mindstarsecurity.com Open in urlscan Pro
2606:4700:3032::ac43:8937  Public Scan

URL: https://mindstarsecurity.com/
Submission: On May 05 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

×Close

MINDSTAR SECURITY & PROFILING - SERVICES


COMPREHENSIVE SECURITY ASSESSMENT

Professionals at Mindstar Security & Profiling work personally with each
executive and his/her family by providing customized security assessments from
the vantage point of the inventive, determined and tech-savvy human or
adversary. Mindstar Security & Profiling will focus on the security trifecta of
Internet, Physical and IT security by conducting three security assessments
which will be integrated into a comprehensive security assessment. Choose one
assessment, or combine all three for a full analysis.

Executive Internet Profile (EIP™): Assessment of the online presence and profile
of the executive(s) and their family members’ Internet and social media
presence. While many executives may not use an abundance of social media
themselves, malicious activities from adversaries or non-malicious postings by
family members, friends, business associates and unknown third parties may
result in unwanted public exposure.

Physical Security Assessment: Assessment of home(s) and corporate facilities,
perimeters, staffing, doors/windows, alarm/surveillance systems, and review of
security policies. This assessment will be conducted from the vantage point of
the motivated person who wants to gain access to private property and assets
within the properties.

IT/Wireless Security Assessment: Assessment of home WiFi, home networks,
routers, children/spouse use of smartphones, smart appliances, gaming systems,
safe apps and secure online shopping. This assessment is conducted from the
perspective of a hacker, scammer or social engineer who wants to gain access to
private data, systems and networks.


Close
×Close

MINDSTAR SECURITY & PROFILING - SERVICES


CYBER RISK ASSESSMENT

Whether it is for the organization or the family office, this tailored
assessment provides critical infrastructure asset owners and operators with a
comprehensive technical review and cyber evaluation of the architecture and
components that comprise their operations.

In today’s cyber environment, cyber risk can originate from vectors other than
the actual hardware and software that comprise the network. Risk can stem from
malware, personal devices, dated policies or procedures, corrupted apps,
phishing attacks, or employee mistakes. In some cases, attacks are launched from
authenticated users and systems by malicious or non-malicious insiders.

In order to provide a assessment of the risk landscape (office or home),
Mindstar’s cyber team will work interactively with your IT and
operations/business personnel to evaluate the current architecture, technology,
policies and processes, with focus on three key areas:

1) Architecture/Hardware and Software: Systems, Networks and Devices
2) Internal Controls: Policies, Training, Incident Response and Insider Threat
3) External Risk: Phishing, Ransomware, Malware and Internet Threats


Close
×Close

MINDSTAR SECURITY & PROFILING - SERVICES


CYBER INVESTIGATIONS

When an organization, an executive, or a family member is threatened, harassed,
or stalked, understanding the messaging and intent of the threat is extremely
important. In today’s environment, a thorough investigation must include the
combined elements of:

   • A Technical Review & Analysis
   • A Cyber – Internet/Social Media Review
   • A Psychological Profiling Assessment

In addition to assessing imminent, recidivist or one-time threat, investigations
can be applied to areas such as:

   • Executive candidate searches
   • Merger & acquisition due diligence
   • Embezzlement cases
   • Insider threat
   • Non-criminal legal issues
   • Corporate re-organizations (e.g., downsizing or
      personnel changeover)


Close
×Close

MINDSTAR SECURITY & PROFILING - SERVICES


PROFILING & EXPERT WITNESS

The methodology of behavioral or criminal profiling has been used for over three
decades to assist investigators and forensic analysts in incident investigation.
Profiling is defined as the process by which an incident is evaluated and
assessed from a behavioral perspective in order to provide social scientific
insight into the individual or individuals who may have committed the offense or
determine the dangerousness of the threat actor.

