SlideShare a Scribd company logo
1 of 10
Escape the Wolf Presentation for Barilla 3 OCT 2011
ESCAPE THE WOLF - Our Mission
Wolves are everywhere in an uncertain world –
 • a stolen laptop with sensitive data.
 • the natural disaster that strands a traveler.
 • a sudden illness in a strange land.
Many travelers are unaware of threats, or wolves.

Are your executives and employees prepared?
Escape the Wolf delivers preemptive threat
assessment, recognition and avoidance. We help
travelers evolve from mindless sheep to alert
sheepdogs able to detect and elude wolves.                                                               Master metaphor for society - Sheep, Wolves,
                                                                                                                        Sheepdogs




                  While attached to a government intelligence agency, (Wolf CEO) Clinton Emerson
                  identified the need for high-level global travelawareness training. His curriculum is based
                  on successful offensive and defensive tactics, techniques and procedures of the most
                  highly skilled law enforcement, intelligence, and special operations units. Today, Emerson
                  and his cadre of highly experienced sheepdogs at Escape the Wolf share their knowledge
                  and expertise with global travelers.


         © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
         and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF - Capabilities
 Get the Edge on Threats - Preemptive, Holistic Approach




                                                      Escape the Wolf’s THREAT® matrix is a convenient way to research potential
                                                      risks prior to travel and an important memory tool to identify threats.




With Escape the Wolf, organizations enjoy –

• An end-to-end solution to keep employees safe and aware of travel and security risks, including
  kidnap avoidance.

• Preemptiveapproach with Escape the Wolf's flagship Total AwarenessSM system to identify, elude
  or minimize most threats.

• Best-of-the-best experts – government, defense, law enforcement and security experts –
  experienced in risks and lifelong travelers to the most remote and dangerous environments.

• Holistic, innovativetravel resources andeLearning, hands-on training and tailored consults
  transform travelers from unaware sheep into self-confident sheepdogs able to fend off wolves in
  changing environments.

          © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
          and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – The Book
      ESCAPE THE WOLF: Personal Security Handbook
              for the Traveling Professional

• Immediately start to build and practice travel security
  awareness. Learn how to recognize threats –from common
  crime, illness, natural disasters, competitive intelligence theft, or
  even terrorism – using Escape the Wolf’s proven Total
  AwarenessSM system.

• Develop skills sets. Build personal and group capabilities that
  work in dynamic and dangerous global environments.

• Preemptive offensive and defensive preparedness. Learn
  how to avoid being a “walking target,” and gain new confidence
  when venturing into unfamiliar territory. Identify, avoid and
  minimize threats and learn how to escape from threatening
  situations.

• Best practices. Principles build upon best-of-the best local, state
  and national security disciplines. Once available only to U.S.
  defense contractors and government employees, Escape the
  Wolf’s unique preemptive philosophy is now exclusively available
  to our clients.


         © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
         and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – eLearning
• Dynamic curriculum – Engaging, flexible, mobile.

• Convenience – Accessible 24hours a day anywhere in the
  world.

• Standardization – Learning delivered in a standardized and
  consistent manner to build a solid foundation for travel
  awareness.

• High retentionrate – Structured for increased retention
  through the use of interactive, audio and visual elements,
  quizzes and messages continually reinforced throughout the
  program.

• Self-paced learning modules– Learning controlled by the
  student.




         © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
         and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – Seminars and Consults

• Hands-on, interactive – Realistic, practical exercises
  designed to enhance tactical decision-making and
  deliberate action.

• Flexible scale – Our most popular training can be
  adapted incrementally from a one-day event to an in-
  depth, two-week course of instruction.

• Tailored to client requirements – Address a particular
  region of the globe or specific security concerns.

• Consults for on-the-go executives – Customized
  briefings by senior Escape the Wolf leads who have
  directed highly sensitive security operations in their
  positions in government and law enforcement.




           © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
           and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – Digital TravelcraftSM
and Zero Trace™ Products
                                              Digital TravelcraftSM training:

                                              • Learn how to avoid surveillance and
                                                protect cell phones, laptops and other
                                                digital devices.

                                              • Improve the ability to assess digital threats
                                                and escape the wolf in a discreet manner.


                                              Zero Trace™ products: a tailored line of
                                                Escape the Wolf travel accessories to
                                                increase travel and data security –

                                                           • Cell phone pouch.

