The Department of Justice estimates approximately 3.3 million people are victims of stalking every year, and public officials are at increased risk.


Extremism and violence have been brought into our political system for attacks on school board members to the very floor of Congress. This fact has led to some in office, and many qualified candidates, deciding not to run for election. Today’s campaigns have concerns ranging from workplace violence, terminations, or disgruntled employees and opposition supporters to maximizing productivity while traveling through secure logistics.

With increased political divisiveness and extremism, campaigns may be working in or even passing through areas that go beyond the unwelcoming to the out right hostile. No matter the situation, you can have the solutions and experience to make the right decisions and protect every member of the staff.

TSG creates bespoke security strategies are with detailed protocols to meet your specific needs and threat model. Our clients understand security is most effective when it is part of the campaign’s culture, so our goal is to provide safety with as little intrusion as possible. Protection always present, but rarely visible.

Our Services Include:

1) Our Initial Assessment identifies all publicly available information that can be found online about you and can be used to jeopardize you and your family's safety or be used against you. If we can find it, so can others.

We search for the below, so we know what we need to remove so that no one can obtain them.

  • Cell number – Creates unwanted calls and text and legal tracking that is accurate up to 25 feet.

  • Personal email – Creates unwanted contact and an overwhelmed inbox, making it unusable. Allows people to find your IP address, which will give away your home address.

  • Home address – Allows protests, dangerous packages, and personal attacks at your home.

  • Business associations – Allows people to find financial information and business holdings that can be used for potential attacks or reporter ambushes.

  • Family member's information – Allows people to attack you through them and gather information about your home and other personal information.

  • Breaches where data was exposed. Breaches of data can lead to "Aggravated Phishing." We see this with the Ledger being breached. If your email were exposed, you would receive an increase in phishing attacks. Example: "Give us all your cryptocurrency. We know you have it from the breach. We have your home address, and in less, you give us all your currency, we will XYZ."

2) Sophisticated malicious software can expose communications and your activities when it compromises your electronic devices. We secure the below: 

  • Mobile devices 

  • Laptop/desktop systems 

  • Online accounts - Malicious email rules can forward messages to adversaries.  We all have one breached password exposed that can be is reused on another account. Example: Do you still use the same password you used on LinkedIn in 2012? Do you use it somewhere else?

  • Home, office, and travel networks – Unsecured networks allow access to your systems and data and can provide yours location and habits away to an adversary.

3) We encrypt your communications listed to ensure your security and privacy.

  • SMS Messaging 

  • Voice Calls 

  • Email  

  • Video Conferencing  

4)  If you live in the U.S., your name and home address is displayed on hundreds of websites accessible by anyone. We remove or hide your personal information of the items listed below.

  • Home addresses - Stops protests, dangerous packages, and personal attacks at your home.

  • Cell phone numbers – Eliminates unwanted calls and text and legal tracking that is accurate up to 25 feet.

  • Land-line numbers – Eliminates people from determining your home address location and using it for unwanted contact.

  • Vehicle ownership – Eliminates people from determining your home address location and using it to find and track you or your family.

  • Business associations – Stops people from finding financial information and business holdings that can be used for potential attacks or reporter ambushes.

5) We help you create awareness with family and friends because they could also be targets and unknowingly expose protected information. We understand this can be uncomfortable, and you might not know everything to cover or how to present this information, so we provide you a checklist of what you need to teach your family and friends and a proposed script you might want to use.


Each step in our process is designed to address specific threats that an individual can exploit. When all areas of exposure are compiled together, individuals can do something exponentially more dangerous - Doxxing.

Doxxing is when a person believes you deserve negative attention and publicly post your personal information online to encourage others to harass you. This has led to unwanted packages, identity theft, attacks, and even physical and death threats.  

Doxxing News Articles 

Public Health Officials Doxxed

State Election Official Doxxed

 When someone is Doxxed, the following information can be included in the public post:  

  • Home address

  • Cell number

  • Family details  

  • Passwords

  • Credit card numbers

  • Bank account details

  • Cryptocurrency balances


An even more extreme tactic, known as Swatting, involves placing a fake emergency call, usually mimicking a family member's cell phone number, to draw a robust armed police response to an address. This can result in the use of deadly force.

Furthermore, any damages to the property will be unrecoverable as the officers believing there to be an imminent danger to the residents and responding in the performance of their duties are covered by qualified immunity.  

Swatting News Articles

FBI Website The Dangers of Swatting

Portland Mayor Swatted

White Supremacist Accused of Swatting Public Officials

Below are examples of incidences our services are designed to prevent:

Austin Judge shot in the driveway

Speaker Of The House Pelosi’s home vandalized

Senate Minority Mitch McConnell's home vandalized

Public Officials at all levels receiving threats

GA Secretary of State wife receiving threatening texts 

Threat Mount Against Public Officials

Vigilantism, Scaring People Out of Public Office

The Federal Election Commission has issued guidance allowing lawmakers to use campaign funds to pay for personal security measures and consulting. Check https://www.fec.gov/updates/ao-2018-15/ to see if it applies to you.