Mindstar provides and applies behavioral profiling to a wide variety of cases
and situations including:

   • Death Threats
   • Extortion
   • Ransom/Kidnapping
   • Cyber or Physical Stalking
   • Cyber-Bullying or Harassment
   • Due Diligence – Hiring or Termination


Families and family members when faced with a suspicious or threatening
situation should be provided with the most robust information possible by
understanding the motive, intent, and anticipated behavior of the threat
actor(s).

These behavioral assessments may supplement on ongoing legal case (criminal or
civil) as depositions or affidavits. In addition, expert witness testimony and
services are available.


Close
×Close

MINDSTAR SECURITY & PROFILING - SERVICES


TRAINING & SEMINARS

Mindstar offers customized security training and seminars for executives, their
family members or their organizations. Topics include:

   • Executive/Board Room Security Overview
   • Family (Adults) Security Overview
   • Family (Children) Security Overview
   • Safe Travel
   • Social Media Safety and Protection for Adults
   • Social Media Safety and Protection for Children
   • Physical Security and Self Defense for Children
   • Physical Security for the Office (Gunman in
      the Building Scenario)
   • Insider Threat/Embezzlement


Close
×Close

MINDSTAR SECURITY & PROFILING - SERVICES


CORPORATE CONSULTING

Mindstar Security & Profiling works together with the family members, the estate
or home managers, the IT department, the security department, the family office
professionals or private attorneys.

Mindstar Security & Profiling is professional and experienced in all aspects of
its operations, whether serving clients at home or at work. Our experts have
been in the security, intelligence and safety professions for decades serving
commercial clients, family offices, and high net worth families.

There are services, however, that we do not cover. For additional specialty
security services such as executive protective detail, kidnapping and random
insurance, or legal representation for cyber issues, we can provide referrals to
trusted and vetted service providers.

Every introduction, interaction, and request is handled with undivided attention
and confidentiality. By delivering only the very best and always exceeding
expectations, our clients come to trust us and rely on our services to help them
secure their lives to the fullest.


Close
×Close

MINDSTAR SECURITY & PROFILING - SERVICES


INTERNET & SOCIAL MEDIA MONITORING

Criminals or adversaries can easily search the Internet to reveal your identity,
financial status, residence, family members, etc. — essentially building a
profile. Building a profile helps predict where someone will be at any given
time, making them vulnerable to a physical attack.

Stay abreast of emerging threats, unwanted disclosed information, or developing
issues. We work with you to understand the problem at hand and deliver
intelligence, so you can respond quickly to mitigate risks.

Monitoring Topics Include:

   • Family or Individual Internet Footprints
   • Location/Travel Based
   • Due Diligence
   • Threats and Risks
   • Events
   • Adversarial Groups
   • Lawsuits


Close
×Close

MINDSTAR SECURITY & PROFILING - SERVICES


CLOSED SOURCE ACCESS & MONITORING

Criminals or adversaries can easily sign up for or pay to access closed data
sources to attain information about your identity, financial status, residence,
family members, etc. — essentially building a profile. These sources are not
“hacked” or attained illegally, but are accessible by paying a small fee.

Mindstar offers open source (Internet & Social Media Monitoring) as well as
closed source monitoring. Closed source data is defined as information that is
attained via the Internet but requires a login, user credentials, or is a paid
for service. Numerous “pay to access” information sources are available and
contain data such as prior criminal histories, social security numbers, voter
registration numbers, genealogy data and additional personal identifiable
information.


Close
×Close

MINDSTAR SECURITY & PROFILING - AFFILIATIONS


INTERNATIONAL SPY MUSEUM

The Museum focuses on human intelligence and reveals the role spies have played
in world events throughout history. Former intelligence officers reveal
extraordinary experiences from their distinguished careers in the field and
offer informed opinions on current as wells as historical events.

Visit: http://www.spymuseum.org/host-an-event/spy-speaker-series/terry-gudaitis/


Close
×Close

MINDSTAR SECURITY & PROFILING - AFFILIATIONS


TECHNO-SECURITY & FORENSICS INVESTIGATIONS CONFERENCE / MOBILE FORENSICS WORLD

This program has been serving the cyber community for over 15 years. The
conference has become known as a world-class training and international
networking event.

