The Defuse Podcast: Where Experts Defuse Real Threats

Philip Grindell MSc CSyP

When the threats are real and the stakes are high — what actually works? Right now, as you're reading this, someone's watching your family, your business rivals are digging through your digital history, and a disgruntled employee knows exactly where your vulnerabilities are. While you're focused on your day job, they're building a plan. This podcast exists because ignoring threats doesn't make them disappear. I'm Philip Grindell — former Scotland Yard detective, behavioural threat specialist, and author of Personal Threat Management. After Jo Cox MP was murdered, I was tasked with creating Parliament's specialist threat assessment team. I've spent 35 years stopping people who wanted to hurt prominent individuals, from MPs to royalty to the ultra-wealthy. What You'll Get From Listening You'll recognise the warning signs everyone else misses. That "helpful" new employee asking odd questions. The photographer at three different family events. The online critic whose interest feels too personal. You'll understand how dangerous people operate. The people planning to harm you treat you like a research project — cataloguing your habits, weaknesses, and blind spots whilst you're oblivious. You'll know what to do when a crisis hits. Not theory — actual steps. How to control the narrative when your reputation's under attack. When to stay silent and when silence destroys you. You'll discover what's already out there about you. Right now, strangers can map your life using tools you've never heard of. What You'll Hear Straight-talking conversations with ex-FBI agents who've tracked serial killers, digital investigators who can find anyone online, crisis managers who've saved billion-pound reputations, and psychologists who understand exactly how fixated individuals think. Topics include stalking, fixated individuals, insider threats, protective intelligence, reputation management, OSINT, digital vulnerability, and crisis leadership. These aren't interviews — they're operational briefings. Real cases, real tactics, real consequences. Who This Is For You must understand modern threats if you're responsible for protecting someone important (yourself, your family, or your boss). Physical violence is just one possibility. Reputation assassination, digital stalking, insider betrayal — these happen far more often and can be just as devastating. If you're prominent enough to be a target, you already are one. The question isn't whether someone's paying attention to you — it's whether you're paying attention to them. What Makes This Different No corporate nonsense. I've watched too many good people get hurt because they received sanitised advice from people who'd never faced real threats. You'll get the truth, even when it's uncomfortable. Experience that matters. I've identified planned terrorist attacks, managed stalking cases involving royalty, and helped ultra-wealthy families navigate threats they never considered. Every recommendation comes from cases where lives and reputations were on the line. Stories that stick. Theory doesn't save lives — understanding does. Every episode includes real cases that show you what threats look like before they turn dangerous. Because the people planning to hurt you aren't taking the day off. Subscribe now and learn how to manage threats before they become crises.

  1. 15 JUL

    The Attack Cycle with James Hamilton Part 2

    Send us a text Send us a text In this compelling two-part episode, Philip Grindell welcomes back security expert James Hamilton to explore the "attack cycle" - a proven model used by criminals, terrorists, and assassins to target victims. Following the high-profile New York CEO assassination, Hamilton breaks down the eight critical phases: target selection, surveillance, final target selection, planning, rehearsal, execution, escape, and exploitation. The discussion reveals how attackers methodically progress through each stage and, crucially, how executive protection teams can identify and disrupt these phases. Hamilton shares practical insights on surveillance detection, threat assessment, and creating flexible security programs that balance protection with client accessibility. BIO James is a nationally recognized personal security expert and former FBI Supervisory Special Agent. For more than 33 years, he has been a protector, trainer, and advisor to the nation’s most at-risk individuals. He has real, practical, and unparalleled experience in executive protection, violence prevention, and personal security. This real experience was earned through service in local law enforcement, the FBI, and America’s premiere executive protection firm. He has protected government officials, high-net-worth individuals, and leading religious figures all over the globe and has empowered thousands of individuals to stay safe in an increasingly dangerous world. He has dedicated his life to this particular area of expertise and is sought after by those seeking practical and sound guidance. https://www.hamiltonsecuritygroup.com/ https://www.linkedin.com/in/james-hamilton-752894104/ Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    38 min
  2. 1 JUL

