SlideShare a Scribd company logo
1 of 10
Escape the Wolf Presentation for Barilla 3 OCT 2011
ESCAPE THE WOLF - Our Mission
Wolves are everywhere in an uncertain world –
 • a stolen laptop with sensitive data.
 • the natural disaster that strands a traveler.
 • a sudden illness in a strange land.
Many travelers are unaware of threats, or wolves.

Are your executives and employees prepared?
Escape the Wolf delivers preemptive threat
assessment, recognition and avoidance. We help
travelers evolve from mindless sheep to alert
sheepdogs able to detect and elude wolves.                                                               Master metaphor for society - Sheep, Wolves,
                                                                                                                        Sheepdogs




                  While attached to a government intelligence agency, (Wolf CEO) Clinton Emerson
                  identified the need for high-level global travelawareness training. His curriculum is based
                  on successful offensive and defensive tactics, techniques and procedures of the most
                  highly skilled law enforcement, intelligence, and special operations units. Today, Emerson
                  and his cadre of highly experienced sheepdogs at Escape the Wolf share their knowledge
                  and expertise with global travelers.


         © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
         and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF - Capabilities
 Get the Edge on Threats - Preemptive, Holistic Approach




                                                      Escape the Wolf’s THREAT® matrix is a convenient way to research potential
                                                      risks prior to travel and an important memory tool to identify threats.




With Escape the Wolf, organizations enjoy –

• An end-to-end solution to keep employees safe and aware of travel and security risks, including
  kidnap avoidance.

• Preemptiveapproach with Escape the Wolf's flagship Total AwarenessSM system to identify, elude
  or minimize most threats.

• Best-of-the-best experts – government, defense, law enforcement and security experts –
  experienced in risks and lifelong travelers to the most remote and dangerous environments.

• Holistic, innovativetravel resources andeLearning, hands-on training and tailored consults
  transform travelers from unaware sheep into self-confident sheepdogs able to fend off wolves in
  changing environments.

          © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
          and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – The Book
      ESCAPE THE WOLF: Personal Security Handbook
              for the Traveling Professional

• Immediately start to build and practice travel security
  awareness. Learn how to recognize threats –from common
  crime, illness, natural disasters, competitive intelligence theft, or
  even terrorism – using Escape the Wolf’s proven Total
  AwarenessSM system.

• Develop skills sets. Build personal and group capabilities that
  work in dynamic and dangerous global environments.

• Preemptive offensive and defensive preparedness. Learn
  how to avoid being a “walking target,” and gain new confidence
  when venturing into unfamiliar territory. Identify, avoid and
  minimize threats and learn how to escape from threatening
  situations.

• Best practices. Principles build upon best-of-the best local, state
  and national security disciplines. Once available only to U.S.
  defense contractors and government employees, Escape the
  Wolf’s unique preemptive philosophy is now exclusively available
  to our clients.


         © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
         and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – eLearning
• Dynamic curriculum – Engaging, flexible, mobile.

• Convenience – Accessible 24hours a day anywhere in the
  world.

• Standardization – Learning delivered in a standardized and
  consistent manner to build a solid foundation for travel
  awareness.

• High retentionrate – Structured for increased retention
  through the use of interactive, audio and visual elements,
  quizzes and messages continually reinforced throughout the
  program.

• Self-paced learning modules– Learning controlled by the
  student.




         © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
         and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – Seminars and Consults

• Hands-on, interactive – Realistic, practical exercises
  designed to enhance tactical decision-making and
  deliberate action.

• Flexible scale – Our most popular training can be
  adapted incrementally from a one-day event to an in-
  depth, two-week course of instruction.

• Tailored to client requirements – Address a particular
  region of the globe or specific security concerns.

• Consults for on-the-go executives – Customized
  briefings by senior Escape the Wolf leads who have
  directed highly sensitive security operations in their
  positions in government and law enforcement.




           © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
           and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – Digital TravelcraftSM
and Zero Trace™ Products
                                              Digital TravelcraftSM training:

                                              • Learn how to avoid surveillance and
                                                protect cell phones, laptops and other
                                                digital devices.

                                              • Improve the ability to assess digital threats
                                                and escape the wolf in a discreet manner.


                                              Zero Trace™ products: a tailored line of
                                                Escape the Wolf travel accessories to
                                                increase travel and data security –

                                                           • Cell phone pouch.