Dr. Gudaitis serves as an advisory board member for this conference.



Visit: http://www.technosecurity.us/


Close
×Close

MINDSTAR SECURITY & PROFILING - AFFILIATIONS


MI3SECURITY

Mi3Security is the market and technology leader in intelligence-led Mobile Risk
Management (MRM). The company offers a cloud-based service that performs a
detailed analysis on 3 key vectors: context, intent, and predictive behavior.

Dr. Gudaitis serves as an advisory board member for this organization.



Visit: http://www.Mi3Security.com


Close
×Close

MINDSTAR SECURITY & PROFILING - AFFILIATIONS


WHITEHAWK

WhiteHawk enables businesses to grow with confidence by providing the future of
cyber-security services.

Visit: http://www.whitehawk.com


Close

Mindstar Security & Profiling
Concierge Security Services
Toggle navigation
 * Home
 * Services
 * Reports
 * Affiliations
 * About
 * Contact


WE SOLVE PROBLEMS. QUIETLY.

Physical and cyber security services for family offices, high net-worth
individuals, executives and their families.


SERVICES



Click or tap on one of the services below to learn more.


 * All
 * Risk Assessments
 * Investigations
 * Training & Consulting
 * Risk Monitoring

Learn More
Comprehensive Assessment
Learn More
Cyber Risk Assessment
Learn More
Cyber Investigations
Learn More
Profiling & Expert Witness
Learn More
Training & Seminars
Learn More
Corporate Consulting
Learn More
Internet & Social Media
Learn More
Closed Source


REPORTS



CONCIERGE SECURITY REPORT 1 - JULY 2015

Family Security: Home Invasion and Burglary In Gated Communities and Affluent
Neighborhoods
Download Report



CONCIERGE SECURITY REPORT 2 - AUGUST 2015

Executive & Family Travel: Global Safety Including Health, Cyber and Physical
Security Measures
Download Report



CONCIERGE SECURITY REPORT 3 - SEPTEMBER 2015

Enhancing Physical Security: The Impact of Internet and Social Media Exposure
Download Report
























FOR ADDITIONAL REPORTS

Concierge Security Reports are released monthly to our clients and select
colleagues. Click on this link to request that you be added to our distribution
list. The Concierge Security Reports will arrive your email inbox.

We do not send spam, and we will not send a report unles you request it from us
directly.




AFFILIATIONS




INTERNATIONAL SPY MUSEUM

> Former intelligence officers reveal extraordinary experiences...
> 
> Learn More


TECHNO-SECURITY CONFERENCE

> Known as a world class training and international networking event...
> 
> Learn More


MI3SECURITY

> Cloud-based service that performs detailed analysis on key vectors...
> 
> Learn More


WHITEHAWK

> Enables businesses to grow with confidence by providing...
> 
> Learn More

 
 
 



ABOUT MINDSTAR SECURITY & PROFILING

Concierge Security Services for Executives and Family Offices



Mindstar Security & Profiling specializes in solutions for the commercial
industry focusing on high profile/high net worth executives, their families, and
the organizations they lead. Security assessments and consultations include a
unique perspective and blend of physical security, cyber security and behavioral
profiling.

   • Threats to Corporate Executives or their Family Members
   • Executive Risk Assessments
   • Personal Property and Asset Vulnerability Assessments
   • Behavioral Profiling
   • Crisis Planning & Mitigation
   • Social Media Protection and Safety
   • Due Diligence Profiles
   • Customized Security Briefings for Boardrooms &
      Family Offices

Each Mindstar service is especially customized for the needs of the executive or
his/her family members. We understand there are unique safety and security
requirements for high net worth persons and their families such as: being in a
social and financial demographic that is frequently targeted, journalist and
media interest, personal brand management, unique staffing needs, non-commercial
travel or transportation and the need for high degrees of privacy and
confidentiality.