    The Attack Cycle with James Hamilton Part 1

    Send us a text In this compelling two-part episode, Philip Grindell welcomes back security expert James Hamilton to explore the "attack cycle" - a proven model used by criminals, terrorists, and assassins to target victims. Following the high-profile New York CEO assassination, Hamilton breaks down the eight critical phases: target selection, surveillance, final target selection, planning, rehearsal, execution, escape, and exploitation. The discussion reveals how attackers methodically progress through each stage and, crucially, how executive protection teams can identify and disrupt these phases. Hamilton shares practical insights on surveillance detection, threat assessment, and creating flexible security programs that balance protection with client accessibility. BIO James is a nationally recognized personal security expert and former FBI Supervisory Special Agent. For more than 33 years, he has been a protector, trainer, and advisor to the nation’s most at-risk individuals. He has real, practical, and unparalleled experience in executive protection, violence prevention, and personal security. This real experience was earned through service in local law enforcement, the FBI, and America’s premiere executive protection firm. He has protected government officials, high-net-worth individuals, and leading religious figures all over the globe and has empowered thousands of individuals to stay safe in an increasingly dangerous world. He has dedicated his life to this particular area of expertise and is sought after by those seeking practical and sound guidance. https://www.hamiltonsecuritygroup.com/ https://www.linkedin.com/in/james-hamilton-752894104/ Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    29 min
  3. 2 JUN

    When Crisis Hits: The Real Cost of Getting Reputation Wrong

    Send us a text When Crisis Hits: The Real Cost of Getting Reputation Wrong This week's Defuse Podcast featured Heather Blundell (CEO, Grayling UK) and James Clothier (Head of Crisis) discussing how reputation management has become essential protection. Key insights: Most crisis failures stem from human behaviour under pressure, not poor messaging. Female executives face different reputation attacks requiring specific strategies. Social media breaks stories before traditional media responds. Video responses are replacing written statements as authenticity matters more than polish. Heather revealed that proactive reputation management creates a competitive advantage, not just damage limitation. The conversation covers timing challenges, the importance of an external perspective, and why lawyers often make statements worse by stripping out emotion. They discuss how social media has transformed crisis response - young people get news from Snapchat, stories break on Twitter first, and video content is becoming essential. The practical advice focuses on being honest, letting the light in, and demonstrating genuine change rather than just promising to "learn lessons." Heather Blundell’s Biography:  Heather is the award-winning UK CEO of Grayling, a global PR firm,  responsible for 200 employees across nine offices.  She has spent more than 16 years as a trusted adviser to some of the world's largest companies and prominent CEOs, guiding them through periods of significant change, disruption, and complex reputation and crisis issues. Heather is also a regular media commentator in the national media.  James Clothier James is Head of Crisis at Grayling UK, responsible for leading the crisis and reputation practice, alongside the firm's corporate division.  Before joining Grayling, James spent two decades in senior editorial positions at The Sun and the Daily Mail. https://grayling.com/ #ThreatIntelligence #CrisisManagement #ReputationRisk #ExecutiveProtection #CorporateSecurity #StrategicCommunications Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    58 min
  4. 13 MAY

    OSINT Part 2 - The Digital Lens Into Personal Security with Jon BlakeUntitled Episode

    Send us a text OSINT Part 2 - The Digital Lens Into Personal Security with Jon Blake In the second part, Philip and Jon delve deeper into technical aspects of OSINT and digital security: - VPNs (Virtual Private Networks): They discuss how VPNs create secure, encrypted connections through virtual "tunnels" and their benefits for security, particularly when using public Wi-Fi. They also address limitations, including potential impacts on speed and some websites detecting and blocking VPN access. - The security risks of public Wi-Fi networks, with Jon recommending always using a VPN when connecting to hotel, airport, or other public networks. - Using OSINT for due diligence, including understanding a person's "digital footprint" (information they know about and control) versus their "digital shadow" (information they may not be aware of, like data breaches). - Techniques for conducting effective searches, including using Google Advanced Search rather than basic searches, and applying filters strategically. - The challenges of images online, including metadata that can reveal sensitive information like location data, and the use of reverse image search technology. - The emerging role of AI and automation in OSINT investigations, with Jon cautioning that while AI tools can be helpful, they need human verification and should be used carefully. - Deep fakes and their security implications, particularly for high-profile individuals and organizations, with Jon emphasizing the need for verification processes and code words as potential safeguards. The podcast concludes with Jon highlighting his company's training programs and customizable "cyber investigator pathway" courses available through Cyber Ops Global. Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    39 min
  5. 28 APR

