top of page
ATTACK SEQUENCE (6).png

OUR TEAM

Our Story

Security has traditionally been built around the moment of attack.

 

Organizations invest in cybersecurity to protect corporate systems. Physical security protects homes and offices. Legal structures manage liability. But none of these address how individuals are actually targeted.

 

Adversaries don't begin at the point of attack. They begin earlier — identifying, mapping, and profiling individuals using information that's publicly available, commercially aggregated, and legally exploitable. Executives, their families, and their networks are selected and planned against long before any system detects a threat.

 

Despite the growing frequency and sophistication of these attacks, no one was addressing targeting at its source.

 

Recce Group was founded to change that.

 

Our team spent decades hunting people for the United States government. We were good at it. Now we protect the people being hunted. We map what an adversary would see, test how it would be used, and systematically reduce the exposure that makes targeting possible.

With Recce Group, security doesn't begin at the point of attack.

It begins where targeting starts.

Exec Team.png
ATTACK SEQUENCE (6).png

Our Team

Recce Group was built by operators—not analysts.

 

Engagements are led by a former CIA Directorate of Operations officer.

 

For each client, we assemble a team of specialists aligned to the specific exposure and targeting risks identified.

Physical Operations — Former special operations combat veteran with direct action and reconnaissance experience

 

Executive Protection — Former protective detail for the Director of the Central Intelligence Agency

 

Intelligence Collection — Open-source intelligence specialist with government targeting experience

 

Digital Exploitation — OSCP-certified penetration tester focused on personal attack surface validation

 

Financial Intelligence — CPA | CFF | ABV | CM&AA forensic accountant specializing in complex financial exposure

 

Legal & Data Protection — Privacy attorney focused on data suppression and asset protection

SEE YOUR EXPOSURE IN 15 MINUTES

Schedule an adversarial exposure demonstration.

 

In 15 minutes we'll show you how your home, office, and family members surface through open-source data — the same 15 minutes it takes an adversary to do it.

 

No obligation, full discretion.

 

You'll see what an adversary would see - before they do. 

© 2026 by Recce Group LLC

bottom of page