The Defuse Podcast: Where Experts Defuse Real Threats

Philip Grindell MSc CSyP
The Defuse Podcast: Where Experts Defuse Real Threats

🔊 The Defuse Podcast: Personal Threat Management for High-Risk Lives When the threats are real, the stakes are high — so what actually works?" Hosted by Philip Grindell — former Scotland Yard detective, behavioural threat specialist, and author of Personal Threat Management — this podcast lifts the lid on the proven methods used to keep prominent individuals, executives, and private clients safer.Each episode features straight-talking conversations with trusted experts on:Stalking, fixated individuals, and insider threatsProtective intelligence and behavioural profilingReputation management and media exposureDoxxing, OSINT, and digital vulnerabilityCrisis leadership and executive resilience under pressureWhether you're in security, lead a family office, or are responsible for protecting people at risk, you'll get honest, practical insights into what actually works when lives and reputations are on the line.No theory. No fluff. Just proven ways to defuse real threats. Subscribe now and learn how to manage threats before they become crises.

  1. 1 JUL

    The Attack Cycle with James Hamilton

    Send us a text In this compelling two-part episode, Philip Grindell welcomes back security expert James Hamilton to explore the "attack cycle" - a proven model used by criminals, terrorists, and assassins to target victims. Following the high-profile New York CEO assassination, Hamilton breaks down the eight critical phases: target selection, surveillance, final target selection, planning, rehearsal, execution, escape, and exploitation. The discussion reveals how attackers methodically progress through each stage and, crucially, how executive protection teams can identify and disrupt these phases. Hamilton shares practical insights on surveillance detection, threat assessment, and creating flexible security programs that balance protection with client accessibility. BIO James is a nationally recognized personal security expert and former FBI Supervisory Special Agent. For more than 33 years, he has been a protector, trainer, and advisor to the nation’s most at-risk individuals. He has real, practical, and unparalleled experience in executive protection, violence prevention, and personal security. This real experience was earned through service in local law enforcement, the FBI, and America’s premiere executive protection firm. He has protected government officials, high-net-worth individuals, and leading religious figures all over the globe and has empowered thousands of individuals to stay safe in an increasingly dangerous world. He has dedicated his life to this particular area of expertise and is sought after by those seeking practical and sound guidance. https://www.hamiltonsecuritygroup.com/ https://www.linkedin.com/in/james-hamilton-752894104/ Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    29 min
  2. 2 JUN

    When Crisis Hits: The Real Cost of Getting Reputation Wrong

    Send us a text When Crisis Hits: The Real Cost of Getting Reputation Wrong This week's Defuse Podcast featured Heather Blundell (CEO, Grayling UK) and James Clothier (Head of Crisis) discussing how reputation management has become essential protection. Key insights: Most crisis failures stem from human behaviour under pressure, not poor messaging. Female executives face different reputation attacks requiring specific strategies. Social media breaks stories before traditional media responds. Video responses are replacing written statements as authenticity matters more than polish. Heather revealed that proactive reputation management creates a competitive advantage, not just damage limitation. The conversation covers timing challenges, the importance of an external perspective, and why lawyers often make statements worse by stripping out emotion. They discuss how social media has transformed crisis response - young people get news from Snapchat, stories break on Twitter first, and video content is becoming essential. The practical advice focuses on being honest, letting the light in, and demonstrating genuine change rather than just promising to "learn lessons." Heather Blundell’s Biography:  Heather is the award-winning UK CEO of Grayling, a global PR firm,  responsible for 200 employees across nine offices.  She has spent more than 16 years as a trusted adviser to some of the world's largest companies and prominent CEOs, guiding them through periods of significant change, disruption, and complex reputation and crisis issues. Heather is also a regular media commentator in the national media.  James Clothier James is Head of Crisis at Grayling UK, responsible for leading the crisis and reputation practice, alongside the firm's corporate division.  Before joining Grayling, James spent two decades in senior editorial positions at The Sun and the Daily Mail. https://grayling.com/ #ThreatIntelligence #CrisisManagement #ReputationRisk #ExecutiveProtection #CorporateSecurity #StrategicCommunications Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    58 min
  3. 13 MAY

    OSINT Part 2 - The Digital Lens Into Personal Security with Jon BlakeUntitled Episode

