SlideShare a Scribd company logo
1 of 10
Escape the Wolf Presentation for Barilla 3 OCT 2011
ESCAPE THE WOLF - Our Mission
Wolves are everywhere in an uncertain world –
 • a stolen laptop with sensitive data.
 • the natural disaster that strands a traveler.
 • a sudden illness in a strange land.
Many travelers are unaware of threats, or wolves.

Are your executives and employees prepared?
Escape the Wolf delivers preemptive threat
assessment, recognition and avoidance. We help
travelers evolve from mindless sheep to alert
sheepdogs able to detect and elude wolves.                                                               Master metaphor for society - Sheep, Wolves,
                                                                                                                        Sheepdogs




                  While attached to a government intelligence agency, (Wolf CEO) Clinton Emerson
                  identified the need for high-level global travelawareness training. His curriculum is based
                  on successful offensive and defensive tactics, techniques and procedures of the most
                  highly skilled law enforcement, intelligence, and special operations units. Today, Emerson
                  and his cadre of highly experienced sheepdogs at Escape the Wolf share their knowledge
                  and expertise with global travelers.


         © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
         and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF - Capabilities
 Get the Edge on Threats - Preemptive, Holistic Approach




                                                      Escape the Wolf’s THREAT® matrix is a convenient way to research potential
                                                      risks prior to travel and an important memory tool to identify threats.




With Escape the Wolf, organizations enjoy –

• An end-to-end solution to keep employees safe and aware of travel and security risks, including
  kidnap avoidance.

• Preemptiveapproach with Escape the Wolf's flagship Total AwarenessSM system to identify, elude
  or minimize most threats.

• Best-of-the-best experts – government, defense, law enforcement and security experts –
  experienced in risks and lifelong travelers to the most remote and dangerous environments.

• Holistic, innovativetravel resources andeLearning, hands-on training and tailored consults
  transform travelers from unaware sheep into self-confident sheepdogs able to fend off wolves in
  changing environments.

          © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
          and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – The Book
      ESCAPE THE WOLF: Personal Security Handbook
              for the Traveling Professional

• Immediately start to build and practice travel security
  awareness. Learn how to recognize threats –from common
  crime, illness, natural disasters, competitive intelligence theft, or
  even terrorism – using Escape the Wolf’s proven Total
  AwarenessSM system.

• Develop skills sets. Build personal and group capabilities that
  work in dynamic and dangerous global environments.

• Preemptive offensive and defensive preparedness. Learn
  how to avoid being a “walking target,” and gain new confidence
  when venturing into unfamiliar territory. Identify, avoid and
  minimize threats and learn how to escape from threatening
  situations.

• Best practices. Principles build upon best-of-the best local, state
  and national security disciplines. Once available only to U.S.
  defense contractors and government employees, Escape the
  Wolf’s unique preemptive philosophy is now exclusively available
  to our clients.


         © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
         and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – eLearning
• Dynamic curriculum – Engaging, flexible, mobile.

• Convenience – Accessible 24hours a day anywhere in the
  world.

• Standardization – Learning delivered in a standardized and
  consistent manner to build a solid foundation for travel
  awareness.

• High retentionrate – Structured for increased retention
  through the use of interactive, audio and visual elements,
  quizzes and messages continually reinforced throughout the
  program.

• Self-paced learning modules– Learning controlled by the
  student.




         © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
         and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – Seminars and Consults

• Hands-on, interactive – Realistic, practical exercises
  designed to enhance tactical decision-making and
  deliberate action.

• Flexible scale – Our most popular training can be
  adapted incrementally from a one-day event to an in-
  depth, two-week course of instruction.

• Tailored to client requirements – Address a particular
  region of the globe or specific security concerns.

• Consults for on-the-go executives – Customized
  briefings by senior Escape the Wolf leads who have
  directed highly sensitive security operations in their
  positions in government and law enforcement.




           © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
           and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – Digital TravelcraftSM
and Zero Trace™ Products
                                              Digital TravelcraftSM training:

                                              • Learn how to avoid surveillance and
                                                protect cell phones, laptops and other
                                                digital devices.

                                              • Improve the ability to assess digital threats
                                                and escape the wolf in a discreet manner.


                                              Zero Trace™ products: a tailored line of
                                                Escape the Wolf travel accessories to
                                                increase travel and data security –

                                                           • Cell phone pouch.