    OSINT Part 1 - The Digital Lens Into Personal Security with Jon Blake

    Send us a text OSINT Part 1 - The Digital Lens Into Personal Security with Jon Blake In the first part of this podcast, Philip Grindell interviews Jon Blake, a former Metropolitan Police Detective who has become an expert in Open Source Intelligence (OSINT).  They discuss: - Jon's background as a career detective who moved into cyber investigations, worked in covert operations, and eventually became a national internet investigation coordinator before entering the private sector in 2015. What OSINT is: Open-source intelligence refers to gathering publicly available information and processing it for reliability and assessment. Jon notes that in policing, they've moved away from the term "OSINT" to "triple I" (internet investigation and intelligence). - The difference between the surface web (indexed by search engines), the deep web (content not indexed by search engines, such as commercial databases), and the dark web (accessible only through specific tools like Tor). - The distinction between open source (publicly available information) and closed source (information from private systems). - The importance of treating digital evidence properly, including creating audit trails, capturing evidence methodically, and preserving digital material to maintain its integrity. - How investigators must approach OSINT with the mindset that any information gathered could potentially become evidence, so proper documentation and verification are essential. The experts emphasise that OSINT is a powerful investigation tool but should be part of a comprehensive approach rather than relied upon exclusively. Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    37 min
  6. 14 APR

    Countering Extremism with Guy Mathias - Part 2

    Send us a text "Countering Extremism with Guy Mathias" – The Defuse Podcast  This two-part podcast features an in-depth conversation between Philip Grindell and Guy Mathias, a renowned security expert with extensive experience countering extremism, particularly in the pharmaceutical and research sectors. Episode Summary In this fascinating discussion, Guy Mathias shares insights from his distinguished career addressing extremist threats, particularly from animal rights groups in the UK during the 1980s through the 2000s. The conversation explores the evolution of extremist tactics, sophisticated intelligence gathering methods, and how organizations can prepare for and counter modern extremist threats. Guy discusses how extremist groups evolved from direct action like arson attacks to more sophisticated operations involving infiltration, data mining, and targeted pressure campaigns. He emphasizes the importance of preparedness, risk assessment, and understanding both direct threats and supply chain vulnerabilities. Key Topics Discussed: Guy's background and entry into security without traditional military/police experienceThe evolution of animal rights extremism in the UK, particularly the SHAC (Stop Huntingdon Animal Cruelty) campaignSophisticated tactics used by extremist groups including: Direct action (arson, liberation of animals)Infiltration and insider threatsIntelligence gathering and targetingSupply chain disruptionHow extremist tactics have transferred to other causes and evolved with technologyThe importance of preparedness and risk assessmentChallenges of screening and vetting employeesProtecting organizational leadershipCurrent and future extremism trendsNotable Quotes: "The tactics were a local level. They were at a national level. They became an international level tactic." - Guy Mathias "I would certainly argue that there is a requirement for those of us working in the sector be that security risk or resilience, to be prepared. What does preparedness look like?" - Guy Mathias Practical Advice for Organizations: Develop and maintain a dynamic risk register that is regularly reviewedUnderstand your organization's supply chain vulnerabilitiesImplement thorough pre-employment screeningConsider ongoing screening for high-risk positionsEducate leadership about potential threatsConduct vulnerability assessments for executivesPrepare resilience plans for disruptionsThe podcast provides valuable historical context and practical security insights for organizations facing potential extremist threats in today's complex environment. Guy Mathias - https://www.linkedin.com/in/guy-mathias-19555673/ Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    51 min
  7. 31 MAR

    Countering Extremism with Guy Mathias - Part 1

    Send us a text "Countering Extremism with Guy Mathias" – The Defuse Podcast  This two-part podcast features an in-depth conversation between Philip Grindell and Guy Mathias, a renowned security expert with extensive experience countering extremism, particularly in the pharmaceutical and research sectors. Episode Summary In this fascinating discussion, Guy Mathias shares insights from his distinguished career addressing extremist threats, particularly from animal rights groups in the UK during the 1980s through the 2000s. The conversation explores the evolution of extremist tactics, sophisticated intelligence gathering methods, and how organizations can prepare for and counter modern extremist threats. Guy discusses how extremist groups evolved from direct action like arson attacks to more sophisticated operations involving infiltration, data mining, and targeted pressure campaigns. He emphasizes the importance of preparedness, risk assessment, and understanding both direct threats and supply chain vulnerabilities. Key Topics Discussed: Guy's background and entry into security without traditional military/police experienceThe evolution of animal rights extremism in the UK, particularly the SHAC (Stop Huntingdon Animal Cruelty) campaignSophisticated tactics used by extremist groups including: Direct action (arson, liberation of animals)Infiltration and insider threatsIntelligence gathering and targetingSupply chain disruptionHow extremist tactics have transferred to other causes and evolved with technologyThe importance of preparedness and risk assessmentChallenges of screening and vetting employeesProtecting organizational leadershipCurrent and future extremism trendsNotable Quotes: "The tactics were a local level. They were at a national level. They became an international level tactic." - Guy Mathias "I would certainly argue that there is a requirement for those of us working in the sector be that security risk or resilience, to be prepared. What does preparedness look like?" - Guy Mathias Practical Advice for Organizations: Develop and maintain a dynamic risk register that is regularly reviewedUnderstand your organization's supply chain vulnerabilitiesImplement thorough pre-employment screeningConsider ongoing screening for high-risk positionsEducate leadership about potential threatsConduct vulnerability assessments for executivesPrepare resilience plans for disruptionsThe podcast provides valuable historical context and practical security insights for organizations facing potential extremist threats in today's complex environment. Guy Mathias - https://www.linkedin.com/in/guy-mathias-19555673/ Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    42 min
  8. 25 FEB