    Send us a text OSINT Part 2 - The Digital Lens Into Personal Security with Jon Blake In the second part, Philip and Jon delve deeper into technical aspects of OSINT and digital security: - VPNs (Virtual Private Networks): They discuss how VPNs create secure, encrypted connections through virtual "tunnels" and their benefits for security, particularly when using public Wi-Fi. They also address limitations, including potential impacts on speed and some websites detecting and blocking VPN access. - The security risks of public Wi-Fi networks, with Jon recommending always using a VPN when connecting to hotel, airport, or other public networks. - Using OSINT for due diligence, including understanding a person's "digital footprint" (information they know about and control) versus their "digital shadow" (information they may not be aware of, like data breaches). - Techniques for conducting effective searches, including using Google Advanced Search rather than basic searches, and applying filters strategically. - The challenges of images online, including metadata that can reveal sensitive information like location data, and the use of reverse image search technology. - The emerging role of AI and automation in OSINT investigations, with Jon cautioning that while AI tools can be helpful, they need human verification and should be used carefully. - Deep fakes and their security implications, particularly for high-profile individuals and organizations, with Jon emphasizing the need for verification processes and code words as potential safeguards. The podcast concludes with Jon highlighting his company's training programs and customizable "cyber investigator pathway" courses available through Cyber Ops Global. Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    39 min
  4. 28 APR

    OSINT Part 1 - The Digital Lens Into Personal Security with Jon Blake

    Send us a text OSINT Part 1 - The Digital Lens Into Personal Security with Jon Blake In the first part of this podcast, Philip Grindell interviews Jon Blake, a former Metropolitan Police Detective who has become an expert in Open Source Intelligence (OSINT).  They discuss: - Jon's background as a career detective who moved into cyber investigations, worked in covert operations, and eventually became a national internet investigation coordinator before entering the private sector in 2015. What OSINT is: Open-source intelligence refers to gathering publicly available information and processing it for reliability and assessment. Jon notes that in policing, they've moved away from the term "OSINT" to "triple I" (internet investigation and intelligence). - The difference between the surface web (indexed by search engines), the deep web (content not indexed by search engines, such as commercial databases), and the dark web (accessible only through specific tools like Tor). - The distinction between open source (publicly available information) and closed source (information from private systems). - The importance of treating digital evidence properly, including creating audit trails, capturing evidence methodically, and preserving digital material to maintain its integrity. - How investigators must approach OSINT with the mindset that any information gathered could potentially become evidence, so proper documentation and verification are essential. The experts emphasise that OSINT is a powerful investigation tool but should be part of a comprehensive approach rather than relied upon exclusively. Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    37 min
  5. 14 APR

    Countering Extremism with Guy Mathias - Part 2

    Send us a text "Countering Extremism with Guy Mathias" – The Defuse Podcast  This two-part podcast features an in-depth conversation between Philip Grindell and Guy Mathias, a renowned security expert with extensive experience countering extremism, particularly in the pharmaceutical and research sectors. Episode Summary In this fascinating discussion, Guy Mathias shares insights from his distinguished career addressing extremist threats, particularly from animal rights groups in the UK during the 1980s through the 2000s. The conversation explores the evolution of extremist tactics, sophisticated intelligence gathering methods, and how organizations can prepare for and counter modern extremist threats. Guy discusses how extremist groups evolved from direct action like arson attacks to more sophisticated operations involving infiltration, data mining, and targeted pressure campaigns. He emphasizes the importance of preparedness, risk assessment, and understanding both direct threats and supply chain vulnerabilities. Key Topics Discussed: Guy's background and entry into security without traditional military/police experienceThe evolution of animal rights extremism in the UK, particularly the SHAC (Stop Huntingdon Animal Cruelty) campaignSophisticated tactics used by extremist groups including: Direct action (arson, liberation of animals)Infiltration and insider threatsIntelligence gathering and targetingSupply chain disruptionHow extremist tactics have transferred to other causes and evolved with technologyThe importance of preparedness and risk assessmentChallenges of screening and vetting employeesProtecting organizational leadershipCurrent and future extremism trendsNotable Quotes: "The tactics were a local level. They were at a national level. They became an international level tactic." - Guy Mathias "I would certainly argue that there is a requirement for those of us working in the sector be that security risk or resilience, to be prepared. What does preparedness look like?" - Guy Mathias Practical Advice for Organizations: Develop and maintain a dynamic risk register that is regularly reviewedUnderstand your organization's supply chain vulnerabilitiesImplement thorough pre-employment screeningConsider ongoing screening for high-risk positionsEducate leadership about potential threatsConduct vulnerability assessments for executivesPrepare resilience plans for disruptionsThe podcast provides valuable historical context and practical security insights for organizations facing potential extremist threats in today's complex environment. Guy Mathias - https://www.linkedin.com/in/guy-mathias-19555673/ Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    51 min
  6. 31 MAR