                                                           • Travel bag pouch for laptop,
                                                             passport and the traveler’s other
                                                             digital devices, including RFID
                                                             passport.




      © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
      and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – Shepherd™ Secure
Phone Alert and Tracking Services and THREAT™ 24/7
Mobile Intelligence Service
                                            Shepherd Phone – available for the first
                                            time commercially only from Escape the
                                            Wolf:

                                             • Secure messaging, discrete distress
                                               signaling and powerful tracking and
                                               notification options

                                             • Secure two-way text and talk via 256-bit
                                               AES encrypted


                                             THREAT™ mobile intelligence risk
                                               identification or avoidance:

                                                          • 24/7 global travel resource with 163
                                                            country guides

                                                          • Web app via smartphone, computer
                                                            or tablet


     © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
     and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
Building a Better World for the Global Traveler
  • Preemptive philosophy.

  • Proven system to identify and respond to threats.

  • Phased learning for sustained capability.

  • Active traveler able to identify and elude the world’s wolves.



 With Escape the Wolf as your travel security risk mitigation
 partner, your organization will –

   • protect what matters most – your people, assets, competitive intelligence and reputation.

   • fulfill duty of care obligations since employees are trained to recognize and evade threats
     and travel more safely on a global scale.

   • and, ultimately, protect the bottom line by avoiding costs associated with negative incidents
     or lost proprietary information.




          © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
          and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF

For more information, please
     visit our website:
 www.EscapetheWolf.com


      or contact us at:

  lynn@escapethewolf.com

     Escape The Wolf
      P.O. Box 56425
 Virginia Beach, VA 23456
  703-270-0017 ext. 702




       © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
       and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.

More Related Content

Viewers also liked

Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Philip Polstra
 
A presentation on survival skills
A presentation on survival skillsA presentation on survival skills
A presentation on survival skillsanuragcooolz
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligencekelsports
 
The Hacks’ Guide to eLearning
The Hacks’ Guide to eLearningThe Hacks’ Guide to eLearning
The Hacks’ Guide to eLearningJason Brown
 
First aid lesson carrying
First aid lesson   carryingFirst aid lesson   carrying
First aid lesson carryingnurserosie
 
Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationDarwish Ahmad
 

Viewers also liked (10)

Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
 
A presentation on survival skills
A presentation on survival skillsA presentation on survival skills
A presentation on survival skills
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
Intelligence Cycle
Intelligence CycleIntelligence Cycle
Intelligence Cycle
 
The Hacks’ Guide to eLearning
The Hacks’ Guide to eLearningThe Hacks’ Guide to eLearning
The Hacks’ Guide to eLearning
 
33 emergency methods of moving casualties
33 emergency methods of moving casualties33 emergency methods of moving casualties
33 emergency methods of moving casualties
 
First aid lesson carrying
First aid lesson   carryingFirst aid lesson   carrying
First aid lesson carrying
 
Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentation
 
Espionage
EspionageEspionage
Espionage
 
First aid & bandaging
First aid & bandaging First aid & bandaging
First aid & bandaging
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Escape the wolf capabilities