                                                           • Travel bag pouch for laptop,
                                                             passport and the traveler’s other
                                                             digital devices, including RFID
                                                             passport.




      © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
      and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – Shepherd™ Secure
Phone Alert and Tracking Services and THREAT™ 24/7
Mobile Intelligence Service
                                            Shepherd Phone – available for the first
                                            time commercially only from Escape the
                                            Wolf:

                                             • Secure messaging, discrete distress
                                               signaling and powerful tracking and
                                               notification options

                                             • Secure two-way text and talk via 256-bit
                                               AES encrypted


                                             THREAT™ mobile intelligence risk
                                               identification or avoidance:

                                                          • 24/7 global travel resource with 163
                                                            country guides

                                                          • Web app via smartphone, computer
                                                            or tablet


     © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
     and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
Building a Better World for the Global Traveler
  • Preemptive philosophy.

  • Proven system to identify and respond to threats.

  • Phased learning for sustained capability.

  • Active traveler able to identify and elude the world’s wolves.



 With Escape the Wolf as your travel security risk mitigation
 partner, your organization will –

   • protect what matters most – your people, assets, competitive intelligence and reputation.

   • fulfill duty of care obligations since employees are trained to recognize and evade threats
     and travel more safely on a global scale.

   • and, ultimately, protect the bottom line by avoiding costs associated with negative incidents
     or lost proprietary information.




          © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
          and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF

For more information, please
     visit our website:
 www.EscapetheWolf.com


      or contact us at:

  lynn@escapethewolf.com

     Escape The Wolf
      P.O. Box 56425
 Virginia Beach, VA 23456
  703-270-0017 ext. 702




       © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
       and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.

More Related Content

Viewers also liked

Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Philip Polstra
 
A presentation on survival skills
A presentation on survival skillsA presentation on survival skills
A presentation on survival skillsanuragcooolz
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligencekelsports
 
The Hacks’ Guide to eLearning
The Hacks’ Guide to eLearningThe Hacks’ Guide to eLearning
The Hacks’ Guide to eLearningJason Brown
 
First aid lesson carrying
First aid lesson   carryingFirst aid lesson   carrying
First aid lesson carryingnurserosie
 
Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationDarwish Ahmad
 

Viewers also liked (10)

Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
 
A presentation on survival skills
A presentation on survival skillsA presentation on survival skills
A presentation on survival skills
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
Intelligence Cycle
Intelligence CycleIntelligence Cycle
Intelligence Cycle
 
The Hacks’ Guide to eLearning
The Hacks’ Guide to eLearningThe Hacks’ Guide to eLearning
The Hacks’ Guide to eLearning
 
33 emergency methods of moving casualties
33 emergency methods of moving casualties33 emergency methods of moving casualties
33 emergency methods of moving casualties
 
First aid lesson carrying
First aid lesson   carryingFirst aid lesson   carrying
First aid lesson carrying
 
Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentation
 
Espionage
EspionageEspionage
Espionage
 
First aid & bandaging
First aid & bandaging First aid & bandaging
First aid & bandaging
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Escape the wolf capabilities