                                                           • Travel bag pouch for laptop,
                                                             passport and the traveler’s other
                                                             digital devices, including RFID
                                                             passport.




      © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
      and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF Capabilities – Shepherd™ Secure
Phone Alert and Tracking Services and THREAT™ 24/7
Mobile Intelligence Service
                                            Shepherd Phone – available for the first
                                            time commercially only from Escape the
                                            Wolf:

                                             • Secure messaging, discrete distress
                                               signaling and powerful tracking and
                                               notification options

                                             • Secure two-way text and talk via 256-bit
                                               AES encrypted


                                             THREAT™ mobile intelligence risk
                                               identification or avoidance:

                                                          • 24/7 global travel resource with 163
                                                            country guides

                                                          • Web app via smartphone, computer
                                                            or tablet


     © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
     and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
Building a Better World for the Global Traveler
  • Preemptive philosophy.

  • Proven system to identify and respond to threats.

  • Phased learning for sustained capability.

  • Active traveler able to identify and elude the world’s wolves.



 With Escape the Wolf as your travel security risk mitigation
 partner, your organization will –

   • protect what matters most – your people, assets, competitive intelligence and reputation.

   • fulfill duty of care obligations since employees are trained to recognize and evade threats
     and travel more safely on a global scale.

   • and, ultimately, protect the bottom line by avoiding costs associated with negative incidents
     or lost proprietary information.




          © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
          and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
ESCAPE THE WOLF

For more information, please
     visit our website:
 www.EscapetheWolf.com


      or contact us at:

  lynn@escapethewolf.com

     Escape The Wolf
      P.O. Box 56425
 Virginia Beach, VA 23456
  703-270-0017 ext. 702




       © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary
       and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.

More Related Content

Viewers also liked

Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Philip Polstra
 
A presentation on survival skills
A presentation on survival skillsA presentation on survival skills
A presentation on survival skillsanuragcooolz
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligencekelsports
 
The Hacks’ Guide to eLearning
The Hacks’ Guide to eLearningThe Hacks’ Guide to eLearning
The Hacks’ Guide to eLearningJason Brown
 
First aid lesson carrying
First aid lesson   carryingFirst aid lesson   carrying
First aid lesson carryingnurserosie
 
Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationDarwish Ahmad
 

Viewers also liked (10)

Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
 
A presentation on survival skills
A presentation on survival skillsA presentation on survival skills
A presentation on survival skills
 
Counterintelligence
CounterintelligenceCounterintelligence
Counterintelligence
 
Intelligence Cycle
Intelligence CycleIntelligence Cycle
Intelligence Cycle
 
The Hacks’ Guide to eLearning
The Hacks’ Guide to eLearningThe Hacks’ Guide to eLearning
The Hacks’ Guide to eLearning
 
33 emergency methods of moving casualties
33 emergency methods of moving casualties33 emergency methods of moving casualties
33 emergency methods of moving casualties
 
First aid lesson carrying
First aid lesson   carryingFirst aid lesson   carrying
First aid lesson carrying
 
Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentation
 
Espionage
EspionageEspionage
Espionage
 
First aid & bandaging
First aid & bandaging First aid & bandaging
First aid & bandaging
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