  • 1. Escape the Wolf Presentation for Barilla 3 OCT 2011
  • 2. ESCAPE THE WOLF - Our Mission Wolves are everywhere in an uncertain world – • a stolen laptop with sensitive data. • the natural disaster that strands a traveler. • a sudden illness in a strange land. Many travelers are unaware of threats, or wolves. Are your executives and employees prepared? Escape the Wolf delivers preemptive threat assessment, recognition and avoidance. We help travelers evolve from mindless sheep to alert sheepdogs able to detect and elude wolves. Master metaphor for society - Sheep, Wolves, Sheepdogs While attached to a government intelligence agency, (Wolf CEO) Clinton Emerson identified the need for high-level global travelawareness training. His curriculum is based on successful offensive and defensive tactics, techniques and procedures of the most highly skilled law enforcement, intelligence, and special operations units. Today, Emerson and his cadre of highly experienced sheepdogs at Escape the Wolf share their knowledge and expertise with global travelers. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 3. ESCAPE THE WOLF - Capabilities Get the Edge on Threats - Preemptive, Holistic Approach Escape the Wolf’s THREAT® matrix is a convenient way to research potential risks prior to travel and an important memory tool to identify threats. With Escape the Wolf, organizations enjoy – • An end-to-end solution to keep employees safe and aware of travel and security risks, including kidnap avoidance. • Preemptiveapproach with Escape the Wolf's flagship Total AwarenessSM system to identify, elude or minimize most threats. • Best-of-the-best experts – government, defense, law enforcement and security experts – experienced in risks and lifelong travelers to the most remote and dangerous environments. • Holistic, innovativetravel resources andeLearning, hands-on training and tailored consults transform travelers from unaware sheep into self-confident sheepdogs able to fend off wolves in changing environments. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 4. ESCAPE THE WOLF Capabilities – The Book ESCAPE THE WOLF: Personal Security Handbook for the Traveling Professional • Immediately start to build and practice travel security awareness. Learn how to recognize threats –from common crime, illness, natural disasters, competitive intelligence theft, or even terrorism – using Escape the Wolf’s proven Total AwarenessSM system. • Develop skills sets. Build personal and group capabilities that work in dynamic and dangerous global environments. • Preemptive offensive and defensive preparedness. Learn how to avoid being a “walking target,” and gain new confidence when venturing into unfamiliar territory. Identify, avoid and minimize threats and learn how to escape from threatening situations. • Best practices. Principles build upon best-of-the best local, state and national security disciplines. Once available only to U.S. defense contractors and government employees, Escape the Wolf’s unique preemptive philosophy is now exclusively available to our clients. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 5. ESCAPE THE WOLF Capabilities – eLearning • Dynamic curriculum – Engaging, flexible, mobile. • Convenience – Accessible 24hours a day anywhere in the world. • Standardization – Learning delivered in a standardized and consistent manner to build a solid foundation for travel awareness. • High retentionrate – Structured for increased retention through the use of interactive, audio and visual elements, quizzes and messages continually reinforced throughout the program. • Self-paced learning modules– Learning controlled by the student. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 6. ESCAPE THE WOLF Capabilities – Seminars and Consults • Hands-on, interactive – Realistic, practical exercises designed to enhance tactical decision-making and deliberate action. • Flexible scale – Our most popular training can be adapted incrementally from a one-day event to an in- depth, two-week course of instruction. • Tailored to client requirements – Address a particular region of the globe or specific security concerns. • Consults for on-the-go executives – Customized briefings by senior Escape the Wolf leads who have directed highly sensitive security operations in their positions in government and law enforcement. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 7. ESCAPE THE WOLF Capabilities – Digital TravelcraftSM and Zero Trace™ Products Digital TravelcraftSM training: • Learn how to avoid surveillance and protect cell phones, laptops and other digital devices. • Improve the ability to assess digital threats and escape the wolf in a discreet manner. Zero Trace™ products: a tailored line of Escape the Wolf travel accessories to increase travel and data security – • Cell phone pouch. • Travel bag pouch for laptop, passport and the traveler’s other digital devices, including RFID passport. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 8. ESCAPE THE WOLF Capabilities – Shepherd™ Secure Phone Alert and Tracking Services and THREAT™ 24/7 Mobile Intelligence Service Shepherd Phone – available for the first time commercially only from Escape the Wolf: • Secure messaging, discrete distress signaling and powerful tracking and notification options • Secure two-way text and talk via 256-bit AES encrypted THREAT™ mobile intelligence risk identification or avoidance: • 24/7 global travel resource with 163 country guides • Web app via smartphone, computer or tablet © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 9. Building a Better World for the Global Traveler • Preemptive philosophy. • Proven system to identify and respond to threats. • Phased learning for sustained capability. • Active traveler able to identify and elude the world’s wolves. With Escape the Wolf as your travel security risk mitigation partner, your organization will – • protect what matters most – your people, assets, competitive intelligence and reputation. • fulfill duty of care obligations since employees are trained to recognize and evade threats and travel more safely on a global scale. • and, ultimately, protect the bottom line by avoiding costs associated with negative incidents or lost proprietary information. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 10. ESCAPE THE WOLF For more information, please visit our website: www.EscapetheWolf.com or contact us at: lynn@escapethewolf.com Escape The Wolf P.O. Box 56425 Virginia Beach, VA 23456 703-270-0017 ext. 702 © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.