    Reputation Management with Andrew Sanderson – Part 2

    Send us a text What do you do when your reputation or brand is threatened? Reputation management can mean different things depending on your status.  An organisation may have spent millions on developing and building its brand reputation, whilst private clients, UHNW individuals or influencers may rely on their good name to maintain their position and their wealth. Public inquiries are a subject of constant debate; they can be exhaustive, hugely detailed, politically motivated and take years to conclude. How do you protect your reputation when you're involved in such a public investigation? In part 2 of this podcast, lawyer Andrew Sanderson provides the answers. Andrew has successfully represented clients in all three of the above scenarios and discusses the complexities and the rights and wrongs of navigating these often deeply personal threats. Bio Andrew has nearly 20 years of experience working as a lawyer based in the City of London, advising large national and multinational clients on complex highly complex issues. He has always adopted a commercial approach when dealing with clients and opponents. With extensive legal, risk, and business experience, Andrew is a Solicitor-Advocate with rights of audience in the higher courts, both Criminal and Civil. He has recently joined a new firm, Kingsley Napley https://www.kingsleynapley.co.uk/our-people/andrew-sanderson https://www.linkedin.com/in/andrew-sanderson-fcilt-minstta-8023b015/ Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    29 min

About

When the threats are real and the stakes are high — what actually works? Right now, as you're reading this, someone's watching your family, your business rivals are digging through your digital history, and a disgruntled employee knows exactly where your vulnerabilities are. While you're focused on your day job, they're building a plan. This podcast exists because ignoring threats doesn't make them disappear. I'm Philip Grindell — former Scotland Yard detective, behavioural threat specialist, and author of Personal Threat Management. After Jo Cox MP was murdered, I was tasked with creating Parliament's specialist threat assessment team. I've spent 35 years stopping people who wanted to hurt prominent individuals, from MPs to royalty to the ultra-wealthy. What You'll Get From Listening You'll recognise the warning signs everyone else misses. That "helpful" new employee asking odd questions. The photographer at three different family events. The online critic whose interest feels too personal. You'll understand how dangerous people operate. The people planning to harm you treat you like a research project — cataloguing your habits, weaknesses, and blind spots whilst you're oblivious. You'll know what to do when a crisis hits. Not theory — actual steps. How to control the narrative when your reputation's under attack. When to stay silent and when silence destroys you. You'll discover what's already out there about you. Right now, strangers can map your life using tools you've never heard of. What You'll Hear Straight-talking conversations with ex-FBI agents who've tracked serial killers, digital investigators who can find anyone online, crisis managers who've saved billion-pound reputations, and psychologists who understand exactly how fixated individuals think. Topics include stalking, fixated individuals, insider threats, protective intelligence, reputation management, OSINT, digital vulnerability, and crisis leadership. These aren't interviews — they're operational briefings. Real cases, real tactics, real consequences. Who This Is For You must understand modern threats if you're responsible for protecting someone important (yourself, your family, or your boss). Physical violence is just one possibility. Reputation assassination, digital stalking, insider betrayal — these happen far more often and can be just as devastating. If you're prominent enough to be a target, you already are one. The question isn't whether someone's paying attention to you — it's whether you're paying attention to them. What Makes This Different No corporate nonsense. I've watched too many good people get hurt because they received sanitised advice from people who'd never faced real threats. You'll get the truth, even when it's uncomfortable. Experience that matters. I've identified planned terrorist attacks, managed stalking cases involving royalty, and helped ultra-wealthy families navigate threats they never considered. Every recommendation comes from cases where lives and reputations were on the line. Stories that stick. Theory doesn't save lives — understanding does. Every episode includes real cases that show you what threats look like before they turn dangerous. Because the people planning to hurt you aren't taking the day off. Subscribe now and learn how to manage threats before they become crises.

You Might Also Like