Escape the wolf capabilities

  • 1. Escape the Wolf Presentation for Barilla 3 OCT 2011
  • 2. ESCAPE THE WOLF - Our Mission Wolves are everywhere in an uncertain world – • a stolen laptop with sensitive data. • the natural disaster that strands a traveler. • a sudden illness in a strange land. Many travelers are unaware of threats, or wolves. Are your executives and employees prepared? Escape the Wolf delivers preemptive threat assessment, recognition and avoidance. We help travelers evolve from mindless sheep to alert sheepdogs able to detect and elude wolves. Master metaphor for society - Sheep, Wolves, Sheepdogs While attached to a government intelligence agency, (Wolf CEO) Clinton Emerson identified the need for high-level global travelawareness training. His curriculum is based on successful offensive and defensive tactics, techniques and procedures of the most highly skilled law enforcement, intelligence, and special operations units. Today, Emerson and his cadre of highly experienced sheepdogs at Escape the Wolf share their knowledge and expertise with global travelers. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 3. ESCAPE THE WOLF - Capabilities Get the Edge on Threats - Preemptive, Holistic Approach Escape the Wolf’s THREAT® matrix is a convenient way to research potential risks prior to travel and an important memory tool to identify threats. With Escape the Wolf, organizations enjoy – • An end-to-end solution to keep employees safe and aware of travel and security risks, including kidnap avoidance. • Preemptiveapproach with Escape the Wolf's flagship Total AwarenessSM system to identify, elude or minimize most threats. • Best-of-the-best experts – government, defense, law enforcement and security experts – experienced in risks and lifelong travelers to the most remote and dangerous environments. • Holistic, innovativetravel resources andeLearning, hands-on training and tailored consults transform travelers from unaware sheep into self-confident sheepdogs able to fend off wolves in changing environments. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 4. ESCAPE THE WOLF Capabilities – The Book ESCAPE THE WOLF: Personal Security Handbook for the Traveling Professional • Immediately start to build and practice travel security awareness. Learn how to recognize threats –from common crime, illness, natural disasters, competitive intelligence theft, or even terrorism – using Escape the Wolf’s proven Total AwarenessSM system. • Develop skills sets. Build personal and group capabilities that work in dynamic and dangerous global environments. • Preemptive offensive and defensive preparedness. Learn how to avoid being a “walking target,” and gain new confidence when venturing into unfamiliar territory. Identify, avoid and minimize threats and learn how to escape from threatening situations. • Best practices. Principles build upon best-of-the best local, state and national security disciplines. Once available only to U.S. defense contractors and government employees, Escape the Wolf’s unique preemptive philosophy is now exclusively available to our clients. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 5. ESCAPE THE WOLF Capabilities – eLearning • Dynamic curriculum – Engaging, flexible, mobile. • Convenience – Accessible 24hours a day anywhere in the world. • Standardization – Learning delivered in a standardized and consistent manner to build a solid foundation for travel awareness. • High retentionrate – Structured for increased retention through the use of interactive, audio and visual elements, quizzes and messages continually reinforced throughout the program. • Self-paced learning modules– Learning controlled by the student. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 6. ESCAPE THE WOLF Capabilities – Seminars and Consults • Hands-on, interactive – Realistic, practical exercises designed to enhance tactical decision-making and deliberate action. • Flexible scale – Our most popular training can be adapted incrementally from a one-day event to an in- depth, two-week course of instruction. • Tailored to client requirements – Address a particular region of the globe or specific security concerns. • Consults for on-the-go executives – Customized briefings by senior Escape the Wolf leads who have directed highly sensitive security operations in their positions in government and law enforcement. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 7. ESCAPE THE WOLF Capabilities – Digital TravelcraftSM and Zero Trace™ Products Digital TravelcraftSM training: • Learn how to avoid surveillance and protect cell phones, laptops and other digital devices. • Improve the ability to assess digital threats and escape the wolf in a discreet manner. Zero Trace™ products: a tailored line of Escape the Wolf travel accessories to increase travel and data security – • Cell phone pouch. • Travel bag pouch for laptop, passport and the traveler’s other digital devices, including RFID passport. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 8. ESCAPE THE WOLF Capabilities – Shepherd™ Secure Phone Alert and Tracking Services and THREAT™ 24/7 Mobile Intelligence Service Shepherd Phone – available for the first time commercially only from Escape the Wolf: • Secure messaging, discrete distress signaling and powerful tracking and notification options • Secure two-way text and talk via 256-bit AES encrypted THREAT™ mobile intelligence risk identification or avoidance: • 24/7 global travel resource with 163 country guides • Web app via smartphone, computer or tablet © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 9. Building a Better World for the Global Traveler • Preemptive philosophy. • Proven system to identify and respond to threats. • Phased learning for sustained capability. • Active traveler able to identify and elude the world’s wolves. With Escape the Wolf as your travel security risk mitigation partner, your organization will – • protect what matters most – your people, assets, competitive intelligence and reputation. • fulfill duty of care obligations since employees are trained to recognize and evade threats and travel more safely on a global scale. • and, ultimately, protect the bottom line by avoiding costs associated with negative incidents or lost proprietary information. © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.
  • 10. ESCAPE THE WOLF For more information, please visit our website: www.EscapetheWolf.com or contact us at: lynn@escapethewolf.com Escape The Wolf P.O. Box 56425 Virginia Beach, VA 23456 703-270-0017 ext. 702 © Copyright 2011, Escape the Wolf, LLC. | All materials contained here within are proprietary and cannot be duplicated or disseminated without written approval by Escape the Wolf, LLC.