top of page
15 MINUTES
TO TARGET YOU
Thats how long it takes an adversary to find your home, your travel patterns, and your family - to begin planning an attack.
EXECUTIVE TARGETING
IS ACCELERATING
313
%
Increase in documented incidents since 2023 -
Security Executive Council & Mercyhurst University, 2026.
Every attack - physical, digital, or financial requires one thing to start - Information about you.
YOUR CURRENT SECURITY
DOESN'T COVER THIS LAYER
The controls most rely on, are not designed to address adversarial targeting.
PHYSICAL SECURITY
Protects Locations.
It responds after targeting is complete.
DIGITAL
SECURITY
Guards Systems, Not People.
It prevents intrusion, not observation.
LEGAL COVERAGE
Deters the compliant, not the committed.
Targeting occurs silently, upstream.
As a result, the targeting cycle runs upstream - unopposed.
Unchecked targeting leaves you unaware, unprepared and reactive to an aware, prepared, and proactive adversary.
“We thought we were protected—until we saw our exposure.” - CEO, mid-cap public company
WE RUN THE
TARGETING CYCLE
FIRST
The only way to defeat adversarial targeting
is to do it before they get the chance.
01 - PROFILE
We build your targeting picture across all six domains: personal, physical, digital, travel, financial, and the insider threat. We find every data point an adversary would use to find you, link you, and understand you.
02 - PRIORITIZE
We isolate the most probable attack vectors from a universe of 70 possibilities — specific to who you are, what you own, and how you move. Not a generic risk profile. Yours.
03 - TEST
We test those vectors through simulation and audit. We confirm exploitability. No theory.
04 - HARDEN
We reduce, remove, and degrade the information that makes your profile coherent. We break the linkages and disrupt the convergence.
05 - IMPLEMENT
We put the recommendations into action, shape the behaviors that create vulnerability, and provide fractional executive protection when the situation requires it.
06 - OVERWATCH
We monitor continuously. Your posture stays current as your exposure changes.
07 - TARGET
When a threat emerges, we identify it and pursue it. We turn your defense into their problem.
"I've been careful and deliberate about building my company. I realized I needed to be just as careful and deliberate about protecting who I've built it for."
- Founder, private company
OUR TEAM
Recce Group was built from within the threat environment.
Our team is composed of former operators across the full attack spectrum
— CIA Directorate of Operations
— Executive Protection
— Open-Source Intelligence
— U.S. Special Operations
— Counterintelligence
— Cyber & Digital Exploitation.
Our operational experience exists for one purpose:
UNTARGETABLE CLIENTS
RELENTLESSLY TARGETED ADVERSARIES
bottom of page