually reinforced throughout the
  program.

• Self-paced learning modules– Learning controlled by the
  student.




         © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
         and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – Seminars and Consults

• Hands-on, interactive – Realistic, practical exercises
  designed to enhance tactical decision-making and
  deliberate action.

• Flexible scale – Our most popular training can be
  adapted incrementally from a one-day event to an in-
  depth, two-week course of instruction.

• Tailored to client requirements – Address a particular
  region of the globe or specific security concerns.

• Consults for on-the-go executives – Customized
  briefings by senior Escape the Wolf leads who have
  directed highly sensitive security operations in their
  positions in government and law enforcement.




           © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
           and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – Digital TravelcraftSM
and Zero Trace™ Products
                                              Digital TravelcraftSM training:

                                              • Learn how to avoid surveillance and
                                                protect cell phones, laptops and other
                                                digital devices.

                                              • Improve the ability to assess digital threats
                                                and escape the wolf in a discreet manner.


                                              Zero Trace™ products: a tailored line of
                                                Escape the Wolf travel accessories to
                                                increase travel and data security –

                                                           • Cell phone pouch.

                                                           • Travel bag pouch for laptop,
                                                             passport and the traveler’s other
                                                             digital devices, including RFID
                                                             passport.




      © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
      and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – Shepherd™ Secure
Phone Alert and Tracking Services and THREAT™ 24/7
Mobile Intelligence Service
                                            Shepherd Phone – available for the first
                                            time commercially only from Escape the
                                            Wolf:

                                             • Secure messaging, discrete distress
                                               signaling and powerful tracking and
                                               notification options

                                             • Secure two-way text and talk via 256-bit
                                               AES encrypted


                                             THREAT™ mobile intelligence risk
                                               identification or avoidance:

                                                          • 24/7 global travel resource with 163
                                                            country guides

                                                          • Web app via smartphone, computer
                                                            or tablet


     © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
     and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
Building a Better World for the Global Traveler
  • Preemptive philosophy.

  • Proven system to identify and respond to threats.

  • Phased learning for sustained capability.

  • Active traveler able to identify and elude the world’s wolves.



 With Escape the Wolf as your travel security risk mitigation
 partner, your organization will –

   • protect what matters most – your people, assets, competitive intelligence and reputation.

   • fulfill duty of care obligations since employees are trained to recognize and evade threats
     and travel more safely on a global scale.

   • and, ultimately, protect the bottom line by avoiding costs associated with negative incidents
     or lost proprietary information.




          © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
          and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF

For more information, please
     visit our website:
 www.EscapetheWolf.com


      or contact us at:

  lynn@escapethewolf.com

     Escape The Wolf
      P.O. Box 56425
 Virginia Beach, VA 23456
  703-270-0017 ext. 702




       © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
       and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.

More Related Content

Viewers also liked

Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Philip Polstra
 
A presentation on survival skills
A presentation on survival skillsA presentation on survival skills
A presentation on survival skillsanuragcooolz
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligencekelsports
 
The Hacks’ Guide to eLearning
The Hacks’ Guide to eLearningThe Hacks’ Guide to eLearning
The Hacks’ Guide to eLearningJason Brown
 
First aid lesson carrying
First aid lesson   carryingFirst aid lesson   carrying
First aid lesson carryingnurserosie
 
Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationDarwish Ahmad
 

Viewers also liked (10)

Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
 
A presentation on survival skills
A presentation on survival skillsA presentation on survival skills
A presentation on survival skills
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
Intelligence Cycle
Intelligence CycleIntelligence Cycle
Intelligence Cycle
 
The Hacks’ Guide to eLearning
The Hacks’ Guide to eLearningThe Hacks’ Guide to eLearning
The Hacks’ Guide to eLearning
 
33 emergency methods of moving casualties
33 emergency methods of moving casualties33 emergency methods of moving casualties
33 emergency methods of moving casualties
 
First aid lesson carrying
First aid lesson   carryingFirst aid lesson   carrying
First aid lesson carrying
 
Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentation
 
Espionage
EspionageEspionage
Espionage
 
First aid & bandaging
First aid & bandaging First aid & bandaging
First aid & bandaging
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Escape the wolf capabilities