  • 1. Escape the Wolf Presentation for Barilla 3 OCT 2011
  • 2. ESCAPE THE WOLF - Our Mission Wolves are everywhere in an uncertain world – • a stolen laptop with sensitive data. • the natural disaster that strands a traveler. • a sudden illness in a strange land. Many travelers are unaware of threats, or wolves. Are your executives and employees prepared? Escape the Wolf delivers preemptive threat assessment, recognition and avoidance. We help travelers evolve from mindless sheep to alert sheepdogs able to detect and elude wolves. Master metaphor for society - Sheep, Wolves, Sheepdogs While attached to a government intelligence agency, (Wolf CEO) Clinton Emerson identified the need for high-level global travelawareness training. His curriculum is based on successful offensive and defensive tactics, techniques and procedures of the most highly skilled law enforcement, intelligence, and special operations units. Today, Emerson and his cadre of highly experienced sheepdogs at Escape the Wolf share their knowledge and expertise with global travelers. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 3. ESCAPE THE WOLF - Capabilities Get the Edge on Threats - Preemptive, Holistic Approach Escape the Wolf’s THREAT® matrix is a convenient way to research potential risks prior to travel and an important memory tool to identify threats. With Escape the Wolf, organizations enjoy – • An end-to-end solution to keep employees safe and aware of travel and security risks, including kidnap avoidance. • Preemptiveapproach with Escape the Wolf's flagship Total AwarenessSM system to identify, elude or minimize most threats. • Best-of-the-best experts – government, defense, law enforcement and security experts – experienced in risks and lifelong travelers to the most remote and dangerous environments. • Holistic, innovativetravel resources andeLearning, hands-on training and tailored consults transform travelers from unaware sheep into self-confident sheepdogs able to fend off wolves in changing environments. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 4. ESCAPE THE WOLF Capabilities – The Book ESCAPE THE WOLF: Personal Security Handbook for the Traveling Professional • Immediately start to build and practice travel security awareness. Learn how to recognize threats –from common crime, illness, natural disasters, competitive intelligence theft, or even terrorism – using Escape the Wolf’s proven Total AwarenessSM system. • Develop skills sets. Build personal and group capabilities that work in dynamic and dangerous global environments. • Preemptive offensive and defensive preparedness. Learn how to avoid being a “walking target,” and gain new confidence when venturing into unfamiliar territory. Identify, avoid and minimize threats and learn how to escape from threatening situations. • Best practices. Principles build upon best-of-the best local, state and national security disciplines. Once available only to U.S. defense contractors and government employees, Escape the Wolf’s unique preemptive philosophy is now exclusively available to our clients. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 5. ESCAPE THE WOLF Capabilities – eLearning • Dynamic curriculum – Engaging, flexible, mobile. • Convenience – Accessible 24hours a day anywhere in the world. • Standardization – Learning delivered in a standardized and consistent manner to build a solid foundation for travel awareness. • High retentionrate – Structured for increased retention through the use of interactive, audio and visual elements, quizzes and messages continually reinforced throughout the program. • Self-paced learning modules– Learning controlled by the student. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 6. ESCAPE THE WOLF Capabilities – Seminars and Consults • Hands-on, interactive – Realistic, practical exercises designed to enhance tactical decision-making and deliberate action. • Flexible scale – Our most popular training can be adapted incrementally from a one-day event to an in- depth, two-week course of instruction. • Tailored to client requirements – Address a particular region of the globe or specific security concerns. • Consults for on-the-go executives – Customized briefings by senior Escape the Wolf leads who have directed highly sensitive security operations in their positions in government and law enforcement. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 7. ESCAPE THE WOLF Capabilities – Digital TravelcraftSM and Zero Trace™ Products Digital TravelcraftSM training: • Learn how to avoid surveillance and protect cell phones, laptops and other digital devices. • Improve the ability to assess digital threats and escape the wolf in a discreet manner. Zero Trace™ products: a tailored line of Escape the Wolf travel accessories to increase travel and data security – • Cell phone pouch. • Travel bag pouch for laptop, passport and the traveler’s other digital devices, including RFID passport. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 8. ESCAPE THE WOLF Capabilities – Shepherd™ Secure Phone Alert and Tracking Services and THREAT™ 24/7 Mobile Intelligence Service Shepherd Phone – available for the first time commercially only from Escape the Wolf: • Secure messaging, discrete distress signaling and powerful tracking and notification options • Secure two-way text and talk via 256-bit AES encrypted THREAT™ mobile intelligence risk identification or avoidance: • 24/7 global travel resource with 163 country guides • Web app via smartphone, computer or tablet © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 9. Building a Better World for the Global Traveler • Preemptive philosophy. • Proven system to identify and respond to threats. • Phased learning for sustained capability. • Active traveler able to identify and elude the world’s wolves. With Escape the Wolf as your travel security risk mitigation partner, your organization will – • protect what matters most – your people, assets, competitive intelligence and reputation. • fulfill duty of care obligations since employees are trained to recognize and evade threats and travel more safely on a global scale. • and, ultimately, protect the bottom line by avoiding costs associated with negative incidents or lost proprietary information. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 10. ESCAPE THE WOLF For more information, please visit our website: www.EscapetheWolf.com or contact us at: lynn@escapethewolf.com Escape The Wolf P.O. Box 56425 Virginia Beach, VA 23456 703-270-0017 ext. 702 © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.