CUSTOM SECURITY SOLUTIONS

Information Security is becoming more relevant every day, even for those who do
not use the Internet regularly. Cyber crime is big business; its growing fast
and high net worth individuals are targets. In recent years, organized crime
elements and gangs have taken over from the amateur hackers and they are
focusing more and more on high net worth individuals.

Children, although typically tech-savvy, are naïve to the dangers of posting
their personal information on public websites. Social networking puts them at
even greater risk of unknowingly associating with a perpetrator who may target
them because of the family's prosperity.

Our specialists have decades of experience servicing the security needs of
corporate executives and their families

DR. TERRY GUDAITIS, OWNER

Dr. Terry Gudaitis founded Mindstar Security & Profiling in 2013. Prior to
forming her own firm, Terry was the Vice President and Cyber Intelligence
Director at Cyveillance, responsible for operations and management of the
security/intelligence delivery organization. Before joining Cyveillance, Terry
also held senior positions at SAIC, Psynapse Technologies LLC and Global
Integrity Corporation. Before focusing on the commercial sector, Terry was an
operations officer and behavioral profiler at the Central Intelligence Agency
(Counter Terrorist Center).

In addition to her corporate related work, Terry is on the Board of MetaIntell,
has served on the United States Secret Service Advisory Board for Insider
Threat; trained investigators at the National Center for Missing and Exploited
Children and regularly presents at national and international conferences. Her
most current publications include a book on Social Engineering – Low Tech
Hacking (2011) and, a book on profiling hackers entitled Cyber Deception
(December 2015 – to be released and co-authored with FBI Agent Cameron Malin of
the Behavioral Assessment Unit). Terry is also a featured speaker at the
International Spy Museum in Washington, DC.

Terry holds holds a Bachelor’s Degree from SUNY Binghamton, a Master’s Degree
and PhD in Forensic Psychology from University of Florida.

CHRIS CLARK, VICE-PRESIDENT

For over 12 years, Chris Clark has assisted the Fortune 500 with some of their
most sensitive cyber security issues. Chris has been utilizing open source
information and proprietary software to exploit Internet and social media data.
These incidents include physical threats to executives and/or facilities,
boycotts, protests, class action lawsuits, violation of company blogging
policies, information security vulnerabilities, different forms of online fraud,
and other disruptive activity. He has focused on conducting threat assessments,
industry trends, and other “deep dives” into Internet based information.
Throughout his tenure, Chris has conducted hundreds of investigations including
over 100 executive online assessments.

As a risk analyst, Chris was tasked with securing funds from high risk clients,
as well as high dollar amounts that present a significant risk. His experience
included risk mitigation, communication with clients and banks, requesting and
receiving wire transfers, as well as background checks on individuals of
interest and businesses.

Earlier in his career, Chris obtained a New York State Security Guard license
working for an organization where he had to identify and diffuse tense and/or
violent situations. He is also a Certified New York State Firefighter where he
responded to a variety of calls including various types of fires, alarms, car
accidents, and medical emergencies. Chris holds a Bachelor’s Degree from SUNY
Buffalo and a Master’s Degree in Intelligence Studies from Mercyhurst
University.

THE MINDSTAR SECURITY TEAM

Our team members all have 12+ years of experience working with executive clients
who necessitate confidentiality and discretion. Each team member holds a
Master's Degree (or PhD) in their fields of expertise whether it be intelligence
studies, computer science, or threat/criminal behavior. Our team works together
to bring the best security skills together including a breadth/depth of
knowledge about the Internet/Social Media, Physical Security, and IT Security.

Some of the certifications held by our team members include:

  • CISSP
  • EnCE
  • Security+
  • Red Hat Certified Technician
  • Certified Scrum Master
  • VMware Certified Professional
  • Body Guard/Security Guard License



CONTACT US



We are located in Leesburg, Virginia at the Leesburg Executive Airport,
near the technology corridor just outside Washington DC.

 * 1001 Sycolin Rd, SE, Suite 5
 * 703-404-1100
 * 703-404-5549 (fax)
 * info@MindstarSecurity.com












Copyright © 2015 Mindstar Security & Profiling