  • 1. Escape the Wolf Presentation for Barilla 3 OCT 2011
  • 2. ESCAPE THE WOLF - Our Mission Wolves are everywhere in an uncertain world – • a stolen laptop with sensitive data. • the natural disaster that strands a traveler. • a sudden illness in a strange land. Many travelers are unaware of threats, or wolves. Are your executives and employees prepared? Escape the Wolf delivers preemptive threat assessment, recognition and avoidance. We help travelers evolve from mindless sheep to alert sheepdogs able to detect and elude wolves. Master metaphor for society - Sheep, Wolves, Sheepdogs While attached to a government intelligence agency, (Wolf CEO) Clinton Emerson identified the need for high-level global travelawareness training. His curriculum is based on successful offensive and defensive tactics, techniques and procedures of the most highly skilled law enforcement, intelligence, and special operations units. Today, Emerson and his cadre of highly experienced sheepdogs at Escape the Wolf share their knowledge and expertise with global travelers. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 3. ESCAPE THE WOLF - Capabilities Get the Edge on Threats - Preemptive, Holistic Approach Escape the Wolf’s THREAT® matrix is a convenient way to research potential risks prior to travel and an important memory tool to identify threats. With Escape the Wolf, organizations enjoy – • An end-to-end solution to keep employees safe and aware of travel and security risks, including kidnap avoidance. • Preemptiveapproach with Escape the Wolf's flagship Total AwarenessSM system to identify, elude or minimize most threats. • Best-of-the-best experts – government, defense, law enforcement and security experts – experienced in risks and lifelong travelers to the most remote and dangerous environments. • Holistic, innovativetravel resources andeLearning, hands-on training and tailored consults transform travelers from unaware sheep into self-confident sheepdogs able to fend off wolves in changing environments. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 4. ESCAPE THE WOLF Capabilities – The Book ESCAPE THE WOLF: Personal Security Handbook for the Traveling Professional • Immediately start to build and practice travel security awareness. Learn how to recognize threats –from common crime, illness, natural disasters, competitive intelligence theft, or even terrorism – using Escape the Wolf’s proven Total AwarenessSM system. • Develop skills sets. Build personal and group capabilities that work in dynamic and dangerous global environments. • Preemptive offensive and defensive preparedness. Learn how to avoid being a “walking target,” and gain new confidence when venturing into unfamiliar territory. Identify, avoid and minimize threats and learn how to escape from threatening situations. • Best practices. Principles build upon best-of-the best local, state and national security disciplines. Once available only to U.S. defense contractors and government employees, Escape the Wolf’s unique preemptive philosophy is now exclusively available to our clients. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 5. ESCAPE THE WOLF Capabilities – eLearning • Dynamic curriculum – Engaging, flexible, mobile. • Convenience – Accessible 24hours a day anywhere in the world. • Standardization – Learning delivered in a standardized and consistent manner to build a solid foundation for travel awareness. • High retentionrate – Structured for increased retention through the use of interactive, audio and visual elements, quizzes and messages continually reinforced throughout the program. • Self-paced learning modules– Learning controlled by the student. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 6. ESCAPE THE WOLF Capabilities – Seminars and Consults • Hands-on, interactive – Realistic, practical exercises designed to enhance tactical decision-making and deliberate action. • Flexible scale – Our most popular training can be adapted incrementally from a one-day event to an in- depth, two-week course of instruction. • Tailored to client requirements – Address a particular region of the globe or specific security concerns. • Consults for on-the-go executives – Customized briefings by senior Escape the Wolf leads who have directed highly sensitive security operations in their positions in government and law enforcement. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 7. ESCAPE THE WOLF Capabilities – Digital TravelcraftSM and Zero Trace™ Products Digital TravelcraftSM training: • Learn how to avoid surveillance and protect cell phones, laptops and other digital devices. • Improve the ability to assess digital threats and escape the wolf in a discreet manner. Zero Trace™ products: a tailored line of Escape the Wolf travel accessories to increase travel and data security – • Cell phone pouch. • Travel bag pouch for laptop, passport and the traveler’s other digital devices, including RFID passport. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 8. ESCAPE THE WOLF Capabilities – Shepherd™ Secure Phone Alert and Tracking Services and THREAT™ 24/7 Mobile Intelligence Service Shepherd Phone – available for the first time commercially only from Escape the Wolf: • Secure messaging, discrete distress signaling and powerful tracking and notification options • Secure two-way text and talk via 256-bit AES encrypted THREAT™ mobile intelligence risk identification or avoidance: • 24/7 global travel resource with 163 country guides • Web app via smartphone, computer or tablet © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 9. Building a Better World for the Global Traveler • Preemptive philosophy. • Proven system to identify and respond to threats. • Phased learning for sustained capability. • Active traveler able to identify and elude the world’s wolves. With Escape the Wolf as your travel security risk mitigation partner, your organization will – • protect what matters most – your people, assets, competitive intelligence and reputation. • fulfill duty of care obligations since employees are trained to recognize and evade threats and travel more safely on a global scale. • and, ultimately, protect the bottom line by avoiding costs associated with negative incidents or lost proprietary information. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 10. ESCAPE THE WOLF For more information, please visit our website: www.EscapetheWolf.com or contact us at: lynn@escapethewolf.com Escape The Wolf P.O. Box 56425 Virginia Beach, VA 23456 703-270-0017 ext. 702 © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.