    Countering Extremism with Guy Mathias - Part 1

    Send us a text "Countering Extremism with Guy Mathias" – The Defuse Podcast  This two-part podcast features an in-depth conversation between Philip Grindell and Guy Mathias, a renowned security expert with extensive experience countering extremism, particularly in the pharmaceutical and research sectors. Episode Summary In this fascinating discussion, Guy Mathias shares insights from his distinguished career addressing extremist threats, particularly from animal rights groups in the UK during the 1980s through the 2000s. The conversation explores the evolution of extremist tactics, sophisticated intelligence gathering methods, and how organizations can prepare for and counter modern extremist threats. Guy discusses how extremist groups evolved from direct action like arson attacks to more sophisticated operations involving infiltration, data mining, and targeted pressure campaigns. He emphasizes the importance of preparedness, risk assessment, and understanding both direct threats and supply chain vulnerabilities. Key Topics Discussed: Guy's background and entry into security without traditional military/police experienceThe evolution of animal rights extremism in the UK, particularly the SHAC (Stop Huntingdon Animal Cruelty) campaignSophisticated tactics used by extremist groups including: Direct action (arson, liberation of animals)Infiltration and insider threatsIntelligence gathering and targetingSupply chain disruptionHow extremist tactics have transferred to other causes and evolved with technologyThe importance of preparedness and risk assessmentChallenges of screening and vetting employeesProtecting organizational leadershipCurrent and future extremism trendsNotable Quotes: "The tactics were a local level. They were at a national level. They became an international level tactic." - Guy Mathias "I would certainly argue that there is a requirement for those of us working in the sector be that security risk or resilience, to be prepared. What does preparedness look like?" - Guy Mathias Practical Advice for Organizations: Develop and maintain a dynamic risk register that is regularly reviewedUnderstand your organization's supply chain vulnerabilitiesImplement thorough pre-employment screeningConsider ongoing screening for high-risk positionsEducate leadership about potential threatsConduct vulnerability assessments for executivesPrepare resilience plans for disruptionsThe podcast provides valuable historical context and practical security insights for organizations facing potential extremist threats in today's complex environment. Guy Mathias - https://www.linkedin.com/in/guy-mathias-19555673/ Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    42 min
  7. 25 FEB

    Reputation Management with Andrew Sanderson – Part 2

    Send us a text What do you do when your reputation or brand is threatened? Reputation management can mean different things depending on your status.  An organisation may have spent millions on developing and building its brand reputation, whilst private clients, UHNW individuals or influencers may rely on their good name to maintain their position and their wealth. Public inquiries are a subject of constant debate; they can be exhaustive, hugely detailed, politically motivated and take years to conclude. How do you protect your reputation when you're involved in such a public investigation? In part 2 of this podcast, lawyer Andrew Sanderson provides the answers. Andrew has successfully represented clients in all three of the above scenarios and discusses the complexities and the rights and wrongs of navigating these often deeply personal threats. Bio Andrew has nearly 20 years of experience working as a lawyer based in the City of London, advising large national and multinational clients on complex highly complex issues. He has always adopted a commercial approach when dealing with clients and opponents. With extensive legal, risk, and business experience, Andrew is a Solicitor-Advocate with rights of audience in the higher courts, both Criminal and Civil. He has recently joined a new firm, Kingsley Napley https://www.kingsleynapley.co.uk/our-people/andrew-sanderson https://www.linkedin.com/in/andrew-sanderson-fcilt-minstta-8023b015/ Support the show Subscribe to 'Defuse News', our weekly update of the week's events on our website. Follow me on X /Twitter Connect with me on LinkedIn

    29 min

Ratings & Reviews

5
out of 5
6 Ratings

About

🔊 The Defuse Podcast: Personal Threat Management for High-Risk Lives When the threats are real, the stakes are high — so what actually works?" Hosted by Philip Grindell — former Scotland Yard detective, behavioural threat specialist, and author of Personal Threat Management — this podcast lifts the lid on the proven methods used to keep prominent individuals, executives, and private clients safer.Each episode features straight-talking conversations with trusted experts on:Stalking, fixated individuals, and insider threatsProtective intelligence and behavioural profilingReputation management and media exposureDoxxing, OSINT, and digital vulnerabilityCrisis leadership and executive resilience under pressureWhether you're in security, lead a family office, or are responsible for protecting people at risk, you'll get honest, practical insights into what actually works when lives and reputations are on the line.No theory. No fluff. Just proven ways to defuse real threats. Subscribe now and learn how to manage threats before they become crises.

You Might Also Like

To listen to explicit episodes, sign in.

Stay up to date with this show

Sign in or sign up to follow shows, save episodes and get the latest updates.

Select a country or region

Africa, Middle East, and India

Asia Pacific

Europe

Latin America and the Caribbean

The United States and Canada